You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

210 lines
4.8 KiB

// RUN: rm -f %t
// RUN: %clang_analyze_cc1 -fblocks -analyzer-checker=core,unix.Malloc -analyzer-output=plist -verify -o %t -analyzer-config eagerly-assume=false %s
// RUN: tail -n +11 %t | %normalize_plist | diff -ub %S/Inputs/expected-plists/malloc-plist.c.plist -
typedef __typeof(sizeof(int)) size_t;
void *malloc(size_t);
void free(void *);
void *realloc(void *ptr, size_t size);
void diagnosticTest(int in) {
if (in > 5) {
int *p = malloc(12);
*p = 0;
(*p)++;
}
in++; // expected-warning {{leak}}
}
void myArrayAllocation() {
int **A;
A = malloc(2*sizeof(int*));
A[0] = 0;
}//expected-warning{{Potential leak}}
void reallocDiagnostics() {
char * buf = malloc(100);
char * tmp;
tmp = (char*)realloc(buf, 0x1000000);
if (!tmp) {
return;// expected-warning {{leak}}
}
buf = tmp;
free(buf);
}
void *wrapper() {
void *x = malloc(100);
// This is intentionally done to test diagnostic emission.
if (x)
return x;
return 0;
}
void test_wrapper() {
void *buf = wrapper();
(void) buf;
}//expected-warning{{Potential leak}}
// Test what happens when the same call frees and allocated memory.
// Also tests the stack hint for parameters, when they are passed directly or via pointer.
void my_free(void *x) {
free(x);
}
void my_malloc_and_free(void **x) {
*x = malloc(100);
if (*x)
my_free(*x);
return;
}
void *test_double_action_call() {
void *buf;
my_malloc_and_free(&buf);
return buf; //expected-warning{{Use of memory after it is freed}}
}
// Test stack hint for 'reallocation failed'.
char *my_realloc(char *buf) {
char *tmp;
tmp = (char*)realloc(buf, 0x1000000);
if (!tmp) {
return tmp;
}
return tmp;
}
void reallocIntra() {
char *buf = (char *)malloc(100);
buf = my_realloc(buf);
free(buf);//expected-warning{{Potential leak}}
}
// Test stack hint when returning a result.
static char *malloc_wrapper_ret() {
return (char*)malloc(12);
}
void use_ret() {
char *v;
v = malloc_wrapper_ret();
}//expected-warning{{Potential leak}}
// Passing a block as a parameter to an inlined call for which we generate
// a stack hint message caused crashes.
// rdar://problem/21291971
void myfree_takingblock(void (^ignored)(void), int *p) {
free(p);
}
void call_myfree_takingblock() {
void (^some_block)(void) = ^void(void) { };
int *p = malloc(sizeof(int));
myfree_takingblock(some_block, p);
*p = 3;//expected-warning{{Use of memory after it is freed}}
}
// Test that we refer to the last symbol used in the leak diagnostic.
void LeakedSymbol(int in) {
int *m = 0;
int *p;
p = (int*)malloc(12);
*p = 0;
(*p)++;
m = p;
p = 0;
(*m)++;
in++;//expected-warning{{Potential leak}}
}
// Tests that exercise running remove dead bindings at Call exit.
static void function_with_leak1() {
char *x = (char*)malloc(12);
} //expected-warning{{Potential leak}}
void use_function_with_leak1() {
function_with_leak1();
int y = 0;
}
static void function_with_leak2() {
char *x = (char*)malloc(12);
int m = 0; //expected-warning{{Potential leak}}
}
void use_function_with_leak2() {
function_with_leak2();
}
static void function_with_leak3(int y) {
char *x = (char*)malloc(12);
if (y)
y++;
}//expected-warning{{Potential leak}}
void use_function_with_leak3(int y) {
function_with_leak3(y);
}
static void function_with_leak4(int y) {
char *x = (char*)malloc(12);
if (y)
y++;
else
y--;//expected-warning{{Potential leak}}
}
void use_function_with_leak4(int y) {
function_with_leak4(y);
}
int anotherFunction5() {
return 5;
}
static int function_with_leak5() {
char *x = (char*)malloc(12);
return anotherFunction5();//expected-warning{{Potential leak}}
}
void use_function_with_leak5() {
function_with_leak5();
}
void anotherFunction6(int m) {
m++;
}
static void function_with_leak6() {
char *x = (char*)malloc(12);
anotherFunction6(3);//expected-warning{{Potential leak}}
}
void use_function_with_leak6() {
function_with_leak6();
}
static void empty_function(){
}
void use_empty_function() {
empty_function();
}
static char *function_with_leak7() {
return (char*)malloc(12);
}
void use_function_with_leak7() {
function_with_leak7();
}//expected-warning{{Potential memory leak}}
// Test that we do not print the name of a variable not visible from where
// the issue is reported.
int *my_malloc() {
int *p = malloc(12);
return p;
}
void testOnlyRefferToVisibleVariables() {
my_malloc();
} // expected-warning{{Potential memory leak}}
struct PointerWrapper{
int*p;
};
int *my_malloc_into_struct() {
struct PointerWrapper w;
w.p = malloc(12);
return w.p;
}
void testMyMalloc() {
my_malloc_into_struct();
} // expected-warning{{Potential memory leak}}