blob: b3095e0f302a6b999c62b1f95459c6ef40145257 [file] [log] [blame]
Ted Kremenek033a07e2011-08-03 23:14:55 +00001// RUN: %clang_cc1 -analyze -analyzer-checker=core,experimental.deadcode.UnreachableCode,experimental.core.CastSize,experimental.unix.Malloc -analyzer-store=region -verify %s
Eli Friedman2f005522009-11-14 04:23:25 +00002typedef __typeof(sizeof(int)) size_t;
Ted Kremenekc3607752009-11-13 20:03:22 +00003void *malloc(size_t);
4void free(void *);
Zhongxing Xud9c84c82009-12-12 12:29:38 +00005void *realloc(void *ptr, size_t size);
6void *calloc(size_t nmemb, size_t size);
Ted Kremenekdd0e4902010-07-31 01:52:11 +00007
Anna Zaks91c2a112012-02-08 23:16:56 +00008void myfoo(int *p);
9void myfooint(int p);
Zhongxing Xufc7ac8f2009-11-13 07:48:11 +000010
11void f1() {
Zhongxing Xuab280992010-05-25 04:59:19 +000012 int *p = malloc(12);
Zhongxing Xufc7ac8f2009-11-13 07:48:11 +000013 return; // expected-warning{{Allocated memory never released. Potential memory leak.}}
14}
15
Zhongxing Xufc7ac8f2009-11-13 07:48:11 +000016void f2() {
Zhongxing Xuab280992010-05-25 04:59:19 +000017 int *p = malloc(12);
Zhongxing Xufc7ac8f2009-11-13 07:48:11 +000018 free(p);
19 free(p); // expected-warning{{Try to free a memory block that has been released}}
20}
Ted Kremenekc764d4b2009-11-13 20:00:28 +000021
Lenny Maiorani4d8d8032011-04-27 14:49:29 +000022void f2_realloc_0() {
23 int *p = malloc(12);
24 realloc(p,0);
25 realloc(p,0); // expected-warning{{Try to free a memory block that has been released}}
26}
27
28void f2_realloc_1() {
29 int *p = malloc(12);
Zhongxing Xud56763f2011-09-01 04:53:59 +000030 int *q = realloc(p,0); // no-warning
Lenny Maiorani4d8d8032011-04-27 14:49:29 +000031}
32
Zhongxing Xu243fde92009-11-17 07:54:15 +000033// This case tests that storing malloc'ed memory to a static variable which is
34// then returned is not leaked. In the absence of known contracts for functions
35// or inter-procedural analysis, this is a conservative answer.
Ted Kremenekc764d4b2009-11-13 20:00:28 +000036int *f3() {
37 static int *p = 0;
Zhongxing Xuab280992010-05-25 04:59:19 +000038 p = malloc(12);
Zhongxing Xu4985e3e2009-11-17 08:58:18 +000039 return p; // no-warning
Ted Kremenekc764d4b2009-11-13 20:00:28 +000040}
41
Zhongxing Xu243fde92009-11-17 07:54:15 +000042// This case tests that storing malloc'ed memory to a static global variable
43// which is then returned is not leaked. In the absence of known contracts for
44// functions or inter-procedural analysis, this is a conservative answer.
Ted Kremenekc764d4b2009-11-13 20:00:28 +000045static int *p_f4 = 0;
46int *f4() {
Zhongxing Xuab280992010-05-25 04:59:19 +000047 p_f4 = malloc(12);
Zhongxing Xu4985e3e2009-11-17 08:58:18 +000048 return p_f4; // no-warning
Ted Kremenekc764d4b2009-11-13 20:00:28 +000049}
Zhongxing Xud9c84c82009-12-12 12:29:38 +000050
51int *f5() {
Zhongxing Xuab280992010-05-25 04:59:19 +000052 int *q = malloc(12);
Zhongxing Xud9c84c82009-12-12 12:29:38 +000053 q = realloc(q, 20);
54 return q; // no-warning
55}
Zhongxing Xub94b81a2009-12-31 06:13:07 +000056
57void f6() {
Zhongxing Xuab280992010-05-25 04:59:19 +000058 int *p = malloc(12);
Zhongxing Xub94b81a2009-12-31 06:13:07 +000059 if (!p)
60 return; // no-warning
61 else
62 free(p);
63}
Zhongxing Xu425c7ed2010-01-18 04:01:40 +000064
Lenny Maiorani4d8d8032011-04-27 14:49:29 +000065void f6_realloc() {
66 int *p = malloc(12);
67 if (!p)
68 return; // no-warning
69 else
70 realloc(p,0);
71}
72
73
Zhongxing Xu425c7ed2010-01-18 04:01:40 +000074char *doit2();
75void pr6069() {
76 char *buf = doit2();
77 free(buf);
78}
Zhongxing Xu181cc3d2010-02-14 06:49:48 +000079
80void pr6293() {
81 free(0);
82}
Zhongxing Xuc8023782010-03-10 04:58:55 +000083
84void f7() {
85 char *x = (char*) malloc(4);
86 free(x);
Anna Zakse9ef5622012-02-10 01:11:00 +000087 x[0] = 'a'; // expected-warning{{Use of dynamically allocated memory after it is freed.}}
Zhongxing Xuc8023782010-03-10 04:58:55 +000088}
Zhongxing Xuab280992010-05-25 04:59:19 +000089
Lenny Maiorani4d8d8032011-04-27 14:49:29 +000090void f7_realloc() {
91 char *x = (char*) malloc(4);
92 realloc(x,0);
Anna Zakse9ef5622012-02-10 01:11:00 +000093 x[0] = 'a'; // expected-warning{{Use of dynamically allocated memory after it is freed.}}
Lenny Maiorani4d8d8032011-04-27 14:49:29 +000094}
95
Zhongxing Xuab280992010-05-25 04:59:19 +000096void PR6123() {
97 int *x = malloc(11); // expected-warning{{Cast a region whose size is not a multiple of the destination type size.}}
98}
99
100void PR7217() {
101 int *buf = malloc(2); // expected-warning{{Cast a region whose size is not a multiple of the destination type size.}}
102 buf[1] = 'c'; // not crash
Zhongxing Xuab280992010-05-25 04:59:19 +0000103}
Jordy Rosec580f2e2010-06-20 04:30:57 +0000104
105void mallocCastToVoid() {
106 void *p = malloc(2);
107 const void *cp = p; // not crash
108 free(p);
109}
110
111void mallocCastToFP() {
112 void *p = malloc(2);
113 void (*fp)() = p; // not crash
114 free(p);
115}
116
Zhongxing Xua5ce9662010-06-01 03:01:33 +0000117// This tests that malloc() buffers are undefined by default
118char mallocGarbage () {
119 char *buf = malloc(2);
120 char result = buf[1]; // expected-warning{{undefined}}
121 free(buf);
122 return result;
123}
124
125// This tests that calloc() buffers need to be freed
126void callocNoFree () {
127 char *buf = calloc(2,2);
128 return; // expected-warning{{never released}}
129}
130
131// These test that calloc() buffers are zeroed by default
132char callocZeroesGood () {
133 char *buf = calloc(2,2);
134 char result = buf[3]; // no-warning
135 if (buf[1] == 0) {
136 free(buf);
137 }
138 return result; // no-warning
139}
140
141char callocZeroesBad () {
142 char *buf = calloc(2,2);
143 char result = buf[3]; // no-warning
144 if (buf[1] != 0) {
Tom Carec4b5bd82010-07-23 23:04:53 +0000145 free(buf); // expected-warning{{never executed}}
Zhongxing Xua5ce9662010-06-01 03:01:33 +0000146 }
147 return result; // expected-warning{{never released}}
148}
Anna Zaks91c2a112012-02-08 23:16:56 +0000149
150void nullFree() {
151 int *p = 0;
152 free(p); // no warning - a nop
153}
154
155void paramFree(int *p) {
156 myfoo(p);
157 free(p); // no warning
158 myfoo(p); // TODO: This should be a warning.
159}
160
161int* mallocEscapeRet() {
162 int *p = malloc(12);
163 return p; // no warning
164}
165
166void mallocEscapeFoo() {
167 int *p = malloc(12);
168 myfoo(p);
169 return; // no warning
170}
171
172void mallocEscapeFree() {
173 int *p = malloc(12);
174 myfoo(p);
175 free(p);
176}
177
178void mallocEscapeFreeFree() {
179 int *p = malloc(12);
180 myfoo(p);
181 free(p);
182 free(p); // expected-warning{{Try to free a memory block that has been released}}
183}
184
185void mallocEscapeFreeUse() {
186 int *p = malloc(12);
187 myfoo(p);
188 free(p);
Anna Zakse9ef5622012-02-10 01:11:00 +0000189 myfoo(p); // expected-warning{{Use of dynamically allocated memory after it is freed.}}
Anna Zaks91c2a112012-02-08 23:16:56 +0000190}
191
192int *myalloc();
193void myalloc2(int **p);
194
195void mallocEscapeFreeCustomAlloc() {
196 int *p = malloc(12);
197 myfoo(p);
198 free(p);
199 p = myalloc();
200 free(p); // no warning
201}
202
203void mallocEscapeFreeCustomAlloc2() {
204 int *p = malloc(12);
205 myfoo(p);
206 free(p);
207 myalloc2(&p);
208 free(p); // no warning
209}
210
211void mallocBindFreeUse() {
212 int *x = malloc(12);
213 int *y = x;
214 free(y);
Anna Zakse9ef5622012-02-10 01:11:00 +0000215 myfoo(x); // expected-warning{{Use of dynamically allocated memory after it is freed.}}
Anna Zaks91c2a112012-02-08 23:16:56 +0000216}
217
218void mallocEscapeMalloc() {
219 int *p = malloc(12);
220 myfoo(p);
221 p = malloc(12); // expected-warning{{Allocated memory never released. Potential memory leak.}}
222}
223
224void mallocMalloc() {
225 int *p = malloc(12);
226 p = malloc(12); // expected-warning{{Allocated memory never released. Potential memory leak}}
227}
228
229void mallocFreeMalloc() {
230 int *p = malloc(12);
231 free(p);
232 p = malloc(12);
233 free(p);
234}
235
Anna Zakscdfec5e2012-02-09 06:25:47 +0000236void mallocFreeUse_params() {
Anna Zaks91c2a112012-02-08 23:16:56 +0000237 int *p = malloc(12);
238 free(p);
Anna Zakse9ef5622012-02-10 01:11:00 +0000239 myfoo(p); //expected-warning{{Use of dynamically allocated memory after it is freed}}
240 myfooint(*p); //expected-warning{{Use of dynamically allocated memory after it is freed}}
Anna Zaks91c2a112012-02-08 23:16:56 +0000241}
242
Anna Zaksff3b9fd2012-02-09 06:25:51 +0000243void mallocFailedOrNot() {
244 int *p = malloc(12);
245 if (!p)
246 free(p);
247 else
248 free(p);
249}
250
Anna Zakse9ef5622012-02-10 01:11:00 +0000251struct StructWithInt {
252 int g;
253};
Anna Zaks0860cd02012-02-11 21:44:39 +0000254
255int *mallocReturnFreed() {
256 int *p = malloc(12);
257 free(p);
258 return p; // expected-warning {{Use of dynamically allocated}}
259}
260
261int useAfterFreeStruct() {
262 struct StructWithInt *px= malloc(sizeof(struct StructWithInt));
263 px->g = 5;
264 free(px);
265 return px->g; // expected-warning {{Use of dynamically allocated}}
266}
267
Anna Zakse9ef5622012-02-10 01:11:00 +0000268void nonSymbolAsFirstArg(int *pp, struct StructWithInt *p);
269
270void mallocEscapeFooNonSymbolArg() {
271 struct StructWithInt *p = malloc(sizeof(struct StructWithInt));
272 nonSymbolAsFirstArg(&p->g, p);
273 return; // no warning
274}
275
Anna Zaks4fb54872012-02-11 21:02:35 +0000276void mallocFailedOrNotLeak() {
277 int *p = malloc(12);
278 if (p == 0)
279 return; // no warning
280 else
281 return; // expected-warning {{Allocated memory never released. Potential memory leak.}}
282}
Anna Zakse9ef5622012-02-10 01:11:00 +0000283
Anna Zakscdfec5e2012-02-09 06:25:47 +0000284int *Gl;
285struct GlStTy {
286 int *x;
287};
288
289struct GlStTy GlS = {0};
290
291void GlobalFree() {
292 free(Gl);
293}
294
295void GlobalMalloc() {
296 Gl = malloc(12);
297}
298
299void GlobalStructMalloc() {
300 int *a = malloc(12);
301 GlS.x = a;
302}
303
304void GlobalStructMallocFree() {
305 int *a = malloc(12);
306 GlS.x = a;
307 free(GlS.x);
308}
Anna Zaksf8b1c312012-02-10 01:11:03 +0000309
Anna Zaks4fb54872012-02-11 21:02:35 +0000310// Region escape testing.
311
312unsigned takePtrToPtr(int **p);
313void PassTheAddrOfAllocatedData(int f) {
314 int *p = malloc(12);
315 // We don't know what happens after the call. Should stop tracking here.
316 if (takePtrToPtr(&p))
317 f++;
318 free(p); // no warning
319}
320
321struct X {
322 int *p;
323};
324unsigned takePtrToStruct(struct X *s);
325int ** foo2(int *g, int f) {
326 int *p = malloc(12);
327 struct X *px= malloc(sizeof(struct X));
328 px->p = p;
329 // We don't know what happens after this call. Should not track px nor p.
330 if (takePtrToStruct(px))
331 f++;
332 free(p);
333 return 0;
334}
335
336struct X* RegInvalidationDetect1(struct X *s2) {
337 struct X *px= malloc(sizeof(struct X));
338 px->p = 0;
339 px = s2;
340 return px; // expected-warning {{Allocated memory never released. Potential memory leak.}}
341}
342
343struct X* RegInvalidationGiveUp1() {
344 int *p = malloc(12);
345 struct X *px= malloc(sizeof(struct X));
346 px->p = p;
347 return px;
348}
349
350int **RegInvalidationDetect2(int **pp) {
351 int *p = malloc(12);
352 pp = &p;
353 pp++;
354 return 0;// expected-warning {{Allocated memory never released. Potential memory leak.}}
355}
Anna Zaksf8b1c312012-02-10 01:11:03 +0000356
Anna Zaksf8b1c312012-02-10 01:11:03 +0000357extern void exit(int) __attribute__ ((__noreturn__));
358void mallocExit(int *g) {
359 struct xx *p = malloc(12);
Anna Zaksda046772012-02-11 21:02:40 +0000360 if (g != 0)
361 exit(1);
Anna Zaksf8b1c312012-02-10 01:11:03 +0000362 free(p);
363 return;
364}
365
Anna Zaksf8b1c312012-02-10 01:11:03 +0000366extern void __assert_fail (__const char *__assertion, __const char *__file,
367 unsigned int __line, __const char *__function)
368 __attribute__ ((__noreturn__));
369#define assert(expr) \
370 ((expr) ? (void)(0) : __assert_fail (#expr, __FILE__, __LINE__, __func__))
371void mallocAssert(int *g) {
372 struct xx *p = malloc(12);
373
Anna Zaksda046772012-02-11 21:02:40 +0000374 assert(g != 0);
Anna Zaksf8b1c312012-02-10 01:11:03 +0000375 free(p);
376 return;
377}
378
Anna Zaksda046772012-02-11 21:02:40 +0000379// Below are the known false positives.
380
Anna Zaksf8b1c312012-02-10 01:11:03 +0000381// TODO: There should be no warning here.
Anna Zaksf8b1c312012-02-10 01:11:03 +0000382void reallocFails(int *g, int f) {
383 char *p = malloc(12);
384 char *r = realloc(p, 12+1);
385 if (!r) {
386 free(p); // expected-warning {{Try to free a memory block that has been released}}
387 } else {
388 free(r);
389 }
390}
391
392// TODO: There should be no warning here. This one might be difficult to get rid of.
393void dependsOnValueOfPtr(int *g, unsigned f) {
394 int *p;
395
396 if (f) {
397 p = g;
398 } else {
399 p = malloc(12);
400 }
401
402 if (p != g)
403 free(p);
404 else
405 return; // expected-warning{{Allocated memory never released. Potential memory leak}}
406 return;
407}
408
409// TODO: Should this be a warning?
410// Here we are returning a pointer one past the allocated value. An idiom which
411// can be used for implementing special malloc. The correct uses of this might
412// be rare enough so that we could keep this as a warning.
413static void *specialMalloc(int n){
414 int *p;
415 p = malloc( n+8 );
416 if( p ){
417 p[0] = n;
418 p++;
419 }
420 return p;// expected-warning {{Allocated memory never released. Potential memory leak.}}
421}