malloc.c revision 0860cd0646ed40f87085df39563f2c5f7f77750b
1// RUN: %clang_cc1 -analyze -analyzer-checker=core,experimental.deadcode.UnreachableCode,experimental.core.CastSize,experimental.unix.Malloc -analyzer-store=region -verify %s 2typedef __typeof(sizeof(int)) size_t; 3void *malloc(size_t); 4void free(void *); 5void *realloc(void *ptr, size_t size); 6void *calloc(size_t nmemb, size_t size); 7 8void myfoo(int *p); 9void myfooint(int p); 10 11void f1() { 12 int *p = malloc(12); 13 return; // expected-warning{{Allocated memory never released. Potential memory leak.}} 14} 15 16void f2() { 17 int *p = malloc(12); 18 free(p); 19 free(p); // expected-warning{{Try to free a memory block that has been released}} 20} 21 22void f2_realloc_0() { 23 int *p = malloc(12); 24 realloc(p,0); 25 realloc(p,0); // expected-warning{{Try to free a memory block that has been released}} 26} 27 28void f2_realloc_1() { 29 int *p = malloc(12); 30 int *q = realloc(p,0); // no-warning 31} 32 33// This case tests that storing malloc'ed memory to a static variable which is 34// then returned is not leaked. In the absence of known contracts for functions 35// or inter-procedural analysis, this is a conservative answer. 36int *f3() { 37 static int *p = 0; 38 p = malloc(12); 39 return p; // no-warning 40} 41 42// This case tests that storing malloc'ed memory to a static global variable 43// which is then returned is not leaked. In the absence of known contracts for 44// functions or inter-procedural analysis, this is a conservative answer. 45static int *p_f4 = 0; 46int *f4() { 47 p_f4 = malloc(12); 48 return p_f4; // no-warning 49} 50 51int *f5() { 52 int *q = malloc(12); 53 q = realloc(q, 20); 54 return q; // no-warning 55} 56 57void f6() { 58 int *p = malloc(12); 59 if (!p) 60 return; // no-warning 61 else 62 free(p); 63} 64 65void f6_realloc() { 66 int *p = malloc(12); 67 if (!p) 68 return; // no-warning 69 else 70 realloc(p,0); 71} 72 73 74char *doit2(); 75void pr6069() { 76 char *buf = doit2(); 77 free(buf); 78} 79 80void pr6293() { 81 free(0); 82} 83 84void f7() { 85 char *x = (char*) malloc(4); 86 free(x); 87 x[0] = 'a'; // expected-warning{{Use of dynamically allocated memory after it is freed.}} 88} 89 90void f7_realloc() { 91 char *x = (char*) malloc(4); 92 realloc(x,0); 93 x[0] = 'a'; // expected-warning{{Use of dynamically allocated memory after it is freed.}} 94} 95 96void PR6123() { 97 int *x = malloc(11); // expected-warning{{Cast a region whose size is not a multiple of the destination type size.}} 98} 99 100void PR7217() { 101 int *buf = malloc(2); // expected-warning{{Cast a region whose size is not a multiple of the destination type size.}} 102 buf[1] = 'c'; // not crash 103} 104 105void mallocCastToVoid() { 106 void *p = malloc(2); 107 const void *cp = p; // not crash 108 free(p); 109} 110 111void mallocCastToFP() { 112 void *p = malloc(2); 113 void (*fp)() = p; // not crash 114 free(p); 115} 116 117// This tests that malloc() buffers are undefined by default 118char mallocGarbage () { 119 char *buf = malloc(2); 120 char result = buf[1]; // expected-warning{{undefined}} 121 free(buf); 122 return result; 123} 124 125// This tests that calloc() buffers need to be freed 126void callocNoFree () { 127 char *buf = calloc(2,2); 128 return; // expected-warning{{never released}} 129} 130 131// These test that calloc() buffers are zeroed by default 132char callocZeroesGood () { 133 char *buf = calloc(2,2); 134 char result = buf[3]; // no-warning 135 if (buf[1] == 0) { 136 free(buf); 137 } 138 return result; // no-warning 139} 140 141char callocZeroesBad () { 142 char *buf = calloc(2,2); 143 char result = buf[3]; // no-warning 144 if (buf[1] != 0) { 145 free(buf); // expected-warning{{never executed}} 146 } 147 return result; // expected-warning{{never released}} 148} 149 150void nullFree() { 151 int *p = 0; 152 free(p); // no warning - a nop 153} 154 155void paramFree(int *p) { 156 myfoo(p); 157 free(p); // no warning 158 myfoo(p); // TODO: This should be a warning. 159} 160 161int* mallocEscapeRet() { 162 int *p = malloc(12); 163 return p; // no warning 164} 165 166void mallocEscapeFoo() { 167 int *p = malloc(12); 168 myfoo(p); 169 return; // no warning 170} 171 172void mallocEscapeFree() { 173 int *p = malloc(12); 174 myfoo(p); 175 free(p); 176} 177 178void mallocEscapeFreeFree() { 179 int *p = malloc(12); 180 myfoo(p); 181 free(p); 182 free(p); // expected-warning{{Try to free a memory block that has been released}} 183} 184 185void mallocEscapeFreeUse() { 186 int *p = malloc(12); 187 myfoo(p); 188 free(p); 189 myfoo(p); // expected-warning{{Use of dynamically allocated memory after it is freed.}} 190} 191 192int *myalloc(); 193void myalloc2(int **p); 194 195void mallocEscapeFreeCustomAlloc() { 196 int *p = malloc(12); 197 myfoo(p); 198 free(p); 199 p = myalloc(); 200 free(p); // no warning 201} 202 203void mallocEscapeFreeCustomAlloc2() { 204 int *p = malloc(12); 205 myfoo(p); 206 free(p); 207 myalloc2(&p); 208 free(p); // no warning 209} 210 211void mallocBindFreeUse() { 212 int *x = malloc(12); 213 int *y = x; 214 free(y); 215 myfoo(x); // expected-warning{{Use of dynamically allocated memory after it is freed.}} 216} 217 218void mallocEscapeMalloc() { 219 int *p = malloc(12); 220 myfoo(p); 221 p = malloc(12); // expected-warning{{Allocated memory never released. Potential memory leak.}} 222} 223 224void mallocMalloc() { 225 int *p = malloc(12); 226 p = malloc(12); // expected-warning{{Allocated memory never released. Potential memory leak}} 227} 228 229void mallocFreeMalloc() { 230 int *p = malloc(12); 231 free(p); 232 p = malloc(12); 233 free(p); 234} 235 236void mallocFreeUse_params() { 237 int *p = malloc(12); 238 free(p); 239 myfoo(p); //expected-warning{{Use of dynamically allocated memory after it is freed}} 240 myfooint(*p); //expected-warning{{Use of dynamically allocated memory after it is freed}} 241} 242 243void mallocFailedOrNot() { 244 int *p = malloc(12); 245 if (!p) 246 free(p); 247 else 248 free(p); 249} 250 251struct StructWithInt { 252 int g; 253}; 254 255int *mallocReturnFreed() { 256 int *p = malloc(12); 257 free(p); 258 return p; // expected-warning {{Use of dynamically allocated}} 259} 260 261int useAfterFreeStruct() { 262 struct StructWithInt *px= malloc(sizeof(struct StructWithInt)); 263 px->g = 5; 264 free(px); 265 return px->g; // expected-warning {{Use of dynamically allocated}} 266} 267 268void nonSymbolAsFirstArg(int *pp, struct StructWithInt *p); 269 270void mallocEscapeFooNonSymbolArg() { 271 struct StructWithInt *p = malloc(sizeof(struct StructWithInt)); 272 nonSymbolAsFirstArg(&p->g, p); 273 return; // no warning 274} 275 276void mallocFailedOrNotLeak() { 277 int *p = malloc(12); 278 if (p == 0) 279 return; // no warning 280 else 281 return; // expected-warning {{Allocated memory never released. Potential memory leak.}} 282} 283 284int *Gl; 285struct GlStTy { 286 int *x; 287}; 288 289struct GlStTy GlS = {0}; 290 291void GlobalFree() { 292 free(Gl); 293} 294 295void GlobalMalloc() { 296 Gl = malloc(12); 297} 298 299void GlobalStructMalloc() { 300 int *a = malloc(12); 301 GlS.x = a; 302} 303 304void GlobalStructMallocFree() { 305 int *a = malloc(12); 306 GlS.x = a; 307 free(GlS.x); 308} 309 310// Region escape testing. 311 312unsigned takePtrToPtr(int **p); 313void PassTheAddrOfAllocatedData(int f) { 314 int *p = malloc(12); 315 // We don't know what happens after the call. Should stop tracking here. 316 if (takePtrToPtr(&p)) 317 f++; 318 free(p); // no warning 319} 320 321struct X { 322 int *p; 323}; 324unsigned takePtrToStruct(struct X *s); 325int ** foo2(int *g, int f) { 326 int *p = malloc(12); 327 struct X *px= malloc(sizeof(struct X)); 328 px->p = p; 329 // We don't know what happens after this call. Should not track px nor p. 330 if (takePtrToStruct(px)) 331 f++; 332 free(p); 333 return 0; 334} 335 336struct X* RegInvalidationDetect1(struct X *s2) { 337 struct X *px= malloc(sizeof(struct X)); 338 px->p = 0; 339 px = s2; 340 return px; // expected-warning {{Allocated memory never released. Potential memory leak.}} 341} 342 343struct X* RegInvalidationGiveUp1() { 344 int *p = malloc(12); 345 struct X *px= malloc(sizeof(struct X)); 346 px->p = p; 347 return px; 348} 349 350int **RegInvalidationDetect2(int **pp) { 351 int *p = malloc(12); 352 pp = &p; 353 pp++; 354 return 0;// expected-warning {{Allocated memory never released. Potential memory leak.}} 355} 356 357extern void exit(int) __attribute__ ((__noreturn__)); 358void mallocExit(int *g) { 359 struct xx *p = malloc(12); 360 if (g != 0) 361 exit(1); 362 free(p); 363 return; 364} 365 366extern void __assert_fail (__const char *__assertion, __const char *__file, 367 unsigned int __line, __const char *__function) 368 __attribute__ ((__noreturn__)); 369#define assert(expr) \ 370 ((expr) ? (void)(0) : __assert_fail (#expr, __FILE__, __LINE__, __func__)) 371void mallocAssert(int *g) { 372 struct xx *p = malloc(12); 373 374 assert(g != 0); 375 free(p); 376 return; 377} 378 379// Below are the known false positives. 380 381// TODO: There should be no warning here. 382void reallocFails(int *g, int f) { 383 char *p = malloc(12); 384 char *r = realloc(p, 12+1); 385 if (!r) { 386 free(p); // expected-warning {{Try to free a memory block that has been released}} 387 } else { 388 free(r); 389 } 390} 391 392// TODO: There should be no warning here. This one might be difficult to get rid of. 393void dependsOnValueOfPtr(int *g, unsigned f) { 394 int *p; 395 396 if (f) { 397 p = g; 398 } else { 399 p = malloc(12); 400 } 401 402 if (p != g) 403 free(p); 404 else 405 return; // expected-warning{{Allocated memory never released. Potential memory leak}} 406 return; 407} 408 409// TODO: Should this be a warning? 410// Here we are returning a pointer one past the allocated value. An idiom which 411// can be used for implementing special malloc. The correct uses of this might 412// be rare enough so that we could keep this as a warning. 413static void *specialMalloc(int n){ 414 int *p; 415 p = malloc( n+8 ); 416 if( p ){ 417 p[0] = n; 418 p++; 419 } 420 return p;// expected-warning {{Allocated memory never released. Potential memory leak.}} 421} 422