// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.deadcode.UnreachableCode,alpha.core.CastSize,unix.Malloc,debug.ExprInspection -analyzer-store=region -verify %s #include "Inputs/system-header-simulator.h" void clang_analyzer_eval(int); typedef __typeof(sizeof(int)) size_t; void *malloc(size_t); void *valloc(size_t); void free(void *); void *realloc(void *ptr, size_t size); void *reallocf(void *ptr, size_t size); void *calloc(size_t nmemb, size_t size); char *strdup(const char *s); char *strndup(const char *s, size_t n); int memcmp(const void *s1, const void *s2, size_t n); void myfoo(int *p); void myfooint(int p); char *fooRetPtr(); void f1() { int *p = malloc(12); return; // expected-warning{{Potential leak of memory pointed to by 'p'}} } void f2() { int *p = malloc(12); free(p); free(p); // expected-warning{{Attempt to free released memory}} } void f2_realloc_0() { int *p = malloc(12); realloc(p,0); realloc(p,0); // expected-warning{{Attempt to free released memory}} } void f2_realloc_1() { int *p = malloc(12); int *q = realloc(p,0); // no-warning } void reallocNotNullPtr(unsigned sizeIn) { unsigned size = 12; char *p = (char*)malloc(size); if (p) { char *q = (char*)realloc(p, sizeIn); char x = *q; // expected-warning {{Potential leak of memory pointed to by 'q'}} } } int *realloctest1() { int *q = malloc(12); q = realloc(q, 20); return q; // no warning - returning the allocated value } // p should be freed if realloc fails. void reallocFails() { char *p = malloc(12); char *r = realloc(p, 12+1); if (!r) { free(p); } else { free(r); } } void reallocSizeZero1() { char *p = malloc(12); char *r = realloc(p, 0); if (!r) { free(p); // expected-warning {{Attempt to free released memory}} } else { free(r); } } void reallocSizeZero2() { char *p = malloc(12); char *r = realloc(p, 0); if (!r) { free(p); // expected-warning {{Attempt to free released memory}} } else { free(r); } free(p); // expected-warning {{Attempt to free released memory}} } void reallocSizeZero3() { char *p = malloc(12); char *r = realloc(p, 0); free(r); } void reallocSizeZero4() { char *r = realloc(0, 0); free(r); } void reallocSizeZero5() { char *r = realloc(0, 0); } void reallocPtrZero1() { char *r = realloc(0, 12); } // expected-warning {{Potential leak of memory pointed to by 'r'}} void reallocPtrZero2() { char *r = realloc(0, 12); if (r) free(r); } void reallocPtrZero3() { char *r = realloc(0, 12); free(r); } void reallocRadar6337483_1() { char *buf = malloc(100); buf = (char*)realloc(buf, 0x1000000); if (!buf) { return;// expected-warning {{Potential leak of memory pointed to by}} } free(buf); } void reallocRadar6337483_2() { char *buf = malloc(100); char *buf2 = (char*)realloc(buf, 0x1000000); if (!buf2) { ; } else { free(buf2); } } // expected-warning {{Potential leak of memory pointed to by}} void reallocRadar6337483_3() { char * buf = malloc(100); char * tmp; tmp = (char*)realloc(buf, 0x1000000); if (!tmp) { free(buf); return; } buf = tmp; free(buf); } void reallocRadar6337483_4() { char *buf = malloc(100); char *buf2 = (char*)realloc(buf, 0x1000000); if (!buf2) { return; // expected-warning {{Potential leak of memory pointed to by}} } else { free(buf2); } } int *reallocfTest1() { int *q = malloc(12); q = reallocf(q, 20); return q; // no warning - returning the allocated value } void reallocfRadar6337483_4() { char *buf = malloc(100); char *buf2 = (char*)reallocf(buf, 0x1000000); if (!buf2) { return; // no warning - reallocf frees even on failure } else { free(buf2); } } void reallocfRadar6337483_3() { char * buf = malloc(100); char * tmp; tmp = (char*)reallocf(buf, 0x1000000); if (!tmp) { free(buf); // expected-warning {{Attempt to free released memory}} return; } buf = tmp; free(buf); } void reallocfPtrZero1() { char *r = reallocf(0, 12); } // expected-warning {{Potential leak of memory pointed to by}} // This case tests that storing malloc'ed memory to a static variable which is // then returned is not leaked. In the absence of known contracts for functions // or inter-procedural analysis, this is a conservative answer. int *f3() { static int *p = 0; p = malloc(12); return p; // no-warning } // This case tests that storing malloc'ed memory to a static global variable // which is then returned is not leaked. In the absence of known contracts for // functions or inter-procedural analysis, this is a conservative answer. static int *p_f4 = 0; int *f4() { p_f4 = malloc(12); return p_f4; // no-warning } int *f5() { int *q = malloc(12); q = realloc(q, 20); return q; // no-warning } void f6() { int *p = malloc(12); if (!p) return; // no-warning else free(p); } void f6_realloc() { int *p = malloc(12); if (!p) return; // no-warning else realloc(p,0); } char *doit2(); void pr6069() { char *buf = doit2(); free(buf); } void pr6293() { free(0); } void f7() { char *x = (char*) malloc(4); free(x); x[0] = 'a'; // expected-warning{{Use of memory after it is freed}} } void f8() { char *x = (char*) malloc(4); free(x); char *y = strndup(x, 4); // expected-warning{{Use of memory after it is freed}} } void f7_realloc() { char *x = (char*) malloc(4); realloc(x,0); x[0] = 'a'; // expected-warning{{Use of memory after it is freed}} } void PR6123() { int *x = malloc(11); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} } void PR7217() { int *buf = malloc(2); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} buf[1] = 'c'; // not crash } void cast_emtpy_struct() { struct st { }; struct st *s = malloc(sizeof(struct st)); // no-warning free(s); } void cast_struct_1() { struct st { int i[100]; char j[]; }; struct st *s = malloc(sizeof(struct st)); // no-warning free(s); } void cast_struct_2() { struct st { int i[100]; char j[0]; }; struct st *s = malloc(sizeof(struct st)); // no-warning free(s); } void cast_struct_3() { struct st { int i[100]; char j[1]; }; struct st *s = malloc(sizeof(struct st)); // no-warning free(s); } void cast_struct_4() { struct st { int i[100]; char j[2]; }; struct st *s = malloc(sizeof(struct st)); // no-warning free(s); } void cast_struct_5() { struct st { char i[200]; char j[1]; }; struct st *s = malloc(sizeof(struct st) - sizeof(char)); // no-warning free(s); } void cast_struct_warn_1() { struct st { int i[100]; char j[2]; }; struct st *s = malloc(sizeof(struct st) + 2); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void cast_struct_warn_2() { struct st { int i[100]; char j[2]; }; struct st *s = malloc(2); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void cast_struct_flex_array_1() { struct st { int i[100]; char j[]; }; struct st *s = malloc(sizeof(struct st) + 3); // no-warning free(s); } void cast_struct_flex_array_2() { struct st { int i[100]; char j[0]; }; struct st *s = malloc(sizeof(struct st) + 3); // no-warning free(s); } void cast_struct_flex_array_3() { struct st { int i[100]; char j[1]; }; struct st *s = malloc(sizeof(struct st) + 3); // no-warning free(s); } void cast_struct_flex_array_4() { struct foo { char f[32]; }; struct st { char i[100]; struct foo data[]; }; struct st *s = malloc(sizeof(struct st) + 3 * sizeof(struct foo)); // no-warning free(s); } void cast_struct_flex_array_5() { struct foo { char f[32]; }; struct st { char i[100]; struct foo data[0]; }; struct st *s = malloc(sizeof(struct st) + 3 * sizeof(struct foo)); // no-warning free(s); } void cast_struct_flex_array_6() { struct foo { char f[32]; }; struct st { char i[100]; struct foo data[1]; }; struct st *s = malloc(sizeof(struct st) + 3 * sizeof(struct foo)); // no-warning free(s); } void cast_struct_flex_array_warn_1() { struct foo { char f[32]; }; struct st { char i[100]; struct foo data[]; }; struct st *s = malloc(3 * sizeof(struct st) + 3 * sizeof(struct foo)); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void cast_struct_flex_array_warn_2() { struct foo { char f[32]; }; struct st { char i[100]; struct foo data[0]; }; struct st *s = malloc(3 * sizeof(struct st) + 3 * sizeof(struct foo)); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void cast_struct_flex_array_warn_3() { struct foo { char f[32]; }; struct st { char i[100]; struct foo data[1]; }; struct st *s = malloc(3 * sizeof(struct st) + 3 * sizeof(struct foo)); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void cast_struct_flex_array_warn_4() { struct st { int i[100]; int j[]; }; struct st *s = malloc(sizeof(struct st) + 3); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void cast_struct_flex_array_warn_5() { struct st { int i[100]; int j[0]; }; struct st *s = malloc(sizeof(struct st) + 3); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void cast_struct_flex_array_warn_6() { struct st { int i[100]; int j[1]; }; struct st *s = malloc(sizeof(struct st) + 3); // expected-warning{{Cast a region whose size is not a multiple of the destination type size}} free(s); } void mallocCastToVoid() { void *p = malloc(2); const void *cp = p; // not crash free(p); } void mallocCastToFP() { void *p = malloc(2); void (*fp)() = p; // not crash free(p); } // This tests that malloc() buffers are undefined by default char mallocGarbage () { char *buf = malloc(2); char result = buf[1]; // expected-warning{{undefined}} free(buf); return result; } // This tests that calloc() buffers need to be freed void callocNoFree () { char *buf = calloc(2,2); return; // expected-warning{{Potential leak of memory pointed to by 'buf'}} } // These test that calloc() buffers are zeroed by default char callocZeroesGood () { char *buf = calloc(2,2); char result = buf[3]; // no-warning if (buf[1] == 0) { free(buf); } return result; // no-warning } char callocZeroesBad () { char *buf = calloc(2,2); char result = buf[3]; // no-warning if (buf[1] != 0) { free(buf); // expected-warning{{never executed}} } return result; // expected-warning{{Potential leak of memory pointed to by 'buf'}} } void nullFree() { int *p = 0; free(p); // no warning - a nop } void paramFree(int *p) { myfoo(p); free(p); // no warning myfoo(p); // expected-warning {{Use of memory after it is freed}} } int* mallocEscapeRet() { int *p = malloc(12); return p; // no warning } void mallocEscapeFoo() { int *p = malloc(12); myfoo(p); return; // no warning } void mallocEscapeFree() { int *p = malloc(12); myfoo(p); free(p); } void mallocEscapeFreeFree() { int *p = malloc(12); myfoo(p); free(p); free(p); // expected-warning{{Attempt to free released memory}} } void mallocEscapeFreeUse() { int *p = malloc(12); myfoo(p); free(p); myfoo(p); // expected-warning{{Use of memory after it is freed}} } int *myalloc(); void myalloc2(int **p); void mallocEscapeFreeCustomAlloc() { int *p = malloc(12); myfoo(p); free(p); p = myalloc(); free(p); // no warning } void mallocEscapeFreeCustomAlloc2() { int *p = malloc(12); myfoo(p); free(p); myalloc2(&p); free(p); // no warning } void mallocBindFreeUse() { int *x = malloc(12); int *y = x; free(y); myfoo(x); // expected-warning{{Use of memory after it is freed}} } void mallocEscapeMalloc() { int *p = malloc(12); myfoo(p); p = malloc(12); } // expected-warning{{Potential leak of memory pointed to by}} void mallocMalloc() { int *p = malloc(12); p = malloc(12); } // expected-warning {{Potential leak of memory pointed to by}} void mallocFreeMalloc() { int *p = malloc(12); free(p); p = malloc(12); free(p); } void mallocFreeUse_params() { int *p = malloc(12); free(p); myfoo(p); //expected-warning{{Use of memory after it is freed}} } void mallocFreeUse_params2() { int *p = malloc(12); free(p); myfooint(*p); //expected-warning{{Use of memory after it is freed}} } void mallocFailedOrNot() { int *p = malloc(12); if (!p) free(p); else free(p); } struct StructWithInt { int g; }; int *mallocReturnFreed() { int *p = malloc(12); free(p); return p; // expected-warning {{Use of memory after it is freed}} } int useAfterFreeStruct() { struct StructWithInt *px= malloc(sizeof(struct StructWithInt)); px->g = 5; free(px); return px->g; // expected-warning {{Use of memory after it is freed}} } void nonSymbolAsFirstArg(int *pp, struct StructWithInt *p); void mallocEscapeFooNonSymbolArg() { struct StructWithInt *p = malloc(sizeof(struct StructWithInt)); nonSymbolAsFirstArg(&p->g, p); return; // no warning } void mallocFailedOrNotLeak() { int *p = malloc(12); if (p == 0) return; // no warning else return; // expected-warning {{Potential leak of memory pointed to by}} } void mallocAssignment() { char *p = malloc(12); p = fooRetPtr(); } // expected-warning {{leak}} int vallocTest() { char *mem = valloc(12); return 0; // expected-warning {{Potential leak of memory pointed to by}} } void vallocEscapeFreeUse() { int *p = valloc(12); myfoo(p); free(p); myfoo(p); // expected-warning{{Use of memory after it is freed}} } int *Gl; struct GlStTy { int *x; }; struct GlStTy GlS = {0}; void GlobalFree() { free(Gl); } void GlobalMalloc() { Gl = malloc(12); } void GlobalStructMalloc() { int *a = malloc(12); GlS.x = a; } void GlobalStructMallocFree() { int *a = malloc(12); GlS.x = a; free(GlS.x); } char *ArrayG[12]; void globalArrayTest() { char *p = (char*)malloc(12); ArrayG[0] = p; } // Make sure that we properly handle a pointer stored into a local struct/array. typedef struct _StructWithPtr { int *memP; } StructWithPtr; static StructWithPtr arrOfStructs[10]; void testMalloc() { int *x = malloc(12); StructWithPtr St; St.memP = x; arrOfStructs[0] = St; // no-warning } StructWithPtr testMalloc2() { int *x = malloc(12); StructWithPtr St; St.memP = x; return St; // no-warning } int *testMalloc3() { int *x = malloc(12); int *y = x; return y; // no-warning } void testStructLeak() { StructWithPtr St; St.memP = malloc(12); return; // expected-warning {{Potential leak of memory pointed to by 'St.memP'}} } void testElemRegion1() { char *x = (void*)malloc(2); int *ix = (int*)x; free(&(x[0])); } void testElemRegion2(int **pp) { int *p = malloc(12); *pp = p; free(pp[0]); } void testElemRegion3(int **pp) { int *p = malloc(12); *pp = p; free(*pp); } // Region escape testing. unsigned takePtrToPtr(int **p); void PassTheAddrOfAllocatedData(int f) { int *p = malloc(12); // We don't know what happens after the call. Should stop tracking here. if (takePtrToPtr(&p)) f++; free(p); // no warning } struct X { int *p; }; unsigned takePtrToStruct(struct X *s); int ** foo2(int *g, int f) { int *p = malloc(12); struct X *px= malloc(sizeof(struct X)); px->p = p; // We don't know what happens after this call. Should not track px nor p. if (takePtrToStruct(px)) f++; free(p); return 0; } struct X* RegInvalidationDetect1(struct X *s2) { struct X *px= malloc(sizeof(struct X)); px->p = 0; px = s2; return px; // expected-warning {{Potential leak of memory pointed to by}} } struct X* RegInvalidationGiveUp1() { int *p = malloc(12); struct X *px= malloc(sizeof(struct X)); px->p = p; return px; } int **RegInvalidationDetect2(int **pp) { int *p = malloc(12); pp = &p; pp++; return 0;// expected-warning {{Potential leak of memory pointed to by}} } extern void exit(int) __attribute__ ((__noreturn__)); void mallocExit(int *g) { struct xx *p = malloc(12); if (g != 0) exit(1); free(p); return; } extern void __assert_fail (__const char *__assertion, __const char *__file, unsigned int __line, __const char *__function) __attribute__ ((__noreturn__)); #define assert(expr) \ ((expr) ? (void)(0) : __assert_fail (#expr, __FILE__, __LINE__, __func__)) void mallocAssert(int *g) { struct xx *p = malloc(12); assert(g != 0); free(p); return; } void doNotInvalidateWhenPassedToSystemCalls(char *s) { char *p = malloc(12); strlen(p); strcpy(p, s); strcpy(s, p); strcpy(p, p); memcpy(p, s, 1); memcpy(s, p, 1); memcpy(p, p, 1); } // expected-warning {{leak}} // Treat source buffer contents as escaped. void escapeSourceContents(char *s) { char *p = malloc(12); memcpy(s, &p, 12); // no warning void *p1 = malloc(7); char *a; memcpy(&a, &p1, sizeof a); // FIXME: No warning due to limitations imposed by current modelling of // 'memcpy' (regions metadata is not copied). int *ptrs[2]; int *allocated = (int *)malloc(4); memcpy(&ptrs[0], &allocated, sizeof(int *)); // FIXME: No warning due to limitations imposed by current modelling of // 'memcpy' (regions metadata is not copied). } void invalidateDestinationContents() { int *null = 0; int *p = (int *)malloc(4); memcpy(&p, &null, sizeof(int *)); int *ptrs1[2]; // expected-warning {{Potential leak of memory pointed to by}} ptrs1[0] = (int *)malloc(4); memcpy(ptrs1, &null, sizeof(int *)); int *ptrs2[2]; // expected-warning {{Potential memory leak}} ptrs2[0] = (int *)malloc(4); memcpy(&ptrs2[1], &null, sizeof(int *)); int *ptrs3[2]; // expected-warning {{Potential memory leak}} ptrs3[0] = (int *)malloc(4); memcpy(&ptrs3[0], &null, sizeof(int *)); } // expected-warning {{Potential memory leak}} // Rely on the CString checker evaluation of the strcpy API to convey that the result of strcpy is equal to p. void symbolLostWithStrcpy(char *s) { char *p = malloc(12); p = strcpy(p, s); free(p); } // The same test as the one above, but with what is actually generated on a mac. static __inline char * __inline_strcpy_chk (char *restrict __dest, const char *restrict __src) { return __builtin___strcpy_chk (__dest, __src, __builtin_object_size (__dest, 2 > 1)); } void symbolLostWithStrcpy_InlineStrcpyVersion(char *s) { char *p = malloc(12); p = ((__builtin_object_size (p, 0) != (size_t) -1) ? __builtin___strcpy_chk (p, s, __builtin_object_size (p, 2 > 1)) : __inline_strcpy_chk (p, s)); free(p); } // Here we are returning a pointer one past the allocated value. An idiom which // can be used for implementing special malloc. The correct uses of this might // be rare enough so that we could keep this as a warning. static void *specialMalloc(int n){ int *p; p = malloc( n+8 ); if( p ){ p[0] = n; p++; } return p; } // Potentially, the user could free the struct by performing pointer arithmetic on the return value. // This is a variation of the specialMalloc issue, though probably would be more rare in correct code. int *specialMallocWithStruct() { struct StructWithInt *px= malloc(sizeof(struct StructWithInt)); return &(px->g); } // Test various allocation/deallocation functions. void testStrdup(const char *s, unsigned validIndex) { char *s2 = strdup(s); s2[validIndex + 1] = 'b'; } // expected-warning {{Potential leak of memory pointed to by}} int testStrndup(const char *s, unsigned validIndex, unsigned size) { char *s2 = strndup(s, size); s2 [validIndex + 1] = 'b'; if (s2[validIndex] != 'a') return 0; else return 1;// expected-warning {{Potential leak of memory pointed to by}} } void testStrdupContentIsDefined(const char *s, unsigned validIndex) { char *s2 = strdup(s); char result = s2[1];// no warning free(s2); } // ---------------------------------------------------------------------------- // Test the system library functions to which the pointer can escape. // This tests false positive suppression. // For now, we assume memory passed to pthread_specific escapes. // TODO: We could check that if a new pthread binding is set, the existing // binding must be freed; otherwise, a memory leak can occur. void testPthereadSpecificEscape(pthread_key_t key) { void *buf = malloc(12); pthread_setspecific(key, buf); // no warning } // PR12101: Test funopen(). static int releasePtr(void *_ctx) { free(_ctx); return 0; } FILE *useFunOpen() { void *ctx = malloc(sizeof(int)); FILE *f = funopen(ctx, 0, 0, 0, releasePtr); // no warning if (f == 0) { free(ctx); } return f; } FILE *useFunOpenNoReleaseFunction() { void *ctx = malloc(sizeof(int)); FILE *f = funopen(ctx, 0, 0, 0, 0); if (f == 0) { free(ctx); } return f; // expected-warning{{leak}} } static int readNothing(void *_ctx, char *buf, int size) { return 0; } FILE *useFunOpenReadNoRelease() { void *ctx = malloc(sizeof(int)); FILE *f = funopen(ctx, readNothing, 0, 0, 0); if (f == 0) { free(ctx); } return f; // expected-warning{{leak}} } // Test setbuf, setvbuf. int my_main_no_warning() { char *p = malloc(100); setvbuf(stdout, p, 0, 100); return 0; } int my_main_no_warning2() { char *p = malloc(100); setbuf(__stdoutp, p); return 0; } int my_main_warn(FILE *f) { char *p = malloc(100); setvbuf(f, p, 0, 100); return 0;// expected-warning {{leak}} } // <rdar://problem/10978247>. // some people use stack allocated memory as an optimization to avoid // a heap allocation for small work sizes. This tests the analyzer's // understanding that the malloc'ed memory is not the same as stackBuffer. void radar10978247(int myValueSize) { char stackBuffer[128]; char *buffer; if (myValueSize <= sizeof(stackBuffer)) buffer = stackBuffer; else buffer = malloc(myValueSize); // do stuff with the buffer if (buffer != stackBuffer) free(buffer); } void radar10978247_positive(int myValueSize) { char stackBuffer[128]; char *buffer; if (myValueSize <= sizeof(stackBuffer)) buffer = stackBuffer; else buffer = malloc(myValueSize); // do stuff with the buffer if (buffer == stackBuffer) return; else return; // expected-warning {{leak}} } // <rdar://problem/11269741> Previously this triggered a false positive // because malloc() is known to return uninitialized memory and the binding // of 'o' to 'p->n' was not getting propertly handled. Now we report a leak. struct rdar11269741_a_t { struct rdar11269741_b_t { int m; } n; }; int rdar11269741(struct rdar11269741_b_t o) { struct rdar11269741_a_t *p = (struct rdar11269741_a_t *) malloc(sizeof(*p)); p->n = o; return p->n.m; // expected-warning {{leak}} } // Pointer arithmetic, returning an ElementRegion. void *radar11329382(unsigned bl) { void *ptr = malloc (16); ptr = ptr + (2 - bl); return ptr; // no warning } void __assert_rtn(const char *, const char *, int, const char *) __attribute__((__noreturn__)); int strcmp(const char *, const char *); char *a (void); void radar11270219(void) { char *x = a(), *y = a(); (__builtin_expect(!(x && y), 0) ? __assert_rtn(__func__, "/Users/zaks/tmp/ex.c", 24, "x && y") : (void)0); strcmp(x, y); // no warning } void radar_11358224_test_double_assign_ints_positive_2() { void *ptr = malloc(16); ptr = ptr; } // expected-warning {{leak}} // Assume that functions which take a function pointer can free memory even if // they are defined in system headers and take the const pointer to the // allocated memory. (radar://11160612) int const_ptr_and_callback(int, const char*, int n, void(*)(void*)); void r11160612_1() { char *x = malloc(12); const_ptr_and_callback(0, x, 12, free); // no - warning } // Null is passed as callback. void r11160612_2() { char *x = malloc(12); const_ptr_and_callback(0, x, 12, 0); } // expected-warning {{leak}} // Callback is passed to a function defined in a system header. void r11160612_4() { char *x = malloc(12); sqlite3_bind_text_my(0, x, 12, free); // no - warning } // Passing callbacks in a struct. void r11160612_5(StWithCallback St) { void *x = malloc(12); dealocateMemWhenDoneByVal(x, St); } void r11160612_6(StWithCallback St) { void *x = malloc(12); dealocateMemWhenDoneByRef(&St, x); } int mySub(int, int); int myAdd(int, int); int fPtr(unsigned cond, int x) { return (cond ? mySub : myAdd)(x, x); } // Test anti-aliasing. void dependsOnValueOfPtr(int *g, unsigned f) { int *p; if (f) { p = g; } else { p = malloc(12); } if (p != g) free(p); else return; // no warning return; } int CMPRegionHeapToStack() { int x = 0; int *x1 = malloc(8); int *x2 = &x; clang_analyzer_eval(x1 == x2); // expected-warning{{FALSE}} free(x1); return x; } int CMPRegionHeapToHeap2() { int x = 0; int *x1 = malloc(8); int *x2 = malloc(8); int *x4 = x1; int *x5 = x2; clang_analyzer_eval(x4 == x5); // expected-warning{{FALSE}} free(x1); free(x2); return x; } int CMPRegionHeapToHeap() { int x = 0; int *x1 = malloc(8); int *x4 = x1; if (x1 == x4) { free(x1); return 5/x; // expected-warning{{Division by zero}} } return x;// expected-warning{{This statement is never executed}} } int HeapAssignment() { int m = 0; int *x = malloc(4); int *y = x; *x = 5; clang_analyzer_eval(*x != *y); // expected-warning{{FALSE}} free(x); return 0; } int *retPtr(); int *retPtrMightAlias(int *x); int cmpHeapAllocationToUnknown() { int zero = 0; int *yBefore = retPtr(); int *m = malloc(8); int *yAfter = retPtrMightAlias(m); clang_analyzer_eval(yBefore == m); // expected-warning{{FALSE}} clang_analyzer_eval(yAfter == m); // expected-warning{{FALSE}} free(m); return 0; } void localArrayTest() { char *p = (char*)malloc(12); char *ArrayL[12]; ArrayL[0] = p; } // expected-warning {{leak}} void localStructTest() { StructWithPtr St; StructWithPtr *pSt = &St; pSt->memP = malloc(12); } // expected-warning{{Potential leak of memory pointed to by}} #ifdef __INTPTR_TYPE__ // Test double assignment through integers. typedef __INTPTR_TYPE__ intptr_t; typedef unsigned __INTPTR_TYPE__ uintptr_t; static intptr_t glob; void test_double_assign_ints() { void *ptr = malloc (16); // no-warning glob = (intptr_t)(uintptr_t)ptr; } void test_double_assign_ints_positive() { void *ptr = malloc(16); (void*)(intptr_t)(uintptr_t)ptr; // expected-warning {{unused}} } // expected-warning {{leak}} #endif void testCGContextNoLeak() { void *ptr = malloc(16); CGContextRef context = CGBitmapContextCreate(ptr); // Because you can get the data back out like this, even much later, // CGBitmapContextCreate is one of our "stop-tracking" exceptions. free(CGBitmapContextGetData(context)); } void testCGContextLeak() { void *ptr = malloc(16); CGContextRef context = CGBitmapContextCreate(ptr); // However, this time we're just leaking the data, because the context // object doesn't escape and it hasn't been freed in this function. } // Allow xpc context to escape. radar://11635258 // TODO: Would be great if we checked that the finalize_connection_context actually releases it. static void finalize_connection_context(void *ctx) { int *context = ctx; free(context); } void foo (xpc_connection_t peer) { int *ctx = calloc(1, sizeof(int)); xpc_connection_set_context(peer, ctx); xpc_connection_set_finalizer_f(peer, finalize_connection_context); xpc_connection_resume(peer); } // Make sure we catch errors when we free in a function which does not allocate memory. void freeButNoMalloc(int *p, int x){ if (x) { free(p); //user forgot a return here. } free(p); // expected-warning {{Attempt to free released memory}} } struct HasPtr { char *p; }; char* reallocButNoMalloc(struct HasPtr *a, int c, int size) { int *s; char *b = realloc(a->p, size); char *m = realloc(a->p, size); // expected-warning {{Attempt to free released memory}} return a->p; } // We should not warn in this case since the caller will presumably free a->p in all cases. int reallocButNoMallocPR13674(struct HasPtr *a, int c, int size) { int *s; char *b = realloc(a->p, size); if (b == 0) return -1; a->p = b; return 0; } // Test realloc with no visible malloc. void *test(void *ptr) { void *newPtr = realloc(ptr, 4); if (newPtr == 0) { if (ptr) free(ptr); // no-warning } return newPtr; } char *testLeakWithinReturn(char *str) { return strdup(strdup(str)); // expected-warning{{leak}} } void passConstPtr(const char * ptr); void testPassConstPointer() { char * string = malloc(sizeof(char)*10); passConstPtr(string); return; // expected-warning {{leak}} } void testPassConstPointerIndirectly() { char *p = malloc(1); p++; memcmp(p, p, sizeof(&p)); return; // expected-warning {{leak}} } void testPassConstPointerIndirectlyStruct() { struct HasPtr hp; hp.p = malloc(10); memcmp(&hp, &hp, sizeof(hp)); return; // expected-warning {{Potential leak of memory pointed to by 'hp.p'}} } void testPassToSystemHeaderFunctionIndirectlyStruct() { SomeStruct ss; ss.p = malloc(1); fakeSystemHeaderCall(&ss); // invalidates ss, making ss.p unreachable // Technically a false negative here -- we know the system function won't free // ss.p, but nothing else will either! } // no-warning void testPassToSystemHeaderFunctionIndirectlyStructFree() { SomeStruct ss; ss.p = malloc(1); fakeSystemHeaderCall(&ss); // invalidates ss, making ss.p unreachable free(ss.p); } // no-warning void testPassToSystemHeaderFunctionIndirectlyArray() { int *p[1]; p[0] = malloc(sizeof(int)); fakeSystemHeaderCallIntPtr(p); // invalidates p, making p[0] unreachable // Technically a false negative here -- we know the system function won't free // p[0], but nothing else will either! } // no-warning void testPassToSystemHeaderFunctionIndirectlyArrayFree() { int *p[1]; p[0] = malloc(sizeof(int)); fakeSystemHeaderCallIntPtr(p); // invalidates p, making p[0] unreachable free(p[0]); } // no-warning int *testOffsetAllocate(size_t size) { int *memoryBlock = (int *)malloc(size + sizeof(int)); return &memoryBlock[1]; // no-warning } void testOffsetDeallocate(int *memoryBlock) { free(&memoryBlock[-1]); // no-warning } void testOffsetOfRegionFreed() { __int64_t * array = malloc(sizeof(__int64_t)*2); array += 1; free(&array[0]); // expected-warning{{Argument to free() is offset by 8 bytes from the start of memory allocated by malloc()}} } void testOffsetOfRegionFreed2() { __int64_t *p = malloc(sizeof(__int64_t)*2); p += 1; free(p); // expected-warning{{Argument to free() is offset by 8 bytes from the start of memory allocated by malloc()}} } void testOffsetOfRegionFreed3() { char *r = malloc(sizeof(char)); r = r - 10; free(r); // expected-warning {{Argument to free() is offset by -10 bytes from the start of memory allocated by malloc()}} } void testOffsetOfRegionFreedAfterFunctionCall() { int *p = malloc(sizeof(int)*2); p += 1; myfoo(p); free(p); // expected-warning{{Argument to free() is offset by 4 bytes from the start of memory allocated by malloc()}} } void testFixManipulatedPointerBeforeFree() { int * array = malloc(sizeof(int)*2); array += 1; free(&array[-1]); // no-warning } void testFixManipulatedPointerBeforeFree2() { char *r = malloc(sizeof(char)); r = r + 10; free(r-10); // no-warning } void freeOffsetPointerPassedToFunction() { __int64_t *p = malloc(sizeof(__int64_t)*2); p[1] = 0; p += 1; myfooint(*p); // not passing the pointer, only a value pointed by pointer free(p); // expected-warning {{Argument to free() is offset by 8 bytes from the start of memory allocated by malloc()}} } int arbitraryInt(); void freeUnknownOffsetPointer() { char *r = malloc(sizeof(char)); r = r + arbitraryInt(); // unable to reason about what the offset might be free(r); // no-warning } void testFreeNonMallocPointerWithNoOffset() { char c; char *r = &c; r = r + 10; free(r-10); // expected-warning {{Argument to free() is the address of the local variable 'c', which is not memory allocated by malloc()}} } void testFreeNonMallocPointerWithOffset() { char c; char *r = &c; free(r+1); // expected-warning {{Argument to free() is the address of the local variable 'c', which is not memory allocated by malloc()}} } void testOffsetZeroDoubleFree() { int *array = malloc(sizeof(int)*2); int *p = &array[0]; free(p); free(&array[0]); // expected-warning{{Attempt to free released memory}} } void testOffsetPassedToStrlen() { char * string = malloc(sizeof(char)*10); string += 1; int length = strlen(string); // expected-warning {{Potential leak of memory pointed to by 'string'}} } void testOffsetPassedToStrlenThenFree() { char * string = malloc(sizeof(char)*10); string += 1; int length = strlen(string); free(string); // expected-warning {{Argument to free() is offset by 1 byte from the start of memory allocated by malloc()}} } void testOffsetPassedAsConst() { char * string = malloc(sizeof(char)*10); string += 1; passConstPtr(string); free(string); // expected-warning {{Argument to free() is offset by 1 byte from the start of memory allocated by malloc()}} } char **_vectorSegments; int _nVectorSegments; void poolFreeC(void* s) { free(s); // no-warning } void freeMemory() { while (_nVectorSegments) { poolFreeC(_vectorSegments[_nVectorSegments++]); } } // PR16730 void testReallocEscaped(void **memory) { *memory = malloc(47); char *new_memory = realloc(*memory, 47); if (new_memory != 0) { *memory = new_memory; } } // PR16558 void *smallocNoWarn(size_t size) { if (size == 0) { return malloc(1); // this branch is never called } else { return malloc(size); } } char *dupstrNoWarn(const char *s) { const int len = strlen(s); char *p = (char*) smallocNoWarn(len + 1); strcpy(p, s); // no-warning return p; } void *smallocWarn(size_t size) { if (size == 2) { return malloc(1); } else { return malloc(size); } } char *dupstrWarn(const char *s) { const int len = strlen(s); char *p = (char*) smallocWarn(len + 1); strcpy(p, s); // expected-warning{{String copy function overflows destination buffer}} return p; } int *radar15580979() { int *data = (int *)malloc(32); int *p = data ?: (int*)malloc(32); // no warning return p; } // ---------------------------------------------------------------------------- // False negatives. void testMallocWithParam(int **p) { *p = (int*) malloc(sizeof(int)); *p = 0; // FIXME: should warn here } void testMallocWithParam_2(int **p) { *p = (int*) malloc(sizeof(int)); // no-warning } void testPassToSystemHeaderFunctionIndirectly() { int *p = malloc(4); p++; fakeSystemHeaderCallInt(p); // FIXME: This is a leak: if we think a system function won't free p, it // won't free (p-1) either. }