| 1 | // RUN: %clang_analyze_cc1 -w -analyzer-checker=core,alpha.deadcode.UnreachableCode,alpha.core.CastSize,unix.Malloc,cplusplus.NewDelete -analyzer-store=region -verify %s |
| 2 | // RUN: %clang_analyze_cc1 -triple i386-unknown-linux-gnu -w -analyzer-checker=core,alpha.deadcode.UnreachableCode,alpha.core.CastSize,unix.Malloc,cplusplus.NewDelete -analyzer-store=region -verify %s |
| 3 | // RUN: %clang_analyze_cc1 -w -analyzer-checker=core,alpha.deadcode.UnreachableCode,alpha.core.CastSize,unix.Malloc,cplusplus.NewDelete -analyzer-store=region -DTEST_INLINABLE_ALLOCATORS -verify %s |
| 4 | // RUN: %clang_analyze_cc1 -triple i386-unknown-linux-gnu -w -analyzer-checker=core,alpha.deadcode.UnreachableCode,alpha.core.CastSize,unix.Malloc,cplusplus.NewDelete -analyzer-store=region -DTEST_INLINABLE_ALLOCATORS -verify %s |
| 5 | |
| 6 | #include "Inputs/system-header-simulator-cxx.h" |
| 7 | |
| 8 | typedef __typeof(sizeof(int)) size_t; |
| 9 | void *malloc(size_t); |
| 10 | void free(void *); |
| 11 | void *realloc(void *ptr, size_t size); |
| 12 | void *calloc(size_t nmemb, size_t size); |
| 13 | char *strdup(const char *s); |
| 14 | |
| 15 | void checkThatMallocCheckerIsRunning() { |
| 16 | malloc(4); |
| 17 | } // expected-warning{{leak}} |
| 18 | |
| 19 | // Test for radar://11110132. |
| 20 | struct Foo { |
| 21 | mutable void* m_data; |
| 22 | Foo(void* data) : m_data(data) {} |
| 23 | }; |
| 24 | Foo aFunction() { |
| 25 | return malloc(10); |
| 26 | } |
| 27 | |
| 28 | // Assume that functions which take a function pointer can free memory even if |
| 29 | // they are defined in system headers and take the const pointer to the |
| 30 | // allocated memory. (radar://11160612) |
| 31 | // Test default parameter. |
| 32 | int const_ptr_and_callback_def_param(int, const char*, int n, void(*)(void*) = free); |
| 33 | void r11160612_3() { |
| 34 | char *x = (char*)malloc(12); |
| 35 | const_ptr_and_callback_def_param(0, x, 12); |
| 36 | } |
| 37 | |
| 38 | int const_ptr_and_callback_def_param_null(int, const char*, int n, void(*)(void*) = 0); |
| 39 | void r11160612_no_callback() { |
| 40 | char *x = (char*)malloc(12); |
| 41 | const_ptr_and_callback_def_param_null(0, x, 12); |
| 42 | } // expected-warning{{leak}} |
| 43 | |
| 44 | // Test member function pointer. |
| 45 | struct CanFreeMemory { |
| 46 | static void myFree(void*); |
| 47 | }; |
| 48 | //This is handled because we look at the type of the parameter(not argument). |
| 49 | void r11160612_3(CanFreeMemory* p) { |
| 50 | char *x = (char*)malloc(12); |
| 51 | const_ptr_and_callback_def_param(0, x, 12, p->myFree); |
| 52 | } |
| 53 | |
| 54 | |
| 55 | namespace PR13751 { |
| 56 | class OwningVector { |
| 57 | void **storage; |
| 58 | size_t length; |
| 59 | public: |
| 60 | OwningVector(); |
| 61 | ~OwningVector(); |
| 62 | void push_back(void *Item) { |
| 63 | storage[length++] = Item; |
| 64 | } |
| 65 | }; |
| 66 | |
| 67 | void testDestructors() { |
| 68 | OwningVector v; |
| 69 | v.push_back(malloc(4)); |
| 70 | // no leak warning; freed in destructor |
| 71 | } |
| 72 | } |
| 73 | |
| 74 | struct X { void *a; }; |
| 75 | |
| 76 | struct X get() { |
| 77 | struct X result; |
| 78 | result.a = malloc(4); |
| 79 | return result; // no-warning |
| 80 | } |
| 81 | |
| 82 | // Ensure that regions accessible through a LazyCompoundVal trigger region escape. |
| 83 | // Malloc checker used to report leaks for the following two test cases. |
| 84 | struct Property { |
| 85 | char* getterName; |
| 86 | Property(char* n) |
| 87 | : getterName(n) {} |
| 88 | |
| 89 | }; |
| 90 | void append(Property x); |
| 91 | |
| 92 | void appendWrapper(char *getterName) { |
| 93 | append(Property(getterName)); |
| 94 | } |
| 95 | void foo(const char* name) { |
| 96 | char* getterName = strdup(name); |
| 97 | appendWrapper(getterName); // no-warning |
| 98 | } |
| 99 | |
| 100 | struct NestedProperty { |
| 101 | Property prop; |
| 102 | NestedProperty(Property p) |
| 103 | : prop(p) {} |
| 104 | }; |
| 105 | void appendNested(NestedProperty x); |
| 106 | |
| 107 | void appendWrapperNested(char *getterName) { |
| 108 | appendNested(NestedProperty(Property(getterName))); |
| 109 | } |
| 110 | void fooNested(const char* name) { |
| 111 | char* getterName = strdup(name); |
| 112 | appendWrapperNested(getterName); // no-warning |
| 113 | } |
| 114 | |
| 115 | namespace PR31226 { |
| 116 | struct b2 { |
| 117 | int f; |
| 118 | }; |
| 119 | |
| 120 | struct b1 : virtual b2 { |
| 121 | void m(); |
| 122 | }; |
| 123 | |
| 124 | struct d : b1, b2 { |
| 125 | }; |
| 126 | |
| 127 | void f() { |
| 128 | d *p = new d(); |
| 129 | p->m(); // no-crash // no-warning |
| 130 | } |
| 131 | } |
| 132 | |
| 133 | // Allow __cxa_demangle to escape. |
| 134 | char* test_cxa_demangle(const char* sym) { |
| 135 | size_t funcnamesize = 256; |
| 136 | char* funcname = (char*)malloc(funcnamesize); |
| 137 | int status; |
| 138 | char* ret = abi::__cxa_demangle(sym, funcname, &funcnamesize, &status); |
| 139 | if (status == 0) { |
| 140 | funcname = ret; |
| 141 | } |
| 142 | return funcname; // no-warning |
| 143 | } |
| 144 | |