forked from OSchip/llvm-project
372 lines
9.0 KiB
C++
372 lines
9.0 KiB
C++
// RUN: %clang_analyze_cc1 -analyzer-checker=core,unix.Malloc,debug.ExprInspection -analyzer-store region -std=c++11 -verify %s
|
|
// RUN: %clang_analyze_cc1 -analyzer-checker=core,unix.Malloc,debug.ExprInspection -analyzer-store region -std=c++11 -DTEST_INLINABLE_ALLOCATORS -verify %s
|
|
#include "Inputs/system-header-simulator-cxx.h"
|
|
|
|
void clang_analyzer_eval(bool);
|
|
|
|
typedef __typeof__(sizeof(int)) size_t;
|
|
extern "C" void *malloc(size_t);
|
|
extern "C" void free(void *);
|
|
|
|
int someGlobal;
|
|
|
|
class SomeClass {
|
|
public:
|
|
void f(int *p);
|
|
};
|
|
|
|
void testImplicitlyDeclaredGlobalNew() {
|
|
if (someGlobal != 0)
|
|
return;
|
|
|
|
// This used to crash because the global operator new is being implicitly
|
|
// declared and it does not have a valid source location. (PR13090)
|
|
void *x = ::operator new(0);
|
|
::operator delete(x);
|
|
|
|
// Check that the new/delete did not invalidate someGlobal;
|
|
clang_analyzer_eval(someGlobal == 0); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
void *testPlacementNew() {
|
|
int *x = (int *)malloc(sizeof(int));
|
|
*x = 1;
|
|
clang_analyzer_eval(*x == 1); // expected-warning{{TRUE}};
|
|
|
|
void *y = new (x) int;
|
|
clang_analyzer_eval(x == y); // expected-warning{{TRUE}};
|
|
clang_analyzer_eval(*x == 1); // expected-warning{{TRUE}};
|
|
|
|
return y;
|
|
}
|
|
|
|
void *operator new(size_t, size_t, int *);
|
|
void *testCustomNew() {
|
|
int x[1] = {1};
|
|
clang_analyzer_eval(*x == 1); // expected-warning{{TRUE}};
|
|
|
|
void *y = new (0, x) int;
|
|
clang_analyzer_eval(*x == 1); // expected-warning{{UNKNOWN}};
|
|
|
|
return y; // no-warning
|
|
}
|
|
|
|
void *operator new(size_t, void *, void *);
|
|
void *testCustomNewMalloc() {
|
|
int *x = (int *)malloc(sizeof(int));
|
|
|
|
// Should be no-warning (the custom allocator could have freed x).
|
|
void *y = new (0, x) int; // no-warning
|
|
|
|
return y;
|
|
}
|
|
|
|
void testScalarInitialization() {
|
|
int *n = new int(3);
|
|
clang_analyzer_eval(*n == 3); // expected-warning{{TRUE}}
|
|
|
|
new (n) int();
|
|
clang_analyzer_eval(*n == 0); // expected-warning{{TRUE}}
|
|
|
|
new (n) int{3};
|
|
clang_analyzer_eval(*n == 3); // expected-warning{{TRUE}}
|
|
|
|
new (n) int{};
|
|
clang_analyzer_eval(*n == 0); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
struct PtrWrapper {
|
|
int *x;
|
|
|
|
PtrWrapper(int *input) : x(input) {}
|
|
};
|
|
|
|
PtrWrapper *testNewInvalidation() {
|
|
// Ensure that we don't consider this a leak.
|
|
return new PtrWrapper(static_cast<int *>(malloc(4))); // no-warning
|
|
}
|
|
|
|
void testNewInvalidationPlacement(PtrWrapper *w) {
|
|
// Ensure that we don't consider this a leak.
|
|
new (w) PtrWrapper(static_cast<int *>(malloc(4))); // no-warning
|
|
}
|
|
|
|
int **testNewInvalidationScalar() {
|
|
// Ensure that we don't consider this a leak.
|
|
return new (int *)(static_cast<int *>(malloc(4))); // no-warning
|
|
}
|
|
|
|
void testNewInvalidationScalarPlacement(int **p) {
|
|
// Ensure that we don't consider this a leak.
|
|
new (p) (int *)(static_cast<int *>(malloc(4))); // no-warning
|
|
}
|
|
|
|
void testCacheOut(PtrWrapper w) {
|
|
extern bool coin();
|
|
if (coin())
|
|
w.x = 0;
|
|
new (&w.x) (int*)(0); // we cache out here; don't crash
|
|
}
|
|
|
|
void testUseAfter(int *p) {
|
|
SomeClass *c = new SomeClass;
|
|
free(p);
|
|
c->f(p); // expected-warning{{Use of memory after it is freed}}
|
|
delete c;
|
|
}
|
|
|
|
//--------------------------------------------------------------------
|
|
// Check for intersection with other checkers from MallocChecker.cpp
|
|
// bounded with unix.Malloc
|
|
//--------------------------------------------------------------------
|
|
|
|
// new/delete oparators are subjects of cplusplus.NewDelete.
|
|
void testNewDeleteNoWarn() {
|
|
int i;
|
|
delete &i; // no-warning
|
|
|
|
int *p1 = new int;
|
|
delete ++p1; // no-warning
|
|
|
|
int *p2 = new int;
|
|
delete p2;
|
|
delete p2; // no-warning
|
|
|
|
int *p3 = new int; // no-warning
|
|
}
|
|
|
|
// unix.Malloc does not know about operators new/delete.
|
|
void testDeleteMallocked() {
|
|
int *x = (int *)malloc(sizeof(int));
|
|
delete x; // FIXME: Should detect pointer escape and keep silent after 'delete' is modeled properly.
|
|
} // expected-warning{{Potential leak of memory pointed to by 'x'}}
|
|
|
|
void testDeleteOpAfterFree() {
|
|
int *p = (int *)malloc(sizeof(int));
|
|
free(p);
|
|
operator delete(p); // expected-warning{{Use of memory after it is freed}}
|
|
}
|
|
|
|
void testDeleteAfterFree() {
|
|
int *p = (int *)malloc(sizeof(int));
|
|
free(p);
|
|
delete p; // expected-warning{{Use of memory after it is freed}}
|
|
}
|
|
|
|
void testStandardPlacementNewAfterFree() {
|
|
int *p = (int *)malloc(sizeof(int));
|
|
free(p);
|
|
p = new(p) int; // expected-warning{{Use of memory after it is freed}}
|
|
}
|
|
|
|
void testCustomPlacementNewAfterFree() {
|
|
int *p = (int *)malloc(sizeof(int));
|
|
free(p);
|
|
p = new(0, p) int; // expected-warning{{Use of memory after it is freed}}
|
|
}
|
|
|
|
void testUsingThisAfterDelete() {
|
|
SomeClass *c = new SomeClass;
|
|
delete c;
|
|
c->f(0); // no-warning
|
|
}
|
|
|
|
void testAggregateNew() {
|
|
struct Point { int x, y; };
|
|
new Point{1, 2}; // no crash
|
|
|
|
Point p;
|
|
new (&p) Point{1, 2}; // no crash
|
|
clang_analyzer_eval(p.x == 1); // expected-warning{{TRUE}}
|
|
clang_analyzer_eval(p.y == 2); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
//--------------------------------
|
|
// Incorrectly-modelled behavior
|
|
//--------------------------------
|
|
|
|
int testNoInitialization() {
|
|
int *n = new int;
|
|
|
|
// Should warn that *n is uninitialized.
|
|
if (*n) { // no-warning
|
|
delete n;
|
|
return 0;
|
|
}
|
|
delete n;
|
|
return 1;
|
|
}
|
|
|
|
int testNoInitializationPlacement() {
|
|
int n;
|
|
new (&n) int;
|
|
|
|
if (n) { // expected-warning{{Branch condition evaluates to a garbage value}}
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
// Test modelling destructor call on call to delete
|
|
class IntPair{
|
|
public:
|
|
int x;
|
|
int y;
|
|
IntPair() {};
|
|
~IntPair() {x = x/y;}; //expected-warning {{Division by zero}}
|
|
};
|
|
|
|
void testCallToDestructor() {
|
|
IntPair *b = new IntPair();
|
|
b->x = 1;
|
|
b->y = 0;
|
|
delete b; // This results in divide by zero in destructor
|
|
}
|
|
|
|
// Test Deleting a value that's passed as an argument.
|
|
class DerefClass{
|
|
public:
|
|
int *x;
|
|
DerefClass() {};
|
|
~DerefClass() {*x = 1;}; //expected-warning {{Dereference of null pointer (loaded from field 'x')}}
|
|
};
|
|
|
|
void testDestCall(DerefClass *arg) {
|
|
delete arg;
|
|
}
|
|
|
|
void test_delete_dtor_Arg() {
|
|
DerefClass *pair = new DerefClass();
|
|
pair->x = 0;
|
|
testDestCall(pair);
|
|
}
|
|
|
|
//Deleting the address of a local variable, null pointer
|
|
void abort(void) __attribute__((noreturn));
|
|
|
|
class NoReturnDtor {
|
|
public:
|
|
NoReturnDtor() {}
|
|
~NoReturnDtor() {abort();}
|
|
};
|
|
|
|
void test_delete_dtor_LocalVar() {
|
|
NoReturnDtor test;
|
|
delete &test; // no warn or crash
|
|
}
|
|
|
|
class DerivedNoReturn:public NoReturnDtor {
|
|
public:
|
|
DerivedNoReturn() {};
|
|
~DerivedNoReturn() {};
|
|
};
|
|
|
|
void testNullDtorDerived() {
|
|
DerivedNoReturn *p = new DerivedNoReturn();
|
|
delete p; // Calls the base destructor which aborts, checked below
|
|
clang_analyzer_eval(true); // no warn
|
|
}
|
|
|
|
//Deleting a non-class pointer should not crash/warn
|
|
void test_var_delete() {
|
|
int *v = new int;
|
|
delete v; // no crash/warn
|
|
clang_analyzer_eval(true); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
void test_array_delete() {
|
|
class C {
|
|
public:
|
|
~C() {}
|
|
};
|
|
|
|
auto c1 = new C[2][3];
|
|
delete[] c1; // no-crash // no-warning
|
|
|
|
C c2[4];
|
|
// FIXME: Should warn.
|
|
delete[] &c2; // no-crash
|
|
|
|
C c3[7][6];
|
|
// FIXME: Should warn.
|
|
delete[] &c3; // no-crash
|
|
}
|
|
|
|
void testDeleteNull() {
|
|
NoReturnDtor *foo = 0;
|
|
delete foo; // should not call destructor, checked below
|
|
clang_analyzer_eval(true); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
void testNullAssigneddtor() {
|
|
NoReturnDtor *p = 0;
|
|
NoReturnDtor *s = p;
|
|
delete s; // should not call destructor, checked below
|
|
clang_analyzer_eval(true); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
void deleteArg(NoReturnDtor *test) {
|
|
delete test;
|
|
}
|
|
|
|
void testNulldtorArg() {
|
|
NoReturnDtor *p = 0;
|
|
deleteArg(p);
|
|
clang_analyzer_eval(true); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
void testDeleteUnknown(NoReturnDtor *foo) {
|
|
delete foo; // should assume non-null and call noreturn destructor
|
|
clang_analyzer_eval(true); // no-warning
|
|
}
|
|
|
|
void testArrayNull() {
|
|
NoReturnDtor *fooArray = 0;
|
|
delete[] fooArray; // should not call destructor, checked below
|
|
clang_analyzer_eval(true); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
void testArrayDestr() {
|
|
NoReturnDtor *p = new NoReturnDtor[2];
|
|
delete[] p; // Calls the base destructor which aborts, checked below
|
|
//TODO: clang_analyzer_eval should not be called
|
|
clang_analyzer_eval(true); // expected-warning{{TRUE}}
|
|
}
|
|
|
|
// Invalidate Region even in case of default destructor
|
|
class InvalidateDestTest {
|
|
public:
|
|
int x;
|
|
int *y;
|
|
~InvalidateDestTest();
|
|
};
|
|
|
|
int test_member_invalidation() {
|
|
|
|
//test invalidation of member variable
|
|
InvalidateDestTest *test = new InvalidateDestTest();
|
|
test->x = 5;
|
|
int *k = &(test->x);
|
|
clang_analyzer_eval(*k == 5); // expected-warning{{TRUE}}
|
|
delete test;
|
|
clang_analyzer_eval(*k == 5); // expected-warning{{UNKNOWN}}
|
|
|
|
//test invalidation of member pointer
|
|
int localVar = 5;
|
|
test = new InvalidateDestTest();
|
|
test->y = &localVar;
|
|
delete test;
|
|
clang_analyzer_eval(localVar == 5); // expected-warning{{UNKNOWN}}
|
|
|
|
// Test aray elements are invalidated.
|
|
int Var1 = 5;
|
|
int Var2 = 5;
|
|
InvalidateDestTest *a = new InvalidateDestTest[2];
|
|
a[0].y = &Var1;
|
|
a[1].y = &Var2;
|
|
delete[] a;
|
|
clang_analyzer_eval(Var1 == 5); // expected-warning{{UNKNOWN}}
|
|
clang_analyzer_eval(Var2 == 5); // expected-warning{{UNKNOWN}}
|
|
return 0;
|
|
}
|