aboutsummaryrefslogtreecommitdiff
path: root/clang/lib/StaticAnalyzer
diff options
context:
space:
mode:
authorArseniy Zaostrovnykh <necto.ne@gmail.com>2025-06-17 10:31:38 +0200
committerGitHub <noreply@github.com>2025-06-17 10:31:38 +0200
commite2551c14d0d9180ccaef9d33c524d83e7813a361 (patch)
treee3c8e2f2676d3921919b6f78a26aeeff5575125c /clang/lib/StaticAnalyzer
parent85b110e0419af4b1b9a238b6978029e20010e794 (diff)
downloadllvm-e2551c14d0d9180ccaef9d33c524d83e7813a361.zip
llvm-e2551c14d0d9180ccaef9d33c524d83e7813a361.tar.gz
llvm-e2551c14d0d9180ccaef9d33c524d83e7813a361.tar.bz2
[analyzer] Fix a false memory leak reports involving placement new (#144341)
Placement new does not allocate memory, so it should not be reported as a memory leak. A recent MallocChecker refactor changed inlining of placement-new calls with manual evaluation by MallocChecker. https://github.com/llvm/llvm-project/commit/339282d49f5310a2837da45c0ccc19da15675554 This change avoids marking the value returned by placement new as allocated and hence avoids the false leak reports. Note that the there are two syntaxes to invoke placement new: `new (p) int` and an explicit operator call `operator new(sizeof(int), p)`. The first syntax was already properly handled by the engine. This change corrects handling of the second syntax. CPP-6375
Diffstat (limited to 'clang/lib/StaticAnalyzer')
-rw-r--r--clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp22
1 files changed, 22 insertions, 0 deletions
diff --git a/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp
index fef3350..35e98a5 100644
--- a/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp
+++ b/clang/lib/StaticAnalyzer/Checkers/MallocChecker.cpp
@@ -1371,6 +1371,20 @@ void MallocChecker::checkIfFreeNameIndex(ProgramStateRef State,
C.addTransition(State);
}
+const Expr *getPlacementNewBufferArg(const CallExpr *CE,
+ const FunctionDecl *FD) {
+ // Checking for signature:
+ // void* operator new ( std::size_t count, void* ptr );
+ // void* operator new[]( std::size_t count, void* ptr );
+ if (CE->getNumArgs() != 2 || (FD->getOverloadedOperator() != OO_New &&
+ FD->getOverloadedOperator() != OO_Array_New))
+ return nullptr;
+ auto BuffType = FD->getParamDecl(1)->getType();
+ if (BuffType.isNull() || !BuffType->isVoidPointerType())
+ return nullptr;
+ return CE->getArg(1);
+}
+
void MallocChecker::checkCXXNewOrCXXDelete(ProgramStateRef State,
const CallEvent &Call,
CheckerContext &C) const {
@@ -1386,6 +1400,14 @@ void MallocChecker::checkCXXNewOrCXXDelete(ProgramStateRef State,
// processed by the checkPostStmt callbacks for CXXNewExpr and
// CXXDeleteExpr.
const FunctionDecl *FD = C.getCalleeDecl(CE);
+ if (const auto *BufArg = getPlacementNewBufferArg(CE, FD)) {
+ // Placement new does not allocate memory
+ auto RetVal = State->getSVal(BufArg, Call.getLocationContext());
+ State = State->BindExpr(CE, C.getLocationContext(), RetVal);
+ C.addTransition(State);
+ return;
+ }
+
switch (FD->getOverloadedOperator()) {
case OO_New:
State = MallocMemAux(C, Call, CE->getArg(0), UndefinedVal(), State,