diff options
author | David Malcolm <dmalcolm@redhat.com> | 2019-09-27 09:23:16 -0400 |
---|---|---|
committer | David Malcolm <dmalcolm@redhat.com> | 2020-01-14 15:34:24 -0500 |
commit | 757bf1dff5e8cee34c0a75d06140ca972bfecfa7 (patch) | |
tree | cca8a96a39f87c90df46a389d1777854f97017d3 /gcc/testsuite/gcc.dg/analyzer/malloc-1.c | |
parent | 08c8c973c082457a7d6192673e87475f1fdfdbef (diff) | |
download | gcc-757bf1dff5e8cee34c0a75d06140ca972bfecfa7.zip gcc-757bf1dff5e8cee34c0a75d06140ca972bfecfa7.tar.gz gcc-757bf1dff5e8cee34c0a75d06140ca972bfecfa7.tar.bz2 |
Initial commit of analyzer
This patch adds a static analysis pass to the middle-end, focusing
for this release on C code, and malloc/free issues in particular.
See:
https://gcc.gnu.org/wiki/DavidMalcolm/StaticAnalyzer
gcc/ChangeLog:
* Makefile.in (lang_opt_files): Add analyzer.opt.
(ANALYZER_OBJS): New.
(OBJS): Add digraph.o, graphviz.o, ordered-hash-map-tests.o,
tristate.o and ANALYZER_OBJS.
(TEXI_GCCINT_FILES): Add analyzer.texi.
* common.opt (-fanalyzer): New driver option.
* config.in: Regenerate.
* configure: Regenerate.
* configure.ac (--disable-analyzer, ENABLE_ANALYZER): New option.
(gccdepdir): Also create depdir for "analyzer" subdir.
* digraph.cc: New file.
* digraph.h: New file.
* doc/analyzer.texi: New file.
* doc/gccint.texi ("Static Analyzer") New menu item.
(analyzer.texi): Include it.
* doc/invoke.texi ("Static Analyzer Options"): New list and new section.
("Warning Options"): Add static analysis warnings to the list.
(-Wno-analyzer-double-fclose): New option.
(-Wno-analyzer-double-free): New option.
(-Wno-analyzer-exposure-through-output-file): New option.
(-Wno-analyzer-file-leak): New option.
(-Wno-analyzer-free-of-non-heap): New option.
(-Wno-analyzer-malloc-leak): New option.
(-Wno-analyzer-possible-null-argument): New option.
(-Wno-analyzer-possible-null-dereference): New option.
(-Wno-analyzer-null-argument): New option.
(-Wno-analyzer-null-dereference): New option.
(-Wno-analyzer-stale-setjmp-buffer): New option.
(-Wno-analyzer-tainted-array-index): New option.
(-Wno-analyzer-use-after-free): New option.
(-Wno-analyzer-use-of-pointer-in-stale-stack-frame): New option.
(-Wno-analyzer-use-of-uninitialized-value): New option.
(-Wanalyzer-too-complex): New option.
(-fanalyzer-call-summaries): New warning.
(-fanalyzer-checker=): New warning.
(-fanalyzer-fine-grained): New warning.
(-fno-analyzer-state-merge): New warning.
(-fno-analyzer-state-purge): New warning.
(-fanalyzer-transitivity): New warning.
(-fanalyzer-verbose-edges): New warning.
(-fanalyzer-verbose-state-changes): New warning.
(-fanalyzer-verbosity=): New warning.
(-fdump-analyzer): New warning.
(-fdump-analyzer-callgraph): New warning.
(-fdump-analyzer-exploded-graph): New warning.
(-fdump-analyzer-exploded-nodes): New warning.
(-fdump-analyzer-exploded-nodes-2): New warning.
(-fdump-analyzer-exploded-nodes-3): New warning.
(-fdump-analyzer-supergraph): New warning.
* doc/sourcebuild.texi (dg-require-dot): New.
(dg-check-dot): New.
* gdbinit.in (break-on-saved-diagnostic): New command.
* graphviz.cc: New file.
* graphviz.h: New file.
* ordered-hash-map-tests.cc: New file.
* ordered-hash-map.h: New file.
* passes.def (pass_analyzer): Add before
pass_ipa_whole_program_visibility.
* selftest-run-tests.c (selftest::run_tests): Call
selftest::ordered_hash_map_tests_cc_tests.
* selftest.h (selftest::ordered_hash_map_tests_cc_tests): New
decl.
* shortest-paths.h: New file.
* timevar.def (TV_ANALYZER): New timevar.
(TV_ANALYZER_SUPERGRAPH): Likewise.
(TV_ANALYZER_STATE_PURGE): Likewise.
(TV_ANALYZER_PLAN): Likewise.
(TV_ANALYZER_SCC): Likewise.
(TV_ANALYZER_WORKLIST): Likewise.
(TV_ANALYZER_DUMP): Likewise.
(TV_ANALYZER_DIAGNOSTICS): Likewise.
(TV_ANALYZER_SHORTEST_PATHS): Likewise.
* tree-pass.h (make_pass_analyzer): New decl.
* tristate.cc: New file.
* tristate.h: New file.
gcc/analyzer/ChangeLog:
* ChangeLog: New file.
* analyzer-selftests.cc: New file.
* analyzer-selftests.h: New file.
* analyzer.opt: New file.
* analysis-plan.cc: New file.
* analysis-plan.h: New file.
* analyzer-logging.cc: New file.
* analyzer-logging.h: New file.
* analyzer-pass.cc: New file.
* analyzer.cc: New file.
* analyzer.h: New file.
* call-string.cc: New file.
* call-string.h: New file.
* checker-path.cc: New file.
* checker-path.h: New file.
* constraint-manager.cc: New file.
* constraint-manager.h: New file.
* diagnostic-manager.cc: New file.
* diagnostic-manager.h: New file.
* engine.cc: New file.
* engine.h: New file.
* exploded-graph.h: New file.
* pending-diagnostic.cc: New file.
* pending-diagnostic.h: New file.
* program-point.cc: New file.
* program-point.h: New file.
* program-state.cc: New file.
* program-state.h: New file.
* region-model.cc: New file.
* region-model.h: New file.
* sm-file.cc: New file.
* sm-malloc.cc: New file.
* sm-malloc.dot: New file.
* sm-pattern-test.cc: New file.
* sm-sensitive.cc: New file.
* sm-signal.cc: New file.
* sm-taint.cc: New file.
* sm.cc: New file.
* sm.h: New file.
* state-purge.cc: New file.
* state-purge.h: New file.
* supergraph.cc: New file.
* supergraph.h: New file.
gcc/testsuite/ChangeLog:
* gcc.dg/analyzer/CVE-2005-1689-minimal.c: New test.
* gcc.dg/analyzer/abort.c: New test.
* gcc.dg/analyzer/alloca-leak.c: New test.
* gcc.dg/analyzer/analyzer-decls.h: New header.
* gcc.dg/analyzer/analyzer-verbosity-0.c: New test.
* gcc.dg/analyzer/analyzer-verbosity-1.c: New test.
* gcc.dg/analyzer/analyzer-verbosity-2.c: New test.
* gcc.dg/analyzer/analyzer.exp: New suite.
* gcc.dg/analyzer/attribute-nonnull.c: New test.
* gcc.dg/analyzer/call-summaries-1.c: New test.
* gcc.dg/analyzer/conditionals-2.c: New test.
* gcc.dg/analyzer/conditionals-3.c: New test.
* gcc.dg/analyzer/conditionals-notrans.c: New test.
* gcc.dg/analyzer/conditionals-trans.c: New test.
* gcc.dg/analyzer/data-model-1.c: New test.
* gcc.dg/analyzer/data-model-2.c: New test.
* gcc.dg/analyzer/data-model-3.c: New test.
* gcc.dg/analyzer/data-model-4.c: New test.
* gcc.dg/analyzer/data-model-5.c: New test.
* gcc.dg/analyzer/data-model-5b.c: New test.
* gcc.dg/analyzer/data-model-5c.c: New test.
* gcc.dg/analyzer/data-model-5d.c: New test.
* gcc.dg/analyzer/data-model-6.c: New test.
* gcc.dg/analyzer/data-model-7.c: New test.
* gcc.dg/analyzer/data-model-8.c: New test.
* gcc.dg/analyzer/data-model-9.c: New test.
* gcc.dg/analyzer/data-model-11.c: New test.
* gcc.dg/analyzer/data-model-12.c: New test.
* gcc.dg/analyzer/data-model-13.c: New test.
* gcc.dg/analyzer/data-model-14.c: New test.
* gcc.dg/analyzer/data-model-15.c: New test.
* gcc.dg/analyzer/data-model-16.c: New test.
* gcc.dg/analyzer/data-model-17.c: New test.
* gcc.dg/analyzer/data-model-18.c: New test.
* gcc.dg/analyzer/data-model-19.c: New test.
* gcc.dg/analyzer/data-model-path-1.c: New test.
* gcc.dg/analyzer/disabling.c: New test.
* gcc.dg/analyzer/dot-output.c: New test.
* gcc.dg/analyzer/double-free-lto-1-a.c: New test.
* gcc.dg/analyzer/double-free-lto-1-b.c: New test.
* gcc.dg/analyzer/double-free-lto-1.h: New header.
* gcc.dg/analyzer/equivalence.c: New test.
* gcc.dg/analyzer/explode-1.c: New test.
* gcc.dg/analyzer/explode-2.c: New test.
* gcc.dg/analyzer/factorial.c: New test.
* gcc.dg/analyzer/fibonacci.c: New test.
* gcc.dg/analyzer/fields.c: New test.
* gcc.dg/analyzer/file-1.c: New test.
* gcc.dg/analyzer/file-2.c: New test.
* gcc.dg/analyzer/function-ptr-1.c: New test.
* gcc.dg/analyzer/function-ptr-2.c: New test.
* gcc.dg/analyzer/function-ptr-3.c: New test.
* gcc.dg/analyzer/gzio-2.c: New test.
* gcc.dg/analyzer/gzio-3.c: New test.
* gcc.dg/analyzer/gzio-3a.c: New test.
* gcc.dg/analyzer/gzio.c: New test.
* gcc.dg/analyzer/infinite-recursion.c: New test.
* gcc.dg/analyzer/loop-2.c: New test.
* gcc.dg/analyzer/loop-2a.c: New test.
* gcc.dg/analyzer/loop-3.c: New test.
* gcc.dg/analyzer/loop-4.c: New test.
* gcc.dg/analyzer/loop.c: New test.
* gcc.dg/analyzer/malloc-1.c: New test.
* gcc.dg/analyzer/malloc-2.c: New test.
* gcc.dg/analyzer/malloc-3.c: New test.
* gcc.dg/analyzer/malloc-callbacks.c: New test.
* gcc.dg/analyzer/malloc-dce.c: New test.
* gcc.dg/analyzer/malloc-dedupe-1.c: New test.
* gcc.dg/analyzer/malloc-ipa-1.c: New test.
* gcc.dg/analyzer/malloc-ipa-10.c: New test.
* gcc.dg/analyzer/malloc-ipa-11.c: New test.
* gcc.dg/analyzer/malloc-ipa-12.c: New test.
* gcc.dg/analyzer/malloc-ipa-13.c: New test.
* gcc.dg/analyzer/malloc-ipa-2.c: New test.
* gcc.dg/analyzer/malloc-ipa-3.c: New test.
* gcc.dg/analyzer/malloc-ipa-4.c: New test.
* gcc.dg/analyzer/malloc-ipa-5.c: New test.
* gcc.dg/analyzer/malloc-ipa-6.c: New test.
* gcc.dg/analyzer/malloc-ipa-7.c: New test.
* gcc.dg/analyzer/malloc-ipa-8-double-free.c: New test.
* gcc.dg/analyzer/malloc-ipa-8-lto-a.c: New test.
* gcc.dg/analyzer/malloc-ipa-8-lto-b.c: New test.
* gcc.dg/analyzer/malloc-ipa-8-lto-c.c: New test.
* gcc.dg/analyzer/malloc-ipa-8-lto.h: New test.
* gcc.dg/analyzer/malloc-ipa-8-unchecked.c: New test.
* gcc.dg/analyzer/malloc-ipa-9.c: New test.
* gcc.dg/analyzer/malloc-macro-inline-events.c: New test.
* gcc.dg/analyzer/malloc-macro-separate-events.c: New test.
* gcc.dg/analyzer/malloc-macro.h: New header.
* gcc.dg/analyzer/malloc-many-paths-1.c: New test.
* gcc.dg/analyzer/malloc-many-paths-2.c: New test.
* gcc.dg/analyzer/malloc-many-paths-3.c: New test.
* gcc.dg/analyzer/malloc-paths-1.c: New test.
* gcc.dg/analyzer/malloc-paths-10.c: New test.
* gcc.dg/analyzer/malloc-paths-2.c: New test.
* gcc.dg/analyzer/malloc-paths-3.c: New test.
* gcc.dg/analyzer/malloc-paths-4.c: New test.
* gcc.dg/analyzer/malloc-paths-5.c: New test.
* gcc.dg/analyzer/malloc-paths-6.c: New test.
* gcc.dg/analyzer/malloc-paths-7.c: New test.
* gcc.dg/analyzer/malloc-paths-8.c: New test.
* gcc.dg/analyzer/malloc-paths-9.c: New test.
* gcc.dg/analyzer/malloc-vs-local-1a.c: New test.
* gcc.dg/analyzer/malloc-vs-local-1b.c: New test.
* gcc.dg/analyzer/malloc-vs-local-2.c: New test.
* gcc.dg/analyzer/malloc-vs-local-3.c: New test.
* gcc.dg/analyzer/malloc-vs-local-4.c: New test.
* gcc.dg/analyzer/operations.c: New test.
* gcc.dg/analyzer/params-2.c: New test.
* gcc.dg/analyzer/params.c: New test.
* gcc.dg/analyzer/paths-1.c: New test.
* gcc.dg/analyzer/paths-1a.c: New test.
* gcc.dg/analyzer/paths-2.c: New test.
* gcc.dg/analyzer/paths-3.c: New test.
* gcc.dg/analyzer/paths-4.c: New test.
* gcc.dg/analyzer/paths-5.c: New test.
* gcc.dg/analyzer/paths-6.c: New test.
* gcc.dg/analyzer/paths-7.c: New test.
* gcc.dg/analyzer/pattern-test-1.c: New test.
* gcc.dg/analyzer/pattern-test-2.c: New test.
* gcc.dg/analyzer/pointer-merging.c: New test.
* gcc.dg/analyzer/pr61861.c: New test.
* gcc.dg/analyzer/pragma-1.c: New test.
* gcc.dg/analyzer/scope-1.c: New test.
* gcc.dg/analyzer/sensitive-1.c: New test.
* gcc.dg/analyzer/setjmp-1.c: New test.
* gcc.dg/analyzer/setjmp-2.c: New test.
* gcc.dg/analyzer/setjmp-3.c: New test.
* gcc.dg/analyzer/setjmp-4.c: New test.
* gcc.dg/analyzer/setjmp-5.c: New test.
* gcc.dg/analyzer/setjmp-6.c: New test.
* gcc.dg/analyzer/setjmp-7.c: New test.
* gcc.dg/analyzer/setjmp-7a.c: New test.
* gcc.dg/analyzer/setjmp-8.c: New test.
* gcc.dg/analyzer/setjmp-9.c: New test.
* gcc.dg/analyzer/signal-1.c: New test.
* gcc.dg/analyzer/signal-2.c: New test.
* gcc.dg/analyzer/signal-3.c: New test.
* gcc.dg/analyzer/signal-4a.c: New test.
* gcc.dg/analyzer/signal-4b.c: New test.
* gcc.dg/analyzer/strcmp-1.c: New test.
* gcc.dg/analyzer/switch.c: New test.
* gcc.dg/analyzer/taint-1.c: New test.
* gcc.dg/analyzer/zlib-1.c: New test.
* gcc.dg/analyzer/zlib-2.c: New test.
* gcc.dg/analyzer/zlib-3.c: New test.
* gcc.dg/analyzer/zlib-4.c: New test.
* gcc.dg/analyzer/zlib-5.c: New test.
* gcc.dg/analyzer/zlib-6.c: New test.
* lib/gcc-defs.exp (dg-check-dot): New procedure.
* lib/target-supports.exp (check_dot_available): New procedure.
(check_effective_target_analyzer): New.
* lib/target-supports-dg.exp (dg-require-dot): New procedure.
Diffstat (limited to 'gcc/testsuite/gcc.dg/analyzer/malloc-1.c')
-rw-r--r-- | gcc/testsuite/gcc.dg/analyzer/malloc-1.c | 585 |
1 files changed, 585 insertions, 0 deletions
diff --git a/gcc/testsuite/gcc.dg/analyzer/malloc-1.c b/gcc/testsuite/gcc.dg/analyzer/malloc-1.c new file mode 100644 index 0000000..b9a724d --- /dev/null +++ b/gcc/testsuite/gcc.dg/analyzer/malloc-1.c @@ -0,0 +1,585 @@ +#include <stdlib.h> +#include <string.h> + +extern int foo (void); +extern int bar (void); +extern void could_free (void *); +extern void cant_free (const void *); /* since it's a const void *. */ + +void test_1 (void) +{ + void *ptr = malloc (1024); + free (ptr); + free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ +} + +void test_2 (void *ptr) +{ + free (ptr); + free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ +} + +void test_2a (void *ptr) +{ + __builtin_free (ptr); + __builtin_free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ +} + +int *test_3 (void) +{ + int *ptr = (int *)malloc (sizeof (int)); + *ptr = 42; /* { dg-warning "dereference of possibly-NULL 'ptr'" } */ + return ptr; +} + +int *test_3a (void) +{ + int *ptr = (int *)__builtin_malloc (sizeof (int)); + *ptr = 42; /* { dg-warning "dereference of possibly-NULL 'ptr'" } */ + return ptr; +} + +int *test_4 (void) +{ + int *ptr = (int *)malloc (sizeof (int)); + if (ptr) + *ptr = 42; + else + *ptr = 43; /* { dg-warning "dereference of NULL 'ptr'" } */ + return ptr; +} + +int test_5 (int *ptr) +{ + free (ptr); + return *ptr; /* { dg-warning "use after 'free' of 'ptr'" } */ +} + +void test_6 (void *ptr) +{ + void *q; + q = ptr; + free (ptr); + free (q); /* { dg-warning "double-'free' of 'q'" } */ + /* The above case requires us to handle equivalence classes in + state transitions. */ +} + +void test_7 (void) +{ + void *ptr = malloc(4096); + if (!ptr) + return; + memset(ptr, 0, 4096); + free(ptr); +} + +void *test_8 (void) +{ + void *ptr = malloc(4096); + if (!ptr) + return NULL; + memset(ptr, 0, 4096); + return ptr; + /* This needs phi nodes to affect equivalence classes, or we get a false report + of a leak. */ +} + +void test_9 (void) +{ + void *ptr = malloc (1024); + + int i; + for (i = 0; i < 1024; i++) + free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ +} + +void test_10 (void) +{ + void *ptr = malloc (1024); + + int i; + for (i = 0; i < 1024; i++) + foo (); + + free (ptr); + free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ +} + +void test_11 (void) +{ + void *ptr = malloc (1024); + + while (foo ()) + bar (); + + free (ptr); + free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ +} + +void test_12 (void) +{ + void *ptr = malloc (1024); + + while (1) + { + free (ptr); + free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ + } +} + +void test_13 (void) +{ + void *p = malloc (1024); /* { dg-message "allocated here" } */ + void *q = malloc (1024); + + foo (); + if (!q) + { + free (q); + return; /* { dg-warning "leak of 'p'" } */ + } + bar (); + free (q); + free (p); +} + +void test_14 (void) +{ + void *p, *q; + p = malloc (1024); + if (!p) + return; + + q = malloc (1024); + if (!q) + { + free (p); + free (q); + /* oops: missing "return". */ + } + bar (); + free (q); /* Although this looks like a double-'free' of q, + it's known to be NULL for the case where free is + called twice on it. */ + free (p); /* { dg-warning "double-'free' of 'p'" } */ +} + +void test_15 (void) +{ + void *p = NULL, *q = NULL; + + p = malloc (1024); + if (!p) + goto fail; + + foo (); + + q = malloc (1024); + if (!q) + goto fail; + + bar (); + + fail: + free (q); + free (p); +} + +void test_16 (void) +{ + void *p, *q; + + p = malloc (1024); + if (!p) + goto fail; + + foo (); + + q = malloc (1024); + if (!q) + goto fail; + + bar (); + + fail: + free (q); /* { dg-warning "free of uninitialized 'q'" "" { xfail *-*-* } } */ + /* TODO(xfail): implement uninitialized detection. */ + free (p); +} + +void test_17 (void) +{ + void *ptr = malloc (1024); /* { dg-message "allocated here" } */ +} /* { dg-warning "leak of 'ptr'" } */ + +void test_18 (void) +{ + void *ptr = malloc (64); /* { dg-message "allocated here" } */ + ptr = NULL; /* { dg-warning "leak of 'ptr'" } */ +} + +void test_19 (void) +{ + void *ptr = malloc (64); + free (ptr); + ptr = NULL; + free (ptr); +} + +void *global_ptr_20; + +void test_20 (void) +{ + global_ptr_20 = malloc (1024); +} + +int *test_21 (int i) +{ + int *ptr = malloc (sizeof (int)); + if (!ptr) + abort (); + *ptr = i; + return ptr; +} + +void test_22 (void) +{ + void *ptr = malloc (1024); + + int i; + for (i = 5; i < 10; i++) + foo (); + + free (ptr); + free (ptr); /* { dg-warning "double-'free' of 'ptr'" } */ +} + +int *test_23 (int n) +{ + int *ptr = (int *)calloc (n, sizeof (int)); + ptr[0] = 42; /* { dg-warning "dereference of possibly-NULL 'ptr'" } */ + return ptr; +} + +int *test_23a (int n) +{ + int *ptr = (int *)__builtin_calloc (n, sizeof (int)); + ptr[0] = 42; /* { dg-warning "dereference of possibly-NULL 'ptr'" } */ + return ptr; +} + +int test_24 (void) +{ + void *ptr = alloca (sizeof (int)); /* { dg-message "memory is allocated on the stack here" } */ + free (ptr); /* { dg-warning "'free' of memory allocated on the stack by 'alloca' \\('ptr'\\) will corrupt the heap \\\[CWE-590\\\]" } */ +} + +int test_25 (void) +{ + char tmp[100]; + void *p = tmp; /* { dg-message "pointer is from here" } */ + free (p); /* { dg-warning "'free' of 'p' which points to memory not on the heap \\\[CWE-590\\\]" } */ + /* TODO: more precise messages here. */ +} + +char global_buffer[100]; + +int test_26 (void) +{ + void *p = global_buffer; /* { dg-message "pointer is from here" } */ + free (p); /* { dg-warning "'free' of 'p' which points to memory not on the heap \\\[CWE-590\\\]" } */ + /* TODO: more precise messages here. */ +} + +struct coord { + float x; + float y; +}; + +struct coord *test_27 (void) +{ + struct coord *p = (struct coord *) malloc (sizeof (struct coord)); /* { dg-message "this call could return NULL" } */ + p->x = 0.f; /* { dg-warning "dereference of possibly-NULL 'p'" } */ + + /* Only the first such usage should be reported: */ + p->y = 0.f; + + return p; +} + +struct coord *test_28 (void) +{ + struct coord *p = NULL; + p->x = 0.f; /* { dg-warning "dereference of NULL 'p'" } */ + + /* Only the first such usage should be reported: */ + p->y = 0.f; + + return p; +} + +struct link +{ + struct link *m_ptr; +}; + +struct link *test_29 (void) +{ + struct link *res = (struct link *)malloc (sizeof (struct link)); + if (!res) + return NULL; + res->m_ptr = (struct link *)malloc (sizeof (struct link)); + return res; +} + +struct link *test_29a (void) +{ + struct link *res = (struct link *)malloc (sizeof (struct link)); + if (!res) + return NULL; + res->m_ptr = (struct link *)malloc (sizeof (struct link)); + if (!res->m_ptr) + { + free (res); + return NULL; + } + res->m_ptr->m_ptr = (struct link *)malloc (sizeof (struct link)); + return res; +} + +/* Without consolidation by EC, this one shows two leaks: + warning: leak of '<unknown>' + warning: leak of 'tmp.m_ptr' + We should only show the latter (favoring the most user-readable + expression in the equivalence class). */ +void test_30 (void) +{ + struct link tmp; + tmp.m_ptr = (struct link *)malloc (sizeof (struct link)); /* { dg-message "allocated here" } */ +} /* { dg-warning "leak of 'tmp.m_ptr'" } */ +/* { dg-bogus "leak of '<unknown>'" "" { xfail *-*-* } .-1 } */ + +void test_31 (void) +{ + struct link tmp; + void *ptr = malloc (sizeof (struct link)); /* { dg-message "allocated here" } */ + tmp.m_ptr = (struct link *)ptr; +} /* { dg-warning "leak of 'ptr'" } */ +/* { dg-bogus "leak of 'tmp.m_ptr'" "" { xfail *-*-* } .-1 } */ + +void test_32 (void) +{ + void *ptr = malloc (1024); + could_free (ptr); +} /* { dg-bogus "leak" } */ + +void test_33 (void) +{ + void *ptr = malloc (1024); /* { dg-message "allocated here" } */ + cant_free (ptr); +} /* { dg-warning "leak of 'ptr'" } */ + +void test_34 (void) +{ + float *q; + struct coord *p = malloc (sizeof (struct coord)); + if (!p) + return; + p->x = 0.0f; + q = &p->x; + free (p); + *q = 1.0f; /* { dg-warning "use after 'free' of 'q'" } */ +}; + +int test_35 (void) +{ + void *ptr = malloc(4096); + if (!ptr) + return -1; + memset(ptr, 0, 4096); + free(ptr); + return 0; +} + +void test_36 (void) +{ + void *ptr = malloc(4096); + if (!ptr) + return; + memset(ptr, 0, 4096); + free(ptr); +} + +void *test_37a (void) +{ + void *ptr = malloc(4096); /* { dg-message "this call could return NULL" } */ + memset(ptr, 0, 4096); /* { dg-warning "use of possibly-NULL 'ptr' where non-null expected" } */ + return ptr; +} + +int test_37b (void) +{ + void *p = malloc(4096); + void *q = malloc(4096); /* { dg-message "this call could return NULL" } */ + if (p) { + memset(p, 0, 4096); /* Not a bug: checked */ + } else { + memset(q, 0, 4096); /* { dg-warning "use of possibly-NULL 'q' where non-null expected" } */ + } + free(p); + free(q); + return 0; +} + +extern void might_use_ptr (void *ptr); + +void test_38(int i) +{ + void *p; + + p = malloc(1024); + if (p) { + free(p); + might_use_ptr(p); /* { dg-warning "use after 'free' of 'p'" "" { xfail *-*-* } } */ + // TODO: xfail + } +} + +int * +test_39 (int i) +{ + int *p = (int*)malloc(sizeof(int*)); /* { dg-message "this call could return NULL" } */ + *p = i; /* { dg-warning "dereference of possibly-NULL 'p'" } */ + return p; +} + +int * +test_40 (int i) +{ + int *p = (int*)malloc(sizeof(int*)); + i = *p; /* { dg-warning "dereference of possibly-NULL 'p'" } */ + /* TODO: (it's also uninitialized) */ + return p; +} + +char * +test_41 (int flag) +{ + char *buffer; + + if (flag) { + buffer = (char*)malloc(4096); + } else { + buffer = NULL; + } + + buffer[0] = 'a'; /* { dg-warning "dereference of possibly-NULL 'buffer'" } */ + /* { dg-warning "dereference of NULL 'buffer'" "" { target *-*-* } .-1 } */ + + return buffer; +} + +void test_42a (void) +{ + void *p = malloc (1024); /* { dg-message "allocated here" } */ + free (p + 64); /* this could well corrupt the heap. */ + /* TODO: ^^^ we should warn about this. */ +} /* { dg-warning "leak of 'p'" } */ +/* TODO: presumably we should complain about the bogus free, but then + maybe not complain about the leak. */ +// CWE-761: Free of Pointer not at Start of Buffer + +void test_42b (void) +{ + void *p = malloc (1024); /* { dg-message "allocated here" } */ + free (p - 64); /* this could well corrupt the heap. */ + /* TODO: ^^^ we should warn about this. */ +} /* { dg-warning "leak of 'p'" } */ +/* TODO: presumably we should complain about the bogus free, but then + maybe not complain about the leak. */ +// CWE-761: Free of Pointer not at Start of Buffer + +void test_42c (void) +{ + void *p = malloc (1024); + void *q = p + 64; + free (q - 64); /* this is probably OK. */ +} /* { dg-bogus "leak of 'p'" "" { xfail *-*-* } } */ +// TODO(xfail) + +#if 0 +void test_31 (void *p) +{ + void *q = realloc (p, 1024); + free (p); /* FIXME: this is a double-'free'. */ + free (q); +} + +void test_32 (void) +{ + void *p = malloc (64); + p = realloc (p, 1024); /* FIXME: this leaks if it fails. */ + free (p); +} +#endif + +struct link global_link; + +void test_43 (void) +{ + global_link.m_ptr = malloc (sizeof (struct link)); /* { dg-message "allocated here" } */ + global_link.m_ptr = NULL; +} /* { dg-warning "leak of '<unknown>'" } */ +/* TODO: should be more precise than just '<unknown>', and + ideally would be at the assigment to NULL. */ + +struct link *global_ptr; + +void test_44 (void) +{ + global_ptr = malloc (sizeof (struct link)); + if (!global_ptr) + return; + global_ptr->m_ptr = malloc (sizeof (struct link)); /* { dg-message "allocated here" } */ + free (global_ptr); /* { dg-warning "leak of '<unknown>'" } */ + /* TODO: should be more precise than just '<unknown>'. */ +} + +extern void might_take_ownership (void *ptr); + +void test_45 (void) +{ + void *p = malloc (1024); + might_take_ownership (p); +} + +void test_46 (void) +{ + struct link *p = (struct link *)malloc (sizeof (struct link)); + if (!p) + return; + struct link *q = (struct link *)malloc (sizeof (struct link)); + p->m_ptr = q; + might_take_ownership (p); +} + +extern int maybe_alloc (char **); + +int test_47 (void) +{ + char *p = ((void *)0); + int p_size = 0; + + p = malloc (16); + if (p) { + free (p); + } else { + int retval = maybe_alloc (&p); /* this might write to "p". */ + if (retval) + return (retval); + p_size = strlen(p); /* { dg-bogus "non-null expected" } */ + free (p); + } + return p_size; +} |