summaryrefslogtreecommitdiffstats
path: root/clang/test/Analysis/malloc-overflow2.c
diff options
context:
space:
mode:
authorDevin Coughlin <dcoughlin@apple.com>2015-09-23 23:27:55 +0000
committerDevin Coughlin <dcoughlin@apple.com>2015-09-23 23:27:55 +0000
commit683dfd3124125d1158532e94bd5ec13f90285bda (patch)
treef765b62bac7d4273ea103e5f5e475cefa59b66e5 /clang/test/Analysis/malloc-overflow2.c
parentd56ee06d1f5310e169ac29afa4f35b3c6f1fdd87 (diff)
downloadbcm5719-llvm-683dfd3124125d1158532e94bd5ec13f90285bda.tar.gz
bcm5719-llvm-683dfd3124125d1158532e94bd5ec13f90285bda.zip
[analyzer] Discard malloc-overflow bug-report when a known size is malloc'ed.
This patch ignores malloc-overflow bug in two cases: Case1: x = a/b; where n < b malloc (x*n); Then x*n will not overflow. Case2: x = a; // when 'a' is a known value. malloc (x*n); Also replaced isa with dyn_cast. Reject multiplication by zero cases in MallocOverflowSecurityChecker Currently MallocOverflowSecurityChecker does not catch cases like: malloc(n * 0 * sizeof(int)); This patch rejects such cases. Two test cases added. malloc-overflow2.c has an example inspired from a code in linux kernel where the current checker flags a warning while it should not. A patch by Aditya Kumar! Differential Revision: http://reviews.llvm.org/D9924 llvm-svn: 248446
Diffstat (limited to 'clang/test/Analysis/malloc-overflow2.c')
-rw-r--r--clang/test/Analysis/malloc-overflow2.c36
1 files changed, 36 insertions, 0 deletions
diff --git a/clang/test/Analysis/malloc-overflow2.c b/clang/test/Analysis/malloc-overflow2.c
new file mode 100644
index 00000000000..93f0239fe09
--- /dev/null
+++ b/clang/test/Analysis/malloc-overflow2.c
@@ -0,0 +1,36 @@
+// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.MallocOverflow,unix -verify %s
+
+typedef __typeof__(sizeof(int)) size_t;
+extern void *malloc(size_t);
+extern void free(void *ptr);
+
+void *malloc(unsigned long s);
+
+struct table {
+ int nentry;
+ unsigned *table;
+ unsigned offset_max;
+};
+
+static int table_build(struct table *t) {
+
+ t->nentry = ((t->offset_max >> 2) + 31) / 32;
+ t->table = (unsigned *)malloc(sizeof(unsigned) * t->nentry); // expected-warning {{the computation of the size of the memory allocation may overflow}}
+
+ int n;
+ n = 10000;
+ int *p = malloc(sizeof(int) * n); // no-warning
+
+ free(p);
+ return t->nentry;
+}
+
+static int table_build_1(struct table *t) {
+ t->nentry = (sizeof(struct table) * 2 + 31) / 32;
+ t->table = (unsigned *)malloc(sizeof(unsigned) * t->nentry); // no-warning
+ return t->nentry;
+}
+
+void *f(int n) {
+ return malloc(n * 0 * sizeof(int)); // expected-warning {{Call to 'malloc' has an allocation size of 0 bytes}}
+}
OpenPOWER on IntegriCloud