blob: 7c580602e682ab2b42726f94b4a5ad83b9febe06 [file] [log] [blame]
// RUN: %clang_analyze_cc1 -triple x86_64-unknown-unknown -analyzer-checker=alpha.security.MallocOverflow,unix -verify %s
// RUN: %clang_analyze_cc1 -triple x86_64-unknown-unknown -analyzer-checker=alpha.security.MallocOverflow,unix,optin.portability -DPORTABILITY -verify %s
typedef __typeof__(sizeof(int)) size_t;
extern void *malloc(size_t);
extern void free(void *ptr);
void *malloc(unsigned long s);
struct table {
int nentry;
unsigned *table;
unsigned offset_max;
};
static int table_build(struct table *t) {
t->nentry = ((t->offset_max >> 2) + 31) / 32;
t->table = (unsigned *)malloc(sizeof(unsigned) * t->nentry); // expected-warning {{the computation of the size of the memory allocation may overflow}}
int n;
n = 10000;
int *p = malloc(sizeof(int) * n); // no-warning
free(p);
return t->nentry;
}
static int table_build_1(struct table *t) {
t->nentry = (sizeof(struct table) * 2 + 31) / 32;
t->table = (unsigned *)malloc(sizeof(unsigned) * t->nentry); // no-warning
return t->nentry;
}
void *f(int n) {
return malloc(n * 0 * sizeof(int));
#ifdef PORTABILITY
// expected-warning@-2{{Call to 'malloc' has an allocation size of 0 bytes}}
#endif
}