2012-05-26 08:53:46 +02:00
|
|
|
/*
|
|
|
|
* Cppcheck - A tool for static C/C++ code analysis
|
|
|
|
* Copyright (C) 2007-2012 Daniel Marjamäki and Cppcheck team.
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
// Leaks when using auto variables
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
#include "checkleakautovar.h"
|
|
|
|
|
2012-06-22 09:10:30 +02:00
|
|
|
#include "checkother.h" // <- doubleFreeError
|
|
|
|
|
2012-05-26 08:53:46 +02:00
|
|
|
#include "tokenize.h"
|
|
|
|
#include "errorlogger.h"
|
|
|
|
#include "symboldatabase.h"
|
|
|
|
|
2012-05-26 18:10:12 +02:00
|
|
|
#include <fstream>
|
2012-05-26 08:53:46 +02:00
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// Register this check class (by creating a static instance of it)
|
|
|
|
namespace {
|
|
|
|
CheckLeakAutoVar instance;
|
|
|
|
}
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
void VarInfo::print()
|
|
|
|
{
|
|
|
|
std::cout << "size=" << alloctype.size() << std::endl;
|
|
|
|
std::map<unsigned int, std::string>::const_iterator it;
|
|
|
|
for (it = alloctype.begin(); it != alloctype.end(); ++it) {
|
|
|
|
std::string strusage;
|
|
|
|
std::map<unsigned int, std::string>::const_iterator use = possibleUsage.find(it->first);
|
|
|
|
if (use != possibleUsage.end())
|
|
|
|
strusage = use->second;
|
|
|
|
|
|
|
|
std::cout << "alloctype='" << it->second << "' "
|
|
|
|
<< "possibleUsage='" << strusage << "'" << std::endl;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void VarInfo::possibleUsageAll(const std::string &functionName)
|
|
|
|
{
|
|
|
|
possibleUsage.clear();
|
|
|
|
std::map<unsigned int, std::string>::const_iterator it;
|
|
|
|
for (it = alloctype.begin(); it != alloctype.end(); ++it)
|
|
|
|
possibleUsage[it->first] = functionName;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void CheckLeakAutoVar::leakError(const Token *tok, const std::string &varname)
|
|
|
|
{
|
|
|
|
reportError(tok, Severity::error, "newleak", "New memory leak: " + varname);
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckLeakAutoVar::mismatchError(const Token *tok, const std::string &varname)
|
|
|
|
{
|
|
|
|
reportError(tok, Severity::error, "newmismatch", "New mismatching allocation and deallocation: " + varname);
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckLeakAutoVar::deallocUseError(const Token *tok, const std::string &varname)
|
|
|
|
{
|
|
|
|
reportError(tok, Severity::error, "newdeallocuse", "Using deallocated pointer " + varname);
|
|
|
|
}
|
|
|
|
|
2012-06-11 18:28:31 +02:00
|
|
|
void CheckLeakAutoVar::deallocReturnError(const Token *tok, const std::string &varname)
|
|
|
|
{
|
|
|
|
reportError(tok, Severity::error, "newdeallocret", "Returning/using deallocated pointer " + varname);
|
|
|
|
}
|
|
|
|
|
2012-05-26 08:53:46 +02:00
|
|
|
void CheckLeakAutoVar::configurationInfo(const Token* tok, const std::string &functionName)
|
|
|
|
{
|
2012-05-30 06:43:30 +02:00
|
|
|
if (((!cfgalloc.empty() || !cfgdealloc.empty()) && _settings->isEnabled("style")) || _settings->experimental) {
|
2012-05-26 08:53:46 +02:00
|
|
|
reportError(tok,
|
|
|
|
Severity::information,
|
|
|
|
"leakconfiguration",
|
|
|
|
functionName + " configuration is needed to establish if there is a leak or not");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-26 18:10:12 +02:00
|
|
|
void CheckLeakAutoVar::parseConfigurationFile(const std::string &filename)
|
|
|
|
{
|
|
|
|
std::ifstream fin(filename.c_str());
|
|
|
|
if (!fin.is_open())
|
|
|
|
return;
|
|
|
|
|
|
|
|
std::string line;
|
|
|
|
while (std::getline(fin,line)) {
|
|
|
|
if (line.compare(0,4,"MEM ",0,4) == 0) {
|
|
|
|
std::string f1;
|
2012-05-30 06:36:59 +02:00
|
|
|
enum {ALLOC, DEALLOC} type = ALLOC;
|
2012-05-26 18:10:12 +02:00
|
|
|
std::string::size_type pos1 = line.find_first_not_of(" ", 4U);
|
|
|
|
while (pos1 < line.size()) {
|
|
|
|
const std::string::size_type pos2 = line.find(" ", pos1);
|
|
|
|
std::string f;
|
|
|
|
if (pos2 == std::string::npos)
|
|
|
|
f = line.substr(pos1);
|
|
|
|
else
|
|
|
|
f = line.substr(pos1, pos2-pos1);
|
|
|
|
if (f1.empty())
|
|
|
|
f1 = f;
|
|
|
|
if (f == ":")
|
2012-05-30 06:36:59 +02:00
|
|
|
type = DEALLOC;
|
|
|
|
else if (type == ALLOC)
|
2012-05-26 18:10:12 +02:00
|
|
|
cfgalloc[f] = f1;
|
2012-05-30 06:36:59 +02:00
|
|
|
else if (type == DEALLOC)
|
2012-05-26 18:10:12 +02:00
|
|
|
cfgdealloc[f] = f1;
|
|
|
|
pos1 = line.find_first_not_of(" ", pos2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-26 08:53:46 +02:00
|
|
|
void CheckLeakAutoVar::check()
|
|
|
|
{
|
|
|
|
const SymbolDatabase *symbolDatabase = _tokenizer->getSymbolDatabase();
|
|
|
|
|
|
|
|
// Check function scopes
|
|
|
|
for (std::list<Scope>::const_iterator i = symbolDatabase->scopeList.begin(); i != symbolDatabase->scopeList.end(); ++i) {
|
|
|
|
if (i->type == Scope::eFunction) {
|
|
|
|
// Empty variable info
|
|
|
|
VarInfo varInfo;
|
|
|
|
|
|
|
|
// Local variables that are known to be non-zero.
|
|
|
|
const std::set<unsigned int> notzero;
|
|
|
|
|
|
|
|
checkScope(i->classStart, &varInfo, notzero);
|
|
|
|
|
|
|
|
varInfo.conditionalAlloc.clear();
|
|
|
|
|
2012-06-01 19:01:19 +02:00
|
|
|
// Clear reference arguments from varInfo..
|
|
|
|
std::map<unsigned int, std::string>::iterator it = varInfo.alloctype.begin();
|
|
|
|
while (it != varInfo.alloctype.end()) {
|
|
|
|
const Variable *var = symbolDatabase->getVariableFromVarId(it->first);
|
2012-06-20 17:09:41 +02:00
|
|
|
if (!var ||
|
|
|
|
(var->isArgument() && var->isReference()) ||
|
|
|
|
(!var->isArgument() && !var->isLocal()))
|
2012-06-01 19:01:19 +02:00
|
|
|
varInfo.alloctype.erase(it++);
|
|
|
|
else
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
|
2012-05-26 08:53:46 +02:00
|
|
|
ret(i->classEnd, varInfo);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckLeakAutoVar::checkScope(const Token * const startToken,
|
|
|
|
VarInfo *varInfo,
|
|
|
|
std::set<unsigned int> notzero)
|
|
|
|
{
|
|
|
|
std::map<unsigned int, std::string> &alloctype = varInfo->alloctype;
|
|
|
|
std::map<unsigned int, std::string> &possibleUsage = varInfo->possibleUsage;
|
|
|
|
const std::set<unsigned int> conditionalAlloc(varInfo->conditionalAlloc);
|
|
|
|
|
|
|
|
// Allocation functions. key = function name, value = allocation type
|
2012-05-26 18:10:12 +02:00
|
|
|
std::map<std::string, std::string> allocFunctions(cfgalloc);
|
2012-05-26 08:53:46 +02:00
|
|
|
allocFunctions["malloc"] = "malloc";
|
|
|
|
allocFunctions["strdup"] = "malloc";
|
|
|
|
allocFunctions["fopen"] = "fopen";
|
|
|
|
|
|
|
|
// Deallocation functions. key = function name, value = allocation type
|
2012-05-26 18:10:12 +02:00
|
|
|
std::map<std::string, std::string> deallocFunctions(cfgdealloc);
|
2012-05-26 08:53:46 +02:00
|
|
|
deallocFunctions["free"] = "malloc";
|
|
|
|
deallocFunctions["fclose"] = "fopen";
|
|
|
|
|
|
|
|
// Parse all tokens
|
|
|
|
const Token * const endToken = startToken->link();
|
|
|
|
for (const Token *tok = startToken; tok && tok != endToken; tok = tok->next()) {
|
|
|
|
// Deallocation and then dereferencing pointer..
|
|
|
|
if (tok->varId() > 0) {
|
|
|
|
const std::map<unsigned int, std::string>::iterator var = alloctype.find(tok->varId());
|
|
|
|
if (var != alloctype.end()) {
|
|
|
|
if (var->second == "dealloc") {
|
|
|
|
deallocUseError(tok, tok->str());
|
|
|
|
} else if (Token::simpleMatch(tok->tokAt(-2), "= &")) {
|
|
|
|
varInfo->erase(tok->varId());
|
|
|
|
} else if (Token::simpleMatch(tok->previous(), "=")) {
|
|
|
|
varInfo->erase(tok->varId());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tok->str() == "(" && tok->previous()->isName()) {
|
|
|
|
functionCall(tok->previous(), varInfo, "");
|
|
|
|
tok = tok->link();
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// look for end of statement
|
|
|
|
if (!Token::Match(tok, "[;{}]") || Token::Match(tok->next(), "[;{}]"))
|
|
|
|
continue;
|
|
|
|
tok = tok->next();
|
|
|
|
if (tok == endToken)
|
|
|
|
break;
|
|
|
|
|
|
|
|
// parse statement
|
|
|
|
|
|
|
|
// assignment..
|
|
|
|
if (tok && tok->varId() && Token::Match(tok, "%var% =")) {
|
|
|
|
// taking address of another variable..
|
|
|
|
if (Token::Match(tok->next(), "= %var% [+;]")) {
|
|
|
|
if (tok->tokAt(2)->varId() != tok->varId()) {
|
|
|
|
// If variable points at allocated memory => error
|
|
|
|
leakIfAllocated(tok, *varInfo);
|
|
|
|
|
|
|
|
// no multivariable checking currently => bail out for rhs variables
|
|
|
|
for (const Token *tok2 = tok; tok2; tok2 = tok2->next()) {
|
|
|
|
if (tok2->str() == ";") {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (tok2->varId()) {
|
|
|
|
varInfo->erase(tok2->varId());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// is variable used in rhs?
|
|
|
|
bool used_in_rhs = false;
|
|
|
|
for (const Token *tok2 = tok->tokAt(2); tok2; tok2 = tok2->next()) {
|
|
|
|
if (tok2->str() == ";") {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (tok->varId() == tok2->varId()) {
|
|
|
|
used_in_rhs = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// TODO: Better checking how the pointer is used in rhs?
|
|
|
|
if (used_in_rhs)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
// Variable has already been allocated => error
|
2012-05-26 21:28:35 +02:00
|
|
|
if (conditionalAlloc.find(tok->varId()) == conditionalAlloc.end())
|
|
|
|
leakIfAllocated(tok, *varInfo);
|
2012-05-26 08:53:46 +02:00
|
|
|
varInfo->erase(tok->varId());
|
|
|
|
|
|
|
|
// not a local variable nor argument?
|
|
|
|
const Variable *var = _tokenizer->getSymbolDatabase()->getVariableFromVarId(tok->varId());
|
|
|
|
if (var && !var->isArgument() && !var->isLocal()) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// allocation?
|
|
|
|
if (Token::Match(tok->tokAt(2), "%type% (")) {
|
|
|
|
const std::map<std::string, std::string>::const_iterator it = allocFunctions.find(tok->strAt(2));
|
|
|
|
if (it != allocFunctions.end()) {
|
|
|
|
alloctype[tok->varId()] = it->second;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assigning non-zero value variable. It might be used to
|
|
|
|
// track the execution for a later if condition.
|
|
|
|
if (Token::Match(tok->tokAt(2), "%num% ;") && MathLib::toLongNumber(tok->strAt(2)) != 0)
|
|
|
|
notzero.insert(tok->varId());
|
2012-06-21 19:00:53 +02:00
|
|
|
else if (Token::Match(tok->tokAt(2), "- %type% ;") && tok->tokAt(3)->isUpperCaseName())
|
2012-05-26 08:53:46 +02:00
|
|
|
notzero.insert(tok->varId());
|
|
|
|
else
|
|
|
|
notzero.erase(tok->varId());
|
|
|
|
}
|
|
|
|
|
|
|
|
// if/else
|
|
|
|
else if (Token::simpleMatch(tok, "if (")) {
|
|
|
|
// Parse function calls inside the condition
|
|
|
|
for (const Token *innerTok = tok->tokAt(2); innerTok; innerTok = innerTok->next()) {
|
|
|
|
if (innerTok->str() == ")")
|
|
|
|
break;
|
|
|
|
if (innerTok->str() == "(" && innerTok->previous()->isName()) {
|
|
|
|
std::string dealloc;
|
|
|
|
{
|
|
|
|
const std::map<std::string, std::string>::iterator func = deallocFunctions.find(tok->str());
|
|
|
|
if (func != deallocFunctions.end()) {
|
|
|
|
dealloc = func->second;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
functionCall(innerTok->previous(), varInfo, dealloc);
|
|
|
|
innerTok = innerTok->link();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const Token *tok2 = tok->linkAt(1);
|
|
|
|
if (Token::simpleMatch(tok2, ") {")) {
|
|
|
|
VarInfo varInfo1(*varInfo);
|
|
|
|
VarInfo varInfo2(*varInfo);
|
|
|
|
|
|
|
|
if (Token::Match(tok->next(), "( %var% )")) {
|
|
|
|
varInfo2.erase(tok->tokAt(2)->varId());
|
|
|
|
if (notzero.find(tok->tokAt(2)->varId()) != notzero.end())
|
|
|
|
varInfo2.clear();
|
2012-06-17 07:54:24 +02:00
|
|
|
} else if (Token::Match(tok->next(), "( ! %var% )|&&")) {
|
2012-05-26 08:53:46 +02:00
|
|
|
varInfo1.erase(tok->tokAt(3)->varId());
|
2012-06-17 07:54:24 +02:00
|
|
|
} else if (Token::Match(tok->next(), "( %var% ( ! %var% ) )|&&")) {
|
|
|
|
varInfo1.erase(tok->tokAt(5)->varId());
|
|
|
|
}
|
2012-05-26 08:53:46 +02:00
|
|
|
|
|
|
|
checkScope(tok2->next(), &varInfo1, notzero);
|
|
|
|
tok2 = tok2->linkAt(1);
|
|
|
|
if (Token::simpleMatch(tok2, "} else {")) {
|
|
|
|
checkScope(tok2->tokAt(2), &varInfo2, notzero);
|
|
|
|
tok = tok2->linkAt(2)->previous();
|
|
|
|
} else {
|
|
|
|
tok = tok2->previous();
|
|
|
|
}
|
|
|
|
|
|
|
|
VarInfo old;
|
|
|
|
old.swap(*varInfo);
|
|
|
|
|
|
|
|
// Conditional allocation in varInfo1
|
|
|
|
std::map<unsigned int, std::string>::const_iterator it;
|
|
|
|
for (it = varInfo1.alloctype.begin(); it != varInfo1.alloctype.end(); ++it) {
|
|
|
|
if (varInfo2.alloctype.find(it->first) == varInfo2.alloctype.end() &&
|
|
|
|
old.alloctype.find(it->first) == old.alloctype.end()) {
|
|
|
|
varInfo->conditionalAlloc.insert(it->first);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Conditional allocation in varInfo2
|
|
|
|
for (it = varInfo2.alloctype.begin(); it != varInfo2.alloctype.end(); ++it) {
|
|
|
|
if (varInfo1.alloctype.find(it->first) == varInfo1.alloctype.end() &&
|
|
|
|
old.alloctype.find(it->first) == old.alloctype.end()) {
|
|
|
|
varInfo->conditionalAlloc.insert(it->first);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Conditional allocation/deallocation
|
|
|
|
for (it = varInfo1.alloctype.begin(); it != varInfo1.alloctype.end(); ++it) {
|
|
|
|
if (it->second == "dealloc" && conditionalAlloc.find(it->first) != conditionalAlloc.end()) {
|
|
|
|
varInfo->conditionalAlloc.erase(it->first);
|
|
|
|
varInfo2.erase(it->first);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (it = varInfo2.alloctype.begin(); it != varInfo2.alloctype.end(); ++it) {
|
|
|
|
if (it->second == "dealloc" && conditionalAlloc.find(it->first) != conditionalAlloc.end()) {
|
|
|
|
varInfo->conditionalAlloc.erase(it->first);
|
|
|
|
varInfo1.erase(it->first);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
alloctype.insert(varInfo1.alloctype.begin(), varInfo1.alloctype.end());
|
|
|
|
alloctype.insert(varInfo2.alloctype.begin(), varInfo2.alloctype.end());
|
|
|
|
|
|
|
|
possibleUsage.insert(varInfo1.possibleUsage.begin(), varInfo1.possibleUsage.end());
|
|
|
|
possibleUsage.insert(varInfo2.possibleUsage.begin(), varInfo2.possibleUsage.end());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// unknown control..
|
|
|
|
else if (Token::Match(tok, "%type% (") && Token::simpleMatch(tok->linkAt(1), ") {")) {
|
|
|
|
varInfo->clear();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Function call..
|
|
|
|
else if (Token::Match(tok, "%type% (")) {
|
|
|
|
std::string dealloc;
|
|
|
|
{
|
|
|
|
const std::map<std::string, std::string>::iterator func = deallocFunctions.find(tok->str());
|
|
|
|
if (func != deallocFunctions.end()) {
|
|
|
|
dealloc = func->second;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
functionCall(tok, varInfo, dealloc);
|
|
|
|
|
|
|
|
tok = tok->next()->link();
|
|
|
|
|
|
|
|
// Handle scopes that might be noreturn
|
|
|
|
if (dealloc.empty() && Token::simpleMatch(tok, ") ; }")) {
|
|
|
|
bool unknown = false;
|
|
|
|
if (_tokenizer->IsScopeNoReturn(tok->tokAt(2), &unknown)) {
|
|
|
|
if (unknown) {
|
|
|
|
const std::string &functionName(tok->link()->previous()->str());
|
|
|
|
varInfo->possibleUsageAll(functionName);
|
|
|
|
} else {
|
|
|
|
varInfo->clear();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// return
|
2012-06-01 19:08:50 +02:00
|
|
|
else if (tok->str() == "return" || tok->str() == "throw") {
|
2012-05-26 08:53:46 +02:00
|
|
|
ret(tok, *varInfo);
|
|
|
|
varInfo->clear();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckLeakAutoVar::functionCall(const Token *tok, VarInfo *varInfo, const std::string &dealloc)
|
|
|
|
{
|
|
|
|
std::map<unsigned int, std::string> &alloctype = varInfo->alloctype;
|
|
|
|
std::map<unsigned int, std::string> &possibleUsage = varInfo->possibleUsage;
|
|
|
|
|
|
|
|
for (const Token *arg = tok->tokAt(2); arg; arg = arg->nextArgument()) {
|
|
|
|
if ((Token::Match(arg, "%var% [-,)]") && arg->varId() > 0) ||
|
|
|
|
(Token::Match(arg, "& %var%") && arg->next()->varId() > 0)) {
|
|
|
|
|
|
|
|
// goto variable
|
|
|
|
if (arg->str() == "&")
|
|
|
|
arg = arg->next();
|
|
|
|
|
|
|
|
// Is variable allocated?
|
|
|
|
const std::map<unsigned int,std::string>::iterator var = alloctype.find(arg->varId());
|
|
|
|
if (var != alloctype.end()) {
|
|
|
|
if (dealloc.empty()) {
|
|
|
|
// possible usage
|
|
|
|
possibleUsage[arg->varId()] = tok->str();
|
|
|
|
} else if (var->second == "dealloc") {
|
2012-06-22 09:10:30 +02:00
|
|
|
CheckOther checkOther(_tokenizer, _settings, _errorLogger);
|
|
|
|
checkOther.doubleFreeError(tok, arg->str());
|
2012-05-26 08:53:46 +02:00
|
|
|
} else if (var->second != dealloc) {
|
|
|
|
// mismatching allocation and deallocation
|
|
|
|
mismatchError(tok, arg->str());
|
|
|
|
varInfo->erase(arg->varId());
|
|
|
|
} else {
|
|
|
|
// deallocation
|
|
|
|
var->second = "dealloc";
|
|
|
|
}
|
|
|
|
} else if (!dealloc.empty()) {
|
|
|
|
alloctype[arg->varId()] = "dealloc";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void CheckLeakAutoVar::leakIfAllocated(const Token *vartok,
|
|
|
|
const VarInfo &varInfo)
|
|
|
|
{
|
|
|
|
const std::map<unsigned int, std::string> &alloctype = varInfo.alloctype;
|
|
|
|
const std::map<unsigned int, std::string> &possibleUsage = varInfo.possibleUsage;
|
|
|
|
|
|
|
|
const std::map<unsigned int,std::string>::const_iterator var = alloctype.find(vartok->varId());
|
|
|
|
if (var != alloctype.end() && var->second != "dealloc") {
|
|
|
|
const std::map<unsigned int, std::string>::const_iterator use = possibleUsage.find(vartok->varId());
|
|
|
|
if (use == possibleUsage.end()) {
|
|
|
|
leakError(vartok, vartok->str());
|
|
|
|
} else {
|
|
|
|
configurationInfo(vartok, use->second);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void CheckLeakAutoVar::ret(const Token *tok, const VarInfo &varInfo)
|
|
|
|
{
|
|
|
|
const std::map<unsigned int, std::string> &alloctype = varInfo.alloctype;
|
|
|
|
const std::map<unsigned int, std::string> &possibleUsage = varInfo.possibleUsage;
|
|
|
|
|
|
|
|
const SymbolDatabase *symbolDatabase = _tokenizer->getSymbolDatabase();
|
|
|
|
for (std::map<unsigned int, std::string>::const_iterator it = alloctype.begin(); it != alloctype.end(); ++it) {
|
|
|
|
// don't warn if variable is conditionally allocated
|
2012-06-11 18:28:31 +02:00
|
|
|
if (it->second != "dealloc" && varInfo.conditionalAlloc.find(it->first) != varInfo.conditionalAlloc.end())
|
2012-05-26 08:53:46 +02:00
|
|
|
continue;
|
|
|
|
|
|
|
|
const unsigned int varid = it->first;
|
|
|
|
const Variable *var = symbolDatabase->getVariableFromVarId(varid);
|
|
|
|
if (var) {
|
|
|
|
bool used = false;
|
|
|
|
for (const Token *tok2 = tok; tok2; tok2 = tok2->next()) {
|
|
|
|
if (tok2->str() == ";")
|
|
|
|
break;
|
|
|
|
if (Token::Match(tok2, "return|(|, %varid% [);,]", varid)) {
|
|
|
|
used = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (Token::Match(tok2, "return|(|, & %varid% . %var% [);,]", varid)) {
|
|
|
|
used = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-06-11 18:28:31 +02:00
|
|
|
// return deallocated pointer
|
|
|
|
if (used && it->second == "dealloc")
|
|
|
|
deallocReturnError(tok, var->name());
|
|
|
|
|
|
|
|
else if (!used && it->second != "dealloc") {
|
|
|
|
|
|
|
|
const std::map<unsigned int, std::string>::const_iterator use = possibleUsage.find(varid);
|
|
|
|
if (use == possibleUsage.end()) {
|
|
|
|
leakError(tok, var->name());
|
|
|
|
} else {
|
|
|
|
configurationInfo(tok, use->second);
|
|
|
|
}
|
2012-05-26 08:53:46 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|