blob: 2c7c951f400516e7cc5e66fd0ccfdef39e11e66d [file] [log] [blame]
Zhongxing Xud02174c2009-11-24 04:45:44 +00001//===--- CallAndMessageChecker.cpp ------------------------------*- C++ -*--==//
Zhongxing Xu8958fff2009-11-03 06:46:03 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
Zhongxing Xud02174c2009-11-24 04:45:44 +000010// This defines CallAndMessageChecker, a builtin checker that checks for various
11// errors of call and objc message expressions.
Zhongxing Xu8958fff2009-11-03 06:46:03 +000012//
13//===----------------------------------------------------------------------===//
14
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000015#include "ClangSACheckers.h"
Argyrios Kyrtzidisec8605f2011-03-01 01:16:21 +000016#include "clang/StaticAnalyzer/Core/Checker.h"
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000017#include "clang/StaticAnalyzer/Core/CheckerManager.h"
18#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
Jordy Rosed1e5a892011-09-02 08:02:59 +000019#include "clang/StaticAnalyzer/Core/PathSensitive/ObjCMessage.h"
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000020#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
Benjamin Kramer5e2d2c22010-03-27 21:19:47 +000021#include "clang/AST/ParentMap.h"
22#include "clang/Basic/TargetInfo.h"
Benjamin Kramer8fe83e12012-02-04 13:45:25 +000023#include "llvm/ADT/SmallString.h"
Zhongxing Xu8958fff2009-11-03 06:46:03 +000024
25using namespace clang;
Ted Kremenek9ef65372010-12-23 07:20:52 +000026using namespace ento;
Zhongxing Xu8958fff2009-11-03 06:46:03 +000027
Ted Kremenekf493f492009-11-11 05:50:44 +000028namespace {
Kovarththanan Rajaratnamba5fb5a2009-11-28 06:07:30 +000029class CallAndMessageChecker
Argyrios Kyrtzidisec8605f2011-03-01 01:16:21 +000030 : public Checker< check::PreStmt<CallExpr>, check::PreObjCMessage > {
Dylan Noblesmith6f42b622012-02-05 02:12:40 +000031 mutable OwningPtr<BugType> BT_call_null;
32 mutable OwningPtr<BugType> BT_call_undef;
33 mutable OwningPtr<BugType> BT_call_arg;
34 mutable OwningPtr<BugType> BT_msg_undef;
Ted Kremenekb673a412012-02-18 20:53:30 +000035 mutable OwningPtr<BugType> BT_objc_prop_undef;
Dylan Noblesmith6f42b622012-02-05 02:12:40 +000036 mutable OwningPtr<BugType> BT_msg_arg;
37 mutable OwningPtr<BugType> BT_msg_ret;
Ted Kremenekf493f492009-11-11 05:50:44 +000038public:
Zhongxing Xu2055eff2009-11-24 07:06:39 +000039
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000040 void checkPreStmt(const CallExpr *CE, CheckerContext &C) const;
41 void checkPreObjCMessage(ObjCMessage msg, CheckerContext &C) const;
Ted Kremenekfee96e02009-11-24 21:41:28 +000042
Ted Kremenekc79d7d42009-11-21 01:25:37 +000043private:
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000044 static void PreVisitProcessArgs(CheckerContext &C,CallOrObjCMessage callOrMsg,
Dylan Noblesmith6f42b622012-02-05 02:12:40 +000045 const char *BT_desc, OwningPtr<BugType> &BT);
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000046 static bool PreVisitProcessArg(CheckerContext &C, SVal V,SourceRange argRange,
Ted Kremeneke4d653b2012-03-05 23:57:14 +000047 const Expr *argEx,
48 const bool checkUninitFields,
49 const char *BT_desc,
50 OwningPtr<BugType> &BT);
Ted Kremenek81337162010-03-18 03:22:29 +000051
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000052 static void EmitBadCall(BugType *BT, CheckerContext &C, const CallExpr *CE);
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +000053 void emitNilReceiverBug(CheckerContext &C, const ObjCMessage &msg,
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000054 ExplodedNode *N) const;
Ted Kremenek091b5882010-03-18 02:17:27 +000055
Ted Kremenek18c66fd2011-08-15 22:09:50 +000056 void HandleNilReceiver(CheckerContext &C,
Ted Kremenek8bef8232012-01-26 21:29:00 +000057 ProgramStateRef state,
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000058 ObjCMessage msg) const;
Ted Kremenek091b5882010-03-18 02:17:27 +000059
Dylan Noblesmith6f42b622012-02-05 02:12:40 +000060 static void LazyInit_BT(const char *desc, OwningPtr<BugType> &BT) {
Ted Kremenek81337162010-03-18 03:22:29 +000061 if (!BT)
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +000062 BT.reset(new BuiltinBug(desc));
Ted Kremenek091b5882010-03-18 02:17:27 +000063 }
Ted Kremenekf493f492009-11-11 05:50:44 +000064};
65} // end anonymous namespace
66
Zhongxing Xud02174c2009-11-24 04:45:44 +000067void CallAndMessageChecker::EmitBadCall(BugType *BT, CheckerContext &C,
68 const CallExpr *CE) {
Ted Kremenekd048c6e2010-12-20 21:19:09 +000069 ExplodedNode *N = C.generateSink();
Ted Kremenekc79d7d42009-11-21 01:25:37 +000070 if (!N)
71 return;
Ted Kremenek091b5882010-03-18 02:17:27 +000072
Anna Zakse172e8b2011-08-17 23:00:25 +000073 BugReport *R = new BugReport(*BT, BT->getName(), N);
Anna Zaks50bbc162011-08-19 22:33:38 +000074 R->addVisitor(bugreporter::getTrackNullOrUndefValueVisitor(N,
Ted Kremenek76aadc32012-03-09 01:13:14 +000075 bugreporter::GetCalleeExpr(N), R));
Ted Kremenekc79d7d42009-11-21 01:25:37 +000076 C.EmitReport(R);
77}
78
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +000079void CallAndMessageChecker::PreVisitProcessArgs(CheckerContext &C,
80 CallOrObjCMessage callOrMsg,
81 const char *BT_desc,
Dylan Noblesmith6f42b622012-02-05 02:12:40 +000082 OwningPtr<BugType> &BT) {
Ted Kremeneke4d653b2012-03-05 23:57:14 +000083 // Don't check for uninitialized field values in arguments if the
84 // caller has a body that is available and we have the chance to inline it.
85 // This is a hack, but is a reasonable compromise betweens sometimes warning
86 // and sometimes not depending on if we decide to inline a function.
87 const Decl *D = callOrMsg.getDecl();
88 const bool checkUninitFields =
89 !(C.getAnalysisManager().shouldInlineCall() &&
90 (D && D->getBody()));
91
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +000092 for (unsigned i = 0, e = callOrMsg.getNumArgs(); i != e; ++i)
93 if (PreVisitProcessArg(C, callOrMsg.getArgSVal(i),
94 callOrMsg.getArgSourceRange(i), callOrMsg.getArg(i),
Ted Kremeneke4d653b2012-03-05 23:57:14 +000095 checkUninitFields,
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +000096 BT_desc, BT))
97 return;
98}
99
Ted Kremenek81337162010-03-18 03:22:29 +0000100bool CallAndMessageChecker::PreVisitProcessArg(CheckerContext &C,
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000101 SVal V, SourceRange argRange,
102 const Expr *argEx,
Ted Kremeneke4d653b2012-03-05 23:57:14 +0000103 const bool checkUninitFields,
Ted Kremenek81337162010-03-18 03:22:29 +0000104 const char *BT_desc,
Dylan Noblesmith6f42b622012-02-05 02:12:40 +0000105 OwningPtr<BugType> &BT) {
Ted Kremenek81337162010-03-18 03:22:29 +0000106 if (V.isUndef()) {
Ted Kremenekd048c6e2010-12-20 21:19:09 +0000107 if (ExplodedNode *N = C.generateSink()) {
Ted Kremenek81337162010-03-18 03:22:29 +0000108 LazyInit_BT(BT_desc, BT);
109
110 // Generate a report for this bug.
Anna Zakse172e8b2011-08-17 23:00:25 +0000111 BugReport *R = new BugReport(*BT, BT->getName(), N);
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000112 R->addRange(argRange);
113 if (argEx)
Ted Kremenek76aadc32012-03-09 01:13:14 +0000114 R->addVisitor(bugreporter::getTrackNullOrUndefValueVisitor(N, argEx,
115 R));
Ted Kremenek81337162010-03-18 03:22:29 +0000116 C.EmitReport(R);
117 }
118 return true;
119 }
120
Ted Kremeneke4d653b2012-03-05 23:57:14 +0000121 if (!checkUninitFields)
122 return false;
123
Ted Kremenek81337162010-03-18 03:22:29 +0000124 if (const nonloc::LazyCompoundVal *LV =
125 dyn_cast<nonloc::LazyCompoundVal>(&V)) {
126
127 class FindUninitializedField {
128 public:
Chris Lattner5f9e2722011-07-23 10:55:15 +0000129 SmallVector<const FieldDecl *, 10> FieldChain;
Ted Kremenek81337162010-03-18 03:22:29 +0000130 private:
131 ASTContext &C;
132 StoreManager &StoreMgr;
133 MemRegionManager &MrMgr;
134 Store store;
135 public:
136 FindUninitializedField(ASTContext &c, StoreManager &storeMgr,
137 MemRegionManager &mrMgr, Store s)
138 : C(c), StoreMgr(storeMgr), MrMgr(mrMgr), store(s) {}
139
Ted Kremenek96979342011-08-12 20:02:48 +0000140 bool Find(const TypedValueRegion *R) {
Zhongxing Xu018220c2010-08-11 06:10:55 +0000141 QualType T = R->getValueType();
Ted Kremenek81337162010-03-18 03:22:29 +0000142 if (const RecordType *RT = T->getAsStructureType()) {
143 const RecordDecl *RD = RT->getDecl()->getDefinition();
144 assert(RD && "Referred record has no definition");
145 for (RecordDecl::field_iterator I =
146 RD->field_begin(), E = RD->field_end(); I!=E; ++I) {
David Blaikie262bc182012-04-30 02:36:29 +0000147 const FieldRegion *FR = MrMgr.getFieldRegion(&*I, R);
148 FieldChain.push_back(&*I);
149 T = I->getType();
Ted Kremenek81337162010-03-18 03:22:29 +0000150 if (T->getAsStructureType()) {
151 if (Find(FR))
152 return true;
153 }
154 else {
Anna Zaks14374252012-01-12 02:22:40 +0000155 const SVal &V = StoreMgr.getBinding(store, loc::MemRegionVal(FR));
Ted Kremenek81337162010-03-18 03:22:29 +0000156 if (V.isUndef())
157 return true;
158 }
159 FieldChain.pop_back();
160 }
161 }
162
163 return false;
164 }
165 };
166
167 const LazyCompoundValData *D = LV->getCVData();
168 FindUninitializedField F(C.getASTContext(),
169 C.getState()->getStateManager().getStoreManager(),
Ted Kremenekc8413fd2010-12-02 07:49:45 +0000170 C.getSValBuilder().getRegionManager(),
Ted Kremenek81337162010-03-18 03:22:29 +0000171 D->getStore());
172
173 if (F.Find(D->getRegion())) {
Ted Kremenekd048c6e2010-12-20 21:19:09 +0000174 if (ExplodedNode *N = C.generateSink()) {
Ted Kremenek81337162010-03-18 03:22:29 +0000175 LazyInit_BT(BT_desc, BT);
Dylan Noblesmithf7ccbad2012-02-05 02:13:05 +0000176 SmallString<512> Str;
Ted Kremenek81337162010-03-18 03:22:29 +0000177 llvm::raw_svector_ostream os(Str);
178 os << "Passed-by-value struct argument contains uninitialized data";
179
180 if (F.FieldChain.size() == 1)
Benjamin Kramerb8989f22011-10-14 18:45:37 +0000181 os << " (e.g., field: '" << *F.FieldChain[0] << "')";
Ted Kremenek81337162010-03-18 03:22:29 +0000182 else {
183 os << " (e.g., via the field chain: '";
184 bool first = true;
Chris Lattner5f9e2722011-07-23 10:55:15 +0000185 for (SmallVectorImpl<const FieldDecl *>::iterator
Ted Kremenek81337162010-03-18 03:22:29 +0000186 DI = F.FieldChain.begin(), DE = F.FieldChain.end(); DI!=DE;++DI){
187 if (first)
188 first = false;
189 else
190 os << '.';
Benjamin Kramerb8989f22011-10-14 18:45:37 +0000191 os << **DI;
Ted Kremenek81337162010-03-18 03:22:29 +0000192 }
193 os << "')";
194 }
195
196 // Generate a report for this bug.
Anna Zakse172e8b2011-08-17 23:00:25 +0000197 BugReport *R = new BugReport(*BT, os.str(), N);
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000198 R->addRange(argRange);
Ted Kremenek81337162010-03-18 03:22:29 +0000199
200 // FIXME: enhance track back for uninitialized value for arbitrary
201 // memregions
202 C.EmitReport(R);
203 }
204 return true;
205 }
206 }
207
208 return false;
209}
210
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000211void CallAndMessageChecker::checkPreStmt(const CallExpr *CE,
212 CheckerContext &C) const{
Ted Kremenek091b5882010-03-18 02:17:27 +0000213
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000214 const Expr *Callee = CE->getCallee()->IgnoreParens();
Ted Kremenek5eca4822012-01-06 22:09:28 +0000215 const LocationContext *LCtx = C.getLocationContext();
216 SVal L = C.getState()->getSVal(Callee, LCtx);
Ted Kremenek091b5882010-03-18 02:17:27 +0000217
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000218 if (L.isUndef()) {
219 if (!BT_call_undef)
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000220 BT_call_undef.reset(new BuiltinBug("Called function pointer is an "
221 "uninitalized pointer value"));
222 EmitBadCall(BT_call_undef.get(), C, CE);
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000223 return;
224 }
Ted Kremenek091b5882010-03-18 02:17:27 +0000225
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000226 if (isa<loc::ConcreteInt>(L)) {
227 if (!BT_call_null)
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000228 BT_call_null.reset(
229 new BuiltinBug("Called function pointer is null (null dereference)"));
230 EmitBadCall(BT_call_null.get(), C, CE);
Ted Kremenek091b5882010-03-18 02:17:27 +0000231 }
232
Ted Kremenek5eca4822012-01-06 22:09:28 +0000233 PreVisitProcessArgs(C, CallOrObjCMessage(CE, C.getState(), LCtx),
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000234 "Function call argument is an uninitialized value",
235 BT_call_arg);
Ted Kremenek64fa8582009-11-21 00:49:41 +0000236}
237
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000238void CallAndMessageChecker::checkPreObjCMessage(ObjCMessage msg,
239 CheckerContext &C) const {
Ted Kremenek64fa8582009-11-21 00:49:41 +0000240
Ted Kremenek8bef8232012-01-26 21:29:00 +0000241 ProgramStateRef state = C.getState();
Ted Kremenek5eca4822012-01-06 22:09:28 +0000242 const LocationContext *LCtx = C.getLocationContext();
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000243
Douglas Gregor04badcf2010-04-21 00:45:42 +0000244 // FIXME: Handle 'super'?
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000245 if (const Expr *receiver = msg.getInstanceReceiver()) {
Ted Kremenek5eca4822012-01-06 22:09:28 +0000246 SVal recVal = state->getSVal(receiver, LCtx);
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000247 if (recVal.isUndef()) {
Ted Kremenekd048c6e2010-12-20 21:19:09 +0000248 if (ExplodedNode *N = C.generateSink()) {
Ted Kremenekb673a412012-02-18 20:53:30 +0000249 BugType *BT = 0;
250 if (msg.isPureMessageExpr()) {
251 if (!BT_msg_undef)
252 BT_msg_undef.reset(new BuiltinBug("Receiver in message expression "
253 "is an uninitialized value"));
254 BT = BT_msg_undef.get();
255 }
256 else {
257 if (!BT_objc_prop_undef)
258 BT_objc_prop_undef.reset(new BuiltinBug("Property access on an "
259 "uninitialized object pointer"));
260 BT = BT_objc_prop_undef.get();
261 }
Anna Zakse172e8b2011-08-17 23:00:25 +0000262 BugReport *R =
Ted Kremenekb673a412012-02-18 20:53:30 +0000263 new BugReport(*BT, BT->getName(), N);
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000264 R->addRange(receiver->getSourceRange());
Anna Zaks50bbc162011-08-19 22:33:38 +0000265 R->addVisitor(bugreporter::getTrackNullOrUndefValueVisitor(N,
Ted Kremenek76aadc32012-03-09 01:13:14 +0000266 receiver,
267 R));
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000268 C.EmitReport(R);
269 }
270 return;
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000271 } else {
272 // Bifurcate the state into nil and non-nil ones.
273 DefinedOrUnknownSVal receiverVal = cast<DefinedOrUnknownSVal>(recVal);
274
Ted Kremenek8bef8232012-01-26 21:29:00 +0000275 ProgramStateRef notNilState, nilState;
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000276 llvm::tie(notNilState, nilState) = state->assume(receiverVal);
277
278 // Handle receiver must be nil.
279 if (nilState && !notNilState) {
280 HandleNilReceiver(C, state, msg);
281 return;
282 }
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000283 }
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000284 }
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000285
Argyrios Kyrtzidis14429b92011-01-25 00:04:03 +0000286 const char *bugDesc = msg.isPropertySetter() ?
287 "Argument for property setter is an uninitialized value"
288 : "Argument in message expression is an uninitialized value";
Ted Kremenekc79d7d42009-11-21 01:25:37 +0000289 // Check for any arguments that are uninitialized/undefined.
Ted Kremenek5eca4822012-01-06 22:09:28 +0000290 PreVisitProcessArgs(C, CallOrObjCMessage(msg, state, LCtx),
291 bugDesc, BT_msg_arg);
Zhongxing Xua46e4d92009-12-02 05:49:12 +0000292}
Zhongxing Xu2055eff2009-11-24 07:06:39 +0000293
Ted Kremenekc8413fd2010-12-02 07:49:45 +0000294void CallAndMessageChecker::emitNilReceiverBug(CheckerContext &C,
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000295 const ObjCMessage &msg,
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000296 ExplodedNode *N) const {
Ted Kremenek091b5882010-03-18 02:17:27 +0000297
Ted Kremenekfee96e02009-11-24 21:41:28 +0000298 if (!BT_msg_ret)
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000299 BT_msg_ret.reset(
Ted Kremenekfee96e02009-11-24 21:41:28 +0000300 new BuiltinBug("Receiver in message expression is "
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000301 "'nil' and returns a garbage value"));
Ted Kremenek091b5882010-03-18 02:17:27 +0000302
Dylan Noblesmithf7ccbad2012-02-05 02:13:05 +0000303 SmallString<200> buf;
Ted Kremenekfee96e02009-11-24 21:41:28 +0000304 llvm::raw_svector_ostream os(buf);
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000305 os << "The receiver of message '" << msg.getSelector().getAsString()
Ted Kremenekfee96e02009-11-24 21:41:28 +0000306 << "' is nil and returns a value of type '"
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000307 << msg.getType(C.getASTContext()).getAsString() << "' that will be garbage";
Ted Kremenek091b5882010-03-18 02:17:27 +0000308
Anna Zakse172e8b2011-08-17 23:00:25 +0000309 BugReport *report = new BugReport(*BT_msg_ret, os.str(), N);
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000310 if (const Expr *receiver = msg.getInstanceReceiver()) {
Douglas Gregor04badcf2010-04-21 00:45:42 +0000311 report->addRange(receiver->getSourceRange());
Anna Zaks50bbc162011-08-19 22:33:38 +0000312 report->addVisitor(bugreporter::getTrackNullOrUndefValueVisitor(N,
Ted Kremenek76aadc32012-03-09 01:13:14 +0000313 receiver,
314 report));
Douglas Gregor04badcf2010-04-21 00:45:42 +0000315 }
Ted Kremenek091b5882010-03-18 02:17:27 +0000316 C.EmitReport(report);
Ted Kremenekfee96e02009-11-24 21:41:28 +0000317}
318
Ted Kremenekc8413fd2010-12-02 07:49:45 +0000319static bool supportsNilWithFloatRet(const llvm::Triple &triple) {
Bob Wilson8f1e6562012-01-31 23:52:54 +0000320 return (triple.getVendor() == llvm::Triple::Apple &&
321 (triple.getOS() == llvm::Triple::IOS ||
322 !triple.isMacOSXVersionLT(10,5)));
Ted Kremenekf81330c2009-11-24 22:48:18 +0000323}
324
Ted Kremenekfee96e02009-11-24 21:41:28 +0000325void CallAndMessageChecker::HandleNilReceiver(CheckerContext &C,
Ted Kremenek8bef8232012-01-26 21:29:00 +0000326 ProgramStateRef state,
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000327 ObjCMessage msg) const {
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000328 ASTContext &Ctx = C.getASTContext();
Ted Kremenek091b5882010-03-18 02:17:27 +0000329
Ted Kremenekfee96e02009-11-24 21:41:28 +0000330 // Check the return type of the message expression. A message to nil will
331 // return different values depending on the return type and the architecture.
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000332 QualType RetTy = msg.getType(Ctx);
Ted Kremenekf81330c2009-11-24 22:48:18 +0000333 CanQualType CanRetTy = Ctx.getCanonicalType(RetTy);
Ted Kremenek5eca4822012-01-06 22:09:28 +0000334 const LocationContext *LCtx = C.getLocationContext();
Ted Kremenekfee96e02009-11-24 21:41:28 +0000335
Douglas Gregorfb87b892010-04-26 21:31:17 +0000336 if (CanRetTy->isStructureOrClassType()) {
Ted Kremenek4a037c72011-10-28 19:05:10 +0000337 // Structure returns are safe since the compiler zeroes them out.
338 SVal V = C.getSValBuilder().makeZeroVal(msg.getType(Ctx));
Ted Kremenekb673a412012-02-18 20:53:30 +0000339 C.addTransition(state->BindExpr(msg.getMessageExpr(), LCtx, V));
Ted Kremenekfee96e02009-11-24 21:41:28 +0000340 return;
341 }
342
Ted Kremenek4a037c72011-10-28 19:05:10 +0000343 // Other cases: check if sizeof(return type) > sizeof(void*)
Anna Zaksa2a86032011-11-01 22:41:01 +0000344 if (CanRetTy != Ctx.VoidTy && C.getLocationContext()->getParentMap()
Ted Kremenekb673a412012-02-18 20:53:30 +0000345 .isConsumedExpr(msg.getMessageExpr())) {
Ted Kremenekfee96e02009-11-24 21:41:28 +0000346 // Compute: sizeof(void *) and sizeof(return type)
Ted Kremenek091b5882010-03-18 02:17:27 +0000347 const uint64_t voidPtrSize = Ctx.getTypeSize(Ctx.VoidPtrTy);
Ted Kremenekf81330c2009-11-24 22:48:18 +0000348 const uint64_t returnTypeSize = Ctx.getTypeSize(CanRetTy);
Ted Kremenekfee96e02009-11-24 21:41:28 +0000349
Ted Kremenekf81330c2009-11-24 22:48:18 +0000350 if (voidPtrSize < returnTypeSize &&
Douglas Gregorbcfd1f52011-09-02 00:18:52 +0000351 !(supportsNilWithFloatRet(Ctx.getTargetInfo().getTriple()) &&
Ted Kremenekf81330c2009-11-24 22:48:18 +0000352 (Ctx.FloatTy == CanRetTy ||
353 Ctx.DoubleTy == CanRetTy ||
354 Ctx.LongDoubleTy == CanRetTy ||
Ted Kremenek61238742010-09-30 00:37:10 +0000355 Ctx.LongLongTy == CanRetTy ||
356 Ctx.UnsignedLongLongTy == CanRetTy))) {
Ted Kremenek9c378f72011-08-12 23:37:29 +0000357 if (ExplodedNode *N = C.generateSink(state))
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000358 emitNilReceiverBug(C, msg, N);
Ted Kremenekfee96e02009-11-24 21:41:28 +0000359 return;
360 }
361
362 // Handle the safe cases where the return value is 0 if the
363 // receiver is nil.
364 //
365 // FIXME: For now take the conservative approach that we only
366 // return null values if we *know* that the receiver is nil.
367 // This is because we can have surprises like:
368 //
369 // ... = [[NSScreens screens] objectAtIndex:0];
370 //
371 // What can happen is that [... screens] could return nil, but
372 // it most likely isn't nil. We should assume the semantics
373 // of this case unless we have *a lot* more knowledge.
374 //
Argyrios Kyrtzidis432424d2011-01-25 00:03:53 +0000375 SVal V = C.getSValBuilder().makeZeroVal(msg.getType(Ctx));
Ted Kremenekb673a412012-02-18 20:53:30 +0000376 C.addTransition(state->BindExpr(msg.getMessageExpr(), LCtx, V));
Ted Kremenekfee96e02009-11-24 21:41:28 +0000377 return;
378 }
Ted Kremenek091b5882010-03-18 02:17:27 +0000379
Anna Zaks0bd6b112011-10-26 21:06:34 +0000380 C.addTransition(state);
Zhongxing Xu8958fff2009-11-03 06:46:03 +0000381}
Argyrios Kyrtzidisd84f4222011-02-28 01:28:13 +0000382
383void ento::registerCallAndMessageChecker(CheckerManager &mgr) {
384 mgr.registerChecker<CallAndMessageChecker>();
385}