Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 1 | //===--- AttrNonNullChecker.h - Undefined arguments checker ----*- C++ -*--===// |
| 2 | // |
| 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
| 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
| 7 | // |
| 8 | //===----------------------------------------------------------------------===// |
| 9 | // |
Argyrios Kyrtzidis | d2592a3 | 2010-12-22 18:53:44 +0000 | [diff] [blame] | 10 | // This defines AttrNonNullChecker, a builtin check in ExprEngine that |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 11 | // performs checks for arguments declared to have nonnull attribute. |
| 12 | // |
| 13 | //===----------------------------------------------------------------------===// |
| 14 | |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 15 | #include "ClangSACheckers.h" |
Argyrios Kyrtzidis | ec8605f | 2011-03-01 01:16:21 +0000 | [diff] [blame] | 16 | #include "clang/StaticAnalyzer/Core/Checker.h" |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 17 | #include "clang/StaticAnalyzer/Core/CheckerManager.h" |
| 18 | #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" |
Ted Kremenek | 9b66371 | 2011-02-10 01:03:03 +0000 | [diff] [blame] | 19 | #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 20 | |
| 21 | using namespace clang; |
Ted Kremenek | 9ef6537 | 2010-12-23 07:20:52 +0000 | [diff] [blame] | 22 | using namespace ento; |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 23 | |
Ted Kremenek | f493f49 | 2009-11-11 05:50:44 +0000 | [diff] [blame] | 24 | namespace { |
Kovarththanan Rajaratnam | ba5fb5a | 2009-11-28 06:07:30 +0000 | [diff] [blame] | 25 | class AttrNonNullChecker |
Argyrios Kyrtzidis | ec8605f | 2011-03-01 01:16:21 +0000 | [diff] [blame] | 26 | : public Checker< check::PreStmt<CallExpr> > { |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 27 | mutable llvm::OwningPtr<BugType> BT; |
Ted Kremenek | f493f49 | 2009-11-11 05:50:44 +0000 | [diff] [blame] | 28 | public: |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 29 | |
| 30 | void checkPreStmt(const CallExpr *CE, CheckerContext &C) const; |
Ted Kremenek | f493f49 | 2009-11-11 05:50:44 +0000 | [diff] [blame] | 31 | }; |
| 32 | } // end anonymous namespace |
| 33 | |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 34 | void AttrNonNullChecker::checkPreStmt(const CallExpr *CE, |
| 35 | CheckerContext &C) const { |
Ted Kremenek | 8bef823 | 2012-01-26 21:29:00 +0000 | [diff] [blame^] | 36 | ProgramStateRef state = C.getState(); |
Ted Kremenek | 5eca482 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 37 | const LocationContext *LCtx = C.getLocationContext(); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 38 | |
| 39 | // Check if the callee has a 'nonnull' attribute. |
Ted Kremenek | 5eca482 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 40 | SVal X = state->getSVal(CE->getCallee(), LCtx); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 41 | |
Ted Kremenek | 9c378f7 | 2011-08-12 23:37:29 +0000 | [diff] [blame] | 42 | const FunctionDecl *FD = X.getAsFunctionDecl(); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 43 | if (!FD) |
| 44 | return; |
| 45 | |
| 46 | const NonNullAttr* Att = FD->getAttr<NonNullAttr>(); |
| 47 | if (!Att) |
| 48 | return; |
| 49 | |
| 50 | // Iterate through the arguments of CE and check them for null. |
| 51 | unsigned idx = 0; |
| 52 | |
| 53 | for (CallExpr::const_arg_iterator I=CE->arg_begin(), E=CE->arg_end(); I!=E; |
| 54 | ++I, ++idx) { |
| 55 | |
| 56 | if (!Att->isNonNull(idx)) |
| 57 | continue; |
| 58 | |
Ted Kremenek | 5eca482 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 59 | SVal V = state->getSVal(*I, LCtx); |
Jordy Rose | 9a12685 | 2010-06-21 20:08:28 +0000 | [diff] [blame] | 60 | DefinedSVal *DV = dyn_cast<DefinedSVal>(&V); |
| 61 | |
| 62 | // If the value is unknown or undefined, we can't perform this check. |
| 63 | if (!DV) |
| 64 | continue; |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 65 | |
Ted Kremenek | bb0ba0b | 2010-11-09 02:11:43 +0000 | [diff] [blame] | 66 | if (!isa<Loc>(*DV)) { |
| 67 | // If the argument is a union type, we want to handle a potential |
| 68 | // transparent_unoin GCC extension. |
| 69 | QualType T = (*I)->getType(); |
| 70 | const RecordType *UT = T->getAsUnionType(); |
| 71 | if (!UT || !UT->getDecl()->hasAttr<TransparentUnionAttr>()) |
| 72 | continue; |
| 73 | if (nonloc::CompoundVal *CSV = dyn_cast<nonloc::CompoundVal>(DV)) { |
| 74 | nonloc::CompoundVal::iterator CSV_I = CSV->begin(); |
| 75 | assert(CSV_I != CSV->end()); |
| 76 | V = *CSV_I; |
| 77 | DV = dyn_cast<DefinedSVal>(&V); |
| 78 | assert(++CSV_I == CSV->end()); |
| 79 | if (!DV) |
| 80 | continue; |
| 81 | } |
| 82 | else { |
| 83 | // FIXME: Handle LazyCompoundVals? |
| 84 | continue; |
| 85 | } |
| 86 | } |
| 87 | |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 88 | ConstraintManager &CM = C.getConstraintManager(); |
Ted Kremenek | 8bef823 | 2012-01-26 21:29:00 +0000 | [diff] [blame^] | 89 | ProgramStateRef stateNotNull, stateNull; |
Ted Kremenek | 28f47b9 | 2010-12-01 22:16:56 +0000 | [diff] [blame] | 90 | llvm::tie(stateNotNull, stateNull) = CM.assumeDual(state, *DV); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 91 | |
| 92 | if (stateNull && !stateNotNull) { |
| 93 | // Generate an error node. Check for a null node in case |
| 94 | // we cache out. |
Ted Kremenek | d048c6e | 2010-12-20 21:19:09 +0000 | [diff] [blame] | 95 | if (ExplodedNode *errorNode = C.generateSink(stateNull)) { |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 96 | |
| 97 | // Lazily allocate the BugType object if it hasn't already been |
| 98 | // created. Ownership is transferred to the BugReporter object once |
| 99 | // the BugReport is passed to 'EmitWarning'. |
| 100 | if (!BT) |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 101 | BT.reset(new BugType("Argument with 'nonnull' attribute passed null", |
| 102 | "API")); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 103 | |
Anna Zaks | e172e8b | 2011-08-17 23:00:25 +0000 | [diff] [blame] | 104 | BugReport *R = |
Anna Zaks | 50bbc16 | 2011-08-19 22:33:38 +0000 | [diff] [blame] | 105 | new BugReport(*BT, "Null pointer passed as an argument to a " |
| 106 | "'nonnull' parameter", errorNode); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 107 | |
| 108 | // Highlight the range of the argument that was null. |
| 109 | const Expr *arg = *I; |
| 110 | R->addRange(arg->getSourceRange()); |
Anna Zaks | 50bbc16 | 2011-08-19 22:33:38 +0000 | [diff] [blame] | 111 | R->addVisitor(bugreporter::getTrackNullOrUndefValueVisitor(errorNode, |
| 112 | arg)); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 113 | // Emit the bug report. |
| 114 | C.EmitReport(R); |
| 115 | } |
| 116 | |
| 117 | // Always return. Either we cached out or we just emitted an error. |
| 118 | return; |
| 119 | } |
| 120 | |
| 121 | // If a pointer value passed the check we should assume that it is |
| 122 | // indeed not null from this point forward. |
| 123 | assert(stateNotNull); |
| 124 | state = stateNotNull; |
| 125 | } |
| 126 | |
| 127 | // If we reach here all of the arguments passed the nonnull check. |
| 128 | // If 'state' has been updated generated a new node. |
Anna Zaks | 0bd6b11 | 2011-10-26 21:06:34 +0000 | [diff] [blame] | 129 | C.addTransition(state); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 130 | } |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 131 | |
| 132 | void ento::registerAttrNonNullChecker(CheckerManager &mgr) { |
| 133 | mgr.registerChecker<AttrNonNullChecker>(); |
| 134 | } |