Anna Zaks | 80412c4 | 2013-03-09 03:23:14 +0000 | [diff] [blame] | 1 | //===--- NonNullParamChecker.cpp - Undefined arguments checker -*- C++ -*--===// |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 2 | // |
| 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
| 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
| 7 | // |
| 8 | //===----------------------------------------------------------------------===// |
| 9 | // |
Anna Zaks | 80412c4 | 2013-03-09 03:23:14 +0000 | [diff] [blame] | 10 | // This defines NonNullParamChecker, which checks for arguments expected not to |
| 11 | // be null due to: |
| 12 | // - the corresponding parameters being declared to have nonnull attribute |
| 13 | // - the corresponding parameters being references; since the call would form |
| 14 | // a reference to a null pointer |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 15 | // |
| 16 | //===----------------------------------------------------------------------===// |
| 17 | |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 18 | #include "ClangSACheckers.h" |
Benjamin Kramer | 2fa67ef | 2012-12-01 15:09:41 +0000 | [diff] [blame] | 19 | #include "clang/AST/Attr.h" |
Chandler Carruth | 55fc873 | 2012-12-04 09:13:33 +0000 | [diff] [blame] | 20 | #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" |
Argyrios Kyrtzidis | ec8605f | 2011-03-01 01:16:21 +0000 | [diff] [blame] | 21 | #include "clang/StaticAnalyzer/Core/Checker.h" |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 22 | #include "clang/StaticAnalyzer/Core/CheckerManager.h" |
Jordan Rose | f540c54 | 2012-07-26 21:39:41 +0000 | [diff] [blame] | 23 | #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 24 | #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 25 | |
| 26 | using namespace clang; |
Ted Kremenek | 9ef6537 | 2010-12-23 07:20:52 +0000 | [diff] [blame] | 27 | using namespace ento; |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 28 | |
Ted Kremenek | f493f49 | 2009-11-11 05:50:44 +0000 | [diff] [blame] | 29 | namespace { |
Anna Zaks | 80412c4 | 2013-03-09 03:23:14 +0000 | [diff] [blame] | 30 | class NonNullParamChecker |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 31 | : public Checker< check::PreCall > { |
Stephen Hines | 651f13c | 2014-04-23 16:59:28 -0700 | [diff] [blame] | 32 | mutable std::unique_ptr<BugType> BTAttrNonNull; |
| 33 | mutable std::unique_ptr<BugType> BTNullRefArg; |
| 34 | |
Ted Kremenek | f493f49 | 2009-11-11 05:50:44 +0000 | [diff] [blame] | 35 | public: |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 36 | |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 37 | void checkPreCall(const CallEvent &Call, CheckerContext &C) const; |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 38 | |
| 39 | BugReport *genReportNullAttrNonNull(const ExplodedNode *ErrorN, |
| 40 | const Expr *ArgE) const; |
| 41 | BugReport *genReportReferenceToNullPointer(const ExplodedNode *ErrorN, |
| 42 | const Expr *ArgE) const; |
Ted Kremenek | f493f49 | 2009-11-11 05:50:44 +0000 | [diff] [blame] | 43 | }; |
| 44 | } // end anonymous namespace |
| 45 | |
Anna Zaks | 80412c4 | 2013-03-09 03:23:14 +0000 | [diff] [blame] | 46 | void NonNullParamChecker::checkPreCall(const CallEvent &Call, |
Stephen Hines | 651f13c | 2014-04-23 16:59:28 -0700 | [diff] [blame] | 47 | CheckerContext &C) const { |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 48 | const Decl *FD = Call.getDecl(); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 49 | if (!FD) |
| 50 | return; |
| 51 | |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 52 | const NonNullAttr *Att = FD->getAttr<NonNullAttr>(); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 53 | |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 54 | ProgramStateRef state = C.getState(); |
| 55 | |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 56 | CallEvent::param_type_iterator TyI = Call.param_type_begin(), |
| 57 | TyE = Call.param_type_end(); |
| 58 | |
| 59 | for (unsigned idx = 0, count = Call.getNumArgs(); idx != count; ++idx){ |
| 60 | |
| 61 | // Check if the parameter is a reference. We want to report when reference |
| 62 | // to a null pointer is passed as a paramter. |
| 63 | bool haveRefTypeParam = false; |
| 64 | if (TyI != TyE) { |
| 65 | haveRefTypeParam = (*TyI)->isReferenceType(); |
| 66 | TyI++; |
| 67 | } |
| 68 | |
| 69 | bool haveAttrNonNull = Att && Att->isNonNull(idx); |
Stephen Hines | 651f13c | 2014-04-23 16:59:28 -0700 | [diff] [blame] | 70 | if (!haveAttrNonNull) { |
| 71 | // Check if the parameter is also marked 'nonnull'. |
| 72 | ArrayRef<ParmVarDecl*> parms = Call.parameters(); |
| 73 | if (idx < parms.size()) |
| 74 | haveAttrNonNull = parms[idx]->hasAttr<NonNullAttr>(); |
| 75 | } |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 76 | |
| 77 | if (!haveRefTypeParam && !haveAttrNonNull) |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 78 | continue; |
| 79 | |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 80 | // If the value is unknown or undefined, we can't perform this check. |
| 81 | const Expr *ArgE = Call.getArgExpr(idx); |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 82 | SVal V = Call.getArgSVal(idx); |
David Blaikie | dc84cd5 | 2013-02-20 22:23:23 +0000 | [diff] [blame] | 83 | Optional<DefinedSVal> DV = V.getAs<DefinedSVal>(); |
Jordy Rose | 9a12685 | 2010-06-21 20:08:28 +0000 | [diff] [blame] | 84 | if (!DV) |
| 85 | continue; |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 86 | |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 87 | // Process the case when the argument is not a location. |
| 88 | assert(!haveRefTypeParam || DV->getAs<Loc>()); |
| 89 | |
| 90 | if (haveAttrNonNull && !DV->getAs<Loc>()) { |
Ted Kremenek | bb0ba0b | 2010-11-09 02:11:43 +0000 | [diff] [blame] | 91 | // If the argument is a union type, we want to handle a potential |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 92 | // transparent_union GCC extension. |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 93 | if (!ArgE) |
| 94 | continue; |
| 95 | |
| 96 | QualType T = ArgE->getType(); |
Ted Kremenek | bb0ba0b | 2010-11-09 02:11:43 +0000 | [diff] [blame] | 97 | const RecordType *UT = T->getAsUnionType(); |
| 98 | if (!UT || !UT->getDecl()->hasAttr<TransparentUnionAttr>()) |
| 99 | continue; |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 100 | |
David Blaikie | dc84cd5 | 2013-02-20 22:23:23 +0000 | [diff] [blame] | 101 | if (Optional<nonloc::CompoundVal> CSV = |
David Blaikie | 5251abe | 2013-02-20 05:52:05 +0000 | [diff] [blame] | 102 | DV->getAs<nonloc::CompoundVal>()) { |
Ted Kremenek | bb0ba0b | 2010-11-09 02:11:43 +0000 | [diff] [blame] | 103 | nonloc::CompoundVal::iterator CSV_I = CSV->begin(); |
| 104 | assert(CSV_I != CSV->end()); |
| 105 | V = *CSV_I; |
David Blaikie | 5251abe | 2013-02-20 05:52:05 +0000 | [diff] [blame] | 106 | DV = V.getAs<DefinedSVal>(); |
Ted Kremenek | bb0ba0b | 2010-11-09 02:11:43 +0000 | [diff] [blame] | 107 | assert(++CSV_I == CSV->end()); |
Stephen Hines | 651f13c | 2014-04-23 16:59:28 -0700 | [diff] [blame] | 108 | // FIXME: Handle (some_union){ some_other_union_val }, which turns into |
| 109 | // a LazyCompoundVal inside a CompoundVal. |
| 110 | if (!V.getAs<Loc>()) |
Anna Zaks | 42773d6 | 2013-03-06 20:26:02 +0000 | [diff] [blame] | 111 | continue; |
| 112 | // Retrieve the corresponding expression. |
| 113 | if (const CompoundLiteralExpr *CE = dyn_cast<CompoundLiteralExpr>(ArgE)) |
| 114 | if (const InitListExpr *IE = |
| 115 | dyn_cast<InitListExpr>(CE->getInitializer())) |
| 116 | ArgE = dyn_cast<Expr>(*(IE->begin())); |
| 117 | |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 118 | } else { |
Ted Kremenek | bb0ba0b | 2010-11-09 02:11:43 +0000 | [diff] [blame] | 119 | // FIXME: Handle LazyCompoundVals? |
| 120 | continue; |
| 121 | } |
| 122 | } |
| 123 | |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 124 | ConstraintManager &CM = C.getConstraintManager(); |
Ted Kremenek | 8bef823 | 2012-01-26 21:29:00 +0000 | [diff] [blame] | 125 | ProgramStateRef stateNotNull, stateNull; |
Stephen Hines | 651f13c | 2014-04-23 16:59:28 -0700 | [diff] [blame] | 126 | std::tie(stateNotNull, stateNull) = CM.assumeDual(state, *DV); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 127 | |
| 128 | if (stateNull && !stateNotNull) { |
| 129 | // Generate an error node. Check for a null node in case |
| 130 | // we cache out. |
Ted Kremenek | d048c6e | 2010-12-20 21:19:09 +0000 | [diff] [blame] | 131 | if (ExplodedNode *errorNode = C.generateSink(stateNull)) { |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 132 | |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 133 | BugReport *R = 0; |
| 134 | if (haveAttrNonNull) |
| 135 | R = genReportNullAttrNonNull(errorNode, ArgE); |
| 136 | else if (haveRefTypeParam) |
| 137 | R = genReportReferenceToNullPointer(errorNode, ArgE); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 138 | |
| 139 | // Highlight the range of the argument that was null. |
Jordan Rose | fe6a011 | 2012-07-02 19:28:21 +0000 | [diff] [blame] | 140 | R->addRange(Call.getArgSourceRange(idx)); |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 141 | |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 142 | // Emit the bug report. |
Jordan Rose | 785950e | 2012-11-02 01:53:40 +0000 | [diff] [blame] | 143 | C.emitReport(R); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 144 | } |
| 145 | |
| 146 | // Always return. Either we cached out or we just emitted an error. |
| 147 | return; |
| 148 | } |
| 149 | |
| 150 | // If a pointer value passed the check we should assume that it is |
| 151 | // indeed not null from this point forward. |
| 152 | assert(stateNotNull); |
| 153 | state = stateNotNull; |
| 154 | } |
| 155 | |
| 156 | // If we reach here all of the arguments passed the nonnull check. |
| 157 | // If 'state' has been updated generated a new node. |
Anna Zaks | 0bd6b11 | 2011-10-26 21:06:34 +0000 | [diff] [blame] | 158 | C.addTransition(state); |
Zhongxing Xu | 94943b6 | 2009-11-03 07:35:33 +0000 | [diff] [blame] | 159 | } |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 160 | |
Anna Zaks | 80412c4 | 2013-03-09 03:23:14 +0000 | [diff] [blame] | 161 | BugReport *NonNullParamChecker::genReportNullAttrNonNull( |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 162 | const ExplodedNode *ErrorNode, const Expr *ArgE) const { |
| 163 | // Lazily allocate the BugType object if it hasn't already been |
| 164 | // created. Ownership is transferred to the BugReporter object once |
| 165 | // the BugReport is passed to 'EmitWarning'. |
| 166 | if (!BTAttrNonNull) |
| 167 | BTAttrNonNull.reset(new BugType( |
Stephen Hines | 651f13c | 2014-04-23 16:59:28 -0700 | [diff] [blame] | 168 | this, "Argument with 'nonnull' attribute passed null", "API")); |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 169 | |
| 170 | BugReport *R = new BugReport(*BTAttrNonNull, |
| 171 | "Null pointer passed as an argument to a 'nonnull' parameter", |
| 172 | ErrorNode); |
| 173 | if (ArgE) |
| 174 | bugreporter::trackNullOrUndefValue(ErrorNode, ArgE, *R); |
| 175 | |
| 176 | return R; |
| 177 | } |
| 178 | |
Anna Zaks | 80412c4 | 2013-03-09 03:23:14 +0000 | [diff] [blame] | 179 | BugReport *NonNullParamChecker::genReportReferenceToNullPointer( |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 180 | const ExplodedNode *ErrorNode, const Expr *ArgE) const { |
| 181 | if (!BTNullRefArg) |
Stephen Hines | 651f13c | 2014-04-23 16:59:28 -0700 | [diff] [blame] | 182 | BTNullRefArg.reset(new BuiltinBug(this, "Dereference of null pointer")); |
Anna Zaks | 018e9aa | 2013-03-07 03:02:36 +0000 | [diff] [blame] | 183 | |
| 184 | BugReport *R = new BugReport(*BTNullRefArg, |
| 185 | "Forming reference to null pointer", |
| 186 | ErrorNode); |
| 187 | if (ArgE) { |
| 188 | const Expr *ArgEDeref = bugreporter::getDerefExpr(ArgE); |
| 189 | if (ArgEDeref == 0) |
| 190 | ArgEDeref = ArgE; |
| 191 | bugreporter::trackNullOrUndefValue(ErrorNode, |
| 192 | ArgEDeref, |
| 193 | *R); |
| 194 | } |
| 195 | return R; |
| 196 | |
| 197 | } |
| 198 | |
Anna Zaks | 80412c4 | 2013-03-09 03:23:14 +0000 | [diff] [blame] | 199 | void ento::registerNonNullParamChecker(CheckerManager &mgr) { |
| 200 | mgr.registerChecker<NonNullParamChecker>(); |
Argyrios Kyrtzidis | bd90076 | 2011-02-28 01:28:01 +0000 | [diff] [blame] | 201 | } |