Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 1 | //=== BuiltinFunctionChecker.cpp --------------------------------*- C++ -*-===// |
| 2 | // |
Chandler Carruth | 2946cd7 | 2019-01-19 08:50:56 +0000 | [diff] [blame^] | 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // This checker evaluates clang builtin functions. |
| 10 | // |
| 11 | //===----------------------------------------------------------------------===// |
| 12 | |
Kristof Umann | 76a2150 | 2018-12-15 16:23:51 +0000 | [diff] [blame] | 13 | #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" |
Chandler Carruth | 3a02247 | 2012-12-04 09:13:33 +0000 | [diff] [blame] | 14 | #include "clang/Basic/Builtins.h" |
Argyrios Kyrtzidis | 6a5674f | 2011-03-01 01:16:21 +0000 | [diff] [blame] | 15 | #include "clang/StaticAnalyzer/Core/Checker.h" |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 16 | #include "clang/StaticAnalyzer/Core/CheckerManager.h" |
| 17 | #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 18 | |
| 19 | using namespace clang; |
Ted Kremenek | 98857c9 | 2010-12-23 07:20:52 +0000 | [diff] [blame] | 20 | using namespace ento; |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 21 | |
| 22 | namespace { |
| 23 | |
Argyrios Kyrtzidis | 6a5674f | 2011-03-01 01:16:21 +0000 | [diff] [blame] | 24 | class BuiltinFunctionChecker : public Checker<eval::Call> { |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 25 | public: |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 26 | bool evalCall(const CallExpr *CE, CheckerContext &C) const; |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 27 | }; |
| 28 | |
| 29 | } |
| 30 | |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 31 | bool BuiltinFunctionChecker::evalCall(const CallExpr *CE, |
Anna Zaks | c6aa531 | 2011-12-01 05:57:37 +0000 | [diff] [blame] | 32 | CheckerContext &C) const { |
Ted Kremenek | 49b1e38 | 2012-01-26 21:29:00 +0000 | [diff] [blame] | 33 | ProgramStateRef state = C.getState(); |
Anna Zaks | c6aa531 | 2011-12-01 05:57:37 +0000 | [diff] [blame] | 34 | const FunctionDecl *FD = C.getCalleeDecl(CE); |
Ted Kremenek | 632e3b7 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 35 | const LocationContext *LCtx = C.getLocationContext(); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 36 | if (!FD) |
| 37 | return false; |
| 38 | |
Jordan Rose | 5374c07 | 2013-08-19 16:27:28 +0000 | [diff] [blame] | 39 | switch (FD->getBuiltinID()) { |
| 40 | default: |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 41 | return false; |
| 42 | |
Gabor Horvath | 3a00b41 | 2017-05-12 07:02:54 +0000 | [diff] [blame] | 43 | case Builtin::BI__builtin_assume: { |
| 44 | assert (CE->arg_begin() != CE->arg_end()); |
George Karpenkov | d703ec9 | 2018-01-17 20:27:29 +0000 | [diff] [blame] | 45 | SVal ArgSVal = C.getSVal(CE->getArg(0)); |
Gabor Horvath | 3a00b41 | 2017-05-12 07:02:54 +0000 | [diff] [blame] | 46 | if (ArgSVal.isUndef()) |
| 47 | return true; // Return true to model purity. |
| 48 | |
| 49 | state = state->assume(ArgSVal.castAs<DefinedOrUnknownSVal>(), true); |
| 50 | // FIXME: do we want to warn here? Not right now. The most reports might |
| 51 | // come from infeasible paths, thus being false positives. |
Gabor Horvath | b3bcddf | 2017-06-22 10:09:40 +0000 | [diff] [blame] | 52 | if (!state) { |
| 53 | C.generateSink(C.getState(), C.getPredecessor()); |
Gabor Horvath | 3a00b41 | 2017-05-12 07:02:54 +0000 | [diff] [blame] | 54 | return true; |
Gabor Horvath | b3bcddf | 2017-06-22 10:09:40 +0000 | [diff] [blame] | 55 | } |
Gabor Horvath | 3a00b41 | 2017-05-12 07:02:54 +0000 | [diff] [blame] | 56 | |
| 57 | C.addTransition(state); |
| 58 | return true; |
| 59 | } |
| 60 | |
Sanjay Patel | a24296b | 2015-09-02 20:01:30 +0000 | [diff] [blame] | 61 | case Builtin::BI__builtin_unpredictable: |
Jordan Rose | 78cd51b | 2013-07-12 00:26:14 +0000 | [diff] [blame] | 62 | case Builtin::BI__builtin_expect: |
Jordan Rose | 21933cc | 2014-09-09 21:42:16 +0000 | [diff] [blame] | 63 | case Builtin::BI__builtin_assume_aligned: |
Jordan Rose | 78cd51b | 2013-07-12 00:26:14 +0000 | [diff] [blame] | 64 | case Builtin::BI__builtin_addressof: { |
Sanjay Patel | a24296b | 2015-09-02 20:01:30 +0000 | [diff] [blame] | 65 | // For __builtin_unpredictable, __builtin_expect, and |
| 66 | // __builtin_assume_aligned, just return the value of the subexpression. |
Jordan Rose | 78cd51b | 2013-07-12 00:26:14 +0000 | [diff] [blame] | 67 | // __builtin_addressof is going from a reference to a pointer, but those |
| 68 | // are represented the same way in the analyzer. |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 69 | assert (CE->arg_begin() != CE->arg_end()); |
George Karpenkov | d703ec9 | 2018-01-17 20:27:29 +0000 | [diff] [blame] | 70 | SVal X = C.getSVal(*(CE->arg_begin())); |
Ted Kremenek | 632e3b7 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 71 | C.addTransition(state->BindExpr(CE, LCtx, X)); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 72 | return true; |
| 73 | } |
| 74 | |
David Majnemer | 5116993 | 2016-10-31 05:37:48 +0000 | [diff] [blame] | 75 | case Builtin::BI__builtin_alloca_with_align: |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 76 | case Builtin::BI__builtin_alloca: { |
| 77 | // FIXME: Refactor into StoreManager itself? |
| 78 | MemRegionManager& RM = C.getStoreManager().getRegionManager(); |
Jordy Rose | 674bd55 | 2010-07-04 00:00:41 +0000 | [diff] [blame] | 79 | const AllocaRegion* R = |
Ted Kremenek | d94854a | 2012-08-22 06:26:15 +0000 | [diff] [blame] | 80 | RM.getAllocaRegion(CE, C.blockCount(), C.getLocationContext()); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 81 | |
| 82 | // Set the extent of the region in bytes. This enables us to use the |
| 83 | // SVal of the argument directly. If we save the extent in bits, we |
| 84 | // cannot represent values like symbol*8. |
George Karpenkov | d703ec9 | 2018-01-17 20:27:29 +0000 | [diff] [blame] | 85 | auto Size = C.getSVal(*(CE->arg_begin())).castAs<DefinedOrUnknownSVal>(); |
Jordy Rose | 674bd55 | 2010-07-04 00:00:41 +0000 | [diff] [blame] | 86 | |
Ted Kremenek | 90af909 | 2010-12-02 07:49:45 +0000 | [diff] [blame] | 87 | SValBuilder& svalBuilder = C.getSValBuilder(); |
| 88 | DefinedOrUnknownSVal Extent = R->getExtent(svalBuilder); |
| 89 | DefinedOrUnknownSVal extentMatchesSizeArg = |
Ted Kremenek | dc89142 | 2010-12-01 21:57:22 +0000 | [diff] [blame] | 90 | svalBuilder.evalEQ(state, Extent, Size); |
Ted Kremenek | 90af909 | 2010-12-02 07:49:45 +0000 | [diff] [blame] | 91 | state = state->assume(extentMatchesSizeArg, true); |
Anna Zaks | e3beeaa | 2012-11-26 19:11:46 +0000 | [diff] [blame] | 92 | assert(state && "The region should not have any previous constraints"); |
Jordy Rose | 674bd55 | 2010-07-04 00:00:41 +0000 | [diff] [blame] | 93 | |
Ted Kremenek | 632e3b7 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 94 | C.addTransition(state->BindExpr(CE, LCtx, loc::MemRegionVal(R))); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 95 | return true; |
| 96 | } |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 97 | |
Artem Dergachev | f3e09bd | 2018-02-10 00:51:47 +0000 | [diff] [blame] | 98 | case Builtin::BI__builtin_object_size: |
| 99 | case Builtin::BI__builtin_constant_p: { |
Jordan Rose | 5374c07 | 2013-08-19 16:27:28 +0000 | [diff] [blame] | 100 | // This must be resolvable at compile time, so we defer to the constant |
| 101 | // evaluator for a value. |
| 102 | SVal V = UnknownVal(); |
Fangrui Song | 407659a | 2018-11-30 23:41:18 +0000 | [diff] [blame] | 103 | Expr::EvalResult EVResult; |
| 104 | if (CE->EvaluateAsInt(EVResult, C.getASTContext(), Expr::SE_NoSideEffects)) { |
Jordan Rose | 5374c07 | 2013-08-19 16:27:28 +0000 | [diff] [blame] | 105 | // Make sure the result has the correct type. |
Fangrui Song | 407659a | 2018-11-30 23:41:18 +0000 | [diff] [blame] | 106 | llvm::APSInt Result = EVResult.Val.getInt(); |
Jordan Rose | 5374c07 | 2013-08-19 16:27:28 +0000 | [diff] [blame] | 107 | SValBuilder &SVB = C.getSValBuilder(); |
| 108 | BasicValueFactory &BVF = SVB.getBasicValueFactory(); |
| 109 | BVF.getAPSIntType(CE->getType()).apply(Result); |
| 110 | V = SVB.makeIntVal(Result); |
| 111 | } |
| 112 | |
| 113 | C.addTransition(state->BindExpr(CE, LCtx, V)); |
| 114 | return true; |
| 115 | } |
| 116 | } |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 117 | } |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 118 | |
| 119 | void ento::registerBuiltinFunctionChecker(CheckerManager &mgr) { |
| 120 | mgr.registerChecker<BuiltinFunctionChecker>(); |
| 121 | } |