blob: cebbc65f50859a635e9b5752eee7a472ce348126 [file] [log] [blame]
Gabor Horvath61e7ade2017-09-22 10:16:33 +00001//===-- DeleteWithNonVirtualDtorChecker.cpp -----------------------*- C++ -*--//
2//
Chandler Carruth2946cd72019-01-19 08:50:56 +00003// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
Gabor Horvath61e7ade2017-09-22 10:16:33 +00006//
7//===----------------------------------------------------------------------===//
8//
9// Defines a checker for the OOP52-CPP CERT rule: Do not delete a polymorphic
10// object without a virtual destructor.
11//
12// Diagnostic flags -Wnon-virtual-dtor and -Wdelete-non-virtual-dtor report if
13// an object with a virtual function but a non-virtual destructor exists or is
14// deleted, respectively.
15//
16// This check exceeds them by comparing the dynamic and static types of the
17// object at the point of destruction and only warns if it happens through a
18// pointer to a base type without a virtual destructor. The check places a note
19// at the last point where the conversion from derived to base happened.
20//
21//===----------------------------------------------------------------------===//
22
Kristof Umann76a21502018-12-15 16:23:51 +000023#include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
Gabor Horvath61e7ade2017-09-22 10:16:33 +000024#include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
25#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
26#include "clang/StaticAnalyzer/Core/Checker.h"
27#include "clang/StaticAnalyzer/Core/CheckerManager.h"
28#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
29#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
30#include "clang/StaticAnalyzer/Core/PathSensitive/DynamicTypeMap.h"
31#include "clang/StaticAnalyzer/Core/PathSensitive/ProgramStateTrait.h"
32
33using namespace clang;
34using namespace ento;
35
36namespace {
37class DeleteWithNonVirtualDtorChecker
38 : public Checker<check::PreStmt<CXXDeleteExpr>> {
39 mutable std::unique_ptr<BugType> BT;
40
George Karpenkov70ec1dd2018-06-26 21:12:08 +000041 class DeleteBugVisitor : public BugReporterVisitor {
Gabor Horvath61e7ade2017-09-22 10:16:33 +000042 public:
43 DeleteBugVisitor() : Satisfied(false) {}
44 void Profile(llvm::FoldingSetNodeID &ID) const override {
45 static int X = 0;
46 ID.AddPointer(&X);
47 }
48 std::shared_ptr<PathDiagnosticPiece> VisitNode(const ExplodedNode *N,
Gabor Horvath61e7ade2017-09-22 10:16:33 +000049 BugReporterContext &BRC,
50 BugReport &BR) override;
51
52 private:
53 bool Satisfied;
54 };
55
56public:
57 void checkPreStmt(const CXXDeleteExpr *DE, CheckerContext &C) const;
58};
59} // end anonymous namespace
60
61void DeleteWithNonVirtualDtorChecker::checkPreStmt(const CXXDeleteExpr *DE,
62 CheckerContext &C) const {
63 const Expr *DeletedObj = DE->getArgument();
64 const MemRegion *MR = C.getSVal(DeletedObj).getAsRegion();
65 if (!MR)
66 return;
67
68 const auto *BaseClassRegion = MR->getAs<TypedValueRegion>();
69 const auto *DerivedClassRegion = MR->getBaseRegion()->getAs<SymbolicRegion>();
70 if (!BaseClassRegion || !DerivedClassRegion)
71 return;
72
73 const auto *BaseClass = BaseClassRegion->getValueType()->getAsCXXRecordDecl();
74 const auto *DerivedClass =
75 DerivedClassRegion->getSymbol()->getType()->getPointeeCXXRecordDecl();
76 if (!BaseClass || !DerivedClass)
77 return;
78
79 if (!BaseClass->hasDefinition() || !DerivedClass->hasDefinition())
80 return;
81
82 if (BaseClass->getDestructor()->isVirtual())
83 return;
84
85 if (!DerivedClass->isDerivedFrom(BaseClass))
86 return;
87
88 if (!BT)
89 BT.reset(new BugType(this,
90 "Destruction of a polymorphic object with no "
91 "virtual destructor",
92 "Logic error"));
93
94 ExplodedNode *N = C.generateNonFatalErrorNode();
95 auto R = llvm::make_unique<BugReport>(*BT, BT->getName(), N);
96
97 // Mark region of problematic base class for later use in the BugVisitor.
98 R->markInteresting(BaseClassRegion);
99 R->addVisitor(llvm::make_unique<DeleteBugVisitor>());
100 C.emitReport(std::move(R));
101}
102
103std::shared_ptr<PathDiagnosticPiece>
104DeleteWithNonVirtualDtorChecker::DeleteBugVisitor::VisitNode(
George Karpenkovc82d4572018-09-28 18:49:41 +0000105 const ExplodedNode *N, BugReporterContext &BRC,
Gabor Horvath61e7ade2017-09-22 10:16:33 +0000106 BugReport &BR) {
107 // Stop traversal after the first conversion was found on a path.
108 if (Satisfied)
109 return nullptr;
110
Gabor Horvath61e7ade2017-09-22 10:16:33 +0000111 const Stmt *S = PathDiagnosticLocation::getStmt(N);
112 if (!S)
113 return nullptr;
114
115 const auto *CastE = dyn_cast<CastExpr>(S);
116 if (!CastE)
117 return nullptr;
118
119 // Only interested in DerivedToBase implicit casts.
120 // Explicit casts can have different CastKinds.
121 if (const auto *ImplCastE = dyn_cast<ImplicitCastExpr>(CastE)) {
122 if (ImplCastE->getCastKind() != CK_DerivedToBase)
123 return nullptr;
124 }
125
126 // Region associated with the current cast expression.
George Karpenkovd703ec92018-01-17 20:27:29 +0000127 const MemRegion *M = N->getSVal(CastE).getAsRegion();
Gabor Horvath61e7ade2017-09-22 10:16:33 +0000128 if (!M)
129 return nullptr;
130
131 // Check if target region was marked as problematic previously.
132 if (!BR.isInteresting(M))
133 return nullptr;
134
135 // Stop traversal on this path.
136 Satisfied = true;
137
138 SmallString<256> Buf;
139 llvm::raw_svector_ostream OS(Buf);
140 OS << "Conversion from derived to base happened here";
141 PathDiagnosticLocation Pos(S, BRC.getSourceManager(),
142 N->getLocationContext());
143 return std::make_shared<PathDiagnosticEventPiece>(Pos, OS.str(), true,
144 nullptr);
145}
146
147void ento::registerDeleteWithNonVirtualDtorChecker(CheckerManager &mgr) {
148 mgr.registerChecker<DeleteWithNonVirtualDtorChecker>();
149}