blob: afadc058a803b4786c2a918a6e13471cff65492e [file] [log] [blame]
Zhongxing Xu72269ec2009-11-24 04:45:44 +00001//===--- CallAndMessageChecker.cpp ------------------------------*- C++ -*--==//
Zhongxing Xuab162e12009-11-03 06:46:03 +00002//
Chandler Carruth2946cd72019-01-19 08:50:56 +00003// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
Zhongxing Xuab162e12009-11-03 06:46:03 +00006//
7//===----------------------------------------------------------------------===//
8//
Zhongxing Xu72269ec2009-11-24 04:45:44 +00009// This defines CallAndMessageChecker, a builtin checker that checks for various
10// errors of call and objc message expressions.
Zhongxing Xuab162e12009-11-03 06:46:03 +000011//
12//===----------------------------------------------------------------------===//
13
Kristof Umann76a21502018-12-15 16:23:51 +000014#include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
Chandler Carruth3a022472012-12-04 09:13:33 +000015#include "clang/AST/ParentMap.h"
16#include "clang/Basic/TargetInfo.h"
17#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
Argyrios Kyrtzidis6a5674f2011-03-01 01:16:21 +000018#include "clang/StaticAnalyzer/Core/Checker.h"
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +000019#include "clang/StaticAnalyzer/Core/CheckerManager.h"
Jordan Rose4f7df9b2012-07-26 21:39:41 +000020#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +000021#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
Benjamin Kramer49038022012-02-04 13:45:25 +000022#include "llvm/ADT/SmallString.h"
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +000023#include "llvm/ADT/StringExtras.h"
Benjamin Kramer444a1302012-12-01 17:12:56 +000024#include "llvm/Support/raw_ostream.h"
Zhongxing Xuab162e12009-11-03 06:46:03 +000025
26using namespace clang;
Ted Kremenek98857c92010-12-23 07:20:52 +000027using namespace ento;
Zhongxing Xuab162e12009-11-03 06:46:03 +000028
Ted Kremenek43253152009-11-11 05:50:44 +000029namespace {
Jordan Rose821a3a02014-03-13 17:55:39 +000030
31struct ChecksFilter {
32 DefaultBool Check_CallAndMessageUnInitRefArg;
33 DefaultBool Check_CallAndMessageChecker;
34
35 CheckName CheckName_CallAndMessageUnInitRefArg;
36 CheckName CheckName_CallAndMessageChecker;
37};
38
Kovarththanan Rajaratnam65c65662009-11-28 06:07:30 +000039class CallAndMessageChecker
Jordan Rose867b185e2013-08-09 00:55:47 +000040 : public Checker< check::PreStmt<CallExpr>,
41 check::PreStmt<CXXDeleteExpr>,
42 check::PreObjCMessage,
Devin Coughlinca5ab2b2015-09-15 01:13:53 +000043 check::ObjCMessageNil,
Jordan Rose682b3162012-07-02 19:28:21 +000044 check::PreCall > {
Ahmed Charlesb8984322014-03-07 20:03:18 +000045 mutable std::unique_ptr<BugType> BT_call_null;
46 mutable std::unique_ptr<BugType> BT_call_undef;
47 mutable std::unique_ptr<BugType> BT_cxx_call_null;
48 mutable std::unique_ptr<BugType> BT_cxx_call_undef;
49 mutable std::unique_ptr<BugType> BT_call_arg;
50 mutable std::unique_ptr<BugType> BT_cxx_delete_undef;
51 mutable std::unique_ptr<BugType> BT_msg_undef;
52 mutable std::unique_ptr<BugType> BT_objc_prop_undef;
53 mutable std::unique_ptr<BugType> BT_objc_subscript_undef;
54 mutable std::unique_ptr<BugType> BT_msg_arg;
55 mutable std::unique_ptr<BugType> BT_msg_ret;
56 mutable std::unique_ptr<BugType> BT_call_few_args;
57
Ted Kremenek43253152009-11-11 05:50:44 +000058public:
Jordan Rose821a3a02014-03-13 17:55:39 +000059 ChecksFilter Filter;
Zhongxing Xu9e200792009-11-24 07:06:39 +000060
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +000061 void checkPreStmt(const CallExpr *CE, CheckerContext &C) const;
Jordan Rose867b185e2013-08-09 00:55:47 +000062 void checkPreStmt(const CXXDeleteExpr *DE, CheckerContext &C) const;
Jordan Rose547060b2012-07-02 19:28:04 +000063 void checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const;
Devin Coughlinca5ab2b2015-09-15 01:13:53 +000064
65 /// Fill in the return value that results from messaging nil based on the
66 /// return type and architecture and diagnose if the return value will be
67 /// garbage.
68 void checkObjCMessageNil(const ObjCMethodCall &msg, CheckerContext &C) const;
69
Jordan Rose682b3162012-07-02 19:28:21 +000070 void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
Ted Kremenek005e8a02009-11-24 21:41:28 +000071
Ted Kremenekcaf2c512009-11-21 01:25:37 +000072private:
Jordan Rose821a3a02014-03-13 17:55:39 +000073 bool PreVisitProcessArg(CheckerContext &C, SVal V, SourceRange ArgRange,
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +000074 const Expr *ArgEx, int ArgumentNumber,
Jordan Rose821a3a02014-03-13 17:55:39 +000075 bool CheckUninitFields, const CallEvent &Call,
76 std::unique_ptr<BugType> &BT,
77 const ParmVarDecl *ParamDecl) const;
Ted Kremenekc342c9c2010-03-18 03:22:29 +000078
Jordan Rose92e14492012-08-03 23:08:49 +000079 static void emitBadCall(BugType *BT, CheckerContext &C, const Expr *BadE);
Jordan Rose547060b2012-07-02 19:28:04 +000080 void emitNilReceiverBug(CheckerContext &C, const ObjCMethodCall &msg,
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +000081 ExplodedNode *N) const;
Ted Kremenek9c05f4e2010-03-18 02:17:27 +000082
Ted Kremenek001fd5b2011-08-15 22:09:50 +000083 void HandleNilReceiver(CheckerContext &C,
Ted Kremenek49b1e382012-01-26 21:29:00 +000084 ProgramStateRef state,
Jordan Rose547060b2012-07-02 19:28:04 +000085 const ObjCMethodCall &msg) const;
Ted Kremenek9c05f4e2010-03-18 02:17:27 +000086
Ahmed Charlesb8984322014-03-07 20:03:18 +000087 void LazyInit_BT(const char *desc, std::unique_ptr<BugType> &BT) const {
Ted Kremenekc342c9c2010-03-18 03:22:29 +000088 if (!BT)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +000089 BT.reset(new BuiltinBug(this, desc));
Ted Kremenek9c05f4e2010-03-18 02:17:27 +000090 }
Jordan Rose821a3a02014-03-13 17:55:39 +000091 bool uninitRefOrPointer(CheckerContext &C, const SVal &V,
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +000092 SourceRange ArgRange, const Expr *ArgEx,
93 std::unique_ptr<BugType> &BT,
94 const ParmVarDecl *ParamDecl, const char *BD,
95 int ArgumentNumber) const;
Ted Kremenek43253152009-11-11 05:50:44 +000096};
97} // end anonymous namespace
98
Jordan Rose92e14492012-08-03 23:08:49 +000099void CallAndMessageChecker::emitBadCall(BugType *BT, CheckerContext &C,
100 const Expr *BadE) {
Devin Coughline39bd402015-09-16 22:03:05 +0000101 ExplodedNode *N = C.generateErrorNode();
Ted Kremenekcaf2c512009-11-21 01:25:37 +0000102 if (!N)
103 return;
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000104
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000105 auto R = llvm::make_unique<BugReport>(*BT, BT->getName(), N);
Jordan Rose92e14492012-08-03 23:08:49 +0000106 if (BadE) {
107 R->addRange(BadE->getSourceRange());
Jordan Roseaea020f2013-01-26 01:28:23 +0000108 if (BadE->isGLValue())
109 BadE = bugreporter::getDerefExpr(BadE);
George Karpenkovb2cf0062018-10-23 18:24:53 +0000110 bugreporter::trackExpressionValue(N, BadE, *R);
Jordan Rose92e14492012-08-03 23:08:49 +0000111 }
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000112 C.emitReport(std::move(R));
Ted Kremenekcaf2c512009-11-21 01:25:37 +0000113}
114
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000115static void describeUninitializedArgumentInCall(const CallEvent &Call,
116 int ArgumentNumber,
117 llvm::raw_svector_ostream &Os) {
Jordan Rose627b0462012-07-18 21:59:51 +0000118 switch (Call.getKind()) {
119 case CE_ObjCMessage: {
120 const ObjCMethodCall &Msg = cast<ObjCMethodCall>(Call);
121 switch (Msg.getMessageKind()) {
122 case OCM_Message:
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000123 Os << (ArgumentNumber + 1) << llvm::getOrdinalSuffix(ArgumentNumber + 1)
124 << " argument in message expression is an uninitialized value";
125 return;
Jordan Rose627b0462012-07-18 21:59:51 +0000126 case OCM_PropertyAccess:
127 assert(Msg.isSetter() && "Getters have no args");
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000128 Os << "Argument for property setter is an uninitialized value";
129 return;
Jordan Rose627b0462012-07-18 21:59:51 +0000130 case OCM_Subscript:
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000131 if (Msg.isSetter() && (ArgumentNumber == 0))
132 Os << "Argument for subscript setter is an uninitialized value";
133 else
134 Os << "Subscript index is an uninitialized value";
135 return;
Jordan Rose627b0462012-07-18 21:59:51 +0000136 }
137 llvm_unreachable("Unknown message kind.");
138 }
139 case CE_Block:
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000140 Os << (ArgumentNumber + 1) << llvm::getOrdinalSuffix(ArgumentNumber + 1)
141 << " block call argument is an uninitialized value";
142 return;
Jordan Rose627b0462012-07-18 21:59:51 +0000143 default:
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000144 Os << (ArgumentNumber + 1) << llvm::getOrdinalSuffix(ArgumentNumber + 1)
145 << " function call argument is an uninitialized value";
146 return;
Jordan Rose627b0462012-07-18 21:59:51 +0000147 }
148}
149
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000150bool CallAndMessageChecker::uninitRefOrPointer(
151 CheckerContext &C, const SVal &V, SourceRange ArgRange, const Expr *ArgEx,
152 std::unique_ptr<BugType> &BT, const ParmVarDecl *ParamDecl, const char *BD,
153 int ArgumentNumber) const {
Jordan Rose821a3a02014-03-13 17:55:39 +0000154 if (!Filter.Check_CallAndMessageUnInitRefArg)
155 return false;
156
157 // No parameter declaration available, i.e. variadic function argument.
158 if(!ParamDecl)
159 return false;
160
161 // If parameter is declared as pointer to const in function declaration,
162 // then check if corresponding argument in function call is
163 // pointing to undefined symbol value (uninitialized memory).
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000164 SmallString<200> Buf;
165 llvm::raw_svector_ostream Os(Buf);
Jordan Rose821a3a02014-03-13 17:55:39 +0000166
167 if (ParamDecl->getType()->isPointerType()) {
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000168 Os << (ArgumentNumber + 1) << llvm::getOrdinalSuffix(ArgumentNumber + 1)
169 << " function call argument is a pointer to uninitialized value";
Jordan Rose821a3a02014-03-13 17:55:39 +0000170 } else if (ParamDecl->getType()->isReferenceType()) {
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000171 Os << (ArgumentNumber + 1) << llvm::getOrdinalSuffix(ArgumentNumber + 1)
172 << " function call argument is an uninitialized value";
Jordan Rose821a3a02014-03-13 17:55:39 +0000173 } else
174 return false;
175
176 if(!ParamDecl->getType()->getPointeeType().isConstQualified())
177 return false;
178
179 if (const MemRegion *SValMemRegion = V.getAsRegion()) {
180 const ProgramStateRef State = C.getState();
Artem Dergachev3ef5deb2017-12-12 02:27:55 +0000181 const SVal PSV = State->getSVal(SValMemRegion, C.getASTContext().CharTy);
Jordan Rose821a3a02014-03-13 17:55:39 +0000182 if (PSV.isUndef()) {
Devin Coughline39bd402015-09-16 22:03:05 +0000183 if (ExplodedNode *N = C.generateErrorNode()) {
Jordan Rose821a3a02014-03-13 17:55:39 +0000184 LazyInit_BT(BD, BT);
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000185 auto R = llvm::make_unique<BugReport>(*BT, Os.str(), N);
Jordan Rose821a3a02014-03-13 17:55:39 +0000186 R->addRange(ArgRange);
George Karpenkovb2cf0062018-10-23 18:24:53 +0000187 if (ArgEx)
188 bugreporter::trackExpressionValue(N, ArgEx, *R);
189
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000190 C.emitReport(std::move(R));
Jordan Rose821a3a02014-03-13 17:55:39 +0000191 }
192 return true;
193 }
194 }
195 return false;
196}
197
Benjamin Kramerc55e9972018-10-13 22:18:22 +0000198namespace {
George Karpenkoveae57a22018-08-29 20:29:39 +0000199class FindUninitializedField {
200public:
201 SmallVector<const FieldDecl *, 10> FieldChain;
202
203private:
204 StoreManager &StoreMgr;
205 MemRegionManager &MrMgr;
206 Store store;
207
208public:
209 FindUninitializedField(StoreManager &storeMgr, MemRegionManager &mrMgr,
210 Store s)
211 : StoreMgr(storeMgr), MrMgr(mrMgr), store(s) {}
212
213 bool Find(const TypedValueRegion *R) {
214 QualType T = R->getValueType();
215 if (const RecordType *RT = T->getAsStructureType()) {
216 const RecordDecl *RD = RT->getDecl()->getDefinition();
217 assert(RD && "Referred record has no definition");
218 for (const auto *I : RD->fields()) {
219 const FieldRegion *FR = MrMgr.getFieldRegion(I, R);
220 FieldChain.push_back(I);
221 T = I->getType();
222 if (T->getAsStructureType()) {
223 if (Find(FR))
224 return true;
225 } else {
226 const SVal &V = StoreMgr.getBinding(store, loc::MemRegionVal(FR));
227 if (V.isUndef())
228 return true;
229 }
230 FieldChain.pop_back();
231 }
232 }
233
234 return false;
235 }
236};
Benjamin Kramerc55e9972018-10-13 22:18:22 +0000237} // namespace
George Karpenkoveae57a22018-08-29 20:29:39 +0000238
Jordan Rose821a3a02014-03-13 17:55:39 +0000239bool CallAndMessageChecker::PreVisitProcessArg(CheckerContext &C,
240 SVal V,
241 SourceRange ArgRange,
242 const Expr *ArgEx,
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000243 int ArgumentNumber,
Jordan Rose821a3a02014-03-13 17:55:39 +0000244 bool CheckUninitFields,
245 const CallEvent &Call,
246 std::unique_ptr<BugType> &BT,
247 const ParmVarDecl *ParamDecl
248 ) const {
249 const char *BD = "Uninitialized argument value";
250
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000251 if (uninitRefOrPointer(C, V, ArgRange, ArgEx, BT, ParamDecl, BD,
252 ArgumentNumber))
Jordan Rose821a3a02014-03-13 17:55:39 +0000253 return true;
254
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000255 if (V.isUndef()) {
Devin Coughline39bd402015-09-16 22:03:05 +0000256 if (ExplodedNode *N = C.generateErrorNode()) {
Jordan Rose821a3a02014-03-13 17:55:39 +0000257 LazyInit_BT(BD, BT);
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000258 // Generate a report for this bug.
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000259 SmallString<200> Buf;
260 llvm::raw_svector_ostream Os(Buf);
261 describeUninitializedArgumentInCall(Call, ArgumentNumber, Os);
262 auto R = llvm::make_unique<BugReport>(*BT, Os.str(), N);
263
Jordan Rose821a3a02014-03-13 17:55:39 +0000264 R->addRange(ArgRange);
265 if (ArgEx)
George Karpenkovb2cf0062018-10-23 18:24:53 +0000266 bugreporter::trackExpressionValue(N, ArgEx, *R);
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000267 C.emitReport(std::move(R));
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000268 }
269 return true;
270 }
271
Jordan Rose821a3a02014-03-13 17:55:39 +0000272 if (!CheckUninitFields)
Ted Kremenek6762a942012-03-05 23:57:14 +0000273 return false;
David Blaikie2fdacbc2013-02-20 05:52:05 +0000274
George Karpenkoveae57a22018-08-29 20:29:39 +0000275 if (auto LV = V.getAs<nonloc::LazyCompoundVal>()) {
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000276 const LazyCompoundValData *D = LV->getCVData();
Benjamin Kramerd1d76b22012-06-06 17:32:50 +0000277 FindUninitializedField F(C.getState()->getStateManager().getStoreManager(),
Ted Kremenek90af9092010-12-02 07:49:45 +0000278 C.getSValBuilder().getRegionManager(),
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000279 D->getStore());
280
281 if (F.Find(D->getRegion())) {
Devin Coughline39bd402015-09-16 22:03:05 +0000282 if (ExplodedNode *N = C.generateErrorNode()) {
Jordan Rose821a3a02014-03-13 17:55:39 +0000283 LazyInit_BT(BD, BT);
Dylan Noblesmith2c1dd272012-02-05 02:13:05 +0000284 SmallString<512> Str;
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000285 llvm::raw_svector_ostream os(Str);
286 os << "Passed-by-value struct argument contains uninitialized data";
287
288 if (F.FieldChain.size() == 1)
Benjamin Kramerb89514a2011-10-14 18:45:37 +0000289 os << " (e.g., field: '" << *F.FieldChain[0] << "')";
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000290 else {
291 os << " (e.g., via the field chain: '";
292 bool first = true;
Chris Lattner0e62c1c2011-07-23 10:55:15 +0000293 for (SmallVectorImpl<const FieldDecl *>::iterator
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000294 DI = F.FieldChain.begin(), DE = F.FieldChain.end(); DI!=DE;++DI){
295 if (first)
296 first = false;
297 else
298 os << '.';
Benjamin Kramerb89514a2011-10-14 18:45:37 +0000299 os << **DI;
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000300 }
301 os << "')";
302 }
303
304 // Generate a report for this bug.
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000305 auto R = llvm::make_unique<BugReport>(*BT, os.str(), N);
Jordan Rose821a3a02014-03-13 17:55:39 +0000306 R->addRange(ArgRange);
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000307
George Karpenkov574d78e2018-08-29 22:48:50 +0000308 if (ArgEx)
George Karpenkovb2cf0062018-10-23 18:24:53 +0000309 bugreporter::trackExpressionValue(N, ArgEx, *R);
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000310 // FIXME: enhance track back for uninitialized value for arbitrary
311 // memregions
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000312 C.emitReport(std::move(R));
Ted Kremenekc342c9c2010-03-18 03:22:29 +0000313 }
314 return true;
315 }
316 }
317
318 return false;
319}
320
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +0000321void CallAndMessageChecker::checkPreStmt(const CallExpr *CE,
322 CheckerContext &C) const{
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000323
Ted Kremenekcaf2c512009-11-21 01:25:37 +0000324 const Expr *Callee = CE->getCallee()->IgnoreParens();
Jordan Rose29953492012-07-02 19:27:46 +0000325 ProgramStateRef State = C.getState();
Ted Kremenek632e3b72012-01-06 22:09:28 +0000326 const LocationContext *LCtx = C.getLocationContext();
Jordan Rose29953492012-07-02 19:27:46 +0000327 SVal L = State->getSVal(Callee, LCtx);
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000328
Ted Kremenekcaf2c512009-11-21 01:25:37 +0000329 if (L.isUndef()) {
330 if (!BT_call_undef)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000331 BT_call_undef.reset(new BuiltinBug(
Chih-Hung Hsiehd0891862016-03-23 16:14:12 +0000332 this, "Called function pointer is an uninitialized pointer value"));
Jordan Rose92e14492012-08-03 23:08:49 +0000333 emitBadCall(BT_call_undef.get(), C, Callee);
Ted Kremenekcaf2c512009-11-21 01:25:37 +0000334 return;
335 }
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000336
Jordan Rosea01741f2012-08-04 01:04:52 +0000337 ProgramStateRef StNonNull, StNull;
Benjamin Kramer867ea1d2014-03-02 13:01:17 +0000338 std::tie(StNonNull, StNull) = State->assume(L.castAs<DefinedOrUnknownSVal>());
Jordan Rosea01741f2012-08-04 01:04:52 +0000339
Jordan Rosea01741f2012-08-04 01:04:52 +0000340 if (StNull && !StNonNull) {
Ted Kremenekcaf2c512009-11-21 01:25:37 +0000341 if (!BT_call_null)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000342 BT_call_null.reset(new BuiltinBug(
343 this, "Called function pointer is null (null dereference)"));
Jordan Rose92e14492012-08-03 23:08:49 +0000344 emitBadCall(BT_call_null.get(), C, Callee);
Jordan Rose44e066c2013-10-02 01:20:28 +0000345 return;
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000346 }
Jordan Rose83e40492012-08-15 21:56:23 +0000347
348 C.addTransition(StNonNull);
Jordan Rose682b3162012-07-02 19:28:21 +0000349}
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000350
Jordan Rose867b185e2013-08-09 00:55:47 +0000351void CallAndMessageChecker::checkPreStmt(const CXXDeleteExpr *DE,
352 CheckerContext &C) const {
353
354 SVal Arg = C.getSVal(DE->getArgument());
355 if (Arg.isUndef()) {
356 StringRef Desc;
Devin Coughline39bd402015-09-16 22:03:05 +0000357 ExplodedNode *N = C.generateErrorNode();
Jordan Rose867b185e2013-08-09 00:55:47 +0000358 if (!N)
359 return;
360 if (!BT_cxx_delete_undef)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000361 BT_cxx_delete_undef.reset(
362 new BuiltinBug(this, "Uninitialized argument value"));
Jordan Rose867b185e2013-08-09 00:55:47 +0000363 if (DE->isArrayFormAsWritten())
364 Desc = "Argument to 'delete[]' is uninitialized";
365 else
366 Desc = "Argument to 'delete' is uninitialized";
367 BugType *BT = BT_cxx_delete_undef.get();
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000368 auto R = llvm::make_unique<BugReport>(*BT, Desc, N);
George Karpenkovb2cf0062018-10-23 18:24:53 +0000369 bugreporter::trackExpressionValue(N, DE, *R);
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000370 C.emitReport(std::move(R));
Jordan Rose867b185e2013-08-09 00:55:47 +0000371 return;
372 }
373}
374
Jordan Rose682b3162012-07-02 19:28:21 +0000375void CallAndMessageChecker::checkPreCall(const CallEvent &Call,
376 CheckerContext &C) const {
Jordan Rose83e40492012-08-15 21:56:23 +0000377 ProgramStateRef State = C.getState();
378
Ted Kremenekfaef9cb2012-07-26 00:22:32 +0000379 // If this is a call to a C++ method, check if the callee is null or
380 // undefined.
Jordan Rose92e14492012-08-03 23:08:49 +0000381 if (const CXXInstanceCall *CC = dyn_cast<CXXInstanceCall>(&Call)) {
Ted Kremenekfaef9cb2012-07-26 00:22:32 +0000382 SVal V = CC->getCXXThisVal();
383 if (V.isUndef()) {
384 if (!BT_cxx_call_undef)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000385 BT_cxx_call_undef.reset(
386 new BuiltinBug(this, "Called C++ object pointer is uninitialized"));
Jordan Rose92e14492012-08-03 23:08:49 +0000387 emitBadCall(BT_cxx_call_undef.get(), C, CC->getCXXThisExpr());
Ted Kremenekfaef9cb2012-07-26 00:22:32 +0000388 return;
389 }
Jordan Rosea01741f2012-08-04 01:04:52 +0000390
Jordan Rosea01741f2012-08-04 01:04:52 +0000391 ProgramStateRef StNonNull, StNull;
Benjamin Kramer867ea1d2014-03-02 13:01:17 +0000392 std::tie(StNonNull, StNull) =
David Blaikie2fdacbc2013-02-20 05:52:05 +0000393 State->assume(V.castAs<DefinedOrUnknownSVal>());
Jordan Rosea01741f2012-08-04 01:04:52 +0000394
Jordan Rosea01741f2012-08-04 01:04:52 +0000395 if (StNull && !StNonNull) {
Ted Kremenekfaef9cb2012-07-26 00:22:32 +0000396 if (!BT_cxx_call_null)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000397 BT_cxx_call_null.reset(
398 new BuiltinBug(this, "Called C++ object pointer is null"));
Jordan Rose92e14492012-08-03 23:08:49 +0000399 emitBadCall(BT_cxx_call_null.get(), C, CC->getCXXThisExpr());
Ted Kremenekfaef9cb2012-07-26 00:22:32 +0000400 return;
401 }
Jordan Rose83e40492012-08-15 21:56:23 +0000402
403 State = StNonNull;
Ted Kremenekfaef9cb2012-07-26 00:22:32 +0000404 }
405
Pavel Labath963f91b2013-06-19 08:19:56 +0000406 const Decl *D = Call.getDecl();
Devin Coughlin8693adf2016-11-15 18:40:46 +0000407 if (D && (isa<FunctionDecl>(D) || isa<BlockDecl>(D))) {
408 // If we have a function or block declaration, we can make sure we pass
409 // enough parameters.
410 unsigned Params = Call.parameters().size();
Pavel Labath963f91b2013-06-19 08:19:56 +0000411 if (Call.getNumArgs() < Params) {
Devin Coughline39bd402015-09-16 22:03:05 +0000412 ExplodedNode *N = C.generateErrorNode();
Pavel Labath963f91b2013-06-19 08:19:56 +0000413 if (!N)
414 return;
415
416 LazyInit_BT("Function call with too few arguments", BT_call_few_args);
417
418 SmallString<512> Str;
419 llvm::raw_svector_ostream os(Str);
Devin Coughlin8693adf2016-11-15 18:40:46 +0000420 if (isa<FunctionDecl>(D)) {
421 os << "Function ";
422 } else {
423 assert(isa<BlockDecl>(D));
424 os << "Block ";
425 }
426 os << "taking " << Params << " argument"
427 << (Params == 1 ? "" : "s") << " is called with fewer ("
Pavel Labath963f91b2013-06-19 08:19:56 +0000428 << Call.getNumArgs() << ")";
429
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000430 C.emitReport(
431 llvm::make_unique<BugReport>(*BT_call_few_args, os.str(), N));
Pavel Labath963f91b2013-06-19 08:19:56 +0000432 }
433 }
434
Jordan Rose682b3162012-07-02 19:28:21 +0000435 // Don't check for uninitialized field values in arguments if the
436 // caller has a body that is available and we have the chance to inline it.
437 // This is a hack, but is a reasonable compromise betweens sometimes warning
438 // and sometimes not depending on if we decide to inline a function.
Jordan Rose682b3162012-07-02 19:28:21 +0000439 const bool checkUninitFields =
Ted Kremenekfaef9cb2012-07-26 00:22:32 +0000440 !(C.getAnalysisManager().shouldInlineCall() && (D && D->getBody()));
Jordan Rose682b3162012-07-02 19:28:21 +0000441
Ahmed Charlesb8984322014-03-07 20:03:18 +0000442 std::unique_ptr<BugType> *BT;
Jordan Rose627b0462012-07-18 21:59:51 +0000443 if (isa<ObjCMethodCall>(Call))
Jordan Rose682b3162012-07-02 19:28:21 +0000444 BT = &BT_msg_arg;
Jordan Rose627b0462012-07-18 21:59:51 +0000445 else
Jordan Rose682b3162012-07-02 19:28:21 +0000446 BT = &BT_call_arg;
Jordan Rose682b3162012-07-02 19:28:21 +0000447
Devin Coughlin8693adf2016-11-15 18:40:46 +0000448 const FunctionDecl *FD = dyn_cast_or_null<FunctionDecl>(D);
Jordan Rose821a3a02014-03-13 17:55:39 +0000449 for (unsigned i = 0, e = Call.getNumArgs(); i != e; ++i) {
Craig Topper0dbb7832014-05-27 02:45:47 +0000450 const ParmVarDecl *ParamDecl = nullptr;
Jordan Rose821a3a02014-03-13 17:55:39 +0000451 if(FD && i < FD->getNumParams())
452 ParamDecl = FD->getParamDecl(i);
Jordan Rose627b0462012-07-18 21:59:51 +0000453 if (PreVisitProcessArg(C, Call.getArgSVal(i), Call.getArgSourceRange(i),
Daniel Marjamaki3d8d6ed2017-03-08 15:22:24 +0000454 Call.getArgExpr(i), i,
Jordan Rose821a3a02014-03-13 17:55:39 +0000455 checkUninitFields, Call, *BT, ParamDecl))
Jordan Rose682b3162012-07-02 19:28:21 +0000456 return;
Jordan Rose821a3a02014-03-13 17:55:39 +0000457 }
Jordan Rose83e40492012-08-15 21:56:23 +0000458
459 // If we make it here, record our assumptions about the callee.
460 C.addTransition(State);
Ted Kremenekf7adea42009-11-21 00:49:41 +0000461}
462
Jordan Rose547060b2012-07-02 19:28:04 +0000463void CallAndMessageChecker::checkPreObjCMessage(const ObjCMethodCall &msg,
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +0000464 CheckerContext &C) const {
Jordan Rose547060b2012-07-02 19:28:04 +0000465 SVal recVal = msg.getReceiverSVal();
466 if (recVal.isUndef()) {
Devin Coughline39bd402015-09-16 22:03:05 +0000467 if (ExplodedNode *N = C.generateErrorNode()) {
Craig Topper0dbb7832014-05-27 02:45:47 +0000468 BugType *BT = nullptr;
Jordan Rose627b0462012-07-18 21:59:51 +0000469 switch (msg.getMessageKind()) {
470 case OCM_Message:
Jordan Rose547060b2012-07-02 19:28:04 +0000471 if (!BT_msg_undef)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000472 BT_msg_undef.reset(new BuiltinBug(this,
473 "Receiver in message expression "
Jordan Rose547060b2012-07-02 19:28:04 +0000474 "is an uninitialized value"));
475 BT = BT_msg_undef.get();
Jordan Rose627b0462012-07-18 21:59:51 +0000476 break;
477 case OCM_PropertyAccess:
478 if (!BT_objc_prop_undef)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000479 BT_objc_prop_undef.reset(new BuiltinBug(
480 this, "Property access on an uninitialized object pointer"));
Jordan Rose627b0462012-07-18 21:59:51 +0000481 BT = BT_objc_prop_undef.get();
482 break;
483 case OCM_Subscript:
484 if (!BT_objc_subscript_undef)
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000485 BT_objc_subscript_undef.reset(new BuiltinBug(
486 this, "Subscript access on an uninitialized object pointer"));
Jordan Rose627b0462012-07-18 21:59:51 +0000487 BT = BT_objc_subscript_undef.get();
488 break;
Jordan Rose547060b2012-07-02 19:28:04 +0000489 }
Jordan Rose627b0462012-07-18 21:59:51 +0000490 assert(BT && "Unknown message kind.");
491
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000492 auto R = llvm::make_unique<BugReport>(*BT, BT->getName(), N);
Jordan Rose627b0462012-07-18 21:59:51 +0000493 const ObjCMessageExpr *ME = msg.getOriginExpr();
494 R->addRange(ME->getReceiverRange());
Ted Kremenekf7adea42009-11-21 00:49:41 +0000495
Jordan Rose547060b2012-07-02 19:28:04 +0000496 // FIXME: getTrackNullOrUndefValueVisitor can't handle "super" yet.
Jordan Rose627b0462012-07-18 21:59:51 +0000497 if (const Expr *ReceiverE = ME->getInstanceReceiver())
George Karpenkovb2cf0062018-10-23 18:24:53 +0000498 bugreporter::trackExpressionValue(N, ReceiverE, *R);
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000499 C.emitReport(std::move(R));
Jordan Rose547060b2012-07-02 19:28:04 +0000500 }
501 return;
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +0000502 }
Zhongxing Xuaf353292009-12-02 05:49:12 +0000503}
Zhongxing Xu9e200792009-11-24 07:06:39 +0000504
Devin Coughlinca5ab2b2015-09-15 01:13:53 +0000505void CallAndMessageChecker::checkObjCMessageNil(const ObjCMethodCall &msg,
506 CheckerContext &C) const {
507 HandleNilReceiver(C, C.getState(), msg);
508}
509
Ted Kremenek90af9092010-12-02 07:49:45 +0000510void CallAndMessageChecker::emitNilReceiverBug(CheckerContext &C,
Jordan Rose547060b2012-07-02 19:28:04 +0000511 const ObjCMethodCall &msg,
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +0000512 ExplodedNode *N) const {
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000513
Ted Kremenek005e8a02009-11-24 21:41:28 +0000514 if (!BT_msg_ret)
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +0000515 BT_msg_ret.reset(
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000516 new BuiltinBug(this, "Receiver in message expression is 'nil'"));
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000517
Jordan Rose627b0462012-07-18 21:59:51 +0000518 const ObjCMessageExpr *ME = msg.getOriginExpr();
519
Anna Zaksc610bca2013-04-03 19:28:19 +0000520 QualType ResTy = msg.getResultType();
521
Dylan Noblesmith2c1dd272012-02-05 02:13:05 +0000522 SmallString<200> buf;
Ted Kremenek005e8a02009-11-24 21:41:28 +0000523 llvm::raw_svector_ostream os(buf);
Aaron Ballmanb190f972014-01-03 17:59:55 +0000524 os << "The receiver of message '";
525 ME->getSelector().print(os);
526 os << "' is nil";
Anna Zaksc610bca2013-04-03 19:28:19 +0000527 if (ResTy->isReferenceType()) {
528 os << ", which results in forming a null reference";
529 } else {
530 os << " and returns a value of type '";
531 msg.getResultType().print(os, C.getLangOpts());
532 os << "' that will be garbage";
533 }
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000534
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000535 auto report = llvm::make_unique<BugReport>(*BT_msg_ret, os.str(), N);
Jordan Rose627b0462012-07-18 21:59:51 +0000536 report->addRange(ME->getReceiverRange());
Jordan Rose547060b2012-07-02 19:28:04 +0000537 // FIXME: This won't track "self" in messages to super.
Jordan Rose627b0462012-07-18 21:59:51 +0000538 if (const Expr *receiver = ME->getInstanceReceiver()) {
George Karpenkovb2cf0062018-10-23 18:24:53 +0000539 bugreporter::trackExpressionValue(N, receiver, *report);
Douglas Gregor9a129192010-04-21 00:45:42 +0000540 }
Aaron Ballman8d3a7a52015-06-23 13:15:32 +0000541 C.emitReport(std::move(report));
Ted Kremenek005e8a02009-11-24 21:41:28 +0000542}
543
Ted Kremenek90af9092010-12-02 07:49:45 +0000544static bool supportsNilWithFloatRet(const llvm::Triple &triple) {
Bob Wilsonc3337492012-01-31 23:52:54 +0000545 return (triple.getVendor() == llvm::Triple::Apple &&
Tim Northover6f3ff222015-10-30 16:30:27 +0000546 (triple.isiOS() || triple.isWatchOS() ||
547 !triple.isMacOSXVersionLT(10,5)));
Ted Kremenek1fc1f202009-11-24 22:48:18 +0000548}
549
Ted Kremenek005e8a02009-11-24 21:41:28 +0000550void CallAndMessageChecker::HandleNilReceiver(CheckerContext &C,
Ted Kremenek49b1e382012-01-26 21:29:00 +0000551 ProgramStateRef state,
Jordan Rose547060b2012-07-02 19:28:04 +0000552 const ObjCMethodCall &Msg) const {
Argyrios Kyrtzidis37ab7262011-01-25 00:03:53 +0000553 ASTContext &Ctx = C.getASTContext();
Anton Yartsev6a619222014-02-17 18:25:34 +0000554 static CheckerProgramPointTag Tag(this, "NilReceiver");
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000555
Ted Kremenek005e8a02009-11-24 21:41:28 +0000556 // Check the return type of the message expression. A message to nil will
557 // return different values depending on the return type and the architecture.
Jordan Rose547060b2012-07-02 19:28:04 +0000558 QualType RetTy = Msg.getResultType();
Ted Kremenek1fc1f202009-11-24 22:48:18 +0000559 CanQualType CanRetTy = Ctx.getCanonicalType(RetTy);
Ted Kremenek632e3b72012-01-06 22:09:28 +0000560 const LocationContext *LCtx = C.getLocationContext();
Ted Kremenek005e8a02009-11-24 21:41:28 +0000561
Douglas Gregor8385a062010-04-26 21:31:17 +0000562 if (CanRetTy->isStructureOrClassType()) {
Ted Kremeneka98358e2011-10-28 19:05:10 +0000563 // Structure returns are safe since the compiler zeroes them out.
Jordan Rose547060b2012-07-02 19:28:04 +0000564 SVal V = C.getSValBuilder().makeZeroVal(RetTy);
Anna Zaks22fa6ec2013-03-27 17:35:58 +0000565 C.addTransition(state->BindExpr(Msg.getOriginExpr(), LCtx, V), &Tag);
Ted Kremenek005e8a02009-11-24 21:41:28 +0000566 return;
567 }
568
Ted Kremeneka98358e2011-10-28 19:05:10 +0000569 // Other cases: check if sizeof(return type) > sizeof(void*)
Anna Zaks1c887b32011-11-01 22:41:01 +0000570 if (CanRetTy != Ctx.VoidTy && C.getLocationContext()->getParentMap()
Jordan Rose547060b2012-07-02 19:28:04 +0000571 .isConsumedExpr(Msg.getOriginExpr())) {
Ted Kremenek005e8a02009-11-24 21:41:28 +0000572 // Compute: sizeof(void *) and sizeof(return type)
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000573 const uint64_t voidPtrSize = Ctx.getTypeSize(Ctx.VoidPtrTy);
Ted Kremenek1fc1f202009-11-24 22:48:18 +0000574 const uint64_t returnTypeSize = Ctx.getTypeSize(CanRetTy);
Ted Kremenek005e8a02009-11-24 21:41:28 +0000575
Anna Zaksc610bca2013-04-03 19:28:19 +0000576 if (CanRetTy.getTypePtr()->isReferenceType()||
577 (voidPtrSize < returnTypeSize &&
578 !(supportsNilWithFloatRet(Ctx.getTargetInfo().getTriple()) &&
579 (Ctx.FloatTy == CanRetTy ||
580 Ctx.DoubleTy == CanRetTy ||
581 Ctx.LongDoubleTy == CanRetTy ||
582 Ctx.LongLongTy == CanRetTy ||
583 Ctx.UnsignedLongLongTy == CanRetTy)))) {
Devin Coughline39bd402015-09-16 22:03:05 +0000584 if (ExplodedNode *N = C.generateErrorNode(state, &Tag))
Jordan Rose547060b2012-07-02 19:28:04 +0000585 emitNilReceiverBug(C, Msg, N);
Ted Kremenek005e8a02009-11-24 21:41:28 +0000586 return;
587 }
588
589 // Handle the safe cases where the return value is 0 if the
590 // receiver is nil.
591 //
592 // FIXME: For now take the conservative approach that we only
593 // return null values if we *know* that the receiver is nil.
594 // This is because we can have surprises like:
595 //
596 // ... = [[NSScreens screens] objectAtIndex:0];
597 //
598 // What can happen is that [... screens] could return nil, but
599 // it most likely isn't nil. We should assume the semantics
600 // of this case unless we have *a lot* more knowledge.
601 //
Jordan Rose547060b2012-07-02 19:28:04 +0000602 SVal V = C.getSValBuilder().makeZeroVal(RetTy);
Anna Zaks22fa6ec2013-03-27 17:35:58 +0000603 C.addTransition(state->BindExpr(Msg.getOriginExpr(), LCtx, V), &Tag);
Ted Kremenek005e8a02009-11-24 21:41:28 +0000604 return;
605 }
Ted Kremenek9c05f4e2010-03-18 02:17:27 +0000606
Anna Zaksda4c8d62011-10-26 21:06:34 +0000607 C.addTransition(state);
Zhongxing Xuab162e12009-11-03 06:46:03 +0000608}
Argyrios Kyrtzidis6d6801c52011-02-28 01:28:13 +0000609
Jordan Rose821a3a02014-03-13 17:55:39 +0000610#define REGISTER_CHECKER(name) \
611 void ento::register##name(CheckerManager &mgr) { \
612 CallAndMessageChecker *Checker = \
613 mgr.registerChecker<CallAndMessageChecker>(); \
614 Checker->Filter.Check_##name = true; \
615 Checker->Filter.CheckName_##name = mgr.getCurrentCheckName(); \
616 }
617
618REGISTER_CHECKER(CallAndMessageUnInitRefArg)
619REGISTER_CHECKER(CallAndMessageChecker)