blob: ce6fde28b01287e5909ef2e77775e49e9af061ca [file] [log] [blame]
Gabor Horvath28690922015-08-26 23:17:43 +00001//== Nullabilityhecker.cpp - Nullability checker ----------------*- C++ -*--==//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This checker tries to find nullability violations. There are several kinds of
11// possible violations:
12// * Null pointer is passed to a pointer which has a _Nonnull type.
13// * Null pointer is returned from a function which has a _Nonnull return type.
14// * Nullable pointer is passed to a pointer which has a _Nonnull type.
15// * Nullable pointer is returned from a function which has a _Nonnull return
16// type.
17// * Nullable pointer is dereferenced.
18//
19// This checker propagates the nullability information of the pointers and looks
20// for the patterns that are described above. Explicit casts are trusted and are
21// considered a way to suppress false positives for this checker. The other way
22// to suppress warnings would be to add asserts or guarding if statements to the
23// code. In addition to the nullability propagation this checker also uses some
24// heuristics to suppress potential false positives.
25//
26//===----------------------------------------------------------------------===//
27
28#include "ClangSACheckers.h"
29#include "llvm/Support/Path.h"
30#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
31#include "clang/StaticAnalyzer/Core/Checker.h"
32#include "clang/StaticAnalyzer/Core/CheckerManager.h"
33#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
34#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
35
36using namespace clang;
37using namespace ento;
38
39namespace {
40// Do not reorder! The getMostNullable method relies on the order.
41// Optimization: Most pointers expected to be unspecified. When a symbol has an
42// unspecified or nonnull type non of the rules would indicate any problem for
43// that symbol. For this reason only nullable and contradicted nullability are
44// stored for a symbol. When a symbol is already contradicted, it can not be
45// casted back to nullable.
46enum class Nullability : char {
47 Contradicted, // Tracked nullability is contradicted by an explicit cast. Do
48 // not report any nullability related issue for this symbol.
49 // This nullability is propagated agressively to avoid false
50 // positive results. See the comment on getMostNullable method.
51 Nullable,
52 Unspecified,
53 Nonnull
54};
55
56/// Returns the most nullable nullability. This is used for message expressions
57/// like [reciever method], where the nullability of this expression is either
58/// the nullability of the receiver or the nullability of the return type of the
59/// method, depending on which is more nullable. Contradicted is considered to
60/// be the most nullable, to avoid false positive results.
Gabor Horvath3943adb2015-09-11 16:29:05 +000061Nullability getMostNullable(Nullability Lhs, Nullability Rhs) {
Gabor Horvath28690922015-08-26 23:17:43 +000062 return static_cast<Nullability>(
63 std::min(static_cast<char>(Lhs), static_cast<char>(Rhs)));
64}
65
Gabor Horvath3943adb2015-09-11 16:29:05 +000066const char *getNullabilityString(Nullability Nullab) {
Gabor Horvath28690922015-08-26 23:17:43 +000067 switch (Nullab) {
68 case Nullability::Contradicted:
69 return "contradicted";
70 case Nullability::Nullable:
71 return "nullable";
72 case Nullability::Unspecified:
73 return "unspecified";
74 case Nullability::Nonnull:
75 return "nonnull";
76 }
Gabor Horvath3943adb2015-09-11 16:29:05 +000077 llvm_unreachable("Unexpected enumeration.");
Gabor Horvath28690922015-08-26 23:17:43 +000078 return "";
79}
80
81// These enums are used as an index to ErrorMessages array.
82enum class ErrorKind : int {
83 NilAssignedToNonnull,
84 NilPassedToNonnull,
85 NilReturnedToNonnull,
86 NullableAssignedToNonnull,
87 NullableReturnedToNonnull,
88 NullableDereferenced,
89 NullablePassedToNonnull
90};
91
Gabor Horvath3943adb2015-09-11 16:29:05 +000092const char *const ErrorMessages[] = {
93 "Null is assigned to a pointer which is expected to have non-null value",
94 "Null passed to a callee that requires a non-null argument",
95 "Null is returned from a function that is expected to return a non-null "
96 "value",
97 "Nullable pointer is assigned to a pointer which is expected to have "
98 "non-null value",
99 "Nullable pointer is returned from a function that is expected to return a "
100 "non-null value",
101 "Nullable pointer is dereferenced",
Gabor Horvath17dacc42015-09-11 18:41:50 +0000102 "Nullable pointer is passed to a callee that requires a non-null argument"};
Gabor Horvath28690922015-08-26 23:17:43 +0000103
104class NullabilityChecker
105 : public Checker<check::Bind, check::PreCall, check::PreStmt<ReturnStmt>,
106 check::PostCall, check::PostStmt<ExplicitCastExpr>,
107 check::PostObjCMessage, check::DeadSymbols,
108 check::Event<ImplicitNullDerefEvent>> {
109 mutable std::unique_ptr<BugType> BT;
110
111public:
112 void checkBind(SVal L, SVal V, const Stmt *S, CheckerContext &C) const;
113 void checkPostStmt(const ExplicitCastExpr *CE, CheckerContext &C) const;
114 void checkPreStmt(const ReturnStmt *S, CheckerContext &C) const;
115 void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
116 void checkPostCall(const CallEvent &Call, CheckerContext &C) const;
117 void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
118 void checkDeadSymbols(SymbolReaper &SR, CheckerContext &C) const;
119 void checkEvent(ImplicitNullDerefEvent Event) const;
120
121 void printState(raw_ostream &Out, ProgramStateRef State, const char *NL,
122 const char *Sep) const override;
123
124 struct NullabilityChecksFilter {
125 DefaultBool CheckNullPassedToNonnull;
126 DefaultBool CheckNullReturnedFromNonnull;
127 DefaultBool CheckNullableDereferenced;
128 DefaultBool CheckNullablePassedToNonnull;
129 DefaultBool CheckNullableReturnedFromNonnull;
130
131 CheckName CheckNameNullPassedToNonnull;
132 CheckName CheckNameNullReturnedFromNonnull;
133 CheckName CheckNameNullableDereferenced;
134 CheckName CheckNameNullablePassedToNonnull;
135 CheckName CheckNameNullableReturnedFromNonnull;
136 };
137
138 NullabilityChecksFilter Filter;
Gabor Horvath29307352015-09-14 18:31:34 +0000139 // When set to false no nullability information will be tracked in
140 // NullabilityMap. It is possible to catch errors like passing a null pointer
141 // to a callee that expects nonnull argument without the information that is
142 // stroed in the NullabilityMap. This is an optimization.
143 DefaultBool NeedTracking;
Gabor Horvath28690922015-08-26 23:17:43 +0000144
145private:
146 class NullabilityBugVisitor
147 : public BugReporterVisitorImpl<NullabilityBugVisitor> {
148 public:
149 NullabilityBugVisitor(const MemRegion *M) : Region(M) {}
150
151 void Profile(llvm::FoldingSetNodeID &ID) const override {
152 static int X = 0;
153 ID.AddPointer(&X);
154 ID.AddPointer(Region);
155 }
156
157 PathDiagnosticPiece *VisitNode(const ExplodedNode *N,
158 const ExplodedNode *PrevN,
159 BugReporterContext &BRC,
160 BugReport &BR) override;
161
162 private:
163 // The tracked region.
164 const MemRegion *Region;
165 };
166
Gabor Horvathb47128a2015-09-03 23:16:21 +0000167 /// When any of the nonnull arguments of the analyzed function is null, do not
168 /// report anything and turn off the check.
169 ///
170 /// When \p SuppressPath is set to true, no more bugs will be reported on this
171 /// path by this checker.
172 void reportBugIfPreconditionHolds(ErrorKind Error, ExplodedNode *N,
173 const MemRegion *Region, CheckerContext &C,
174 const Stmt *ValueExpr = nullptr,
175 bool SuppressPath = false) const;
176
Gabor Horvath28690922015-08-26 23:17:43 +0000177 void reportBug(ErrorKind Error, ExplodedNode *N, const MemRegion *Region,
178 BugReporter &BR, const Stmt *ValueExpr = nullptr) const {
179 if (!BT)
180 BT.reset(new BugType(this, "Nullability", "Memory error"));
181 const char *Msg = ErrorMessages[static_cast<int>(Error)];
Gabor Horvath28690922015-08-26 23:17:43 +0000182 std::unique_ptr<BugReport> R(new BugReport(*BT, Msg, N));
183 if (Region) {
184 R->markInteresting(Region);
185 R->addVisitor(llvm::make_unique<NullabilityBugVisitor>(Region));
186 }
187 if (ValueExpr) {
188 R->addRange(ValueExpr->getSourceRange());
189 if (Error == ErrorKind::NilAssignedToNonnull ||
190 Error == ErrorKind::NilPassedToNonnull ||
191 Error == ErrorKind::NilReturnedToNonnull)
192 bugreporter::trackNullOrUndefValue(N, ValueExpr, *R);
193 }
194 BR.emitReport(std::move(R));
195 }
Gabor Horvath29307352015-09-14 18:31:34 +0000196
197 /// If an SVal wraps a region that should be tracked, it will return a pointer
198 /// to the wrapped region. Otherwise it will return a nullptr.
199 const SymbolicRegion *getTrackRegion(SVal Val,
200 bool CheckSuperRegion = false) const;
Gabor Horvath28690922015-08-26 23:17:43 +0000201};
202
203class NullabilityState {
204public:
205 NullabilityState(Nullability Nullab, const Stmt *Source = nullptr)
206 : Nullab(Nullab), Source(Source) {}
207
208 const Stmt *getNullabilitySource() const { return Source; }
209
210 Nullability getValue() const { return Nullab; }
211
212 void Profile(llvm::FoldingSetNodeID &ID) const {
213 ID.AddInteger(static_cast<char>(Nullab));
214 ID.AddPointer(Source);
215 }
216
217 void print(raw_ostream &Out) const {
218 Out << getNullabilityString(Nullab) << "\n";
219 }
220
221private:
222 Nullability Nullab;
223 // Source is the expression which determined the nullability. For example in a
224 // message like [nullable nonnull_returning] has nullable nullability, because
225 // the receiver is nullable. Here the receiver will be the source of the
226 // nullability. This is useful information when the diagnostics are generated.
227 const Stmt *Source;
228};
229
230bool operator==(NullabilityState Lhs, NullabilityState Rhs) {
231 return Lhs.getValue() == Rhs.getValue() &&
232 Lhs.getNullabilitySource() == Rhs.getNullabilitySource();
233}
234
235} // end anonymous namespace
236
237REGISTER_MAP_WITH_PROGRAMSTATE(NullabilityMap, const MemRegion *,
238 NullabilityState)
239
Gabor Horvathb47128a2015-09-03 23:16:21 +0000240// If the nullability precondition of a function is violated, we should not
241// report nullability related issues on that path. For this reason once a
242// precondition is not met on a path, this checker will be esentially turned off
243// for the rest of the analysis. We do not want to generate a sink node however,
244// so this checker would not lead to reduced coverage.
245REGISTER_TRAIT_WITH_PROGRAMSTATE(PreconditionViolated, bool)
246
Gabor Horvath28690922015-08-26 23:17:43 +0000247enum class NullConstraint { IsNull, IsNotNull, Unknown };
248
249static NullConstraint getNullConstraint(DefinedOrUnknownSVal Val,
250 ProgramStateRef State) {
251 ConditionTruthVal Nullness = State->isNull(Val);
252 if (Nullness.isConstrainedFalse())
253 return NullConstraint::IsNotNull;
254 if (Nullness.isConstrainedTrue())
255 return NullConstraint::IsNull;
256 return NullConstraint::Unknown;
257}
258
Gabor Horvath29307352015-09-14 18:31:34 +0000259const SymbolicRegion *
260NullabilityChecker::getTrackRegion(SVal Val, bool CheckSuperRegion) const {
261 if (!NeedTracking)
262 return nullptr;
263
Gabor Horvath28690922015-08-26 23:17:43 +0000264 auto RegionSVal = Val.getAs<loc::MemRegionVal>();
265 if (!RegionSVal)
266 return nullptr;
267
268 const MemRegion *Region = RegionSVal->getRegion();
269
270 if (CheckSuperRegion) {
271 if (auto FieldReg = Region->getAs<FieldRegion>())
272 return dyn_cast<SymbolicRegion>(FieldReg->getSuperRegion());
Gabor Horvath3943adb2015-09-11 16:29:05 +0000273 if (auto ElementReg = Region->getAs<ElementRegion>())
Gabor Horvath28690922015-08-26 23:17:43 +0000274 return dyn_cast<SymbolicRegion>(ElementReg->getSuperRegion());
275 }
276
277 return dyn_cast<SymbolicRegion>(Region);
278}
279
280PathDiagnosticPiece *NullabilityChecker::NullabilityBugVisitor::VisitNode(
281 const ExplodedNode *N, const ExplodedNode *PrevN, BugReporterContext &BRC,
282 BugReport &BR) {
Gabor Horvath3943adb2015-09-11 16:29:05 +0000283 ProgramStateRef State = N->getState();
284 ProgramStateRef StatePrev = PrevN->getState();
Gabor Horvath28690922015-08-26 23:17:43 +0000285
Gabor Horvath3943adb2015-09-11 16:29:05 +0000286 const NullabilityState *TrackedNullab = State->get<NullabilityMap>(Region);
Gabor Horvath28690922015-08-26 23:17:43 +0000287 const NullabilityState *TrackedNullabPrev =
Gabor Horvath3943adb2015-09-11 16:29:05 +0000288 StatePrev->get<NullabilityMap>(Region);
Gabor Horvath28690922015-08-26 23:17:43 +0000289 if (!TrackedNullab)
290 return nullptr;
291
292 if (TrackedNullabPrev &&
293 TrackedNullabPrev->getValue() == TrackedNullab->getValue())
294 return nullptr;
295
296 // Retrieve the associated statement.
297 const Stmt *S = TrackedNullab->getNullabilitySource();
298 if (!S) {
299 ProgramPoint ProgLoc = N->getLocation();
300 if (Optional<StmtPoint> SP = ProgLoc.getAs<StmtPoint>()) {
301 S = SP->getStmt();
302 }
303 }
304
305 if (!S)
306 return nullptr;
307
308 std::string InfoText =
309 (llvm::Twine("Nullability '") +
310 getNullabilityString(TrackedNullab->getValue()) + "' is infered")
311 .str();
312
313 // Generate the extra diagnostic.
314 PathDiagnosticLocation Pos(S, BRC.getSourceManager(),
315 N->getLocationContext());
316 return new PathDiagnosticEventPiece(Pos, InfoText, true, nullptr);
317}
318
319static Nullability getNullabilityAnnotation(QualType Type) {
320 const auto *AttrType = Type->getAs<AttributedType>();
321 if (!AttrType)
322 return Nullability::Unspecified;
323 if (AttrType->getAttrKind() == AttributedType::attr_nullable)
324 return Nullability::Nullable;
325 else if (AttrType->getAttrKind() == AttributedType::attr_nonnull)
326 return Nullability::Nonnull;
327 return Nullability::Unspecified;
328}
329
Gabor Horvathb47128a2015-09-03 23:16:21 +0000330template <typename ParamVarDeclRange>
331static bool
332checkParamsForPreconditionViolation(const ParamVarDeclRange &Params,
333 ProgramStateRef State,
334 const LocationContext *LocCtxt) {
335 for (const auto *ParamDecl : Params) {
336 if (ParamDecl->isParameterPack())
337 break;
338
339 if (getNullabilityAnnotation(ParamDecl->getType()) != Nullability::Nonnull)
340 continue;
341
342 auto RegVal = State->getLValue(ParamDecl, LocCtxt)
343 .template getAs<loc::MemRegionVal>();
344 if (!RegVal)
345 continue;
346
347 auto ParamValue = State->getSVal(RegVal->getRegion())
348 .template getAs<DefinedOrUnknownSVal>();
349 if (!ParamValue)
350 continue;
351
352 if (getNullConstraint(*ParamValue, State) == NullConstraint::IsNull) {
353 return true;
354 }
355 }
356 return false;
357}
358
359static bool checkPreconditionViolation(ProgramStateRef State, ExplodedNode *N,
360 CheckerContext &C) {
361 if (State->get<PreconditionViolated>())
362 return true;
363
364 const LocationContext *LocCtxt = C.getLocationContext();
365 const Decl *D = LocCtxt->getDecl();
366 if (!D)
367 return false;
368
Devin Coughlin851da712016-01-15 21:35:40 +0000369 ArrayRef<ParmVarDecl*> Params;
370 if (const auto *BD = dyn_cast<BlockDecl>(D))
371 Params = BD->parameters();
372 else if (const auto *FD = dyn_cast<FunctionDecl>(D))
373 Params = FD->parameters();
374 else if (const auto *MD = dyn_cast<ObjCMethodDecl>(D))
375 Params = MD->parameters();
376 else
Gabor Horvathb47128a2015-09-03 23:16:21 +0000377 return false;
Gabor Horvathb47128a2015-09-03 23:16:21 +0000378
Devin Coughlin851da712016-01-15 21:35:40 +0000379 if (checkParamsForPreconditionViolation(Params, State, LocCtxt)) {
380 if (!N->isSink())
381 C.addTransition(State->set<PreconditionViolated>(true), N);
382 return true;
Gabor Horvathb47128a2015-09-03 23:16:21 +0000383 }
384 return false;
385}
386
387void NullabilityChecker::reportBugIfPreconditionHolds(
388 ErrorKind Error, ExplodedNode *N, const MemRegion *Region,
389 CheckerContext &C, const Stmt *ValueExpr, bool SuppressPath) const {
390 ProgramStateRef OriginalState = N->getState();
391
392 if (checkPreconditionViolation(OriginalState, N, C))
393 return;
394 if (SuppressPath) {
395 OriginalState = OriginalState->set<PreconditionViolated>(true);
396 N = C.addTransition(OriginalState, N);
397 }
398
399 reportBug(Error, N, Region, C.getBugReporter(), ValueExpr);
400}
401
Gabor Horvath28690922015-08-26 23:17:43 +0000402/// Cleaning up the program state.
403void NullabilityChecker::checkDeadSymbols(SymbolReaper &SR,
404 CheckerContext &C) const {
Gabor Horvathbe87d5b2015-09-14 20:31:46 +0000405 if (!SR.hasDeadSymbols())
406 return;
407
Gabor Horvath28690922015-08-26 23:17:43 +0000408 ProgramStateRef State = C.getState();
409 NullabilityMapTy Nullabilities = State->get<NullabilityMap>();
410 for (NullabilityMapTy::iterator I = Nullabilities.begin(),
411 E = Nullabilities.end();
412 I != E; ++I) {
Gabor Horvathbe87d5b2015-09-14 20:31:46 +0000413 const auto *Region = I->first->getAs<SymbolicRegion>();
414 assert(Region && "Non-symbolic region is tracked.");
415 if (SR.isDead(Region->getSymbol())) {
Gabor Horvath28690922015-08-26 23:17:43 +0000416 State = State->remove<NullabilityMap>(I->first);
417 }
418 }
Gabor Horvathb47128a2015-09-03 23:16:21 +0000419 // When one of the nonnull arguments are constrained to be null, nullability
420 // preconditions are violated. It is not enough to check this only when we
421 // actually report an error, because at that time interesting symbols might be
422 // reaped.
423 if (checkPreconditionViolation(State, C.getPredecessor(), C))
424 return;
425 C.addTransition(State);
Gabor Horvath28690922015-08-26 23:17:43 +0000426}
427
428/// This callback triggers when a pointer is dereferenced and the analyzer does
429/// not know anything about the value of that pointer. When that pointer is
430/// nullable, this code emits a warning.
431void NullabilityChecker::checkEvent(ImplicitNullDerefEvent Event) const {
Gabor Horvathb47128a2015-09-03 23:16:21 +0000432 if (Event.SinkNode->getState()->get<PreconditionViolated>())
433 return;
434
Gabor Horvath28690922015-08-26 23:17:43 +0000435 const MemRegion *Region =
436 getTrackRegion(Event.Location, /*CheckSuperregion=*/true);
437 if (!Region)
438 return;
439
440 ProgramStateRef State = Event.SinkNode->getState();
441 const NullabilityState *TrackedNullability =
442 State->get<NullabilityMap>(Region);
443
444 if (!TrackedNullability)
445 return;
446
447 if (Filter.CheckNullableDereferenced &&
448 TrackedNullability->getValue() == Nullability::Nullable) {
449 BugReporter &BR = *Event.BR;
Gabor Horvathb47128a2015-09-03 23:16:21 +0000450 // Do not suppress errors on defensive code paths, because dereferencing
451 // a nullable pointer is always an error.
Gabor Horvath8d3ad6b2015-08-27 18:49:07 +0000452 if (Event.IsDirectDereference)
453 reportBug(ErrorKind::NullableDereferenced, Event.SinkNode, Region, BR);
454 else
455 reportBug(ErrorKind::NullablePassedToNonnull, Event.SinkNode, Region, BR);
Gabor Horvath28690922015-08-26 23:17:43 +0000456 }
457}
458
Devin Coughlin5a3843e2016-01-18 18:53:33 +0000459/// Find the outermost subexpression of E that is not an implicit cast.
460/// This looks through the implicit casts to _Nonnull that ARC adds to
461/// return expressions of ObjC types when the return type of the function or
462/// method is non-null but the express is not.
463static const Expr *lookThroughImplicitCasts(const Expr *E) {
464 assert(E);
465
466 while (auto *ICE = dyn_cast<ImplicitCastExpr>(E)) {
467 E = ICE->getSubExpr();
468 }
469
470 return E;
471}
472
Devin Coughlin4a330202016-01-22 01:01:11 +0000473/// Returns true when the return statement is a syntactic 'return self' in
474/// Objective-C.
475static bool isReturnSelf(const ReturnStmt *RS, CheckerContext &C) {
476 const ImplicitParamDecl *SelfDecl =
477 C.getCurrentAnalysisDeclContext()->getSelfDecl();
478 if (!SelfDecl)
479 return false;
480
481 const Expr *ReturnExpr = lookThroughImplicitCasts(RS->getRetValue());
482 auto *RefExpr = dyn_cast<DeclRefExpr>(ReturnExpr);
483 if (!RefExpr)
484 return false;
485
486 return RefExpr->getDecl() == SelfDecl;
487}
488
Gabor Horvath28690922015-08-26 23:17:43 +0000489/// This method check when nullable pointer or null value is returned from a
490/// function that has nonnull return type.
491///
492/// TODO: when nullability preconditons are violated, it is ok to violate the
493/// nullability postconditons (i.e.: when one of the nonnull parameters are null
494/// this check should not report any nullability related issue).
495void NullabilityChecker::checkPreStmt(const ReturnStmt *S,
496 CheckerContext &C) const {
497 auto RetExpr = S->getRetValue();
498 if (!RetExpr)
499 return;
500
501 if (!RetExpr->getType()->isAnyPointerType())
502 return;
503
504 ProgramStateRef State = C.getState();
Gabor Horvathb47128a2015-09-03 23:16:21 +0000505 if (State->get<PreconditionViolated>())
506 return;
507
Gabor Horvath28690922015-08-26 23:17:43 +0000508 auto RetSVal =
509 State->getSVal(S, C.getLocationContext()).getAs<DefinedOrUnknownSVal>();
510 if (!RetSVal)
511 return;
512
Devin Coughlinde217672016-01-28 22:23:34 +0000513 bool InSuppressedMethodFamily = false;
Devin Coughlin4a330202016-01-22 01:01:11 +0000514
Devin Coughlin851da712016-01-15 21:35:40 +0000515 QualType RequiredRetType;
Gabor Horvath28690922015-08-26 23:17:43 +0000516 AnalysisDeclContext *DeclCtxt =
517 C.getLocationContext()->getAnalysisDeclContext();
Devin Coughlin851da712016-01-15 21:35:40 +0000518 const Decl *D = DeclCtxt->getDecl();
Devin Coughlin4a330202016-01-22 01:01:11 +0000519 if (auto *MD = dyn_cast<ObjCMethodDecl>(D)) {
Devin Coughlinde217672016-01-28 22:23:34 +0000520 // HACK: This is a big hammer to avoid warning when there are defensive
521 // nil checks in -init and -copy methods. We should add more sophisticated
522 // logic here to suppress on common defensive idioms but still
523 // warn when there is a likely problem.
524 ObjCMethodFamily Family = MD->getMethodFamily();
525 if (OMF_init == Family || OMF_copy == Family || OMF_mutableCopy == Family)
526 InSuppressedMethodFamily = true;
527
Devin Coughlin851da712016-01-15 21:35:40 +0000528 RequiredRetType = MD->getReturnType();
Devin Coughlin4a330202016-01-22 01:01:11 +0000529 } else if (auto *FD = dyn_cast<FunctionDecl>(D)) {
Devin Coughlin851da712016-01-15 21:35:40 +0000530 RequiredRetType = FD->getReturnType();
Devin Coughlin4a330202016-01-22 01:01:11 +0000531 } else {
Gabor Horvath28690922015-08-26 23:17:43 +0000532 return;
Devin Coughlin4a330202016-01-22 01:01:11 +0000533 }
Gabor Horvath28690922015-08-26 23:17:43 +0000534
535 NullConstraint Nullness = getNullConstraint(*RetSVal, State);
536
Devin Coughlin851da712016-01-15 21:35:40 +0000537 Nullability RequiredNullability = getNullabilityAnnotation(RequiredRetType);
Gabor Horvath28690922015-08-26 23:17:43 +0000538
Devin Coughlin755baa42015-12-29 17:40:49 +0000539 // If the returned value is null but the type of the expression
540 // generating it is nonnull then we will suppress the diagnostic.
541 // This enables explicit suppression when returning a nil literal in a
542 // function with a _Nonnull return type:
543 // return (NSString * _Nonnull)0;
544 Nullability RetExprTypeLevelNullability =
Devin Coughlin5a3843e2016-01-18 18:53:33 +0000545 getNullabilityAnnotation(lookThroughImplicitCasts(RetExpr)->getType());
Devin Coughlin755baa42015-12-29 17:40:49 +0000546
Gabor Horvath28690922015-08-26 23:17:43 +0000547 if (Filter.CheckNullReturnedFromNonnull &&
548 Nullness == NullConstraint::IsNull &&
Devin Coughlin755baa42015-12-29 17:40:49 +0000549 RetExprTypeLevelNullability != Nullability::Nonnull &&
Devin Coughlin4a330202016-01-22 01:01:11 +0000550 RequiredNullability == Nullability::Nonnull &&
Devin Coughlinde217672016-01-28 22:23:34 +0000551 !InSuppressedMethodFamily) {
Gabor Horvath28690922015-08-26 23:17:43 +0000552 static CheckerProgramPointTag Tag(this, "NullReturnedFromNonnull");
Devin Coughline39bd402015-09-16 22:03:05 +0000553 ExplodedNode *N = C.generateErrorNode(State, &Tag);
554 if (!N)
555 return;
Gabor Horvathb47128a2015-09-03 23:16:21 +0000556 reportBugIfPreconditionHolds(ErrorKind::NilReturnedToNonnull, N, nullptr, C,
557 RetExpr);
Gabor Horvath28690922015-08-26 23:17:43 +0000558 return;
559 }
560
561 const MemRegion *Region = getTrackRegion(*RetSVal);
562 if (!Region)
563 return;
564
565 const NullabilityState *TrackedNullability =
566 State->get<NullabilityMap>(Region);
567 if (TrackedNullability) {
568 Nullability TrackedNullabValue = TrackedNullability->getValue();
569 if (Filter.CheckNullableReturnedFromNonnull &&
570 Nullness != NullConstraint::IsNotNull &&
571 TrackedNullabValue == Nullability::Nullable &&
Devin Coughlin755baa42015-12-29 17:40:49 +0000572 RequiredNullability == Nullability::Nonnull) {
Gabor Horvath28690922015-08-26 23:17:43 +0000573 static CheckerProgramPointTag Tag(this, "NullableReturnedFromNonnull");
574 ExplodedNode *N = C.addTransition(State, C.getPredecessor(), &Tag);
Gabor Horvathb47128a2015-09-03 23:16:21 +0000575 reportBugIfPreconditionHolds(ErrorKind::NullableReturnedToNonnull, N,
576 Region, C);
Gabor Horvath28690922015-08-26 23:17:43 +0000577 }
578 return;
579 }
Devin Coughlin755baa42015-12-29 17:40:49 +0000580 if (RequiredNullability == Nullability::Nullable) {
Gabor Horvath28690922015-08-26 23:17:43 +0000581 State = State->set<NullabilityMap>(Region,
Devin Coughlin755baa42015-12-29 17:40:49 +0000582 NullabilityState(RequiredNullability,
583 S));
Gabor Horvath28690922015-08-26 23:17:43 +0000584 C.addTransition(State);
585 }
586}
587
588/// This callback warns when a nullable pointer or a null value is passed to a
589/// function that expects its argument to be nonnull.
590void NullabilityChecker::checkPreCall(const CallEvent &Call,
591 CheckerContext &C) const {
592 if (!Call.getDecl())
593 return;
594
595 ProgramStateRef State = C.getState();
Gabor Horvathb47128a2015-09-03 23:16:21 +0000596 if (State->get<PreconditionViolated>())
597 return;
598
Gabor Horvath28690922015-08-26 23:17:43 +0000599 ProgramStateRef OrigState = State;
600
601 unsigned Idx = 0;
602 for (const ParmVarDecl *Param : Call.parameters()) {
603 if (Param->isParameterPack())
604 break;
605
606 const Expr *ArgExpr = nullptr;
607 if (Idx < Call.getNumArgs())
608 ArgExpr = Call.getArgExpr(Idx);
609 auto ArgSVal = Call.getArgSVal(Idx++).getAs<DefinedOrUnknownSVal>();
610 if (!ArgSVal)
611 continue;
612
613 if (!Param->getType()->isAnyPointerType() &&
614 !Param->getType()->isReferenceType())
615 continue;
616
617 NullConstraint Nullness = getNullConstraint(*ArgSVal, State);
618
Devin Coughlin755baa42015-12-29 17:40:49 +0000619 Nullability RequiredNullability =
620 getNullabilityAnnotation(Param->getType());
621 Nullability ArgExprTypeLevelNullability =
Gabor Horvath28690922015-08-26 23:17:43 +0000622 getNullabilityAnnotation(ArgExpr->getType());
623
624 if (Filter.CheckNullPassedToNonnull && Nullness == NullConstraint::IsNull &&
Devin Coughlin755baa42015-12-29 17:40:49 +0000625 ArgExprTypeLevelNullability != Nullability::Nonnull &&
626 RequiredNullability == Nullability::Nonnull) {
Devin Coughline39bd402015-09-16 22:03:05 +0000627 ExplodedNode *N = C.generateErrorNode(State);
628 if (!N)
629 return;
Gabor Horvathb47128a2015-09-03 23:16:21 +0000630 reportBugIfPreconditionHolds(ErrorKind::NilPassedToNonnull, N, nullptr, C,
631 ArgExpr);
Gabor Horvath28690922015-08-26 23:17:43 +0000632 return;
633 }
634
635 const MemRegion *Region = getTrackRegion(*ArgSVal);
636 if (!Region)
637 continue;
638
639 const NullabilityState *TrackedNullability =
640 State->get<NullabilityMap>(Region);
641
642 if (TrackedNullability) {
643 if (Nullness == NullConstraint::IsNotNull ||
644 TrackedNullability->getValue() != Nullability::Nullable)
645 continue;
646
647 if (Filter.CheckNullablePassedToNonnull &&
Devin Coughlin755baa42015-12-29 17:40:49 +0000648 RequiredNullability == Nullability::Nonnull) {
Gabor Horvathb47128a2015-09-03 23:16:21 +0000649 ExplodedNode *N = C.addTransition(State);
650 reportBugIfPreconditionHolds(ErrorKind::NullablePassedToNonnull, N,
651 Region, C, ArgExpr, /*SuppressPath=*/true);
Gabor Horvath28690922015-08-26 23:17:43 +0000652 return;
653 }
654 if (Filter.CheckNullableDereferenced &&
655 Param->getType()->isReferenceType()) {
Gabor Horvathb47128a2015-09-03 23:16:21 +0000656 ExplodedNode *N = C.addTransition(State);
657 reportBugIfPreconditionHolds(ErrorKind::NullableDereferenced, N, Region,
658 C, ArgExpr, /*SuppressPath=*/true);
Gabor Horvath28690922015-08-26 23:17:43 +0000659 return;
660 }
661 continue;
662 }
663 // No tracked nullability yet.
Devin Coughlin755baa42015-12-29 17:40:49 +0000664 if (ArgExprTypeLevelNullability != Nullability::Nullable)
Gabor Horvath28690922015-08-26 23:17:43 +0000665 continue;
666 State = State->set<NullabilityMap>(
Devin Coughlin755baa42015-12-29 17:40:49 +0000667 Region, NullabilityState(ArgExprTypeLevelNullability, ArgExpr));
Gabor Horvath28690922015-08-26 23:17:43 +0000668 }
669 if (State != OrigState)
670 C.addTransition(State);
671}
672
673/// Suppress the nullability warnings for some functions.
674void NullabilityChecker::checkPostCall(const CallEvent &Call,
675 CheckerContext &C) const {
676 auto Decl = Call.getDecl();
677 if (!Decl)
678 return;
679 // ObjC Messages handles in a different callback.
680 if (Call.getKind() == CE_ObjCMessage)
681 return;
682 const FunctionType *FuncType = Decl->getFunctionType();
683 if (!FuncType)
684 return;
685 QualType ReturnType = FuncType->getReturnType();
686 if (!ReturnType->isAnyPointerType())
687 return;
Gabor Horvathb47128a2015-09-03 23:16:21 +0000688 ProgramStateRef State = C.getState();
689 if (State->get<PreconditionViolated>())
690 return;
691
Gabor Horvath28690922015-08-26 23:17:43 +0000692 const MemRegion *Region = getTrackRegion(Call.getReturnValue());
693 if (!Region)
694 return;
Gabor Horvath28690922015-08-26 23:17:43 +0000695
696 // CG headers are misannotated. Do not warn for symbols that are the results
697 // of CG calls.
698 const SourceManager &SM = C.getSourceManager();
699 StringRef FilePath = SM.getFilename(SM.getSpellingLoc(Decl->getLocStart()));
700 if (llvm::sys::path::filename(FilePath).startswith("CG")) {
701 State = State->set<NullabilityMap>(Region, Nullability::Contradicted);
702 C.addTransition(State);
703 return;
704 }
705
706 const NullabilityState *TrackedNullability =
707 State->get<NullabilityMap>(Region);
708
709 if (!TrackedNullability &&
710 getNullabilityAnnotation(ReturnType) == Nullability::Nullable) {
711 State = State->set<NullabilityMap>(Region, Nullability::Nullable);
712 C.addTransition(State);
713 }
714}
715
716static Nullability getReceiverNullability(const ObjCMethodCall &M,
717 ProgramStateRef State) {
Gabor Horvath28690922015-08-26 23:17:43 +0000718 if (M.isReceiverSelfOrSuper()) {
719 // For super and super class receivers we assume that the receiver is
720 // nonnull.
Gabor Horvath3943adb2015-09-11 16:29:05 +0000721 return Nullability::Nonnull;
Gabor Horvath28690922015-08-26 23:17:43 +0000722 }
Gabor Horvath3943adb2015-09-11 16:29:05 +0000723 // Otherwise look up nullability in the state.
724 SVal Receiver = M.getReceiverSVal();
725 if (auto DefOrUnknown = Receiver.getAs<DefinedOrUnknownSVal>()) {
726 // If the receiver is constrained to be nonnull, assume that it is nonnull
727 // regardless of its type.
728 NullConstraint Nullness = getNullConstraint(*DefOrUnknown, State);
729 if (Nullness == NullConstraint::IsNotNull)
730 return Nullability::Nonnull;
731 }
732 auto ValueRegionSVal = Receiver.getAs<loc::MemRegionVal>();
733 if (ValueRegionSVal) {
734 const MemRegion *SelfRegion = ValueRegionSVal->getRegion();
735 assert(SelfRegion);
736
737 const NullabilityState *TrackedSelfNullability =
738 State->get<NullabilityMap>(SelfRegion);
739 if (TrackedSelfNullability)
740 return TrackedSelfNullability->getValue();
741 }
742 return Nullability::Unspecified;
Gabor Horvath28690922015-08-26 23:17:43 +0000743}
744
745/// Calculate the nullability of the result of a message expr based on the
746/// nullability of the receiver, the nullability of the return value, and the
747/// constraints.
748void NullabilityChecker::checkPostObjCMessage(const ObjCMethodCall &M,
749 CheckerContext &C) const {
750 auto Decl = M.getDecl();
751 if (!Decl)
752 return;
753 QualType RetType = Decl->getReturnType();
754 if (!RetType->isAnyPointerType())
755 return;
756
Gabor Horvathb47128a2015-09-03 23:16:21 +0000757 ProgramStateRef State = C.getState();
758 if (State->get<PreconditionViolated>())
759 return;
760
Gabor Horvath28690922015-08-26 23:17:43 +0000761 const MemRegion *ReturnRegion = getTrackRegion(M.getReturnValue());
762 if (!ReturnRegion)
763 return;
764
Gabor Horvath28690922015-08-26 23:17:43 +0000765 auto Interface = Decl->getClassInterface();
766 auto Name = Interface ? Interface->getName() : "";
767 // In order to reduce the noise in the diagnostics generated by this checker,
768 // some framework and programming style based heuristics are used. These
769 // heuristics are for Cocoa APIs which have NS prefix.
770 if (Name.startswith("NS")) {
771 // Developers rely on dynamic invariants such as an item should be available
772 // in a collection, or a collection is not empty often. Those invariants can
773 // not be inferred by any static analysis tool. To not to bother the users
774 // with too many false positives, every item retrieval function should be
775 // ignored for collections. The instance methods of dictionaries in Cocoa
776 // are either item retrieval related or not interesting nullability wise.
777 // Using this fact, to keep the code easier to read just ignore the return
778 // value of every instance method of dictionaries.
779 if (M.isInstanceMessage() && Name.find("Dictionary") != StringRef::npos) {
780 State =
781 State->set<NullabilityMap>(ReturnRegion, Nullability::Contradicted);
782 C.addTransition(State);
783 return;
784 }
785 // For similar reasons ignore some methods of Cocoa arrays.
786 StringRef FirstSelectorSlot = M.getSelector().getNameForSlot(0);
787 if (Name.find("Array") != StringRef::npos &&
788 (FirstSelectorSlot == "firstObject" ||
789 FirstSelectorSlot == "lastObject")) {
790 State =
791 State->set<NullabilityMap>(ReturnRegion, Nullability::Contradicted);
792 C.addTransition(State);
793 return;
794 }
795
796 // Encoding related methods of string should not fail when lossless
797 // encodings are used. Using lossless encodings is so frequent that ignoring
798 // this class of methods reduced the emitted diagnostics by about 30% on
799 // some projects (and all of that was false positives).
800 if (Name.find("String") != StringRef::npos) {
801 for (auto Param : M.parameters()) {
802 if (Param->getName() == "encoding") {
803 State = State->set<NullabilityMap>(ReturnRegion,
804 Nullability::Contradicted);
805 C.addTransition(State);
806 return;
807 }
808 }
809 }
810 }
811
812 const ObjCMessageExpr *Message = M.getOriginExpr();
813 Nullability SelfNullability = getReceiverNullability(M, State);
814
815 const NullabilityState *NullabilityOfReturn =
816 State->get<NullabilityMap>(ReturnRegion);
817
818 if (NullabilityOfReturn) {
819 // When we have a nullability tracked for the return value, the nullability
820 // of the expression will be the most nullable of the receiver and the
821 // return value.
822 Nullability RetValTracked = NullabilityOfReturn->getValue();
823 Nullability ComputedNullab =
824 getMostNullable(RetValTracked, SelfNullability);
825 if (ComputedNullab != RetValTracked &&
826 ComputedNullab != Nullability::Unspecified) {
827 const Stmt *NullabilitySource =
828 ComputedNullab == RetValTracked
829 ? NullabilityOfReturn->getNullabilitySource()
830 : Message->getInstanceReceiver();
831 State = State->set<NullabilityMap>(
832 ReturnRegion, NullabilityState(ComputedNullab, NullabilitySource));
833 C.addTransition(State);
834 }
835 return;
836 }
837
838 // No tracked information. Use static type information for return value.
839 Nullability RetNullability = getNullabilityAnnotation(RetType);
840
841 // Properties might be computed. For this reason the static analyzer creates a
842 // new symbol each time an unknown property is read. To avoid false pozitives
843 // do not treat unknown properties as nullable, even when they explicitly
844 // marked nullable.
845 if (M.getMessageKind() == OCM_PropertyAccess && !C.wasInlined)
846 RetNullability = Nullability::Nonnull;
847
848 Nullability ComputedNullab = getMostNullable(RetNullability, SelfNullability);
849 if (ComputedNullab == Nullability::Nullable) {
850 const Stmt *NullabilitySource = ComputedNullab == RetNullability
851 ? Message
852 : Message->getInstanceReceiver();
853 State = State->set<NullabilityMap>(
854 ReturnRegion, NullabilityState(ComputedNullab, NullabilitySource));
855 C.addTransition(State);
856 }
857}
858
859/// Explicit casts are trusted. If there is a disagreement in the nullability
860/// annotations in the destination and the source or '0' is casted to nonnull
861/// track the value as having contraditory nullability. This will allow users to
862/// suppress warnings.
863void NullabilityChecker::checkPostStmt(const ExplicitCastExpr *CE,
864 CheckerContext &C) const {
865 QualType OriginType = CE->getSubExpr()->getType();
866 QualType DestType = CE->getType();
867 if (!OriginType->isAnyPointerType())
868 return;
869 if (!DestType->isAnyPointerType())
870 return;
871
Gabor Horvathb47128a2015-09-03 23:16:21 +0000872 ProgramStateRef State = C.getState();
873 if (State->get<PreconditionViolated>())
874 return;
875
Gabor Horvath28690922015-08-26 23:17:43 +0000876 Nullability DestNullability = getNullabilityAnnotation(DestType);
877
878 // No explicit nullability in the destination type, so this cast does not
879 // change the nullability.
880 if (DestNullability == Nullability::Unspecified)
881 return;
882
Gabor Horvath28690922015-08-26 23:17:43 +0000883 auto RegionSVal =
884 State->getSVal(CE, C.getLocationContext()).getAs<DefinedOrUnknownSVal>();
885 const MemRegion *Region = getTrackRegion(*RegionSVal);
886 if (!Region)
887 return;
888
889 // When 0 is converted to nonnull mark it as contradicted.
890 if (DestNullability == Nullability::Nonnull) {
891 NullConstraint Nullness = getNullConstraint(*RegionSVal, State);
892 if (Nullness == NullConstraint::IsNull) {
893 State = State->set<NullabilityMap>(Region, Nullability::Contradicted);
894 C.addTransition(State);
895 return;
896 }
897 }
898
899 const NullabilityState *TrackedNullability =
900 State->get<NullabilityMap>(Region);
901
902 if (!TrackedNullability) {
903 if (DestNullability != Nullability::Nullable)
904 return;
905 State = State->set<NullabilityMap>(Region,
906 NullabilityState(DestNullability, CE));
907 C.addTransition(State);
908 return;
909 }
910
911 if (TrackedNullability->getValue() != DestNullability &&
912 TrackedNullability->getValue() != Nullability::Contradicted) {
913 State = State->set<NullabilityMap>(Region, Nullability::Contradicted);
914 C.addTransition(State);
915 }
916}
917
Devin Coughlinc1986632015-11-24 19:15:11 +0000918/// For a given statement performing a bind, attempt to syntactically
919/// match the expression resulting in the bound value.
920static const Expr * matchValueExprForBind(const Stmt *S) {
921 // For `x = e` the value expression is the right-hand side.
922 if (auto *BinOp = dyn_cast<BinaryOperator>(S)) {
923 if (BinOp->getOpcode() == BO_Assign)
924 return BinOp->getRHS();
925 }
926
927 // For `int x = e` the value expression is the initializer.
928 if (auto *DS = dyn_cast<DeclStmt>(S)) {
929 if (DS->isSingleDecl()) {
930 auto *VD = dyn_cast<VarDecl>(DS->getSingleDecl());
931 if (!VD)
932 return nullptr;
933
934 if (const Expr *Init = VD->getInit())
935 return Init;
936 }
937 }
938
939 return nullptr;
940}
941
Devin Coughlin3ab8b2e72015-12-29 23:44:19 +0000942/// Returns true if \param S is a DeclStmt for a local variable that
943/// ObjC automated reference counting initialized with zero.
944static bool isARCNilInitializedLocal(CheckerContext &C, const Stmt *S) {
945 // We suppress diagnostics for ARC zero-initialized _Nonnull locals. This
946 // prevents false positives when a _Nonnull local variable cannot be
947 // initialized with an initialization expression:
948 // NSString * _Nonnull s; // no-warning
949 // @autoreleasepool {
950 // s = ...
951 // }
952 //
953 // FIXME: We should treat implicitly zero-initialized _Nonnull locals as
954 // uninitialized in Sema's UninitializedValues analysis to warn when a use of
955 // the zero-initialized definition will unexpectedly yield nil.
956
957 // Locals are only zero-initialized when automated reference counting
958 // is turned on.
959 if (!C.getASTContext().getLangOpts().ObjCAutoRefCount)
960 return false;
961
962 auto *DS = dyn_cast<DeclStmt>(S);
963 if (!DS || !DS->isSingleDecl())
964 return false;
965
966 auto *VD = dyn_cast<VarDecl>(DS->getSingleDecl());
967 if (!VD)
968 return false;
969
970 // Sema only zero-initializes locals with ObjCLifetimes.
971 if(!VD->getType().getQualifiers().hasObjCLifetime())
972 return false;
973
974 const Expr *Init = VD->getInit();
975 assert(Init && "ObjC local under ARC without initializer");
976
977 // Return false if the local is explicitly initialized (e.g., with '= nil').
978 if (!isa<ImplicitValueInitExpr>(Init))
979 return false;
980
981 return true;
982}
983
Gabor Horvath28690922015-08-26 23:17:43 +0000984/// Propagate the nullability information through binds and warn when nullable
985/// pointer or null symbol is assigned to a pointer with a nonnull type.
986void NullabilityChecker::checkBind(SVal L, SVal V, const Stmt *S,
987 CheckerContext &C) const {
988 const TypedValueRegion *TVR =
989 dyn_cast_or_null<TypedValueRegion>(L.getAsRegion());
990 if (!TVR)
991 return;
992
993 QualType LocType = TVR->getValueType();
994 if (!LocType->isAnyPointerType())
995 return;
996
Gabor Horvathb47128a2015-09-03 23:16:21 +0000997 ProgramStateRef State = C.getState();
998 if (State->get<PreconditionViolated>())
999 return;
1000
Gabor Horvath28690922015-08-26 23:17:43 +00001001 auto ValDefOrUnknown = V.getAs<DefinedOrUnknownSVal>();
1002 if (!ValDefOrUnknown)
1003 return;
1004
Gabor Horvath28690922015-08-26 23:17:43 +00001005 NullConstraint RhsNullness = getNullConstraint(*ValDefOrUnknown, State);
1006
1007 Nullability ValNullability = Nullability::Unspecified;
1008 if (SymbolRef Sym = ValDefOrUnknown->getAsSymbol())
1009 ValNullability = getNullabilityAnnotation(Sym->getType());
1010
1011 Nullability LocNullability = getNullabilityAnnotation(LocType);
1012 if (Filter.CheckNullPassedToNonnull &&
1013 RhsNullness == NullConstraint::IsNull &&
1014 ValNullability != Nullability::Nonnull &&
Devin Coughlin3ab8b2e72015-12-29 23:44:19 +00001015 LocNullability == Nullability::Nonnull &&
1016 !isARCNilInitializedLocal(C, S)) {
Gabor Horvath28690922015-08-26 23:17:43 +00001017 static CheckerProgramPointTag Tag(this, "NullPassedToNonnull");
Devin Coughline39bd402015-09-16 22:03:05 +00001018 ExplodedNode *N = C.generateErrorNode(State, &Tag);
1019 if (!N)
1020 return;
Devin Coughlinc1986632015-11-24 19:15:11 +00001021
1022 const Stmt *ValueExpr = matchValueExprForBind(S);
1023 if (!ValueExpr)
1024 ValueExpr = S;
1025
Gabor Horvathb47128a2015-09-03 23:16:21 +00001026 reportBugIfPreconditionHolds(ErrorKind::NilAssignedToNonnull, N, nullptr, C,
Devin Coughlinc1986632015-11-24 19:15:11 +00001027 ValueExpr);
Gabor Horvath28690922015-08-26 23:17:43 +00001028 return;
1029 }
1030 // Intentionally missing case: '0' is bound to a reference. It is handled by
1031 // the DereferenceChecker.
1032
1033 const MemRegion *ValueRegion = getTrackRegion(*ValDefOrUnknown);
1034 if (!ValueRegion)
1035 return;
1036
1037 const NullabilityState *TrackedNullability =
1038 State->get<NullabilityMap>(ValueRegion);
1039
1040 if (TrackedNullability) {
1041 if (RhsNullness == NullConstraint::IsNotNull ||
1042 TrackedNullability->getValue() != Nullability::Nullable)
1043 return;
1044 if (Filter.CheckNullablePassedToNonnull &&
1045 LocNullability == Nullability::Nonnull) {
1046 static CheckerProgramPointTag Tag(this, "NullablePassedToNonnull");
1047 ExplodedNode *N = C.addTransition(State, C.getPredecessor(), &Tag);
Gabor Horvathb47128a2015-09-03 23:16:21 +00001048 reportBugIfPreconditionHolds(ErrorKind::NullableAssignedToNonnull, N,
1049 ValueRegion, C);
Gabor Horvath28690922015-08-26 23:17:43 +00001050 }
1051 return;
1052 }
1053
1054 const auto *BinOp = dyn_cast<BinaryOperator>(S);
1055
1056 if (ValNullability == Nullability::Nullable) {
1057 // Trust the static information of the value more than the static
1058 // information on the location.
1059 const Stmt *NullabilitySource = BinOp ? BinOp->getRHS() : S;
1060 State = State->set<NullabilityMap>(
1061 ValueRegion, NullabilityState(ValNullability, NullabilitySource));
1062 C.addTransition(State);
1063 return;
1064 }
1065
1066 if (LocNullability == Nullability::Nullable) {
1067 const Stmt *NullabilitySource = BinOp ? BinOp->getLHS() : S;
1068 State = State->set<NullabilityMap>(
1069 ValueRegion, NullabilityState(LocNullability, NullabilitySource));
1070 C.addTransition(State);
1071 }
1072}
1073
1074void NullabilityChecker::printState(raw_ostream &Out, ProgramStateRef State,
1075 const char *NL, const char *Sep) const {
1076
1077 NullabilityMapTy B = State->get<NullabilityMap>();
1078
1079 if (B.isEmpty())
1080 return;
1081
1082 Out << Sep << NL;
1083
1084 for (NullabilityMapTy::iterator I = B.begin(), E = B.end(); I != E; ++I) {
1085 Out << I->first << " : ";
1086 I->second.print(Out);
1087 Out << NL;
1088 }
1089}
1090
Gabor Horvath29307352015-09-14 18:31:34 +00001091#define REGISTER_CHECKER(name, trackingRequired) \
Gabor Horvath28690922015-08-26 23:17:43 +00001092 void ento::register##name##Checker(CheckerManager &mgr) { \
1093 NullabilityChecker *checker = mgr.registerChecker<NullabilityChecker>(); \
1094 checker->Filter.Check##name = true; \
1095 checker->Filter.CheckName##name = mgr.getCurrentCheckName(); \
Gabor Horvath29307352015-09-14 18:31:34 +00001096 checker->NeedTracking = checker->NeedTracking || trackingRequired; \
Gabor Horvath28690922015-08-26 23:17:43 +00001097 }
1098
Gabor Horvath29307352015-09-14 18:31:34 +00001099// The checks are likely to be turned on by default and it is possible to do
1100// them without tracking any nullability related information. As an optimization
1101// no nullability information will be tracked when only these two checks are
1102// enables.
1103REGISTER_CHECKER(NullPassedToNonnull, false)
1104REGISTER_CHECKER(NullReturnedFromNonnull, false)
1105
1106REGISTER_CHECKER(NullableDereferenced, true)
1107REGISTER_CHECKER(NullablePassedToNonnull, true)
1108REGISTER_CHECKER(NullableReturnedFromNonnull, true)