blob: 9d6c8314d82de315999e8200db5dada38335c9a9 [file] [log] [blame]
George Karpenkov70c2ee32018-08-17 21:41:07 +00001//==-- RetainCountChecker.cpp - Checks for leaks and other issues -*- C++ -*--//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file defines the methods for RetainCountChecker, which implements
11// a reference count checker for Core Foundation and Cocoa on (Mac OS X).
12//
13//===----------------------------------------------------------------------===//
14
15#include "RetainCountChecker.h"
16
17using namespace clang;
18using namespace ento;
George Karpenkov70c2ee32018-08-17 21:41:07 +000019using namespace retaincountchecker;
20using llvm::StrInStrNoCase;
21
22REGISTER_MAP_WITH_PROGRAMSTATE(RefBindings, SymbolRef, RefVal)
23
24namespace clang {
25namespace ento {
26namespace retaincountchecker {
27
28const RefVal *getRefBinding(ProgramStateRef State, SymbolRef Sym) {
29 return State->get<RefBindings>(Sym);
30}
31
32ProgramStateRef setRefBinding(ProgramStateRef State, SymbolRef Sym,
33 RefVal Val) {
34 return State->set<RefBindings>(Sym, Val);
35}
36
37ProgramStateRef removeRefBinding(ProgramStateRef State, SymbolRef Sym) {
38 return State->remove<RefBindings>(Sym);
39}
40
41} // end namespace retaincountchecker
42} // end namespace ento
43} // end namespace clang
44
45void RefVal::print(raw_ostream &Out) const {
46 if (!T.isNull())
47 Out << "Tracked " << T.getAsString() << '/';
48
49 switch (getKind()) {
50 default: llvm_unreachable("Invalid RefVal kind");
51 case Owned: {
52 Out << "Owned";
53 unsigned cnt = getCount();
54 if (cnt) Out << " (+ " << cnt << ")";
55 break;
56 }
57
58 case NotOwned: {
59 Out << "NotOwned";
60 unsigned cnt = getCount();
61 if (cnt) Out << " (+ " << cnt << ")";
62 break;
63 }
64
65 case ReturnedOwned: {
66 Out << "ReturnedOwned";
67 unsigned cnt = getCount();
68 if (cnt) Out << " (+ " << cnt << ")";
69 break;
70 }
71
72 case ReturnedNotOwned: {
73 Out << "ReturnedNotOwned";
74 unsigned cnt = getCount();
75 if (cnt) Out << " (+ " << cnt << ")";
76 break;
77 }
78
79 case Released:
80 Out << "Released";
81 break;
82
83 case ErrorDeallocNotOwned:
84 Out << "-dealloc (not-owned)";
85 break;
86
87 case ErrorLeak:
88 Out << "Leaked";
89 break;
90
91 case ErrorLeakReturned:
92 Out << "Leaked (Bad naming)";
93 break;
94
95 case ErrorUseAfterRelease:
96 Out << "Use-After-Release [ERROR]";
97 break;
98
99 case ErrorReleaseNotOwned:
100 Out << "Release of Not-Owned [ERROR]";
101 break;
102
103 case RefVal::ErrorOverAutorelease:
104 Out << "Over-autoreleased";
105 break;
106
107 case RefVal::ErrorReturnedNotOwned:
108 Out << "Non-owned object returned instead of owned";
109 break;
110 }
111
112 switch (getIvarAccessHistory()) {
113 case IvarAccessHistory::None:
114 break;
115 case IvarAccessHistory::AccessedDirectly:
116 Out << " [direct ivar access]";
117 break;
118 case IvarAccessHistory::ReleasedAfterDirectAccess:
119 Out << " [released after direct ivar access]";
120 }
121
122 if (ACnt) {
123 Out << " [autorelease -" << ACnt << ']';
124 }
125}
126
127namespace {
128class StopTrackingCallback final : public SymbolVisitor {
129 ProgramStateRef state;
130public:
131 StopTrackingCallback(ProgramStateRef st) : state(std::move(st)) {}
132 ProgramStateRef getState() const { return state; }
133
134 bool VisitSymbol(SymbolRef sym) override {
135 state = state->remove<RefBindings>(sym);
136 return true;
137 }
138};
139} // end anonymous namespace
140
141//===----------------------------------------------------------------------===//
142// Handle statements that may have an effect on refcounts.
143//===----------------------------------------------------------------------===//
144
145void RetainCountChecker::checkPostStmt(const BlockExpr *BE,
146 CheckerContext &C) const {
147
148 // Scan the BlockDecRefExprs for any object the retain count checker
149 // may be tracking.
150 if (!BE->getBlockDecl()->hasCaptures())
151 return;
152
153 ProgramStateRef state = C.getState();
154 auto *R = cast<BlockDataRegion>(C.getSVal(BE).getAsRegion());
155
156 BlockDataRegion::referenced_vars_iterator I = R->referenced_vars_begin(),
157 E = R->referenced_vars_end();
158
159 if (I == E)
160 return;
161
162 // FIXME: For now we invalidate the tracking of all symbols passed to blocks
163 // via captured variables, even though captured variables result in a copy
164 // and in implicit increment/decrement of a retain count.
165 SmallVector<const MemRegion*, 10> Regions;
166 const LocationContext *LC = C.getLocationContext();
167 MemRegionManager &MemMgr = C.getSValBuilder().getRegionManager();
168
169 for ( ; I != E; ++I) {
170 const VarRegion *VR = I.getCapturedRegion();
171 if (VR->getSuperRegion() == R) {
172 VR = MemMgr.getVarRegion(VR->getDecl(), LC);
173 }
174 Regions.push_back(VR);
175 }
176
177 state =
178 state->scanReachableSymbols<StopTrackingCallback>(Regions.data(),
179 Regions.data() + Regions.size()).getState();
180 C.addTransition(state);
181}
182
183void RetainCountChecker::checkPostStmt(const CastExpr *CE,
184 CheckerContext &C) const {
185 const ObjCBridgedCastExpr *BE = dyn_cast<ObjCBridgedCastExpr>(CE);
186 if (!BE)
187 return;
188
189 ArgEffect AE = IncRef;
190
191 switch (BE->getBridgeKind()) {
192 case OBC_Bridge:
193 // Do nothing.
194 return;
195 case OBC_BridgeRetained:
196 AE = IncRef;
197 break;
198 case OBC_BridgeTransfer:
199 AE = DecRefBridgedTransferred;
200 break;
201 }
202
203 ProgramStateRef state = C.getState();
204 SymbolRef Sym = C.getSVal(CE).getAsLocSymbol();
205 if (!Sym)
206 return;
207 const RefVal* T = getRefBinding(state, Sym);
208 if (!T)
209 return;
210
211 RefVal::Kind hasErr = (RefVal::Kind) 0;
212 state = updateSymbol(state, Sym, *T, AE, hasErr, C);
213
214 if (hasErr) {
215 // FIXME: If we get an error during a bridge cast, should we report it?
216 return;
217 }
218
219 C.addTransition(state);
220}
221
222void RetainCountChecker::processObjCLiterals(CheckerContext &C,
223 const Expr *Ex) const {
224 ProgramStateRef state = C.getState();
225 const ExplodedNode *pred = C.getPredecessor();
226 for (const Stmt *Child : Ex->children()) {
227 SVal V = pred->getSVal(Child);
228 if (SymbolRef sym = V.getAsSymbol())
229 if (const RefVal* T = getRefBinding(state, sym)) {
230 RefVal::Kind hasErr = (RefVal::Kind) 0;
231 state = updateSymbol(state, sym, *T, MayEscape, hasErr, C);
232 if (hasErr) {
233 processNonLeakError(state, Child->getSourceRange(), hasErr, sym, C);
234 return;
235 }
236 }
237 }
238
239 // Return the object as autoreleased.
240 // RetEffect RE = RetEffect::MakeNotOwned(RetEffect::ObjC);
241 if (SymbolRef sym =
242 state->getSVal(Ex, pred->getLocationContext()).getAsSymbol()) {
243 QualType ResultTy = Ex->getType();
244 state = setRefBinding(state, sym,
245 RefVal::makeNotOwned(RetEffect::ObjC, ResultTy));
246 }
247
248 C.addTransition(state);
249}
250
251void RetainCountChecker::checkPostStmt(const ObjCArrayLiteral *AL,
252 CheckerContext &C) const {
253 // Apply the 'MayEscape' to all values.
254 processObjCLiterals(C, AL);
255}
256
257void RetainCountChecker::checkPostStmt(const ObjCDictionaryLiteral *DL,
258 CheckerContext &C) const {
259 // Apply the 'MayEscape' to all keys and values.
260 processObjCLiterals(C, DL);
261}
262
263void RetainCountChecker::checkPostStmt(const ObjCBoxedExpr *Ex,
264 CheckerContext &C) const {
265 const ExplodedNode *Pred = C.getPredecessor();
266 ProgramStateRef State = Pred->getState();
267
268 if (SymbolRef Sym = Pred->getSVal(Ex).getAsSymbol()) {
269 QualType ResultTy = Ex->getType();
270 State = setRefBinding(State, Sym,
271 RefVal::makeNotOwned(RetEffect::ObjC, ResultTy));
272 }
273
274 C.addTransition(State);
275}
276
277void RetainCountChecker::checkPostStmt(const ObjCIvarRefExpr *IRE,
278 CheckerContext &C) const {
279 Optional<Loc> IVarLoc = C.getSVal(IRE).getAs<Loc>();
280 if (!IVarLoc)
281 return;
282
283 ProgramStateRef State = C.getState();
284 SymbolRef Sym = State->getSVal(*IVarLoc).getAsSymbol();
285 if (!Sym || !dyn_cast_or_null<ObjCIvarRegion>(Sym->getOriginRegion()))
286 return;
287
288 // Accessing an ivar directly is unusual. If we've done that, be more
289 // forgiving about what the surrounding code is allowed to do.
290
291 QualType Ty = Sym->getType();
292 RetEffect::ObjKind Kind;
293 if (Ty->isObjCRetainableType())
294 Kind = RetEffect::ObjC;
295 else if (coreFoundation::isCFObjectRef(Ty))
296 Kind = RetEffect::CF;
297 else
298 return;
299
300 // If the value is already known to be nil, don't bother tracking it.
301 ConstraintManager &CMgr = State->getConstraintManager();
302 if (CMgr.isNull(State, Sym).isConstrainedTrue())
303 return;
304
305 if (const RefVal *RV = getRefBinding(State, Sym)) {
306 // If we've seen this symbol before, or we're only seeing it now because
307 // of something the analyzer has synthesized, don't do anything.
308 if (RV->getIvarAccessHistory() != RefVal::IvarAccessHistory::None ||
309 isSynthesizedAccessor(C.getStackFrame())) {
310 return;
311 }
312
313 // Note that this value has been loaded from an ivar.
314 C.addTransition(setRefBinding(State, Sym, RV->withIvarAccess()));
315 return;
316 }
317
318 RefVal PlusZero = RefVal::makeNotOwned(Kind, Ty);
319
320 // In a synthesized accessor, the effective retain count is +0.
321 if (isSynthesizedAccessor(C.getStackFrame())) {
322 C.addTransition(setRefBinding(State, Sym, PlusZero));
323 return;
324 }
325
326 State = setRefBinding(State, Sym, PlusZero.withIvarAccess());
327 C.addTransition(State);
328}
329
330void RetainCountChecker::checkPostCall(const CallEvent &Call,
331 CheckerContext &C) const {
332 RetainSummaryManager &Summaries = getSummaryManager(C);
George Karpenkovefef49c2018-08-21 03:09:02 +0000333
334 // Leave null if no receiver.
335 QualType ReceiverType;
336 if (const auto *MC = dyn_cast<ObjCMethodCall>(&Call)) {
337 if (MC->isInstanceMessage()) {
338 SVal ReceiverV = MC->getReceiverSVal();
339 if (SymbolRef Sym = ReceiverV.getAsLocSymbol())
340 if (const RefVal *T = getRefBinding(C.getState(), Sym))
341 ReceiverType = T->getType();
342 }
343 }
344
345 const RetainSummary *Summ = Summaries.getSummary(Call, ReceiverType);
George Karpenkov70c2ee32018-08-17 21:41:07 +0000346
347 if (C.wasInlined) {
348 processSummaryOfInlined(*Summ, Call, C);
349 return;
350 }
351 checkSummary(*Summ, Call, C);
352}
353
354/// GetReturnType - Used to get the return type of a message expression or
355/// function call with the intention of affixing that type to a tracked symbol.
356/// While the return type can be queried directly from RetEx, when
357/// invoking class methods we augment to the return type to be that of
358/// a pointer to the class (as opposed it just being id).
359// FIXME: We may be able to do this with related result types instead.
360// This function is probably overestimating.
361static QualType GetReturnType(const Expr *RetE, ASTContext &Ctx) {
362 QualType RetTy = RetE->getType();
363 // If RetE is not a message expression just return its type.
364 // If RetE is a message expression, return its types if it is something
365 /// more specific than id.
366 if (const ObjCMessageExpr *ME = dyn_cast<ObjCMessageExpr>(RetE))
367 if (const ObjCObjectPointerType *PT = RetTy->getAs<ObjCObjectPointerType>())
368 if (PT->isObjCQualifiedIdType() || PT->isObjCIdType() ||
369 PT->isObjCClassType()) {
370 // At this point we know the return type of the message expression is
371 // id, id<...>, or Class. If we have an ObjCInterfaceDecl, we know this
372 // is a call to a class method whose type we can resolve. In such
373 // cases, promote the return type to XXX* (where XXX is the class).
374 const ObjCInterfaceDecl *D = ME->getReceiverInterface();
375 return !D ? RetTy :
376 Ctx.getObjCObjectPointerType(Ctx.getObjCInterfaceType(D));
377 }
378
379 return RetTy;
380}
381
382// We don't always get the exact modeling of the function with regards to the
383// retain count checker even when the function is inlined. For example, we need
384// to stop tracking the symbols which were marked with StopTrackingHard.
385void RetainCountChecker::processSummaryOfInlined(const RetainSummary &Summ,
386 const CallEvent &CallOrMsg,
387 CheckerContext &C) const {
388 ProgramStateRef state = C.getState();
389
390 // Evaluate the effect of the arguments.
391 for (unsigned idx = 0, e = CallOrMsg.getNumArgs(); idx != e; ++idx) {
392 if (Summ.getArg(idx) == StopTrackingHard) {
393 SVal V = CallOrMsg.getArgSVal(idx);
394 if (SymbolRef Sym = V.getAsLocSymbol()) {
395 state = removeRefBinding(state, Sym);
396 }
397 }
398 }
399
400 // Evaluate the effect on the message receiver.
401 const ObjCMethodCall *MsgInvocation = dyn_cast<ObjCMethodCall>(&CallOrMsg);
402 if (MsgInvocation) {
403 if (SymbolRef Sym = MsgInvocation->getReceiverSVal().getAsLocSymbol()) {
404 if (Summ.getReceiverEffect() == StopTrackingHard) {
405 state = removeRefBinding(state, Sym);
406 }
407 }
408 }
409
410 // Consult the summary for the return value.
411 RetEffect RE = Summ.getRetEffect();
412 if (RE.getKind() == RetEffect::NoRetHard) {
413 SymbolRef Sym = CallOrMsg.getReturnValue().getAsSymbol();
414 if (Sym)
415 state = removeRefBinding(state, Sym);
416 }
417
418 C.addTransition(state);
419}
420
421static ProgramStateRef updateOutParameter(ProgramStateRef State,
422 SVal ArgVal,
423 ArgEffect Effect) {
424 auto *ArgRegion = dyn_cast_or_null<TypedValueRegion>(ArgVal.getAsRegion());
425 if (!ArgRegion)
426 return State;
427
428 QualType PointeeTy = ArgRegion->getValueType();
429 if (!coreFoundation::isCFObjectRef(PointeeTy))
430 return State;
431
432 SVal PointeeVal = State->getSVal(ArgRegion);
433 SymbolRef Pointee = PointeeVal.getAsLocSymbol();
434 if (!Pointee)
435 return State;
436
437 switch (Effect) {
438 case UnretainedOutParameter:
439 State = setRefBinding(State, Pointee,
440 RefVal::makeNotOwned(RetEffect::CF, PointeeTy));
441 break;
442 case RetainedOutParameter:
443 // Do nothing. Retained out parameters will either point to a +1 reference
444 // or NULL, but the way you check for failure differs depending on the API.
445 // Consequently, we don't have a good way to track them yet.
446 break;
447
448 default:
449 llvm_unreachable("only for out parameters");
450 }
451
452 return State;
453}
454
455void RetainCountChecker::checkSummary(const RetainSummary &Summ,
456 const CallEvent &CallOrMsg,
457 CheckerContext &C) const {
458 ProgramStateRef state = C.getState();
459
460 // Evaluate the effect of the arguments.
461 RefVal::Kind hasErr = (RefVal::Kind) 0;
462 SourceRange ErrorRange;
463 SymbolRef ErrorSym = nullptr;
464
465 for (unsigned idx = 0, e = CallOrMsg.getNumArgs(); idx != e; ++idx) {
466 SVal V = CallOrMsg.getArgSVal(idx);
467
468 ArgEffect Effect = Summ.getArg(idx);
469 if (Effect == RetainedOutParameter || Effect == UnretainedOutParameter) {
470 state = updateOutParameter(state, V, Effect);
471 } else if (SymbolRef Sym = V.getAsLocSymbol()) {
472 if (const RefVal *T = getRefBinding(state, Sym)) {
473 state = updateSymbol(state, Sym, *T, Effect, hasErr, C);
474 if (hasErr) {
475 ErrorRange = CallOrMsg.getArgSourceRange(idx);
476 ErrorSym = Sym;
477 break;
478 }
479 }
480 }
481 }
482
483 // Evaluate the effect on the message receiver.
484 bool ReceiverIsTracked = false;
485 if (!hasErr) {
486 const ObjCMethodCall *MsgInvocation = dyn_cast<ObjCMethodCall>(&CallOrMsg);
487 if (MsgInvocation) {
488 if (SymbolRef Sym = MsgInvocation->getReceiverSVal().getAsLocSymbol()) {
489 if (const RefVal *T = getRefBinding(state, Sym)) {
490 ReceiverIsTracked = true;
491 state = updateSymbol(state, Sym, *T, Summ.getReceiverEffect(),
492 hasErr, C);
493 if (hasErr) {
494 ErrorRange = MsgInvocation->getOriginExpr()->getReceiverRange();
495 ErrorSym = Sym;
496 }
497 }
498 }
499 }
500 }
501
502 // Process any errors.
503 if (hasErr) {
504 processNonLeakError(state, ErrorRange, hasErr, ErrorSym, C);
505 return;
506 }
507
508 // Consult the summary for the return value.
509 RetEffect RE = Summ.getRetEffect();
510
511 if (RE.getKind() == RetEffect::OwnedWhenTrackedReceiver) {
512 if (ReceiverIsTracked)
513 RE = getSummaryManager(C).getObjAllocRetEffect();
514 else
515 RE = RetEffect::MakeNoRet();
516 }
517
518 switch (RE.getKind()) {
519 default:
520 llvm_unreachable("Unhandled RetEffect.");
521
522 case RetEffect::NoRet:
523 case RetEffect::NoRetHard:
524 // No work necessary.
525 break;
526
527 case RetEffect::OwnedSymbol: {
528 SymbolRef Sym = CallOrMsg.getReturnValue().getAsSymbol();
529 if (!Sym)
530 break;
531
532 // Use the result type from the CallEvent as it automatically adjusts
533 // for methods/functions that return references.
534 QualType ResultTy = CallOrMsg.getResultType();
535 state = setRefBinding(state, Sym, RefVal::makeOwned(RE.getObjKind(),
536 ResultTy));
537
538 // FIXME: Add a flag to the checker where allocations are assumed to
539 // *not* fail.
540 break;
541 }
542
543 case RetEffect::NotOwnedSymbol: {
544 const Expr *Ex = CallOrMsg.getOriginExpr();
545 SymbolRef Sym = CallOrMsg.getReturnValue().getAsSymbol();
546 if (!Sym)
547 break;
548 assert(Ex);
549 // Use GetReturnType in order to give [NSFoo alloc] the type NSFoo *.
550 QualType ResultTy = GetReturnType(Ex, C.getASTContext());
551 state = setRefBinding(state, Sym, RefVal::makeNotOwned(RE.getObjKind(),
552 ResultTy));
553 break;
554 }
555 }
556
557 // This check is actually necessary; otherwise the statement builder thinks
558 // we've hit a previously-found path.
559 // Normally addTransition takes care of this, but we want the node pointer.
560 ExplodedNode *NewNode;
561 if (state == C.getState()) {
562 NewNode = C.getPredecessor();
563 } else {
564 NewNode = C.addTransition(state);
565 }
566
567 // Annotate the node with summary we used.
568 if (NewNode) {
569 // FIXME: This is ugly. See checkEndAnalysis for why it's necessary.
570 if (ShouldResetSummaryLog) {
571 SummaryLog.clear();
572 ShouldResetSummaryLog = false;
573 }
574 SummaryLog[NewNode] = &Summ;
575 }
576}
577
578ProgramStateRef
579RetainCountChecker::updateSymbol(ProgramStateRef state, SymbolRef sym,
580 RefVal V, ArgEffect E, RefVal::Kind &hasErr,
581 CheckerContext &C) const {
582 bool IgnoreRetainMsg = (bool)C.getASTContext().getLangOpts().ObjCAutoRefCount;
583 switch (E) {
584 default:
585 break;
586 case IncRefMsg:
587 E = IgnoreRetainMsg ? DoNothing : IncRef;
588 break;
589 case DecRefMsg:
590 E = IgnoreRetainMsg ? DoNothing: DecRef;
591 break;
592 case DecRefMsgAndStopTrackingHard:
593 E = IgnoreRetainMsg ? StopTracking : DecRefAndStopTrackingHard;
594 break;
George Karpenkovbc0cddf2018-08-17 21:42:59 +0000595 case MakeCollectable:
596 E = DoNothing;
George Karpenkov70c2ee32018-08-17 21:41:07 +0000597 }
598
599 // Handle all use-after-releases.
600 if (V.getKind() == RefVal::Released) {
601 V = V ^ RefVal::ErrorUseAfterRelease;
602 hasErr = V.getKind();
603 return setRefBinding(state, sym, V);
604 }
605
606 switch (E) {
607 case DecRefMsg:
608 case IncRefMsg:
George Karpenkovbc0cddf2018-08-17 21:42:59 +0000609 case MakeCollectable:
George Karpenkov70c2ee32018-08-17 21:41:07 +0000610 case DecRefMsgAndStopTrackingHard:
George Karpenkovbc0cddf2018-08-17 21:42:59 +0000611 llvm_unreachable("DecRefMsg/IncRefMsg/MakeCollectable already converted");
George Karpenkov70c2ee32018-08-17 21:41:07 +0000612
613 case UnretainedOutParameter:
614 case RetainedOutParameter:
615 llvm_unreachable("Applies to pointer-to-pointer parameters, which should "
616 "not have ref state.");
617
618 case Dealloc:
619 switch (V.getKind()) {
620 default:
621 llvm_unreachable("Invalid RefVal state for an explicit dealloc.");
622 case RefVal::Owned:
623 // The object immediately transitions to the released state.
624 V = V ^ RefVal::Released;
625 V.clearCounts();
626 return setRefBinding(state, sym, V);
627 case RefVal::NotOwned:
628 V = V ^ RefVal::ErrorDeallocNotOwned;
629 hasErr = V.getKind();
630 break;
631 }
632 break;
633
634 case MayEscape:
635 if (V.getKind() == RefVal::Owned) {
636 V = V ^ RefVal::NotOwned;
637 break;
638 }
639
640 // Fall-through.
641
642 case DoNothing:
643 return state;
644
645 case Autorelease:
646 // Update the autorelease counts.
647 V = V.autorelease();
648 break;
649
650 case StopTracking:
651 case StopTrackingHard:
652 return removeRefBinding(state, sym);
653
654 case IncRef:
655 switch (V.getKind()) {
656 default:
657 llvm_unreachable("Invalid RefVal state for a retain.");
658 case RefVal::Owned:
659 case RefVal::NotOwned:
660 V = V + 1;
661 break;
662 }
663 break;
664
665 case DecRef:
666 case DecRefBridgedTransferred:
667 case DecRefAndStopTrackingHard:
668 switch (V.getKind()) {
669 default:
670 // case 'RefVal::Released' handled above.
671 llvm_unreachable("Invalid RefVal state for a release.");
672
673 case RefVal::Owned:
674 assert(V.getCount() > 0);
675 if (V.getCount() == 1) {
676 if (E == DecRefBridgedTransferred ||
677 V.getIvarAccessHistory() ==
678 RefVal::IvarAccessHistory::AccessedDirectly)
679 V = V ^ RefVal::NotOwned;
680 else
681 V = V ^ RefVal::Released;
682 } else if (E == DecRefAndStopTrackingHard) {
683 return removeRefBinding(state, sym);
684 }
685
686 V = V - 1;
687 break;
688
689 case RefVal::NotOwned:
690 if (V.getCount() > 0) {
691 if (E == DecRefAndStopTrackingHard)
692 return removeRefBinding(state, sym);
693 V = V - 1;
694 } else if (V.getIvarAccessHistory() ==
695 RefVal::IvarAccessHistory::AccessedDirectly) {
696 // Assume that the instance variable was holding on the object at
697 // +1, and we just didn't know.
698 if (E == DecRefAndStopTrackingHard)
699 return removeRefBinding(state, sym);
700 V = V.releaseViaIvar() ^ RefVal::Released;
701 } else {
702 V = V ^ RefVal::ErrorReleaseNotOwned;
703 hasErr = V.getKind();
704 }
705 break;
706 }
707 break;
708 }
709 return setRefBinding(state, sym, V);
710}
711
712void RetainCountChecker::processNonLeakError(ProgramStateRef St,
713 SourceRange ErrorRange,
714 RefVal::Kind ErrorKind,
715 SymbolRef Sym,
716 CheckerContext &C) const {
717 // HACK: Ignore retain-count issues on values accessed through ivars,
718 // because of cases like this:
719 // [_contentView retain];
720 // [_contentView removeFromSuperview];
721 // [self addSubview:_contentView]; // invalidates 'self'
722 // [_contentView release];
723 if (const RefVal *RV = getRefBinding(St, Sym))
724 if (RV->getIvarAccessHistory() != RefVal::IvarAccessHistory::None)
725 return;
726
727 ExplodedNode *N = C.generateErrorNode(St);
728 if (!N)
729 return;
730
731 CFRefBug *BT;
732 switch (ErrorKind) {
733 default:
734 llvm_unreachable("Unhandled error.");
735 case RefVal::ErrorUseAfterRelease:
736 if (!useAfterRelease)
737 useAfterRelease.reset(new UseAfterRelease(this));
738 BT = useAfterRelease.get();
739 break;
740 case RefVal::ErrorReleaseNotOwned:
741 if (!releaseNotOwned)
742 releaseNotOwned.reset(new BadRelease(this));
743 BT = releaseNotOwned.get();
744 break;
745 case RefVal::ErrorDeallocNotOwned:
746 if (!deallocNotOwned)
747 deallocNotOwned.reset(new DeallocNotOwned(this));
748 BT = deallocNotOwned.get();
749 break;
750 }
751
752 assert(BT);
753 auto report = std::unique_ptr<BugReport>(
754 new CFRefReport(*BT, C.getASTContext().getLangOpts(),
755 SummaryLog, N, Sym));
756 report->addRange(ErrorRange);
757 C.emitReport(std::move(report));
758}
759
760//===----------------------------------------------------------------------===//
761// Handle the return values of retain-count-related functions.
762//===----------------------------------------------------------------------===//
763
764bool RetainCountChecker::evalCall(const CallExpr *CE, CheckerContext &C) const {
765 // Get the callee. We're only interested in simple C functions.
766 ProgramStateRef state = C.getState();
767 const FunctionDecl *FD = C.getCalleeDecl(CE);
768 if (!FD)
769 return false;
770
George Karpenkovc4d6b932018-08-17 21:42:05 +0000771 RetainSummaryManager &SmrMgr = getSummaryManager(C);
772 QualType ResultTy = CE->getCallReturnType(C.getASTContext());
George Karpenkov70c2ee32018-08-17 21:41:07 +0000773
George Karpenkov70c2ee32018-08-17 21:41:07 +0000774 // See if the function has 'rc_ownership_trusted_implementation'
775 // annotate attribute. If it does, we will not inline it.
776 bool hasTrustedImplementationAnnotation = false;
777
George Karpenkovc4d6b932018-08-17 21:42:05 +0000778 // See if it's one of the specific functions we know how to eval.
George Karpenkovb1b791b2018-08-17 21:43:27 +0000779 if (!SmrMgr.canEval(CE, FD, hasTrustedImplementationAnnotation))
George Karpenkov70c2ee32018-08-17 21:41:07 +0000780 return false;
781
782 // Bind the return value.
783 const LocationContext *LCtx = C.getLocationContext();
784 SVal RetVal = state->getSVal(CE->getArg(0), LCtx);
785 if (RetVal.isUnknown() ||
786 (hasTrustedImplementationAnnotation && !ResultTy.isNull())) {
787 // If the receiver is unknown or the function has
788 // 'rc_ownership_trusted_implementation' annotate attribute, conjure a
789 // return value.
790 SValBuilder &SVB = C.getSValBuilder();
791 RetVal = SVB.conjureSymbolVal(nullptr, CE, LCtx, ResultTy, C.blockCount());
792 }
793 state = state->BindExpr(CE, LCtx, RetVal, false);
794
795 // FIXME: This should not be necessary, but otherwise the argument seems to be
796 // considered alive during the next statement.
797 if (const MemRegion *ArgRegion = RetVal.getAsRegion()) {
798 // Save the refcount status of the argument.
799 SymbolRef Sym = RetVal.getAsLocSymbol();
800 const RefVal *Binding = nullptr;
801 if (Sym)
802 Binding = getRefBinding(state, Sym);
803
804 // Invalidate the argument region.
805 state = state->invalidateRegions(
806 ArgRegion, CE, C.blockCount(), LCtx,
807 /*CausesPointerEscape*/ hasTrustedImplementationAnnotation);
808
809 // Restore the refcount status of the argument.
810 if (Binding)
811 state = setRefBinding(state, Sym, *Binding);
812 }
813
814 C.addTransition(state);
815 return true;
816}
817
818//===----------------------------------------------------------------------===//
819// Handle return statements.
820//===----------------------------------------------------------------------===//
821
822void RetainCountChecker::checkPreStmt(const ReturnStmt *S,
823 CheckerContext &C) const {
824
825 // Only adjust the reference count if this is the top-level call frame,
826 // and not the result of inlining. In the future, we should do
827 // better checking even for inlined calls, and see if they match
828 // with their expected semantics (e.g., the method should return a retained
829 // object, etc.).
830 if (!C.inTopFrame())
831 return;
832
833 const Expr *RetE = S->getRetValue();
834 if (!RetE)
835 return;
836
837 ProgramStateRef state = C.getState();
838 SymbolRef Sym =
839 state->getSValAsScalarOrLoc(RetE, C.getLocationContext()).getAsLocSymbol();
840 if (!Sym)
841 return;
842
843 // Get the reference count binding (if any).
844 const RefVal *T = getRefBinding(state, Sym);
845 if (!T)
846 return;
847
848 // Change the reference count.
849 RefVal X = *T;
850
851 switch (X.getKind()) {
852 case RefVal::Owned: {
853 unsigned cnt = X.getCount();
854 assert(cnt > 0);
855 X.setCount(cnt - 1);
856 X = X ^ RefVal::ReturnedOwned;
857 break;
858 }
859
860 case RefVal::NotOwned: {
861 unsigned cnt = X.getCount();
862 if (cnt) {
863 X.setCount(cnt - 1);
864 X = X ^ RefVal::ReturnedOwned;
865 }
866 else {
867 X = X ^ RefVal::ReturnedNotOwned;
868 }
869 break;
870 }
871
872 default:
873 return;
874 }
875
876 // Update the binding.
877 state = setRefBinding(state, Sym, X);
878 ExplodedNode *Pred = C.addTransition(state);
879
880 // At this point we have updated the state properly.
881 // Everything after this is merely checking to see if the return value has
882 // been over- or under-retained.
883
884 // Did we cache out?
885 if (!Pred)
886 return;
887
888 // Update the autorelease counts.
889 static CheckerProgramPointTag AutoreleaseTag(this, "Autorelease");
890 state = handleAutoreleaseCounts(state, Pred, &AutoreleaseTag, C, Sym, X);
891
892 // Did we cache out?
893 if (!state)
894 return;
895
896 // Get the updated binding.
897 T = getRefBinding(state, Sym);
898 assert(T);
899 X = *T;
900
901 // Consult the summary of the enclosing method.
902 RetainSummaryManager &Summaries = getSummaryManager(C);
903 const Decl *CD = &Pred->getCodeDecl();
904 RetEffect RE = RetEffect::MakeNoRet();
905
906 // FIXME: What is the convention for blocks? Is there one?
907 if (const ObjCMethodDecl *MD = dyn_cast<ObjCMethodDecl>(CD)) {
908 const RetainSummary *Summ = Summaries.getMethodSummary(MD);
909 RE = Summ->getRetEffect();
910 } else if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(CD)) {
911 if (!isa<CXXMethodDecl>(FD)) {
912 const RetainSummary *Summ = Summaries.getFunctionSummary(FD);
913 RE = Summ->getRetEffect();
914 }
915 }
916
917 checkReturnWithRetEffect(S, C, Pred, RE, X, Sym, state);
918}
919
920void RetainCountChecker::checkReturnWithRetEffect(const ReturnStmt *S,
921 CheckerContext &C,
922 ExplodedNode *Pred,
923 RetEffect RE, RefVal X,
924 SymbolRef Sym,
925 ProgramStateRef state) const {
926 // HACK: Ignore retain-count issues on values accessed through ivars,
927 // because of cases like this:
928 // [_contentView retain];
929 // [_contentView removeFromSuperview];
930 // [self addSubview:_contentView]; // invalidates 'self'
931 // [_contentView release];
932 if (X.getIvarAccessHistory() != RefVal::IvarAccessHistory::None)
933 return;
934
935 // Any leaks or other errors?
936 if (X.isReturnedOwned() && X.getCount() == 0) {
937 if (RE.getKind() != RetEffect::NoRet) {
938 bool hasError = false;
939 if (!RE.isOwned()) {
940 // The returning type is a CF, we expect the enclosing method should
941 // return ownership.
942 hasError = true;
943 X = X ^ RefVal::ErrorLeakReturned;
944 }
945
946 if (hasError) {
947 // Generate an error node.
948 state = setRefBinding(state, Sym, X);
949
950 static CheckerProgramPointTag ReturnOwnLeakTag(this, "ReturnsOwnLeak");
951 ExplodedNode *N = C.addTransition(state, Pred, &ReturnOwnLeakTag);
952 if (N) {
953 const LangOptions &LOpts = C.getASTContext().getLangOpts();
954 C.emitReport(std::unique_ptr<BugReport>(new CFRefLeakReport(
955 *getLeakAtReturnBug(LOpts), LOpts,
956 SummaryLog, N, Sym, C, IncludeAllocationLine)));
957 }
958 }
959 }
960 } else if (X.isReturnedNotOwned()) {
961 if (RE.isOwned()) {
962 if (X.getIvarAccessHistory() ==
963 RefVal::IvarAccessHistory::AccessedDirectly) {
964 // Assume the method was trying to transfer a +1 reference from a
965 // strong ivar to the caller.
966 state = setRefBinding(state, Sym,
967 X.releaseViaIvar() ^ RefVal::ReturnedOwned);
968 } else {
969 // Trying to return a not owned object to a caller expecting an
970 // owned object.
971 state = setRefBinding(state, Sym, X ^ RefVal::ErrorReturnedNotOwned);
972
973 static CheckerProgramPointTag
974 ReturnNotOwnedTag(this, "ReturnNotOwnedForOwned");
975
976 ExplodedNode *N = C.addTransition(state, Pred, &ReturnNotOwnedTag);
977 if (N) {
978 if (!returnNotOwnedForOwned)
979 returnNotOwnedForOwned.reset(new ReturnedNotOwnedForOwned(this));
980
981 C.emitReport(std::unique_ptr<BugReport>(new CFRefReport(
982 *returnNotOwnedForOwned, C.getASTContext().getLangOpts(),
983 SummaryLog, N, Sym)));
984 }
985 }
986 }
987 }
988}
989
990//===----------------------------------------------------------------------===//
991// Check various ways a symbol can be invalidated.
992//===----------------------------------------------------------------------===//
993
994void RetainCountChecker::checkBind(SVal loc, SVal val, const Stmt *S,
995 CheckerContext &C) const {
996 // Are we storing to something that causes the value to "escape"?
997 bool escapes = true;
998
999 // A value escapes in three possible cases (this may change):
1000 //
1001 // (1) we are binding to something that is not a memory region.
1002 // (2) we are binding to a memregion that does not have stack storage
1003 // (3) we are binding to a memregion with stack storage that the store
1004 // does not understand.
1005 ProgramStateRef state = C.getState();
1006
1007 if (Optional<loc::MemRegionVal> regionLoc = loc.getAs<loc::MemRegionVal>()) {
1008 escapes = !regionLoc->getRegion()->hasStackStorage();
1009
1010 if (!escapes) {
1011 // To test (3), generate a new state with the binding added. If it is
1012 // the same state, then it escapes (since the store cannot represent
1013 // the binding).
1014 // Do this only if we know that the store is not supposed to generate the
1015 // same state.
1016 SVal StoredVal = state->getSVal(regionLoc->getRegion());
1017 if (StoredVal != val)
1018 escapes = (state == (state->bindLoc(*regionLoc, val, C.getLocationContext())));
1019 }
1020 if (!escapes) {
1021 // Case 4: We do not currently model what happens when a symbol is
1022 // assigned to a struct field, so be conservative here and let the symbol
1023 // go. TODO: This could definitely be improved upon.
1024 escapes = !isa<VarRegion>(regionLoc->getRegion());
1025 }
1026 }
1027
1028 // If we are storing the value into an auto function scope variable annotated
1029 // with (__attribute__((cleanup))), stop tracking the value to avoid leak
1030 // false positives.
1031 if (const VarRegion *LVR = dyn_cast_or_null<VarRegion>(loc.getAsRegion())) {
1032 const VarDecl *VD = LVR->getDecl();
1033 if (VD->hasAttr<CleanupAttr>()) {
1034 escapes = true;
1035 }
1036 }
1037
1038 // If our store can represent the binding and we aren't storing to something
1039 // that doesn't have local storage then just return and have the simulation
1040 // state continue as is.
1041 if (!escapes)
1042 return;
1043
1044 // Otherwise, find all symbols referenced by 'val' that we are tracking
1045 // and stop tracking them.
1046 state = state->scanReachableSymbols<StopTrackingCallback>(val).getState();
1047 C.addTransition(state);
1048}
1049
1050ProgramStateRef RetainCountChecker::evalAssume(ProgramStateRef state,
1051 SVal Cond,
1052 bool Assumption) const {
1053 // FIXME: We may add to the interface of evalAssume the list of symbols
1054 // whose assumptions have changed. For now we just iterate through the
1055 // bindings and check if any of the tracked symbols are NULL. This isn't
1056 // too bad since the number of symbols we will track in practice are
1057 // probably small and evalAssume is only called at branches and a few
1058 // other places.
1059 RefBindingsTy B = state->get<RefBindings>();
1060
1061 if (B.isEmpty())
1062 return state;
1063
1064 bool changed = false;
1065 RefBindingsTy::Factory &RefBFactory = state->get_context<RefBindings>();
1066
1067 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I) {
1068 // Check if the symbol is null stop tracking the symbol.
1069 ConstraintManager &CMgr = state->getConstraintManager();
1070 ConditionTruthVal AllocFailed = CMgr.isNull(state, I.getKey());
1071 if (AllocFailed.isConstrainedTrue()) {
1072 changed = true;
1073 B = RefBFactory.remove(B, I.getKey());
1074 }
1075 }
1076
1077 if (changed)
1078 state = state->set<RefBindings>(B);
1079
1080 return state;
1081}
1082
1083ProgramStateRef
1084RetainCountChecker::checkRegionChanges(ProgramStateRef state,
1085 const InvalidatedSymbols *invalidated,
1086 ArrayRef<const MemRegion *> ExplicitRegions,
1087 ArrayRef<const MemRegion *> Regions,
1088 const LocationContext *LCtx,
1089 const CallEvent *Call) const {
1090 if (!invalidated)
1091 return state;
1092
1093 llvm::SmallPtrSet<SymbolRef, 8> WhitelistedSymbols;
1094 for (ArrayRef<const MemRegion *>::iterator I = ExplicitRegions.begin(),
1095 E = ExplicitRegions.end(); I != E; ++I) {
1096 if (const SymbolicRegion *SR = (*I)->StripCasts()->getAs<SymbolicRegion>())
1097 WhitelistedSymbols.insert(SR->getSymbol());
1098 }
1099
1100 for (InvalidatedSymbols::const_iterator I=invalidated->begin(),
1101 E = invalidated->end(); I!=E; ++I) {
1102 SymbolRef sym = *I;
1103 if (WhitelistedSymbols.count(sym))
1104 continue;
1105 // Remove any existing reference-count binding.
1106 state = removeRefBinding(state, sym);
1107 }
1108 return state;
1109}
1110
1111//===----------------------------------------------------------------------===//
1112// Handle dead symbols and end-of-path.
1113//===----------------------------------------------------------------------===//
1114
1115ProgramStateRef
1116RetainCountChecker::handleAutoreleaseCounts(ProgramStateRef state,
1117 ExplodedNode *Pred,
1118 const ProgramPointTag *Tag,
1119 CheckerContext &Ctx,
1120 SymbolRef Sym, RefVal V) const {
1121 unsigned ACnt = V.getAutoreleaseCount();
1122
1123 // No autorelease counts? Nothing to be done.
1124 if (!ACnt)
1125 return state;
1126
1127 unsigned Cnt = V.getCount();
1128
1129 // FIXME: Handle sending 'autorelease' to already released object.
1130
1131 if (V.getKind() == RefVal::ReturnedOwned)
1132 ++Cnt;
1133
1134 // If we would over-release here, but we know the value came from an ivar,
1135 // assume it was a strong ivar that's just been relinquished.
1136 if (ACnt > Cnt &&
1137 V.getIvarAccessHistory() == RefVal::IvarAccessHistory::AccessedDirectly) {
1138 V = V.releaseViaIvar();
1139 --ACnt;
1140 }
1141
1142 if (ACnt <= Cnt) {
1143 if (ACnt == Cnt) {
1144 V.clearCounts();
1145 if (V.getKind() == RefVal::ReturnedOwned)
1146 V = V ^ RefVal::ReturnedNotOwned;
1147 else
1148 V = V ^ RefVal::NotOwned;
1149 } else {
1150 V.setCount(V.getCount() - ACnt);
1151 V.setAutoreleaseCount(0);
1152 }
1153 return setRefBinding(state, Sym, V);
1154 }
1155
1156 // HACK: Ignore retain-count issues on values accessed through ivars,
1157 // because of cases like this:
1158 // [_contentView retain];
1159 // [_contentView removeFromSuperview];
1160 // [self addSubview:_contentView]; // invalidates 'self'
1161 // [_contentView release];
1162 if (V.getIvarAccessHistory() != RefVal::IvarAccessHistory::None)
1163 return state;
1164
1165 // Woah! More autorelease counts then retain counts left.
1166 // Emit hard error.
1167 V = V ^ RefVal::ErrorOverAutorelease;
1168 state = setRefBinding(state, Sym, V);
1169
1170 ExplodedNode *N = Ctx.generateSink(state, Pred, Tag);
1171 if (N) {
1172 SmallString<128> sbuf;
1173 llvm::raw_svector_ostream os(sbuf);
1174 os << "Object was autoreleased ";
1175 if (V.getAutoreleaseCount() > 1)
1176 os << V.getAutoreleaseCount() << " times but the object ";
1177 else
1178 os << "but ";
1179 os << "has a +" << V.getCount() << " retain count";
1180
1181 if (!overAutorelease)
1182 overAutorelease.reset(new OverAutorelease(this));
1183
1184 const LangOptions &LOpts = Ctx.getASTContext().getLangOpts();
1185 Ctx.emitReport(std::unique_ptr<BugReport>(
1186 new CFRefReport(*overAutorelease, LOpts,
1187 SummaryLog, N, Sym, os.str())));
1188 }
1189
1190 return nullptr;
1191}
1192
1193ProgramStateRef
1194RetainCountChecker::handleSymbolDeath(ProgramStateRef state,
1195 SymbolRef sid, RefVal V,
1196 SmallVectorImpl<SymbolRef> &Leaked) const {
1197 bool hasLeak;
1198
1199 // HACK: Ignore retain-count issues on values accessed through ivars,
1200 // because of cases like this:
1201 // [_contentView retain];
1202 // [_contentView removeFromSuperview];
1203 // [self addSubview:_contentView]; // invalidates 'self'
1204 // [_contentView release];
1205 if (V.getIvarAccessHistory() != RefVal::IvarAccessHistory::None)
1206 hasLeak = false;
1207 else if (V.isOwned())
1208 hasLeak = true;
1209 else if (V.isNotOwned() || V.isReturnedOwned())
1210 hasLeak = (V.getCount() > 0);
1211 else
1212 hasLeak = false;
1213
1214 if (!hasLeak)
1215 return removeRefBinding(state, sid);
1216
1217 Leaked.push_back(sid);
1218 return setRefBinding(state, sid, V ^ RefVal::ErrorLeak);
1219}
1220
1221ExplodedNode *
1222RetainCountChecker::processLeaks(ProgramStateRef state,
1223 SmallVectorImpl<SymbolRef> &Leaked,
1224 CheckerContext &Ctx,
1225 ExplodedNode *Pred) const {
1226 // Generate an intermediate node representing the leak point.
1227 ExplodedNode *N = Ctx.addTransition(state, Pred);
1228
1229 if (N) {
1230 for (SmallVectorImpl<SymbolRef>::iterator
1231 I = Leaked.begin(), E = Leaked.end(); I != E; ++I) {
1232
1233 const LangOptions &LOpts = Ctx.getASTContext().getLangOpts();
1234 CFRefBug *BT = Pred ? getLeakWithinFunctionBug(LOpts)
1235 : getLeakAtReturnBug(LOpts);
1236 assert(BT && "BugType not initialized.");
1237
1238 Ctx.emitReport(std::unique_ptr<BugReport>(
1239 new CFRefLeakReport(*BT, LOpts, SummaryLog, N, *I, Ctx,
1240 IncludeAllocationLine)));
1241 }
1242 }
1243
1244 return N;
1245}
1246
George Karpenkovb1b791b2018-08-17 21:43:27 +00001247static bool isISLObjectRef(QualType Ty) {
1248 return StringRef(Ty.getAsString()).startswith("isl_");
George Karpenkov70c2ee32018-08-17 21:41:07 +00001249}
1250
1251void RetainCountChecker::checkBeginFunction(CheckerContext &Ctx) const {
1252 if (!Ctx.inTopFrame())
1253 return;
1254
George Karpenkovc4d6b932018-08-17 21:42:05 +00001255 RetainSummaryManager &SmrMgr = getSummaryManager(Ctx);
George Karpenkov70c2ee32018-08-17 21:41:07 +00001256 const LocationContext *LCtx = Ctx.getLocationContext();
1257 const FunctionDecl *FD = dyn_cast<FunctionDecl>(LCtx->getDecl());
1258
George Karpenkovc4d6b932018-08-17 21:42:05 +00001259 if (!FD || SmrMgr.isTrustedReferenceCountImplementation(FD))
George Karpenkov70c2ee32018-08-17 21:41:07 +00001260 return;
1261
1262 ProgramStateRef state = Ctx.getState();
George Karpenkovc4d6b932018-08-17 21:42:05 +00001263 const RetainSummary *FunctionSummary = SmrMgr.getFunctionSummary(FD);
George Karpenkov70c2ee32018-08-17 21:41:07 +00001264 ArgEffects CalleeSideArgEffects = FunctionSummary->getArgEffects();
1265
1266 for (unsigned idx = 0, e = FD->getNumParams(); idx != e; ++idx) {
1267 const ParmVarDecl *Param = FD->getParamDecl(idx);
1268 SymbolRef Sym = state->getSVal(state->getRegion(Param, LCtx)).getAsSymbol();
1269
1270 QualType Ty = Param->getType();
1271 const ArgEffect *AE = CalleeSideArgEffects.lookup(idx);
George Karpenkovb1b791b2018-08-17 21:43:27 +00001272 if (AE && *AE == DecRef && isISLObjectRef(Ty)) {
George Karpenkov70c2ee32018-08-17 21:41:07 +00001273 state = setRefBinding(state, Sym, RefVal::makeOwned(RetEffect::ObjKind::Generalized, Ty));
George Karpenkovb1b791b2018-08-17 21:43:27 +00001274 } else if (isISLObjectRef(Ty)) {
George Karpenkov70c2ee32018-08-17 21:41:07 +00001275 state = setRefBinding(
1276 state, Sym,
1277 RefVal::makeNotOwned(RetEffect::ObjKind::Generalized, Ty));
1278 }
1279 }
1280
1281 Ctx.addTransition(state);
1282}
1283
1284void RetainCountChecker::checkEndFunction(const ReturnStmt *RS,
1285 CheckerContext &Ctx) const {
1286 ProgramStateRef state = Ctx.getState();
1287 RefBindingsTy B = state->get<RefBindings>();
1288 ExplodedNode *Pred = Ctx.getPredecessor();
1289
1290 // Don't process anything within synthesized bodies.
1291 const LocationContext *LCtx = Pred->getLocationContext();
1292 if (LCtx->getAnalysisDeclContext()->isBodyAutosynthesized()) {
1293 assert(!LCtx->inTopFrame());
1294 return;
1295 }
1296
1297 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I) {
1298 state = handleAutoreleaseCounts(state, Pred, /*Tag=*/nullptr, Ctx,
1299 I->first, I->second);
1300 if (!state)
1301 return;
1302 }
1303
1304 // If the current LocationContext has a parent, don't check for leaks.
1305 // We will do that later.
1306 // FIXME: we should instead check for imbalances of the retain/releases,
1307 // and suggest annotations.
1308 if (LCtx->getParent())
1309 return;
1310
1311 B = state->get<RefBindings>();
1312 SmallVector<SymbolRef, 10> Leaked;
1313
1314 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I)
1315 state = handleSymbolDeath(state, I->first, I->second, Leaked);
1316
1317 processLeaks(state, Leaked, Ctx, Pred);
1318}
1319
1320const ProgramPointTag *
1321RetainCountChecker::getDeadSymbolTag(SymbolRef sym) const {
1322 const CheckerProgramPointTag *&tag = DeadSymbolTags[sym];
1323 if (!tag) {
1324 SmallString<64> buf;
1325 llvm::raw_svector_ostream out(buf);
1326 out << "Dead Symbol : ";
1327 sym->dumpToStream(out);
1328 tag = new CheckerProgramPointTag(this, out.str());
1329 }
1330 return tag;
1331}
1332
1333void RetainCountChecker::checkDeadSymbols(SymbolReaper &SymReaper,
1334 CheckerContext &C) const {
1335 ExplodedNode *Pred = C.getPredecessor();
1336
1337 ProgramStateRef state = C.getState();
1338 RefBindingsTy B = state->get<RefBindings>();
1339 SmallVector<SymbolRef, 10> Leaked;
1340
1341 // Update counts from autorelease pools
1342 for (SymbolReaper::dead_iterator I = SymReaper.dead_begin(),
1343 E = SymReaper.dead_end(); I != E; ++I) {
1344 SymbolRef Sym = *I;
1345 if (const RefVal *T = B.lookup(Sym)){
1346 // Use the symbol as the tag.
1347 // FIXME: This might not be as unique as we would like.
1348 const ProgramPointTag *Tag = getDeadSymbolTag(Sym);
1349 state = handleAutoreleaseCounts(state, Pred, Tag, C, Sym, *T);
1350 if (!state)
1351 return;
1352
1353 // Fetch the new reference count from the state, and use it to handle
1354 // this symbol.
1355 state = handleSymbolDeath(state, *I, *getRefBinding(state, Sym), Leaked);
1356 }
1357 }
1358
1359 if (Leaked.empty()) {
1360 C.addTransition(state);
1361 return;
1362 }
1363
1364 Pred = processLeaks(state, Leaked, C, Pred);
1365
1366 // Did we cache out?
1367 if (!Pred)
1368 return;
1369
1370 // Now generate a new node that nukes the old bindings.
1371 // The only bindings left at this point are the leaked symbols.
1372 RefBindingsTy::Factory &F = state->get_context<RefBindings>();
1373 B = state->get<RefBindings>();
1374
1375 for (SmallVectorImpl<SymbolRef>::iterator I = Leaked.begin(),
1376 E = Leaked.end();
1377 I != E; ++I)
1378 B = F.remove(B, *I);
1379
1380 state = state->set<RefBindings>(B);
1381 C.addTransition(state, Pred);
1382}
1383
1384void RetainCountChecker::printState(raw_ostream &Out, ProgramStateRef State,
1385 const char *NL, const char *Sep) const {
1386
1387 RefBindingsTy B = State->get<RefBindings>();
1388
1389 if (B.isEmpty())
1390 return;
1391
1392 Out << Sep << NL;
1393
1394 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I) {
1395 Out << I->first << " : ";
1396 I->second.print(Out);
1397 Out << NL;
1398 }
1399}
1400
1401//===----------------------------------------------------------------------===//
George Karpenkov70c2ee32018-08-17 21:41:07 +00001402// Checker registration.
1403//===----------------------------------------------------------------------===//
1404
1405void ento::registerRetainCountChecker(CheckerManager &Mgr) {
1406 Mgr.registerChecker<RetainCountChecker>(Mgr.getAnalyzerOptions());
1407}