blob: 239860d64dc983cdf659bf5f252fb9675aa0c430 [file] [log] [blame]
Anna Zaks06f10bf2012-01-26 01:05:43 +00001//== ObjCContainersASTChecker.cpp - CoreFoundation containers API *- C++ -*-==//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// An AST checker that looks for common pitfalls when using 'CFArray',
11// 'CFDictionary', 'CFSet' APIs.
12//
13//===----------------------------------------------------------------------===//
14#include "ClangSACheckers.h"
Anna Zaks06f10bf2012-01-26 01:05:43 +000015#include "clang/AST/StmtVisitor.h"
Chandler Carruth3a022472012-12-04 09:13:33 +000016#include "clang/Analysis/AnalysisContext.h"
Anna Zaks06f10bf2012-01-26 01:05:43 +000017#include "clang/Basic/TargetInfo.h"
Anna Zaks06f10bf2012-01-26 01:05:43 +000018#include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
Chandler Carruth3a022472012-12-04 09:13:33 +000019#include "clang/StaticAnalyzer/Core/Checker.h"
Anna Zaks06f10bf2012-01-26 01:05:43 +000020#include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h"
Benjamin Kramer49038022012-02-04 13:45:25 +000021#include "llvm/ADT/SmallString.h"
Anna Zaks06f10bf2012-01-26 01:05:43 +000022#include "llvm/Support/raw_ostream.h"
23
24using namespace clang;
25using namespace ento;
26
27namespace {
28class WalkAST : public StmtVisitor<WalkAST> {
29 BugReporter &BR;
Alexander Kornienko4aca9b12014-02-11 21:49:21 +000030 const CheckerBase *Checker;
Anna Zaks06f10bf2012-01-26 01:05:43 +000031 AnalysisDeclContext* AC;
32 ASTContext &ASTC;
33 uint64_t PtrWidth;
34
Anna Zaks06f10bf2012-01-26 01:05:43 +000035 /// Check if the type has pointer size (very conservative).
36 inline bool isPointerSize(const Type *T) {
37 if (!T)
38 return true;
39 if (T->isIncompleteType())
40 return true;
41 return (ASTC.getTypeSize(T) == PtrWidth);
42 }
43
44 /// Check if the type is a pointer/array to pointer sized values.
45 inline bool hasPointerToPointerSizedType(const Expr *E) {
46 QualType T = E->getType();
47
48 // The type could be either a pointer or array.
49 const Type *TP = T.getTypePtr();
50 QualType PointeeT = TP->getPointeeType();
Anna Zaks699f55b2012-02-02 01:30:08 +000051 if (!PointeeT.isNull()) {
52 // If the type is a pointer to an array, check the size of the array
53 // elements. To avoid false positives coming from assumption that the
54 // values x and &x are equal when x is an array.
55 if (const Type *TElem = PointeeT->getArrayElementTypeNoTypeQual())
56 if (isPointerSize(TElem))
57 return true;
58
59 // Else, check the pointee size.
Anna Zaks06f10bf2012-01-26 01:05:43 +000060 return isPointerSize(PointeeT.getTypePtr());
Anna Zaks699f55b2012-02-02 01:30:08 +000061 }
Anna Zaks06f10bf2012-01-26 01:05:43 +000062
63 if (const Type *TElem = TP->getArrayElementTypeNoTypeQual())
64 return isPointerSize(TElem);
65
66 // The type must be an array/pointer type.
67
68 // This could be a null constant, which is allowed.
69 if (E->isNullPointerConstant(ASTC, Expr::NPC_ValueDependentIsNull))
70 return true;
71 return false;
72 }
73
74public:
Alexander Kornienko4aca9b12014-02-11 21:49:21 +000075 WalkAST(BugReporter &br, const CheckerBase *checker, AnalysisDeclContext *ac)
76 : BR(br), Checker(checker), AC(ac), ASTC(AC->getASTContext()),
77 PtrWidth(ASTC.getTargetInfo().getPointerWidth(0)) {}
Anna Zaks06f10bf2012-01-26 01:05:43 +000078
79 // Statement visitor methods.
80 void VisitChildren(Stmt *S);
81 void VisitStmt(Stmt *S) { VisitChildren(S); }
82 void VisitCallExpr(CallExpr *CE);
83};
84} // end anonymous namespace
85
86static StringRef getCalleeName(CallExpr *CE) {
87 const FunctionDecl *FD = CE->getDirectCallee();
88 if (!FD)
89 return StringRef();
90
91 IdentifierInfo *II = FD->getIdentifier();
92 if (!II) // if no identifier, not a simple C function
93 return StringRef();
94
95 return II->getName();
96}
97
98void WalkAST::VisitCallExpr(CallExpr *CE) {
99 StringRef Name = getCalleeName(CE);
100 if (Name.empty())
101 return;
102
103 const Expr *Arg = 0;
Jordan Rose968a1b52012-10-16 00:47:25 +0000104 unsigned ArgNum;
Anna Zaks06f10bf2012-01-26 01:05:43 +0000105
106 if (Name.equals("CFArrayCreate") || Name.equals("CFSetCreate")) {
Ted Kremenekd0b97702012-10-12 22:56:36 +0000107 if (CE->getNumArgs() != 4)
108 return;
Anna Zaks06f10bf2012-01-26 01:05:43 +0000109 ArgNum = 1;
110 Arg = CE->getArg(ArgNum)->IgnoreParenCasts();
111 if (hasPointerToPointerSizedType(Arg))
112 return;
Jordan Rose968a1b52012-10-16 00:47:25 +0000113 } else if (Name.equals("CFDictionaryCreate")) {
Ted Kremenekd0b97702012-10-12 22:56:36 +0000114 if (CE->getNumArgs() != 6)
115 return;
Anna Zaks06f10bf2012-01-26 01:05:43 +0000116 // Check first argument.
117 ArgNum = 1;
118 Arg = CE->getArg(ArgNum)->IgnoreParenCasts();
119 if (hasPointerToPointerSizedType(Arg)) {
120 // Check second argument.
121 ArgNum = 2;
122 Arg = CE->getArg(ArgNum)->IgnoreParenCasts();
123 if (hasPointerToPointerSizedType(Arg))
124 // Both are good, return.
125 return;
126 }
127 }
128
Jordan Rose968a1b52012-10-16 00:47:25 +0000129 if (Arg) {
Anna Zaks06f10bf2012-01-26 01:05:43 +0000130 assert(ArgNum == 1 || ArgNum == 2);
131
Jordan Rose968a1b52012-10-16 00:47:25 +0000132 SmallString<64> BufName;
Anna Zaks06f10bf2012-01-26 01:05:43 +0000133 llvm::raw_svector_ostream OsName(BufName);
Anna Zaks06f10bf2012-01-26 01:05:43 +0000134 OsName << " Invalid use of '" << Name << "'" ;
135
Dylan Noblesmith2c1dd272012-02-05 02:13:05 +0000136 SmallString<256> Buf;
Anna Zaks06f10bf2012-01-26 01:05:43 +0000137 llvm::raw_svector_ostream Os(Buf);
Ted Kremenek3f587742012-09-07 07:13:08 +0000138 // Use "second" and "third" since users will expect 1-based indexing
139 // for parameter names when mentioned in prose.
140 Os << " The "<< ((ArgNum == 1) ? "second" : "third") << " argument to '"
Anna Zaks06f10bf2012-01-26 01:05:43 +0000141 << Name << "' must be a C array of pointer-sized values, not '"
142 << Arg->getType().getAsString() << "'";
143
Anna Zaks06f10bf2012-01-26 01:05:43 +0000144 PathDiagnosticLocation CELoc =
145 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC);
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000146 BR.EmitBasicReport(AC->getDecl(), Checker, OsName.str(),
147 categories::CoreFoundationObjectiveC, Os.str(), CELoc,
148 Arg->getSourceRange());
Anna Zaks06f10bf2012-01-26 01:05:43 +0000149 }
150
151 // Recurse and check children.
152 VisitChildren(CE);
153}
154
155void WalkAST::VisitChildren(Stmt *S) {
156 for (Stmt::child_iterator I = S->child_begin(), E = S->child_end(); I!=E; ++I)
157 if (Stmt *child = *I)
158 Visit(child);
159}
160
161namespace {
162class ObjCContainersASTChecker : public Checker<check::ASTCodeBody> {
163public:
164
165 void checkASTCodeBody(const Decl *D, AnalysisManager& Mgr,
166 BugReporter &BR) const {
Alexander Kornienko4aca9b12014-02-11 21:49:21 +0000167 WalkAST walker(BR, this, Mgr.getAnalysisDeclContext(D));
Anna Zaks06f10bf2012-01-26 01:05:43 +0000168 walker.Visit(D->getBody());
169 }
170};
171}
172
173void ento::registerObjCContainersASTChecker(CheckerManager &mgr) {
174 mgr.registerChecker<ObjCContainersASTChecker>();
175}