1 //===- CheckerManager.cpp - Static Analyzer Checker Manager ---------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // Defines the Static Analyzer Checker Manager.
10 //
11 //===----------------------------------------------------------------------===//
12
13 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
14 #include "clang/AST/DeclBase.h"
15 #include "clang/AST/Stmt.h"
16 #include "clang/Analysis/ProgramPoint.h"
17 #include "clang/Basic/JsonSupport.h"
18 #include "clang/Basic/LLVM.h"
19 #include "clang/Driver/DriverDiagnostic.h"
20 #include "clang/StaticAnalyzer/Core/Checker.h"
21 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
22 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
23 #include "clang/StaticAnalyzer/Core/PathSensitive/CoreEngine.h"
24 #include "clang/StaticAnalyzer/Core/PathSensitive/ExprEngine.h"
25 #include "clang/StaticAnalyzer/Core/PathSensitive/SVals.h"
26 #include "llvm/ADT/SmallVector.h"
27 #include "llvm/Support/Casting.h"
28 #include "llvm/Support/ErrorHandling.h"
29 #include <cassert>
30 #include <vector>
31
32 using namespace clang;
33 using namespace ento;
34
hasPathSensitiveCheckers() const35 bool CheckerManager::hasPathSensitiveCheckers() const {
36 return !StmtCheckers.empty() ||
37 !PreObjCMessageCheckers.empty() ||
38 !PostObjCMessageCheckers.empty() ||
39 !PreCallCheckers.empty() ||
40 !PostCallCheckers.empty() ||
41 !LocationCheckers.empty() ||
42 !BindCheckers.empty() ||
43 !EndAnalysisCheckers.empty() ||
44 !EndFunctionCheckers.empty() ||
45 !BranchConditionCheckers.empty() ||
46 !LiveSymbolsCheckers.empty() ||
47 !DeadSymbolsCheckers.empty() ||
48 !RegionChangesCheckers.empty() ||
49 !EvalAssumeCheckers.empty() ||
50 !EvalCallCheckers.empty();
51 }
52
finishedCheckerRegistration()53 void CheckerManager::finishedCheckerRegistration() {
54 #ifndef NDEBUG
55 // Make sure that for every event that has listeners, there is at least
56 // one dispatcher registered for it.
57 for (const auto &Event : Events)
58 assert(Event.second.HasDispatcher &&
59 "No dispatcher registered for an event");
60 #endif
61 }
62
reportInvalidCheckerOptionValue(const CheckerBase * C,StringRef OptionName,StringRef ExpectedValueDesc) const63 void CheckerManager::reportInvalidCheckerOptionValue(
64 const CheckerBase *C, StringRef OptionName,
65 StringRef ExpectedValueDesc) const {
66
67 getDiagnostics().Report(diag::err_analyzer_checker_option_invalid_input)
68 << (llvm::Twine() + C->getTagDescription() + ":" + OptionName).str()
69 << ExpectedValueDesc;
70 }
71
72 //===----------------------------------------------------------------------===//
73 // Functions for running checkers for AST traversing..
74 //===----------------------------------------------------------------------===//
75
runCheckersOnASTDecl(const Decl * D,AnalysisManager & mgr,BugReporter & BR)76 void CheckerManager::runCheckersOnASTDecl(const Decl *D, AnalysisManager& mgr,
77 BugReporter &BR) {
78 assert(D);
79
80 unsigned DeclKind = D->getKind();
81 CachedDeclCheckers *checkers = nullptr;
82 CachedDeclCheckersMapTy::iterator CCI = CachedDeclCheckersMap.find(DeclKind);
83 if (CCI != CachedDeclCheckersMap.end()) {
84 checkers = &(CCI->second);
85 } else {
86 // Find the checkers that should run for this Decl and cache them.
87 checkers = &CachedDeclCheckersMap[DeclKind];
88 for (const auto &info : DeclCheckers)
89 if (info.IsForDeclFn(D))
90 checkers->push_back(info.CheckFn);
91 }
92
93 assert(checkers);
94 for (const auto &checker : *checkers)
95 checker(D, mgr, BR);
96 }
97
runCheckersOnASTBody(const Decl * D,AnalysisManager & mgr,BugReporter & BR)98 void CheckerManager::runCheckersOnASTBody(const Decl *D, AnalysisManager& mgr,
99 BugReporter &BR) {
100 assert(D && D->hasBody());
101
102 for (const auto &BodyChecker : BodyCheckers)
103 BodyChecker(D, mgr, BR);
104 }
105
106 //===----------------------------------------------------------------------===//
107 // Functions for running checkers for path-sensitive checking.
108 //===----------------------------------------------------------------------===//
109
110 template <typename CHECK_CTX>
expandGraphWithCheckers(CHECK_CTX checkCtx,ExplodedNodeSet & Dst,const ExplodedNodeSet & Src)111 static void expandGraphWithCheckers(CHECK_CTX checkCtx,
112 ExplodedNodeSet &Dst,
113 const ExplodedNodeSet &Src) {
114 const NodeBuilderContext &BldrCtx = checkCtx.Eng.getBuilderContext();
115 if (Src.empty())
116 return;
117
118 typename CHECK_CTX::CheckersTy::const_iterator
119 I = checkCtx.checkers_begin(), E = checkCtx.checkers_end();
120 if (I == E) {
121 Dst.insert(Src);
122 return;
123 }
124
125 ExplodedNodeSet Tmp1, Tmp2;
126 const ExplodedNodeSet *PrevSet = &Src;
127
128 for (; I != E; ++I) {
129 ExplodedNodeSet *CurrSet = nullptr;
130 if (I+1 == E)
131 CurrSet = &Dst;
132 else {
133 CurrSet = (PrevSet == &Tmp1) ? &Tmp2 : &Tmp1;
134 CurrSet->clear();
135 }
136
137 NodeBuilder B(*PrevSet, *CurrSet, BldrCtx);
138 for (const auto &NI : *PrevSet)
139 checkCtx.runChecker(*I, B, NI);
140
141 // If all the produced transitions are sinks, stop.
142 if (CurrSet->empty())
143 return;
144
145 // Update which NodeSet is the current one.
146 PrevSet = CurrSet;
147 }
148 }
149
150 namespace {
151
152 struct CheckStmtContext {
153 using CheckersTy = SmallVectorImpl<CheckerManager::CheckStmtFunc>;
154
155 bool IsPreVisit;
156 const CheckersTy &Checkers;
157 const Stmt *S;
158 ExprEngine &Eng;
159 bool WasInlined;
160
CheckStmtContext__anon6c6873a00111::CheckStmtContext161 CheckStmtContext(bool isPreVisit, const CheckersTy &checkers,
162 const Stmt *s, ExprEngine &eng, bool wasInlined = false)
163 : IsPreVisit(isPreVisit), Checkers(checkers), S(s), Eng(eng),
164 WasInlined(wasInlined) {}
165
checkers_begin__anon6c6873a00111::CheckStmtContext166 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00111::CheckStmtContext167 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
168
runChecker__anon6c6873a00111::CheckStmtContext169 void runChecker(CheckerManager::CheckStmtFunc checkFn,
170 NodeBuilder &Bldr, ExplodedNode *Pred) {
171 // FIXME: Remove respondsToCallback from CheckerContext;
172 ProgramPoint::Kind K = IsPreVisit ? ProgramPoint::PreStmtKind :
173 ProgramPoint::PostStmtKind;
174 const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K,
175 Pred->getLocationContext(), checkFn.Checker);
176 CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
177 checkFn(S, C);
178 }
179 };
180
181 } // namespace
182
183 /// Run checkers for visiting Stmts.
runCheckersForStmt(bool isPreVisit,ExplodedNodeSet & Dst,const ExplodedNodeSet & Src,const Stmt * S,ExprEngine & Eng,bool WasInlined)184 void CheckerManager::runCheckersForStmt(bool isPreVisit,
185 ExplodedNodeSet &Dst,
186 const ExplodedNodeSet &Src,
187 const Stmt *S,
188 ExprEngine &Eng,
189 bool WasInlined) {
190 CheckStmtContext C(isPreVisit, getCachedStmtCheckersFor(S, isPreVisit),
191 S, Eng, WasInlined);
192 expandGraphWithCheckers(C, Dst, Src);
193 }
194
195 namespace {
196
197 struct CheckObjCMessageContext {
198 using CheckersTy = std::vector<CheckerManager::CheckObjCMessageFunc>;
199
200 ObjCMessageVisitKind Kind;
201 bool WasInlined;
202 const CheckersTy &Checkers;
203 const ObjCMethodCall &Msg;
204 ExprEngine &Eng;
205
CheckObjCMessageContext__anon6c6873a00211::CheckObjCMessageContext206 CheckObjCMessageContext(ObjCMessageVisitKind visitKind,
207 const CheckersTy &checkers,
208 const ObjCMethodCall &msg, ExprEngine &eng,
209 bool wasInlined)
210 : Kind(visitKind), WasInlined(wasInlined), Checkers(checkers), Msg(msg),
211 Eng(eng) {}
212
checkers_begin__anon6c6873a00211::CheckObjCMessageContext213 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00211::CheckObjCMessageContext214 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
215
runChecker__anon6c6873a00211::CheckObjCMessageContext216 void runChecker(CheckerManager::CheckObjCMessageFunc checkFn,
217 NodeBuilder &Bldr, ExplodedNode *Pred) {
218 bool IsPreVisit;
219
220 switch (Kind) {
221 case ObjCMessageVisitKind::Pre:
222 IsPreVisit = true;
223 break;
224 case ObjCMessageVisitKind::MessageNil:
225 case ObjCMessageVisitKind::Post:
226 IsPreVisit = false;
227 break;
228 }
229
230 const ProgramPoint &L = Msg.getProgramPoint(IsPreVisit,checkFn.Checker);
231 CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
232
233 checkFn(*Msg.cloneWithState<ObjCMethodCall>(Pred->getState()), C);
234 }
235 };
236
237 } // namespace
238
239 /// Run checkers for visiting obj-c messages.
runCheckersForObjCMessage(ObjCMessageVisitKind visitKind,ExplodedNodeSet & Dst,const ExplodedNodeSet & Src,const ObjCMethodCall & msg,ExprEngine & Eng,bool WasInlined)240 void CheckerManager::runCheckersForObjCMessage(ObjCMessageVisitKind visitKind,
241 ExplodedNodeSet &Dst,
242 const ExplodedNodeSet &Src,
243 const ObjCMethodCall &msg,
244 ExprEngine &Eng,
245 bool WasInlined) {
246 const auto &checkers = getObjCMessageCheckers(visitKind);
247 CheckObjCMessageContext C(visitKind, checkers, msg, Eng, WasInlined);
248 expandGraphWithCheckers(C, Dst, Src);
249 }
250
251 const std::vector<CheckerManager::CheckObjCMessageFunc> &
getObjCMessageCheckers(ObjCMessageVisitKind Kind) const252 CheckerManager::getObjCMessageCheckers(ObjCMessageVisitKind Kind) const {
253 switch (Kind) {
254 case ObjCMessageVisitKind::Pre:
255 return PreObjCMessageCheckers;
256 break;
257 case ObjCMessageVisitKind::Post:
258 return PostObjCMessageCheckers;
259 case ObjCMessageVisitKind::MessageNil:
260 return ObjCMessageNilCheckers;
261 }
262 llvm_unreachable("Unknown Kind");
263 }
264
265 namespace {
266
267 // FIXME: This has all the same signatures as CheckObjCMessageContext.
268 // Is there a way we can merge the two?
269 struct CheckCallContext {
270 using CheckersTy = std::vector<CheckerManager::CheckCallFunc>;
271
272 bool IsPreVisit, WasInlined;
273 const CheckersTy &Checkers;
274 const CallEvent &Call;
275 ExprEngine &Eng;
276
CheckCallContext__anon6c6873a00311::CheckCallContext277 CheckCallContext(bool isPreVisit, const CheckersTy &checkers,
278 const CallEvent &call, ExprEngine &eng,
279 bool wasInlined)
280 : IsPreVisit(isPreVisit), WasInlined(wasInlined), Checkers(checkers),
281 Call(call), Eng(eng) {}
282
checkers_begin__anon6c6873a00311::CheckCallContext283 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00311::CheckCallContext284 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
285
runChecker__anon6c6873a00311::CheckCallContext286 void runChecker(CheckerManager::CheckCallFunc checkFn,
287 NodeBuilder &Bldr, ExplodedNode *Pred) {
288 const ProgramPoint &L = Call.getProgramPoint(IsPreVisit,checkFn.Checker);
289 CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
290
291 checkFn(*Call.cloneWithState(Pred->getState()), C);
292 }
293 };
294
295 } // namespace
296
297 /// Run checkers for visiting an abstract call event.
runCheckersForCallEvent(bool isPreVisit,ExplodedNodeSet & Dst,const ExplodedNodeSet & Src,const CallEvent & Call,ExprEngine & Eng,bool WasInlined)298 void CheckerManager::runCheckersForCallEvent(bool isPreVisit,
299 ExplodedNodeSet &Dst,
300 const ExplodedNodeSet &Src,
301 const CallEvent &Call,
302 ExprEngine &Eng,
303 bool WasInlined) {
304 CheckCallContext C(isPreVisit,
305 isPreVisit ? PreCallCheckers
306 : PostCallCheckers,
307 Call, Eng, WasInlined);
308 expandGraphWithCheckers(C, Dst, Src);
309 }
310
311 namespace {
312
313 struct CheckLocationContext {
314 using CheckersTy = std::vector<CheckerManager::CheckLocationFunc>;
315
316 const CheckersTy &Checkers;
317 SVal Loc;
318 bool IsLoad;
319 const Stmt *NodeEx; /* Will become a CFGStmt */
320 const Stmt *BoundEx;
321 ExprEngine &Eng;
322
CheckLocationContext__anon6c6873a00411::CheckLocationContext323 CheckLocationContext(const CheckersTy &checkers,
324 SVal loc, bool isLoad, const Stmt *NodeEx,
325 const Stmt *BoundEx,
326 ExprEngine &eng)
327 : Checkers(checkers), Loc(loc), IsLoad(isLoad), NodeEx(NodeEx),
328 BoundEx(BoundEx), Eng(eng) {}
329
checkers_begin__anon6c6873a00411::CheckLocationContext330 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00411::CheckLocationContext331 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
332
runChecker__anon6c6873a00411::CheckLocationContext333 void runChecker(CheckerManager::CheckLocationFunc checkFn,
334 NodeBuilder &Bldr, ExplodedNode *Pred) {
335 ProgramPoint::Kind K = IsLoad ? ProgramPoint::PreLoadKind :
336 ProgramPoint::PreStoreKind;
337 const ProgramPoint &L =
338 ProgramPoint::getProgramPoint(NodeEx, K,
339 Pred->getLocationContext(),
340 checkFn.Checker);
341 CheckerContext C(Bldr, Eng, Pred, L);
342 checkFn(Loc, IsLoad, BoundEx, C);
343 }
344 };
345
346 } // namespace
347
348 /// Run checkers for load/store of a location.
349
runCheckersForLocation(ExplodedNodeSet & Dst,const ExplodedNodeSet & Src,SVal location,bool isLoad,const Stmt * NodeEx,const Stmt * BoundEx,ExprEngine & Eng)350 void CheckerManager::runCheckersForLocation(ExplodedNodeSet &Dst,
351 const ExplodedNodeSet &Src,
352 SVal location, bool isLoad,
353 const Stmt *NodeEx,
354 const Stmt *BoundEx,
355 ExprEngine &Eng) {
356 CheckLocationContext C(LocationCheckers, location, isLoad, NodeEx,
357 BoundEx, Eng);
358 expandGraphWithCheckers(C, Dst, Src);
359 }
360
361 namespace {
362
363 struct CheckBindContext {
364 using CheckersTy = std::vector<CheckerManager::CheckBindFunc>;
365
366 const CheckersTy &Checkers;
367 SVal Loc;
368 SVal Val;
369 const Stmt *S;
370 ExprEngine &Eng;
371 const ProgramPoint &PP;
372
CheckBindContext__anon6c6873a00511::CheckBindContext373 CheckBindContext(const CheckersTy &checkers,
374 SVal loc, SVal val, const Stmt *s, ExprEngine &eng,
375 const ProgramPoint &pp)
376 : Checkers(checkers), Loc(loc), Val(val), S(s), Eng(eng), PP(pp) {}
377
checkers_begin__anon6c6873a00511::CheckBindContext378 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00511::CheckBindContext379 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
380
runChecker__anon6c6873a00511::CheckBindContext381 void runChecker(CheckerManager::CheckBindFunc checkFn,
382 NodeBuilder &Bldr, ExplodedNode *Pred) {
383 const ProgramPoint &L = PP.withTag(checkFn.Checker);
384 CheckerContext C(Bldr, Eng, Pred, L);
385
386 checkFn(Loc, Val, S, C);
387 }
388 };
389
390 } // namespace
391
392 /// Run checkers for binding of a value to a location.
runCheckersForBind(ExplodedNodeSet & Dst,const ExplodedNodeSet & Src,SVal location,SVal val,const Stmt * S,ExprEngine & Eng,const ProgramPoint & PP)393 void CheckerManager::runCheckersForBind(ExplodedNodeSet &Dst,
394 const ExplodedNodeSet &Src,
395 SVal location, SVal val,
396 const Stmt *S, ExprEngine &Eng,
397 const ProgramPoint &PP) {
398 CheckBindContext C(BindCheckers, location, val, S, Eng, PP);
399 expandGraphWithCheckers(C, Dst, Src);
400 }
401
runCheckersForEndAnalysis(ExplodedGraph & G,BugReporter & BR,ExprEngine & Eng)402 void CheckerManager::runCheckersForEndAnalysis(ExplodedGraph &G,
403 BugReporter &BR,
404 ExprEngine &Eng) {
405 for (const auto &EndAnalysisChecker : EndAnalysisCheckers)
406 EndAnalysisChecker(G, BR, Eng);
407 }
408
409 namespace {
410
411 struct CheckBeginFunctionContext {
412 using CheckersTy = std::vector<CheckerManager::CheckBeginFunctionFunc>;
413
414 const CheckersTy &Checkers;
415 ExprEngine &Eng;
416 const ProgramPoint &PP;
417
CheckBeginFunctionContext__anon6c6873a00611::CheckBeginFunctionContext418 CheckBeginFunctionContext(const CheckersTy &Checkers, ExprEngine &Eng,
419 const ProgramPoint &PP)
420 : Checkers(Checkers), Eng(Eng), PP(PP) {}
421
checkers_begin__anon6c6873a00611::CheckBeginFunctionContext422 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00611::CheckBeginFunctionContext423 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
424
runChecker__anon6c6873a00611::CheckBeginFunctionContext425 void runChecker(CheckerManager::CheckBeginFunctionFunc checkFn,
426 NodeBuilder &Bldr, ExplodedNode *Pred) {
427 const ProgramPoint &L = PP.withTag(checkFn.Checker);
428 CheckerContext C(Bldr, Eng, Pred, L);
429
430 checkFn(C);
431 }
432 };
433
434 } // namespace
435
runCheckersForBeginFunction(ExplodedNodeSet & Dst,const BlockEdge & L,ExplodedNode * Pred,ExprEngine & Eng)436 void CheckerManager::runCheckersForBeginFunction(ExplodedNodeSet &Dst,
437 const BlockEdge &L,
438 ExplodedNode *Pred,
439 ExprEngine &Eng) {
440 ExplodedNodeSet Src;
441 Src.insert(Pred);
442 CheckBeginFunctionContext C(BeginFunctionCheckers, Eng, L);
443 expandGraphWithCheckers(C, Dst, Src);
444 }
445
446 /// Run checkers for end of path.
447 // Note, We do not chain the checker output (like in expandGraphWithCheckers)
448 // for this callback since end of path nodes are expected to be final.
runCheckersForEndFunction(NodeBuilderContext & BC,ExplodedNodeSet & Dst,ExplodedNode * Pred,ExprEngine & Eng,const ReturnStmt * RS)449 void CheckerManager::runCheckersForEndFunction(NodeBuilderContext &BC,
450 ExplodedNodeSet &Dst,
451 ExplodedNode *Pred,
452 ExprEngine &Eng,
453 const ReturnStmt *RS) {
454 // We define the builder outside of the loop because if at least one checker
455 // creates a successor for Pred, we do not need to generate an
456 // autotransition for it.
457 NodeBuilder Bldr(Pred, Dst, BC);
458 for (const auto &checkFn : EndFunctionCheckers) {
459 const ProgramPoint &L =
460 FunctionExitPoint(RS, Pred->getLocationContext(), checkFn.Checker);
461 CheckerContext C(Bldr, Eng, Pred, L);
462 checkFn(RS, C);
463 }
464 }
465
466 namespace {
467
468 struct CheckBranchConditionContext {
469 using CheckersTy = std::vector<CheckerManager::CheckBranchConditionFunc>;
470
471 const CheckersTy &Checkers;
472 const Stmt *Condition;
473 ExprEngine &Eng;
474
CheckBranchConditionContext__anon6c6873a00711::CheckBranchConditionContext475 CheckBranchConditionContext(const CheckersTy &checkers,
476 const Stmt *Cond, ExprEngine &eng)
477 : Checkers(checkers), Condition(Cond), Eng(eng) {}
478
checkers_begin__anon6c6873a00711::CheckBranchConditionContext479 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00711::CheckBranchConditionContext480 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
481
runChecker__anon6c6873a00711::CheckBranchConditionContext482 void runChecker(CheckerManager::CheckBranchConditionFunc checkFn,
483 NodeBuilder &Bldr, ExplodedNode *Pred) {
484 ProgramPoint L = PostCondition(Condition, Pred->getLocationContext(),
485 checkFn.Checker);
486 CheckerContext C(Bldr, Eng, Pred, L);
487 checkFn(Condition, C);
488 }
489 };
490
491 } // namespace
492
493 /// Run checkers for branch condition.
runCheckersForBranchCondition(const Stmt * Condition,ExplodedNodeSet & Dst,ExplodedNode * Pred,ExprEngine & Eng)494 void CheckerManager::runCheckersForBranchCondition(const Stmt *Condition,
495 ExplodedNodeSet &Dst,
496 ExplodedNode *Pred,
497 ExprEngine &Eng) {
498 ExplodedNodeSet Src;
499 Src.insert(Pred);
500 CheckBranchConditionContext C(BranchConditionCheckers, Condition, Eng);
501 expandGraphWithCheckers(C, Dst, Src);
502 }
503
504 namespace {
505
506 struct CheckNewAllocatorContext {
507 using CheckersTy = std::vector<CheckerManager::CheckNewAllocatorFunc>;
508
509 const CheckersTy &Checkers;
510 const CXXAllocatorCall &Call;
511 bool WasInlined;
512 ExprEngine &Eng;
513
CheckNewAllocatorContext__anon6c6873a00811::CheckNewAllocatorContext514 CheckNewAllocatorContext(const CheckersTy &Checkers,
515 const CXXAllocatorCall &Call, bool WasInlined,
516 ExprEngine &Eng)
517 : Checkers(Checkers), Call(Call), WasInlined(WasInlined), Eng(Eng) {}
518
checkers_begin__anon6c6873a00811::CheckNewAllocatorContext519 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00811::CheckNewAllocatorContext520 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
521
runChecker__anon6c6873a00811::CheckNewAllocatorContext522 void runChecker(CheckerManager::CheckNewAllocatorFunc checkFn,
523 NodeBuilder &Bldr, ExplodedNode *Pred) {
524 ProgramPoint L =
525 PostAllocatorCall(Call.getOriginExpr(), Pred->getLocationContext());
526 CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
527 checkFn(cast<CXXAllocatorCall>(*Call.cloneWithState(Pred->getState())),
528 C);
529 }
530 };
531
532 } // namespace
533
runCheckersForNewAllocator(const CXXAllocatorCall & Call,ExplodedNodeSet & Dst,ExplodedNode * Pred,ExprEngine & Eng,bool WasInlined)534 void CheckerManager::runCheckersForNewAllocator(const CXXAllocatorCall &Call,
535 ExplodedNodeSet &Dst,
536 ExplodedNode *Pred,
537 ExprEngine &Eng,
538 bool WasInlined) {
539 ExplodedNodeSet Src;
540 Src.insert(Pred);
541 CheckNewAllocatorContext C(NewAllocatorCheckers, Call, WasInlined, Eng);
542 expandGraphWithCheckers(C, Dst, Src);
543 }
544
545 /// Run checkers for live symbols.
runCheckersForLiveSymbols(ProgramStateRef state,SymbolReaper & SymReaper)546 void CheckerManager::runCheckersForLiveSymbols(ProgramStateRef state,
547 SymbolReaper &SymReaper) {
548 for (const auto &LiveSymbolsChecker : LiveSymbolsCheckers)
549 LiveSymbolsChecker(state, SymReaper);
550 }
551
552 namespace {
553
554 struct CheckDeadSymbolsContext {
555 using CheckersTy = std::vector<CheckerManager::CheckDeadSymbolsFunc>;
556
557 const CheckersTy &Checkers;
558 SymbolReaper &SR;
559 const Stmt *S;
560 ExprEngine &Eng;
561 ProgramPoint::Kind ProgarmPointKind;
562
CheckDeadSymbolsContext__anon6c6873a00911::CheckDeadSymbolsContext563 CheckDeadSymbolsContext(const CheckersTy &checkers, SymbolReaper &sr,
564 const Stmt *s, ExprEngine &eng,
565 ProgramPoint::Kind K)
566 : Checkers(checkers), SR(sr), S(s), Eng(eng), ProgarmPointKind(K) {}
567
checkers_begin__anon6c6873a00911::CheckDeadSymbolsContext568 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
checkers_end__anon6c6873a00911::CheckDeadSymbolsContext569 CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
570
runChecker__anon6c6873a00911::CheckDeadSymbolsContext571 void runChecker(CheckerManager::CheckDeadSymbolsFunc checkFn,
572 NodeBuilder &Bldr, ExplodedNode *Pred) {
573 const ProgramPoint &L = ProgramPoint::getProgramPoint(S, ProgarmPointKind,
574 Pred->getLocationContext(), checkFn.Checker);
575 CheckerContext C(Bldr, Eng, Pred, L);
576
577 // Note, do not pass the statement to the checkers without letting them
578 // differentiate if we ran remove dead bindings before or after the
579 // statement.
580 checkFn(SR, C);
581 }
582 };
583
584 } // namespace
585
586 /// Run checkers for dead symbols.
runCheckersForDeadSymbols(ExplodedNodeSet & Dst,const ExplodedNodeSet & Src,SymbolReaper & SymReaper,const Stmt * S,ExprEngine & Eng,ProgramPoint::Kind K)587 void CheckerManager::runCheckersForDeadSymbols(ExplodedNodeSet &Dst,
588 const ExplodedNodeSet &Src,
589 SymbolReaper &SymReaper,
590 const Stmt *S,
591 ExprEngine &Eng,
592 ProgramPoint::Kind K) {
593 CheckDeadSymbolsContext C(DeadSymbolsCheckers, SymReaper, S, Eng, K);
594 expandGraphWithCheckers(C, Dst, Src);
595 }
596
597 /// Run checkers for region changes.
598 ProgramStateRef
runCheckersForRegionChanges(ProgramStateRef state,const InvalidatedSymbols * invalidated,ArrayRef<const MemRegion * > ExplicitRegions,ArrayRef<const MemRegion * > Regions,const LocationContext * LCtx,const CallEvent * Call)599 CheckerManager::runCheckersForRegionChanges(ProgramStateRef state,
600 const InvalidatedSymbols *invalidated,
601 ArrayRef<const MemRegion *> ExplicitRegions,
602 ArrayRef<const MemRegion *> Regions,
603 const LocationContext *LCtx,
604 const CallEvent *Call) {
605 for (const auto &RegionChangesChecker : RegionChangesCheckers) {
606 // If any checker declares the state infeasible (or if it starts that way),
607 // bail out.
608 if (!state)
609 return nullptr;
610 state = RegionChangesChecker(state, invalidated, ExplicitRegions, Regions,
611 LCtx, Call);
612 }
613 return state;
614 }
615
616 /// Run checkers to process symbol escape event.
617 ProgramStateRef
runCheckersForPointerEscape(ProgramStateRef State,const InvalidatedSymbols & Escaped,const CallEvent * Call,PointerEscapeKind Kind,RegionAndSymbolInvalidationTraits * ETraits)618 CheckerManager::runCheckersForPointerEscape(ProgramStateRef State,
619 const InvalidatedSymbols &Escaped,
620 const CallEvent *Call,
621 PointerEscapeKind Kind,
622 RegionAndSymbolInvalidationTraits *ETraits) {
623 assert((Call != nullptr ||
624 (Kind != PSK_DirectEscapeOnCall &&
625 Kind != PSK_IndirectEscapeOnCall)) &&
626 "Call must not be NULL when escaping on call");
627 for (const auto &PointerEscapeChecker : PointerEscapeCheckers) {
628 // If any checker declares the state infeasible (or if it starts that
629 // way), bail out.
630 if (!State)
631 return nullptr;
632 State = PointerEscapeChecker(State, Escaped, Call, Kind, ETraits);
633 }
634 return State;
635 }
636
637 /// Run checkers for handling assumptions on symbolic values.
638 ProgramStateRef
runCheckersForEvalAssume(ProgramStateRef state,SVal Cond,bool Assumption)639 CheckerManager::runCheckersForEvalAssume(ProgramStateRef state,
640 SVal Cond, bool Assumption) {
641 for (const auto &EvalAssumeChecker : EvalAssumeCheckers) {
642 // If any checker declares the state infeasible (or if it starts that way),
643 // bail out.
644 if (!state)
645 return nullptr;
646 state = EvalAssumeChecker(state, Cond, Assumption);
647 }
648 return state;
649 }
650
651 /// Run checkers for evaluating a call.
652 /// Only one checker will evaluate the call.
runCheckersForEvalCall(ExplodedNodeSet & Dst,const ExplodedNodeSet & Src,const CallEvent & Call,ExprEngine & Eng,const EvalCallOptions & CallOpts)653 void CheckerManager::runCheckersForEvalCall(ExplodedNodeSet &Dst,
654 const ExplodedNodeSet &Src,
655 const CallEvent &Call,
656 ExprEngine &Eng,
657 const EvalCallOptions &CallOpts) {
658 for (auto *const Pred : Src) {
659 bool anyEvaluated = false;
660
661 ExplodedNodeSet checkDst;
662 NodeBuilder B(Pred, checkDst, Eng.getBuilderContext());
663
664 // Check if any of the EvalCall callbacks can evaluate the call.
665 for (const auto &EvalCallChecker : EvalCallCheckers) {
666 // TODO: Support the situation when the call doesn't correspond
667 // to any Expr.
668 ProgramPoint L = ProgramPoint::getProgramPoint(
669 Call.getOriginExpr(), ProgramPoint::PostStmtKind,
670 Pred->getLocationContext(), EvalCallChecker.Checker);
671 bool evaluated = false;
672 { // CheckerContext generates transitions(populates checkDest) on
673 // destruction, so introduce the scope to make sure it gets properly
674 // populated.
675 CheckerContext C(B, Eng, Pred, L);
676 evaluated = EvalCallChecker(Call, C);
677 }
678 assert(!(evaluated && anyEvaluated)
679 && "There are more than one checkers evaluating the call");
680 if (evaluated) {
681 anyEvaluated = true;
682 Dst.insert(checkDst);
683 #ifdef NDEBUG
684 break; // on release don't check that no other checker also evals.
685 #endif
686 }
687 }
688
689 // If none of the checkers evaluated the call, ask ExprEngine to handle it.
690 if (!anyEvaluated) {
691 NodeBuilder B(Pred, Dst, Eng.getBuilderContext());
692 Eng.defaultEvalCall(B, Pred, Call, CallOpts);
693 }
694 }
695 }
696
697 /// Run checkers for the entire Translation Unit.
runCheckersOnEndOfTranslationUnit(const TranslationUnitDecl * TU,AnalysisManager & mgr,BugReporter & BR)698 void CheckerManager::runCheckersOnEndOfTranslationUnit(
699 const TranslationUnitDecl *TU,
700 AnalysisManager &mgr,
701 BugReporter &BR) {
702 for (const auto &EndOfTranslationUnitChecker : EndOfTranslationUnitCheckers)
703 EndOfTranslationUnitChecker(TU, mgr, BR);
704 }
705
runCheckersForPrintStateJson(raw_ostream & Out,ProgramStateRef State,const char * NL,unsigned int Space,bool IsDot) const706 void CheckerManager::runCheckersForPrintStateJson(raw_ostream &Out,
707 ProgramStateRef State,
708 const char *NL,
709 unsigned int Space,
710 bool IsDot) const {
711 Indent(Out, Space, IsDot) << "\"checker_messages\": ";
712
713 // Create a temporary stream to see whether we have any message.
714 SmallString<1024> TempBuf;
715 llvm::raw_svector_ostream TempOut(TempBuf);
716 unsigned int InnerSpace = Space + 2;
717
718 // Create the new-line in JSON with enough space.
719 SmallString<128> NewLine;
720 llvm::raw_svector_ostream NLOut(NewLine);
721 NLOut << "\", " << NL; // Inject the ending and a new line
722 Indent(NLOut, InnerSpace, IsDot) << "\""; // then begin the next message.
723
724 ++Space;
725 bool HasMessage = false;
726
727 // Store the last CheckerTag.
728 const void *LastCT = nullptr;
729 for (const auto &CT : CheckerTags) {
730 // See whether the current checker has a message.
731 CT.second->printState(TempOut, State, /*NL=*/NewLine.c_str(), /*Sep=*/"");
732
733 if (TempBuf.empty())
734 continue;
735
736 if (!HasMessage) {
737 Out << '[' << NL;
738 HasMessage = true;
739 }
740
741 LastCT = &CT;
742 TempBuf.clear();
743 }
744
745 for (const auto &CT : CheckerTags) {
746 // See whether the current checker has a message.
747 CT.second->printState(TempOut, State, /*NL=*/NewLine.c_str(), /*Sep=*/"");
748
749 if (TempBuf.empty())
750 continue;
751
752 Indent(Out, Space, IsDot)
753 << "{ \"checker\": \"" << CT.second->getCheckerName().getName()
754 << "\", \"messages\": [" << NL;
755 Indent(Out, InnerSpace, IsDot)
756 << '\"' << TempBuf.str().trim() << '\"' << NL;
757 Indent(Out, Space, IsDot) << "]}";
758
759 if (&CT != LastCT)
760 Out << ',';
761 Out << NL;
762
763 TempBuf.clear();
764 }
765
766 // It is the last element of the 'program_state' so do not add a comma.
767 if (HasMessage)
768 Indent(Out, --Space, IsDot) << "]";
769 else
770 Out << "null";
771
772 Out << NL;
773 }
774
775 //===----------------------------------------------------------------------===//
776 // Internal registration functions for AST traversing.
777 //===----------------------------------------------------------------------===//
778
_registerForDecl(CheckDeclFunc checkfn,HandlesDeclFunc isForDeclFn)779 void CheckerManager::_registerForDecl(CheckDeclFunc checkfn,
780 HandlesDeclFunc isForDeclFn) {
781 DeclCheckerInfo info = { checkfn, isForDeclFn };
782 DeclCheckers.push_back(info);
783 }
784
_registerForBody(CheckDeclFunc checkfn)785 void CheckerManager::_registerForBody(CheckDeclFunc checkfn) {
786 BodyCheckers.push_back(checkfn);
787 }
788
789 //===----------------------------------------------------------------------===//
790 // Internal registration functions for path-sensitive checking.
791 //===----------------------------------------------------------------------===//
792
_registerForPreStmt(CheckStmtFunc checkfn,HandlesStmtFunc isForStmtFn)793 void CheckerManager::_registerForPreStmt(CheckStmtFunc checkfn,
794 HandlesStmtFunc isForStmtFn) {
795 StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/true };
796 StmtCheckers.push_back(info);
797 }
798
_registerForPostStmt(CheckStmtFunc checkfn,HandlesStmtFunc isForStmtFn)799 void CheckerManager::_registerForPostStmt(CheckStmtFunc checkfn,
800 HandlesStmtFunc isForStmtFn) {
801 StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/false };
802 StmtCheckers.push_back(info);
803 }
804
_registerForPreObjCMessage(CheckObjCMessageFunc checkfn)805 void CheckerManager::_registerForPreObjCMessage(CheckObjCMessageFunc checkfn) {
806 PreObjCMessageCheckers.push_back(checkfn);
807 }
808
_registerForObjCMessageNil(CheckObjCMessageFunc checkfn)809 void CheckerManager::_registerForObjCMessageNil(CheckObjCMessageFunc checkfn) {
810 ObjCMessageNilCheckers.push_back(checkfn);
811 }
812
_registerForPostObjCMessage(CheckObjCMessageFunc checkfn)813 void CheckerManager::_registerForPostObjCMessage(CheckObjCMessageFunc checkfn) {
814 PostObjCMessageCheckers.push_back(checkfn);
815 }
816
_registerForPreCall(CheckCallFunc checkfn)817 void CheckerManager::_registerForPreCall(CheckCallFunc checkfn) {
818 PreCallCheckers.push_back(checkfn);
819 }
_registerForPostCall(CheckCallFunc checkfn)820 void CheckerManager::_registerForPostCall(CheckCallFunc checkfn) {
821 PostCallCheckers.push_back(checkfn);
822 }
823
_registerForLocation(CheckLocationFunc checkfn)824 void CheckerManager::_registerForLocation(CheckLocationFunc checkfn) {
825 LocationCheckers.push_back(checkfn);
826 }
827
_registerForBind(CheckBindFunc checkfn)828 void CheckerManager::_registerForBind(CheckBindFunc checkfn) {
829 BindCheckers.push_back(checkfn);
830 }
831
_registerForEndAnalysis(CheckEndAnalysisFunc checkfn)832 void CheckerManager::_registerForEndAnalysis(CheckEndAnalysisFunc checkfn) {
833 EndAnalysisCheckers.push_back(checkfn);
834 }
835
_registerForBeginFunction(CheckBeginFunctionFunc checkfn)836 void CheckerManager::_registerForBeginFunction(CheckBeginFunctionFunc checkfn) {
837 BeginFunctionCheckers.push_back(checkfn);
838 }
839
_registerForEndFunction(CheckEndFunctionFunc checkfn)840 void CheckerManager::_registerForEndFunction(CheckEndFunctionFunc checkfn) {
841 EndFunctionCheckers.push_back(checkfn);
842 }
843
_registerForBranchCondition(CheckBranchConditionFunc checkfn)844 void CheckerManager::_registerForBranchCondition(
845 CheckBranchConditionFunc checkfn) {
846 BranchConditionCheckers.push_back(checkfn);
847 }
848
_registerForNewAllocator(CheckNewAllocatorFunc checkfn)849 void CheckerManager::_registerForNewAllocator(CheckNewAllocatorFunc checkfn) {
850 NewAllocatorCheckers.push_back(checkfn);
851 }
852
_registerForLiveSymbols(CheckLiveSymbolsFunc checkfn)853 void CheckerManager::_registerForLiveSymbols(CheckLiveSymbolsFunc checkfn) {
854 LiveSymbolsCheckers.push_back(checkfn);
855 }
856
_registerForDeadSymbols(CheckDeadSymbolsFunc checkfn)857 void CheckerManager::_registerForDeadSymbols(CheckDeadSymbolsFunc checkfn) {
858 DeadSymbolsCheckers.push_back(checkfn);
859 }
860
_registerForRegionChanges(CheckRegionChangesFunc checkfn)861 void CheckerManager::_registerForRegionChanges(CheckRegionChangesFunc checkfn) {
862 RegionChangesCheckers.push_back(checkfn);
863 }
864
_registerForPointerEscape(CheckPointerEscapeFunc checkfn)865 void CheckerManager::_registerForPointerEscape(CheckPointerEscapeFunc checkfn){
866 PointerEscapeCheckers.push_back(checkfn);
867 }
868
_registerForConstPointerEscape(CheckPointerEscapeFunc checkfn)869 void CheckerManager::_registerForConstPointerEscape(
870 CheckPointerEscapeFunc checkfn) {
871 PointerEscapeCheckers.push_back(checkfn);
872 }
873
_registerForEvalAssume(EvalAssumeFunc checkfn)874 void CheckerManager::_registerForEvalAssume(EvalAssumeFunc checkfn) {
875 EvalAssumeCheckers.push_back(checkfn);
876 }
877
_registerForEvalCall(EvalCallFunc checkfn)878 void CheckerManager::_registerForEvalCall(EvalCallFunc checkfn) {
879 EvalCallCheckers.push_back(checkfn);
880 }
881
_registerForEndOfTranslationUnit(CheckEndOfTranslationUnit checkfn)882 void CheckerManager::_registerForEndOfTranslationUnit(
883 CheckEndOfTranslationUnit checkfn) {
884 EndOfTranslationUnitCheckers.push_back(checkfn);
885 }
886
887 //===----------------------------------------------------------------------===//
888 // Implementation details.
889 //===----------------------------------------------------------------------===//
890
891 const CheckerManager::CachedStmtCheckers &
getCachedStmtCheckersFor(const Stmt * S,bool isPreVisit)892 CheckerManager::getCachedStmtCheckersFor(const Stmt *S, bool isPreVisit) {
893 assert(S);
894
895 unsigned Key = (S->getStmtClass() << 1) | unsigned(isPreVisit);
896 CachedStmtCheckersMapTy::iterator CCI = CachedStmtCheckersMap.find(Key);
897 if (CCI != CachedStmtCheckersMap.end())
898 return CCI->second;
899
900 // Find the checkers that should run for this Stmt and cache them.
901 CachedStmtCheckers &Checkers = CachedStmtCheckersMap[Key];
902 for (const auto &Info : StmtCheckers)
903 if (Info.IsPreVisit == isPreVisit && Info.IsForStmtFn(S))
904 Checkers.push_back(Info.CheckFn);
905 return Checkers;
906 }
907