1 | |
2 | |
3 | |
4 | |
5 | |
6 | |
7 | |
8 | |
9 | |
10 | |
11 | |
12 | |
13 | |
14 | #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" |
15 | #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" |
16 | #include "clang/StaticAnalyzer/Core/Checker.h" |
17 | #include "clang/StaticAnalyzer/Core/CheckerManager.h" |
18 | #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" |
19 | #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" |
20 | #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h" |
21 | #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramStateTrait.h" |
22 | #include "llvm/ADT/SmallString.h" |
23 | #include "llvm/Support/raw_ostream.h" |
24 | |
25 | using namespace clang; |
26 | using namespace ento; |
27 | |
28 | namespace { |
29 | class MacOSKeychainAPIChecker : public Checker<check::PreStmt<CallExpr>, |
30 | check::PostStmt<CallExpr>, |
31 | check::DeadSymbols, |
32 | check::PointerEscape, |
33 | eval::Assume> { |
34 | mutable std::unique_ptr<BugType> BT; |
35 | |
36 | public: |
37 | |
38 | |
39 | struct AllocationState { |
40 | |
41 | unsigned int AllocatorIdx; |
42 | SymbolRef Region; |
43 | |
44 | AllocationState(const Expr *E, unsigned int Idx, SymbolRef R) : |
45 | AllocatorIdx(Idx), |
46 | Region(R) {} |
47 | |
48 | bool operator==(const AllocationState &X) const { |
49 | return (AllocatorIdx == X.AllocatorIdx && |
50 | Region == X.Region); |
51 | } |
52 | |
53 | void Profile(llvm::FoldingSetNodeID &ID) const { |
54 | ID.AddInteger(AllocatorIdx); |
55 | ID.AddPointer(Region); |
56 | } |
57 | }; |
58 | |
59 | void checkPreStmt(const CallExpr *S, CheckerContext &C) const; |
60 | void checkPostStmt(const CallExpr *S, CheckerContext &C) const; |
61 | void checkDeadSymbols(SymbolReaper &SR, CheckerContext &C) const; |
62 | ProgramStateRef checkPointerEscape(ProgramStateRef State, |
63 | const InvalidatedSymbols &Escaped, |
64 | const CallEvent *Call, |
65 | PointerEscapeKind Kind) const; |
66 | ProgramStateRef evalAssume(ProgramStateRef state, SVal Cond, |
67 | bool Assumption) const; |
68 | void printState(raw_ostream &Out, ProgramStateRef State, |
69 | const char *NL, const char *Sep) const; |
70 | |
71 | private: |
72 | typedef std::pair<SymbolRef, const AllocationState*> AllocationPair; |
73 | typedef SmallVector<AllocationPair, 2> AllocationPairVec; |
74 | |
75 | enum APIKind { |
76 | |
77 | ValidAPI = 0, |
78 | |
79 | ErrorAPI = 1, |
80 | |
81 | |
82 | PossibleAPI = 2 |
83 | }; |
84 | |
85 | |
86 | struct ADFunctionInfo { |
87 | const char* Name; |
88 | unsigned int Param; |
89 | unsigned int DeallocatorIdx; |
90 | APIKind Kind; |
91 | }; |
92 | static const unsigned InvalidIdx = 100000; |
93 | static const unsigned FunctionsToTrackSize = 8; |
94 | static const ADFunctionInfo FunctionsToTrack[FunctionsToTrackSize]; |
95 | |
96 | static const unsigned NoErr = 0; |
97 | |
98 | |
99 | |
100 | static unsigned getTrackedFunctionIndex(StringRef Name, bool IsAllocator); |
101 | |
102 | inline void initBugType() const { |
103 | if (!BT) |
104 | BT.reset(new BugType(this, "Improper use of SecKeychain API", |
105 | "API Misuse (Apple)")); |
106 | } |
107 | |
108 | void generateDeallocatorMismatchReport(const AllocationPair &AP, |
109 | const Expr *ArgExpr, |
110 | CheckerContext &C) const; |
111 | |
112 | |
113 | const ExplodedNode *getAllocationNode(const ExplodedNode *N, SymbolRef Sym, |
114 | CheckerContext &C) const; |
115 | |
116 | std::unique_ptr<BugReport> generateAllocatedDataNotReleasedReport( |
117 | const AllocationPair &AP, ExplodedNode *N, CheckerContext &C) const; |
118 | |
119 | |
120 | void markInteresting(BugReport *R, const AllocationPair &AP) const { |
121 | R->markInteresting(AP.first); |
122 | R->markInteresting(AP.second->Region); |
123 | } |
124 | |
125 | |
126 | |
127 | |
128 | class SecKeychainBugVisitor : public BugReporterVisitor { |
129 | protected: |
130 | |
131 | SymbolRef Sym; |
132 | |
133 | public: |
134 | SecKeychainBugVisitor(SymbolRef S) : Sym(S) {} |
135 | |
136 | void Profile(llvm::FoldingSetNodeID &ID) const override { |
137 | static int X = 0; |
138 | ID.AddPointer(&X); |
139 | ID.AddPointer(Sym); |
140 | } |
141 | |
142 | std::shared_ptr<PathDiagnosticPiece> VisitNode(const ExplodedNode *N, |
143 | BugReporterContext &BRC, |
144 | BugReport &BR) override; |
145 | }; |
146 | }; |
147 | } |
148 | |
149 | |
150 | |
151 | |
152 | REGISTER_MAP_WITH_PROGRAMSTATE(AllocatedData, |
153 | SymbolRef, |
154 | MacOSKeychainAPIChecker::AllocationState) |
155 | |
156 | static bool isEnclosingFunctionParam(const Expr *E) { |
157 | E = E->IgnoreParenCasts(); |
158 | if (const DeclRefExpr *DRE = dyn_cast<DeclRefExpr>(E)) { |
159 | const ValueDecl *VD = DRE->getDecl(); |
160 | if (isa<ImplicitParamDecl>(VD) || isa<ParmVarDecl>(VD)) |
161 | return true; |
162 | } |
163 | return false; |
164 | } |
165 | |
166 | const MacOSKeychainAPIChecker::ADFunctionInfo |
167 | MacOSKeychainAPIChecker::FunctionsToTrack[FunctionsToTrackSize] = { |
168 | {"SecKeychainItemCopyContent", 4, 3, ValidAPI}, |
169 | {"SecKeychainFindGenericPassword", 6, 3, ValidAPI}, |
170 | {"SecKeychainFindInternetPassword", 13, 3, ValidAPI}, |
171 | {"SecKeychainItemFreeContent", 1, InvalidIdx, ValidAPI}, |
172 | {"SecKeychainItemCopyAttributesAndData", 5, 5, ValidAPI}, |
173 | {"SecKeychainItemFreeAttributesAndData", 1, InvalidIdx, ValidAPI}, |
174 | {"free", 0, InvalidIdx, ErrorAPI}, |
175 | {"CFStringCreateWithBytesNoCopy", 1, InvalidIdx, PossibleAPI}, |
176 | }; |
177 | |
178 | unsigned MacOSKeychainAPIChecker::getTrackedFunctionIndex(StringRef Name, |
179 | bool IsAllocator) { |
180 | for (unsigned I = 0; I < FunctionsToTrackSize; ++I) { |
181 | ADFunctionInfo FI = FunctionsToTrack[I]; |
182 | if (FI.Name != Name) |
183 | continue; |
184 | |
185 | if (IsAllocator && (FI.DeallocatorIdx == InvalidIdx)) |
186 | return InvalidIdx; |
187 | if (!IsAllocator && (FI.DeallocatorIdx != InvalidIdx)) |
188 | return InvalidIdx; |
189 | |
190 | return I; |
191 | } |
192 | |
193 | return InvalidIdx; |
194 | } |
195 | |
196 | static bool isBadDeallocationArgument(const MemRegion *Arg) { |
197 | if (!Arg) |
198 | return false; |
199 | return isa<AllocaRegion>(Arg) || isa<BlockDataRegion>(Arg) || |
200 | isa<TypedRegion>(Arg); |
201 | } |
202 | |
203 | |
204 | |
205 | static SymbolRef getAsPointeeSymbol(const Expr *Expr, |
206 | CheckerContext &C) { |
207 | ProgramStateRef State = C.getState(); |
208 | SVal ArgV = C.getSVal(Expr); |
209 | |
210 | if (Optional<loc::MemRegionVal> X = ArgV.getAs<loc::MemRegionVal>()) { |
211 | StoreManager& SM = C.getStoreManager(); |
212 | SymbolRef sym = SM.getBinding(State->getStore(), *X).getAsLocSymbol(); |
213 | if (sym) |
214 | return sym; |
215 | } |
216 | return nullptr; |
217 | } |
218 | |
219 | |
220 | |
221 | void MacOSKeychainAPIChecker:: |
222 | generateDeallocatorMismatchReport(const AllocationPair &AP, |
223 | const Expr *ArgExpr, |
224 | CheckerContext &C) const { |
225 | ProgramStateRef State = C.getState(); |
226 | State = State->remove<AllocatedData>(AP.first); |
227 | ExplodedNode *N = C.generateNonFatalErrorNode(State); |
228 | |
229 | if (!N) |
230 | return; |
231 | initBugType(); |
232 | SmallString<80> sbuf; |
233 | llvm::raw_svector_ostream os(sbuf); |
234 | unsigned int PDeallocIdx = |
235 | FunctionsToTrack[AP.second->AllocatorIdx].DeallocatorIdx; |
236 | |
237 | os << "Deallocator doesn't match the allocator: '" |
238 | << FunctionsToTrack[PDeallocIdx].Name << "' should be used."; |
239 | auto Report = llvm::make_unique<BugReport>(*BT, os.str(), N); |
240 | Report->addVisitor(llvm::make_unique<SecKeychainBugVisitor>(AP.first)); |
241 | Report->addRange(ArgExpr->getSourceRange()); |
242 | markInteresting(Report.get(), AP); |
243 | C.emitReport(std::move(Report)); |
244 | } |
245 | |
246 | void MacOSKeychainAPIChecker::checkPreStmt(const CallExpr *CE, |
247 | CheckerContext &C) const { |
248 | unsigned idx = InvalidIdx; |
249 | ProgramStateRef State = C.getState(); |
250 | |
251 | const FunctionDecl *FD = C.getCalleeDecl(CE); |
252 | if (!FD || FD->getKind() != Decl::Function) |
253 | return; |
254 | |
255 | StringRef funName = C.getCalleeName(FD); |
256 | if (funName.empty()) |
257 | return; |
258 | |
259 | |
260 | idx = getTrackedFunctionIndex(funName, true); |
261 | if (idx != InvalidIdx) { |
262 | unsigned paramIdx = FunctionsToTrack[idx].Param; |
263 | if (CE->getNumArgs() <= paramIdx) |
264 | return; |
265 | |
266 | const Expr *ArgExpr = CE->getArg(paramIdx); |
267 | if (SymbolRef V = getAsPointeeSymbol(ArgExpr, C)) |
268 | if (const AllocationState *AS = State->get<AllocatedData>(V)) { |
269 | |
270 | |
271 | State = State->remove<AllocatedData>(V); |
272 | ExplodedNode *N = C.generateNonFatalErrorNode(State); |
273 | if (!N) |
274 | return; |
275 | initBugType(); |
276 | SmallString<128> sbuf; |
277 | llvm::raw_svector_ostream os(sbuf); |
278 | unsigned int DIdx = FunctionsToTrack[AS->AllocatorIdx].DeallocatorIdx; |
279 | os << "Allocated data should be released before another call to " |
280 | << "the allocator: missing a call to '" |
281 | << FunctionsToTrack[DIdx].Name |
282 | << "'."; |
283 | auto Report = llvm::make_unique<BugReport>(*BT, os.str(), N); |
284 | Report->addVisitor(llvm::make_unique<SecKeychainBugVisitor>(V)); |
285 | Report->addRange(ArgExpr->getSourceRange()); |
286 | Report->markInteresting(AS->Region); |
287 | C.emitReport(std::move(Report)); |
288 | } |
289 | return; |
290 | } |
291 | |
292 | |
293 | idx = getTrackedFunctionIndex(funName, false); |
294 | if (idx == InvalidIdx) |
295 | return; |
296 | |
297 | unsigned paramIdx = FunctionsToTrack[idx].Param; |
298 | if (CE->getNumArgs() <= paramIdx) |
299 | return; |
300 | |
301 | |
302 | const Expr *ArgExpr = CE->getArg(paramIdx); |
303 | SVal ArgSVal = C.getSVal(ArgExpr); |
304 | |
305 | |
306 | if (ArgSVal.isUndef()) |
307 | return; |
308 | |
309 | SymbolRef ArgSM = ArgSVal.getAsLocSymbol(); |
310 | |
311 | |
312 | |
313 | bool RegionArgIsBad = false; |
314 | if (!ArgSM) { |
315 | if (!isBadDeallocationArgument(ArgSVal.getAsRegion())) |
316 | return; |
317 | RegionArgIsBad = true; |
318 | } |
319 | |
320 | |
321 | const AllocationState *AS = State->get<AllocatedData>(ArgSM); |
322 | if (!AS) |
323 | return; |
324 | |
325 | |
326 | |
327 | if (RegionArgIsBad) { |
328 | |
329 | |
330 | if (isEnclosingFunctionParam(ArgExpr)) |
331 | return; |
332 | |
333 | ExplodedNode *N = C.generateNonFatalErrorNode(State); |
334 | if (!N) |
335 | return; |
336 | initBugType(); |
337 | auto Report = llvm::make_unique<BugReport>( |
338 | *BT, "Trying to free data which has not been allocated.", N); |
339 | Report->addRange(ArgExpr->getSourceRange()); |
340 | if (AS) |
341 | Report->markInteresting(AS->Region); |
342 | C.emitReport(std::move(Report)); |
343 | return; |
344 | } |
345 | |
346 | |
347 | if (FunctionsToTrack[idx].Kind == PossibleAPI) { |
348 | |
349 | if (funName == "CFStringCreateWithBytesNoCopy") { |
350 | const Expr *DeallocatorExpr = CE->getArg(5)->IgnoreParenCasts(); |
351 | |
352 | if (DeallocatorExpr->isNullPointerConstant(C.getASTContext(), |
353 | Expr::NPC_ValueDependentIsNotNull)) { |
354 | const AllocationPair AP = std::make_pair(ArgSM, AS); |
355 | generateDeallocatorMismatchReport(AP, ArgExpr, C); |
356 | return; |
357 | } |
358 | |
359 | if (const DeclRefExpr *DE = dyn_cast<DeclRefExpr>(DeallocatorExpr)) { |
360 | StringRef DeallocatorName = DE->getFoundDecl()->getName(); |
361 | if (DeallocatorName == "kCFAllocatorDefault" || |
362 | DeallocatorName == "kCFAllocatorSystemDefault" || |
363 | DeallocatorName == "kCFAllocatorMalloc") { |
364 | const AllocationPair AP = std::make_pair(ArgSM, AS); |
365 | generateDeallocatorMismatchReport(AP, ArgExpr, C); |
366 | return; |
367 | } |
368 | |
369 | |
370 | if (DE->getFoundDecl()->getName() == "kCFAllocatorNull") |
371 | return; |
372 | } |
373 | |
374 | |
375 | State = State->remove<AllocatedData>(ArgSM); |
376 | C.addTransition(State); |
377 | return; |
378 | } |
379 | |
380 | llvm_unreachable("We know of no other possible APIs."); |
381 | } |
382 | |
383 | |
384 | |
385 | State = State->remove<AllocatedData>(ArgSM); |
386 | |
387 | |
388 | unsigned int PDeallocIdx = FunctionsToTrack[AS->AllocatorIdx].DeallocatorIdx; |
389 | if (PDeallocIdx != idx || (FunctionsToTrack[idx].Kind == ErrorAPI)) { |
390 | const AllocationPair AP = std::make_pair(ArgSM, AS); |
391 | generateDeallocatorMismatchReport(AP, ArgExpr, C); |
392 | return; |
393 | } |
394 | |
395 | C.addTransition(State); |
396 | } |
397 | |
398 | void MacOSKeychainAPIChecker::checkPostStmt(const CallExpr *CE, |
399 | CheckerContext &C) const { |
400 | ProgramStateRef State = C.getState(); |
401 | const FunctionDecl *FD = C.getCalleeDecl(CE); |
402 | if (!FD || FD->getKind() != Decl::Function) |
403 | return; |
404 | |
405 | StringRef funName = C.getCalleeName(FD); |
406 | |
407 | |
408 | unsigned idx = getTrackedFunctionIndex(funName, true); |
409 | if (idx == InvalidIdx) |
410 | return; |
411 | |
412 | const Expr *ArgExpr = CE->getArg(FunctionsToTrack[idx].Param); |
413 | |
414 | |
415 | if (isEnclosingFunctionParam(ArgExpr) && |
416 | C.getLocationContext()->getParent() == nullptr) |
417 | return; |
418 | |
419 | if (SymbolRef V = getAsPointeeSymbol(ArgExpr, C)) { |
420 | |
421 | |
422 | |
423 | |
424 | |
425 | |
426 | |
427 | |
428 | |
429 | |
430 | |
431 | |
432 | SymbolRef RetStatusSymbol = C.getSVal(CE).getAsSymbol(); |
433 | C.getSymbolManager().addSymbolDependency(V, RetStatusSymbol); |
434 | |
435 | |
436 | State = State->set<AllocatedData>(V, AllocationState(ArgExpr, idx, |
437 | RetStatusSymbol)); |
438 | assert(State); |
439 | C.addTransition(State); |
440 | } |
441 | } |
442 | |
443 | |
444 | const ExplodedNode * |
445 | MacOSKeychainAPIChecker::getAllocationNode(const ExplodedNode *N, |
446 | SymbolRef Sym, |
447 | CheckerContext &C) const { |
448 | const LocationContext *LeakContext = N->getLocationContext(); |
449 | |
450 | |
451 | const ExplodedNode *AllocNode = N; |
452 | |
453 | while (N) { |
454 | if (!N->getState()->get<AllocatedData>(Sym)) |
455 | break; |
456 | |
457 | |
458 | const LocationContext *NContext = N->getLocationContext(); |
459 | if (NContext == LeakContext || |
460 | NContext->isParentOf(LeakContext)) |
461 | AllocNode = N; |
462 | N = N->pred_empty() ? nullptr : *(N->pred_begin()); |
463 | } |
464 | |
465 | return AllocNode; |
466 | } |
467 | |
468 | std::unique_ptr<BugReport> |
469 | MacOSKeychainAPIChecker::generateAllocatedDataNotReleasedReport( |
470 | const AllocationPair &AP, ExplodedNode *N, CheckerContext &C) const { |
471 | const ADFunctionInfo &FI = FunctionsToTrack[AP.second->AllocatorIdx]; |
472 | initBugType(); |
473 | SmallString<70> sbuf; |
474 | llvm::raw_svector_ostream os(sbuf); |
475 | os << "Allocated data is not released: missing a call to '" |
476 | << FunctionsToTrack[FI.DeallocatorIdx].Name << "'."; |
477 | |
478 | |
479 | |
480 | |
481 | PathDiagnosticLocation LocUsedForUniqueing; |
482 | const ExplodedNode *AllocNode = getAllocationNode(N, AP.first, C); |
483 | const Stmt *AllocStmt = PathDiagnosticLocation::getStmt(AllocNode); |
484 | |
485 | if (AllocStmt) |
486 | LocUsedForUniqueing = PathDiagnosticLocation::createBegin(AllocStmt, |
487 | C.getSourceManager(), |
488 | AllocNode->getLocationContext()); |
489 | |
490 | auto Report = |
491 | llvm::make_unique<BugReport>(*BT, os.str(), N, LocUsedForUniqueing, |
492 | AllocNode->getLocationContext()->getDecl()); |
493 | |
494 | Report->addVisitor(llvm::make_unique<SecKeychainBugVisitor>(AP.first)); |
495 | markInteresting(Report.get(), AP); |
496 | return Report; |
497 | } |
498 | |
499 | |
500 | |
501 | ProgramStateRef MacOSKeychainAPIChecker::evalAssume(ProgramStateRef State, |
502 | SVal Cond, |
503 | bool Assumption) const { |
504 | AllocatedDataTy AMap = State->get<AllocatedData>(); |
505 | if (AMap.isEmpty()) |
506 | return State; |
507 | |
508 | auto *CondBSE = dyn_cast_or_null<BinarySymExpr>(Cond.getAsSymExpr()); |
509 | if (!CondBSE) |
510 | return State; |
511 | BinaryOperator::Opcode OpCode = CondBSE->getOpcode(); |
512 | if (OpCode != BO_EQ && OpCode != BO_NE) |
513 | return State; |
514 | |
515 | |
516 | |
517 | SymbolRef ReturnSymbol = nullptr; |
518 | if (auto *SIE = dyn_cast<SymIntExpr>(CondBSE)) { |
519 | const llvm::APInt &RHS = SIE->getRHS(); |
520 | bool ErrorIsReturned = (OpCode == BO_EQ && RHS != NoErr) || |
521 | (OpCode == BO_NE && RHS == NoErr); |
522 | if (!Assumption) |
523 | ErrorIsReturned = !ErrorIsReturned; |
524 | if (ErrorIsReturned) |
525 | ReturnSymbol = SIE->getLHS(); |
526 | } |
527 | |
528 | if (ReturnSymbol) |
529 | for (auto I = AMap.begin(), E = AMap.end(); I != E; ++I) { |
530 | if (ReturnSymbol == I->second.Region) |
531 | State = State->remove<AllocatedData>(I->first); |
532 | } |
533 | |
534 | return State; |
535 | } |
536 | |
537 | void MacOSKeychainAPIChecker::checkDeadSymbols(SymbolReaper &SR, |
538 | CheckerContext &C) const { |
539 | ProgramStateRef State = C.getState(); |
540 | AllocatedDataTy AMap = State->get<AllocatedData>(); |
541 | if (AMap.isEmpty()) |
542 | return; |
543 | |
544 | bool Changed = false; |
545 | AllocationPairVec Errors; |
546 | for (auto I = AMap.begin(), E = AMap.end(); I != E; ++I) { |
547 | if (!SR.isDead(I->first)) |
548 | continue; |
549 | |
550 | Changed = true; |
551 | State = State->remove<AllocatedData>(I->first); |
552 | |
553 | ConstraintManager &CMgr = State->getConstraintManager(); |
554 | ConditionTruthVal AllocFailed = CMgr.isNull(State, I.getKey()); |
555 | if (AllocFailed.isConstrainedTrue()) |
556 | continue; |
557 | Errors.push_back(std::make_pair(I->first, &I->second)); |
558 | } |
559 | if (!Changed) { |
560 | |
561 | C.addTransition(State); |
562 | return; |
563 | } |
564 | |
565 | static CheckerProgramPointTag Tag(this, "DeadSymbolsLeak"); |
566 | ExplodedNode *N = C.generateNonFatalErrorNode(C.getState(), &Tag); |
567 | if (!N) |
568 | return; |
569 | |
570 | |
571 | for (const auto &P : Errors) |
572 | C.emitReport(generateAllocatedDataNotReleasedReport(P, N, C)); |
573 | |
574 | |
575 | C.addTransition(State, N); |
576 | } |
577 | |
578 | ProgramStateRef MacOSKeychainAPIChecker::checkPointerEscape( |
579 | ProgramStateRef State, const InvalidatedSymbols &Escaped, |
580 | const CallEvent *Call, PointerEscapeKind Kind) const { |
581 | |
582 | |
583 | if (!Call || Call->getDecl()) |
584 | return State; |
585 | |
586 | for (auto I : State->get<AllocatedData>()) { |
587 | SymbolRef Sym = I.first; |
588 | if (Escaped.count(Sym)) |
589 | State = State->remove<AllocatedData>(Sym); |
590 | |
591 | |
592 | |
593 | |
594 | |
595 | |
596 | |
597 | |
598 | |
599 | |
600 | |
601 | |
602 | |
603 | |
604 | |
605 | |
606 | |
607 | if (const auto *SD = dyn_cast<SymbolDerived>(Sym)) { |
608 | SymbolRef ParentSym = SD->getParentSymbol(); |
609 | if (Escaped.count(ParentSym)) |
610 | State = State->remove<AllocatedData>(Sym); |
611 | } |
612 | } |
613 | return State; |
614 | } |
615 | |
616 | std::shared_ptr<PathDiagnosticPiece> |
617 | MacOSKeychainAPIChecker::SecKeychainBugVisitor::VisitNode( |
618 | const ExplodedNode *N, BugReporterContext &BRC, BugReport &BR) { |
619 | const AllocationState *AS = N->getState()->get<AllocatedData>(Sym); |
620 | if (!AS) |
621 | return nullptr; |
622 | const AllocationState *ASPrev = |
623 | N->getFirstPred()->getState()->get<AllocatedData>(Sym); |
624 | if (ASPrev) |
625 | return nullptr; |
626 | |
627 | |
628 | |
629 | const CallExpr *CE = |
630 | cast<CallExpr>(N->getLocation().castAs<StmtPoint>().getStmt()); |
631 | const FunctionDecl *funDecl = CE->getDirectCallee(); |
632 | (0) . __assert_fail ("funDecl && \"We do not support indirect function calls as of now.\"", "/home/seafit/code_projects/clang_source/clang/lib/StaticAnalyzer/Checkers/MacOSKeychainAPIChecker.cpp", 632, __PRETTY_FUNCTION__))" file_link="../../../../include/assert.h.html#88" macro="true">assert(funDecl && "We do not support indirect function calls as of now."); |
633 | StringRef funName = funDecl->getName(); |
634 | |
635 | |
636 | unsigned Idx = getTrackedFunctionIndex(funName, true); |
637 | (0) . __assert_fail ("Idx != InvalidIdx && \"This should be a call to an allocator.\"", "/home/seafit/code_projects/clang_source/clang/lib/StaticAnalyzer/Checkers/MacOSKeychainAPIChecker.cpp", 637, __PRETTY_FUNCTION__))" file_link="../../../../include/assert.h.html#88" macro="true">assert(Idx != InvalidIdx && "This should be a call to an allocator."); |
638 | const Expr *ArgExpr = CE->getArg(FunctionsToTrack[Idx].Param); |
639 | PathDiagnosticLocation Pos(ArgExpr, BRC.getSourceManager(), |
640 | N->getLocationContext()); |
641 | return std::make_shared<PathDiagnosticEventPiece>(Pos, |
642 | "Data is allocated here."); |
643 | } |
644 | |
645 | void MacOSKeychainAPIChecker::printState(raw_ostream &Out, |
646 | ProgramStateRef State, |
647 | const char *NL, |
648 | const char *Sep) const { |
649 | |
650 | AllocatedDataTy AMap = State->get<AllocatedData>(); |
651 | |
652 | if (!AMap.isEmpty()) { |
653 | Out << Sep << "KeychainAPIChecker :" << NL; |
654 | for (auto I = AMap.begin(), E = AMap.end(); I != E; ++I) { |
655 | I.getKey()->dumpToStream(Out); |
656 | } |
657 | } |
658 | } |
659 | |
660 | |
661 | void ento::registerMacOSKeychainAPIChecker(CheckerManager &mgr) { |
662 | mgr.registerChecker<MacOSKeychainAPIChecker>(); |
663 | } |
664 | |
665 | bool ento::shouldRegisterMacOSKeychainAPIChecker(const LangOptions &LO) { |
666 | return true; |
667 | } |
668 | |