Clang Project

clang_source_code/lib/StaticAnalyzer/Checkers/ObjCSuperDeallocChecker.cpp
1//===- ObjCSuperDeallocChecker.cpp - Check correct use of [super dealloc] -===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8//
9// This defines ObjCSuperDeallocChecker, a builtin check that warns when
10// self is used after a call to [super dealloc] in MRR mode.
11//
12//===----------------------------------------------------------------------===//
13
14#include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
15#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
16#include "clang/StaticAnalyzer/Core/Checker.h"
17#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
18#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
19#include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h"
20#include "clang/StaticAnalyzer/Core/PathSensitive/SymbolManager.h"
21
22using namespace clang;
23using namespace ento;
24
25namespace {
26class ObjCSuperDeallocChecker
27    : public Checker<check::PostObjCMessage, check::PreObjCMessage,
28                     check::PreCall, check::Location> {
29
30  mutable IdentifierInfo *IIdealloc, *IINSObject;
31  mutable Selector SELdealloc;
32
33  std::unique_ptr<BugTypeDoubleSuperDeallocBugType;
34
35  void initIdentifierInfoAndSelectors(ASTContext &Ctxconst;
36
37  bool isSuperDeallocMessage(const ObjCMethodCall &Mconst;
38
39public:
40  ObjCSuperDeallocChecker();
41  void checkPostObjCMessage(const ObjCMethodCall &MCheckerContext &Cconst;
42  void checkPreObjCMessage(const ObjCMethodCall &MCheckerContext &Cconst;
43
44  void checkPreCall(const CallEvent &CallCheckerContext &Cconst;
45
46  void checkLocation(SVal lbool isLoadconst Stmt *S,
47                     CheckerContext &Cconst;
48
49private:
50
51  void diagnoseCallArguments(const CallEvent &CECheckerContext &Cconst;
52
53  void reportUseAfterDealloc(SymbolRef SymStringRef Descconst Stmt *S,
54                             CheckerContext &Cconst;
55};
56
57// End anonymous namespace.
58
59// Remember whether [super dealloc] has previously been called on the
60// SymbolRef for the receiver.
61REGISTER_SET_WITH_PROGRAMSTATE(CalledSuperDealloc, SymbolRef)
62
63namespace {
64class SuperDeallocBRVisitor final : public BugReporterVisitor {
65  SymbolRef ReceiverSymbol;
66  bool Satisfied;
67
68public:
69  SuperDeallocBRVisitor(SymbolRef ReceiverSymbol)
70      : ReceiverSymbol(ReceiverSymbol),
71        Satisfied(false) {}
72
73  std::shared_ptr<PathDiagnosticPieceVisitNode(const ExplodedNode *Succ,
74                                                 BugReporterContext &BRC,
75                                                 BugReport &BR) override;
76
77  void Profile(llvm::FoldingSetNodeID &IDconst override {
78    ID.Add(ReceiverSymbol);
79  }
80};
81// End anonymous namespace.
82
83void ObjCSuperDeallocChecker::checkPreObjCMessage(const ObjCMethodCall &M,
84                                                  CheckerContext &Cconst {
85
86  ProgramStateRef State = C.getState();
87  SymbolRef ReceiverSymbol = M.getReceiverSVal().getAsSymbol();
88  if (!ReceiverSymbol) {
89    diagnoseCallArguments(MC);
90    return;
91  }
92
93  bool AlreadyCalled = State->contains<CalledSuperDealloc>(ReceiverSymbol);
94  if (!AlreadyCalled)
95    return;
96
97  StringRef Desc;
98
99  if (isSuperDeallocMessage(M)) {
100    Desc = "[super dealloc] should not be called multiple times";
101  } else {
102    Desc = StringRef();
103  }
104
105  reportUseAfterDealloc(ReceiverSymbol, Desc, M.getOriginExpr(), C);
106}
107
108void ObjCSuperDeallocChecker::checkPreCall(const CallEvent &Call,
109                                           CheckerContext &Cconst {
110  diagnoseCallArguments(CallC);
111}
112
113void ObjCSuperDeallocChecker::checkPostObjCMessage(const ObjCMethodCall &M,
114                                                   CheckerContext &Cconst {
115  // Check for [super dealloc] method call.
116  if (!isSuperDeallocMessage(M))
117    return;
118
119  ProgramStateRef State = C.getState();
120  SymbolRef ReceiverSymbol = M.getSelfSVal().getAsSymbol();
121   (0) . __assert_fail ("ReceiverSymbol && \"No receiver symbol at call to [super dealloc]?\"", "/home/seafit/code_projects/clang_source/clang/lib/StaticAnalyzer/Checkers/ObjCSuperDeallocChecker.cpp", 121, __PRETTY_FUNCTION__))" file_link="../../../../include/assert.h.html#88" macro="true">assert(ReceiverSymbol && "No receiver symbol at call to [super dealloc]?");
122
123  // We add this transition in checkPostObjCMessage to avoid warning when
124  // we inline a call to [super dealloc] where the inlined call itself
125  // calls [super dealloc].
126  State = State->add<CalledSuperDealloc>(ReceiverSymbol);
127  C.addTransition(State);
128}
129
130void ObjCSuperDeallocChecker::checkLocation(SVal Lbool IsLoadconst Stmt *S,
131                                  CheckerContext &Cconst {
132  SymbolRef BaseSym = L.getLocSymbolInBase();
133  if (!BaseSym)
134    return;
135
136  ProgramStateRef State = C.getState();
137
138  if (!State->contains<CalledSuperDealloc>(BaseSym))
139    return;
140
141  const MemRegion *R = L.getAsRegion();
142  if (!R)
143    return;
144
145  // Climb the super regions to find the base symbol while recording
146  // the second-to-last region for error reporting.
147  const MemRegion *PriorSubRegion = nullptr;
148  while (const SubRegion *SR = dyn_cast<SubRegion>(R)) {
149    if (const SymbolicRegion *SymR = dyn_cast<SymbolicRegion>(SR)) {
150      BaseSym = SymR->getSymbol();
151      break;
152    } else {
153      R = SR->getSuperRegion();
154      PriorSubRegion = SR;
155    }
156  }
157
158  StringRef Desc = StringRef();
159  auto *IvarRegion = dyn_cast_or_null<ObjCIvarRegion>(PriorSubRegion);
160
161  std::string Buf;
162  llvm::raw_string_ostream OS(Buf);
163  if (IvarRegion) {
164    OS << "Use of instance variable '" << *IvarRegion->getDecl() <<
165          "' after 'self' has been deallocated";
166    Desc = OS.str();
167  }
168
169  reportUseAfterDealloc(BaseSym, Desc, S, C);
170}
171
172/// Report a use-after-dealloc on Sym. If not empty,
173/// Desc will be used to describe the error; otherwise,
174/// a default warning will be used.
175void ObjCSuperDeallocChecker::reportUseAfterDealloc(SymbolRef Sym,
176                                                    StringRef Desc,
177                                                    const Stmt *S,
178                                                    CheckerContext &Cconst {
179  // We have a use of self after free.
180  // This likely causes a crash, so stop exploring the
181  // path by generating a sink.
182  ExplodedNode *ErrNode = C.generateErrorNode();
183  // If we've already reached this node on another path, return.
184  if (!ErrNode)
185    return;
186
187  if (Desc.empty())
188    Desc = "Use of 'self' after it has been deallocated";
189
190  // Generate the report.
191  std::unique_ptr<BugReportBR(
192      new BugReport(*DoubleSuperDeallocBugType, Desc, ErrNode));
193  BR->addRange(S->getSourceRange());
194  BR->addVisitor(llvm::make_unique<SuperDeallocBRVisitor>(Sym));
195  C.emitReport(std::move(BR));
196}
197
198/// Diagnose if any of the arguments to CE have already been
199/// dealloc'd.
200void ObjCSuperDeallocChecker::diagnoseCallArguments(const CallEvent &CE,
201                                                    CheckerContext &Cconst {
202  ProgramStateRef State = C.getState();
203  unsigned ArgCount = CE.getNumArgs();
204  for (unsigned I = 0I < ArgCountI++) {
205    SymbolRef Sym = CE.getArgSVal(I).getAsSymbol();
206    if (!Sym)
207      continue;
208
209    if (State->contains<CalledSuperDealloc>(Sym)) {
210      reportUseAfterDealloc(Sym, StringRef(), CE.getArgExpr(I), C);
211      return;
212    }
213  }
214}
215
216ObjCSuperDeallocChecker::ObjCSuperDeallocChecker()
217    : IIdealloc(nullptr), IINSObject(nullptr) {
218
219  DoubleSuperDeallocBugType.reset(
220      new BugType(this"[super dealloc] should not be called more than once",
221                  categories::CoreFoundationObjectiveC));
222}
223
224void
225ObjCSuperDeallocChecker::initIdentifierInfoAndSelectors(ASTContext &Ctxconst {
226  if (IIdealloc)
227    return;
228
229  IIdealloc = &Ctx.Idents.get("dealloc");
230  IINSObject = &Ctx.Idents.get("NSObject");
231
232  SELdealloc = Ctx.Selectors.getSelector(0, &IIdealloc);
233}
234
235bool
236ObjCSuperDeallocChecker::isSuperDeallocMessage(const ObjCMethodCall &Mconst {
237  if (M.getOriginExpr()->getReceiverKind() != ObjCMessageExpr::SuperInstance)
238    return false;
239
240  ASTContext &Ctx = M.getState()->getStateManager().getContext();
241  initIdentifierInfoAndSelectors(Ctx);
242
243  return M.getSelector() == SELdealloc;
244}
245
246std::shared_ptr<PathDiagnosticPiece>
247SuperDeallocBRVisitor::VisitNode(const ExplodedNode *Succ,
248                                 BugReporterContext &BRCBugReport &) {
249  if (Satisfied)
250    return nullptr;
251
252  ProgramStateRef State = Succ->getState();
253
254  bool CalledNow =
255      Succ->getState()->contains<CalledSuperDealloc>(ReceiverSymbol);
256  bool CalledBefore =
257      Succ->getFirstPred()->getState()->contains<CalledSuperDealloc>(
258          ReceiverSymbol);
259
260  // Is Succ the node on which the analyzer noted that [super dealloc] was
261  // called on ReceiverSymbol?
262  if (CalledNow && !CalledBefore) {
263    Satisfied = true;
264
265    ProgramPoint P = Succ->getLocation();
266    PathDiagnosticLocation L =
267        PathDiagnosticLocation::create(PBRC.getSourceManager());
268
269    if (!L.isValid() || !L.asLocation().isValid())
270      return nullptr;
271
272    return std::make_shared<PathDiagnosticEventPiece>(
273        L, "[super dealloc] called here");
274  }
275
276  return nullptr;
277}
278
279//===----------------------------------------------------------------------===//
280// Checker Registration.
281//===----------------------------------------------------------------------===//
282
283void ento::registerObjCSuperDeallocChecker(CheckerManager &Mgr) {
284  Mgr.registerChecker<ObjCSuperDeallocChecker>();
285}
286
287bool ento::shouldRegisterObjCSuperDeallocChecker(const LangOptions &LO) {
288  return true;
289}
290