CheckerManager.cpp 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909
  1. //===- CheckerManager.cpp - Static Analyzer Checker Manager ---------------===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. //
  9. // Defines the Static Analyzer Checker Manager.
  10. //
  11. //===----------------------------------------------------------------------===//
  12. #include "clang/StaticAnalyzer/Core/CheckerManager.h"
  13. #include "clang/AST/DeclBase.h"
  14. #include "clang/AST/Stmt.h"
  15. #include "clang/Analysis/ProgramPoint.h"
  16. #include "clang/Basic/JsonSupport.h"
  17. #include "clang/Basic/LLVM.h"
  18. #include "clang/Driver/DriverDiagnostic.h"
  19. #include "clang/StaticAnalyzer/Core/Checker.h"
  20. #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
  21. #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
  22. #include "clang/StaticAnalyzer/Core/PathSensitive/CoreEngine.h"
  23. #include "clang/StaticAnalyzer/Core/PathSensitive/ExprEngine.h"
  24. #include "clang/StaticAnalyzer/Core/PathSensitive/SVals.h"
  25. #include "llvm/ADT/SmallVector.h"
  26. #include "llvm/Support/Casting.h"
  27. #include "llvm/Support/ErrorHandling.h"
  28. #include <cassert>
  29. #include <vector>
  30. using namespace clang;
  31. using namespace ento;
  32. bool CheckerManager::hasPathSensitiveCheckers() const {
  33. return !StmtCheckers.empty() ||
  34. !PreObjCMessageCheckers.empty() ||
  35. !PostObjCMessageCheckers.empty() ||
  36. !PreCallCheckers.empty() ||
  37. !PostCallCheckers.empty() ||
  38. !LocationCheckers.empty() ||
  39. !BindCheckers.empty() ||
  40. !EndAnalysisCheckers.empty() ||
  41. !EndFunctionCheckers.empty() ||
  42. !BranchConditionCheckers.empty() ||
  43. !LiveSymbolsCheckers.empty() ||
  44. !DeadSymbolsCheckers.empty() ||
  45. !RegionChangesCheckers.empty() ||
  46. !EvalAssumeCheckers.empty() ||
  47. !EvalCallCheckers.empty();
  48. }
  49. void CheckerManager::finishedCheckerRegistration() {
  50. #ifndef NDEBUG
  51. // Make sure that for every event that has listeners, there is at least
  52. // one dispatcher registered for it.
  53. for (const auto &Event : Events)
  54. assert(Event.second.HasDispatcher &&
  55. "No dispatcher registered for an event");
  56. #endif
  57. }
  58. void CheckerManager::reportInvalidCheckerOptionValue(
  59. const CheckerBase *C, StringRef OptionName, StringRef ExpectedValueDesc) {
  60. Context.getDiagnostics()
  61. .Report(diag::err_analyzer_checker_option_invalid_input)
  62. << (llvm::Twine() + C->getTagDescription() + ":" + OptionName).str()
  63. << ExpectedValueDesc;
  64. }
  65. //===----------------------------------------------------------------------===//
  66. // Functions for running checkers for AST traversing..
  67. //===----------------------------------------------------------------------===//
  68. void CheckerManager::runCheckersOnASTDecl(const Decl *D, AnalysisManager& mgr,
  69. BugReporter &BR) {
  70. assert(D);
  71. unsigned DeclKind = D->getKind();
  72. CachedDeclCheckers *checkers = nullptr;
  73. CachedDeclCheckersMapTy::iterator CCI = CachedDeclCheckersMap.find(DeclKind);
  74. if (CCI != CachedDeclCheckersMap.end()) {
  75. checkers = &(CCI->second);
  76. } else {
  77. // Find the checkers that should run for this Decl and cache them.
  78. checkers = &CachedDeclCheckersMap[DeclKind];
  79. for (const auto &info : DeclCheckers)
  80. if (info.IsForDeclFn(D))
  81. checkers->push_back(info.CheckFn);
  82. }
  83. assert(checkers);
  84. for (const auto checker : *checkers)
  85. checker(D, mgr, BR);
  86. }
  87. void CheckerManager::runCheckersOnASTBody(const Decl *D, AnalysisManager& mgr,
  88. BugReporter &BR) {
  89. assert(D && D->hasBody());
  90. for (const auto BodyChecker : BodyCheckers)
  91. BodyChecker(D, mgr, BR);
  92. }
  93. //===----------------------------------------------------------------------===//
  94. // Functions for running checkers for path-sensitive checking.
  95. //===----------------------------------------------------------------------===//
  96. template <typename CHECK_CTX>
  97. static void expandGraphWithCheckers(CHECK_CTX checkCtx,
  98. ExplodedNodeSet &Dst,
  99. const ExplodedNodeSet &Src) {
  100. const NodeBuilderContext &BldrCtx = checkCtx.Eng.getBuilderContext();
  101. if (Src.empty())
  102. return;
  103. typename CHECK_CTX::CheckersTy::const_iterator
  104. I = checkCtx.checkers_begin(), E = checkCtx.checkers_end();
  105. if (I == E) {
  106. Dst.insert(Src);
  107. return;
  108. }
  109. ExplodedNodeSet Tmp1, Tmp2;
  110. const ExplodedNodeSet *PrevSet = &Src;
  111. for (; I != E; ++I) {
  112. ExplodedNodeSet *CurrSet = nullptr;
  113. if (I+1 == E)
  114. CurrSet = &Dst;
  115. else {
  116. CurrSet = (PrevSet == &Tmp1) ? &Tmp2 : &Tmp1;
  117. CurrSet->clear();
  118. }
  119. NodeBuilder B(*PrevSet, *CurrSet, BldrCtx);
  120. for (const auto &NI : *PrevSet)
  121. checkCtx.runChecker(*I, B, NI);
  122. // If all the produced transitions are sinks, stop.
  123. if (CurrSet->empty())
  124. return;
  125. // Update which NodeSet is the current one.
  126. PrevSet = CurrSet;
  127. }
  128. }
  129. namespace {
  130. struct CheckStmtContext {
  131. using CheckersTy = SmallVectorImpl<CheckerManager::CheckStmtFunc>;
  132. bool IsPreVisit;
  133. const CheckersTy &Checkers;
  134. const Stmt *S;
  135. ExprEngine &Eng;
  136. bool WasInlined;
  137. CheckStmtContext(bool isPreVisit, const CheckersTy &checkers,
  138. const Stmt *s, ExprEngine &eng, bool wasInlined = false)
  139. : IsPreVisit(isPreVisit), Checkers(checkers), S(s), Eng(eng),
  140. WasInlined(wasInlined) {}
  141. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  142. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  143. void runChecker(CheckerManager::CheckStmtFunc checkFn,
  144. NodeBuilder &Bldr, ExplodedNode *Pred) {
  145. // FIXME: Remove respondsToCallback from CheckerContext;
  146. ProgramPoint::Kind K = IsPreVisit ? ProgramPoint::PreStmtKind :
  147. ProgramPoint::PostStmtKind;
  148. const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K,
  149. Pred->getLocationContext(), checkFn.Checker);
  150. CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
  151. checkFn(S, C);
  152. }
  153. };
  154. } // namespace
  155. /// Run checkers for visiting Stmts.
  156. void CheckerManager::runCheckersForStmt(bool isPreVisit,
  157. ExplodedNodeSet &Dst,
  158. const ExplodedNodeSet &Src,
  159. const Stmt *S,
  160. ExprEngine &Eng,
  161. bool WasInlined) {
  162. CheckStmtContext C(isPreVisit, getCachedStmtCheckersFor(S, isPreVisit),
  163. S, Eng, WasInlined);
  164. expandGraphWithCheckers(C, Dst, Src);
  165. }
  166. namespace {
  167. struct CheckObjCMessageContext {
  168. using CheckersTy = std::vector<CheckerManager::CheckObjCMessageFunc>;
  169. ObjCMessageVisitKind Kind;
  170. bool WasInlined;
  171. const CheckersTy &Checkers;
  172. const ObjCMethodCall &Msg;
  173. ExprEngine &Eng;
  174. CheckObjCMessageContext(ObjCMessageVisitKind visitKind,
  175. const CheckersTy &checkers,
  176. const ObjCMethodCall &msg, ExprEngine &eng,
  177. bool wasInlined)
  178. : Kind(visitKind), WasInlined(wasInlined), Checkers(checkers), Msg(msg),
  179. Eng(eng) {}
  180. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  181. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  182. void runChecker(CheckerManager::CheckObjCMessageFunc checkFn,
  183. NodeBuilder &Bldr, ExplodedNode *Pred) {
  184. bool IsPreVisit;
  185. switch (Kind) {
  186. case ObjCMessageVisitKind::Pre:
  187. IsPreVisit = true;
  188. break;
  189. case ObjCMessageVisitKind::MessageNil:
  190. case ObjCMessageVisitKind::Post:
  191. IsPreVisit = false;
  192. break;
  193. }
  194. const ProgramPoint &L = Msg.getProgramPoint(IsPreVisit,checkFn.Checker);
  195. CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
  196. checkFn(*Msg.cloneWithState<ObjCMethodCall>(Pred->getState()), C);
  197. }
  198. };
  199. } // namespace
  200. /// Run checkers for visiting obj-c messages.
  201. void CheckerManager::runCheckersForObjCMessage(ObjCMessageVisitKind visitKind,
  202. ExplodedNodeSet &Dst,
  203. const ExplodedNodeSet &Src,
  204. const ObjCMethodCall &msg,
  205. ExprEngine &Eng,
  206. bool WasInlined) {
  207. auto &checkers = getObjCMessageCheckers(visitKind);
  208. CheckObjCMessageContext C(visitKind, checkers, msg, Eng, WasInlined);
  209. expandGraphWithCheckers(C, Dst, Src);
  210. }
  211. const std::vector<CheckerManager::CheckObjCMessageFunc> &
  212. CheckerManager::getObjCMessageCheckers(ObjCMessageVisitKind Kind) {
  213. switch (Kind) {
  214. case ObjCMessageVisitKind::Pre:
  215. return PreObjCMessageCheckers;
  216. break;
  217. case ObjCMessageVisitKind::Post:
  218. return PostObjCMessageCheckers;
  219. case ObjCMessageVisitKind::MessageNil:
  220. return ObjCMessageNilCheckers;
  221. }
  222. llvm_unreachable("Unknown Kind");
  223. }
  224. namespace {
  225. // FIXME: This has all the same signatures as CheckObjCMessageContext.
  226. // Is there a way we can merge the two?
  227. struct CheckCallContext {
  228. using CheckersTy = std::vector<CheckerManager::CheckCallFunc>;
  229. bool IsPreVisit, WasInlined;
  230. const CheckersTy &Checkers;
  231. const CallEvent &Call;
  232. ExprEngine &Eng;
  233. CheckCallContext(bool isPreVisit, const CheckersTy &checkers,
  234. const CallEvent &call, ExprEngine &eng,
  235. bool wasInlined)
  236. : IsPreVisit(isPreVisit), WasInlined(wasInlined), Checkers(checkers),
  237. Call(call), Eng(eng) {}
  238. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  239. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  240. void runChecker(CheckerManager::CheckCallFunc checkFn,
  241. NodeBuilder &Bldr, ExplodedNode *Pred) {
  242. const ProgramPoint &L = Call.getProgramPoint(IsPreVisit,checkFn.Checker);
  243. CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
  244. checkFn(*Call.cloneWithState(Pred->getState()), C);
  245. }
  246. };
  247. } // namespace
  248. /// Run checkers for visiting an abstract call event.
  249. void CheckerManager::runCheckersForCallEvent(bool isPreVisit,
  250. ExplodedNodeSet &Dst,
  251. const ExplodedNodeSet &Src,
  252. const CallEvent &Call,
  253. ExprEngine &Eng,
  254. bool WasInlined) {
  255. CheckCallContext C(isPreVisit,
  256. isPreVisit ? PreCallCheckers
  257. : PostCallCheckers,
  258. Call, Eng, WasInlined);
  259. expandGraphWithCheckers(C, Dst, Src);
  260. }
  261. namespace {
  262. struct CheckLocationContext {
  263. using CheckersTy = std::vector<CheckerManager::CheckLocationFunc>;
  264. const CheckersTy &Checkers;
  265. SVal Loc;
  266. bool IsLoad;
  267. const Stmt *NodeEx; /* Will become a CFGStmt */
  268. const Stmt *BoundEx;
  269. ExprEngine &Eng;
  270. CheckLocationContext(const CheckersTy &checkers,
  271. SVal loc, bool isLoad, const Stmt *NodeEx,
  272. const Stmt *BoundEx,
  273. ExprEngine &eng)
  274. : Checkers(checkers), Loc(loc), IsLoad(isLoad), NodeEx(NodeEx),
  275. BoundEx(BoundEx), Eng(eng) {}
  276. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  277. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  278. void runChecker(CheckerManager::CheckLocationFunc checkFn,
  279. NodeBuilder &Bldr, ExplodedNode *Pred) {
  280. ProgramPoint::Kind K = IsLoad ? ProgramPoint::PreLoadKind :
  281. ProgramPoint::PreStoreKind;
  282. const ProgramPoint &L =
  283. ProgramPoint::getProgramPoint(NodeEx, K,
  284. Pred->getLocationContext(),
  285. checkFn.Checker);
  286. CheckerContext C(Bldr, Eng, Pred, L);
  287. checkFn(Loc, IsLoad, BoundEx, C);
  288. }
  289. };
  290. } // namespace
  291. /// Run checkers for load/store of a location.
  292. void CheckerManager::runCheckersForLocation(ExplodedNodeSet &Dst,
  293. const ExplodedNodeSet &Src,
  294. SVal location, bool isLoad,
  295. const Stmt *NodeEx,
  296. const Stmt *BoundEx,
  297. ExprEngine &Eng) {
  298. CheckLocationContext C(LocationCheckers, location, isLoad, NodeEx,
  299. BoundEx, Eng);
  300. expandGraphWithCheckers(C, Dst, Src);
  301. }
  302. namespace {
  303. struct CheckBindContext {
  304. using CheckersTy = std::vector<CheckerManager::CheckBindFunc>;
  305. const CheckersTy &Checkers;
  306. SVal Loc;
  307. SVal Val;
  308. const Stmt *S;
  309. ExprEngine &Eng;
  310. const ProgramPoint &PP;
  311. CheckBindContext(const CheckersTy &checkers,
  312. SVal loc, SVal val, const Stmt *s, ExprEngine &eng,
  313. const ProgramPoint &pp)
  314. : Checkers(checkers), Loc(loc), Val(val), S(s), Eng(eng), PP(pp) {}
  315. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  316. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  317. void runChecker(CheckerManager::CheckBindFunc checkFn,
  318. NodeBuilder &Bldr, ExplodedNode *Pred) {
  319. const ProgramPoint &L = PP.withTag(checkFn.Checker);
  320. CheckerContext C(Bldr, Eng, Pred, L);
  321. checkFn(Loc, Val, S, C);
  322. }
  323. };
  324. } // namespace
  325. /// Run checkers for binding of a value to a location.
  326. void CheckerManager::runCheckersForBind(ExplodedNodeSet &Dst,
  327. const ExplodedNodeSet &Src,
  328. SVal location, SVal val,
  329. const Stmt *S, ExprEngine &Eng,
  330. const ProgramPoint &PP) {
  331. CheckBindContext C(BindCheckers, location, val, S, Eng, PP);
  332. expandGraphWithCheckers(C, Dst, Src);
  333. }
  334. void CheckerManager::runCheckersForEndAnalysis(ExplodedGraph &G,
  335. BugReporter &BR,
  336. ExprEngine &Eng) {
  337. for (const auto EndAnalysisChecker : EndAnalysisCheckers)
  338. EndAnalysisChecker(G, BR, Eng);
  339. }
  340. namespace {
  341. struct CheckBeginFunctionContext {
  342. using CheckersTy = std::vector<CheckerManager::CheckBeginFunctionFunc>;
  343. const CheckersTy &Checkers;
  344. ExprEngine &Eng;
  345. const ProgramPoint &PP;
  346. CheckBeginFunctionContext(const CheckersTy &Checkers, ExprEngine &Eng,
  347. const ProgramPoint &PP)
  348. : Checkers(Checkers), Eng(Eng), PP(PP) {}
  349. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  350. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  351. void runChecker(CheckerManager::CheckBeginFunctionFunc checkFn,
  352. NodeBuilder &Bldr, ExplodedNode *Pred) {
  353. const ProgramPoint &L = PP.withTag(checkFn.Checker);
  354. CheckerContext C(Bldr, Eng, Pred, L);
  355. checkFn(C);
  356. }
  357. };
  358. } // namespace
  359. void CheckerManager::runCheckersForBeginFunction(ExplodedNodeSet &Dst,
  360. const BlockEdge &L,
  361. ExplodedNode *Pred,
  362. ExprEngine &Eng) {
  363. ExplodedNodeSet Src;
  364. Src.insert(Pred);
  365. CheckBeginFunctionContext C(BeginFunctionCheckers, Eng, L);
  366. expandGraphWithCheckers(C, Dst, Src);
  367. }
  368. /// Run checkers for end of path.
  369. // Note, We do not chain the checker output (like in expandGraphWithCheckers)
  370. // for this callback since end of path nodes are expected to be final.
  371. void CheckerManager::runCheckersForEndFunction(NodeBuilderContext &BC,
  372. ExplodedNodeSet &Dst,
  373. ExplodedNode *Pred,
  374. ExprEngine &Eng,
  375. const ReturnStmt *RS) {
  376. // We define the builder outside of the loop because if at least one checker
  377. // creates a successor for Pred, we do not need to generate an
  378. // autotransition for it.
  379. NodeBuilder Bldr(Pred, Dst, BC);
  380. for (const auto checkFn : EndFunctionCheckers) {
  381. const ProgramPoint &L =
  382. FunctionExitPoint(RS, Pred->getLocationContext(), checkFn.Checker);
  383. CheckerContext C(Bldr, Eng, Pred, L);
  384. checkFn(RS, C);
  385. }
  386. }
  387. namespace {
  388. struct CheckBranchConditionContext {
  389. using CheckersTy = std::vector<CheckerManager::CheckBranchConditionFunc>;
  390. const CheckersTy &Checkers;
  391. const Stmt *Condition;
  392. ExprEngine &Eng;
  393. CheckBranchConditionContext(const CheckersTy &checkers,
  394. const Stmt *Cond, ExprEngine &eng)
  395. : Checkers(checkers), Condition(Cond), Eng(eng) {}
  396. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  397. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  398. void runChecker(CheckerManager::CheckBranchConditionFunc checkFn,
  399. NodeBuilder &Bldr, ExplodedNode *Pred) {
  400. ProgramPoint L = PostCondition(Condition, Pred->getLocationContext(),
  401. checkFn.Checker);
  402. CheckerContext C(Bldr, Eng, Pred, L);
  403. checkFn(Condition, C);
  404. }
  405. };
  406. } // namespace
  407. /// Run checkers for branch condition.
  408. void CheckerManager::runCheckersForBranchCondition(const Stmt *Condition,
  409. ExplodedNodeSet &Dst,
  410. ExplodedNode *Pred,
  411. ExprEngine &Eng) {
  412. ExplodedNodeSet Src;
  413. Src.insert(Pred);
  414. CheckBranchConditionContext C(BranchConditionCheckers, Condition, Eng);
  415. expandGraphWithCheckers(C, Dst, Src);
  416. }
  417. namespace {
  418. struct CheckNewAllocatorContext {
  419. using CheckersTy = std::vector<CheckerManager::CheckNewAllocatorFunc>;
  420. const CheckersTy &Checkers;
  421. const CXXNewExpr *NE;
  422. SVal Target;
  423. bool WasInlined;
  424. ExprEngine &Eng;
  425. CheckNewAllocatorContext(const CheckersTy &Checkers, const CXXNewExpr *NE,
  426. SVal Target, bool WasInlined, ExprEngine &Eng)
  427. : Checkers(Checkers), NE(NE), Target(Target), WasInlined(WasInlined),
  428. Eng(Eng) {}
  429. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  430. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  431. void runChecker(CheckerManager::CheckNewAllocatorFunc checkFn,
  432. NodeBuilder &Bldr, ExplodedNode *Pred) {
  433. ProgramPoint L = PostAllocatorCall(NE, Pred->getLocationContext());
  434. CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
  435. checkFn(NE, Target, C);
  436. }
  437. };
  438. } // namespace
  439. void CheckerManager::runCheckersForNewAllocator(
  440. const CXXNewExpr *NE, SVal Target, ExplodedNodeSet &Dst, ExplodedNode *Pred,
  441. ExprEngine &Eng, bool WasInlined) {
  442. ExplodedNodeSet Src;
  443. Src.insert(Pred);
  444. CheckNewAllocatorContext C(NewAllocatorCheckers, NE, Target, WasInlined, Eng);
  445. expandGraphWithCheckers(C, Dst, Src);
  446. }
  447. /// Run checkers for live symbols.
  448. void CheckerManager::runCheckersForLiveSymbols(ProgramStateRef state,
  449. SymbolReaper &SymReaper) {
  450. for (const auto LiveSymbolsChecker : LiveSymbolsCheckers)
  451. LiveSymbolsChecker(state, SymReaper);
  452. }
  453. namespace {
  454. struct CheckDeadSymbolsContext {
  455. using CheckersTy = std::vector<CheckerManager::CheckDeadSymbolsFunc>;
  456. const CheckersTy &Checkers;
  457. SymbolReaper &SR;
  458. const Stmt *S;
  459. ExprEngine &Eng;
  460. ProgramPoint::Kind ProgarmPointKind;
  461. CheckDeadSymbolsContext(const CheckersTy &checkers, SymbolReaper &sr,
  462. const Stmt *s, ExprEngine &eng,
  463. ProgramPoint::Kind K)
  464. : Checkers(checkers), SR(sr), S(s), Eng(eng), ProgarmPointKind(K) {}
  465. CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
  466. CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
  467. void runChecker(CheckerManager::CheckDeadSymbolsFunc checkFn,
  468. NodeBuilder &Bldr, ExplodedNode *Pred) {
  469. const ProgramPoint &L = ProgramPoint::getProgramPoint(S, ProgarmPointKind,
  470. Pred->getLocationContext(), checkFn.Checker);
  471. CheckerContext C(Bldr, Eng, Pred, L);
  472. // Note, do not pass the statement to the checkers without letting them
  473. // differentiate if we ran remove dead bindings before or after the
  474. // statement.
  475. checkFn(SR, C);
  476. }
  477. };
  478. } // namespace
  479. /// Run checkers for dead symbols.
  480. void CheckerManager::runCheckersForDeadSymbols(ExplodedNodeSet &Dst,
  481. const ExplodedNodeSet &Src,
  482. SymbolReaper &SymReaper,
  483. const Stmt *S,
  484. ExprEngine &Eng,
  485. ProgramPoint::Kind K) {
  486. CheckDeadSymbolsContext C(DeadSymbolsCheckers, SymReaper, S, Eng, K);
  487. expandGraphWithCheckers(C, Dst, Src);
  488. }
  489. /// Run checkers for region changes.
  490. ProgramStateRef
  491. CheckerManager::runCheckersForRegionChanges(ProgramStateRef state,
  492. const InvalidatedSymbols *invalidated,
  493. ArrayRef<const MemRegion *> ExplicitRegions,
  494. ArrayRef<const MemRegion *> Regions,
  495. const LocationContext *LCtx,
  496. const CallEvent *Call) {
  497. for (const auto RegionChangesChecker : RegionChangesCheckers) {
  498. // If any checker declares the state infeasible (or if it starts that way),
  499. // bail out.
  500. if (!state)
  501. return nullptr;
  502. state = RegionChangesChecker(state, invalidated, ExplicitRegions, Regions,
  503. LCtx, Call);
  504. }
  505. return state;
  506. }
  507. /// Run checkers to process symbol escape event.
  508. ProgramStateRef
  509. CheckerManager::runCheckersForPointerEscape(ProgramStateRef State,
  510. const InvalidatedSymbols &Escaped,
  511. const CallEvent *Call,
  512. PointerEscapeKind Kind,
  513. RegionAndSymbolInvalidationTraits *ETraits) {
  514. assert((Call != nullptr ||
  515. (Kind != PSK_DirectEscapeOnCall &&
  516. Kind != PSK_IndirectEscapeOnCall)) &&
  517. "Call must not be NULL when escaping on call");
  518. for (const auto PointerEscapeChecker : PointerEscapeCheckers) {
  519. // If any checker declares the state infeasible (or if it starts that
  520. // way), bail out.
  521. if (!State)
  522. return nullptr;
  523. State = PointerEscapeChecker(State, Escaped, Call, Kind, ETraits);
  524. }
  525. return State;
  526. }
  527. /// Run checkers for handling assumptions on symbolic values.
  528. ProgramStateRef
  529. CheckerManager::runCheckersForEvalAssume(ProgramStateRef state,
  530. SVal Cond, bool Assumption) {
  531. for (const auto EvalAssumeChecker : EvalAssumeCheckers) {
  532. // If any checker declares the state infeasible (or if it starts that way),
  533. // bail out.
  534. if (!state)
  535. return nullptr;
  536. state = EvalAssumeChecker(state, Cond, Assumption);
  537. }
  538. return state;
  539. }
  540. /// Run checkers for evaluating a call.
  541. /// Only one checker will evaluate the call.
  542. void CheckerManager::runCheckersForEvalCall(ExplodedNodeSet &Dst,
  543. const ExplodedNodeSet &Src,
  544. const CallEvent &Call,
  545. ExprEngine &Eng) {
  546. for (const auto Pred : Src) {
  547. bool anyEvaluated = false;
  548. ExplodedNodeSet checkDst;
  549. NodeBuilder B(Pred, checkDst, Eng.getBuilderContext());
  550. // Check if any of the EvalCall callbacks can evaluate the call.
  551. for (const auto EvalCallChecker : EvalCallCheckers) {
  552. // TODO: Support the situation when the call doesn't correspond
  553. // to any Expr.
  554. ProgramPoint L = ProgramPoint::getProgramPoint(
  555. cast<CallExpr>(Call.getOriginExpr()),
  556. ProgramPoint::PostStmtKind,
  557. Pred->getLocationContext(),
  558. EvalCallChecker.Checker);
  559. bool evaluated = false;
  560. { // CheckerContext generates transitions(populates checkDest) on
  561. // destruction, so introduce the scope to make sure it gets properly
  562. // populated.
  563. CheckerContext C(B, Eng, Pred, L);
  564. evaluated = EvalCallChecker(Call, C);
  565. }
  566. assert(!(evaluated && anyEvaluated)
  567. && "There are more than one checkers evaluating the call");
  568. if (evaluated) {
  569. anyEvaluated = true;
  570. Dst.insert(checkDst);
  571. #ifdef NDEBUG
  572. break; // on release don't check that no other checker also evals.
  573. #endif
  574. }
  575. }
  576. // If none of the checkers evaluated the call, ask ExprEngine to handle it.
  577. if (!anyEvaluated) {
  578. NodeBuilder B(Pred, Dst, Eng.getBuilderContext());
  579. Eng.defaultEvalCall(B, Pred, Call);
  580. }
  581. }
  582. }
  583. /// Run checkers for the entire Translation Unit.
  584. void CheckerManager::runCheckersOnEndOfTranslationUnit(
  585. const TranslationUnitDecl *TU,
  586. AnalysisManager &mgr,
  587. BugReporter &BR) {
  588. for (const auto EndOfTranslationUnitChecker : EndOfTranslationUnitCheckers)
  589. EndOfTranslationUnitChecker(TU, mgr, BR);
  590. }
  591. void CheckerManager::runCheckersForPrintStateJson(raw_ostream &Out,
  592. ProgramStateRef State,
  593. const char *NL,
  594. unsigned int Space,
  595. bool IsDot) const {
  596. Indent(Out, Space, IsDot) << "\"checker_messages\": ";
  597. // Create a temporary stream to see whether we have any message.
  598. SmallString<1024> TempBuf;
  599. llvm::raw_svector_ostream TempOut(TempBuf);
  600. unsigned int InnerSpace = Space + 2;
  601. // Create the new-line in JSON with enough space.
  602. SmallString<128> NewLine;
  603. llvm::raw_svector_ostream NLOut(NewLine);
  604. NLOut << "\", " << NL; // Inject the ending and a new line
  605. Indent(NLOut, InnerSpace, IsDot) << "\""; // then begin the next message.
  606. ++Space;
  607. bool HasMessage = false;
  608. // Store the last CheckerTag.
  609. const void *LastCT = nullptr;
  610. for (const auto &CT : CheckerTags) {
  611. // See whether the current checker has a message.
  612. CT.second->printState(TempOut, State, /*NL=*/NewLine.c_str(), /*Sep=*/"");
  613. if (TempBuf.empty())
  614. continue;
  615. if (!HasMessage) {
  616. Out << '[' << NL;
  617. HasMessage = true;
  618. }
  619. LastCT = &CT;
  620. TempBuf.clear();
  621. }
  622. for (const auto &CT : CheckerTags) {
  623. // See whether the current checker has a message.
  624. CT.second->printState(TempOut, State, /*NL=*/NewLine.c_str(), /*Sep=*/"");
  625. if (TempBuf.empty())
  626. continue;
  627. Indent(Out, Space, IsDot)
  628. << "{ \"checker\": \"" << CT.second->getCheckerName().getName()
  629. << "\", \"messages\": [" << NL;
  630. Indent(Out, InnerSpace, IsDot)
  631. << '\"' << TempBuf.str().trim() << '\"' << NL;
  632. Indent(Out, Space, IsDot) << "]}";
  633. if (&CT != LastCT)
  634. Out << ',';
  635. Out << NL;
  636. TempBuf.clear();
  637. }
  638. // It is the last element of the 'program_state' so do not add a comma.
  639. if (HasMessage)
  640. Indent(Out, --Space, IsDot) << "]";
  641. else
  642. Out << "null";
  643. Out << NL;
  644. }
  645. //===----------------------------------------------------------------------===//
  646. // Internal registration functions for AST traversing.
  647. //===----------------------------------------------------------------------===//
  648. void CheckerManager::_registerForDecl(CheckDeclFunc checkfn,
  649. HandlesDeclFunc isForDeclFn) {
  650. DeclCheckerInfo info = { checkfn, isForDeclFn };
  651. DeclCheckers.push_back(info);
  652. }
  653. void CheckerManager::_registerForBody(CheckDeclFunc checkfn) {
  654. BodyCheckers.push_back(checkfn);
  655. }
  656. //===----------------------------------------------------------------------===//
  657. // Internal registration functions for path-sensitive checking.
  658. //===----------------------------------------------------------------------===//
  659. void CheckerManager::_registerForPreStmt(CheckStmtFunc checkfn,
  660. HandlesStmtFunc isForStmtFn) {
  661. StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/true };
  662. StmtCheckers.push_back(info);
  663. }
  664. void CheckerManager::_registerForPostStmt(CheckStmtFunc checkfn,
  665. HandlesStmtFunc isForStmtFn) {
  666. StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/false };
  667. StmtCheckers.push_back(info);
  668. }
  669. void CheckerManager::_registerForPreObjCMessage(CheckObjCMessageFunc checkfn) {
  670. PreObjCMessageCheckers.push_back(checkfn);
  671. }
  672. void CheckerManager::_registerForObjCMessageNil(CheckObjCMessageFunc checkfn) {
  673. ObjCMessageNilCheckers.push_back(checkfn);
  674. }
  675. void CheckerManager::_registerForPostObjCMessage(CheckObjCMessageFunc checkfn) {
  676. PostObjCMessageCheckers.push_back(checkfn);
  677. }
  678. void CheckerManager::_registerForPreCall(CheckCallFunc checkfn) {
  679. PreCallCheckers.push_back(checkfn);
  680. }
  681. void CheckerManager::_registerForPostCall(CheckCallFunc checkfn) {
  682. PostCallCheckers.push_back(checkfn);
  683. }
  684. void CheckerManager::_registerForLocation(CheckLocationFunc checkfn) {
  685. LocationCheckers.push_back(checkfn);
  686. }
  687. void CheckerManager::_registerForBind(CheckBindFunc checkfn) {
  688. BindCheckers.push_back(checkfn);
  689. }
  690. void CheckerManager::_registerForEndAnalysis(CheckEndAnalysisFunc checkfn) {
  691. EndAnalysisCheckers.push_back(checkfn);
  692. }
  693. void CheckerManager::_registerForBeginFunction(CheckBeginFunctionFunc checkfn) {
  694. BeginFunctionCheckers.push_back(checkfn);
  695. }
  696. void CheckerManager::_registerForEndFunction(CheckEndFunctionFunc checkfn) {
  697. EndFunctionCheckers.push_back(checkfn);
  698. }
  699. void CheckerManager::_registerForBranchCondition(
  700. CheckBranchConditionFunc checkfn) {
  701. BranchConditionCheckers.push_back(checkfn);
  702. }
  703. void CheckerManager::_registerForNewAllocator(CheckNewAllocatorFunc checkfn) {
  704. NewAllocatorCheckers.push_back(checkfn);
  705. }
  706. void CheckerManager::_registerForLiveSymbols(CheckLiveSymbolsFunc checkfn) {
  707. LiveSymbolsCheckers.push_back(checkfn);
  708. }
  709. void CheckerManager::_registerForDeadSymbols(CheckDeadSymbolsFunc checkfn) {
  710. DeadSymbolsCheckers.push_back(checkfn);
  711. }
  712. void CheckerManager::_registerForRegionChanges(CheckRegionChangesFunc checkfn) {
  713. RegionChangesCheckers.push_back(checkfn);
  714. }
  715. void CheckerManager::_registerForPointerEscape(CheckPointerEscapeFunc checkfn){
  716. PointerEscapeCheckers.push_back(checkfn);
  717. }
  718. void CheckerManager::_registerForConstPointerEscape(
  719. CheckPointerEscapeFunc checkfn) {
  720. PointerEscapeCheckers.push_back(checkfn);
  721. }
  722. void CheckerManager::_registerForEvalAssume(EvalAssumeFunc checkfn) {
  723. EvalAssumeCheckers.push_back(checkfn);
  724. }
  725. void CheckerManager::_registerForEvalCall(EvalCallFunc checkfn) {
  726. EvalCallCheckers.push_back(checkfn);
  727. }
  728. void CheckerManager::_registerForEndOfTranslationUnit(
  729. CheckEndOfTranslationUnit checkfn) {
  730. EndOfTranslationUnitCheckers.push_back(checkfn);
  731. }
  732. //===----------------------------------------------------------------------===//
  733. // Implementation details.
  734. //===----------------------------------------------------------------------===//
  735. const CheckerManager::CachedStmtCheckers &
  736. CheckerManager::getCachedStmtCheckersFor(const Stmt *S, bool isPreVisit) {
  737. assert(S);
  738. unsigned Key = (S->getStmtClass() << 1) | unsigned(isPreVisit);
  739. CachedStmtCheckersMapTy::iterator CCI = CachedStmtCheckersMap.find(Key);
  740. if (CCI != CachedStmtCheckersMap.end())
  741. return CCI->second;
  742. // Find the checkers that should run for this Stmt and cache them.
  743. CachedStmtCheckers &Checkers = CachedStmtCheckersMap[Key];
  744. for (const auto &Info : StmtCheckers)
  745. if (Info.IsPreVisit == isPreVisit && Info.IsForStmtFn(S))
  746. Checkers.push_back(Info.CheckFn);
  747. return Checkers;
  748. }
  749. CheckerManager::~CheckerManager() {
  750. for (const auto CheckerDtor : CheckerDtors)
  751. CheckerDtor();
  752. }