NonNullParamChecker.cpp revision 280031
1//===--- NonNullParamChecker.cpp - Undefined arguments checker -*- C++ -*--===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This defines NonNullParamChecker, which checks for arguments expected not to 11// be null due to: 12// - the corresponding parameters being declared to have nonnull attribute 13// - the corresponding parameters being references; since the call would form 14// a reference to a null pointer 15// 16//===----------------------------------------------------------------------===// 17 18#include "ClangSACheckers.h" 19#include "clang/AST/Attr.h" 20#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" 21#include "clang/StaticAnalyzer/Core/Checker.h" 22#include "clang/StaticAnalyzer/Core/CheckerManager.h" 23#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" 24#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" 25 26using namespace clang; 27using namespace ento; 28 29namespace { 30class NonNullParamChecker 31 : public Checker< check::PreCall > { 32 mutable std::unique_ptr<BugType> BTAttrNonNull; 33 mutable std::unique_ptr<BugType> BTNullRefArg; 34 35public: 36 37 void checkPreCall(const CallEvent &Call, CheckerContext &C) const; 38 39 BugReport *genReportNullAttrNonNull(const ExplodedNode *ErrorN, 40 const Expr *ArgE) const; 41 BugReport *genReportReferenceToNullPointer(const ExplodedNode *ErrorN, 42 const Expr *ArgE) const; 43}; 44} // end anonymous namespace 45 46void NonNullParamChecker::checkPreCall(const CallEvent &Call, 47 CheckerContext &C) const { 48 const Decl *FD = Call.getDecl(); 49 if (!FD) 50 return; 51 52 // Merge all non-null attributes 53 unsigned NumArgs = Call.getNumArgs(); 54 llvm::SmallBitVector AttrNonNull(NumArgs); 55 for (const auto *NonNull : FD->specific_attrs<NonNullAttr>()) { 56 if (!NonNull->args_size()) { 57 AttrNonNull.set(0, NumArgs); 58 break; 59 } 60 for (unsigned Val : NonNull->args()) { 61 if (Val >= NumArgs) 62 continue; 63 AttrNonNull.set(Val); 64 } 65 } 66 67 ProgramStateRef state = C.getState(); 68 69 CallEvent::param_type_iterator TyI = Call.param_type_begin(), 70 TyE = Call.param_type_end(); 71 72 for (unsigned idx = 0; idx < NumArgs; ++idx) { 73 74 // Check if the parameter is a reference. We want to report when reference 75 // to a null pointer is passed as a paramter. 76 bool haveRefTypeParam = false; 77 if (TyI != TyE) { 78 haveRefTypeParam = (*TyI)->isReferenceType(); 79 TyI++; 80 } 81 82 bool haveAttrNonNull = AttrNonNull[idx]; 83 if (!haveAttrNonNull) { 84 // Check if the parameter is also marked 'nonnull'. 85 ArrayRef<ParmVarDecl*> parms = Call.parameters(); 86 if (idx < parms.size()) 87 haveAttrNonNull = parms[idx]->hasAttr<NonNullAttr>(); 88 } 89 90 if (!haveRefTypeParam && !haveAttrNonNull) 91 continue; 92 93 // If the value is unknown or undefined, we can't perform this check. 94 const Expr *ArgE = Call.getArgExpr(idx); 95 SVal V = Call.getArgSVal(idx); 96 Optional<DefinedSVal> DV = V.getAs<DefinedSVal>(); 97 if (!DV) 98 continue; 99 100 // Process the case when the argument is not a location. 101 assert(!haveRefTypeParam || DV->getAs<Loc>()); 102 103 if (haveAttrNonNull && !DV->getAs<Loc>()) { 104 // If the argument is a union type, we want to handle a potential 105 // transparent_union GCC extension. 106 if (!ArgE) 107 continue; 108 109 QualType T = ArgE->getType(); 110 const RecordType *UT = T->getAsUnionType(); 111 if (!UT || !UT->getDecl()->hasAttr<TransparentUnionAttr>()) 112 continue; 113 114 if (Optional<nonloc::CompoundVal> CSV = 115 DV->getAs<nonloc::CompoundVal>()) { 116 nonloc::CompoundVal::iterator CSV_I = CSV->begin(); 117 assert(CSV_I != CSV->end()); 118 V = *CSV_I; 119 DV = V.getAs<DefinedSVal>(); 120 assert(++CSV_I == CSV->end()); 121 // FIXME: Handle (some_union){ some_other_union_val }, which turns into 122 // a LazyCompoundVal inside a CompoundVal. 123 if (!V.getAs<Loc>()) 124 continue; 125 // Retrieve the corresponding expression. 126 if (const CompoundLiteralExpr *CE = dyn_cast<CompoundLiteralExpr>(ArgE)) 127 if (const InitListExpr *IE = 128 dyn_cast<InitListExpr>(CE->getInitializer())) 129 ArgE = dyn_cast<Expr>(*(IE->begin())); 130 131 } else { 132 // FIXME: Handle LazyCompoundVals? 133 continue; 134 } 135 } 136 137 ConstraintManager &CM = C.getConstraintManager(); 138 ProgramStateRef stateNotNull, stateNull; 139 std::tie(stateNotNull, stateNull) = CM.assumeDual(state, *DV); 140 141 if (stateNull && !stateNotNull) { 142 // Generate an error node. Check for a null node in case 143 // we cache out. 144 if (ExplodedNode *errorNode = C.generateSink(stateNull)) { 145 146 BugReport *R = nullptr; 147 if (haveAttrNonNull) 148 R = genReportNullAttrNonNull(errorNode, ArgE); 149 else if (haveRefTypeParam) 150 R = genReportReferenceToNullPointer(errorNode, ArgE); 151 152 // Highlight the range of the argument that was null. 153 R->addRange(Call.getArgSourceRange(idx)); 154 155 // Emit the bug report. 156 C.emitReport(R); 157 } 158 159 // Always return. Either we cached out or we just emitted an error. 160 return; 161 } 162 163 // If a pointer value passed the check we should assume that it is 164 // indeed not null from this point forward. 165 assert(stateNotNull); 166 state = stateNotNull; 167 } 168 169 // If we reach here all of the arguments passed the nonnull check. 170 // If 'state' has been updated generated a new node. 171 C.addTransition(state); 172} 173 174BugReport *NonNullParamChecker::genReportNullAttrNonNull( 175 const ExplodedNode *ErrorNode, const Expr *ArgE) const { 176 // Lazily allocate the BugType object if it hasn't already been 177 // created. Ownership is transferred to the BugReporter object once 178 // the BugReport is passed to 'EmitWarning'. 179 if (!BTAttrNonNull) 180 BTAttrNonNull.reset(new BugType( 181 this, "Argument with 'nonnull' attribute passed null", "API")); 182 183 BugReport *R = new BugReport(*BTAttrNonNull, 184 "Null pointer passed as an argument to a 'nonnull' parameter", 185 ErrorNode); 186 if (ArgE) 187 bugreporter::trackNullOrUndefValue(ErrorNode, ArgE, *R); 188 189 return R; 190} 191 192BugReport *NonNullParamChecker::genReportReferenceToNullPointer( 193 const ExplodedNode *ErrorNode, const Expr *ArgE) const { 194 if (!BTNullRefArg) 195 BTNullRefArg.reset(new BuiltinBug(this, "Dereference of null pointer")); 196 197 BugReport *R = new BugReport(*BTNullRefArg, 198 "Forming reference to null pointer", 199 ErrorNode); 200 if (ArgE) { 201 const Expr *ArgEDeref = bugreporter::getDerefExpr(ArgE); 202 if (!ArgEDeref) 203 ArgEDeref = ArgE; 204 bugreporter::trackNullOrUndefValue(ErrorNode, 205 ArgEDeref, 206 *R); 207 } 208 return R; 209 210} 211 212void ento::registerNonNullParamChecker(CheckerManager &mgr) { 213 mgr.registerChecker<NonNullParamChecker>(); 214} 215