[clang][modules] Don't prevent translation of FW_Private includes when explicitly...
[llvm-project.git] / clang / lib / StaticAnalyzer / Checkers / NonNullParamChecker.cpp
blob44b69ef31911c3d12ab3657c2f9bafb14037e1cd
1 //===--- NonNullParamChecker.cpp - Undefined arguments checker -*- C++ -*--===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // This defines NonNullParamChecker, which checks for arguments expected not to
10 // be null due to:
11 // - the corresponding parameters being declared to have nonnull attribute
12 // - the corresponding parameters being references; since the call would form
13 // a reference to a null pointer
15 //===----------------------------------------------------------------------===//
17 #include "clang/AST/Attr.h"
18 #include "clang/Analysis/AnyCall.h"
19 #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
20 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
21 #include "clang/StaticAnalyzer/Core/Checker.h"
22 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
23 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
24 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
25 #include "llvm/ADT/StringExtras.h"
27 using namespace clang;
28 using namespace ento;
30 namespace {
31 class NonNullParamChecker
32 : public Checker<check::PreCall, check::BeginFunction,
33 EventDispatcher<ImplicitNullDerefEvent>> {
34 mutable std::unique_ptr<BugType> BTAttrNonNull;
35 mutable std::unique_ptr<BugType> BTNullRefArg;
37 public:
38 void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
39 void checkBeginFunction(CheckerContext &C) const;
41 std::unique_ptr<PathSensitiveBugReport>
42 genReportNullAttrNonNull(const ExplodedNode *ErrorN, const Expr *ArgE,
43 unsigned IdxOfArg) const;
44 std::unique_ptr<PathSensitiveBugReport>
45 genReportReferenceToNullPointer(const ExplodedNode *ErrorN,
46 const Expr *ArgE) const;
49 template <class CallType>
50 void setBitsAccordingToFunctionAttributes(const CallType &Call,
51 llvm::SmallBitVector &AttrNonNull) {
52 const Decl *FD = Call.getDecl();
54 for (const auto *NonNull : FD->specific_attrs<NonNullAttr>()) {
55 if (!NonNull->args_size()) {
56 // Lack of attribute parameters means that all of the parameters are
57 // implicitly marked as non-null.
58 AttrNonNull.set();
59 break;
62 for (const ParamIdx &Idx : NonNull->args()) {
63 // 'nonnull' attribute's parameters are 1-based and should be adjusted to
64 // match actual AST parameter/argument indices.
65 unsigned IdxAST = Idx.getASTIndex();
66 if (IdxAST >= AttrNonNull.size())
67 continue;
68 AttrNonNull.set(IdxAST);
73 template <class CallType>
74 void setBitsAccordingToParameterAttributes(const CallType &Call,
75 llvm::SmallBitVector &AttrNonNull) {
76 for (const ParmVarDecl *Parameter : Call.parameters()) {
77 unsigned ParameterIndex = Parameter->getFunctionScopeIndex();
78 if (ParameterIndex == AttrNonNull.size())
79 break;
81 if (Parameter->hasAttr<NonNullAttr>())
82 AttrNonNull.set(ParameterIndex);
86 template <class CallType>
87 llvm::SmallBitVector getNonNullAttrsImpl(const CallType &Call,
88 unsigned ExpectedSize) {
89 llvm::SmallBitVector AttrNonNull(ExpectedSize);
91 setBitsAccordingToFunctionAttributes(Call, AttrNonNull);
92 setBitsAccordingToParameterAttributes(Call, AttrNonNull);
94 return AttrNonNull;
97 /// \return Bitvector marking non-null attributes.
98 llvm::SmallBitVector getNonNullAttrs(const CallEvent &Call) {
99 return getNonNullAttrsImpl(Call, Call.getNumArgs());
102 /// \return Bitvector marking non-null attributes.
103 llvm::SmallBitVector getNonNullAttrs(const AnyCall &Call) {
104 return getNonNullAttrsImpl(Call, Call.param_size());
106 } // end anonymous namespace
108 void NonNullParamChecker::checkPreCall(const CallEvent &Call,
109 CheckerContext &C) const {
110 if (!Call.getDecl())
111 return;
113 llvm::SmallBitVector AttrNonNull = getNonNullAttrs(Call);
114 unsigned NumArgs = Call.getNumArgs();
116 ProgramStateRef state = C.getState();
117 ArrayRef<ParmVarDecl *> parms = Call.parameters();
119 for (unsigned idx = 0; idx < NumArgs; ++idx) {
120 // For vararg functions, a corresponding parameter decl may not exist.
121 bool HasParam = idx < parms.size();
123 // Check if the parameter is a reference. We want to report when reference
124 // to a null pointer is passed as a parameter.
125 bool HasRefTypeParam =
126 HasParam ? parms[idx]->getType()->isReferenceType() : false;
127 bool ExpectedToBeNonNull = AttrNonNull.test(idx);
129 if (!ExpectedToBeNonNull && !HasRefTypeParam)
130 continue;
132 // If the value is unknown or undefined, we can't perform this check.
133 const Expr *ArgE = Call.getArgExpr(idx);
134 SVal V = Call.getArgSVal(idx);
135 auto DV = V.getAs<DefinedSVal>();
136 if (!DV)
137 continue;
139 assert(!HasRefTypeParam || isa<Loc>(*DV));
141 // Process the case when the argument is not a location.
142 if (ExpectedToBeNonNull && !isa<Loc>(*DV)) {
143 // If the argument is a union type, we want to handle a potential
144 // transparent_union GCC extension.
145 if (!ArgE)
146 continue;
148 QualType T = ArgE->getType();
149 const RecordType *UT = T->getAsUnionType();
150 if (!UT || !UT->getDecl()->hasAttr<TransparentUnionAttr>())
151 continue;
153 auto CSV = DV->getAs<nonloc::CompoundVal>();
155 // FIXME: Handle LazyCompoundVals?
156 if (!CSV)
157 continue;
159 V = *(CSV->begin());
160 DV = V.getAs<DefinedSVal>();
161 assert(++CSV->begin() == CSV->end());
162 // FIXME: Handle (some_union){ some_other_union_val }, which turns into
163 // a LazyCompoundVal inside a CompoundVal.
164 if (!isa<Loc>(V))
165 continue;
167 // Retrieve the corresponding expression.
168 if (const auto *CE = dyn_cast<CompoundLiteralExpr>(ArgE))
169 if (const auto *IE = dyn_cast<InitListExpr>(CE->getInitializer()))
170 ArgE = dyn_cast<Expr>(*(IE->begin()));
173 ConstraintManager &CM = C.getConstraintManager();
174 ProgramStateRef stateNotNull, stateNull;
175 std::tie(stateNotNull, stateNull) = CM.assumeDual(state, *DV);
177 // Generate an error node. Check for a null node in case
178 // we cache out.
179 if (stateNull && !stateNotNull) {
180 if (ExplodedNode *errorNode = C.generateErrorNode(stateNull)) {
182 std::unique_ptr<BugReport> R;
183 if (ExpectedToBeNonNull)
184 R = genReportNullAttrNonNull(errorNode, ArgE, idx + 1);
185 else if (HasRefTypeParam)
186 R = genReportReferenceToNullPointer(errorNode, ArgE);
188 // Highlight the range of the argument that was null.
189 R->addRange(Call.getArgSourceRange(idx));
191 // Emit the bug report.
192 C.emitReport(std::move(R));
195 // Always return. Either we cached out or we just emitted an error.
196 return;
199 if (stateNull) {
200 if (ExplodedNode *N = C.generateSink(stateNull, C.getPredecessor())) {
201 ImplicitNullDerefEvent event = {
202 V, false, N, &C.getBugReporter(),
203 /*IsDirectDereference=*/HasRefTypeParam};
204 dispatchEvent(event);
208 // If a pointer value passed the check we should assume that it is
209 // indeed not null from this point forward.
210 state = stateNotNull;
213 // If we reach here all of the arguments passed the nonnull check.
214 // If 'state' has been updated generated a new node.
215 C.addTransition(state);
218 /// We want to trust developer annotations and consider all 'nonnull' parameters
219 /// as non-null indeed. Each marked parameter will get a corresponding
220 /// constraint.
222 /// This approach will not only help us to get rid of some false positives, but
223 /// remove duplicates and shorten warning traces as well.
225 /// \code
226 /// void foo(int *x) [[gnu::nonnull]] {
227 /// // . . .
228 /// *x = 42; // we don't want to consider this as an error...
229 /// // . . .
230 /// }
232 /// foo(nullptr); // ...and report here instead
233 /// \endcode
234 void NonNullParamChecker::checkBeginFunction(CheckerContext &Context) const {
235 // Planned assumption makes sense only for top-level functions.
236 // Inlined functions will get similar constraints as part of 'checkPreCall'.
237 if (!Context.inTopFrame())
238 return;
240 const LocationContext *LocContext = Context.getLocationContext();
242 const Decl *FD = LocContext->getDecl();
243 // AnyCall helps us here to avoid checking for FunctionDecl and ObjCMethodDecl
244 // separately and aggregates interfaces of these classes.
245 auto AbstractCall = AnyCall::forDecl(FD);
246 if (!AbstractCall)
247 return;
249 ProgramStateRef State = Context.getState();
250 llvm::SmallBitVector ParameterNonNullMarks = getNonNullAttrs(*AbstractCall);
252 for (const ParmVarDecl *Parameter : AbstractCall->parameters()) {
253 // 1. Check parameter if it is annotated as non-null
254 if (!ParameterNonNullMarks.test(Parameter->getFunctionScopeIndex()))
255 continue;
257 // 2. Check that parameter is a pointer.
258 // Nonnull attribute can be applied to non-pointers (by default
259 // __attribute__(nonnull) implies "all parameters").
260 if (!Parameter->getType()->isPointerType())
261 continue;
263 Loc ParameterLoc = State->getLValue(Parameter, LocContext);
264 // We never consider top-level function parameters undefined.
265 auto StoredVal =
266 State->getSVal(ParameterLoc).castAs<DefinedOrUnknownSVal>();
268 // 3. Assume that it is indeed non-null
269 if (ProgramStateRef NewState = State->assume(StoredVal, true)) {
270 State = NewState;
274 Context.addTransition(State);
277 std::unique_ptr<PathSensitiveBugReport>
278 NonNullParamChecker::genReportNullAttrNonNull(const ExplodedNode *ErrorNode,
279 const Expr *ArgE,
280 unsigned IdxOfArg) const {
281 // Lazily allocate the BugType object if it hasn't already been
282 // created. Ownership is transferred to the BugReporter object once
283 // the BugReport is passed to 'EmitWarning'.
284 if (!BTAttrNonNull)
285 BTAttrNonNull.reset(new BugType(
286 this, "Argument with 'nonnull' attribute passed null", "API"));
288 llvm::SmallString<256> SBuf;
289 llvm::raw_svector_ostream OS(SBuf);
290 OS << "Null pointer passed to "
291 << IdxOfArg << llvm::getOrdinalSuffix(IdxOfArg)
292 << " parameter expecting 'nonnull'";
294 auto R =
295 std::make_unique<PathSensitiveBugReport>(*BTAttrNonNull, SBuf, ErrorNode);
296 if (ArgE)
297 bugreporter::trackExpressionValue(ErrorNode, ArgE, *R);
299 return R;
302 std::unique_ptr<PathSensitiveBugReport>
303 NonNullParamChecker::genReportReferenceToNullPointer(
304 const ExplodedNode *ErrorNode, const Expr *ArgE) const {
305 if (!BTNullRefArg)
306 BTNullRefArg.reset(new BugType(this, "Dereference of null pointer"));
308 auto R = std::make_unique<PathSensitiveBugReport>(
309 *BTNullRefArg, "Forming reference to null pointer", ErrorNode);
310 if (ArgE) {
311 const Expr *ArgEDeref = bugreporter::getDerefExpr(ArgE);
312 if (!ArgEDeref)
313 ArgEDeref = ArgE;
314 bugreporter::trackExpressionValue(ErrorNode, ArgEDeref, *R);
316 return R;
320 void ento::registerNonNullParamChecker(CheckerManager &mgr) {
321 mgr.registerChecker<NonNullParamChecker>();
324 bool ento::shouldRegisterNonNullParamChecker(const CheckerManager &mgr) {
325 return true;