1 //==-- RetainCountChecker.cpp - Checks for leaks and other issues -*- C++ -*--// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is distributed under the University of Illinois Open Source 6 // License. See LICENSE.TXT for details. 7 // 8 //===----------------------------------------------------------------------===// 9 // 10 // This file defines the methods for RetainCountChecker, which implements 11 // a reference count checker for Core Foundation and Cocoa on (Mac OS X). 12 // 13 //===----------------------------------------------------------------------===// 14 15 #include "RetainCountChecker.h" 16 17 using namespace clang; 18 using namespace ento; 19 using namespace retaincountchecker; 20 using llvm::StrInStrNoCase; 21 22 REGISTER_MAP_WITH_PROGRAMSTATE(RefBindings, SymbolRef, RefVal) 23 24 namespace clang { 25 namespace ento { 26 namespace retaincountchecker { 27 28 const RefVal *getRefBinding(ProgramStateRef State, SymbolRef Sym) { 29 return State->get<RefBindings>(Sym); 30 } 31 32 ProgramStateRef setRefBinding(ProgramStateRef State, SymbolRef Sym, 33 RefVal Val) { 34 return State->set<RefBindings>(Sym, Val); 35 } 36 37 ProgramStateRef removeRefBinding(ProgramStateRef State, SymbolRef Sym) { 38 return State->remove<RefBindings>(Sym); 39 } 40 41 } // end namespace retaincountchecker 42 } // end namespace ento 43 } // end namespace clang 44 45 void RefVal::print(raw_ostream &Out) const { 46 if (!T.isNull()) 47 Out << "Tracked " << T.getAsString() << '/'; 48 49 switch (getKind()) { 50 default: llvm_unreachable("Invalid RefVal kind"); 51 case Owned: { 52 Out << "Owned"; 53 unsigned cnt = getCount(); 54 if (cnt) Out << " (+ " << cnt << ")"; 55 break; 56 } 57 58 case NotOwned: { 59 Out << "NotOwned"; 60 unsigned cnt = getCount(); 61 if (cnt) Out << " (+ " << cnt << ")"; 62 break; 63 } 64 65 case ReturnedOwned: { 66 Out << "ReturnedOwned"; 67 unsigned cnt = getCount(); 68 if (cnt) Out << " (+ " << cnt << ")"; 69 break; 70 } 71 72 case ReturnedNotOwned: { 73 Out << "ReturnedNotOwned"; 74 unsigned cnt = getCount(); 75 if (cnt) Out << " (+ " << cnt << ")"; 76 break; 77 } 78 79 case Released: 80 Out << "Released"; 81 break; 82 83 case ErrorDeallocNotOwned: 84 Out << "-dealloc (not-owned)"; 85 break; 86 87 case ErrorLeak: 88 Out << "Leaked"; 89 break; 90 91 case ErrorLeakReturned: 92 Out << "Leaked (Bad naming)"; 93 break; 94 95 case ErrorUseAfterRelease: 96 Out << "Use-After-Release [ERROR]"; 97 break; 98 99 case ErrorReleaseNotOwned: 100 Out << "Release of Not-Owned [ERROR]"; 101 break; 102 103 case RefVal::ErrorOverAutorelease: 104 Out << "Over-autoreleased"; 105 break; 106 107 case RefVal::ErrorReturnedNotOwned: 108 Out << "Non-owned object returned instead of owned"; 109 break; 110 } 111 112 switch (getIvarAccessHistory()) { 113 case IvarAccessHistory::None: 114 break; 115 case IvarAccessHistory::AccessedDirectly: 116 Out << " [direct ivar access]"; 117 break; 118 case IvarAccessHistory::ReleasedAfterDirectAccess: 119 Out << " [released after direct ivar access]"; 120 } 121 122 if (ACnt) { 123 Out << " [autorelease -" << ACnt << ']'; 124 } 125 } 126 127 namespace { 128 class StopTrackingCallback final : public SymbolVisitor { 129 ProgramStateRef state; 130 public: 131 StopTrackingCallback(ProgramStateRef st) : state(std::move(st)) {} 132 ProgramStateRef getState() const { return state; } 133 134 bool VisitSymbol(SymbolRef sym) override { 135 state = state->remove<RefBindings>(sym); 136 return true; 137 } 138 }; 139 } // end anonymous namespace 140 141 //===----------------------------------------------------------------------===// 142 // Handle statements that may have an effect on refcounts. 143 //===----------------------------------------------------------------------===// 144 145 void RetainCountChecker::checkPostStmt(const BlockExpr *BE, 146 CheckerContext &C) const { 147 148 // Scan the BlockDecRefExprs for any object the retain count checker 149 // may be tracking. 150 if (!BE->getBlockDecl()->hasCaptures()) 151 return; 152 153 ProgramStateRef state = C.getState(); 154 auto *R = cast<BlockDataRegion>(C.getSVal(BE).getAsRegion()); 155 156 BlockDataRegion::referenced_vars_iterator I = R->referenced_vars_begin(), 157 E = R->referenced_vars_end(); 158 159 if (I == E) 160 return; 161 162 // FIXME: For now we invalidate the tracking of all symbols passed to blocks 163 // via captured variables, even though captured variables result in a copy 164 // and in implicit increment/decrement of a retain count. 165 SmallVector<const MemRegion*, 10> Regions; 166 const LocationContext *LC = C.getLocationContext(); 167 MemRegionManager &MemMgr = C.getSValBuilder().getRegionManager(); 168 169 for ( ; I != E; ++I) { 170 const VarRegion *VR = I.getCapturedRegion(); 171 if (VR->getSuperRegion() == R) { 172 VR = MemMgr.getVarRegion(VR->getDecl(), LC); 173 } 174 Regions.push_back(VR); 175 } 176 177 state = 178 state->scanReachableSymbols<StopTrackingCallback>(Regions.data(), 179 Regions.data() + Regions.size()).getState(); 180 C.addTransition(state); 181 } 182 183 void RetainCountChecker::checkPostStmt(const CastExpr *CE, 184 CheckerContext &C) const { 185 const ObjCBridgedCastExpr *BE = dyn_cast<ObjCBridgedCastExpr>(CE); 186 if (!BE) 187 return; 188 189 ArgEffect AE = IncRef; 190 191 switch (BE->getBridgeKind()) { 192 case OBC_Bridge: 193 // Do nothing. 194 return; 195 case OBC_BridgeRetained: 196 AE = IncRef; 197 break; 198 case OBC_BridgeTransfer: 199 AE = DecRefBridgedTransferred; 200 break; 201 } 202 203 ProgramStateRef state = C.getState(); 204 SymbolRef Sym = C.getSVal(CE).getAsLocSymbol(); 205 if (!Sym) 206 return; 207 const RefVal* T = getRefBinding(state, Sym); 208 if (!T) 209 return; 210 211 RefVal::Kind hasErr = (RefVal::Kind) 0; 212 state = updateSymbol(state, Sym, *T, AE, hasErr, C); 213 214 if (hasErr) { 215 // FIXME: If we get an error during a bridge cast, should we report it? 216 return; 217 } 218 219 C.addTransition(state); 220 } 221 222 void RetainCountChecker::processObjCLiterals(CheckerContext &C, 223 const Expr *Ex) const { 224 ProgramStateRef state = C.getState(); 225 const ExplodedNode *pred = C.getPredecessor(); 226 for (const Stmt *Child : Ex->children()) { 227 SVal V = pred->getSVal(Child); 228 if (SymbolRef sym = V.getAsSymbol()) 229 if (const RefVal* T = getRefBinding(state, sym)) { 230 RefVal::Kind hasErr = (RefVal::Kind) 0; 231 state = updateSymbol(state, sym, *T, MayEscape, hasErr, C); 232 if (hasErr) { 233 processNonLeakError(state, Child->getSourceRange(), hasErr, sym, C); 234 return; 235 } 236 } 237 } 238 239 // Return the object as autoreleased. 240 // RetEffect RE = RetEffect::MakeNotOwned(RetEffect::ObjC); 241 if (SymbolRef sym = 242 state->getSVal(Ex, pred->getLocationContext()).getAsSymbol()) { 243 QualType ResultTy = Ex->getType(); 244 state = setRefBinding(state, sym, 245 RefVal::makeNotOwned(RetEffect::ObjC, ResultTy)); 246 } 247 248 C.addTransition(state); 249 } 250 251 void RetainCountChecker::checkPostStmt(const ObjCArrayLiteral *AL, 252 CheckerContext &C) const { 253 // Apply the 'MayEscape' to all values. 254 processObjCLiterals(C, AL); 255 } 256 257 void RetainCountChecker::checkPostStmt(const ObjCDictionaryLiteral *DL, 258 CheckerContext &C) const { 259 // Apply the 'MayEscape' to all keys and values. 260 processObjCLiterals(C, DL); 261 } 262 263 void RetainCountChecker::checkPostStmt(const ObjCBoxedExpr *Ex, 264 CheckerContext &C) const { 265 const ExplodedNode *Pred = C.getPredecessor(); 266 ProgramStateRef State = Pred->getState(); 267 268 if (SymbolRef Sym = Pred->getSVal(Ex).getAsSymbol()) { 269 QualType ResultTy = Ex->getType(); 270 State = setRefBinding(State, Sym, 271 RefVal::makeNotOwned(RetEffect::ObjC, ResultTy)); 272 } 273 274 C.addTransition(State); 275 } 276 277 void RetainCountChecker::checkPostStmt(const ObjCIvarRefExpr *IRE, 278 CheckerContext &C) const { 279 Optional<Loc> IVarLoc = C.getSVal(IRE).getAs<Loc>(); 280 if (!IVarLoc) 281 return; 282 283 ProgramStateRef State = C.getState(); 284 SymbolRef Sym = State->getSVal(*IVarLoc).getAsSymbol(); 285 if (!Sym || !dyn_cast_or_null<ObjCIvarRegion>(Sym->getOriginRegion())) 286 return; 287 288 // Accessing an ivar directly is unusual. If we've done that, be more 289 // forgiving about what the surrounding code is allowed to do. 290 291 QualType Ty = Sym->getType(); 292 RetEffect::ObjKind Kind; 293 if (Ty->isObjCRetainableType()) 294 Kind = RetEffect::ObjC; 295 else if (coreFoundation::isCFObjectRef(Ty)) 296 Kind = RetEffect::CF; 297 else 298 return; 299 300 // If the value is already known to be nil, don't bother tracking it. 301 ConstraintManager &CMgr = State->getConstraintManager(); 302 if (CMgr.isNull(State, Sym).isConstrainedTrue()) 303 return; 304 305 if (const RefVal *RV = getRefBinding(State, Sym)) { 306 // If we've seen this symbol before, or we're only seeing it now because 307 // of something the analyzer has synthesized, don't do anything. 308 if (RV->getIvarAccessHistory() != RefVal::IvarAccessHistory::None || 309 isSynthesizedAccessor(C.getStackFrame())) { 310 return; 311 } 312 313 // Note that this value has been loaded from an ivar. 314 C.addTransition(setRefBinding(State, Sym, RV->withIvarAccess())); 315 return; 316 } 317 318 RefVal PlusZero = RefVal::makeNotOwned(Kind, Ty); 319 320 // In a synthesized accessor, the effective retain count is +0. 321 if (isSynthesizedAccessor(C.getStackFrame())) { 322 C.addTransition(setRefBinding(State, Sym, PlusZero)); 323 return; 324 } 325 326 State = setRefBinding(State, Sym, PlusZero.withIvarAccess()); 327 C.addTransition(State); 328 } 329 330 void RetainCountChecker::checkPostCall(const CallEvent &Call, 331 CheckerContext &C) const { 332 RetainSummaryManager &Summaries = getSummaryManager(C); 333 334 // Leave null if no receiver. 335 QualType ReceiverType; 336 if (const auto *MC = dyn_cast<ObjCMethodCall>(&Call)) { 337 if (MC->isInstanceMessage()) { 338 SVal ReceiverV = MC->getReceiverSVal(); 339 if (SymbolRef Sym = ReceiverV.getAsLocSymbol()) 340 if (const RefVal *T = getRefBinding(C.getState(), Sym)) 341 ReceiverType = T->getType(); 342 } 343 } 344 345 const RetainSummary *Summ = Summaries.getSummary(Call, ReceiverType); 346 347 if (C.wasInlined) { 348 processSummaryOfInlined(*Summ, Call, C); 349 return; 350 } 351 checkSummary(*Summ, Call, C); 352 } 353 354 /// GetReturnType - Used to get the return type of a message expression or 355 /// function call with the intention of affixing that type to a tracked symbol. 356 /// While the return type can be queried directly from RetEx, when 357 /// invoking class methods we augment to the return type to be that of 358 /// a pointer to the class (as opposed it just being id). 359 // FIXME: We may be able to do this with related result types instead. 360 // This function is probably overestimating. 361 static QualType GetReturnType(const Expr *RetE, ASTContext &Ctx) { 362 QualType RetTy = RetE->getType(); 363 // If RetE is not a message expression just return its type. 364 // If RetE is a message expression, return its types if it is something 365 /// more specific than id. 366 if (const ObjCMessageExpr *ME = dyn_cast<ObjCMessageExpr>(RetE)) 367 if (const ObjCObjectPointerType *PT = RetTy->getAs<ObjCObjectPointerType>()) 368 if (PT->isObjCQualifiedIdType() || PT->isObjCIdType() || 369 PT->isObjCClassType()) { 370 // At this point we know the return type of the message expression is 371 // id, id<...>, or Class. If we have an ObjCInterfaceDecl, we know this 372 // is a call to a class method whose type we can resolve. In such 373 // cases, promote the return type to XXX* (where XXX is the class). 374 const ObjCInterfaceDecl *D = ME->getReceiverInterface(); 375 return !D ? RetTy : 376 Ctx.getObjCObjectPointerType(Ctx.getObjCInterfaceType(D)); 377 } 378 379 return RetTy; 380 } 381 382 static Optional<RefVal> refValFromRetEffect(RetEffect RE, 383 QualType ResultTy) { 384 if (RE.isOwned()) { 385 return RefVal::makeOwned(RE.getObjKind(), ResultTy); 386 } else if (RE.notOwned()) { 387 return RefVal::makeNotOwned(RE.getObjKind(), ResultTy); 388 } 389 390 return None; 391 } 392 393 // We don't always get the exact modeling of the function with regards to the 394 // retain count checker even when the function is inlined. For example, we need 395 // to stop tracking the symbols which were marked with StopTrackingHard. 396 void RetainCountChecker::processSummaryOfInlined(const RetainSummary &Summ, 397 const CallEvent &CallOrMsg, 398 CheckerContext &C) const { 399 ProgramStateRef state = C.getState(); 400 401 // Evaluate the effect of the arguments. 402 for (unsigned idx = 0, e = CallOrMsg.getNumArgs(); idx != e; ++idx) { 403 if (Summ.getArg(idx) == StopTrackingHard) { 404 SVal V = CallOrMsg.getArgSVal(idx); 405 if (SymbolRef Sym = V.getAsLocSymbol()) { 406 state = removeRefBinding(state, Sym); 407 } 408 } 409 } 410 411 // Evaluate the effect on the message receiver. 412 if (const auto *MsgInvocation = dyn_cast<ObjCMethodCall>(&CallOrMsg)) { 413 if (SymbolRef Sym = MsgInvocation->getReceiverSVal().getAsLocSymbol()) { 414 if (Summ.getReceiverEffect() == StopTrackingHard) { 415 state = removeRefBinding(state, Sym); 416 } 417 } 418 } 419 420 // Consult the summary for the return value. 421 RetEffect RE = Summ.getRetEffect(); 422 if (RE.getKind() == RetEffect::NoRetHard) { 423 SymbolRef Sym = CallOrMsg.getReturnValue().getAsSymbol(); 424 if (Sym) 425 state = removeRefBinding(state, Sym); 426 } 427 428 C.addTransition(state); 429 } 430 431 static ProgramStateRef updateOutParameter(ProgramStateRef State, 432 SVal ArgVal, 433 ArgEffect Effect) { 434 auto *ArgRegion = dyn_cast_or_null<TypedValueRegion>(ArgVal.getAsRegion()); 435 if (!ArgRegion) 436 return State; 437 438 QualType PointeeTy = ArgRegion->getValueType(); 439 if (!coreFoundation::isCFObjectRef(PointeeTy)) 440 return State; 441 442 SVal PointeeVal = State->getSVal(ArgRegion); 443 SymbolRef Pointee = PointeeVal.getAsLocSymbol(); 444 if (!Pointee) 445 return State; 446 447 switch (Effect) { 448 case UnretainedOutParameter: 449 State = setRefBinding(State, Pointee, 450 RefVal::makeNotOwned(RetEffect::CF, PointeeTy)); 451 break; 452 case RetainedOutParameter: 453 // Do nothing. Retained out parameters will either point to a +1 reference 454 // or NULL, but the way you check for failure differs depending on the API. 455 // Consequently, we don't have a good way to track them yet. 456 break; 457 458 default: 459 llvm_unreachable("only for out parameters"); 460 } 461 462 return State; 463 } 464 465 void RetainCountChecker::checkSummary(const RetainSummary &Summ, 466 const CallEvent &CallOrMsg, 467 CheckerContext &C) const { 468 ProgramStateRef state = C.getState(); 469 470 // Evaluate the effect of the arguments. 471 RefVal::Kind hasErr = (RefVal::Kind) 0; 472 SourceRange ErrorRange; 473 SymbolRef ErrorSym = nullptr; 474 475 for (unsigned idx = 0, e = CallOrMsg.getNumArgs(); idx != e; ++idx) { 476 SVal V = CallOrMsg.getArgSVal(idx); 477 478 ArgEffect Effect = Summ.getArg(idx); 479 if (Effect == RetainedOutParameter || Effect == UnretainedOutParameter) { 480 state = updateOutParameter(state, V, Effect); 481 } else if (SymbolRef Sym = V.getAsLocSymbol()) { 482 if (const RefVal *T = getRefBinding(state, Sym)) { 483 state = updateSymbol(state, Sym, *T, Effect, hasErr, C); 484 if (hasErr) { 485 ErrorRange = CallOrMsg.getArgSourceRange(idx); 486 ErrorSym = Sym; 487 break; 488 } 489 } 490 } 491 } 492 493 // Evaluate the effect on the message receiver. 494 bool ReceiverIsTracked = false; 495 if (!hasErr) { 496 const ObjCMethodCall *MsgInvocation = dyn_cast<ObjCMethodCall>(&CallOrMsg); 497 if (MsgInvocation) { 498 if (SymbolRef Sym = MsgInvocation->getReceiverSVal().getAsLocSymbol()) { 499 if (const RefVal *T = getRefBinding(state, Sym)) { 500 ReceiverIsTracked = true; 501 state = updateSymbol(state, Sym, *T, Summ.getReceiverEffect(), 502 hasErr, C); 503 if (hasErr) { 504 ErrorRange = MsgInvocation->getOriginExpr()->getReceiverRange(); 505 ErrorSym = Sym; 506 } 507 } 508 } 509 } 510 } 511 512 // Process any errors. 513 if (hasErr) { 514 processNonLeakError(state, ErrorRange, hasErr, ErrorSym, C); 515 return; 516 } 517 518 // Consult the summary for the return value. 519 RetEffect RE = Summ.getRetEffect(); 520 521 if (RE.getKind() == RetEffect::OwnedWhenTrackedReceiver) { 522 if (ReceiverIsTracked) 523 RE = getSummaryManager(C).getObjAllocRetEffect(); 524 else 525 RE = RetEffect::MakeNoRet(); 526 } 527 528 if (SymbolRef Sym = CallOrMsg.getReturnValue().getAsSymbol()) { 529 QualType ResultTy = CallOrMsg.getResultType(); 530 if (RE.notOwned()) { 531 const Expr *Ex = CallOrMsg.getOriginExpr(); 532 assert(Ex); 533 ResultTy = GetReturnType(Ex, C.getASTContext()); 534 } 535 if (Optional<RefVal> updatedRefVal = refValFromRetEffect(RE, ResultTy)) 536 state = setRefBinding(state, Sym, *updatedRefVal); 537 } 538 539 // This check is actually necessary; otherwise the statement builder thinks 540 // we've hit a previously-found path. 541 // Normally addTransition takes care of this, but we want the node pointer. 542 ExplodedNode *NewNode; 543 if (state == C.getState()) { 544 NewNode = C.getPredecessor(); 545 } else { 546 NewNode = C.addTransition(state); 547 } 548 549 // Annotate the node with summary we used. 550 if (NewNode) { 551 // FIXME: This is ugly. See checkEndAnalysis for why it's necessary. 552 if (ShouldResetSummaryLog) { 553 SummaryLog.clear(); 554 ShouldResetSummaryLog = false; 555 } 556 SummaryLog[NewNode] = &Summ; 557 } 558 } 559 560 ProgramStateRef 561 RetainCountChecker::updateSymbol(ProgramStateRef state, SymbolRef sym, 562 RefVal V, ArgEffect E, RefVal::Kind &hasErr, 563 CheckerContext &C) const { 564 bool IgnoreRetainMsg = (bool)C.getASTContext().getLangOpts().ObjCAutoRefCount; 565 switch (E) { 566 default: 567 break; 568 case IncRefMsg: 569 E = IgnoreRetainMsg ? DoNothing : IncRef; 570 break; 571 case DecRefMsg: 572 E = IgnoreRetainMsg ? DoNothing: DecRef; 573 break; 574 case DecRefMsgAndStopTrackingHard: 575 E = IgnoreRetainMsg ? StopTracking : DecRefAndStopTrackingHard; 576 break; 577 case MakeCollectable: 578 E = DoNothing; 579 } 580 581 // Handle all use-after-releases. 582 if (V.getKind() == RefVal::Released) { 583 V = V ^ RefVal::ErrorUseAfterRelease; 584 hasErr = V.getKind(); 585 return setRefBinding(state, sym, V); 586 } 587 588 switch (E) { 589 case DecRefMsg: 590 case IncRefMsg: 591 case MakeCollectable: 592 case DecRefMsgAndStopTrackingHard: 593 llvm_unreachable("DecRefMsg/IncRefMsg/MakeCollectable already converted"); 594 595 case UnretainedOutParameter: 596 case RetainedOutParameter: 597 llvm_unreachable("Applies to pointer-to-pointer parameters, which should " 598 "not have ref state."); 599 600 case Dealloc: 601 switch (V.getKind()) { 602 default: 603 llvm_unreachable("Invalid RefVal state for an explicit dealloc."); 604 case RefVal::Owned: 605 // The object immediately transitions to the released state. 606 V = V ^ RefVal::Released; 607 V.clearCounts(); 608 return setRefBinding(state, sym, V); 609 case RefVal::NotOwned: 610 V = V ^ RefVal::ErrorDeallocNotOwned; 611 hasErr = V.getKind(); 612 break; 613 } 614 break; 615 616 case MayEscape: 617 if (V.getKind() == RefVal::Owned) { 618 V = V ^ RefVal::NotOwned; 619 break; 620 } 621 622 // Fall-through. 623 624 case DoNothing: 625 return state; 626 627 case Autorelease: 628 // Update the autorelease counts. 629 V = V.autorelease(); 630 break; 631 632 case StopTracking: 633 case StopTrackingHard: 634 return removeRefBinding(state, sym); 635 636 case IncRef: 637 switch (V.getKind()) { 638 default: 639 llvm_unreachable("Invalid RefVal state for a retain."); 640 case RefVal::Owned: 641 case RefVal::NotOwned: 642 V = V + 1; 643 break; 644 } 645 break; 646 647 case DecRef: 648 case DecRefBridgedTransferred: 649 case DecRefAndStopTrackingHard: 650 switch (V.getKind()) { 651 default: 652 // case 'RefVal::Released' handled above. 653 llvm_unreachable("Invalid RefVal state for a release."); 654 655 case RefVal::Owned: 656 assert(V.getCount() > 0); 657 if (V.getCount() == 1) { 658 if (E == DecRefBridgedTransferred || 659 V.getIvarAccessHistory() == 660 RefVal::IvarAccessHistory::AccessedDirectly) 661 V = V ^ RefVal::NotOwned; 662 else 663 V = V ^ RefVal::Released; 664 } else if (E == DecRefAndStopTrackingHard) { 665 return removeRefBinding(state, sym); 666 } 667 668 V = V - 1; 669 break; 670 671 case RefVal::NotOwned: 672 if (V.getCount() > 0) { 673 if (E == DecRefAndStopTrackingHard) 674 return removeRefBinding(state, sym); 675 V = V - 1; 676 } else if (V.getIvarAccessHistory() == 677 RefVal::IvarAccessHistory::AccessedDirectly) { 678 // Assume that the instance variable was holding on the object at 679 // +1, and we just didn't know. 680 if (E == DecRefAndStopTrackingHard) 681 return removeRefBinding(state, sym); 682 V = V.releaseViaIvar() ^ RefVal::Released; 683 } else { 684 V = V ^ RefVal::ErrorReleaseNotOwned; 685 hasErr = V.getKind(); 686 } 687 break; 688 } 689 break; 690 } 691 return setRefBinding(state, sym, V); 692 } 693 694 void RetainCountChecker::processNonLeakError(ProgramStateRef St, 695 SourceRange ErrorRange, 696 RefVal::Kind ErrorKind, 697 SymbolRef Sym, 698 CheckerContext &C) const { 699 // HACK: Ignore retain-count issues on values accessed through ivars, 700 // because of cases like this: 701 // [_contentView retain]; 702 // [_contentView removeFromSuperview]; 703 // [self addSubview:_contentView]; // invalidates 'self' 704 // [_contentView release]; 705 if (const RefVal *RV = getRefBinding(St, Sym)) 706 if (RV->getIvarAccessHistory() != RefVal::IvarAccessHistory::None) 707 return; 708 709 ExplodedNode *N = C.generateErrorNode(St); 710 if (!N) 711 return; 712 713 CFRefBug *BT; 714 switch (ErrorKind) { 715 default: 716 llvm_unreachable("Unhandled error."); 717 case RefVal::ErrorUseAfterRelease: 718 if (!useAfterRelease) 719 useAfterRelease.reset(new UseAfterRelease(this)); 720 BT = useAfterRelease.get(); 721 break; 722 case RefVal::ErrorReleaseNotOwned: 723 if (!releaseNotOwned) 724 releaseNotOwned.reset(new BadRelease(this)); 725 BT = releaseNotOwned.get(); 726 break; 727 case RefVal::ErrorDeallocNotOwned: 728 if (!deallocNotOwned) 729 deallocNotOwned.reset(new DeallocNotOwned(this)); 730 BT = deallocNotOwned.get(); 731 break; 732 } 733 734 assert(BT); 735 auto report = std::unique_ptr<BugReport>( 736 new CFRefReport(*BT, C.getASTContext().getLangOpts(), 737 SummaryLog, N, Sym)); 738 report->addRange(ErrorRange); 739 C.emitReport(std::move(report)); 740 } 741 742 //===----------------------------------------------------------------------===// 743 // Handle the return values of retain-count-related functions. 744 //===----------------------------------------------------------------------===// 745 746 bool RetainCountChecker::evalCall(const CallExpr *CE, CheckerContext &C) const { 747 // Get the callee. We're only interested in simple C functions. 748 ProgramStateRef state = C.getState(); 749 const FunctionDecl *FD = C.getCalleeDecl(CE); 750 if (!FD) 751 return false; 752 753 RetainSummaryManager &SmrMgr = getSummaryManager(C); 754 QualType ResultTy = CE->getCallReturnType(C.getASTContext()); 755 756 // See if the function has 'rc_ownership_trusted_implementation' 757 // annotate attribute. If it does, we will not inline it. 758 bool hasTrustedImplementationAnnotation = false; 759 760 // See if it's one of the specific functions we know how to eval. 761 if (!SmrMgr.canEval(CE, FD, hasTrustedImplementationAnnotation)) 762 return false; 763 764 // Bind the return value. 765 const LocationContext *LCtx = C.getLocationContext(); 766 SVal RetVal = state->getSVal(CE->getArg(0), LCtx); 767 if (RetVal.isUnknown() || 768 (hasTrustedImplementationAnnotation && !ResultTy.isNull())) { 769 // If the receiver is unknown or the function has 770 // 'rc_ownership_trusted_implementation' annotate attribute, conjure a 771 // return value. 772 SValBuilder &SVB = C.getSValBuilder(); 773 RetVal = SVB.conjureSymbolVal(nullptr, CE, LCtx, ResultTy, C.blockCount()); 774 } 775 state = state->BindExpr(CE, LCtx, RetVal, false); 776 777 // FIXME: This should not be necessary, but otherwise the argument seems to be 778 // considered alive during the next statement. 779 if (const MemRegion *ArgRegion = RetVal.getAsRegion()) { 780 // Save the refcount status of the argument. 781 SymbolRef Sym = RetVal.getAsLocSymbol(); 782 const RefVal *Binding = nullptr; 783 if (Sym) 784 Binding = getRefBinding(state, Sym); 785 786 // Invalidate the argument region. 787 state = state->invalidateRegions( 788 ArgRegion, CE, C.blockCount(), LCtx, 789 /*CausesPointerEscape*/ hasTrustedImplementationAnnotation); 790 791 // Restore the refcount status of the argument. 792 if (Binding) 793 state = setRefBinding(state, Sym, *Binding); 794 } 795 796 C.addTransition(state); 797 return true; 798 } 799 800 //===----------------------------------------------------------------------===// 801 // Handle return statements. 802 //===----------------------------------------------------------------------===// 803 804 void RetainCountChecker::checkPreStmt(const ReturnStmt *S, 805 CheckerContext &C) const { 806 807 // Only adjust the reference count if this is the top-level call frame, 808 // and not the result of inlining. In the future, we should do 809 // better checking even for inlined calls, and see if they match 810 // with their expected semantics (e.g., the method should return a retained 811 // object, etc.). 812 if (!C.inTopFrame()) 813 return; 814 815 const Expr *RetE = S->getRetValue(); 816 if (!RetE) 817 return; 818 819 ProgramStateRef state = C.getState(); 820 SymbolRef Sym = 821 state->getSValAsScalarOrLoc(RetE, C.getLocationContext()).getAsLocSymbol(); 822 if (!Sym) 823 return; 824 825 // Get the reference count binding (if any). 826 const RefVal *T = getRefBinding(state, Sym); 827 if (!T) 828 return; 829 830 // Change the reference count. 831 RefVal X = *T; 832 833 switch (X.getKind()) { 834 case RefVal::Owned: { 835 unsigned cnt = X.getCount(); 836 assert(cnt > 0); 837 X.setCount(cnt - 1); 838 X = X ^ RefVal::ReturnedOwned; 839 break; 840 } 841 842 case RefVal::NotOwned: { 843 unsigned cnt = X.getCount(); 844 if (cnt) { 845 X.setCount(cnt - 1); 846 X = X ^ RefVal::ReturnedOwned; 847 } 848 else { 849 X = X ^ RefVal::ReturnedNotOwned; 850 } 851 break; 852 } 853 854 default: 855 return; 856 } 857 858 // Update the binding. 859 state = setRefBinding(state, Sym, X); 860 ExplodedNode *Pred = C.addTransition(state); 861 862 // At this point we have updated the state properly. 863 // Everything after this is merely checking to see if the return value has 864 // been over- or under-retained. 865 866 // Did we cache out? 867 if (!Pred) 868 return; 869 870 // Update the autorelease counts. 871 static CheckerProgramPointTag AutoreleaseTag(this, "Autorelease"); 872 state = handleAutoreleaseCounts(state, Pred, &AutoreleaseTag, C, Sym, X); 873 874 // Did we cache out? 875 if (!state) 876 return; 877 878 // Get the updated binding. 879 T = getRefBinding(state, Sym); 880 assert(T); 881 X = *T; 882 883 // Consult the summary of the enclosing method. 884 RetainSummaryManager &Summaries = getSummaryManager(C); 885 const Decl *CD = &Pred->getCodeDecl(); 886 RetEffect RE = RetEffect::MakeNoRet(); 887 888 // FIXME: What is the convention for blocks? Is there one? 889 if (const ObjCMethodDecl *MD = dyn_cast<ObjCMethodDecl>(CD)) { 890 const RetainSummary *Summ = Summaries.getMethodSummary(MD); 891 RE = Summ->getRetEffect(); 892 } else if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(CD)) { 893 if (!isa<CXXMethodDecl>(FD)) { 894 const RetainSummary *Summ = Summaries.getFunctionSummary(FD); 895 RE = Summ->getRetEffect(); 896 } 897 } 898 899 checkReturnWithRetEffect(S, C, Pred, RE, X, Sym, state); 900 } 901 902 void RetainCountChecker::checkReturnWithRetEffect(const ReturnStmt *S, 903 CheckerContext &C, 904 ExplodedNode *Pred, 905 RetEffect RE, RefVal X, 906 SymbolRef Sym, 907 ProgramStateRef state) const { 908 // HACK: Ignore retain-count issues on values accessed through ivars, 909 // because of cases like this: 910 // [_contentView retain]; 911 // [_contentView removeFromSuperview]; 912 // [self addSubview:_contentView]; // invalidates 'self' 913 // [_contentView release]; 914 if (X.getIvarAccessHistory() != RefVal::IvarAccessHistory::None) 915 return; 916 917 // Any leaks or other errors? 918 if (X.isReturnedOwned() && X.getCount() == 0) { 919 if (RE.getKind() != RetEffect::NoRet) { 920 bool hasError = false; 921 if (!RE.isOwned()) { 922 // The returning type is a CF, we expect the enclosing method should 923 // return ownership. 924 hasError = true; 925 X = X ^ RefVal::ErrorLeakReturned; 926 } 927 928 if (hasError) { 929 // Generate an error node. 930 state = setRefBinding(state, Sym, X); 931 932 static CheckerProgramPointTag ReturnOwnLeakTag(this, "ReturnsOwnLeak"); 933 ExplodedNode *N = C.addTransition(state, Pred, &ReturnOwnLeakTag); 934 if (N) { 935 const LangOptions &LOpts = C.getASTContext().getLangOpts(); 936 C.emitReport(std::unique_ptr<BugReport>(new CFRefLeakReport( 937 *getLeakAtReturnBug(LOpts), LOpts, 938 SummaryLog, N, Sym, C, IncludeAllocationLine))); 939 } 940 } 941 } 942 } else if (X.isReturnedNotOwned()) { 943 if (RE.isOwned()) { 944 if (X.getIvarAccessHistory() == 945 RefVal::IvarAccessHistory::AccessedDirectly) { 946 // Assume the method was trying to transfer a +1 reference from a 947 // strong ivar to the caller. 948 state = setRefBinding(state, Sym, 949 X.releaseViaIvar() ^ RefVal::ReturnedOwned); 950 } else { 951 // Trying to return a not owned object to a caller expecting an 952 // owned object. 953 state = setRefBinding(state, Sym, X ^ RefVal::ErrorReturnedNotOwned); 954 955 static CheckerProgramPointTag 956 ReturnNotOwnedTag(this, "ReturnNotOwnedForOwned"); 957 958 ExplodedNode *N = C.addTransition(state, Pred, &ReturnNotOwnedTag); 959 if (N) { 960 if (!returnNotOwnedForOwned) 961 returnNotOwnedForOwned.reset(new ReturnedNotOwnedForOwned(this)); 962 963 C.emitReport(std::unique_ptr<BugReport>(new CFRefReport( 964 *returnNotOwnedForOwned, C.getASTContext().getLangOpts(), 965 SummaryLog, N, Sym))); 966 } 967 } 968 } 969 } 970 } 971 972 //===----------------------------------------------------------------------===// 973 // Check various ways a symbol can be invalidated. 974 //===----------------------------------------------------------------------===// 975 976 void RetainCountChecker::checkBind(SVal loc, SVal val, const Stmt *S, 977 CheckerContext &C) const { 978 // Are we storing to something that causes the value to "escape"? 979 bool escapes = true; 980 981 // A value escapes in three possible cases (this may change): 982 // 983 // (1) we are binding to something that is not a memory region. 984 // (2) we are binding to a memregion that does not have stack storage 985 // (3) we are binding to a memregion with stack storage that the store 986 // does not understand. 987 ProgramStateRef state = C.getState(); 988 989 if (auto regionLoc = loc.getAs<loc::MemRegionVal>()) { 990 escapes = !regionLoc->getRegion()->hasStackStorage(); 991 992 if (!escapes) { 993 // To test (3), generate a new state with the binding added. If it is 994 // the same state, then it escapes (since the store cannot represent 995 // the binding). 996 // Do this only if we know that the store is not supposed to generate the 997 // same state. 998 SVal StoredVal = state->getSVal(regionLoc->getRegion()); 999 if (StoredVal != val) 1000 escapes = (state == (state->bindLoc(*regionLoc, val, C.getLocationContext()))); 1001 } 1002 if (!escapes) { 1003 // Case 4: We do not currently model what happens when a symbol is 1004 // assigned to a struct field, so be conservative here and let the symbol 1005 // go. TODO: This could definitely be improved upon. 1006 escapes = !isa<VarRegion>(regionLoc->getRegion()); 1007 } 1008 } 1009 1010 // If we are storing the value into an auto function scope variable annotated 1011 // with (__attribute__((cleanup))), stop tracking the value to avoid leak 1012 // false positives. 1013 if (const auto *LVR = dyn_cast_or_null<VarRegion>(loc.getAsRegion())) { 1014 const VarDecl *VD = LVR->getDecl(); 1015 if (VD->hasAttr<CleanupAttr>()) { 1016 escapes = true; 1017 } 1018 } 1019 1020 // If our store can represent the binding and we aren't storing to something 1021 // that doesn't have local storage then just return and have the simulation 1022 // state continue as is. 1023 if (!escapes) 1024 return; 1025 1026 // Otherwise, find all symbols referenced by 'val' that we are tracking 1027 // and stop tracking them. 1028 state = state->scanReachableSymbols<StopTrackingCallback>(val).getState(); 1029 C.addTransition(state); 1030 } 1031 1032 ProgramStateRef RetainCountChecker::evalAssume(ProgramStateRef state, 1033 SVal Cond, 1034 bool Assumption) const { 1035 // FIXME: We may add to the interface of evalAssume the list of symbols 1036 // whose assumptions have changed. For now we just iterate through the 1037 // bindings and check if any of the tracked symbols are NULL. This isn't 1038 // too bad since the number of symbols we will track in practice are 1039 // probably small and evalAssume is only called at branches and a few 1040 // other places. 1041 RefBindingsTy B = state->get<RefBindings>(); 1042 1043 if (B.isEmpty()) 1044 return state; 1045 1046 bool changed = false; 1047 RefBindingsTy::Factory &RefBFactory = state->get_context<RefBindings>(); 1048 1049 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I) { 1050 // Check if the symbol is null stop tracking the symbol. 1051 ConstraintManager &CMgr = state->getConstraintManager(); 1052 ConditionTruthVal AllocFailed = CMgr.isNull(state, I.getKey()); 1053 if (AllocFailed.isConstrainedTrue()) { 1054 changed = true; 1055 B = RefBFactory.remove(B, I.getKey()); 1056 } 1057 } 1058 1059 if (changed) 1060 state = state->set<RefBindings>(B); 1061 1062 return state; 1063 } 1064 1065 ProgramStateRef 1066 RetainCountChecker::checkRegionChanges(ProgramStateRef state, 1067 const InvalidatedSymbols *invalidated, 1068 ArrayRef<const MemRegion *> ExplicitRegions, 1069 ArrayRef<const MemRegion *> Regions, 1070 const LocationContext *LCtx, 1071 const CallEvent *Call) const { 1072 if (!invalidated) 1073 return state; 1074 1075 llvm::SmallPtrSet<SymbolRef, 8> WhitelistedSymbols; 1076 for (ArrayRef<const MemRegion *>::iterator I = ExplicitRegions.begin(), 1077 E = ExplicitRegions.end(); I != E; ++I) { 1078 if (const SymbolicRegion *SR = (*I)->StripCasts()->getAs<SymbolicRegion>()) 1079 WhitelistedSymbols.insert(SR->getSymbol()); 1080 } 1081 1082 for (InvalidatedSymbols::const_iterator I=invalidated->begin(), 1083 E = invalidated->end(); I!=E; ++I) { 1084 SymbolRef sym = *I; 1085 if (WhitelistedSymbols.count(sym)) 1086 continue; 1087 // Remove any existing reference-count binding. 1088 state = removeRefBinding(state, sym); 1089 } 1090 return state; 1091 } 1092 1093 //===----------------------------------------------------------------------===// 1094 // Handle dead symbols and end-of-path. 1095 //===----------------------------------------------------------------------===// 1096 1097 ProgramStateRef 1098 RetainCountChecker::handleAutoreleaseCounts(ProgramStateRef state, 1099 ExplodedNode *Pred, 1100 const ProgramPointTag *Tag, 1101 CheckerContext &Ctx, 1102 SymbolRef Sym, RefVal V) const { 1103 unsigned ACnt = V.getAutoreleaseCount(); 1104 1105 // No autorelease counts? Nothing to be done. 1106 if (!ACnt) 1107 return state; 1108 1109 unsigned Cnt = V.getCount(); 1110 1111 // FIXME: Handle sending 'autorelease' to already released object. 1112 1113 if (V.getKind() == RefVal::ReturnedOwned) 1114 ++Cnt; 1115 1116 // If we would over-release here, but we know the value came from an ivar, 1117 // assume it was a strong ivar that's just been relinquished. 1118 if (ACnt > Cnt && 1119 V.getIvarAccessHistory() == RefVal::IvarAccessHistory::AccessedDirectly) { 1120 V = V.releaseViaIvar(); 1121 --ACnt; 1122 } 1123 1124 if (ACnt <= Cnt) { 1125 if (ACnt == Cnt) { 1126 V.clearCounts(); 1127 if (V.getKind() == RefVal::ReturnedOwned) 1128 V = V ^ RefVal::ReturnedNotOwned; 1129 else 1130 V = V ^ RefVal::NotOwned; 1131 } else { 1132 V.setCount(V.getCount() - ACnt); 1133 V.setAutoreleaseCount(0); 1134 } 1135 return setRefBinding(state, Sym, V); 1136 } 1137 1138 // HACK: Ignore retain-count issues on values accessed through ivars, 1139 // because of cases like this: 1140 // [_contentView retain]; 1141 // [_contentView removeFromSuperview]; 1142 // [self addSubview:_contentView]; // invalidates 'self' 1143 // [_contentView release]; 1144 if (V.getIvarAccessHistory() != RefVal::IvarAccessHistory::None) 1145 return state; 1146 1147 // Woah! More autorelease counts then retain counts left. 1148 // Emit hard error. 1149 V = V ^ RefVal::ErrorOverAutorelease; 1150 state = setRefBinding(state, Sym, V); 1151 1152 ExplodedNode *N = Ctx.generateSink(state, Pred, Tag); 1153 if (N) { 1154 SmallString<128> sbuf; 1155 llvm::raw_svector_ostream os(sbuf); 1156 os << "Object was autoreleased "; 1157 if (V.getAutoreleaseCount() > 1) 1158 os << V.getAutoreleaseCount() << " times but the object "; 1159 else 1160 os << "but "; 1161 os << "has a +" << V.getCount() << " retain count"; 1162 1163 if (!overAutorelease) 1164 overAutorelease.reset(new OverAutorelease(this)); 1165 1166 const LangOptions &LOpts = Ctx.getASTContext().getLangOpts(); 1167 Ctx.emitReport(std::unique_ptr<BugReport>( 1168 new CFRefReport(*overAutorelease, LOpts, 1169 SummaryLog, N, Sym, os.str()))); 1170 } 1171 1172 return nullptr; 1173 } 1174 1175 ProgramStateRef 1176 RetainCountChecker::handleSymbolDeath(ProgramStateRef state, 1177 SymbolRef sid, RefVal V, 1178 SmallVectorImpl<SymbolRef> &Leaked) const { 1179 bool hasLeak; 1180 1181 // HACK: Ignore retain-count issues on values accessed through ivars, 1182 // because of cases like this: 1183 // [_contentView retain]; 1184 // [_contentView removeFromSuperview]; 1185 // [self addSubview:_contentView]; // invalidates 'self' 1186 // [_contentView release]; 1187 if (V.getIvarAccessHistory() != RefVal::IvarAccessHistory::None) 1188 hasLeak = false; 1189 else if (V.isOwned()) 1190 hasLeak = true; 1191 else if (V.isNotOwned() || V.isReturnedOwned()) 1192 hasLeak = (V.getCount() > 0); 1193 else 1194 hasLeak = false; 1195 1196 if (!hasLeak) 1197 return removeRefBinding(state, sid); 1198 1199 Leaked.push_back(sid); 1200 return setRefBinding(state, sid, V ^ RefVal::ErrorLeak); 1201 } 1202 1203 ExplodedNode * 1204 RetainCountChecker::processLeaks(ProgramStateRef state, 1205 SmallVectorImpl<SymbolRef> &Leaked, 1206 CheckerContext &Ctx, 1207 ExplodedNode *Pred) const { 1208 // Generate an intermediate node representing the leak point. 1209 ExplodedNode *N = Ctx.addTransition(state, Pred); 1210 1211 if (N) { 1212 for (SmallVectorImpl<SymbolRef>::iterator 1213 I = Leaked.begin(), E = Leaked.end(); I != E; ++I) { 1214 1215 const LangOptions &LOpts = Ctx.getASTContext().getLangOpts(); 1216 CFRefBug *BT = Pred ? getLeakWithinFunctionBug(LOpts) 1217 : getLeakAtReturnBug(LOpts); 1218 assert(BT && "BugType not initialized."); 1219 1220 Ctx.emitReport(std::unique_ptr<BugReport>( 1221 new CFRefLeakReport(*BT, LOpts, SummaryLog, N, *I, Ctx, 1222 IncludeAllocationLine))); 1223 } 1224 } 1225 1226 return N; 1227 } 1228 1229 static bool isISLObjectRef(QualType Ty) { 1230 return StringRef(Ty.getAsString()).startswith("isl_"); 1231 } 1232 1233 void RetainCountChecker::checkBeginFunction(CheckerContext &Ctx) const { 1234 if (!Ctx.inTopFrame()) 1235 return; 1236 1237 RetainSummaryManager &SmrMgr = getSummaryManager(Ctx); 1238 const LocationContext *LCtx = Ctx.getLocationContext(); 1239 const FunctionDecl *FD = dyn_cast<FunctionDecl>(LCtx->getDecl()); 1240 1241 if (!FD || SmrMgr.isTrustedReferenceCountImplementation(FD)) 1242 return; 1243 1244 ProgramStateRef state = Ctx.getState(); 1245 const RetainSummary *FunctionSummary = SmrMgr.getFunctionSummary(FD); 1246 ArgEffects CalleeSideArgEffects = FunctionSummary->getArgEffects(); 1247 1248 for (unsigned idx = 0, e = FD->getNumParams(); idx != e; ++idx) { 1249 const ParmVarDecl *Param = FD->getParamDecl(idx); 1250 SymbolRef Sym = state->getSVal(state->getRegion(Param, LCtx)).getAsSymbol(); 1251 1252 QualType Ty = Param->getType(); 1253 const ArgEffect *AE = CalleeSideArgEffects.lookup(idx); 1254 if (AE && *AE == DecRef && isISLObjectRef(Ty)) { 1255 state = setRefBinding( 1256 state, Sym, RefVal::makeOwned(RetEffect::ObjKind::Generalized, Ty)); 1257 } else if (isISLObjectRef(Ty)) { 1258 state = setRefBinding( 1259 state, Sym, 1260 RefVal::makeNotOwned(RetEffect::ObjKind::Generalized, Ty)); 1261 } 1262 } 1263 1264 Ctx.addTransition(state); 1265 } 1266 1267 void RetainCountChecker::checkEndFunction(const ReturnStmt *RS, 1268 CheckerContext &Ctx) const { 1269 ProgramStateRef state = Ctx.getState(); 1270 RefBindingsTy B = state->get<RefBindings>(); 1271 ExplodedNode *Pred = Ctx.getPredecessor(); 1272 1273 // Don't process anything within synthesized bodies. 1274 const LocationContext *LCtx = Pred->getLocationContext(); 1275 if (LCtx->getAnalysisDeclContext()->isBodyAutosynthesized()) { 1276 assert(!LCtx->inTopFrame()); 1277 return; 1278 } 1279 1280 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I) { 1281 state = handleAutoreleaseCounts(state, Pred, /*Tag=*/nullptr, Ctx, 1282 I->first, I->second); 1283 if (!state) 1284 return; 1285 } 1286 1287 // If the current LocationContext has a parent, don't check for leaks. 1288 // We will do that later. 1289 // FIXME: we should instead check for imbalances of the retain/releases, 1290 // and suggest annotations. 1291 if (LCtx->getParent()) 1292 return; 1293 1294 B = state->get<RefBindings>(); 1295 SmallVector<SymbolRef, 10> Leaked; 1296 1297 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I) 1298 state = handleSymbolDeath(state, I->first, I->second, Leaked); 1299 1300 processLeaks(state, Leaked, Ctx, Pred); 1301 } 1302 1303 const ProgramPointTag * 1304 RetainCountChecker::getDeadSymbolTag(SymbolRef sym) const { 1305 const CheckerProgramPointTag *&tag = DeadSymbolTags[sym]; 1306 if (!tag) { 1307 SmallString<64> buf; 1308 llvm::raw_svector_ostream out(buf); 1309 out << "Dead Symbol : "; 1310 sym->dumpToStream(out); 1311 tag = new CheckerProgramPointTag(this, out.str()); 1312 } 1313 return tag; 1314 } 1315 1316 void RetainCountChecker::checkDeadSymbols(SymbolReaper &SymReaper, 1317 CheckerContext &C) const { 1318 ExplodedNode *Pred = C.getPredecessor(); 1319 1320 ProgramStateRef state = C.getState(); 1321 RefBindingsTy B = state->get<RefBindings>(); 1322 SmallVector<SymbolRef, 10> Leaked; 1323 1324 // Update counts from autorelease pools 1325 for (SymbolReaper::dead_iterator I = SymReaper.dead_begin(), 1326 E = SymReaper.dead_end(); I != E; ++I) { 1327 SymbolRef Sym = *I; 1328 if (const RefVal *T = B.lookup(Sym)){ 1329 // Use the symbol as the tag. 1330 // FIXME: This might not be as unique as we would like. 1331 const ProgramPointTag *Tag = getDeadSymbolTag(Sym); 1332 state = handleAutoreleaseCounts(state, Pred, Tag, C, Sym, *T); 1333 if (!state) 1334 return; 1335 1336 // Fetch the new reference count from the state, and use it to handle 1337 // this symbol. 1338 state = handleSymbolDeath(state, *I, *getRefBinding(state, Sym), Leaked); 1339 } 1340 } 1341 1342 if (Leaked.empty()) { 1343 C.addTransition(state); 1344 return; 1345 } 1346 1347 Pred = processLeaks(state, Leaked, C, Pred); 1348 1349 // Did we cache out? 1350 if (!Pred) 1351 return; 1352 1353 // Now generate a new node that nukes the old bindings. 1354 // The only bindings left at this point are the leaked symbols. 1355 RefBindingsTy::Factory &F = state->get_context<RefBindings>(); 1356 B = state->get<RefBindings>(); 1357 1358 for (SmallVectorImpl<SymbolRef>::iterator I = Leaked.begin(), 1359 E = Leaked.end(); 1360 I != E; ++I) 1361 B = F.remove(B, *I); 1362 1363 state = state->set<RefBindings>(B); 1364 C.addTransition(state, Pred); 1365 } 1366 1367 void RetainCountChecker::printState(raw_ostream &Out, ProgramStateRef State, 1368 const char *NL, const char *Sep) const { 1369 1370 RefBindingsTy B = State->get<RefBindings>(); 1371 1372 if (B.isEmpty()) 1373 return; 1374 1375 Out << Sep << NL; 1376 1377 for (RefBindingsTy::iterator I = B.begin(), E = B.end(); I != E; ++I) { 1378 Out << I->first << " : "; 1379 I->second.print(Out); 1380 Out << NL; 1381 } 1382 } 1383 1384 //===----------------------------------------------------------------------===// 1385 // Checker registration. 1386 //===----------------------------------------------------------------------===// 1387 1388 void ento::registerRetainCountChecker(CheckerManager &Mgr) { 1389 Mgr.registerChecker<RetainCountChecker>(Mgr.getAnalyzerOptions()); 1390 } 1391