1 //===--- NonNullParamChecker.cpp - Undefined arguments checker -*- C++ -*--===//
2 //
3 // The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This defines NonNullParamChecker, which checks for arguments expected not to
11 // be null due to:
12 // - the corresponding parameters being declared to have nonnull attribute
13 // - the corresponding parameters being references; since the call would form
14 // a reference to a null pointer
15 //
16 //===----------------------------------------------------------------------===//
17
18 #include "ClangSACheckers.h"
19 #include "clang/AST/Attr.h"
20 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
21 #include "clang/StaticAnalyzer/Core/Checker.h"
22 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
23 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
24 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
25
26 using namespace clang;
27 using namespace ento;
28
29 namespace {
30 class NonNullParamChecker
31 : public Checker< check::PreCall > {
32 mutable std::unique_ptr<BugType> BTAttrNonNull;
33 mutable std::unique_ptr<BugType> BTNullRefArg;
34
35 public:
36
37 void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
38
39 BugReport *genReportNullAttrNonNull(const ExplodedNode *ErrorN,
40 const Expr *ArgE) const;
41 BugReport *genReportReferenceToNullPointer(const ExplodedNode *ErrorN,
42 const Expr *ArgE) const;
43 };
44 } // end anonymous namespace
45
checkPreCall(const CallEvent & Call,CheckerContext & C) const46 void NonNullParamChecker::checkPreCall(const CallEvent &Call,
47 CheckerContext &C) const {
48 const Decl *FD = Call.getDecl();
49 if (!FD)
50 return;
51
52 // Merge all non-null attributes
53 unsigned NumArgs = Call.getNumArgs();
54 llvm::SmallBitVector AttrNonNull(NumArgs);
55 for (const auto *NonNull : FD->specific_attrs<NonNullAttr>()) {
56 if (!NonNull->args_size()) {
57 AttrNonNull.set(0, NumArgs);
58 break;
59 }
60 for (unsigned Val : NonNull->args()) {
61 if (Val >= NumArgs)
62 continue;
63 AttrNonNull.set(Val);
64 }
65 }
66
67 ProgramStateRef state = C.getState();
68
69 CallEvent::param_type_iterator TyI = Call.param_type_begin(),
70 TyE = Call.param_type_end();
71
72 for (unsigned idx = 0; idx < NumArgs; ++idx) {
73
74 // Check if the parameter is a reference. We want to report when reference
75 // to a null pointer is passed as a paramter.
76 bool haveRefTypeParam = false;
77 if (TyI != TyE) {
78 haveRefTypeParam = (*TyI)->isReferenceType();
79 TyI++;
80 }
81
82 bool haveAttrNonNull = AttrNonNull[idx];
83 if (!haveAttrNonNull) {
84 // Check if the parameter is also marked 'nonnull'.
85 ArrayRef<ParmVarDecl*> parms = Call.parameters();
86 if (idx < parms.size())
87 haveAttrNonNull = parms[idx]->hasAttr<NonNullAttr>();
88 }
89
90 if (!haveRefTypeParam && !haveAttrNonNull)
91 continue;
92
93 // If the value is unknown or undefined, we can't perform this check.
94 const Expr *ArgE = Call.getArgExpr(idx);
95 SVal V = Call.getArgSVal(idx);
96 Optional<DefinedSVal> DV = V.getAs<DefinedSVal>();
97 if (!DV)
98 continue;
99
100 // Process the case when the argument is not a location.
101 assert(!haveRefTypeParam || DV->getAs<Loc>());
102
103 if (haveAttrNonNull && !DV->getAs<Loc>()) {
104 // If the argument is a union type, we want to handle a potential
105 // transparent_union GCC extension.
106 if (!ArgE)
107 continue;
108
109 QualType T = ArgE->getType();
110 const RecordType *UT = T->getAsUnionType();
111 if (!UT || !UT->getDecl()->hasAttr<TransparentUnionAttr>())
112 continue;
113
114 if (Optional<nonloc::CompoundVal> CSV =
115 DV->getAs<nonloc::CompoundVal>()) {
116 nonloc::CompoundVal::iterator CSV_I = CSV->begin();
117 assert(CSV_I != CSV->end());
118 V = *CSV_I;
119 DV = V.getAs<DefinedSVal>();
120 assert(++CSV_I == CSV->end());
121 // FIXME: Handle (some_union){ some_other_union_val }, which turns into
122 // a LazyCompoundVal inside a CompoundVal.
123 if (!V.getAs<Loc>())
124 continue;
125 // Retrieve the corresponding expression.
126 if (const CompoundLiteralExpr *CE = dyn_cast<CompoundLiteralExpr>(ArgE))
127 if (const InitListExpr *IE =
128 dyn_cast<InitListExpr>(CE->getInitializer()))
129 ArgE = dyn_cast<Expr>(*(IE->begin()));
130
131 } else {
132 // FIXME: Handle LazyCompoundVals?
133 continue;
134 }
135 }
136
137 ConstraintManager &CM = C.getConstraintManager();
138 ProgramStateRef stateNotNull, stateNull;
139 std::tie(stateNotNull, stateNull) = CM.assumeDual(state, *DV);
140
141 if (stateNull && !stateNotNull) {
142 // Generate an error node. Check for a null node in case
143 // we cache out.
144 if (ExplodedNode *errorNode = C.generateSink(stateNull)) {
145
146 BugReport *R = nullptr;
147 if (haveAttrNonNull)
148 R = genReportNullAttrNonNull(errorNode, ArgE);
149 else if (haveRefTypeParam)
150 R = genReportReferenceToNullPointer(errorNode, ArgE);
151
152 // Highlight the range of the argument that was null.
153 R->addRange(Call.getArgSourceRange(idx));
154
155 // Emit the bug report.
156 C.emitReport(R);
157 }
158
159 // Always return. Either we cached out or we just emitted an error.
160 return;
161 }
162
163 // If a pointer value passed the check we should assume that it is
164 // indeed not null from this point forward.
165 assert(stateNotNull);
166 state = stateNotNull;
167 }
168
169 // If we reach here all of the arguments passed the nonnull check.
170 // If 'state' has been updated generated a new node.
171 C.addTransition(state);
172 }
173
genReportNullAttrNonNull(const ExplodedNode * ErrorNode,const Expr * ArgE) const174 BugReport *NonNullParamChecker::genReportNullAttrNonNull(
175 const ExplodedNode *ErrorNode, const Expr *ArgE) const {
176 // Lazily allocate the BugType object if it hasn't already been
177 // created. Ownership is transferred to the BugReporter object once
178 // the BugReport is passed to 'EmitWarning'.
179 if (!BTAttrNonNull)
180 BTAttrNonNull.reset(new BugType(
181 this, "Argument with 'nonnull' attribute passed null", "API"));
182
183 BugReport *R = new BugReport(*BTAttrNonNull,
184 "Null pointer passed as an argument to a 'nonnull' parameter",
185 ErrorNode);
186 if (ArgE)
187 bugreporter::trackNullOrUndefValue(ErrorNode, ArgE, *R);
188
189 return R;
190 }
191
genReportReferenceToNullPointer(const ExplodedNode * ErrorNode,const Expr * ArgE) const192 BugReport *NonNullParamChecker::genReportReferenceToNullPointer(
193 const ExplodedNode *ErrorNode, const Expr *ArgE) const {
194 if (!BTNullRefArg)
195 BTNullRefArg.reset(new BuiltinBug(this, "Dereference of null pointer"));
196
197 BugReport *R = new BugReport(*BTNullRefArg,
198 "Forming reference to null pointer",
199 ErrorNode);
200 if (ArgE) {
201 const Expr *ArgEDeref = bugreporter::getDerefExpr(ArgE);
202 if (!ArgEDeref)
203 ArgEDeref = ArgE;
204 bugreporter::trackNullOrUndefValue(ErrorNode,
205 ArgEDeref,
206 *R);
207 }
208 return R;
209
210 }
211
registerNonNullParamChecker(CheckerManager & mgr)212 void ento::registerNonNullParamChecker(CheckerManager &mgr) {
213 mgr.registerChecker<NonNullParamChecker>();
214 }
215