clang  12.0.0git
CheckerManager.cpp
Go to the documentation of this file.
1 //===- CheckerManager.cpp - Static Analyzer Checker Manager ---------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // Defines the Static Analyzer Checker Manager.
10 //
11 //===----------------------------------------------------------------------===//
12 
14 #include "clang/AST/DeclBase.h"
15 #include "clang/AST/Stmt.h"
18 #include "clang/Basic/LLVM.h"
26 #include "llvm/ADT/SmallVector.h"
27 #include "llvm/Support/Casting.h"
28 #include "llvm/Support/ErrorHandling.h"
29 #include <cassert>
30 #include <vector>
31 
32 using namespace clang;
33 using namespace ento;
34 
36  return !StmtCheckers.empty() ||
37  !PreObjCMessageCheckers.empty() ||
38  !PostObjCMessageCheckers.empty() ||
39  !PreCallCheckers.empty() ||
40  !PostCallCheckers.empty() ||
41  !LocationCheckers.empty() ||
42  !BindCheckers.empty() ||
43  !EndAnalysisCheckers.empty() ||
44  !EndFunctionCheckers.empty() ||
45  !BranchConditionCheckers.empty() ||
46  !LiveSymbolsCheckers.empty() ||
47  !DeadSymbolsCheckers.empty() ||
48  !RegionChangesCheckers.empty() ||
49  !EvalAssumeCheckers.empty() ||
50  !EvalCallCheckers.empty();
51 }
52 
54 #ifndef NDEBUG
55  // Make sure that for every event that has listeners, there is at least
56  // one dispatcher registered for it.
57  for (const auto &Event : Events)
58  assert(Event.second.HasDispatcher &&
59  "No dispatcher registered for an event");
60 #endif
61 }
62 
64  const CheckerBase *C, StringRef OptionName,
65  StringRef ExpectedValueDesc) const {
66 
67  getDiagnostics().Report(diag::err_analyzer_checker_option_invalid_input)
68  << (llvm::Twine() + C->getTagDescription() + ":" + OptionName).str()
69  << ExpectedValueDesc;
70 }
71 
72 //===----------------------------------------------------------------------===//
73 // Functions for running checkers for AST traversing..
74 //===----------------------------------------------------------------------===//
75 
77  BugReporter &BR) {
78  assert(D);
79 
80  unsigned DeclKind = D->getKind();
81  CachedDeclCheckers *checkers = nullptr;
82  CachedDeclCheckersMapTy::iterator CCI = CachedDeclCheckersMap.find(DeclKind);
83  if (CCI != CachedDeclCheckersMap.end()) {
84  checkers = &(CCI->second);
85  } else {
86  // Find the checkers that should run for this Decl and cache them.
87  checkers = &CachedDeclCheckersMap[DeclKind];
88  for (const auto &info : DeclCheckers)
89  if (info.IsForDeclFn(D))
90  checkers->push_back(info.CheckFn);
91  }
92 
93  assert(checkers);
94  for (const auto &checker : *checkers)
95  checker(D, mgr, BR);
96 }
97 
99  BugReporter &BR) {
100  assert(D && D->hasBody());
101 
102  for (const auto &BodyChecker : BodyCheckers)
103  BodyChecker(D, mgr, BR);
104 }
105 
106 //===----------------------------------------------------------------------===//
107 // Functions for running checkers for path-sensitive checking.
108 //===----------------------------------------------------------------------===//
109 
110 template <typename CHECK_CTX>
111 static void expandGraphWithCheckers(CHECK_CTX checkCtx,
112  ExplodedNodeSet &Dst,
113  const ExplodedNodeSet &Src) {
114  const NodeBuilderContext &BldrCtx = checkCtx.Eng.getBuilderContext();
115  if (Src.empty())
116  return;
117 
118  typename CHECK_CTX::CheckersTy::const_iterator
119  I = checkCtx.checkers_begin(), E = checkCtx.checkers_end();
120  if (I == E) {
121  Dst.insert(Src);
122  return;
123  }
124 
125  ExplodedNodeSet Tmp1, Tmp2;
126  const ExplodedNodeSet *PrevSet = &Src;
127 
128  for (; I != E; ++I) {
129  ExplodedNodeSet *CurrSet = nullptr;
130  if (I+1 == E)
131  CurrSet = &Dst;
132  else {
133  CurrSet = (PrevSet == &Tmp1) ? &Tmp2 : &Tmp1;
134  CurrSet->clear();
135  }
136 
137  NodeBuilder B(*PrevSet, *CurrSet, BldrCtx);
138  for (const auto &NI : *PrevSet)
139  checkCtx.runChecker(*I, B, NI);
140 
141  // If all the produced transitions are sinks, stop.
142  if (CurrSet->empty())
143  return;
144 
145  // Update which NodeSet is the current one.
146  PrevSet = CurrSet;
147  }
148 }
149 
150 namespace {
151 
152  struct CheckStmtContext {
154 
155  bool IsPreVisit;
156  const CheckersTy &Checkers;
157  const Stmt *S;
158  ExprEngine &Eng;
159  bool WasInlined;
160 
161  CheckStmtContext(bool isPreVisit, const CheckersTy &checkers,
162  const Stmt *s, ExprEngine &eng, bool wasInlined = false)
163  : IsPreVisit(isPreVisit), Checkers(checkers), S(s), Eng(eng),
164  WasInlined(wasInlined) {}
165 
166  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
167  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
168 
169  void runChecker(CheckerManager::CheckStmtFunc checkFn,
170  NodeBuilder &Bldr, ExplodedNode *Pred) {
171  // FIXME: Remove respondsToCallback from CheckerContext;
175  Pred->getLocationContext(), checkFn.Checker);
176  CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
177  checkFn(S, C);
178  }
179  };
180 
181 } // namespace
182 
183 /// Run checkers for visiting Stmts.
185  ExplodedNodeSet &Dst,
186  const ExplodedNodeSet &Src,
187  const Stmt *S,
188  ExprEngine &Eng,
189  bool WasInlined) {
190  CheckStmtContext C(isPreVisit, getCachedStmtCheckersFor(S, isPreVisit),
191  S, Eng, WasInlined);
192  expandGraphWithCheckers(C, Dst, Src);
193 }
194 
195 namespace {
196 
197  struct CheckObjCMessageContext {
198  using CheckersTy = std::vector<CheckerManager::CheckObjCMessageFunc>;
199 
201  bool WasInlined;
202  const CheckersTy &Checkers;
203  const ObjCMethodCall &Msg;
204  ExprEngine &Eng;
205 
206  CheckObjCMessageContext(ObjCMessageVisitKind visitKind,
207  const CheckersTy &checkers,
208  const ObjCMethodCall &msg, ExprEngine &eng,
209  bool wasInlined)
210  : Kind(visitKind), WasInlined(wasInlined), Checkers(checkers), Msg(msg),
211  Eng(eng) {}
212 
213  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
214  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
215 
216  void runChecker(CheckerManager::CheckObjCMessageFunc checkFn,
217  NodeBuilder &Bldr, ExplodedNode *Pred) {
218  bool IsPreVisit;
219 
220  switch (Kind) {
222  IsPreVisit = true;
223  break;
226  IsPreVisit = false;
227  break;
228  }
229 
230  const ProgramPoint &L = Msg.getProgramPoint(IsPreVisit,checkFn.Checker);
231  CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
232 
233  checkFn(*Msg.cloneWithState<ObjCMethodCall>(Pred->getState()), C);
234  }
235  };
236 
237 } // namespace
238 
239 /// Run checkers for visiting obj-c messages.
241  ExplodedNodeSet &Dst,
242  const ExplodedNodeSet &Src,
243  const ObjCMethodCall &msg,
244  ExprEngine &Eng,
245  bool WasInlined) {
246  const auto &checkers = getObjCMessageCheckers(visitKind);
247  CheckObjCMessageContext C(visitKind, checkers, msg, Eng, WasInlined);
248  expandGraphWithCheckers(C, Dst, Src);
249 }
250 
251 const std::vector<CheckerManager::CheckObjCMessageFunc> &
252 CheckerManager::getObjCMessageCheckers(ObjCMessageVisitKind Kind) const {
253  switch (Kind) {
255  return PreObjCMessageCheckers;
256  break;
258  return PostObjCMessageCheckers;
260  return ObjCMessageNilCheckers;
261  }
262  llvm_unreachable("Unknown Kind");
263 }
264 
265 namespace {
266 
267  // FIXME: This has all the same signatures as CheckObjCMessageContext.
268  // Is there a way we can merge the two?
269  struct CheckCallContext {
270  using CheckersTy = std::vector<CheckerManager::CheckCallFunc>;
271 
272  bool IsPreVisit, WasInlined;
273  const CheckersTy &Checkers;
274  const CallEvent &Call;
275  ExprEngine &Eng;
276 
277  CheckCallContext(bool isPreVisit, const CheckersTy &checkers,
278  const CallEvent &call, ExprEngine &eng,
279  bool wasInlined)
280  : IsPreVisit(isPreVisit), WasInlined(wasInlined), Checkers(checkers),
281  Call(call), Eng(eng) {}
282 
283  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
284  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
285 
286  void runChecker(CheckerManager::CheckCallFunc checkFn,
287  NodeBuilder &Bldr, ExplodedNode *Pred) {
288  const ProgramPoint &L = Call.getProgramPoint(IsPreVisit,checkFn.Checker);
289  CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
290 
291  checkFn(*Call.cloneWithState(Pred->getState()), C);
292  }
293  };
294 
295 } // namespace
296 
297 /// Run checkers for visiting an abstract call event.
299  ExplodedNodeSet &Dst,
300  const ExplodedNodeSet &Src,
301  const CallEvent &Call,
302  ExprEngine &Eng,
303  bool WasInlined) {
304  CheckCallContext C(isPreVisit,
305  isPreVisit ? PreCallCheckers
306  : PostCallCheckers,
307  Call, Eng, WasInlined);
308  expandGraphWithCheckers(C, Dst, Src);
309 }
310 
311 namespace {
312 
313  struct CheckLocationContext {
314  using CheckersTy = std::vector<CheckerManager::CheckLocationFunc>;
315 
316  const CheckersTy &Checkers;
317  SVal Loc;
318  bool IsLoad;
319  const Stmt *NodeEx; /* Will become a CFGStmt */
320  const Stmt *BoundEx;
321  ExprEngine &Eng;
322 
323  CheckLocationContext(const CheckersTy &checkers,
324  SVal loc, bool isLoad, const Stmt *NodeEx,
325  const Stmt *BoundEx,
326  ExprEngine &eng)
327  : Checkers(checkers), Loc(loc), IsLoad(isLoad), NodeEx(NodeEx),
328  BoundEx(BoundEx), Eng(eng) {}
329 
330  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
331  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
332 
333  void runChecker(CheckerManager::CheckLocationFunc checkFn,
334  NodeBuilder &Bldr, ExplodedNode *Pred) {
337  const ProgramPoint &L =
339  Pred->getLocationContext(),
340  checkFn.Checker);
341  CheckerContext C(Bldr, Eng, Pred, L);
342  checkFn(Loc, IsLoad, BoundEx, C);
343  }
344  };
345 
346 } // namespace
347 
348 /// Run checkers for load/store of a location.
349 
351  const ExplodedNodeSet &Src,
352  SVal location, bool isLoad,
353  const Stmt *NodeEx,
354  const Stmt *BoundEx,
355  ExprEngine &Eng) {
356  CheckLocationContext C(LocationCheckers, location, isLoad, NodeEx,
357  BoundEx, Eng);
358  expandGraphWithCheckers(C, Dst, Src);
359 }
360 
361 namespace {
362 
363  struct CheckBindContext {
364  using CheckersTy = std::vector<CheckerManager::CheckBindFunc>;
365 
366  const CheckersTy &Checkers;
367  SVal Loc;
368  SVal Val;
369  const Stmt *S;
370  ExprEngine &Eng;
371  const ProgramPoint &PP;
372 
373  CheckBindContext(const CheckersTy &checkers,
374  SVal loc, SVal val, const Stmt *s, ExprEngine &eng,
375  const ProgramPoint &pp)
376  : Checkers(checkers), Loc(loc), Val(val), S(s), Eng(eng), PP(pp) {}
377 
378  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
379  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
380 
381  void runChecker(CheckerManager::CheckBindFunc checkFn,
382  NodeBuilder &Bldr, ExplodedNode *Pred) {
383  const ProgramPoint &L = PP.withTag(checkFn.Checker);
384  CheckerContext C(Bldr, Eng, Pred, L);
385 
386  checkFn(Loc, Val, S, C);
387  }
388  };
389 
390 } // namespace
391 
392 /// Run checkers for binding of a value to a location.
394  const ExplodedNodeSet &Src,
395  SVal location, SVal val,
396  const Stmt *S, ExprEngine &Eng,
397  const ProgramPoint &PP) {
398  CheckBindContext C(BindCheckers, location, val, S, Eng, PP);
399  expandGraphWithCheckers(C, Dst, Src);
400 }
401 
403  BugReporter &BR,
404  ExprEngine &Eng) {
405  for (const auto &EndAnalysisChecker : EndAnalysisCheckers)
406  EndAnalysisChecker(G, BR, Eng);
407 }
408 
409 namespace {
410 
411 struct CheckBeginFunctionContext {
412  using CheckersTy = std::vector<CheckerManager::CheckBeginFunctionFunc>;
413 
414  const CheckersTy &Checkers;
415  ExprEngine &Eng;
416  const ProgramPoint &PP;
417 
418  CheckBeginFunctionContext(const CheckersTy &Checkers, ExprEngine &Eng,
419  const ProgramPoint &PP)
420  : Checkers(Checkers), Eng(Eng), PP(PP) {}
421 
422  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
423  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
424 
425  void runChecker(CheckerManager::CheckBeginFunctionFunc checkFn,
426  NodeBuilder &Bldr, ExplodedNode *Pred) {
427  const ProgramPoint &L = PP.withTag(checkFn.Checker);
428  CheckerContext C(Bldr, Eng, Pred, L);
429 
430  checkFn(C);
431  }
432 };
433 
434 } // namespace
435 
437  const BlockEdge &L,
438  ExplodedNode *Pred,
439  ExprEngine &Eng) {
440  ExplodedNodeSet Src;
441  Src.insert(Pred);
442  CheckBeginFunctionContext C(BeginFunctionCheckers, Eng, L);
443  expandGraphWithCheckers(C, Dst, Src);
444 }
445 
446 /// Run checkers for end of path.
447 // Note, We do not chain the checker output (like in expandGraphWithCheckers)
448 // for this callback since end of path nodes are expected to be final.
450  ExplodedNodeSet &Dst,
451  ExplodedNode *Pred,
452  ExprEngine &Eng,
453  const ReturnStmt *RS) {
454  // We define the builder outside of the loop because if at least one checker
455  // creates a successor for Pred, we do not need to generate an
456  // autotransition for it.
457  NodeBuilder Bldr(Pred, Dst, BC);
458  for (const auto &checkFn : EndFunctionCheckers) {
459  const ProgramPoint &L =
460  FunctionExitPoint(RS, Pred->getLocationContext(), checkFn.Checker);
461  CheckerContext C(Bldr, Eng, Pred, L);
462  checkFn(RS, C);
463  }
464 }
465 
466 namespace {
467 
468  struct CheckBranchConditionContext {
469  using CheckersTy = std::vector<CheckerManager::CheckBranchConditionFunc>;
470 
471  const CheckersTy &Checkers;
472  const Stmt *Condition;
473  ExprEngine &Eng;
474 
475  CheckBranchConditionContext(const CheckersTy &checkers,
476  const Stmt *Cond, ExprEngine &eng)
477  : Checkers(checkers), Condition(Cond), Eng(eng) {}
478 
479  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
480  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
481 
482  void runChecker(CheckerManager::CheckBranchConditionFunc checkFn,
483  NodeBuilder &Bldr, ExplodedNode *Pred) {
484  ProgramPoint L = PostCondition(Condition, Pred->getLocationContext(),
485  checkFn.Checker);
486  CheckerContext C(Bldr, Eng, Pred, L);
487  checkFn(Condition, C);
488  }
489  };
490 
491 } // namespace
492 
493 /// Run checkers for branch condition.
495  ExplodedNodeSet &Dst,
496  ExplodedNode *Pred,
497  ExprEngine &Eng) {
498  ExplodedNodeSet Src;
499  Src.insert(Pred);
500  CheckBranchConditionContext C(BranchConditionCheckers, Condition, Eng);
501  expandGraphWithCheckers(C, Dst, Src);
502 }
503 
504 namespace {
505 
506  struct CheckNewAllocatorContext {
507  using CheckersTy = std::vector<CheckerManager::CheckNewAllocatorFunc>;
508 
509  const CheckersTy &Checkers;
510  const CXXAllocatorCall &Call;
511  bool WasInlined;
512  ExprEngine &Eng;
513 
514  CheckNewAllocatorContext(const CheckersTy &Checkers,
515  const CXXAllocatorCall &Call, bool WasInlined,
516  ExprEngine &Eng)
517  : Checkers(Checkers), Call(Call), WasInlined(WasInlined), Eng(Eng) {}
518 
519  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
520  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
521 
522  void runChecker(CheckerManager::CheckNewAllocatorFunc checkFn,
523  NodeBuilder &Bldr, ExplodedNode *Pred) {
524  ProgramPoint L =
526  CheckerContext C(Bldr, Eng, Pred, L, WasInlined);
527  checkFn(cast<CXXAllocatorCall>(*Call.cloneWithState(Pred->getState())),
528  C);
529  }
530  };
531 
532 } // namespace
533 
535  ExplodedNodeSet &Dst,
536  ExplodedNode *Pred,
537  ExprEngine &Eng,
538  bool WasInlined) {
539  ExplodedNodeSet Src;
540  Src.insert(Pred);
541  CheckNewAllocatorContext C(NewAllocatorCheckers, Call, WasInlined, Eng);
542  expandGraphWithCheckers(C, Dst, Src);
543 }
544 
545 /// Run checkers for live symbols.
547  SymbolReaper &SymReaper) {
548  for (const auto &LiveSymbolsChecker : LiveSymbolsCheckers)
549  LiveSymbolsChecker(state, SymReaper);
550 }
551 
552 namespace {
553 
554  struct CheckDeadSymbolsContext {
555  using CheckersTy = std::vector<CheckerManager::CheckDeadSymbolsFunc>;
556 
557  const CheckersTy &Checkers;
558  SymbolReaper &SR;
559  const Stmt *S;
560  ExprEngine &Eng;
561  ProgramPoint::Kind ProgarmPointKind;
562 
563  CheckDeadSymbolsContext(const CheckersTy &checkers, SymbolReaper &sr,
564  const Stmt *s, ExprEngine &eng,
566  : Checkers(checkers), SR(sr), S(s), Eng(eng), ProgarmPointKind(K) {}
567 
568  CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
569  CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
570 
571  void runChecker(CheckerManager::CheckDeadSymbolsFunc checkFn,
572  NodeBuilder &Bldr, ExplodedNode *Pred) {
573  const ProgramPoint &L = ProgramPoint::getProgramPoint(S, ProgarmPointKind,
574  Pred->getLocationContext(), checkFn.Checker);
575  CheckerContext C(Bldr, Eng, Pred, L);
576 
577  // Note, do not pass the statement to the checkers without letting them
578  // differentiate if we ran remove dead bindings before or after the
579  // statement.
580  checkFn(SR, C);
581  }
582  };
583 
584 } // namespace
585 
586 /// Run checkers for dead symbols.
588  const ExplodedNodeSet &Src,
589  SymbolReaper &SymReaper,
590  const Stmt *S,
591  ExprEngine &Eng,
592  ProgramPoint::Kind K) {
593  CheckDeadSymbolsContext C(DeadSymbolsCheckers, SymReaper, S, Eng, K);
594  expandGraphWithCheckers(C, Dst, Src);
595 }
596 
597 /// Run checkers for region changes.
600  const InvalidatedSymbols *invalidated,
601  ArrayRef<const MemRegion *> ExplicitRegions,
603  const LocationContext *LCtx,
604  const CallEvent *Call) {
605  for (const auto &RegionChangesChecker : RegionChangesCheckers) {
606  // If any checker declares the state infeasible (or if it starts that way),
607  // bail out.
608  if (!state)
609  return nullptr;
610  state = RegionChangesChecker(state, invalidated, ExplicitRegions, Regions,
611  LCtx, Call);
612  }
613  return state;
614 }
615 
616 /// Run checkers to process symbol escape event.
619  const InvalidatedSymbols &Escaped,
620  const CallEvent *Call,
623  assert((Call != nullptr ||
624  (Kind != PSK_DirectEscapeOnCall &&
625  Kind != PSK_IndirectEscapeOnCall)) &&
626  "Call must not be NULL when escaping on call");
627  for (const auto &PointerEscapeChecker : PointerEscapeCheckers) {
628  // If any checker declares the state infeasible (or if it starts that
629  // way), bail out.
630  if (!State)
631  return nullptr;
632  State = PointerEscapeChecker(State, Escaped, Call, Kind, ETraits);
633  }
634  return State;
635 }
636 
637 /// Run checkers for handling assumptions on symbolic values.
640  SVal Cond, bool Assumption) {
641  for (const auto &EvalAssumeChecker : EvalAssumeCheckers) {
642  // If any checker declares the state infeasible (or if it starts that way),
643  // bail out.
644  if (!state)
645  return nullptr;
646  state = EvalAssumeChecker(state, Cond, Assumption);
647  }
648  return state;
649 }
650 
651 /// Run checkers for evaluating a call.
652 /// Only one checker will evaluate the call.
654  const ExplodedNodeSet &Src,
655  const CallEvent &Call,
656  ExprEngine &Eng,
657  const EvalCallOptions &CallOpts) {
658  for (auto *const Pred : Src) {
659  bool anyEvaluated = false;
660 
661  ExplodedNodeSet checkDst;
662  NodeBuilder B(Pred, checkDst, Eng.getBuilderContext());
663 
664  // Check if any of the EvalCall callbacks can evaluate the call.
665  for (const auto &EvalCallChecker : EvalCallCheckers) {
666  // TODO: Support the situation when the call doesn't correspond
667  // to any Expr.
670  Pred->getLocationContext(), EvalCallChecker.Checker);
671  bool evaluated = false;
672  { // CheckerContext generates transitions(populates checkDest) on
673  // destruction, so introduce the scope to make sure it gets properly
674  // populated.
675  CheckerContext C(B, Eng, Pred, L);
676  evaluated = EvalCallChecker(Call, C);
677  }
678  assert(!(evaluated && anyEvaluated)
679  && "There are more than one checkers evaluating the call");
680  if (evaluated) {
681  anyEvaluated = true;
682  Dst.insert(checkDst);
683 #ifdef NDEBUG
684  break; // on release don't check that no other checker also evals.
685 #endif
686  }
687  }
688 
689  // If none of the checkers evaluated the call, ask ExprEngine to handle it.
690  if (!anyEvaluated) {
691  NodeBuilder B(Pred, Dst, Eng.getBuilderContext());
692  Eng.defaultEvalCall(B, Pred, Call, CallOpts);
693  }
694  }
695 }
696 
697 /// Run checkers for the entire Translation Unit.
699  const TranslationUnitDecl *TU,
700  AnalysisManager &mgr,
701  BugReporter &BR) {
702  for (const auto &EndOfTranslationUnitChecker : EndOfTranslationUnitCheckers)
703  EndOfTranslationUnitChecker(TU, mgr, BR);
704 }
705 
708  const char *NL,
709  unsigned int Space,
710  bool IsDot) const {
711  Indent(Out, Space, IsDot) << "\"checker_messages\": ";
712 
713  // Create a temporary stream to see whether we have any message.
714  SmallString<1024> TempBuf;
715  llvm::raw_svector_ostream TempOut(TempBuf);
716  unsigned int InnerSpace = Space + 2;
717 
718  // Create the new-line in JSON with enough space.
720  llvm::raw_svector_ostream NLOut(NewLine);
721  NLOut << "\", " << NL; // Inject the ending and a new line
722  Indent(NLOut, InnerSpace, IsDot) << "\""; // then begin the next message.
723 
724  ++Space;
725  bool HasMessage = false;
726 
727  // Store the last CheckerTag.
728  const void *LastCT = nullptr;
729  for (const auto &CT : CheckerTags) {
730  // See whether the current checker has a message.
731  CT.second->printState(TempOut, State, /*NL=*/NewLine.c_str(), /*Sep=*/"");
732 
733  if (TempBuf.empty())
734  continue;
735 
736  if (!HasMessage) {
737  Out << '[' << NL;
738  HasMessage = true;
739  }
740 
741  LastCT = &CT;
742  TempBuf.clear();
743  }
744 
745  for (const auto &CT : CheckerTags) {
746  // See whether the current checker has a message.
747  CT.second->printState(TempOut, State, /*NL=*/NewLine.c_str(), /*Sep=*/"");
748 
749  if (TempBuf.empty())
750  continue;
751 
752  Indent(Out, Space, IsDot)
753  << "{ \"checker\": \"" << CT.second->getCheckerName().getName()
754  << "\", \"messages\": [" << NL;
755  Indent(Out, InnerSpace, IsDot)
756  << '\"' << TempBuf.str().trim() << '\"' << NL;
757  Indent(Out, Space, IsDot) << "]}";
758 
759  if (&CT != LastCT)
760  Out << ',';
761  Out << NL;
762 
763  TempBuf.clear();
764  }
765 
766  // It is the last element of the 'program_state' so do not add a comma.
767  if (HasMessage)
768  Indent(Out, --Space, IsDot) << "]";
769  else
770  Out << "null";
771 
772  Out << NL;
773 }
774 
775 //===----------------------------------------------------------------------===//
776 // Internal registration functions for AST traversing.
777 //===----------------------------------------------------------------------===//
778 
780  HandlesDeclFunc isForDeclFn) {
781  DeclCheckerInfo info = { checkfn, isForDeclFn };
782  DeclCheckers.push_back(info);
783 }
784 
786  BodyCheckers.push_back(checkfn);
787 }
788 
789 //===----------------------------------------------------------------------===//
790 // Internal registration functions for path-sensitive checking.
791 //===----------------------------------------------------------------------===//
792 
794  HandlesStmtFunc isForStmtFn) {
795  StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/true };
796  StmtCheckers.push_back(info);
797 }
798 
800  HandlesStmtFunc isForStmtFn) {
801  StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/false };
802  StmtCheckers.push_back(info);
803 }
804 
806  PreObjCMessageCheckers.push_back(checkfn);
807 }
808 
810  ObjCMessageNilCheckers.push_back(checkfn);
811 }
812 
814  PostObjCMessageCheckers.push_back(checkfn);
815 }
816 
818  PreCallCheckers.push_back(checkfn);
819 }
821  PostCallCheckers.push_back(checkfn);
822 }
823 
825  LocationCheckers.push_back(checkfn);
826 }
827 
829  BindCheckers.push_back(checkfn);
830 }
831 
833  EndAnalysisCheckers.push_back(checkfn);
834 }
835 
837  BeginFunctionCheckers.push_back(checkfn);
838 }
839 
841  EndFunctionCheckers.push_back(checkfn);
842 }
843 
845  CheckBranchConditionFunc checkfn) {
846  BranchConditionCheckers.push_back(checkfn);
847 }
848 
850  NewAllocatorCheckers.push_back(checkfn);
851 }
852 
854  LiveSymbolsCheckers.push_back(checkfn);
855 }
856 
858  DeadSymbolsCheckers.push_back(checkfn);
859 }
860 
862  RegionChangesCheckers.push_back(checkfn);
863 }
864 
866  PointerEscapeCheckers.push_back(checkfn);
867 }
868 
870  CheckPointerEscapeFunc checkfn) {
871  PointerEscapeCheckers.push_back(checkfn);
872 }
873 
875  EvalAssumeCheckers.push_back(checkfn);
876 }
877 
879  EvalCallCheckers.push_back(checkfn);
880 }
881 
883  CheckEndOfTranslationUnit checkfn) {
884  EndOfTranslationUnitCheckers.push_back(checkfn);
885 }
886 
887 //===----------------------------------------------------------------------===//
888 // Implementation details.
889 //===----------------------------------------------------------------------===//
890 
892 CheckerManager::getCachedStmtCheckersFor(const Stmt *S, bool isPreVisit) {
893  assert(S);
894 
895  unsigned Key = (S->getStmtClass() << 1) | unsigned(isPreVisit);
896  CachedStmtCheckersMapTy::iterator CCI = CachedStmtCheckersMap.find(Key);
897  if (CCI != CachedStmtCheckersMap.end())
898  return CCI->second;
899 
900  // Find the checkers that should run for this Stmt and cache them.
901  CachedStmtCheckers &Checkers = CachedStmtCheckersMap[Key];
902  for (const auto &Info : StmtCheckers)
903  if (Info.IsPreVisit == isPreVisit && Info.IsForStmtFn(S))
904  Checkers.push_back(Info.CheckFn);
905  return Checkers;
906 }
void runCheckersForNewAllocator(const CXXAllocatorCall &Call, ExplodedNodeSet &Dst, ExplodedNode *Pred, ExprEngine &Eng, bool wasInlined=false)
Run checkers between C++ operator new and constructor calls.
void _registerForDeadSymbols(CheckDeadSymbolsFunc checkfn)
Stmt - This represents one statement.
Definition: Stmt.h:68
Information about invalidation for a particular region/symbol.
Definition: MemRegion.h:1516
ProgramPoint getProgramPoint(bool IsPreVisit=false, const ProgramPointTag *Tag=nullptr) const
Returns an appropriate ProgramPoint for this call.
Definition: CallEvent.cpp:306
static void expandGraphWithCheckers(CHECK_CTX checkCtx, ExplodedNodeSet &Dst, const ExplodedNodeSet &Src)
Decl - This represents one declaration (or definition), e.g.
Definition: DeclBase.h:89
ProgramPoint withTag(const ProgramPointTag *tag) const
Create a new ProgramPoint object that is the same as the original except for using the specified tag ...
Definition: ProgramPoint.h:132
The pointer has been passed to a function indirectly.
DiagnosticBuilder Report(SourceLocation Loc, unsigned DiagID)
Issue the message to the client.
Definition: Diagnostic.h:1330
It wraps the AnalysisDeclContext to represent both the call stack with the help of StackFrameContext ...
void runCheckersForPrintStateJson(raw_ostream &Out, ProgramStateRef State, const char *NL="\, unsigned int Space=0, bool IsDot=false) const
Run checkers for debug-printing a ProgramState.
const ProgramStateRef & getState() const
const Expr * getOriginExpr() const
Returns the expression whose value will be the result of this call.
Definition: CallEvent.h:228
void _registerForRegionChanges(CheckRegionChangesFunc checkfn)
for(auto typeArg :T->getTypeArgsAsWritten())
void _registerForObjCMessageNil(CheckObjCMessageFunc checkfn)
const NodeBuilderContext & getBuilderContext()
Definition: ExprEngine.h:227
void runCheckersForLocation(ExplodedNodeSet &Dst, const ExplodedNodeSet &Src, SVal location, bool isLoad, const Stmt *NodeEx, const Stmt *BoundEx, ExprEngine &Eng)
Run checkers for load/store of a location.
static ProgramPoint getProgramPoint(const Stmt *S, ProgramPoint::Kind K, const LocationContext *LC, const ProgramPointTag *tag)
ProgramStateRef runCheckersForPointerEscape(ProgramStateRef State, const InvalidatedSymbols &Escaped, const CallEvent *Call, PointerEscapeKind Kind, RegionAndSymbolInvalidationTraits *ITraits)
Run checkers when pointers escape.
void _registerForPreCall(CheckCallFunc checkfn)
LineState State
void runCheckersForLiveSymbols(ProgramStateRef state, SymbolReaper &SymReaper)
Run checkers for live symbols.
virtual const CXXNewExpr * getOriginExpr() const
Definition: CallEvent.h:1020
i32 captured_struct **param SharedsTy A type which contains references the shared variables *param Shareds Context with the list of shared variables from the p *TaskFunction *param Data Additional data for task generation like final * state
void _registerForEndOfTranslationUnit(CheckEndOfTranslationUnit checkfn)
DiagnosticsEngine & getDiagnostics() const
bool(*)(const Stmt *D) HandlesStmtFunc
StringRef getTagDescription() const override
Definition: Checker.cpp:21
Forward-declares and imports various common LLVM datatypes that clang wants to use unqualified...
const LocationContext * getLocationContext() const
void _registerForLiveSymbols(CheckLiveSymbolsFunc checkfn)
void runCheckersOnASTDecl(const Decl *D, AnalysisManager &mgr, BugReporter &BR)
Run checkers handling Decls.
__device__ __2f16 float bool s
void runCheckersForEndFunction(NodeBuilderContext &BC, ExplodedNodeSet &Dst, ExplodedNode *Pred, ExprEngine &Eng, const ReturnStmt *RS)
Run checkers on end of function.
Hints for figuring out of a call should be inlined during evalCall().
Definition: ExprEngine.h:100
void runCheckersForBind(ExplodedNodeSet &Dst, const ExplodedNodeSet &Src, SVal location, SVal val, const Stmt *S, ExprEngine &Eng, const ProgramPoint &PP)
Run checkers for binding of a value to a location.
void _registerForBody(CheckDeclFunc checkfn)
This is the simplest builder which generates nodes in the ExplodedGraph.
Definition: CoreEngine.h:236
void _registerForEndAnalysis(CheckEndAnalysisFunc checkfn)
void _registerForLocation(CheckLocationFunc checkfn)
The pointer has been passed to a function call directly.
void _registerForPointerEscape(CheckPointerEscapeFunc checkfn)
ReturnStmt - This represents a return, optionally of an expression: return; return 4;...
Definition: Stmt.h:2677
void _registerForPostCall(CheckCallFunc checkfn)
virtual bool hasBody() const
Returns true if this Decl represents a declaration for a body of code, such as a function or method d...
Definition: DeclBase.h:1016
BugReporter is a utility class for generating PathDiagnostics for analysis.
Definition: BugReporter.h:578
Represents any expression that calls an Objective-C method.
Definition: CallEvent.h:1132
void _registerForPreObjCMessage(CheckObjCMessageFunc checkfn)
Kind
void runCheckersForBranchCondition(const Stmt *condition, ExplodedNodeSet &Dst, ExplodedNode *Pred, ExprEngine &Eng)
Run checkers for branch condition.
Represents the memory allocation call in a C++ new-expression.
Definition: CallEvent.h:1008
SVal - This represents a symbolic expression, which can be either an L-value or an R-value...
Definition: SVals.h:75
void _registerForBranchCondition(CheckBranchConditionFunc checkfn)
ProgramStateRef runCheckersForEvalAssume(ProgramStateRef state, SVal Cond, bool Assumption)
Run checkers for handling assumptions on symbolic values.
void runCheckersForObjCMessage(ObjCMessageVisitKind visitKind, ExplodedNodeSet &Dst, const ExplodedNodeSet &Src, const ObjCMethodCall &msg, ExprEngine &Eng, bool wasInlined=false)
Run checkers for visiting obj-c messages.
A class responsible for cleaning up unused symbols.
void runCheckersOnASTBody(const Decl *D, AnalysisManager &mgr, BugReporter &BR)
Run checkers handling Decls containing a Stmt body.
CheckerFn< void(const Stmt *, CheckerContext &)> CheckStmtFunc
void reportInvalidCheckerOptionValue(const CheckerBase *C, StringRef OptionName, StringRef ExpectedValueDesc) const
Emits an error through a DiagnosticsEngine about an invalid user supplied checker option value...
void insert(const ExplodedNodeSet &S)
CallEventRef< T > cloneWithState(ProgramStateRef NewState) const
Returns a copy of this CallEvent, but using the given state.
Definition: CallEvent.h:1450
void runCheckersForDeadSymbols(ExplodedNodeSet &Dst, const ExplodedNodeSet &Src, SymbolReaper &SymReaper, const Stmt *S, ExprEngine &Eng, ProgramPoint::Kind K)
Run checkers for dead symbols.
Dataflow Directional Tag Classes.
StmtClass getStmtClass() const
Definition: Stmt.h:1148
void runCheckersForStmt(bool isPreVisit, ExplodedNodeSet &Dst, const ExplodedNodeSet &Src, const Stmt *S, ExprEngine &Eng, bool wasInlined=false)
Run checkers for visiting Stmts.
Kind getKind() const
Definition: DeclBase.h:433
void _registerForDecl(CheckDeclFunc checkfn, HandlesDeclFunc isForDeclFn)
void _registerForPostObjCMessage(CheckObjCMessageFunc checkfn)
Represents an abstract call to a function or method along a particular path.
Definition: CallEvent.h:143
void _registerForEndFunction(CheckEndFunctionFunc checkfn)
void _registerForEvalAssume(EvalAssumeFunc checkfn)
void _registerForPostStmt(CheckStmtFunc checkfn, HandlesStmtFunc isForStmtFn)
PointerEscapeKind
Describes the different reasons a pointer escapes during analysis.
void defaultEvalCall(NodeBuilder &B, ExplodedNode *Pred, const CallEvent &Call, const EvalCallOptions &CallOpts={})
Default implementation of call evaluation.
void _registerForNewAllocator(CheckNewAllocatorFunc checkfn)
void runCheckersForCallEvent(bool isPreVisit, ExplodedNodeSet &Dst, const ExplodedNodeSet &Src, const CallEvent &Call, ExprEngine &Eng, bool wasInlined=false)
Run checkers for visiting obj-c messages.
void runCheckersForEndAnalysis(ExplodedGraph &G, BugReporter &BR, ExprEngine &Eng)
Run checkers for end of analysis.
void _registerForBeginFunction(CheckBeginFunctionFunc checkfn)
void _registerForEvalCall(EvalCallFunc checkfn)
void runCheckersForEvalCall(ExplodedNodeSet &Dst, const ExplodedNodeSet &Src, const CallEvent &CE, ExprEngine &Eng, const EvalCallOptions &CallOpts)
Run checkers for evaluating a call.
bool(*)(const Decl *D) HandlesDeclFunc
ProgramStateRef runCheckersForRegionChanges(ProgramStateRef state, const InvalidatedSymbols *invalidated, ArrayRef< const MemRegion *> ExplicitRegions, ArrayRef< const MemRegion *> Regions, const LocationContext *LCtx, const CallEvent *Call)
Run checkers for region changes.
void runCheckersForBeginFunction(ExplodedNodeSet &Dst, const BlockEdge &L, ExplodedNode *Pred, ExprEngine &Eng)
Run checkers on beginning of function.
The top declaration context.
Definition: Decl.h:82
raw_ostream & Indent(raw_ostream &Out, const unsigned int Space, bool IsDot)
Definition: JsonSupport.h:20
void _registerForConstPointerEscape(CheckPointerEscapeFunc checkfn)
void runCheckersOnEndOfTranslationUnit(const TranslationUnitDecl *TU, AnalysisManager &mgr, BugReporter &BR)
Run checkers for the entire Translation Unit.
void _registerForPreStmt(CheckStmtFunc checkfn, HandlesStmtFunc isForStmtFn)
void _registerForBind(CheckBindFunc checkfn)