xref: /freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp (revision 0fca6ea1d4eea4c934cfff25ac9ee8ad6fe95583)
1 //==- CheckObjCDealloc.cpp - Check ObjC -dealloc implementation --*- C++ -*-==//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 //  This checker analyzes Objective-C -dealloc methods and their callees
10 //  to warn about improper releasing of instance variables that back synthesized
11 // properties. It warns about missing releases in the following cases:
12 //  - When a class has a synthesized instance variable for a 'retain' or 'copy'
13 //    property and lacks a -dealloc method in its implementation.
14 //  - When a class has a synthesized instance variable for a 'retain'/'copy'
15 //   property but the ivar is not released in -dealloc by either -release
16 //   or by nilling out the property.
17 //
18 //  It warns about extra releases in -dealloc (but not in callees) when a
19 //  synthesized instance variable is released in the following cases:
20 //  - When the property is 'assign' and is not 'readonly'.
21 //  - When the property is 'weak'.
22 //
23 //  This checker only warns for instance variables synthesized to back
24 //  properties. Handling the more general case would require inferring whether
25 //  an instance variable is stored retained or not. For synthesized properties,
26 //  this is specified in the property declaration itself.
27 //
28 //===----------------------------------------------------------------------===//
29 
30 #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
31 #include "clang/Analysis/PathDiagnostic.h"
32 #include "clang/AST/Attr.h"
33 #include "clang/AST/DeclObjC.h"
34 #include "clang/AST/Expr.h"
35 #include "clang/AST/ExprObjC.h"
36 #include "clang/Basic/LangOptions.h"
37 #include "clang/Basic/TargetInfo.h"
38 #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
39 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
40 #include "clang/StaticAnalyzer/Core/Checker.h"
41 #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h"
42 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
43 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
44 #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h"
45 #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramStateTrait.h"
46 #include "clang/StaticAnalyzer/Core/PathSensitive/SymbolManager.h"
47 #include "llvm/Support/raw_ostream.h"
48 #include <optional>
49 
50 using namespace clang;
51 using namespace ento;
52 
53 /// Indicates whether an instance variable is required to be released in
54 /// -dealloc.
55 enum class ReleaseRequirement {
56   /// The instance variable must be released, either by calling
57   /// -release on it directly or by nilling it out with a property setter.
58   MustRelease,
59 
60   /// The instance variable must not be directly released with -release.
61   MustNotReleaseDirectly,
62 
63   /// The requirement for the instance variable could not be determined.
64   Unknown
65 };
66 
67 /// Returns true if the property implementation is synthesized and the
68 /// type of the property is retainable.
isSynthesizedRetainableProperty(const ObjCPropertyImplDecl * I,const ObjCIvarDecl ** ID,const ObjCPropertyDecl ** PD)69 static bool isSynthesizedRetainableProperty(const ObjCPropertyImplDecl *I,
70                                             const ObjCIvarDecl **ID,
71                                             const ObjCPropertyDecl **PD) {
72 
73   if (I->getPropertyImplementation() != ObjCPropertyImplDecl::Synthesize)
74     return false;
75 
76   (*ID) = I->getPropertyIvarDecl();
77   if (!(*ID))
78     return false;
79 
80   QualType T = (*ID)->getType();
81   if (!T->isObjCRetainableType())
82     return false;
83 
84   (*PD) = I->getPropertyDecl();
85   // Shouldn't be able to synthesize a property that doesn't exist.
86   assert(*PD);
87 
88   return true;
89 }
90 
91 namespace {
92 
93 class ObjCDeallocChecker
94     : public Checker<check::ASTDecl<ObjCImplementationDecl>,
95                      check::PreObjCMessage, check::PostObjCMessage,
96                      check::PreCall,
97                      check::BeginFunction, check::EndFunction,
98                      eval::Assume,
99                      check::PointerEscape,
100                      check::PreStmt<ReturnStmt>> {
101 
102   mutable const IdentifierInfo *NSObjectII = nullptr;
103   mutable const IdentifierInfo *SenTestCaseII = nullptr;
104   mutable const IdentifierInfo *XCTestCaseII = nullptr;
105   mutable const IdentifierInfo *Block_releaseII = nullptr;
106   mutable const IdentifierInfo *CIFilterII = nullptr;
107 
108   mutable Selector DeallocSel;
109   mutable Selector ReleaseSel;
110 
111   const BugType MissingReleaseBugType{this, "Missing ivar release (leak)",
112                                       categories::MemoryRefCount};
113   const BugType ExtraReleaseBugType{this, "Extra ivar release",
114                                     categories::MemoryRefCount};
115   const BugType MistakenDeallocBugType{this, "Mistaken dealloc",
116                                        categories::MemoryRefCount};
117 
118 public:
119   void checkASTDecl(const ObjCImplementationDecl *D, AnalysisManager& Mgr,
120                     BugReporter &BR) const;
121   void checkBeginFunction(CheckerContext &Ctx) const;
122   void checkPreObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
123   void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
124   void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
125 
126   ProgramStateRef evalAssume(ProgramStateRef State, SVal Cond,
127                              bool Assumption) const;
128 
129   ProgramStateRef checkPointerEscape(ProgramStateRef State,
130                                      const InvalidatedSymbols &Escaped,
131                                      const CallEvent *Call,
132                                      PointerEscapeKind Kind) const;
133   void checkPreStmt(const ReturnStmt *RS, CheckerContext &C) const;
134   void checkEndFunction(const ReturnStmt *RS, CheckerContext &Ctx) const;
135 
136 private:
137   void diagnoseMissingReleases(CheckerContext &C) const;
138 
139   bool diagnoseExtraRelease(SymbolRef ReleasedValue, const ObjCMethodCall &M,
140                             CheckerContext &C) const;
141 
142   bool diagnoseMistakenDealloc(SymbolRef DeallocedValue,
143                                const ObjCMethodCall &M,
144                                CheckerContext &C) const;
145 
146   SymbolRef getValueReleasedByNillingOut(const ObjCMethodCall &M,
147                                          CheckerContext &C) const;
148 
149   const ObjCIvarRegion *getIvarRegionForIvarSymbol(SymbolRef IvarSym) const;
150   SymbolRef getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const;
151 
152   const ObjCPropertyImplDecl*
153   findPropertyOnDeallocatingInstance(SymbolRef IvarSym,
154                                      CheckerContext &C) const;
155 
156   ReleaseRequirement
157   getDeallocReleaseRequirement(const ObjCPropertyImplDecl *PropImpl) const;
158 
159   bool isInInstanceDealloc(const CheckerContext &C, SVal &SelfValOut) const;
160   bool isInInstanceDealloc(const CheckerContext &C, const LocationContext *LCtx,
161                            SVal &SelfValOut) const;
162   bool instanceDeallocIsOnStack(const CheckerContext &C,
163                                 SVal &InstanceValOut) const;
164 
165   bool isSuperDeallocMessage(const ObjCMethodCall &M) const;
166 
167   const ObjCImplDecl *getContainingObjCImpl(const LocationContext *LCtx) const;
168 
169   const ObjCPropertyDecl *
170   findShadowedPropertyDecl(const ObjCPropertyImplDecl *PropImpl) const;
171 
172   void transitionToReleaseValue(CheckerContext &C, SymbolRef Value) const;
173   ProgramStateRef removeValueRequiringRelease(ProgramStateRef State,
174                                               SymbolRef InstanceSym,
175                                               SymbolRef ValueSym) const;
176 
177   void initIdentifierInfoAndSelectors(ASTContext &Ctx) const;
178 
179   bool classHasSeparateTeardown(const ObjCInterfaceDecl *ID) const;
180 
181   bool isReleasedByCIFilterDealloc(const ObjCPropertyImplDecl *PropImpl) const;
182   bool isNibLoadedIvarWithoutRetain(const ObjCPropertyImplDecl *PropImpl) const;
183 };
184 } // End anonymous namespace.
185 
186 
187 /// Maps from the symbol for a class instance to the set of
188 /// symbols remaining that must be released in -dealloc.
REGISTER_SET_FACTORY_WITH_PROGRAMSTATE(SymbolSet,SymbolRef)189 REGISTER_SET_FACTORY_WITH_PROGRAMSTATE(SymbolSet, SymbolRef)
190 REGISTER_MAP_WITH_PROGRAMSTATE(UnreleasedIvarMap, SymbolRef, SymbolSet)
191 
192 
193 /// An AST check that diagnose when the class requires a -dealloc method and
194 /// is missing one.
195 void ObjCDeallocChecker::checkASTDecl(const ObjCImplementationDecl *D,
196                                       AnalysisManager &Mgr,
197                                       BugReporter &BR) const {
198   assert(Mgr.getLangOpts().getGC() != LangOptions::GCOnly);
199   assert(!Mgr.getLangOpts().ObjCAutoRefCount);
200   initIdentifierInfoAndSelectors(Mgr.getASTContext());
201 
202   const ObjCInterfaceDecl *ID = D->getClassInterface();
203   // If the class is known to have a lifecycle with a separate teardown method
204   // then it may not require a -dealloc method.
205   if (classHasSeparateTeardown(ID))
206     return;
207 
208   // Does the class contain any synthesized properties that are retainable?
209   // If not, skip the check entirely.
210   const ObjCPropertyImplDecl *PropImplRequiringRelease = nullptr;
211   bool HasOthers = false;
212   for (const auto *I : D->property_impls()) {
213     if (getDeallocReleaseRequirement(I) == ReleaseRequirement::MustRelease) {
214       if (!PropImplRequiringRelease)
215         PropImplRequiringRelease = I;
216       else {
217         HasOthers = true;
218         break;
219       }
220     }
221   }
222 
223   if (!PropImplRequiringRelease)
224     return;
225 
226   const ObjCMethodDecl *MD = nullptr;
227 
228   // Scan the instance methods for "dealloc".
229   for (const auto *I : D->instance_methods()) {
230     if (I->getSelector() == DeallocSel) {
231       MD = I;
232       break;
233     }
234   }
235 
236   if (!MD) { // No dealloc found.
237     const char* Name = "Missing -dealloc";
238 
239     std::string Buf;
240     llvm::raw_string_ostream OS(Buf);
241     OS << "'" << *D << "' lacks a 'dealloc' instance method but "
242        << "must release '" << *PropImplRequiringRelease->getPropertyIvarDecl()
243        << "'";
244 
245     if (HasOthers)
246       OS << " and others";
247     PathDiagnosticLocation DLoc =
248         PathDiagnosticLocation::createBegin(D, BR.getSourceManager());
249 
250     BR.EmitBasicReport(D, this, Name, categories::CoreFoundationObjectiveC, Buf,
251                        DLoc);
252     return;
253   }
254 }
255 
256 /// If this is the beginning of -dealloc, mark the values initially stored in
257 /// instance variables that must be released by the end of -dealloc
258 /// as unreleased in the state.
checkBeginFunction(CheckerContext & C) const259 void ObjCDeallocChecker::checkBeginFunction(
260     CheckerContext &C) const {
261   initIdentifierInfoAndSelectors(C.getASTContext());
262 
263   // Only do this if the current method is -dealloc.
264   SVal SelfVal;
265   if (!isInInstanceDealloc(C, SelfVal))
266     return;
267 
268   SymbolRef SelfSymbol = SelfVal.getAsSymbol();
269 
270   const LocationContext *LCtx = C.getLocationContext();
271   ProgramStateRef InitialState = C.getState();
272 
273   ProgramStateRef State = InitialState;
274 
275   SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
276 
277   // Symbols that must be released by the end of the -dealloc;
278   SymbolSet RequiredReleases = F.getEmptySet();
279 
280   // If we're an inlined -dealloc, we should add our symbols to the existing
281   // set from our subclass.
282   if (const SymbolSet *CurrSet = State->get<UnreleasedIvarMap>(SelfSymbol))
283     RequiredReleases = *CurrSet;
284 
285   for (auto *PropImpl : getContainingObjCImpl(LCtx)->property_impls()) {
286     ReleaseRequirement Requirement = getDeallocReleaseRequirement(PropImpl);
287     if (Requirement != ReleaseRequirement::MustRelease)
288       continue;
289 
290     SVal LVal = State->getLValue(PropImpl->getPropertyIvarDecl(), SelfVal);
291     std::optional<Loc> LValLoc = LVal.getAs<Loc>();
292     if (!LValLoc)
293       continue;
294 
295     SVal InitialVal = State->getSVal(*LValLoc);
296     SymbolRef Symbol = InitialVal.getAsSymbol();
297     if (!Symbol || !isa<SymbolRegionValue>(Symbol))
298       continue;
299 
300     // Mark the value as requiring a release.
301     RequiredReleases = F.add(RequiredReleases, Symbol);
302   }
303 
304   if (!RequiredReleases.isEmpty()) {
305     State = State->set<UnreleasedIvarMap>(SelfSymbol, RequiredReleases);
306   }
307 
308   if (State != InitialState) {
309     C.addTransition(State);
310   }
311 }
312 
313 /// Given a symbol for an ivar, return the ivar region it was loaded from.
314 /// Returns nullptr if the instance symbol cannot be found.
315 const ObjCIvarRegion *
getIvarRegionForIvarSymbol(SymbolRef IvarSym) const316 ObjCDeallocChecker::getIvarRegionForIvarSymbol(SymbolRef IvarSym) const {
317   return dyn_cast_or_null<ObjCIvarRegion>(IvarSym->getOriginRegion());
318 }
319 
320 /// Given a symbol for an ivar, return a symbol for the instance containing
321 /// the ivar. Returns nullptr if the instance symbol cannot be found.
322 SymbolRef
getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const323 ObjCDeallocChecker::getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const {
324 
325   const ObjCIvarRegion *IvarRegion = getIvarRegionForIvarSymbol(IvarSym);
326   if (!IvarRegion)
327     return nullptr;
328 
329   const SymbolicRegion *SR = IvarRegion->getSymbolicBase();
330   assert(SR && "Symbolic base should not be nullptr");
331   return SR->getSymbol();
332 }
333 
334 /// If we are in -dealloc or -dealloc is on the stack, handle the call if it is
335 /// a release or a nilling-out property setter.
checkPreObjCMessage(const ObjCMethodCall & M,CheckerContext & C) const336 void ObjCDeallocChecker::checkPreObjCMessage(
337     const ObjCMethodCall &M, CheckerContext &C) const {
338   // Only run if -dealloc is on the stack.
339   SVal DeallocedInstance;
340   if (!instanceDeallocIsOnStack(C, DeallocedInstance))
341     return;
342 
343   SymbolRef ReleasedValue = nullptr;
344 
345   if (M.getSelector() == ReleaseSel) {
346     ReleasedValue = M.getReceiverSVal().getAsSymbol();
347   } else if (M.getSelector() == DeallocSel && !M.isReceiverSelfOrSuper()) {
348     if (diagnoseMistakenDealloc(M.getReceiverSVal().getAsSymbol(), M, C))
349       return;
350   }
351 
352   if (ReleasedValue) {
353     // An instance variable symbol was released with -release:
354     //    [_property release];
355     if (diagnoseExtraRelease(ReleasedValue,M, C))
356       return;
357   } else {
358     // An instance variable symbol was released nilling out its property:
359     //    self.property = nil;
360     ReleasedValue = getValueReleasedByNillingOut(M, C);
361   }
362 
363   if (!ReleasedValue)
364     return;
365 
366   transitionToReleaseValue(C, ReleasedValue);
367 }
368 
369 /// If we are in -dealloc or -dealloc is on the stack, handle the call if it is
370 /// call to Block_release().
checkPreCall(const CallEvent & Call,CheckerContext & C) const371 void ObjCDeallocChecker::checkPreCall(const CallEvent &Call,
372                                       CheckerContext &C) const {
373   const IdentifierInfo *II = Call.getCalleeIdentifier();
374   if (II != Block_releaseII)
375     return;
376 
377   if (Call.getNumArgs() != 1)
378     return;
379 
380   SymbolRef ReleasedValue = Call.getArgSVal(0).getAsSymbol();
381   if (!ReleasedValue)
382     return;
383 
384   transitionToReleaseValue(C, ReleasedValue);
385 }
386 /// If the message was a call to '[super dealloc]', diagnose any missing
387 /// releases.
checkPostObjCMessage(const ObjCMethodCall & M,CheckerContext & C) const388 void ObjCDeallocChecker::checkPostObjCMessage(
389     const ObjCMethodCall &M, CheckerContext &C) const {
390   // We perform this check post-message so that if the super -dealloc
391   // calls a helper method and that this class overrides, any ivars released in
392   // the helper method will be recorded before checking.
393   if (isSuperDeallocMessage(M))
394     diagnoseMissingReleases(C);
395 }
396 
397 /// Check for missing releases even when -dealloc does not call
398 /// '[super dealloc]'.
checkEndFunction(const ReturnStmt * RS,CheckerContext & C) const399 void ObjCDeallocChecker::checkEndFunction(
400     const ReturnStmt *RS, CheckerContext &C) const {
401   diagnoseMissingReleases(C);
402 }
403 
404 /// Check for missing releases on early return.
checkPreStmt(const ReturnStmt * RS,CheckerContext & C) const405 void ObjCDeallocChecker::checkPreStmt(
406     const ReturnStmt *RS, CheckerContext &C) const {
407   diagnoseMissingReleases(C);
408 }
409 
410 /// When a symbol is assumed to be nil, remove it from the set of symbols
411 /// require to be nil.
evalAssume(ProgramStateRef State,SVal Cond,bool Assumption) const412 ProgramStateRef ObjCDeallocChecker::evalAssume(ProgramStateRef State, SVal Cond,
413                                                bool Assumption) const {
414   if (State->get<UnreleasedIvarMap>().isEmpty())
415     return State;
416 
417   auto *CondBSE = dyn_cast_or_null<BinarySymExpr>(Cond.getAsSymbol());
418   if (!CondBSE)
419     return State;
420 
421   BinaryOperator::Opcode OpCode = CondBSE->getOpcode();
422   if (Assumption) {
423     if (OpCode != BO_EQ)
424       return State;
425   } else {
426     if (OpCode != BO_NE)
427       return State;
428   }
429 
430   SymbolRef NullSymbol = nullptr;
431   if (auto *SIE = dyn_cast<SymIntExpr>(CondBSE)) {
432     const llvm::APInt &RHS = SIE->getRHS();
433     if (RHS != 0)
434       return State;
435     NullSymbol = SIE->getLHS();
436   } else if (auto *SIE = dyn_cast<IntSymExpr>(CondBSE)) {
437     const llvm::APInt &LHS = SIE->getLHS();
438     if (LHS != 0)
439       return State;
440     NullSymbol = SIE->getRHS();
441   } else {
442     return State;
443   }
444 
445   SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(NullSymbol);
446   if (!InstanceSymbol)
447     return State;
448 
449   State = removeValueRequiringRelease(State, InstanceSymbol, NullSymbol);
450 
451   return State;
452 }
453 
454 /// If a symbol escapes conservatively assume unseen code released it.
checkPointerEscape(ProgramStateRef State,const InvalidatedSymbols & Escaped,const CallEvent * Call,PointerEscapeKind Kind) const455 ProgramStateRef ObjCDeallocChecker::checkPointerEscape(
456     ProgramStateRef State, const InvalidatedSymbols &Escaped,
457     const CallEvent *Call, PointerEscapeKind Kind) const {
458 
459   if (State->get<UnreleasedIvarMap>().isEmpty())
460     return State;
461 
462   // Don't treat calls to '[super dealloc]' as escaping for the purposes
463   // of this checker. Because the checker diagnoses missing releases in the
464   // post-message handler for '[super dealloc], escaping here would cause
465   // the checker to never warn.
466   auto *OMC = dyn_cast_or_null<ObjCMethodCall>(Call);
467   if (OMC && isSuperDeallocMessage(*OMC))
468     return State;
469 
470   for (const auto &Sym : Escaped) {
471     if (!Call || (Call && !Call->isInSystemHeader())) {
472       // If Sym is a symbol for an object with instance variables that
473       // must be released, remove these obligations when the object escapes
474       // unless via a call to a system function. System functions are
475       // very unlikely to release instance variables on objects passed to them,
476       // and are frequently called on 'self' in -dealloc (e.g., to remove
477       // observers) -- we want to avoid false negatives from escaping on
478       // them.
479       State = State->remove<UnreleasedIvarMap>(Sym);
480     }
481 
482 
483     SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(Sym);
484     if (!InstanceSymbol)
485       continue;
486 
487     State = removeValueRequiringRelease(State, InstanceSymbol, Sym);
488   }
489 
490   return State;
491 }
492 
493 /// Report any unreleased instance variables for the current instance being
494 /// dealloced.
diagnoseMissingReleases(CheckerContext & C) const495 void ObjCDeallocChecker::diagnoseMissingReleases(CheckerContext &C) const {
496   ProgramStateRef State = C.getState();
497 
498   SVal SelfVal;
499   if (!isInInstanceDealloc(C, SelfVal))
500     return;
501 
502   const MemRegion *SelfRegion = SelfVal.castAs<loc::MemRegionVal>().getRegion();
503   const LocationContext *LCtx = C.getLocationContext();
504 
505   ExplodedNode *ErrNode = nullptr;
506 
507   SymbolRef SelfSym = SelfVal.getAsSymbol();
508   if (!SelfSym)
509     return;
510 
511   const SymbolSet *OldUnreleased = State->get<UnreleasedIvarMap>(SelfSym);
512   if (!OldUnreleased)
513     return;
514 
515   SymbolSet NewUnreleased = *OldUnreleased;
516   SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
517 
518   ProgramStateRef InitialState = State;
519 
520   for (auto *IvarSymbol : *OldUnreleased) {
521     const TypedValueRegion *TVR =
522         cast<SymbolRegionValue>(IvarSymbol)->getRegion();
523     const ObjCIvarRegion *IvarRegion = cast<ObjCIvarRegion>(TVR);
524 
525     // Don't warn if the ivar is not for this instance.
526     if (SelfRegion != IvarRegion->getSuperRegion())
527       continue;
528 
529     const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl();
530     // Prevent an inlined call to -dealloc in a super class from warning
531     // about the values the subclass's -dealloc should release.
532     if (IvarDecl->getContainingInterface() !=
533         cast<ObjCMethodDecl>(LCtx->getDecl())->getClassInterface())
534       continue;
535 
536     // Prevents diagnosing multiple times for the same instance variable
537     // at, for example, both a return and at the end of the function.
538     NewUnreleased = F.remove(NewUnreleased, IvarSymbol);
539 
540     if (State->getStateManager()
541             .getConstraintManager()
542             .isNull(State, IvarSymbol)
543             .isConstrainedTrue()) {
544       continue;
545     }
546 
547     // A missing release manifests as a leak, so treat as a non-fatal error.
548     if (!ErrNode)
549       ErrNode = C.generateNonFatalErrorNode();
550     // If we've already reached this node on another path, return without
551     // diagnosing.
552     if (!ErrNode)
553       return;
554 
555     std::string Buf;
556     llvm::raw_string_ostream OS(Buf);
557 
558     const ObjCInterfaceDecl *Interface = IvarDecl->getContainingInterface();
559     // If the class is known to have a lifecycle with teardown that is
560     // separate from -dealloc, do not warn about missing releases. We
561     // suppress here (rather than not tracking for instance variables in
562     // such classes) because these classes are rare.
563     if (classHasSeparateTeardown(Interface))
564       return;
565 
566     ObjCImplDecl *ImplDecl = Interface->getImplementation();
567 
568     const ObjCPropertyImplDecl *PropImpl =
569         ImplDecl->FindPropertyImplIvarDecl(IvarDecl->getIdentifier());
570 
571     const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl();
572 
573     assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Copy ||
574            PropDecl->getSetterKind() == ObjCPropertyDecl::Retain);
575 
576     OS << "The '" << *IvarDecl << "' ivar in '" << *ImplDecl
577        << "' was ";
578 
579     if (PropDecl->getSetterKind() == ObjCPropertyDecl::Retain)
580       OS << "retained";
581     else
582       OS << "copied";
583 
584     OS << " by a synthesized property but not released"
585           " before '[super dealloc]'";
586 
587     auto BR = std::make_unique<PathSensitiveBugReport>(MissingReleaseBugType,
588                                                        Buf, ErrNode);
589     C.emitReport(std::move(BR));
590   }
591 
592   if (NewUnreleased.isEmpty()) {
593     State = State->remove<UnreleasedIvarMap>(SelfSym);
594   } else {
595     State = State->set<UnreleasedIvarMap>(SelfSym, NewUnreleased);
596   }
597 
598   if (ErrNode) {
599     C.addTransition(State, ErrNode);
600   } else if (State != InitialState) {
601     C.addTransition(State);
602   }
603 
604   // Make sure that after checking in the top-most frame the list of
605   // tracked ivars is empty. This is intended to detect accidental leaks in
606   // the UnreleasedIvarMap program state.
607   assert(!LCtx->inTopFrame() || State->get<UnreleasedIvarMap>().isEmpty());
608 }
609 
610 /// Given a symbol, determine whether the symbol refers to an ivar on
611 /// the top-most deallocating instance. If so, find the property for that
612 /// ivar, if one exists. Otherwise return null.
613 const ObjCPropertyImplDecl *
findPropertyOnDeallocatingInstance(SymbolRef IvarSym,CheckerContext & C) const614 ObjCDeallocChecker::findPropertyOnDeallocatingInstance(
615     SymbolRef IvarSym, CheckerContext &C) const {
616   SVal DeallocedInstance;
617   if (!isInInstanceDealloc(C, DeallocedInstance))
618     return nullptr;
619 
620   // Try to get the region from which the ivar value was loaded.
621   auto *IvarRegion = getIvarRegionForIvarSymbol(IvarSym);
622   if (!IvarRegion)
623     return nullptr;
624 
625   // Don't try to find the property if the ivar was not loaded from the
626   // given instance.
627   if (DeallocedInstance.castAs<loc::MemRegionVal>().getRegion() !=
628       IvarRegion->getSuperRegion())
629     return nullptr;
630 
631   const LocationContext *LCtx = C.getLocationContext();
632   const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl();
633 
634   const ObjCImplDecl *Container = getContainingObjCImpl(LCtx);
635   const ObjCPropertyImplDecl *PropImpl =
636       Container->FindPropertyImplIvarDecl(IvarDecl->getIdentifier());
637   return PropImpl;
638 }
639 
640 /// Emits a warning if the current context is -dealloc and ReleasedValue
641 /// must not be directly released in a -dealloc. Returns true if a diagnostic
642 /// was emitted.
diagnoseExtraRelease(SymbolRef ReleasedValue,const ObjCMethodCall & M,CheckerContext & C) const643 bool ObjCDeallocChecker::diagnoseExtraRelease(SymbolRef ReleasedValue,
644                                               const ObjCMethodCall &M,
645                                               CheckerContext &C) const {
646   // Try to get the region from which the released value was loaded.
647   // Note that, unlike diagnosing for missing releases, here we don't track
648   // values that must not be released in the state. This is because even if
649   // these values escape, it is still an error under the rules of MRR to
650   // release them in -dealloc.
651   const ObjCPropertyImplDecl *PropImpl =
652       findPropertyOnDeallocatingInstance(ReleasedValue, C);
653 
654   if (!PropImpl)
655     return false;
656 
657   // If the ivar belongs to a property that must not be released directly
658   // in dealloc, emit a warning.
659   if (getDeallocReleaseRequirement(PropImpl) !=
660       ReleaseRequirement::MustNotReleaseDirectly) {
661     return false;
662   }
663 
664   // If the property is readwrite but it shadows a read-only property in its
665   // external interface, treat the property a read-only. If the outside
666   // world cannot write to a property then the internal implementation is free
667   // to make its own convention about whether the value is stored retained
668   // or not. We look up the shadow here rather than in
669   // getDeallocReleaseRequirement() because doing so can be expensive.
670   const ObjCPropertyDecl *PropDecl = findShadowedPropertyDecl(PropImpl);
671   if (PropDecl) {
672     if (PropDecl->isReadOnly())
673       return false;
674   } else {
675     PropDecl = PropImpl->getPropertyDecl();
676   }
677 
678   ExplodedNode *ErrNode = C.generateNonFatalErrorNode();
679   if (!ErrNode)
680     return false;
681 
682   std::string Buf;
683   llvm::raw_string_ostream OS(Buf);
684 
685   assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Weak ||
686          (PropDecl->getSetterKind() == ObjCPropertyDecl::Assign &&
687           !PropDecl->isReadOnly()) ||
688          isReleasedByCIFilterDealloc(PropImpl)
689          );
690 
691   const ObjCImplDecl *Container = getContainingObjCImpl(C.getLocationContext());
692   OS << "The '" << *PropImpl->getPropertyIvarDecl()
693      << "' ivar in '" << *Container;
694 
695 
696   if (isReleasedByCIFilterDealloc(PropImpl)) {
697     OS << "' will be released by '-[CIFilter dealloc]' but also released here";
698   } else {
699     OS << "' was synthesized for ";
700 
701     if (PropDecl->getSetterKind() == ObjCPropertyDecl::Weak)
702       OS << "a weak";
703     else
704       OS << "an assign, readwrite";
705 
706     OS <<  " property but was released in 'dealloc'";
707   }
708 
709   auto BR = std::make_unique<PathSensitiveBugReport>(ExtraReleaseBugType, Buf,
710                                                      ErrNode);
711   BR->addRange(M.getOriginExpr()->getSourceRange());
712 
713   C.emitReport(std::move(BR));
714 
715   return true;
716 }
717 
718 /// Emits a warning if the current context is -dealloc and DeallocedValue
719 /// must not be directly dealloced in a -dealloc. Returns true if a diagnostic
720 /// was emitted.
diagnoseMistakenDealloc(SymbolRef DeallocedValue,const ObjCMethodCall & M,CheckerContext & C) const721 bool ObjCDeallocChecker::diagnoseMistakenDealloc(SymbolRef DeallocedValue,
722                                                  const ObjCMethodCall &M,
723                                                  CheckerContext &C) const {
724   // TODO: Apart from unknown/undefined receivers, this may happen when
725   // dealloc is called as a class method. Should we warn?
726   if (!DeallocedValue)
727     return false;
728 
729   // Find the property backing the instance variable that M
730   // is dealloc'ing.
731   const ObjCPropertyImplDecl *PropImpl =
732       findPropertyOnDeallocatingInstance(DeallocedValue, C);
733   if (!PropImpl)
734     return false;
735 
736   if (getDeallocReleaseRequirement(PropImpl) !=
737       ReleaseRequirement::MustRelease) {
738     return false;
739   }
740 
741   ExplodedNode *ErrNode = C.generateErrorNode();
742   if (!ErrNode)
743     return false;
744 
745   std::string Buf;
746   llvm::raw_string_ostream OS(Buf);
747 
748   OS << "'" << *PropImpl->getPropertyIvarDecl()
749      << "' should be released rather than deallocated";
750 
751   auto BR = std::make_unique<PathSensitiveBugReport>(MistakenDeallocBugType,
752                                                      Buf, ErrNode);
753   BR->addRange(M.getOriginExpr()->getSourceRange());
754 
755   C.emitReport(std::move(BR));
756 
757   return true;
758 }
759 
initIdentifierInfoAndSelectors(ASTContext & Ctx) const760 void ObjCDeallocChecker::initIdentifierInfoAndSelectors(
761     ASTContext &Ctx) const {
762   if (NSObjectII)
763     return;
764 
765   NSObjectII = &Ctx.Idents.get("NSObject");
766   SenTestCaseII = &Ctx.Idents.get("SenTestCase");
767   XCTestCaseII = &Ctx.Idents.get("XCTestCase");
768   Block_releaseII = &Ctx.Idents.get("_Block_release");
769   CIFilterII = &Ctx.Idents.get("CIFilter");
770 
771   const IdentifierInfo *DeallocII = &Ctx.Idents.get("dealloc");
772   const IdentifierInfo *ReleaseII = &Ctx.Idents.get("release");
773   DeallocSel = Ctx.Selectors.getSelector(0, &DeallocII);
774   ReleaseSel = Ctx.Selectors.getSelector(0, &ReleaseII);
775 }
776 
777 /// Returns true if M is a call to '[super dealloc]'.
isSuperDeallocMessage(const ObjCMethodCall & M) const778 bool ObjCDeallocChecker::isSuperDeallocMessage(
779     const ObjCMethodCall &M) const {
780   if (M.getOriginExpr()->getReceiverKind() != ObjCMessageExpr::SuperInstance)
781     return false;
782 
783   return M.getSelector() == DeallocSel;
784 }
785 
786 /// Returns the ObjCImplDecl containing the method declaration in LCtx.
787 const ObjCImplDecl *
getContainingObjCImpl(const LocationContext * LCtx) const788 ObjCDeallocChecker::getContainingObjCImpl(const LocationContext *LCtx) const {
789   auto *MD = cast<ObjCMethodDecl>(LCtx->getDecl());
790   return cast<ObjCImplDecl>(MD->getDeclContext());
791 }
792 
793 /// Returns the property that shadowed by PropImpl if one exists and
794 /// nullptr otherwise.
findShadowedPropertyDecl(const ObjCPropertyImplDecl * PropImpl) const795 const ObjCPropertyDecl *ObjCDeallocChecker::findShadowedPropertyDecl(
796     const ObjCPropertyImplDecl *PropImpl) const {
797   const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl();
798 
799   // Only readwrite properties can shadow.
800   if (PropDecl->isReadOnly())
801     return nullptr;
802 
803   auto *CatDecl = dyn_cast<ObjCCategoryDecl>(PropDecl->getDeclContext());
804 
805   // Only class extensions can contain shadowing properties.
806   if (!CatDecl || !CatDecl->IsClassExtension())
807     return nullptr;
808 
809   IdentifierInfo *ID = PropDecl->getIdentifier();
810   DeclContext::lookup_result R = CatDecl->getClassInterface()->lookup(ID);
811   for (const NamedDecl *D : R) {
812     auto *ShadowedPropDecl = dyn_cast<ObjCPropertyDecl>(D);
813     if (!ShadowedPropDecl)
814       continue;
815 
816     if (ShadowedPropDecl->isInstanceProperty()) {
817       assert(ShadowedPropDecl->isReadOnly());
818       return ShadowedPropDecl;
819     }
820   }
821 
822   return nullptr;
823 }
824 
825 /// Add a transition noting the release of the given value.
transitionToReleaseValue(CheckerContext & C,SymbolRef Value) const826 void ObjCDeallocChecker::transitionToReleaseValue(CheckerContext &C,
827                                                   SymbolRef Value) const {
828   assert(Value);
829   SymbolRef InstanceSym = getInstanceSymbolFromIvarSymbol(Value);
830   if (!InstanceSym)
831     return;
832   ProgramStateRef InitialState = C.getState();
833 
834   ProgramStateRef ReleasedState =
835       removeValueRequiringRelease(InitialState, InstanceSym, Value);
836 
837   if (ReleasedState != InitialState) {
838     C.addTransition(ReleasedState);
839   }
840 }
841 
842 /// Remove the Value requiring a release from the tracked set for
843 /// Instance and return the resultant state.
removeValueRequiringRelease(ProgramStateRef State,SymbolRef Instance,SymbolRef Value) const844 ProgramStateRef ObjCDeallocChecker::removeValueRequiringRelease(
845     ProgramStateRef State, SymbolRef Instance, SymbolRef Value) const {
846   assert(Instance);
847   assert(Value);
848   const ObjCIvarRegion *RemovedRegion = getIvarRegionForIvarSymbol(Value);
849   if (!RemovedRegion)
850     return State;
851 
852   const SymbolSet *Unreleased = State->get<UnreleasedIvarMap>(Instance);
853   if (!Unreleased)
854     return State;
855 
856   // Mark the value as no longer requiring a release.
857   SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
858   SymbolSet NewUnreleased = *Unreleased;
859   for (auto &Sym : *Unreleased) {
860     const ObjCIvarRegion *UnreleasedRegion = getIvarRegionForIvarSymbol(Sym);
861     assert(UnreleasedRegion);
862     if (RemovedRegion->getDecl() == UnreleasedRegion->getDecl()) {
863       NewUnreleased = F.remove(NewUnreleased, Sym);
864     }
865   }
866 
867   if (NewUnreleased.isEmpty()) {
868     return State->remove<UnreleasedIvarMap>(Instance);
869   }
870 
871   return State->set<UnreleasedIvarMap>(Instance, NewUnreleased);
872 }
873 
874 /// Determines whether the instance variable for \p PropImpl must or must not be
875 /// released in -dealloc or whether it cannot be determined.
getDeallocReleaseRequirement(const ObjCPropertyImplDecl * PropImpl) const876 ReleaseRequirement ObjCDeallocChecker::getDeallocReleaseRequirement(
877     const ObjCPropertyImplDecl *PropImpl) const {
878   const ObjCIvarDecl *IvarDecl;
879   const ObjCPropertyDecl *PropDecl;
880   if (!isSynthesizedRetainableProperty(PropImpl, &IvarDecl, &PropDecl))
881     return ReleaseRequirement::Unknown;
882 
883   ObjCPropertyDecl::SetterKind SK = PropDecl->getSetterKind();
884 
885   switch (SK) {
886   // Retain and copy setters retain/copy their values before storing and so
887   // the value in their instance variables must be released in -dealloc.
888   case ObjCPropertyDecl::Retain:
889   case ObjCPropertyDecl::Copy:
890     if (isReleasedByCIFilterDealloc(PropImpl))
891       return ReleaseRequirement::MustNotReleaseDirectly;
892 
893     if (isNibLoadedIvarWithoutRetain(PropImpl))
894       return ReleaseRequirement::Unknown;
895 
896     return ReleaseRequirement::MustRelease;
897 
898   case ObjCPropertyDecl::Weak:
899     return ReleaseRequirement::MustNotReleaseDirectly;
900 
901   case ObjCPropertyDecl::Assign:
902     // It is common for the ivars for read-only assign properties to
903     // always be stored retained, so their release requirement cannot be
904     // be determined.
905     if (PropDecl->isReadOnly())
906       return ReleaseRequirement::Unknown;
907 
908     return ReleaseRequirement::MustNotReleaseDirectly;
909   }
910   llvm_unreachable("Unrecognized setter kind");
911 }
912 
913 /// Returns the released value if M is a call a setter that releases
914 /// and nils out its underlying instance variable.
915 SymbolRef
getValueReleasedByNillingOut(const ObjCMethodCall & M,CheckerContext & C) const916 ObjCDeallocChecker::getValueReleasedByNillingOut(const ObjCMethodCall &M,
917                                                  CheckerContext &C) const {
918   SVal ReceiverVal = M.getReceiverSVal();
919   if (!ReceiverVal.isValid())
920     return nullptr;
921 
922   if (M.getNumArgs() == 0)
923     return nullptr;
924 
925   if (!M.getArgExpr(0)->getType()->isObjCRetainableType())
926     return nullptr;
927 
928   // Is the first argument nil?
929   SVal Arg = M.getArgSVal(0);
930   ProgramStateRef notNilState, nilState;
931   std::tie(notNilState, nilState) =
932       M.getState()->assume(Arg.castAs<DefinedOrUnknownSVal>());
933   if (!(nilState && !notNilState))
934     return nullptr;
935 
936   const ObjCPropertyDecl *Prop = M.getAccessedProperty();
937   if (!Prop)
938     return nullptr;
939 
940   ObjCIvarDecl *PropIvarDecl = Prop->getPropertyIvarDecl();
941   if (!PropIvarDecl)
942     return nullptr;
943 
944   ProgramStateRef State = C.getState();
945 
946   SVal LVal = State->getLValue(PropIvarDecl, ReceiverVal);
947   std::optional<Loc> LValLoc = LVal.getAs<Loc>();
948   if (!LValLoc)
949     return nullptr;
950 
951   SVal CurrentValInIvar = State->getSVal(*LValLoc);
952   return CurrentValInIvar.getAsSymbol();
953 }
954 
955 /// Returns true if the current context is a call to -dealloc and false
956 /// otherwise. If true, it also sets SelfValOut to the value of
957 /// 'self'.
isInInstanceDealloc(const CheckerContext & C,SVal & SelfValOut) const958 bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C,
959                                              SVal &SelfValOut) const {
960   return isInInstanceDealloc(C, C.getLocationContext(), SelfValOut);
961 }
962 
963 /// Returns true if LCtx is a call to -dealloc and false
964 /// otherwise. If true, it also sets SelfValOut to the value of
965 /// 'self'.
isInInstanceDealloc(const CheckerContext & C,const LocationContext * LCtx,SVal & SelfValOut) const966 bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C,
967                                              const LocationContext *LCtx,
968                                              SVal &SelfValOut) const {
969   auto *MD = dyn_cast<ObjCMethodDecl>(LCtx->getDecl());
970   if (!MD || !MD->isInstanceMethod() || MD->getSelector() != DeallocSel)
971     return false;
972 
973   const ImplicitParamDecl *SelfDecl = LCtx->getSelfDecl();
974   assert(SelfDecl && "No self in -dealloc?");
975 
976   ProgramStateRef State = C.getState();
977   SelfValOut = State->getSVal(State->getRegion(SelfDecl, LCtx));
978   return true;
979 }
980 
981 /// Returns true if there is a call to -dealloc anywhere on the stack and false
982 /// otherwise. If true, it also sets InstanceValOut to the value of
983 /// 'self' in the frame for -dealloc.
instanceDeallocIsOnStack(const CheckerContext & C,SVal & InstanceValOut) const984 bool ObjCDeallocChecker::instanceDeallocIsOnStack(const CheckerContext &C,
985                                                   SVal &InstanceValOut) const {
986   const LocationContext *LCtx = C.getLocationContext();
987 
988   while (LCtx) {
989     if (isInInstanceDealloc(C, LCtx, InstanceValOut))
990       return true;
991 
992     LCtx = LCtx->getParent();
993   }
994 
995   return false;
996 }
997 
998 /// Returns true if the ID is a class in which is known to have
999 /// a separate teardown lifecycle. In this case, -dealloc warnings
1000 /// about missing releases should be suppressed.
classHasSeparateTeardown(const ObjCInterfaceDecl * ID) const1001 bool ObjCDeallocChecker::classHasSeparateTeardown(
1002     const ObjCInterfaceDecl *ID) const {
1003   // Suppress if the class is not a subclass of NSObject.
1004   for ( ; ID ; ID = ID->getSuperClass()) {
1005     IdentifierInfo *II = ID->getIdentifier();
1006 
1007     if (II == NSObjectII)
1008       return false;
1009 
1010     // FIXME: For now, ignore classes that subclass SenTestCase and XCTestCase,
1011     // as these don't need to implement -dealloc.  They implement tear down in
1012     // another way, which we should try and catch later.
1013     //  http://llvm.org/bugs/show_bug.cgi?id=3187
1014     if (II == XCTestCaseII || II == SenTestCaseII)
1015       return true;
1016   }
1017 
1018   return true;
1019 }
1020 
1021 /// The -dealloc method in CIFilter highly unusual in that is will release
1022 /// instance variables belonging to its *subclasses* if the variable name
1023 /// starts with "input" or backs a property whose name starts with "input".
1024 /// Subclasses should not release these ivars in their own -dealloc method --
1025 /// doing so could result in an over release.
1026 ///
1027 /// This method returns true if the property will be released by
1028 /// -[CIFilter dealloc].
isReleasedByCIFilterDealloc(const ObjCPropertyImplDecl * PropImpl) const1029 bool ObjCDeallocChecker::isReleasedByCIFilterDealloc(
1030     const ObjCPropertyImplDecl *PropImpl) const {
1031   assert(PropImpl->getPropertyIvarDecl());
1032   StringRef PropName = PropImpl->getPropertyDecl()->getName();
1033   StringRef IvarName = PropImpl->getPropertyIvarDecl()->getName();
1034 
1035   const char *ReleasePrefix = "input";
1036   if (!(PropName.starts_with(ReleasePrefix) ||
1037         IvarName.starts_with(ReleasePrefix))) {
1038     return false;
1039   }
1040 
1041   const ObjCInterfaceDecl *ID =
1042       PropImpl->getPropertyIvarDecl()->getContainingInterface();
1043   for ( ; ID ; ID = ID->getSuperClass()) {
1044     IdentifierInfo *II = ID->getIdentifier();
1045     if (II == CIFilterII)
1046       return true;
1047   }
1048 
1049   return false;
1050 }
1051 
1052 /// Returns whether the ivar backing the property is an IBOutlet that
1053 /// has its value set by nib loading code without retaining the value.
1054 ///
1055 /// On macOS, if there is no setter, the nib-loading code sets the ivar
1056 /// directly, without retaining the value,
1057 ///
1058 /// On iOS and its derivatives, the nib-loading code will call
1059 /// -setValue:forKey:, which retains the value before directly setting the ivar.
isNibLoadedIvarWithoutRetain(const ObjCPropertyImplDecl * PropImpl) const1060 bool ObjCDeallocChecker::isNibLoadedIvarWithoutRetain(
1061     const ObjCPropertyImplDecl *PropImpl) const {
1062   const ObjCIvarDecl *IvarDecl = PropImpl->getPropertyIvarDecl();
1063   if (!IvarDecl->hasAttr<IBOutletAttr>())
1064     return false;
1065 
1066   const llvm::Triple &Target =
1067       IvarDecl->getASTContext().getTargetInfo().getTriple();
1068 
1069   if (!Target.isMacOSX())
1070     return false;
1071 
1072   if (PropImpl->getPropertyDecl()->getSetterMethodDecl())
1073     return false;
1074 
1075   return true;
1076 }
1077 
registerObjCDeallocChecker(CheckerManager & Mgr)1078 void ento::registerObjCDeallocChecker(CheckerManager &Mgr) {
1079   Mgr.registerChecker<ObjCDeallocChecker>();
1080 }
1081 
shouldRegisterObjCDeallocChecker(const CheckerManager & mgr)1082 bool ento::shouldRegisterObjCDeallocChecker(const CheckerManager &mgr) {
1083   // These checker only makes sense under MRR.
1084   const LangOptions &LO = mgr.getLangOpts();
1085   return LO.getGC() != LangOptions::GCOnly && !LO.ObjCAutoRefCount;
1086 }
1087