1 //===- CalledOnceCheck.cpp - Check 'called once' parameters ---------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8
9 #include "clang/Analysis/Analyses/CalledOnceCheck.h"
10 #include "clang/AST/ASTContext.h"
11 #include "clang/AST/Attr.h"
12 #include "clang/AST/Decl.h"
13 #include "clang/AST/DeclBase.h"
14 #include "clang/AST/Expr.h"
15 #include "clang/AST/ExprObjC.h"
16 #include "clang/AST/OperationKinds.h"
17 #include "clang/AST/ParentMap.h"
18 #include "clang/AST/RecursiveASTVisitor.h"
19 #include "clang/AST/Stmt.h"
20 #include "clang/AST/StmtObjC.h"
21 #include "clang/AST/StmtVisitor.h"
22 #include "clang/AST/Type.h"
23 #include "clang/Analysis/AnalysisDeclContext.h"
24 #include "clang/Analysis/CFG.h"
25 #include "clang/Analysis/FlowSensitive/DataflowWorklist.h"
26 #include "clang/Basic/Builtins.h"
27 #include "clang/Basic/IdentifierTable.h"
28 #include "clang/Basic/LLVM.h"
29 #include "llvm/ADT/BitVector.h"
30 #include "llvm/ADT/BitmaskEnum.h"
31 #include "llvm/ADT/PointerIntPair.h"
32 #include "llvm/ADT/STLExtras.h"
33 #include "llvm/ADT/Sequence.h"
34 #include "llvm/ADT/SmallVector.h"
35 #include "llvm/ADT/StringRef.h"
36 #include "llvm/Support/Casting.h"
37 #include "llvm/Support/Compiler.h"
38 #include "llvm/Support/ErrorHandling.h"
39 #include <memory>
40 #include <optional>
41
42 using namespace clang;
43
44 namespace {
45 static constexpr unsigned EXPECTED_MAX_NUMBER_OF_PARAMS = 2;
46 template <class T>
47 using ParamSizedVector = llvm::SmallVector<T, EXPECTED_MAX_NUMBER_OF_PARAMS>;
48 static constexpr unsigned EXPECTED_NUMBER_OF_BASIC_BLOCKS = 8;
49 template <class T>
50 using CFGSizedVector = llvm::SmallVector<T, EXPECTED_NUMBER_OF_BASIC_BLOCKS>;
51 constexpr llvm::StringLiteral CONVENTIONAL_NAMES[] = {
52 "completionHandler", "completion", "withCompletionHandler",
53 "withCompletion", "completionBlock", "withCompletionBlock",
54 "replyTo", "reply", "withReplyTo"};
55 constexpr llvm::StringLiteral CONVENTIONAL_SUFFIXES[] = {
56 "WithCompletionHandler", "WithCompletion", "WithCompletionBlock",
57 "WithReplyTo", "WithReply"};
58 constexpr llvm::StringLiteral CONVENTIONAL_CONDITIONS[] = {
59 "error", "cancel", "shouldCall", "done", "OK", "success"};
60
61 struct KnownCalledOnceParameter {
62 llvm::StringLiteral FunctionName;
63 unsigned ParamIndex;
64 };
65 constexpr KnownCalledOnceParameter KNOWN_CALLED_ONCE_PARAMETERS[] = {
66 {llvm::StringLiteral{"dispatch_async"}, 1},
67 {llvm::StringLiteral{"dispatch_async_and_wait"}, 1},
68 {llvm::StringLiteral{"dispatch_after"}, 2},
69 {llvm::StringLiteral{"dispatch_sync"}, 1},
70 {llvm::StringLiteral{"dispatch_once"}, 1},
71 {llvm::StringLiteral{"dispatch_barrier_async"}, 1},
72 {llvm::StringLiteral{"dispatch_barrier_async_and_wait"}, 1},
73 {llvm::StringLiteral{"dispatch_barrier_sync"}, 1}};
74
75 class ParameterStatus {
76 public:
77 // Status kind is basically the main part of parameter's status.
78 // The kind represents our knowledge (so far) about a tracked parameter
79 // in the context of this analysis.
80 //
81 // Since we want to report on missing and extraneous calls, we need to
82 // track the fact whether paramater was called or not. This automatically
83 // decides two kinds: `NotCalled` and `Called`.
84 //
85 // One of the erroneous situations is the case when parameter is called only
86 // on some of the paths. We could've considered it `NotCalled`, but we want
87 // to report double call warnings even if these two calls are not guaranteed
88 // to happen in every execution. We also don't want to have it as `Called`
89 // because not calling tracked parameter on all of the paths is an error
90 // on its own. For these reasons, we need to have a separate kind,
91 // `MaybeCalled`, and change `Called` to `DefinitelyCalled` to avoid
92 // confusion.
93 //
94 // Two violations of calling parameter more than once and not calling it on
95 // every path are not, however, mutually exclusive. In situations where both
96 // violations take place, we prefer to report ONLY double call. It's always
97 // harder to pinpoint a bug that has arisen when a user neglects to take the
98 // right action (and therefore, no action is taken), than when a user takes
99 // the wrong action. And, in order to remember that we already reported
100 // a double call, we need another kind: `Reported`.
101 //
102 // Our analysis is intra-procedural and, while in the perfect world,
103 // developers only use tracked parameters to call them, in the real world,
104 // the picture might be different. Parameters can be stored in global
105 // variables or leaked into other functions that we know nothing about.
106 // We try to be lenient and trust users. Another kind `Escaped` reflects
107 // such situations. We don't know if it gets called there or not, but we
108 // should always think of `Escaped` as the best possible option.
109 //
110 // Some of the paths in the analyzed functions might end with a call
111 // to noreturn functions. Such paths are not required to have parameter
112 // calls and we want to track that. For the purposes of better diagnostics,
113 // we don't want to reuse `Escaped` and, thus, have another kind `NoReturn`.
114 //
115 // Additionally, we have `NotVisited` kind that tells us nothing about
116 // a tracked parameter, but is used for tracking analyzed (aka visited)
117 // basic blocks.
118 //
119 // If we consider `|` to be a JOIN operation of two kinds coming from
120 // two different paths, the following properties must hold:
121 //
122 // 1. for any Kind K: K | K == K
123 // Joining two identical kinds should result in the same kind.
124 //
125 // 2. for any Kind K: Reported | K == Reported
126 // Doesn't matter on which path it was reported, it still is.
127 //
128 // 3. for any Kind K: NoReturn | K == K
129 // We can totally ignore noreturn paths during merges.
130 //
131 // 4. DefinitelyCalled | NotCalled == MaybeCalled
132 // Called on one path, not called on another - that's simply
133 // a definition for MaybeCalled.
134 //
135 // 5. for any Kind K in [DefinitelyCalled, NotCalled, MaybeCalled]:
136 // Escaped | K == K
137 // Escaped mirrors other statuses after joins.
138 // Every situation, when we join any of the listed kinds K,
139 // is a violation. For this reason, in order to assume the
140 // best outcome for this escape, we consider it to be the
141 // same as the other path.
142 //
143 // 6. for any Kind K in [DefinitelyCalled, NotCalled]:
144 // MaybeCalled | K == MaybeCalled
145 // MaybeCalled should basically stay after almost every join.
146 enum Kind {
147 // No-return paths should be absolutely transparent for the analysis.
148 // 0x0 is the identity element for selected join operation (binary or).
149 NoReturn = 0x0, /* 0000 */
150 // Escaped marks situations when marked parameter escaped into
151 // another function (so we can assume that it was possibly called there).
152 Escaped = 0x1, /* 0001 */
153 // Parameter was definitely called once at this point.
154 DefinitelyCalled = 0x3, /* 0011 */
155 // Kinds less or equal to NON_ERROR_STATUS are not considered errors.
156 NON_ERROR_STATUS = DefinitelyCalled,
157 // Parameter was not yet called.
158 NotCalled = 0x5, /* 0101 */
159 // Parameter was not called at least on one path leading to this point,
160 // while there is also at least one path that it gets called.
161 MaybeCalled = 0x7, /* 0111 */
162 // Parameter was not yet analyzed.
163 NotVisited = 0x8, /* 1000 */
164 // We already reported a violation and stopped tracking calls for this
165 // parameter.
166 Reported = 0xF, /* 1111 */
167 LLVM_MARK_AS_BITMASK_ENUM(/* LargestValue = */ Reported)
168 };
169
170 constexpr ParameterStatus() = default;
ParameterStatus(Kind K)171 /* implicit */ ParameterStatus(Kind K) : StatusKind(K) {
172 assert(!seenAnyCalls(K) && "Can't initialize status without a call");
173 }
ParameterStatus(Kind K,const Expr * Call)174 ParameterStatus(Kind K, const Expr *Call) : StatusKind(K), Call(Call) {
175 assert(seenAnyCalls(K) && "This kind is not supposed to have a call");
176 }
177
getCall() const178 const Expr &getCall() const {
179 assert(seenAnyCalls(getKind()) && "ParameterStatus doesn't have a call");
180 return *Call;
181 }
seenAnyCalls(Kind K)182 static bool seenAnyCalls(Kind K) {
183 return (K & DefinitelyCalled) == DefinitelyCalled && K != Reported;
184 }
seenAnyCalls() const185 bool seenAnyCalls() const { return seenAnyCalls(getKind()); }
186
isErrorStatus(Kind K)187 static bool isErrorStatus(Kind K) { return K > NON_ERROR_STATUS; }
isErrorStatus() const188 bool isErrorStatus() const { return isErrorStatus(getKind()); }
189
getKind() const190 Kind getKind() const { return StatusKind; }
191
join(const ParameterStatus & Other)192 void join(const ParameterStatus &Other) {
193 // If we have a pointer already, let's keep it.
194 // For the purposes of the analysis, it doesn't really matter
195 // which call we report.
196 //
197 // If we don't have a pointer, let's take whatever gets joined.
198 if (!Call) {
199 Call = Other.Call;
200 }
201 // Join kinds.
202 StatusKind |= Other.getKind();
203 }
204
operator ==(const ParameterStatus & Other) const205 bool operator==(const ParameterStatus &Other) const {
206 // We compare only kinds, pointers on their own is only additional
207 // information.
208 return getKind() == Other.getKind();
209 }
210
211 private:
212 // It would've been a perfect place to use llvm::PointerIntPair, but
213 // unfortunately NumLowBitsAvailable for clang::Expr had been reduced to 2.
214 Kind StatusKind = NotVisited;
215 const Expr *Call = nullptr;
216 };
217
218 /// State aggregates statuses of all tracked parameters.
219 class State {
220 public:
State(unsigned Size,ParameterStatus::Kind K=ParameterStatus::NotVisited)221 State(unsigned Size, ParameterStatus::Kind K = ParameterStatus::NotVisited)
222 : ParamData(Size, K) {}
223
224 /// Return status of a parameter with the given index.
225 /// \{
getStatusFor(unsigned Index)226 ParameterStatus &getStatusFor(unsigned Index) { return ParamData[Index]; }
getStatusFor(unsigned Index) const227 const ParameterStatus &getStatusFor(unsigned Index) const {
228 return ParamData[Index];
229 }
230 /// \}
231
232 /// Return true if parameter with the given index can be called.
seenAnyCalls(unsigned Index) const233 bool seenAnyCalls(unsigned Index) const {
234 return getStatusFor(Index).seenAnyCalls();
235 }
236 /// Return a reference that we consider a call.
237 ///
238 /// Should only be used for parameters that can be called.
getCallFor(unsigned Index) const239 const Expr &getCallFor(unsigned Index) const {
240 return getStatusFor(Index).getCall();
241 }
242 /// Return status kind of parameter with the given index.
getKindFor(unsigned Index) const243 ParameterStatus::Kind getKindFor(unsigned Index) const {
244 return getStatusFor(Index).getKind();
245 }
246
isVisited() const247 bool isVisited() const {
248 return llvm::all_of(ParamData, [](const ParameterStatus &S) {
249 return S.getKind() != ParameterStatus::NotVisited;
250 });
251 }
252
253 // Join other state into the current state.
join(const State & Other)254 void join(const State &Other) {
255 assert(ParamData.size() == Other.ParamData.size() &&
256 "Couldn't join statuses with different sizes");
257 for (auto Pair : llvm::zip(ParamData, Other.ParamData)) {
258 std::get<0>(Pair).join(std::get<1>(Pair));
259 }
260 }
261
262 using iterator = ParamSizedVector<ParameterStatus>::iterator;
263 using const_iterator = ParamSizedVector<ParameterStatus>::const_iterator;
264
begin()265 iterator begin() { return ParamData.begin(); }
end()266 iterator end() { return ParamData.end(); }
267
begin() const268 const_iterator begin() const { return ParamData.begin(); }
end() const269 const_iterator end() const { return ParamData.end(); }
270
operator ==(const State & Other) const271 bool operator==(const State &Other) const {
272 return ParamData == Other.ParamData;
273 }
274
275 private:
276 ParamSizedVector<ParameterStatus> ParamData;
277 };
278
279 /// A simple class that finds DeclRefExpr in the given expression.
280 ///
281 /// However, we don't want to find ANY nested DeclRefExpr skipping whatever
282 /// expressions on our way. Only certain expressions considered "no-op"
283 /// for our task are indeed skipped.
284 class DeclRefFinder
285 : public ConstStmtVisitor<DeclRefFinder, const DeclRefExpr *> {
286 public:
287 /// Find a DeclRefExpr in the given expression.
288 ///
289 /// In its most basic form (ShouldRetrieveFromComparisons == false),
290 /// this function can be simply reduced to the following question:
291 ///
292 /// - If expression E is used as a function argument, could we say
293 /// that DeclRefExpr nested in E is used as an argument?
294 ///
295 /// According to this rule, we can say that parens, casts and dereferencing
296 /// (dereferencing only applied to function pointers, but this is our case)
297 /// can be skipped.
298 ///
299 /// When we should look into comparisons the question changes to:
300 ///
301 /// - If expression E is used as a condition, could we say that
302 /// DeclRefExpr is being checked?
303 ///
304 /// And even though, these are two different questions, they have quite a lot
305 /// in common. Actually, we can say that whatever expression answers
306 /// positively the first question also fits the second question as well.
307 ///
308 /// In addition, we skip binary operators == and !=, and unary opeartor !.
find(const Expr * E,bool ShouldRetrieveFromComparisons=false)309 static const DeclRefExpr *find(const Expr *E,
310 bool ShouldRetrieveFromComparisons = false) {
311 return DeclRefFinder(ShouldRetrieveFromComparisons).Visit(E);
312 }
313
VisitDeclRefExpr(const DeclRefExpr * DR)314 const DeclRefExpr *VisitDeclRefExpr(const DeclRefExpr *DR) { return DR; }
315
VisitUnaryOperator(const UnaryOperator * UO)316 const DeclRefExpr *VisitUnaryOperator(const UnaryOperator *UO) {
317 switch (UO->getOpcode()) {
318 case UO_LNot:
319 // We care about logical not only if we care about comparisons.
320 if (!ShouldRetrieveFromComparisons)
321 return nullptr;
322 [[fallthrough]];
323 // Function pointer/references can be dereferenced before a call.
324 // That doesn't make it, however, any different from a regular call.
325 // For this reason, dereference operation is a "no-op".
326 case UO_Deref:
327 return Visit(UO->getSubExpr());
328 default:
329 return nullptr;
330 }
331 }
332
VisitBinaryOperator(const BinaryOperator * BO)333 const DeclRefExpr *VisitBinaryOperator(const BinaryOperator *BO) {
334 if (!ShouldRetrieveFromComparisons)
335 return nullptr;
336
337 switch (BO->getOpcode()) {
338 case BO_EQ:
339 case BO_NE: {
340 const DeclRefExpr *LHS = Visit(BO->getLHS());
341 return LHS ? LHS : Visit(BO->getRHS());
342 }
343 default:
344 return nullptr;
345 }
346 }
347
VisitOpaqueValueExpr(const OpaqueValueExpr * OVE)348 const DeclRefExpr *VisitOpaqueValueExpr(const OpaqueValueExpr *OVE) {
349 return Visit(OVE->getSourceExpr());
350 }
351
VisitCallExpr(const CallExpr * CE)352 const DeclRefExpr *VisitCallExpr(const CallExpr *CE) {
353 if (!ShouldRetrieveFromComparisons)
354 return nullptr;
355
356 // We want to see through some of the boolean builtin functions
357 // that we are likely to see in conditions.
358 switch (CE->getBuiltinCallee()) {
359 case Builtin::BI__builtin_expect:
360 case Builtin::BI__builtin_expect_with_probability: {
361 assert(CE->getNumArgs() >= 2);
362
363 const DeclRefExpr *Candidate = Visit(CE->getArg(0));
364 return Candidate != nullptr ? Candidate : Visit(CE->getArg(1));
365 }
366
367 case Builtin::BI__builtin_unpredictable:
368 return Visit(CE->getArg(0));
369
370 default:
371 return nullptr;
372 }
373 }
374
VisitExpr(const Expr * E)375 const DeclRefExpr *VisitExpr(const Expr *E) {
376 // It is a fallback method that gets called whenever the actual type
377 // of the given expression is not covered.
378 //
379 // We first check if we have anything to skip. And then repeat the whole
380 // procedure for a nested expression instead.
381 const Expr *DeclutteredExpr = E->IgnoreParenCasts();
382 return E != DeclutteredExpr ? Visit(DeclutteredExpr) : nullptr;
383 }
384
385 private:
DeclRefFinder(bool ShouldRetrieveFromComparisons)386 DeclRefFinder(bool ShouldRetrieveFromComparisons)
387 : ShouldRetrieveFromComparisons(ShouldRetrieveFromComparisons) {}
388
389 bool ShouldRetrieveFromComparisons;
390 };
391
findDeclRefExpr(const Expr * In,bool ShouldRetrieveFromComparisons=false)392 const DeclRefExpr *findDeclRefExpr(const Expr *In,
393 bool ShouldRetrieveFromComparisons = false) {
394 return DeclRefFinder::find(In, ShouldRetrieveFromComparisons);
395 }
396
397 const ParmVarDecl *
findReferencedParmVarDecl(const Expr * In,bool ShouldRetrieveFromComparisons=false)398 findReferencedParmVarDecl(const Expr *In,
399 bool ShouldRetrieveFromComparisons = false) {
400 if (const DeclRefExpr *DR =
401 findDeclRefExpr(In, ShouldRetrieveFromComparisons)) {
402 return dyn_cast<ParmVarDecl>(DR->getDecl());
403 }
404
405 return nullptr;
406 }
407
408 /// Return conditions expression of a statement if it has one.
getCondition(const Stmt * S)409 const Expr *getCondition(const Stmt *S) {
410 if (!S) {
411 return nullptr;
412 }
413
414 if (const auto *If = dyn_cast<IfStmt>(S)) {
415 return If->getCond();
416 }
417 if (const auto *Ternary = dyn_cast<AbstractConditionalOperator>(S)) {
418 return Ternary->getCond();
419 }
420
421 return nullptr;
422 }
423
424 /// A small helper class that collects all named identifiers in the given
425 /// expression. It traverses it recursively, so names from deeper levels
426 /// of the AST will end up in the results.
427 /// Results might have duplicate names, if this is a problem, convert to
428 /// string sets afterwards.
429 class NamesCollector : public RecursiveASTVisitor<NamesCollector> {
430 public:
431 static constexpr unsigned EXPECTED_NUMBER_OF_NAMES = 5;
432 using NameCollection =
433 llvm::SmallVector<llvm::StringRef, EXPECTED_NUMBER_OF_NAMES>;
434
collect(const Expr * From)435 static NameCollection collect(const Expr *From) {
436 NamesCollector Impl;
437 Impl.TraverseStmt(const_cast<Expr *>(From));
438 return Impl.Result;
439 }
440
VisitDeclRefExpr(const DeclRefExpr * E)441 bool VisitDeclRefExpr(const DeclRefExpr *E) {
442 Result.push_back(E->getDecl()->getName());
443 return true;
444 }
445
VisitObjCPropertyRefExpr(const ObjCPropertyRefExpr * E)446 bool VisitObjCPropertyRefExpr(const ObjCPropertyRefExpr *E) {
447 llvm::StringRef Name;
448
449 if (E->isImplicitProperty()) {
450 ObjCMethodDecl *PropertyMethodDecl = nullptr;
451 if (E->isMessagingGetter()) {
452 PropertyMethodDecl = E->getImplicitPropertyGetter();
453 } else {
454 PropertyMethodDecl = E->getImplicitPropertySetter();
455 }
456 assert(PropertyMethodDecl &&
457 "Implicit property must have associated declaration");
458 Name = PropertyMethodDecl->getSelector().getNameForSlot(0);
459 } else {
460 assert(E->isExplicitProperty());
461 Name = E->getExplicitProperty()->getName();
462 }
463
464 Result.push_back(Name);
465 return true;
466 }
467
468 private:
469 NamesCollector() = default;
470 NameCollection Result;
471 };
472
473 /// Check whether the given expression mentions any of conventional names.
mentionsAnyOfConventionalNames(const Expr * E)474 bool mentionsAnyOfConventionalNames(const Expr *E) {
475 NamesCollector::NameCollection MentionedNames = NamesCollector::collect(E);
476
477 return llvm::any_of(MentionedNames, [](llvm::StringRef ConditionName) {
478 return llvm::any_of(
479 CONVENTIONAL_CONDITIONS,
480 [ConditionName](const llvm::StringLiteral &Conventional) {
481 return ConditionName.contains_insensitive(Conventional);
482 });
483 });
484 }
485
486 /// Clarification is a simple pair of a reason why parameter is not called
487 /// on every path and a statement to blame.
488 struct Clarification {
489 NeverCalledReason Reason;
490 const Stmt *Location;
491 };
492
493 /// A helper class that can produce a clarification based on the given pair
494 /// of basic blocks.
495 class NotCalledClarifier
496 : public ConstStmtVisitor<NotCalledClarifier,
497 std::optional<Clarification>> {
498 public:
499 /// The main entrypoint for the class, the function that tries to find the
500 /// clarification of how to explain which sub-path starts with a CFG edge
501 /// from Conditional to SuccWithoutCall.
502 ///
503 /// This means that this function has one precondition:
504 /// SuccWithoutCall should be a successor block for Conditional.
505 ///
506 /// Because clarification is not needed for non-trivial pairs of blocks
507 /// (i.e. SuccWithoutCall is not the only successor), it returns meaningful
508 /// results only for such cases. For this very reason, the parent basic
509 /// block, Conditional, is named that way, so it is clear what kind of
510 /// block is expected.
clarify(const CFGBlock * Conditional,const CFGBlock * SuccWithoutCall)511 static std::optional<Clarification> clarify(const CFGBlock *Conditional,
512 const CFGBlock *SuccWithoutCall) {
513 if (const Stmt *Terminator = Conditional->getTerminatorStmt()) {
514 return NotCalledClarifier{Conditional, SuccWithoutCall}.Visit(Terminator);
515 }
516 return std::nullopt;
517 }
518
VisitIfStmt(const IfStmt * If)519 std::optional<Clarification> VisitIfStmt(const IfStmt *If) {
520 return VisitBranchingBlock(If, NeverCalledReason::IfThen);
521 }
522
523 std::optional<Clarification>
VisitAbstractConditionalOperator(const AbstractConditionalOperator * Ternary)524 VisitAbstractConditionalOperator(const AbstractConditionalOperator *Ternary) {
525 return VisitBranchingBlock(Ternary, NeverCalledReason::IfThen);
526 }
527
VisitSwitchStmt(const SwitchStmt * Switch)528 std::optional<Clarification> VisitSwitchStmt(const SwitchStmt *Switch) {
529 const Stmt *CaseToBlame = SuccInQuestion->getLabel();
530 if (!CaseToBlame) {
531 // If interesting basic block is not labeled, it means that this
532 // basic block does not represent any of the cases.
533 return Clarification{NeverCalledReason::SwitchSkipped, Switch};
534 }
535
536 for (const SwitchCase *Case = Switch->getSwitchCaseList(); Case;
537 Case = Case->getNextSwitchCase()) {
538 if (Case == CaseToBlame) {
539 return Clarification{NeverCalledReason::Switch, Case};
540 }
541 }
542
543 llvm_unreachable("Found unexpected switch structure");
544 }
545
VisitForStmt(const ForStmt * For)546 std::optional<Clarification> VisitForStmt(const ForStmt *For) {
547 return VisitBranchingBlock(For, NeverCalledReason::LoopEntered);
548 }
549
VisitWhileStmt(const WhileStmt * While)550 std::optional<Clarification> VisitWhileStmt(const WhileStmt *While) {
551 return VisitBranchingBlock(While, NeverCalledReason::LoopEntered);
552 }
553
554 std::optional<Clarification>
VisitBranchingBlock(const Stmt * Terminator,NeverCalledReason DefaultReason)555 VisitBranchingBlock(const Stmt *Terminator, NeverCalledReason DefaultReason) {
556 assert(Parent->succ_size() == 2 &&
557 "Branching block should have exactly two successors");
558 unsigned SuccessorIndex = getSuccessorIndex(Parent, SuccInQuestion);
559 NeverCalledReason ActualReason =
560 updateForSuccessor(DefaultReason, SuccessorIndex);
561 return Clarification{ActualReason, Terminator};
562 }
563
VisitBinaryOperator(const BinaryOperator *)564 std::optional<Clarification> VisitBinaryOperator(const BinaryOperator *) {
565 // We don't want to report on short-curcuit logical operations.
566 return std::nullopt;
567 }
568
VisitStmt(const Stmt * Terminator)569 std::optional<Clarification> VisitStmt(const Stmt *Terminator) {
570 // If we got here, we didn't have a visit function for more derived
571 // classes of statement that this terminator actually belongs to.
572 //
573 // This is not a good scenario and should not happen in practice, but
574 // at least we'll warn the user.
575 return Clarification{NeverCalledReason::FallbackReason, Terminator};
576 }
577
getSuccessorIndex(const CFGBlock * Parent,const CFGBlock * Child)578 static unsigned getSuccessorIndex(const CFGBlock *Parent,
579 const CFGBlock *Child) {
580 CFGBlock::const_succ_iterator It = llvm::find(Parent->succs(), Child);
581 assert(It != Parent->succ_end() &&
582 "Given blocks should be in parent-child relationship");
583 return It - Parent->succ_begin();
584 }
585
586 static NeverCalledReason
updateForSuccessor(NeverCalledReason ReasonForTrueBranch,unsigned SuccessorIndex)587 updateForSuccessor(NeverCalledReason ReasonForTrueBranch,
588 unsigned SuccessorIndex) {
589 assert(SuccessorIndex <= 1);
590 unsigned RawReason =
591 static_cast<unsigned>(ReasonForTrueBranch) + SuccessorIndex;
592 assert(RawReason <=
593 static_cast<unsigned>(NeverCalledReason::LARGEST_VALUE));
594 return static_cast<NeverCalledReason>(RawReason);
595 }
596
597 private:
NotCalledClarifier(const CFGBlock * Parent,const CFGBlock * SuccInQuestion)598 NotCalledClarifier(const CFGBlock *Parent, const CFGBlock *SuccInQuestion)
599 : Parent(Parent), SuccInQuestion(SuccInQuestion) {}
600
601 const CFGBlock *Parent, *SuccInQuestion;
602 };
603
604 class CalledOnceChecker : public ConstStmtVisitor<CalledOnceChecker> {
605 public:
check(AnalysisDeclContext & AC,CalledOnceCheckHandler & Handler,bool CheckConventionalParameters)606 static void check(AnalysisDeclContext &AC, CalledOnceCheckHandler &Handler,
607 bool CheckConventionalParameters) {
608 CalledOnceChecker(AC, Handler, CheckConventionalParameters).check();
609 }
610
611 private:
CalledOnceChecker(AnalysisDeclContext & AC,CalledOnceCheckHandler & Handler,bool CheckConventionalParameters)612 CalledOnceChecker(AnalysisDeclContext &AC, CalledOnceCheckHandler &Handler,
613 bool CheckConventionalParameters)
614 : FunctionCFG(*AC.getCFG()), AC(AC), Handler(Handler),
615 CheckConventionalParameters(CheckConventionalParameters),
616 CurrentState(0) {
617 initDataStructures();
618 assert((size() == 0 || !States.empty()) &&
619 "Data structures are inconsistent");
620 }
621
622 //===----------------------------------------------------------------------===//
623 // Initializing functions
624 //===----------------------------------------------------------------------===//
625
initDataStructures()626 void initDataStructures() {
627 const Decl *AnalyzedDecl = AC.getDecl();
628
629 if (const auto *Function = dyn_cast<FunctionDecl>(AnalyzedDecl)) {
630 findParamsToTrack(Function);
631 } else if (const auto *Method = dyn_cast<ObjCMethodDecl>(AnalyzedDecl)) {
632 findParamsToTrack(Method);
633 } else if (const auto *Block = dyn_cast<BlockDecl>(AnalyzedDecl)) {
634 findCapturesToTrack(Block);
635 findParamsToTrack(Block);
636 }
637
638 // Have something to track, let's init states for every block from the CFG.
639 if (size() != 0) {
640 States =
641 CFGSizedVector<State>(FunctionCFG.getNumBlockIDs(), State(size()));
642 }
643 }
644
findCapturesToTrack(const BlockDecl * Block)645 void findCapturesToTrack(const BlockDecl *Block) {
646 for (const auto &Capture : Block->captures()) {
647 if (const auto *P = dyn_cast<ParmVarDecl>(Capture.getVariable())) {
648 // Parameter DeclContext is its owning function or method.
649 const DeclContext *ParamContext = P->getDeclContext();
650 if (shouldBeCalledOnce(ParamContext, P)) {
651 TrackedParams.push_back(P);
652 }
653 }
654 }
655 }
656
657 template <class FunctionLikeDecl>
findParamsToTrack(const FunctionLikeDecl * Function)658 void findParamsToTrack(const FunctionLikeDecl *Function) {
659 for (unsigned Index : llvm::seq<unsigned>(0u, Function->param_size())) {
660 if (shouldBeCalledOnce(Function, Index)) {
661 TrackedParams.push_back(Function->getParamDecl(Index));
662 }
663 }
664 }
665
666 //===----------------------------------------------------------------------===//
667 // Main logic 'check' functions
668 //===----------------------------------------------------------------------===//
669
check()670 void check() {
671 // Nothing to check here: we don't have marked parameters.
672 if (size() == 0 || isPossiblyEmptyImpl())
673 return;
674
675 assert(
676 llvm::none_of(States, [](const State &S) { return S.isVisited(); }) &&
677 "None of the blocks should be 'visited' before the analysis");
678
679 // For our task, both backward and forward approaches suite well.
680 // However, in order to report better diagnostics, we decided to go with
681 // backward analysis.
682 //
683 // Let's consider the following CFG and how forward and backward analyses
684 // will work for it.
685 //
686 // FORWARD: | BACKWARD:
687 // #1 | #1
688 // +---------+ | +-----------+
689 // | if | | |MaybeCalled|
690 // +---------+ | +-----------+
691 // |NotCalled| | | if |
692 // +---------+ | +-----------+
693 // / \ | / \
694 // #2 / \ #3 | #2 / \ #3
695 // +----------------+ +---------+ | +----------------+ +---------+
696 // | foo() | | ... | | |DefinitelyCalled| |NotCalled|
697 // +----------------+ +---------+ | +----------------+ +---------+
698 // |DefinitelyCalled| |NotCalled| | | foo() | | ... |
699 // +----------------+ +---------+ | +----------------+ +---------+
700 // \ / | \ /
701 // \ #4 / | \ #4 /
702 // +-----------+ | +---------+
703 // | ... | | |NotCalled|
704 // +-----------+ | +---------+
705 // |MaybeCalled| | | ... |
706 // +-----------+ | +---------+
707 //
708 // The most natural way to report lacking call in the block #3 would be to
709 // message that the false branch of the if statement in the block #1 doesn't
710 // have a call. And while with the forward approach we'll need to find a
711 // least common ancestor or something like that to find the 'if' to blame,
712 // backward analysis gives it to us out of the box.
713 BackwardDataflowWorklist Worklist(FunctionCFG, AC);
714
715 // Let's visit EXIT.
716 const CFGBlock *Exit = &FunctionCFG.getExit();
717 assignState(Exit, State(size(), ParameterStatus::NotCalled));
718 Worklist.enqueuePredecessors(Exit);
719
720 while (const CFGBlock *BB = Worklist.dequeue()) {
721 assert(BB && "Worklist should filter out null blocks");
722 check(BB);
723 assert(CurrentState.isVisited() &&
724 "After the check, basic block should be visited");
725
726 // Traverse successor basic blocks if the status of this block
727 // has changed.
728 if (assignState(BB, CurrentState)) {
729 Worklist.enqueuePredecessors(BB);
730 }
731 }
732
733 // Check that we have all tracked parameters at the last block.
734 // As we are performing a backward version of the analysis,
735 // it should be the ENTRY block.
736 checkEntry(&FunctionCFG.getEntry());
737 }
738
check(const CFGBlock * BB)739 void check(const CFGBlock *BB) {
740 // We start with a state 'inherited' from all the successors.
741 CurrentState = joinSuccessors(BB);
742 assert(CurrentState.isVisited() &&
743 "Shouldn't start with a 'not visited' state");
744
745 // This is the 'exit' situation, broken promises are probably OK
746 // in such scenarios.
747 if (BB->hasNoReturnElement()) {
748 markNoReturn();
749 // This block still can have calls (even multiple calls) and
750 // for this reason there is no early return here.
751 }
752
753 // We use a backward dataflow propagation and for this reason we
754 // should traverse basic blocks bottom-up.
755 for (const CFGElement &Element : llvm::reverse(*BB)) {
756 if (std::optional<CFGStmt> S = Element.getAs<CFGStmt>()) {
757 check(S->getStmt());
758 }
759 }
760 }
check(const Stmt * S)761 void check(const Stmt *S) { Visit(S); }
762
checkEntry(const CFGBlock * Entry)763 void checkEntry(const CFGBlock *Entry) {
764 // We finalize this algorithm with the ENTRY block because
765 // we use a backward version of the analysis. This is where
766 // we can judge that some of the tracked parameters are not called on
767 // every path from ENTRY to EXIT.
768
769 const State &EntryStatus = getState(Entry);
770 llvm::BitVector NotCalledOnEveryPath(size(), false);
771 llvm::BitVector NotUsedOnEveryPath(size(), false);
772
773 // Check if there are no calls of the marked parameter at all
774 for (const auto &IndexedStatus : llvm::enumerate(EntryStatus)) {
775 const ParmVarDecl *Parameter = getParameter(IndexedStatus.index());
776
777 switch (IndexedStatus.value().getKind()) {
778 case ParameterStatus::NotCalled:
779 // If there were places where this parameter escapes (aka being used),
780 // we can provide a more useful diagnostic by pointing at the exact
781 // branches where it is not even mentioned.
782 if (!hasEverEscaped(IndexedStatus.index())) {
783 // This parameter is was not used at all, so we should report the
784 // most generic version of the warning.
785 if (isCaptured(Parameter)) {
786 // We want to specify that it was captured by the block.
787 Handler.handleCapturedNeverCalled(Parameter, AC.getDecl(),
788 !isExplicitlyMarked(Parameter));
789 } else {
790 Handler.handleNeverCalled(Parameter,
791 !isExplicitlyMarked(Parameter));
792 }
793 } else {
794 // Mark it as 'interesting' to figure out which paths don't even
795 // have escapes.
796 NotUsedOnEveryPath[IndexedStatus.index()] = true;
797 }
798
799 break;
800 case ParameterStatus::MaybeCalled:
801 // If we have 'maybe called' at this point, we have an error
802 // that there is at least one path where this parameter
803 // is not called.
804 //
805 // However, reporting the warning with only that information can be
806 // too vague for the users. For this reason, we mark such parameters
807 // as "interesting" for further analysis.
808 NotCalledOnEveryPath[IndexedStatus.index()] = true;
809 break;
810 default:
811 break;
812 }
813 }
814
815 // Early exit if we don't have parameters for extra analysis...
816 if (NotCalledOnEveryPath.none() && NotUsedOnEveryPath.none() &&
817 // ... or if we've seen variables with cleanup functions.
818 // We can't reason that we've seen every path in this case,
819 // and thus abandon reporting any warnings that imply that.
820 !FunctionHasCleanupVars)
821 return;
822
823 // We are looking for a pair of blocks A, B so that the following is true:
824 // * A is a predecessor of B
825 // * B is marked as NotCalled
826 // * A has at least one successor marked as either
827 // Escaped or DefinitelyCalled
828 //
829 // In that situation, it is guaranteed that B is the first block of the path
830 // where the user doesn't call or use parameter in question.
831 //
832 // For this reason, branch A -> B can be used for reporting.
833 //
834 // This part of the algorithm is guarded by a condition that the function
835 // does indeed have a violation of contract. For this reason, we can
836 // spend more time to find a good spot to place the warning.
837 //
838 // The following algorithm has the worst case complexity of O(V + E),
839 // where V is the number of basic blocks in FunctionCFG,
840 // E is the number of edges between blocks in FunctionCFG.
841 for (const CFGBlock *BB : FunctionCFG) {
842 if (!BB)
843 continue;
844
845 const State &BlockState = getState(BB);
846
847 for (unsigned Index : llvm::seq(0u, size())) {
848 // We don't want to use 'isLosingCall' here because we want to report
849 // the following situation as well:
850 //
851 // MaybeCalled
852 // | ... |
853 // MaybeCalled NotCalled
854 //
855 // Even though successor is not 'DefinitelyCalled', it is still useful
856 // to report it, it is still a path without a call.
857 if (NotCalledOnEveryPath[Index] &&
858 BlockState.getKindFor(Index) == ParameterStatus::MaybeCalled) {
859
860 findAndReportNotCalledBranches(BB, Index);
861 } else if (NotUsedOnEveryPath[Index] &&
862 isLosingEscape(BlockState, BB, Index)) {
863
864 findAndReportNotCalledBranches(BB, Index, /* IsEscape = */ true);
865 }
866 }
867 }
868 }
869
870 /// Check potential call of a tracked parameter.
checkDirectCall(const CallExpr * Call)871 void checkDirectCall(const CallExpr *Call) {
872 if (auto Index = getIndexOfCallee(Call)) {
873 processCallFor(*Index, Call);
874 }
875 }
876
877 /// Check the call expression for being an indirect call of one of the tracked
878 /// parameters. It is indirect in the sense that this particular call is not
879 /// calling the parameter itself, but rather uses it as the argument.
880 template <class CallLikeExpr>
checkIndirectCall(const CallLikeExpr * CallOrMessage)881 void checkIndirectCall(const CallLikeExpr *CallOrMessage) {
882 // CallExpr::arguments does not interact nicely with llvm::enumerate.
883 llvm::ArrayRef<const Expr *> Arguments =
884 llvm::ArrayRef(CallOrMessage->getArgs(), CallOrMessage->getNumArgs());
885
886 // Let's check if any of the call arguments is a point of interest.
887 for (const auto &Argument : llvm::enumerate(Arguments)) {
888 if (auto Index = getIndexOfExpression(Argument.value())) {
889 if (shouldBeCalledOnce(CallOrMessage, Argument.index())) {
890 // If the corresponding parameter is marked as 'called_once' we should
891 // consider it as a call.
892 processCallFor(*Index, CallOrMessage);
893 } else {
894 // Otherwise, we mark this parameter as escaped, which can be
895 // interpreted both as called or not called depending on the context.
896 processEscapeFor(*Index);
897 }
898 // Otherwise, let's keep the state as it is.
899 }
900 }
901 }
902
903 /// Process call of the parameter with the given index
processCallFor(unsigned Index,const Expr * Call)904 void processCallFor(unsigned Index, const Expr *Call) {
905 ParameterStatus &CurrentParamStatus = CurrentState.getStatusFor(Index);
906
907 if (CurrentParamStatus.seenAnyCalls()) {
908
909 // At this point, this parameter was called, so this is a second call.
910 const ParmVarDecl *Parameter = getParameter(Index);
911 Handler.handleDoubleCall(
912 Parameter, &CurrentState.getCallFor(Index), Call,
913 !isExplicitlyMarked(Parameter),
914 // We are sure that the second call is definitely
915 // going to happen if the status is 'DefinitelyCalled'.
916 CurrentParamStatus.getKind() == ParameterStatus::DefinitelyCalled);
917
918 // Mark this parameter as already reported on, so we don't repeat
919 // warnings.
920 CurrentParamStatus = ParameterStatus::Reported;
921
922 } else if (CurrentParamStatus.getKind() != ParameterStatus::Reported) {
923 // If we didn't report anything yet, let's mark this parameter
924 // as called.
925 ParameterStatus Called(ParameterStatus::DefinitelyCalled, Call);
926 CurrentParamStatus = Called;
927 }
928 }
929
930 /// Process escape of the parameter with the given index
processEscapeFor(unsigned Index)931 void processEscapeFor(unsigned Index) {
932 ParameterStatus &CurrentParamStatus = CurrentState.getStatusFor(Index);
933
934 // Escape overrides whatever error we think happened.
935 if (CurrentParamStatus.isErrorStatus() &&
936 CurrentParamStatus.getKind() != ParameterStatus::Kind::Reported) {
937 CurrentParamStatus = ParameterStatus::Escaped;
938 }
939 }
940
findAndReportNotCalledBranches(const CFGBlock * Parent,unsigned Index,bool IsEscape=false)941 void findAndReportNotCalledBranches(const CFGBlock *Parent, unsigned Index,
942 bool IsEscape = false) {
943 for (const CFGBlock *Succ : Parent->succs()) {
944 if (!Succ)
945 continue;
946
947 if (getState(Succ).getKindFor(Index) == ParameterStatus::NotCalled) {
948 assert(Parent->succ_size() >= 2 &&
949 "Block should have at least two successors at this point");
950 if (auto Clarification = NotCalledClarifier::clarify(Parent, Succ)) {
951 const ParmVarDecl *Parameter = getParameter(Index);
952 Handler.handleNeverCalled(
953 Parameter, AC.getDecl(), Clarification->Location,
954 Clarification->Reason, !IsEscape, !isExplicitlyMarked(Parameter));
955 }
956 }
957 }
958 }
959
960 //===----------------------------------------------------------------------===//
961 // Predicate functions to check parameters
962 //===----------------------------------------------------------------------===//
963
964 /// Return true if parameter is explicitly marked as 'called_once'.
isExplicitlyMarked(const ParmVarDecl * Parameter)965 static bool isExplicitlyMarked(const ParmVarDecl *Parameter) {
966 return Parameter->hasAttr<CalledOnceAttr>();
967 }
968
969 /// Return true if the given name matches conventional pattens.
isConventional(llvm::StringRef Name)970 static bool isConventional(llvm::StringRef Name) {
971 return llvm::count(CONVENTIONAL_NAMES, Name) != 0;
972 }
973
974 /// Return true if the given name has conventional suffixes.
hasConventionalSuffix(llvm::StringRef Name)975 static bool hasConventionalSuffix(llvm::StringRef Name) {
976 return llvm::any_of(CONVENTIONAL_SUFFIXES, [Name](llvm::StringRef Suffix) {
977 return Name.ends_with(Suffix);
978 });
979 }
980
981 /// Return true if the given type can be used for conventional parameters.
isConventional(QualType Ty)982 static bool isConventional(QualType Ty) {
983 if (!Ty->isBlockPointerType()) {
984 return false;
985 }
986
987 QualType BlockType = Ty->castAs<BlockPointerType>()->getPointeeType();
988 // Completion handlers should have a block type with void return type.
989 return BlockType->castAs<FunctionType>()->getReturnType()->isVoidType();
990 }
991
992 /// Return true if the only parameter of the function is conventional.
isOnlyParameterConventional(const FunctionDecl * Function)993 static bool isOnlyParameterConventional(const FunctionDecl *Function) {
994 IdentifierInfo *II = Function->getIdentifier();
995 return Function->getNumParams() == 1 && II &&
996 hasConventionalSuffix(II->getName());
997 }
998
999 /// Return true/false if 'swift_async' attribute states that the given
1000 /// parameter is conventionally called once.
1001 /// Return std::nullopt if the given declaration doesn't have 'swift_async'
1002 /// attribute.
isConventionalSwiftAsync(const Decl * D,unsigned ParamIndex)1003 static std::optional<bool> isConventionalSwiftAsync(const Decl *D,
1004 unsigned ParamIndex) {
1005 if (const SwiftAsyncAttr *A = D->getAttr<SwiftAsyncAttr>()) {
1006 if (A->getKind() == SwiftAsyncAttr::None) {
1007 return false;
1008 }
1009
1010 return A->getCompletionHandlerIndex().getASTIndex() == ParamIndex;
1011 }
1012 return std::nullopt;
1013 }
1014
1015 /// Return true if the specified selector represents init method.
isInitMethod(Selector MethodSelector)1016 static bool isInitMethod(Selector MethodSelector) {
1017 return MethodSelector.getMethodFamily() == OMF_init;
1018 }
1019
1020 /// Return true if the specified selector piece matches conventions.
isConventionalSelectorPiece(Selector MethodSelector,unsigned PieceIndex,QualType PieceType)1021 static bool isConventionalSelectorPiece(Selector MethodSelector,
1022 unsigned PieceIndex,
1023 QualType PieceType) {
1024 if (!isConventional(PieceType) || isInitMethod(MethodSelector)) {
1025 return false;
1026 }
1027
1028 if (MethodSelector.getNumArgs() == 1) {
1029 assert(PieceIndex == 0);
1030 return hasConventionalSuffix(MethodSelector.getNameForSlot(0));
1031 }
1032
1033 llvm::StringRef PieceName = MethodSelector.getNameForSlot(PieceIndex);
1034 return isConventional(PieceName) || hasConventionalSuffix(PieceName);
1035 }
1036
shouldBeCalledOnce(const ParmVarDecl * Parameter) const1037 bool shouldBeCalledOnce(const ParmVarDecl *Parameter) const {
1038 return isExplicitlyMarked(Parameter) ||
1039 (CheckConventionalParameters &&
1040 (isConventional(Parameter->getName()) ||
1041 hasConventionalSuffix(Parameter->getName())) &&
1042 isConventional(Parameter->getType()));
1043 }
1044
shouldBeCalledOnce(const DeclContext * ParamContext,const ParmVarDecl * Param)1045 bool shouldBeCalledOnce(const DeclContext *ParamContext,
1046 const ParmVarDecl *Param) {
1047 unsigned ParamIndex = Param->getFunctionScopeIndex();
1048 if (const auto *Function = dyn_cast<FunctionDecl>(ParamContext)) {
1049 return shouldBeCalledOnce(Function, ParamIndex);
1050 }
1051 if (const auto *Method = dyn_cast<ObjCMethodDecl>(ParamContext)) {
1052 return shouldBeCalledOnce(Method, ParamIndex);
1053 }
1054 return shouldBeCalledOnce(Param);
1055 }
1056
shouldBeCalledOnce(const BlockDecl * Block,unsigned ParamIndex) const1057 bool shouldBeCalledOnce(const BlockDecl *Block, unsigned ParamIndex) const {
1058 return shouldBeCalledOnce(Block->getParamDecl(ParamIndex));
1059 }
1060
shouldBeCalledOnce(const FunctionDecl * Function,unsigned ParamIndex) const1061 bool shouldBeCalledOnce(const FunctionDecl *Function,
1062 unsigned ParamIndex) const {
1063 if (ParamIndex >= Function->getNumParams()) {
1064 return false;
1065 }
1066 // 'swift_async' goes first and overrides anything else.
1067 if (auto ConventionalAsync =
1068 isConventionalSwiftAsync(Function, ParamIndex)) {
1069 return *ConventionalAsync;
1070 }
1071
1072 return shouldBeCalledOnce(Function->getParamDecl(ParamIndex)) ||
1073 (CheckConventionalParameters &&
1074 isOnlyParameterConventional(Function));
1075 }
1076
shouldBeCalledOnce(const ObjCMethodDecl * Method,unsigned ParamIndex) const1077 bool shouldBeCalledOnce(const ObjCMethodDecl *Method,
1078 unsigned ParamIndex) const {
1079 Selector MethodSelector = Method->getSelector();
1080 if (ParamIndex >= MethodSelector.getNumArgs()) {
1081 return false;
1082 }
1083
1084 // 'swift_async' goes first and overrides anything else.
1085 if (auto ConventionalAsync = isConventionalSwiftAsync(Method, ParamIndex)) {
1086 return *ConventionalAsync;
1087 }
1088
1089 const ParmVarDecl *Parameter = Method->getParamDecl(ParamIndex);
1090 return shouldBeCalledOnce(Parameter) ||
1091 (CheckConventionalParameters &&
1092 isConventionalSelectorPiece(MethodSelector, ParamIndex,
1093 Parameter->getType()));
1094 }
1095
shouldBeCalledOnce(const CallExpr * Call,unsigned ParamIndex) const1096 bool shouldBeCalledOnce(const CallExpr *Call, unsigned ParamIndex) const {
1097 const FunctionDecl *Function = Call->getDirectCallee();
1098 return Function && shouldBeCalledOnce(Function, ParamIndex);
1099 }
1100
shouldBeCalledOnce(const ObjCMessageExpr * Message,unsigned ParamIndex) const1101 bool shouldBeCalledOnce(const ObjCMessageExpr *Message,
1102 unsigned ParamIndex) const {
1103 const ObjCMethodDecl *Method = Message->getMethodDecl();
1104 return Method && ParamIndex < Method->param_size() &&
1105 shouldBeCalledOnce(Method, ParamIndex);
1106 }
1107
1108 //===----------------------------------------------------------------------===//
1109 // Utility methods
1110 //===----------------------------------------------------------------------===//
1111
isCaptured(const ParmVarDecl * Parameter) const1112 bool isCaptured(const ParmVarDecl *Parameter) const {
1113 if (const BlockDecl *Block = dyn_cast<BlockDecl>(AC.getDecl())) {
1114 return Block->capturesVariable(Parameter);
1115 }
1116 return false;
1117 }
1118
1119 // Return a call site where the block is called exactly once or null otherwise
getBlockGuaraneedCallSite(const BlockExpr * Block) const1120 const Expr *getBlockGuaraneedCallSite(const BlockExpr *Block) const {
1121 ParentMap &PM = AC.getParentMap();
1122
1123 // We don't want to track the block through assignments and so on, instead
1124 // we simply see how the block used and if it's used directly in a call,
1125 // we decide based on call to what it is.
1126 //
1127 // In order to do this, we go up the parents of the block looking for
1128 // a call or a message expressions. These might not be immediate parents
1129 // of the actual block expression due to casts and parens, so we skip them.
1130 for (const Stmt *Prev = Block, *Current = PM.getParent(Block);
1131 Current != nullptr; Prev = Current, Current = PM.getParent(Current)) {
1132 // Skip no-op (for our case) operations.
1133 if (isa<CastExpr>(Current) || isa<ParenExpr>(Current))
1134 continue;
1135
1136 // At this point, Prev represents our block as an immediate child of the
1137 // call.
1138 if (const auto *Call = dyn_cast<CallExpr>(Current)) {
1139 // It might be the call of the Block itself...
1140 if (Call->getCallee() == Prev)
1141 return Call;
1142
1143 // ...or it can be an indirect call of the block.
1144 return shouldBlockArgumentBeCalledOnce(Call, Prev) ? Call : nullptr;
1145 }
1146 if (const auto *Message = dyn_cast<ObjCMessageExpr>(Current)) {
1147 return shouldBlockArgumentBeCalledOnce(Message, Prev) ? Message
1148 : nullptr;
1149 }
1150
1151 break;
1152 }
1153
1154 return nullptr;
1155 }
1156
1157 template <class CallLikeExpr>
shouldBlockArgumentBeCalledOnce(const CallLikeExpr * CallOrMessage,const Stmt * BlockArgument) const1158 bool shouldBlockArgumentBeCalledOnce(const CallLikeExpr *CallOrMessage,
1159 const Stmt *BlockArgument) const {
1160 // CallExpr::arguments does not interact nicely with llvm::enumerate.
1161 llvm::ArrayRef<const Expr *> Arguments =
1162 llvm::ArrayRef(CallOrMessage->getArgs(), CallOrMessage->getNumArgs());
1163
1164 for (const auto &Argument : llvm::enumerate(Arguments)) {
1165 if (Argument.value() == BlockArgument) {
1166 return shouldBlockArgumentBeCalledOnce(CallOrMessage, Argument.index());
1167 }
1168 }
1169
1170 return false;
1171 }
1172
shouldBlockArgumentBeCalledOnce(const CallExpr * Call,unsigned ParamIndex) const1173 bool shouldBlockArgumentBeCalledOnce(const CallExpr *Call,
1174 unsigned ParamIndex) const {
1175 const FunctionDecl *Function = Call->getDirectCallee();
1176 return shouldBlockArgumentBeCalledOnce(Function, ParamIndex) ||
1177 shouldBeCalledOnce(Call, ParamIndex);
1178 }
1179
shouldBlockArgumentBeCalledOnce(const ObjCMessageExpr * Message,unsigned ParamIndex) const1180 bool shouldBlockArgumentBeCalledOnce(const ObjCMessageExpr *Message,
1181 unsigned ParamIndex) const {
1182 // At the moment, we don't have any Obj-C methods we want to specifically
1183 // check in here.
1184 return shouldBeCalledOnce(Message, ParamIndex);
1185 }
1186
shouldBlockArgumentBeCalledOnce(const FunctionDecl * Function,unsigned ParamIndex)1187 static bool shouldBlockArgumentBeCalledOnce(const FunctionDecl *Function,
1188 unsigned ParamIndex) {
1189 // There is a list of important API functions that while not following
1190 // conventions nor being directly annotated, still guarantee that the
1191 // callback parameter will be called exactly once.
1192 //
1193 // Here we check if this is the case.
1194 return Function &&
1195 llvm::any_of(KNOWN_CALLED_ONCE_PARAMETERS,
1196 [Function, ParamIndex](
1197 const KnownCalledOnceParameter &Reference) {
1198 return Reference.FunctionName ==
1199 Function->getName() &&
1200 Reference.ParamIndex == ParamIndex;
1201 });
1202 }
1203
1204 /// Return true if the analyzed function is actually a default implementation
1205 /// of the method that has to be overriden.
1206 ///
1207 /// These functions can have tracked parameters, but wouldn't call them
1208 /// because they are not designed to perform any meaningful actions.
1209 ///
1210 /// There are a couple of flavors of such default implementations:
1211 /// 1. Empty methods or methods with a single return statement
1212 /// 2. Methods that have one block with a call to no return function
1213 /// 3. Methods with only assertion-like operations
isPossiblyEmptyImpl() const1214 bool isPossiblyEmptyImpl() const {
1215 if (!isa<ObjCMethodDecl>(AC.getDecl())) {
1216 // We care only about functions that are not supposed to be called.
1217 // Only methods can be overriden.
1218 return false;
1219 }
1220
1221 // Case #1 (without return statements)
1222 if (FunctionCFG.size() == 2) {
1223 // Method has only two blocks: ENTRY and EXIT.
1224 // This is equivalent to empty function.
1225 return true;
1226 }
1227
1228 // Case #2
1229 if (FunctionCFG.size() == 3) {
1230 const CFGBlock &Entry = FunctionCFG.getEntry();
1231 if (Entry.succ_empty()) {
1232 return false;
1233 }
1234
1235 const CFGBlock *OnlyBlock = *Entry.succ_begin();
1236 // Method has only one block, let's see if it has a no-return
1237 // element.
1238 if (OnlyBlock && OnlyBlock->hasNoReturnElement()) {
1239 return true;
1240 }
1241 // Fallthrough, CFGs with only one block can fall into #1 and #3 as well.
1242 }
1243
1244 // Cases #1 (return statements) and #3.
1245 //
1246 // It is hard to detect that something is an assertion or came
1247 // from assertion. Here we use a simple heuristic:
1248 //
1249 // - If it came from a macro, it can be an assertion.
1250 //
1251 // Additionally, we can't assume a number of basic blocks or the CFG's
1252 // structure because assertions might include loops and conditions.
1253 return llvm::all_of(FunctionCFG, [](const CFGBlock *BB) {
1254 if (!BB) {
1255 // Unreachable blocks are totally fine.
1256 return true;
1257 }
1258
1259 // Return statements can have sub-expressions that are represented as
1260 // separate statements of a basic block. We should allow this.
1261 // This parent map will be initialized with a parent tree for all
1262 // subexpressions of the block's return statement (if it has one).
1263 std::unique_ptr<ParentMap> ReturnChildren;
1264
1265 return llvm::all_of(
1266 llvm::reverse(*BB), // we should start with return statements, if we
1267 // have any, i.e. from the bottom of the block
1268 [&ReturnChildren](const CFGElement &Element) {
1269 if (std::optional<CFGStmt> S = Element.getAs<CFGStmt>()) {
1270 const Stmt *SuspiciousStmt = S->getStmt();
1271
1272 if (isa<ReturnStmt>(SuspiciousStmt)) {
1273 // Let's initialize this structure to test whether
1274 // some further statement is a part of this return.
1275 ReturnChildren = std::make_unique<ParentMap>(
1276 const_cast<Stmt *>(SuspiciousStmt));
1277 // Return statements are allowed as part of #1.
1278 return true;
1279 }
1280
1281 return SuspiciousStmt->getBeginLoc().isMacroID() ||
1282 (ReturnChildren &&
1283 ReturnChildren->hasParent(SuspiciousStmt));
1284 }
1285 return true;
1286 });
1287 });
1288 }
1289
1290 /// Check if parameter with the given index has ever escaped.
hasEverEscaped(unsigned Index) const1291 bool hasEverEscaped(unsigned Index) const {
1292 return llvm::any_of(States, [Index](const State &StateForOneBB) {
1293 return StateForOneBB.getKindFor(Index) == ParameterStatus::Escaped;
1294 });
1295 }
1296
1297 /// Return status stored for the given basic block.
1298 /// \{
getState(const CFGBlock * BB)1299 State &getState(const CFGBlock *BB) {
1300 assert(BB);
1301 return States[BB->getBlockID()];
1302 }
getState(const CFGBlock * BB) const1303 const State &getState(const CFGBlock *BB) const {
1304 assert(BB);
1305 return States[BB->getBlockID()];
1306 }
1307 /// \}
1308
1309 /// Assign status to the given basic block.
1310 ///
1311 /// Returns true when the stored status changed.
assignState(const CFGBlock * BB,const State & ToAssign)1312 bool assignState(const CFGBlock *BB, const State &ToAssign) {
1313 State &Current = getState(BB);
1314 if (Current == ToAssign) {
1315 return false;
1316 }
1317
1318 Current = ToAssign;
1319 return true;
1320 }
1321
1322 /// Join all incoming statuses for the given basic block.
joinSuccessors(const CFGBlock * BB) const1323 State joinSuccessors(const CFGBlock *BB) const {
1324 auto Succs =
1325 llvm::make_filter_range(BB->succs(), [this](const CFGBlock *Succ) {
1326 return Succ && this->getState(Succ).isVisited();
1327 });
1328 // We came to this block from somewhere after all.
1329 assert(!Succs.empty() &&
1330 "Basic block should have at least one visited successor");
1331
1332 State Result = getState(*Succs.begin());
1333
1334 for (const CFGBlock *Succ : llvm::drop_begin(Succs, 1)) {
1335 Result.join(getState(Succ));
1336 }
1337
1338 if (const Expr *Condition = getCondition(BB->getTerminatorStmt())) {
1339 handleConditional(BB, Condition, Result);
1340 }
1341
1342 return Result;
1343 }
1344
handleConditional(const CFGBlock * BB,const Expr * Condition,State & ToAlter) const1345 void handleConditional(const CFGBlock *BB, const Expr *Condition,
1346 State &ToAlter) const {
1347 handleParameterCheck(BB, Condition, ToAlter);
1348 if (SuppressOnConventionalErrorPaths) {
1349 handleConventionalCheck(BB, Condition, ToAlter);
1350 }
1351 }
1352
handleParameterCheck(const CFGBlock * BB,const Expr * Condition,State & ToAlter) const1353 void handleParameterCheck(const CFGBlock *BB, const Expr *Condition,
1354 State &ToAlter) const {
1355 // In this function, we try to deal with the following pattern:
1356 //
1357 // if (parameter)
1358 // parameter(...);
1359 //
1360 // It's not good to show a warning here because clearly 'parameter'
1361 // couldn't and shouldn't be called on the 'else' path.
1362 //
1363 // Let's check if this if statement has a check involving one of
1364 // the tracked parameters.
1365 if (const ParmVarDecl *Parameter = findReferencedParmVarDecl(
1366 Condition,
1367 /* ShouldRetrieveFromComparisons = */ true)) {
1368 if (const auto Index = getIndex(*Parameter)) {
1369 ParameterStatus &CurrentStatus = ToAlter.getStatusFor(*Index);
1370
1371 // We don't want to deep dive into semantics of the check and
1372 // figure out if that check was for null or something else.
1373 // We simply trust the user that they know what they are doing.
1374 //
1375 // For this reason, in the following loop we look for the
1376 // best-looking option.
1377 for (const CFGBlock *Succ : BB->succs()) {
1378 if (!Succ)
1379 continue;
1380
1381 const ParameterStatus &StatusInSucc =
1382 getState(Succ).getStatusFor(*Index);
1383
1384 if (StatusInSucc.isErrorStatus()) {
1385 continue;
1386 }
1387
1388 // Let's use this status instead.
1389 CurrentStatus = StatusInSucc;
1390
1391 if (StatusInSucc.getKind() == ParameterStatus::DefinitelyCalled) {
1392 // This is the best option to have and we already found it.
1393 break;
1394 }
1395
1396 // If we found 'Escaped' first, we still might find 'DefinitelyCalled'
1397 // on the other branch. And we prefer the latter.
1398 }
1399 }
1400 }
1401 }
1402
handleConventionalCheck(const CFGBlock * BB,const Expr * Condition,State & ToAlter) const1403 void handleConventionalCheck(const CFGBlock *BB, const Expr *Condition,
1404 State &ToAlter) const {
1405 // Even when the analysis is technically correct, it is a widespread pattern
1406 // not to call completion handlers in some scenarios. These usually have
1407 // typical conditional names, such as 'error' or 'cancel'.
1408 if (!mentionsAnyOfConventionalNames(Condition)) {
1409 return;
1410 }
1411
1412 for (const auto &IndexedStatus : llvm::enumerate(ToAlter)) {
1413 const ParmVarDecl *Parameter = getParameter(IndexedStatus.index());
1414 // Conventions do not apply to explicitly marked parameters.
1415 if (isExplicitlyMarked(Parameter)) {
1416 continue;
1417 }
1418
1419 ParameterStatus &CurrentStatus = IndexedStatus.value();
1420 // If we did find that on one of the branches the user uses the callback
1421 // and doesn't on the other path, we believe that they know what they are
1422 // doing and trust them.
1423 //
1424 // There are two possible scenarios for that:
1425 // 1. Current status is 'MaybeCalled' and one of the branches is
1426 // 'DefinitelyCalled'
1427 // 2. Current status is 'NotCalled' and one of the branches is 'Escaped'
1428 if (isLosingCall(ToAlter, BB, IndexedStatus.index()) ||
1429 isLosingEscape(ToAlter, BB, IndexedStatus.index())) {
1430 CurrentStatus = ParameterStatus::Escaped;
1431 }
1432 }
1433 }
1434
isLosingCall(const State & StateAfterJoin,const CFGBlock * JoinBlock,unsigned ParameterIndex) const1435 bool isLosingCall(const State &StateAfterJoin, const CFGBlock *JoinBlock,
1436 unsigned ParameterIndex) const {
1437 // Let's check if the block represents DefinitelyCalled -> MaybeCalled
1438 // transition.
1439 return isLosingJoin(StateAfterJoin, JoinBlock, ParameterIndex,
1440 ParameterStatus::MaybeCalled,
1441 ParameterStatus::DefinitelyCalled);
1442 }
1443
isLosingEscape(const State & StateAfterJoin,const CFGBlock * JoinBlock,unsigned ParameterIndex) const1444 bool isLosingEscape(const State &StateAfterJoin, const CFGBlock *JoinBlock,
1445 unsigned ParameterIndex) const {
1446 // Let's check if the block represents Escaped -> NotCalled transition.
1447 return isLosingJoin(StateAfterJoin, JoinBlock, ParameterIndex,
1448 ParameterStatus::NotCalled, ParameterStatus::Escaped);
1449 }
1450
isLosingJoin(const State & StateAfterJoin,const CFGBlock * JoinBlock,unsigned ParameterIndex,ParameterStatus::Kind AfterJoin,ParameterStatus::Kind BeforeJoin) const1451 bool isLosingJoin(const State &StateAfterJoin, const CFGBlock *JoinBlock,
1452 unsigned ParameterIndex, ParameterStatus::Kind AfterJoin,
1453 ParameterStatus::Kind BeforeJoin) const {
1454 assert(!ParameterStatus::isErrorStatus(BeforeJoin) &&
1455 ParameterStatus::isErrorStatus(AfterJoin) &&
1456 "It's not a losing join if statuses do not represent "
1457 "correct-to-error transition");
1458
1459 const ParameterStatus &CurrentStatus =
1460 StateAfterJoin.getStatusFor(ParameterIndex);
1461
1462 return CurrentStatus.getKind() == AfterJoin &&
1463 anySuccessorHasStatus(JoinBlock, ParameterIndex, BeforeJoin);
1464 }
1465
1466 /// Return true if any of the successors of the given basic block has
1467 /// a specified status for the given parameter.
anySuccessorHasStatus(const CFGBlock * Parent,unsigned ParameterIndex,ParameterStatus::Kind ToFind) const1468 bool anySuccessorHasStatus(const CFGBlock *Parent, unsigned ParameterIndex,
1469 ParameterStatus::Kind ToFind) const {
1470 return llvm::any_of(
1471 Parent->succs(), [this, ParameterIndex, ToFind](const CFGBlock *Succ) {
1472 return Succ && getState(Succ).getKindFor(ParameterIndex) == ToFind;
1473 });
1474 }
1475
1476 /// Check given expression that was discovered to escape.
checkEscapee(const Expr * E)1477 void checkEscapee(const Expr *E) {
1478 if (const ParmVarDecl *Parameter = findReferencedParmVarDecl(E)) {
1479 checkEscapee(*Parameter);
1480 }
1481 }
1482
1483 /// Check given parameter that was discovered to escape.
checkEscapee(const ParmVarDecl & Parameter)1484 void checkEscapee(const ParmVarDecl &Parameter) {
1485 if (auto Index = getIndex(Parameter)) {
1486 processEscapeFor(*Index);
1487 }
1488 }
1489
1490 /// Mark all parameters in the current state as 'no-return'.
markNoReturn()1491 void markNoReturn() {
1492 for (ParameterStatus &PS : CurrentState) {
1493 PS = ParameterStatus::NoReturn;
1494 }
1495 }
1496
1497 /// Check if the given assignment represents suppression and act on it.
checkSuppression(const BinaryOperator * Assignment)1498 void checkSuppression(const BinaryOperator *Assignment) {
1499 // Suppression has the following form:
1500 // parameter = 0;
1501 // 0 can be of any form (NULL, nil, etc.)
1502 if (auto Index = getIndexOfExpression(Assignment->getLHS())) {
1503
1504 // We don't care what is written in the RHS, it could be whatever
1505 // we can interpret as 0.
1506 if (auto Constant =
1507 Assignment->getRHS()->IgnoreParenCasts()->getIntegerConstantExpr(
1508 AC.getASTContext())) {
1509
1510 ParameterStatus &CurrentParamStatus = CurrentState.getStatusFor(*Index);
1511
1512 if (0 == *Constant && CurrentParamStatus.seenAnyCalls()) {
1513 // Even though this suppression mechanism is introduced to tackle
1514 // false positives for multiple calls, the fact that the user has
1515 // to use suppression can also tell us that we couldn't figure out
1516 // how different paths cancel each other out. And if that is true,
1517 // we will most certainly have false positives about parameters not
1518 // being called on certain paths.
1519 //
1520 // For this reason, we abandon tracking this parameter altogether.
1521 CurrentParamStatus = ParameterStatus::Reported;
1522 }
1523 }
1524 }
1525 }
1526
1527 public:
1528 //===----------------------------------------------------------------------===//
1529 // Tree traversal methods
1530 //===----------------------------------------------------------------------===//
1531
VisitCallExpr(const CallExpr * Call)1532 void VisitCallExpr(const CallExpr *Call) {
1533 // This call might be a direct call, i.e. a parameter call...
1534 checkDirectCall(Call);
1535 // ... or an indirect call, i.e. when parameter is an argument.
1536 checkIndirectCall(Call);
1537 }
1538
VisitObjCMessageExpr(const ObjCMessageExpr * Message)1539 void VisitObjCMessageExpr(const ObjCMessageExpr *Message) {
1540 // The most common situation that we are defending against here is
1541 // copying a tracked parameter.
1542 if (const Expr *Receiver = Message->getInstanceReceiver()) {
1543 checkEscapee(Receiver);
1544 }
1545 // Message expressions unlike calls, could not be direct.
1546 checkIndirectCall(Message);
1547 }
1548
VisitBlockExpr(const BlockExpr * Block)1549 void VisitBlockExpr(const BlockExpr *Block) {
1550 // Block expressions are tricky. It is a very common practice to capture
1551 // completion handlers by blocks and use them there.
1552 // For this reason, it is important to analyze blocks and report warnings
1553 // for completion handler misuse in blocks.
1554 //
1555 // However, it can be quite difficult to track how the block itself is being
1556 // used. The full precise anlysis of that will be similar to alias analysis
1557 // for completion handlers and can be too heavyweight for a compile-time
1558 // diagnostic. Instead, we judge about the immediate use of the block.
1559 //
1560 // Here, we try to find a call expression where we know due to conventions,
1561 // annotations, or other reasons that the block is called once and only
1562 // once.
1563 const Expr *CalledOnceCallSite = getBlockGuaraneedCallSite(Block);
1564
1565 // We need to report this information to the handler because in the
1566 // situation when we know that the block is called exactly once, we can be
1567 // stricter in terms of reported diagnostics.
1568 if (CalledOnceCallSite) {
1569 Handler.handleBlockThatIsGuaranteedToBeCalledOnce(Block->getBlockDecl());
1570 } else {
1571 Handler.handleBlockWithNoGuarantees(Block->getBlockDecl());
1572 }
1573
1574 for (const auto &Capture : Block->getBlockDecl()->captures()) {
1575 if (const auto *Param = dyn_cast<ParmVarDecl>(Capture.getVariable())) {
1576 if (auto Index = getIndex(*Param)) {
1577 if (CalledOnceCallSite) {
1578 // The call site of a block can be considered a call site of the
1579 // captured parameter we track.
1580 processCallFor(*Index, CalledOnceCallSite);
1581 } else {
1582 // We still should consider this block as an escape for parameter,
1583 // if we don't know about its call site or the number of time it
1584 // can be invoked.
1585 processEscapeFor(*Index);
1586 }
1587 }
1588 }
1589 }
1590 }
1591
VisitBinaryOperator(const BinaryOperator * Op)1592 void VisitBinaryOperator(const BinaryOperator *Op) {
1593 if (Op->getOpcode() == clang::BO_Assign) {
1594 // Let's check if one of the tracked parameters is assigned into
1595 // something, and if it is we don't want to track extra variables, so we
1596 // consider it as an escapee.
1597 checkEscapee(Op->getRHS());
1598
1599 // Let's check whether this assignment is a suppression.
1600 checkSuppression(Op);
1601 }
1602 }
1603
VisitDeclStmt(const DeclStmt * DS)1604 void VisitDeclStmt(const DeclStmt *DS) {
1605 // Variable initialization is not assignment and should be handled
1606 // separately.
1607 //
1608 // Multiple declarations can be a part of declaration statement.
1609 for (const auto *Declaration : DS->getDeclGroup()) {
1610 if (const auto *Var = dyn_cast<VarDecl>(Declaration)) {
1611 if (Var->getInit()) {
1612 checkEscapee(Var->getInit());
1613 }
1614
1615 if (Var->hasAttr<CleanupAttr>()) {
1616 FunctionHasCleanupVars = true;
1617 }
1618 }
1619 }
1620 }
1621
VisitCStyleCastExpr(const CStyleCastExpr * Cast)1622 void VisitCStyleCastExpr(const CStyleCastExpr *Cast) {
1623 // We consider '(void)parameter' as a manual no-op escape.
1624 // It should be used to explicitly tell the analysis that this parameter
1625 // is intentionally not called on this path.
1626 if (Cast->getType().getCanonicalType()->isVoidType()) {
1627 checkEscapee(Cast->getSubExpr());
1628 }
1629 }
1630
VisitObjCAtThrowStmt(const ObjCAtThrowStmt *)1631 void VisitObjCAtThrowStmt(const ObjCAtThrowStmt *) {
1632 // It is OK not to call marked parameters on exceptional paths.
1633 markNoReturn();
1634 }
1635
1636 private:
size() const1637 unsigned size() const { return TrackedParams.size(); }
1638
getIndexOfCallee(const CallExpr * Call) const1639 std::optional<unsigned> getIndexOfCallee(const CallExpr *Call) const {
1640 return getIndexOfExpression(Call->getCallee());
1641 }
1642
getIndexOfExpression(const Expr * E) const1643 std::optional<unsigned> getIndexOfExpression(const Expr *E) const {
1644 if (const ParmVarDecl *Parameter = findReferencedParmVarDecl(E)) {
1645 return getIndex(*Parameter);
1646 }
1647
1648 return std::nullopt;
1649 }
1650
getIndex(const ParmVarDecl & Parameter) const1651 std::optional<unsigned> getIndex(const ParmVarDecl &Parameter) const {
1652 // Expected number of parameters that we actually track is 1.
1653 //
1654 // Also, the maximum number of declared parameters could not be on a scale
1655 // of hundreds of thousands.
1656 //
1657 // In this setting, linear search seems reasonable and even performs better
1658 // than bisection.
1659 ParamSizedVector<const ParmVarDecl *>::const_iterator It =
1660 llvm::find(TrackedParams, &Parameter);
1661
1662 if (It != TrackedParams.end()) {
1663 return It - TrackedParams.begin();
1664 }
1665
1666 return std::nullopt;
1667 }
1668
getParameter(unsigned Index) const1669 const ParmVarDecl *getParameter(unsigned Index) const {
1670 assert(Index < TrackedParams.size());
1671 return TrackedParams[Index];
1672 }
1673
1674 const CFG &FunctionCFG;
1675 AnalysisDeclContext &AC;
1676 CalledOnceCheckHandler &Handler;
1677 bool CheckConventionalParameters;
1678 // As of now, we turn this behavior off. So, we still are going to report
1679 // missing calls on paths that look like it was intentional.
1680 // Technically such reports are true positives, but they can make some users
1681 // grumpy because of the sheer number of warnings.
1682 // It can be turned back on if we decide that we want to have the other way
1683 // around.
1684 bool SuppressOnConventionalErrorPaths = false;
1685
1686 // The user can annotate variable declarations with cleanup functions, which
1687 // essentially imposes a custom destructor logic on that variable.
1688 // It is possible to use it, however, to call tracked parameters on all exits
1689 // from the function. For this reason, we track the fact that the function
1690 // actually has these.
1691 bool FunctionHasCleanupVars = false;
1692
1693 State CurrentState;
1694 ParamSizedVector<const ParmVarDecl *> TrackedParams;
1695 CFGSizedVector<State> States;
1696 };
1697
1698 } // end anonymous namespace
1699
1700 namespace clang {
checkCalledOnceParameters(AnalysisDeclContext & AC,CalledOnceCheckHandler & Handler,bool CheckConventionalParameters)1701 void checkCalledOnceParameters(AnalysisDeclContext &AC,
1702 CalledOnceCheckHandler &Handler,
1703 bool CheckConventionalParameters) {
1704 CalledOnceChecker::check(AC, Handler, CheckConventionalParameters);
1705 }
1706 } // end namespace clang
1707