xref: /freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/BasicObjCFoundationChecks.cpp (revision 5def4c47d4bd90b209b9b4a4ba9faec15846d8fd)
1 //== BasicObjCFoundationChecks.cpp - Simple Apple-Foundation checks -*- C++ -*--
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 //  This file defines BasicObjCFoundationChecks, a class that encapsulates
10 //  a set of simple checks to run on Objective-C code using Apple's Foundation
11 //  classes.
12 //
13 //===----------------------------------------------------------------------===//
14 
15 #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
16 #include "clang/AST/ASTContext.h"
17 #include "clang/AST/DeclObjC.h"
18 #include "clang/AST/Expr.h"
19 #include "clang/AST/ExprObjC.h"
20 #include "clang/AST/StmtObjC.h"
21 #include "clang/Analysis/DomainSpecific/CocoaConventions.h"
22 #include "clang/Analysis/SelectorExtras.h"
23 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
24 #include "clang/StaticAnalyzer/Core/Checker.h"
25 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
26 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
27 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
28 #include "clang/StaticAnalyzer/Core/PathSensitive/ExplodedGraph.h"
29 #include "clang/StaticAnalyzer/Core/PathSensitive/ExprEngine.h"
30 #include "clang/StaticAnalyzer/Core/PathSensitive/MemRegion.h"
31 #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h"
32 #include "llvm/ADT/SmallString.h"
33 #include "llvm/ADT/StringMap.h"
34 #include "llvm/Support/raw_ostream.h"
35 
36 using namespace clang;
37 using namespace ento;
38 using namespace llvm;
39 
40 namespace {
41 class APIMisuse : public BugType {
42 public:
43   APIMisuse(const CheckerBase *checker, const char *name)
44       : BugType(checker, name, "API Misuse (Apple)") {}
45 };
46 } // end anonymous namespace
47 
48 //===----------------------------------------------------------------------===//
49 // Utility functions.
50 //===----------------------------------------------------------------------===//
51 
52 static StringRef GetReceiverInterfaceName(const ObjCMethodCall &msg) {
53   if (const ObjCInterfaceDecl *ID = msg.getReceiverInterface())
54     return ID->getIdentifier()->getName();
55   return StringRef();
56 }
57 
58 enum FoundationClass {
59   FC_None,
60   FC_NSArray,
61   FC_NSDictionary,
62   FC_NSEnumerator,
63   FC_NSNull,
64   FC_NSOrderedSet,
65   FC_NSSet,
66   FC_NSString
67 };
68 
69 static FoundationClass findKnownClass(const ObjCInterfaceDecl *ID,
70                                       bool IncludeSuperclasses = true) {
71   static llvm::StringMap<FoundationClass> Classes;
72   if (Classes.empty()) {
73     Classes["NSArray"] = FC_NSArray;
74     Classes["NSDictionary"] = FC_NSDictionary;
75     Classes["NSEnumerator"] = FC_NSEnumerator;
76     Classes["NSNull"] = FC_NSNull;
77     Classes["NSOrderedSet"] = FC_NSOrderedSet;
78     Classes["NSSet"] = FC_NSSet;
79     Classes["NSString"] = FC_NSString;
80   }
81 
82   // FIXME: Should we cache this at all?
83   FoundationClass result = Classes.lookup(ID->getIdentifier()->getName());
84   if (result == FC_None && IncludeSuperclasses)
85     if (const ObjCInterfaceDecl *Super = ID->getSuperClass())
86       return findKnownClass(Super);
87 
88   return result;
89 }
90 
91 //===----------------------------------------------------------------------===//
92 // NilArgChecker - Check for prohibited nil arguments to ObjC method calls.
93 //===----------------------------------------------------------------------===//
94 
95 namespace {
96   class NilArgChecker : public Checker<check::PreObjCMessage,
97                                        check::PostStmt<ObjCDictionaryLiteral>,
98                                        check::PostStmt<ObjCArrayLiteral> > {
99     mutable std::unique_ptr<APIMisuse> BT;
100 
101     mutable llvm::SmallDenseMap<Selector, unsigned, 16> StringSelectors;
102     mutable Selector ArrayWithObjectSel;
103     mutable Selector AddObjectSel;
104     mutable Selector InsertObjectAtIndexSel;
105     mutable Selector ReplaceObjectAtIndexWithObjectSel;
106     mutable Selector SetObjectAtIndexedSubscriptSel;
107     mutable Selector ArrayByAddingObjectSel;
108     mutable Selector DictionaryWithObjectForKeySel;
109     mutable Selector SetObjectForKeySel;
110     mutable Selector SetObjectForKeyedSubscriptSel;
111     mutable Selector RemoveObjectForKeySel;
112 
113     void warnIfNilExpr(const Expr *E,
114                        const char *Msg,
115                        CheckerContext &C) const;
116 
117     void warnIfNilArg(CheckerContext &C,
118                       const ObjCMethodCall &msg, unsigned Arg,
119                       FoundationClass Class,
120                       bool CanBeSubscript = false) const;
121 
122     void generateBugReport(ExplodedNode *N,
123                            StringRef Msg,
124                            SourceRange Range,
125                            const Expr *Expr,
126                            CheckerContext &C) const;
127 
128   public:
129     void checkPreObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
130     void checkPostStmt(const ObjCDictionaryLiteral *DL,
131                        CheckerContext &C) const;
132     void checkPostStmt(const ObjCArrayLiteral *AL,
133                        CheckerContext &C) const;
134   };
135 } // end anonymous namespace
136 
137 void NilArgChecker::warnIfNilExpr(const Expr *E,
138                                   const char *Msg,
139                                   CheckerContext &C) const {
140   ProgramStateRef State = C.getState();
141   if (State->isNull(C.getSVal(E)).isConstrainedTrue()) {
142 
143     if (ExplodedNode *N = C.generateErrorNode()) {
144       generateBugReport(N, Msg, E->getSourceRange(), E, C);
145     }
146   }
147 }
148 
149 void NilArgChecker::warnIfNilArg(CheckerContext &C,
150                                  const ObjCMethodCall &msg,
151                                  unsigned int Arg,
152                                  FoundationClass Class,
153                                  bool CanBeSubscript) const {
154   // Check if the argument is nil.
155   ProgramStateRef State = C.getState();
156   if (!State->isNull(msg.getArgSVal(Arg)).isConstrainedTrue())
157       return;
158 
159   // NOTE: We cannot throw non-fatal errors from warnIfNilExpr,
160   // because it's called multiple times from some callers, so it'd cause
161   // an unwanted state split if two or more non-fatal errors are thrown
162   // within the same checker callback. For now we don't want to, but
163   // it'll need to be fixed if we ever want to.
164   if (ExplodedNode *N = C.generateErrorNode()) {
165     SmallString<128> sbuf;
166     llvm::raw_svector_ostream os(sbuf);
167 
168     if (CanBeSubscript && msg.getMessageKind() == OCM_Subscript) {
169 
170       if (Class == FC_NSArray) {
171         os << "Array element cannot be nil";
172       } else if (Class == FC_NSDictionary) {
173         if (Arg == 0) {
174           os << "Value stored into '";
175           os << GetReceiverInterfaceName(msg) << "' cannot be nil";
176         } else {
177           assert(Arg == 1);
178           os << "'"<< GetReceiverInterfaceName(msg) << "' key cannot be nil";
179         }
180       } else
181         llvm_unreachable("Missing foundation class for the subscript expr");
182 
183     } else {
184       if (Class == FC_NSDictionary) {
185         if (Arg == 0)
186           os << "Value argument ";
187         else {
188           assert(Arg == 1);
189           os << "Key argument ";
190         }
191         os << "to '";
192         msg.getSelector().print(os);
193         os << "' cannot be nil";
194       } else {
195         os << "Argument to '" << GetReceiverInterfaceName(msg) << "' method '";
196         msg.getSelector().print(os);
197         os << "' cannot be nil";
198       }
199     }
200 
201     generateBugReport(N, os.str(), msg.getArgSourceRange(Arg),
202                       msg.getArgExpr(Arg), C);
203   }
204 }
205 
206 void NilArgChecker::generateBugReport(ExplodedNode *N,
207                                       StringRef Msg,
208                                       SourceRange Range,
209                                       const Expr *E,
210                                       CheckerContext &C) const {
211   if (!BT)
212     BT.reset(new APIMisuse(this, "nil argument"));
213 
214   auto R = std::make_unique<PathSensitiveBugReport>(*BT, Msg, N);
215   R->addRange(Range);
216   bugreporter::trackExpressionValue(N, E, *R);
217   C.emitReport(std::move(R));
218 }
219 
220 void NilArgChecker::checkPreObjCMessage(const ObjCMethodCall &msg,
221                                         CheckerContext &C) const {
222   const ObjCInterfaceDecl *ID = msg.getReceiverInterface();
223   if (!ID)
224     return;
225 
226   FoundationClass Class = findKnownClass(ID);
227 
228   static const unsigned InvalidArgIndex = UINT_MAX;
229   unsigned Arg = InvalidArgIndex;
230   bool CanBeSubscript = false;
231 
232   if (Class == FC_NSString) {
233     Selector S = msg.getSelector();
234 
235     if (S.isUnarySelector())
236       return;
237 
238     if (StringSelectors.empty()) {
239       ASTContext &Ctx = C.getASTContext();
240       Selector Sels[] = {
241           getKeywordSelector(Ctx, "caseInsensitiveCompare"),
242           getKeywordSelector(Ctx, "compare"),
243           getKeywordSelector(Ctx, "compare", "options"),
244           getKeywordSelector(Ctx, "compare", "options", "range"),
245           getKeywordSelector(Ctx, "compare", "options", "range", "locale"),
246           getKeywordSelector(Ctx, "componentsSeparatedByCharactersInSet"),
247           getKeywordSelector(Ctx, "initWithFormat"),
248           getKeywordSelector(Ctx, "localizedCaseInsensitiveCompare"),
249           getKeywordSelector(Ctx, "localizedCompare"),
250           getKeywordSelector(Ctx, "localizedStandardCompare"),
251       };
252       for (Selector KnownSel : Sels)
253         StringSelectors[KnownSel] = 0;
254     }
255     auto I = StringSelectors.find(S);
256     if (I == StringSelectors.end())
257       return;
258     Arg = I->second;
259   } else if (Class == FC_NSArray) {
260     Selector S = msg.getSelector();
261 
262     if (S.isUnarySelector())
263       return;
264 
265     if (ArrayWithObjectSel.isNull()) {
266       ASTContext &Ctx = C.getASTContext();
267       ArrayWithObjectSel = getKeywordSelector(Ctx, "arrayWithObject");
268       AddObjectSel = getKeywordSelector(Ctx, "addObject");
269       InsertObjectAtIndexSel =
270           getKeywordSelector(Ctx, "insertObject", "atIndex");
271       ReplaceObjectAtIndexWithObjectSel =
272           getKeywordSelector(Ctx, "replaceObjectAtIndex", "withObject");
273       SetObjectAtIndexedSubscriptSel =
274           getKeywordSelector(Ctx, "setObject", "atIndexedSubscript");
275       ArrayByAddingObjectSel = getKeywordSelector(Ctx, "arrayByAddingObject");
276     }
277 
278     if (S == ArrayWithObjectSel || S == AddObjectSel ||
279         S == InsertObjectAtIndexSel || S == ArrayByAddingObjectSel) {
280       Arg = 0;
281     } else if (S == SetObjectAtIndexedSubscriptSel) {
282       Arg = 0;
283       CanBeSubscript = true;
284     } else if (S == ReplaceObjectAtIndexWithObjectSel) {
285       Arg = 1;
286     }
287   } else if (Class == FC_NSDictionary) {
288     Selector S = msg.getSelector();
289 
290     if (S.isUnarySelector())
291       return;
292 
293     if (DictionaryWithObjectForKeySel.isNull()) {
294       ASTContext &Ctx = C.getASTContext();
295       DictionaryWithObjectForKeySel =
296           getKeywordSelector(Ctx, "dictionaryWithObject", "forKey");
297       SetObjectForKeySel = getKeywordSelector(Ctx, "setObject", "forKey");
298       SetObjectForKeyedSubscriptSel =
299           getKeywordSelector(Ctx, "setObject", "forKeyedSubscript");
300       RemoveObjectForKeySel = getKeywordSelector(Ctx, "removeObjectForKey");
301     }
302 
303     if (S == DictionaryWithObjectForKeySel || S == SetObjectForKeySel) {
304       Arg = 0;
305       warnIfNilArg(C, msg, /* Arg */1, Class);
306     } else if (S == SetObjectForKeyedSubscriptSel) {
307       CanBeSubscript = true;
308       Arg = 1;
309     } else if (S == RemoveObjectForKeySel) {
310       Arg = 0;
311     }
312   }
313 
314   // If argument is '0', report a warning.
315   if ((Arg != InvalidArgIndex))
316     warnIfNilArg(C, msg, Arg, Class, CanBeSubscript);
317 }
318 
319 void NilArgChecker::checkPostStmt(const ObjCArrayLiteral *AL,
320                                   CheckerContext &C) const {
321   unsigned NumOfElements = AL->getNumElements();
322   for (unsigned i = 0; i < NumOfElements; ++i) {
323     warnIfNilExpr(AL->getElement(i), "Array element cannot be nil", C);
324   }
325 }
326 
327 void NilArgChecker::checkPostStmt(const ObjCDictionaryLiteral *DL,
328                                   CheckerContext &C) const {
329   unsigned NumOfElements = DL->getNumElements();
330   for (unsigned i = 0; i < NumOfElements; ++i) {
331     ObjCDictionaryElement Element = DL->getKeyValueElement(i);
332     warnIfNilExpr(Element.Key, "Dictionary key cannot be nil", C);
333     warnIfNilExpr(Element.Value, "Dictionary value cannot be nil", C);
334   }
335 }
336 
337 //===----------------------------------------------------------------------===//
338 // Checking for mismatched types passed to CFNumberCreate/CFNumberGetValue.
339 //===----------------------------------------------------------------------===//
340 
341 namespace {
342 class CFNumberChecker : public Checker< check::PreStmt<CallExpr> > {
343   mutable std::unique_ptr<APIMisuse> BT;
344   mutable IdentifierInfo *ICreate, *IGetValue;
345 public:
346   CFNumberChecker() : ICreate(nullptr), IGetValue(nullptr) {}
347 
348   void checkPreStmt(const CallExpr *CE, CheckerContext &C) const;
349 
350 private:
351   void EmitError(const TypedRegion* R, const Expr *Ex,
352                 uint64_t SourceSize, uint64_t TargetSize, uint64_t NumberKind);
353 };
354 } // end anonymous namespace
355 
356 enum CFNumberType {
357   kCFNumberSInt8Type = 1,
358   kCFNumberSInt16Type = 2,
359   kCFNumberSInt32Type = 3,
360   kCFNumberSInt64Type = 4,
361   kCFNumberFloat32Type = 5,
362   kCFNumberFloat64Type = 6,
363   kCFNumberCharType = 7,
364   kCFNumberShortType = 8,
365   kCFNumberIntType = 9,
366   kCFNumberLongType = 10,
367   kCFNumberLongLongType = 11,
368   kCFNumberFloatType = 12,
369   kCFNumberDoubleType = 13,
370   kCFNumberCFIndexType = 14,
371   kCFNumberNSIntegerType = 15,
372   kCFNumberCGFloatType = 16
373 };
374 
375 static Optional<uint64_t> GetCFNumberSize(ASTContext &Ctx, uint64_t i) {
376   static const unsigned char FixedSize[] = { 8, 16, 32, 64, 32, 64 };
377 
378   if (i < kCFNumberCharType)
379     return FixedSize[i-1];
380 
381   QualType T;
382 
383   switch (i) {
384     case kCFNumberCharType:     T = Ctx.CharTy;     break;
385     case kCFNumberShortType:    T = Ctx.ShortTy;    break;
386     case kCFNumberIntType:      T = Ctx.IntTy;      break;
387     case kCFNumberLongType:     T = Ctx.LongTy;     break;
388     case kCFNumberLongLongType: T = Ctx.LongLongTy; break;
389     case kCFNumberFloatType:    T = Ctx.FloatTy;    break;
390     case kCFNumberDoubleType:   T = Ctx.DoubleTy;   break;
391     case kCFNumberCFIndexType:
392     case kCFNumberNSIntegerType:
393     case kCFNumberCGFloatType:
394       // FIXME: We need a way to map from names to Type*.
395     default:
396       return None;
397   }
398 
399   return Ctx.getTypeSize(T);
400 }
401 
402 #if 0
403 static const char* GetCFNumberTypeStr(uint64_t i) {
404   static const char* Names[] = {
405     "kCFNumberSInt8Type",
406     "kCFNumberSInt16Type",
407     "kCFNumberSInt32Type",
408     "kCFNumberSInt64Type",
409     "kCFNumberFloat32Type",
410     "kCFNumberFloat64Type",
411     "kCFNumberCharType",
412     "kCFNumberShortType",
413     "kCFNumberIntType",
414     "kCFNumberLongType",
415     "kCFNumberLongLongType",
416     "kCFNumberFloatType",
417     "kCFNumberDoubleType",
418     "kCFNumberCFIndexType",
419     "kCFNumberNSIntegerType",
420     "kCFNumberCGFloatType"
421   };
422 
423   return i <= kCFNumberCGFloatType ? Names[i-1] : "Invalid CFNumberType";
424 }
425 #endif
426 
427 void CFNumberChecker::checkPreStmt(const CallExpr *CE,
428                                          CheckerContext &C) const {
429   ProgramStateRef state = C.getState();
430   const FunctionDecl *FD = C.getCalleeDecl(CE);
431   if (!FD)
432     return;
433 
434   ASTContext &Ctx = C.getASTContext();
435   if (!ICreate) {
436     ICreate = &Ctx.Idents.get("CFNumberCreate");
437     IGetValue = &Ctx.Idents.get("CFNumberGetValue");
438   }
439   if (!(FD->getIdentifier() == ICreate || FD->getIdentifier() == IGetValue) ||
440       CE->getNumArgs() != 3)
441     return;
442 
443   // Get the value of the "theType" argument.
444   SVal TheTypeVal = C.getSVal(CE->getArg(1));
445 
446   // FIXME: We really should allow ranges of valid theType values, and
447   //   bifurcate the state appropriately.
448   Optional<nonloc::ConcreteInt> V = TheTypeVal.getAs<nonloc::ConcreteInt>();
449   if (!V)
450     return;
451 
452   uint64_t NumberKind = V->getValue().getLimitedValue();
453   Optional<uint64_t> OptCFNumberSize = GetCFNumberSize(Ctx, NumberKind);
454 
455   // FIXME: In some cases we can emit an error.
456   if (!OptCFNumberSize)
457     return;
458 
459   uint64_t CFNumberSize = *OptCFNumberSize;
460 
461   // Look at the value of the integer being passed by reference.  Essentially
462   // we want to catch cases where the value passed in is not equal to the
463   // size of the type being created.
464   SVal TheValueExpr = C.getSVal(CE->getArg(2));
465 
466   // FIXME: Eventually we should handle arbitrary locations.  We can do this
467   //  by having an enhanced memory model that does low-level typing.
468   Optional<loc::MemRegionVal> LV = TheValueExpr.getAs<loc::MemRegionVal>();
469   if (!LV)
470     return;
471 
472   const TypedValueRegion* R = dyn_cast<TypedValueRegion>(LV->stripCasts());
473   if (!R)
474     return;
475 
476   QualType T = Ctx.getCanonicalType(R->getValueType());
477 
478   // FIXME: If the pointee isn't an integer type, should we flag a warning?
479   //  People can do weird stuff with pointers.
480 
481   if (!T->isIntegralOrEnumerationType())
482     return;
483 
484   uint64_t PrimitiveTypeSize = Ctx.getTypeSize(T);
485 
486   if (PrimitiveTypeSize == CFNumberSize)
487     return;
488 
489   // FIXME: We can actually create an abstract "CFNumber" object that has
490   //  the bits initialized to the provided values.
491   ExplodedNode *N = C.generateNonFatalErrorNode();
492   if (N) {
493     SmallString<128> sbuf;
494     llvm::raw_svector_ostream os(sbuf);
495     bool isCreate = (FD->getIdentifier() == ICreate);
496 
497     if (isCreate) {
498       os << (PrimitiveTypeSize == 8 ? "An " : "A ")
499          << PrimitiveTypeSize << "-bit integer is used to initialize a "
500          << "CFNumber object that represents "
501          << (CFNumberSize == 8 ? "an " : "a ")
502          << CFNumberSize << "-bit integer; ";
503     } else {
504       os << "A CFNumber object that represents "
505          << (CFNumberSize == 8 ? "an " : "a ")
506          << CFNumberSize << "-bit integer is used to initialize "
507          << (PrimitiveTypeSize == 8 ? "an " : "a ")
508          << PrimitiveTypeSize << "-bit integer; ";
509     }
510 
511     if (PrimitiveTypeSize < CFNumberSize)
512       os << (CFNumberSize - PrimitiveTypeSize)
513       << " bits of the CFNumber value will "
514       << (isCreate ? "be garbage." : "overwrite adjacent storage.");
515     else
516       os << (PrimitiveTypeSize - CFNumberSize)
517       << " bits of the integer value will be "
518       << (isCreate ? "lost." : "garbage.");
519 
520     if (!BT)
521       BT.reset(new APIMisuse(this, "Bad use of CFNumber APIs"));
522 
523     auto report = std::make_unique<PathSensitiveBugReport>(*BT, os.str(), N);
524     report->addRange(CE->getArg(2)->getSourceRange());
525     C.emitReport(std::move(report));
526   }
527 }
528 
529 //===----------------------------------------------------------------------===//
530 // CFRetain/CFRelease/CFMakeCollectable/CFAutorelease checking for null arguments.
531 //===----------------------------------------------------------------------===//
532 
533 namespace {
534 class CFRetainReleaseChecker : public Checker<check::PreCall> {
535   mutable APIMisuse BT{this, "null passed to CF memory management function"};
536   CallDescription CFRetain{"CFRetain", 1},
537                   CFRelease{"CFRelease", 1},
538                   CFMakeCollectable{"CFMakeCollectable", 1},
539                   CFAutorelease{"CFAutorelease", 1};
540 
541 public:
542   void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
543 };
544 } // end anonymous namespace
545 
546 void CFRetainReleaseChecker::checkPreCall(const CallEvent &Call,
547                                           CheckerContext &C) const {
548   // TODO: Make this check part of CallDescription.
549   if (!Call.isGlobalCFunction())
550     return;
551 
552   // Check if we called CFRetain/CFRelease/CFMakeCollectable/CFAutorelease.
553   if (!(Call.isCalled(CFRetain) || Call.isCalled(CFRelease) ||
554         Call.isCalled(CFMakeCollectable) || Call.isCalled(CFAutorelease)))
555     return;
556 
557   // Get the argument's value.
558   SVal ArgVal = Call.getArgSVal(0);
559   Optional<DefinedSVal> DefArgVal = ArgVal.getAs<DefinedSVal>();
560   if (!DefArgVal)
561     return;
562 
563   // Is it null?
564   ProgramStateRef state = C.getState();
565   ProgramStateRef stateNonNull, stateNull;
566   std::tie(stateNonNull, stateNull) = state->assume(*DefArgVal);
567 
568   if (!stateNonNull) {
569     ExplodedNode *N = C.generateErrorNode(stateNull);
570     if (!N)
571       return;
572 
573     SmallString<64> Str;
574     raw_svector_ostream OS(Str);
575     OS << "Null pointer argument in call to "
576        << cast<FunctionDecl>(Call.getDecl())->getName();
577 
578     auto report = std::make_unique<PathSensitiveBugReport>(BT, OS.str(), N);
579     report->addRange(Call.getArgSourceRange(0));
580     bugreporter::trackExpressionValue(N, Call.getArgExpr(0), *report);
581     C.emitReport(std::move(report));
582     return;
583   }
584 
585   // From here on, we know the argument is non-null.
586   C.addTransition(stateNonNull);
587 }
588 
589 //===----------------------------------------------------------------------===//
590 // Check for sending 'retain', 'release', or 'autorelease' directly to a Class.
591 //===----------------------------------------------------------------------===//
592 
593 namespace {
594 class ClassReleaseChecker : public Checker<check::PreObjCMessage> {
595   mutable Selector releaseS;
596   mutable Selector retainS;
597   mutable Selector autoreleaseS;
598   mutable Selector drainS;
599   mutable std::unique_ptr<BugType> BT;
600 
601 public:
602   void checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const;
603 };
604 } // end anonymous namespace
605 
606 void ClassReleaseChecker::checkPreObjCMessage(const ObjCMethodCall &msg,
607                                               CheckerContext &C) const {
608   if (!BT) {
609     BT.reset(new APIMisuse(
610         this, "message incorrectly sent to class instead of class instance"));
611 
612     ASTContext &Ctx = C.getASTContext();
613     releaseS = GetNullarySelector("release", Ctx);
614     retainS = GetNullarySelector("retain", Ctx);
615     autoreleaseS = GetNullarySelector("autorelease", Ctx);
616     drainS = GetNullarySelector("drain", Ctx);
617   }
618 
619   if (msg.isInstanceMessage())
620     return;
621   const ObjCInterfaceDecl *Class = msg.getReceiverInterface();
622   assert(Class);
623 
624   Selector S = msg.getSelector();
625   if (!(S == releaseS || S == retainS || S == autoreleaseS || S == drainS))
626     return;
627 
628   if (ExplodedNode *N = C.generateNonFatalErrorNode()) {
629     SmallString<200> buf;
630     llvm::raw_svector_ostream os(buf);
631 
632     os << "The '";
633     S.print(os);
634     os << "' message should be sent to instances "
635           "of class '" << Class->getName()
636        << "' and not the class directly";
637 
638     auto report = std::make_unique<PathSensitiveBugReport>(*BT, os.str(), N);
639     report->addRange(msg.getSourceRange());
640     C.emitReport(std::move(report));
641   }
642 }
643 
644 //===----------------------------------------------------------------------===//
645 // Check for passing non-Objective-C types to variadic methods that expect
646 // only Objective-C types.
647 //===----------------------------------------------------------------------===//
648 
649 namespace {
650 class VariadicMethodTypeChecker : public Checker<check::PreObjCMessage> {
651   mutable Selector arrayWithObjectsS;
652   mutable Selector dictionaryWithObjectsAndKeysS;
653   mutable Selector setWithObjectsS;
654   mutable Selector orderedSetWithObjectsS;
655   mutable Selector initWithObjectsS;
656   mutable Selector initWithObjectsAndKeysS;
657   mutable std::unique_ptr<BugType> BT;
658 
659   bool isVariadicMessage(const ObjCMethodCall &msg) const;
660 
661 public:
662   void checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const;
663 };
664 } // end anonymous namespace
665 
666 /// isVariadicMessage - Returns whether the given message is a variadic message,
667 /// where all arguments must be Objective-C types.
668 bool
669 VariadicMethodTypeChecker::isVariadicMessage(const ObjCMethodCall &msg) const {
670   const ObjCMethodDecl *MD = msg.getDecl();
671 
672   if (!MD || !MD->isVariadic() || isa<ObjCProtocolDecl>(MD->getDeclContext()))
673     return false;
674 
675   Selector S = msg.getSelector();
676 
677   if (msg.isInstanceMessage()) {
678     // FIXME: Ideally we'd look at the receiver interface here, but that's not
679     // useful for init, because alloc returns 'id'. In theory, this could lead
680     // to false positives, for example if there existed a class that had an
681     // initWithObjects: implementation that does accept non-Objective-C pointer
682     // types, but the chance of that happening is pretty small compared to the
683     // gains that this analysis gives.
684     const ObjCInterfaceDecl *Class = MD->getClassInterface();
685 
686     switch (findKnownClass(Class)) {
687     case FC_NSArray:
688     case FC_NSOrderedSet:
689     case FC_NSSet:
690       return S == initWithObjectsS;
691     case FC_NSDictionary:
692       return S == initWithObjectsAndKeysS;
693     default:
694       return false;
695     }
696   } else {
697     const ObjCInterfaceDecl *Class = msg.getReceiverInterface();
698 
699     switch (findKnownClass(Class)) {
700       case FC_NSArray:
701         return S == arrayWithObjectsS;
702       case FC_NSOrderedSet:
703         return S == orderedSetWithObjectsS;
704       case FC_NSSet:
705         return S == setWithObjectsS;
706       case FC_NSDictionary:
707         return S == dictionaryWithObjectsAndKeysS;
708       default:
709         return false;
710     }
711   }
712 }
713 
714 void VariadicMethodTypeChecker::checkPreObjCMessage(const ObjCMethodCall &msg,
715                                                     CheckerContext &C) const {
716   if (!BT) {
717     BT.reset(new APIMisuse(this,
718                            "Arguments passed to variadic method aren't all "
719                            "Objective-C pointer types"));
720 
721     ASTContext &Ctx = C.getASTContext();
722     arrayWithObjectsS = GetUnarySelector("arrayWithObjects", Ctx);
723     dictionaryWithObjectsAndKeysS =
724       GetUnarySelector("dictionaryWithObjectsAndKeys", Ctx);
725     setWithObjectsS = GetUnarySelector("setWithObjects", Ctx);
726     orderedSetWithObjectsS = GetUnarySelector("orderedSetWithObjects", Ctx);
727 
728     initWithObjectsS = GetUnarySelector("initWithObjects", Ctx);
729     initWithObjectsAndKeysS = GetUnarySelector("initWithObjectsAndKeys", Ctx);
730   }
731 
732   if (!isVariadicMessage(msg))
733       return;
734 
735   // We are not interested in the selector arguments since they have
736   // well-defined types, so the compiler will issue a warning for them.
737   unsigned variadicArgsBegin = msg.getSelector().getNumArgs();
738 
739   // We're not interested in the last argument since it has to be nil or the
740   // compiler would have issued a warning for it elsewhere.
741   unsigned variadicArgsEnd = msg.getNumArgs() - 1;
742 
743   if (variadicArgsEnd <= variadicArgsBegin)
744     return;
745 
746   // Verify that all arguments have Objective-C types.
747   Optional<ExplodedNode*> errorNode;
748 
749   for (unsigned I = variadicArgsBegin; I != variadicArgsEnd; ++I) {
750     QualType ArgTy = msg.getArgExpr(I)->getType();
751     if (ArgTy->isObjCObjectPointerType())
752       continue;
753 
754     // Block pointers are treaded as Objective-C pointers.
755     if (ArgTy->isBlockPointerType())
756       continue;
757 
758     // Ignore pointer constants.
759     if (msg.getArgSVal(I).getAs<loc::ConcreteInt>())
760       continue;
761 
762     // Ignore pointer types annotated with 'NSObject' attribute.
763     if (C.getASTContext().isObjCNSObjectType(ArgTy))
764       continue;
765 
766     // Ignore CF references, which can be toll-free bridged.
767     if (coreFoundation::isCFObjectRef(ArgTy))
768       continue;
769 
770     // Generate only one error node to use for all bug reports.
771     if (!errorNode.hasValue())
772       errorNode = C.generateNonFatalErrorNode();
773 
774     if (!errorNode.getValue())
775       continue;
776 
777     SmallString<128> sbuf;
778     llvm::raw_svector_ostream os(sbuf);
779 
780     StringRef TypeName = GetReceiverInterfaceName(msg);
781     if (!TypeName.empty())
782       os << "Argument to '" << TypeName << "' method '";
783     else
784       os << "Argument to method '";
785 
786     msg.getSelector().print(os);
787     os << "' should be an Objective-C pointer type, not '";
788     ArgTy.print(os, C.getLangOpts());
789     os << "'";
790 
791     auto R = std::make_unique<PathSensitiveBugReport>(*BT, os.str(),
792                                                       errorNode.getValue());
793     R->addRange(msg.getArgSourceRange(I));
794     C.emitReport(std::move(R));
795   }
796 }
797 
798 //===----------------------------------------------------------------------===//
799 // Improves the modeling of loops over Cocoa collections.
800 //===----------------------------------------------------------------------===//
801 
802 // The map from container symbol to the container count symbol.
803 // We currently will remember the last container count symbol encountered.
804 REGISTER_MAP_WITH_PROGRAMSTATE(ContainerCountMap, SymbolRef, SymbolRef)
805 REGISTER_MAP_WITH_PROGRAMSTATE(ContainerNonEmptyMap, SymbolRef, bool)
806 
807 namespace {
808 class ObjCLoopChecker
809   : public Checker<check::PostStmt<ObjCForCollectionStmt>,
810                    check::PostObjCMessage,
811                    check::DeadSymbols,
812                    check::PointerEscape > {
813   mutable IdentifierInfo *CountSelectorII;
814 
815   bool isCollectionCountMethod(const ObjCMethodCall &M,
816                                CheckerContext &C) const;
817 
818 public:
819   ObjCLoopChecker() : CountSelectorII(nullptr) {}
820   void checkPostStmt(const ObjCForCollectionStmt *FCS, CheckerContext &C) const;
821   void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
822   void checkDeadSymbols(SymbolReaper &SymReaper, CheckerContext &C) const;
823   ProgramStateRef checkPointerEscape(ProgramStateRef State,
824                                      const InvalidatedSymbols &Escaped,
825                                      const CallEvent *Call,
826                                      PointerEscapeKind Kind) const;
827 };
828 } // end anonymous namespace
829 
830 static bool isKnownNonNilCollectionType(QualType T) {
831   const ObjCObjectPointerType *PT = T->getAs<ObjCObjectPointerType>();
832   if (!PT)
833     return false;
834 
835   const ObjCInterfaceDecl *ID = PT->getInterfaceDecl();
836   if (!ID)
837     return false;
838 
839   switch (findKnownClass(ID)) {
840   case FC_NSArray:
841   case FC_NSDictionary:
842   case FC_NSEnumerator:
843   case FC_NSOrderedSet:
844   case FC_NSSet:
845     return true;
846   default:
847     return false;
848   }
849 }
850 
851 /// Assumes that the collection is non-nil.
852 ///
853 /// If the collection is known to be nil, returns NULL to indicate an infeasible
854 /// path.
855 static ProgramStateRef checkCollectionNonNil(CheckerContext &C,
856                                              ProgramStateRef State,
857                                              const ObjCForCollectionStmt *FCS) {
858   if (!State)
859     return nullptr;
860 
861   SVal CollectionVal = C.getSVal(FCS->getCollection());
862   Optional<DefinedSVal> KnownCollection = CollectionVal.getAs<DefinedSVal>();
863   if (!KnownCollection)
864     return State;
865 
866   ProgramStateRef StNonNil, StNil;
867   std::tie(StNonNil, StNil) = State->assume(*KnownCollection);
868   if (StNil && !StNonNil) {
869     // The collection is nil. This path is infeasible.
870     return nullptr;
871   }
872 
873   return StNonNil;
874 }
875 
876 /// Assumes that the collection elements are non-nil.
877 ///
878 /// This only applies if the collection is one of those known not to contain
879 /// nil values.
880 static ProgramStateRef checkElementNonNil(CheckerContext &C,
881                                           ProgramStateRef State,
882                                           const ObjCForCollectionStmt *FCS) {
883   if (!State)
884     return nullptr;
885 
886   // See if the collection is one where we /know/ the elements are non-nil.
887   if (!isKnownNonNilCollectionType(FCS->getCollection()->getType()))
888     return State;
889 
890   const LocationContext *LCtx = C.getLocationContext();
891   const Stmt *Element = FCS->getElement();
892 
893   // FIXME: Copied from ExprEngineObjC.
894   Optional<Loc> ElementLoc;
895   if (const DeclStmt *DS = dyn_cast<DeclStmt>(Element)) {
896     const VarDecl *ElemDecl = cast<VarDecl>(DS->getSingleDecl());
897     assert(ElemDecl->getInit() == nullptr);
898     ElementLoc = State->getLValue(ElemDecl, LCtx);
899   } else {
900     ElementLoc = State->getSVal(Element, LCtx).getAs<Loc>();
901   }
902 
903   if (!ElementLoc)
904     return State;
905 
906   // Go ahead and assume the value is non-nil.
907   SVal Val = State->getSVal(*ElementLoc);
908   return State->assume(Val.castAs<DefinedOrUnknownSVal>(), true);
909 }
910 
911 /// Returns NULL state if the collection is known to contain elements
912 /// (or is known not to contain elements if the Assumption parameter is false.)
913 static ProgramStateRef
914 assumeCollectionNonEmpty(CheckerContext &C, ProgramStateRef State,
915                          SymbolRef CollectionS, bool Assumption) {
916   if (!State || !CollectionS)
917     return State;
918 
919   const SymbolRef *CountS = State->get<ContainerCountMap>(CollectionS);
920   if (!CountS) {
921     const bool *KnownNonEmpty = State->get<ContainerNonEmptyMap>(CollectionS);
922     if (!KnownNonEmpty)
923       return State->set<ContainerNonEmptyMap>(CollectionS, Assumption);
924     return (Assumption == *KnownNonEmpty) ? State : nullptr;
925   }
926 
927   SValBuilder &SvalBuilder = C.getSValBuilder();
928   SVal CountGreaterThanZeroVal =
929     SvalBuilder.evalBinOp(State, BO_GT,
930                           nonloc::SymbolVal(*CountS),
931                           SvalBuilder.makeIntVal(0, (*CountS)->getType()),
932                           SvalBuilder.getConditionType());
933   Optional<DefinedSVal> CountGreaterThanZero =
934     CountGreaterThanZeroVal.getAs<DefinedSVal>();
935   if (!CountGreaterThanZero) {
936     // The SValBuilder cannot construct a valid SVal for this condition.
937     // This means we cannot properly reason about it.
938     return State;
939   }
940 
941   return State->assume(*CountGreaterThanZero, Assumption);
942 }
943 
944 static ProgramStateRef
945 assumeCollectionNonEmpty(CheckerContext &C, ProgramStateRef State,
946                          const ObjCForCollectionStmt *FCS,
947                          bool Assumption) {
948   if (!State)
949     return nullptr;
950 
951   SymbolRef CollectionS = C.getSVal(FCS->getCollection()).getAsSymbol();
952   return assumeCollectionNonEmpty(C, State, CollectionS, Assumption);
953 }
954 
955 /// If the fist block edge is a back edge, we are reentering the loop.
956 static bool alreadyExecutedAtLeastOneLoopIteration(const ExplodedNode *N,
957                                              const ObjCForCollectionStmt *FCS) {
958   if (!N)
959     return false;
960 
961   ProgramPoint P = N->getLocation();
962   if (Optional<BlockEdge> BE = P.getAs<BlockEdge>()) {
963     return BE->getSrc()->getLoopTarget() == FCS;
964   }
965 
966   // Keep looking for a block edge.
967   for (ExplodedNode::const_pred_iterator I = N->pred_begin(),
968                                          E = N->pred_end(); I != E; ++I) {
969     if (alreadyExecutedAtLeastOneLoopIteration(*I, FCS))
970       return true;
971   }
972 
973   return false;
974 }
975 
976 void ObjCLoopChecker::checkPostStmt(const ObjCForCollectionStmt *FCS,
977                                     CheckerContext &C) const {
978   ProgramStateRef State = C.getState();
979 
980   // Check if this is the branch for the end of the loop.
981   if (!ExprEngine::hasMoreIteration(State, FCS, C.getLocationContext())) {
982     if (!alreadyExecutedAtLeastOneLoopIteration(C.getPredecessor(), FCS))
983       State = assumeCollectionNonEmpty(C, State, FCS, /*Assumption*/false);
984 
985   // Otherwise, this is a branch that goes through the loop body.
986   } else {
987     State = checkCollectionNonNil(C, State, FCS);
988     State = checkElementNonNil(C, State, FCS);
989     State = assumeCollectionNonEmpty(C, State, FCS, /*Assumption*/true);
990   }
991 
992   if (!State)
993     C.generateSink(C.getState(), C.getPredecessor());
994   else if (State != C.getState())
995     C.addTransition(State);
996 }
997 
998 bool ObjCLoopChecker::isCollectionCountMethod(const ObjCMethodCall &M,
999                                               CheckerContext &C) const {
1000   Selector S = M.getSelector();
1001   // Initialize the identifiers on first use.
1002   if (!CountSelectorII)
1003     CountSelectorII = &C.getASTContext().Idents.get("count");
1004 
1005   // If the method returns collection count, record the value.
1006   return S.isUnarySelector() &&
1007          (S.getIdentifierInfoForSlot(0) == CountSelectorII);
1008 }
1009 
1010 void ObjCLoopChecker::checkPostObjCMessage(const ObjCMethodCall &M,
1011                                            CheckerContext &C) const {
1012   if (!M.isInstanceMessage())
1013     return;
1014 
1015   const ObjCInterfaceDecl *ClassID = M.getReceiverInterface();
1016   if (!ClassID)
1017     return;
1018 
1019   FoundationClass Class = findKnownClass(ClassID);
1020   if (Class != FC_NSDictionary &&
1021       Class != FC_NSArray &&
1022       Class != FC_NSSet &&
1023       Class != FC_NSOrderedSet)
1024     return;
1025 
1026   SymbolRef ContainerS = M.getReceiverSVal().getAsSymbol();
1027   if (!ContainerS)
1028     return;
1029 
1030   // If we are processing a call to "count", get the symbolic value returned by
1031   // a call to "count" and add it to the map.
1032   if (!isCollectionCountMethod(M, C))
1033     return;
1034 
1035   const Expr *MsgExpr = M.getOriginExpr();
1036   SymbolRef CountS = C.getSVal(MsgExpr).getAsSymbol();
1037   if (CountS) {
1038     ProgramStateRef State = C.getState();
1039 
1040     C.getSymbolManager().addSymbolDependency(ContainerS, CountS);
1041     State = State->set<ContainerCountMap>(ContainerS, CountS);
1042 
1043     if (const bool *NonEmpty = State->get<ContainerNonEmptyMap>(ContainerS)) {
1044       State = State->remove<ContainerNonEmptyMap>(ContainerS);
1045       State = assumeCollectionNonEmpty(C, State, ContainerS, *NonEmpty);
1046     }
1047 
1048     C.addTransition(State);
1049   }
1050 }
1051 
1052 static SymbolRef getMethodReceiverIfKnownImmutable(const CallEvent *Call) {
1053   const ObjCMethodCall *Message = dyn_cast_or_null<ObjCMethodCall>(Call);
1054   if (!Message)
1055     return nullptr;
1056 
1057   const ObjCMethodDecl *MD = Message->getDecl();
1058   if (!MD)
1059     return nullptr;
1060 
1061   const ObjCInterfaceDecl *StaticClass;
1062   if (isa<ObjCProtocolDecl>(MD->getDeclContext())) {
1063     // We can't find out where the method was declared without doing more work.
1064     // Instead, see if the receiver is statically typed as a known immutable
1065     // collection.
1066     StaticClass = Message->getOriginExpr()->getReceiverInterface();
1067   } else {
1068     StaticClass = MD->getClassInterface();
1069   }
1070 
1071   if (!StaticClass)
1072     return nullptr;
1073 
1074   switch (findKnownClass(StaticClass, /*IncludeSuper=*/false)) {
1075   case FC_None:
1076     return nullptr;
1077   case FC_NSArray:
1078   case FC_NSDictionary:
1079   case FC_NSEnumerator:
1080   case FC_NSNull:
1081   case FC_NSOrderedSet:
1082   case FC_NSSet:
1083   case FC_NSString:
1084     break;
1085   }
1086 
1087   return Message->getReceiverSVal().getAsSymbol();
1088 }
1089 
1090 ProgramStateRef
1091 ObjCLoopChecker::checkPointerEscape(ProgramStateRef State,
1092                                     const InvalidatedSymbols &Escaped,
1093                                     const CallEvent *Call,
1094                                     PointerEscapeKind Kind) const {
1095   SymbolRef ImmutableReceiver = getMethodReceiverIfKnownImmutable(Call);
1096 
1097   // Remove the invalidated symbols form the collection count map.
1098   for (InvalidatedSymbols::const_iterator I = Escaped.begin(),
1099        E = Escaped.end();
1100        I != E; ++I) {
1101     SymbolRef Sym = *I;
1102 
1103     // Don't invalidate this symbol's count if we know the method being called
1104     // is declared on an immutable class. This isn't completely correct if the
1105     // receiver is also passed as an argument, but in most uses of NSArray,
1106     // NSDictionary, etc. this isn't likely to happen in a dangerous way.
1107     if (Sym == ImmutableReceiver)
1108       continue;
1109 
1110     // The symbol escaped. Pessimistically, assume that the count could have
1111     // changed.
1112     State = State->remove<ContainerCountMap>(Sym);
1113     State = State->remove<ContainerNonEmptyMap>(Sym);
1114   }
1115   return State;
1116 }
1117 
1118 void ObjCLoopChecker::checkDeadSymbols(SymbolReaper &SymReaper,
1119                                        CheckerContext &C) const {
1120   ProgramStateRef State = C.getState();
1121 
1122   // Remove the dead symbols from the collection count map.
1123   ContainerCountMapTy Tracked = State->get<ContainerCountMap>();
1124   for (ContainerCountMapTy::iterator I = Tracked.begin(),
1125                                      E = Tracked.end(); I != E; ++I) {
1126     SymbolRef Sym = I->first;
1127     if (SymReaper.isDead(Sym)) {
1128       State = State->remove<ContainerCountMap>(Sym);
1129       State = State->remove<ContainerNonEmptyMap>(Sym);
1130     }
1131   }
1132 
1133   C.addTransition(State);
1134 }
1135 
1136 namespace {
1137 /// \class ObjCNonNilReturnValueChecker
1138 /// The checker restricts the return values of APIs known to
1139 /// never (or almost never) return 'nil'.
1140 class ObjCNonNilReturnValueChecker
1141   : public Checker<check::PostObjCMessage,
1142                    check::PostStmt<ObjCArrayLiteral>,
1143                    check::PostStmt<ObjCDictionaryLiteral>,
1144                    check::PostStmt<ObjCBoxedExpr> > {
1145     mutable bool Initialized;
1146     mutable Selector ObjectAtIndex;
1147     mutable Selector ObjectAtIndexedSubscript;
1148     mutable Selector NullSelector;
1149 
1150 public:
1151   ObjCNonNilReturnValueChecker() : Initialized(false) {}
1152 
1153   ProgramStateRef assumeExprIsNonNull(const Expr *NonNullExpr,
1154                                       ProgramStateRef State,
1155                                       CheckerContext &C) const;
1156   void assumeExprIsNonNull(const Expr *E, CheckerContext &C) const {
1157     C.addTransition(assumeExprIsNonNull(E, C.getState(), C));
1158   }
1159 
1160   void checkPostStmt(const ObjCArrayLiteral *E, CheckerContext &C) const {
1161     assumeExprIsNonNull(E, C);
1162   }
1163   void checkPostStmt(const ObjCDictionaryLiteral *E, CheckerContext &C) const {
1164     assumeExprIsNonNull(E, C);
1165   }
1166   void checkPostStmt(const ObjCBoxedExpr *E, CheckerContext &C) const {
1167     assumeExprIsNonNull(E, C);
1168   }
1169 
1170   void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
1171 };
1172 } // end anonymous namespace
1173 
1174 ProgramStateRef
1175 ObjCNonNilReturnValueChecker::assumeExprIsNonNull(const Expr *NonNullExpr,
1176                                                   ProgramStateRef State,
1177                                                   CheckerContext &C) const {
1178   SVal Val = C.getSVal(NonNullExpr);
1179   if (Optional<DefinedOrUnknownSVal> DV = Val.getAs<DefinedOrUnknownSVal>())
1180     return State->assume(*DV, true);
1181   return State;
1182 }
1183 
1184 void ObjCNonNilReturnValueChecker::checkPostObjCMessage(const ObjCMethodCall &M,
1185                                                         CheckerContext &C)
1186                                                         const {
1187   ProgramStateRef State = C.getState();
1188 
1189   if (!Initialized) {
1190     ASTContext &Ctx = C.getASTContext();
1191     ObjectAtIndex = GetUnarySelector("objectAtIndex", Ctx);
1192     ObjectAtIndexedSubscript = GetUnarySelector("objectAtIndexedSubscript", Ctx);
1193     NullSelector = GetNullarySelector("null", Ctx);
1194   }
1195 
1196   // Check the receiver type.
1197   if (const ObjCInterfaceDecl *Interface = M.getReceiverInterface()) {
1198 
1199     // Assume that object returned from '[self init]' or '[super init]' is not
1200     // 'nil' if we are processing an inlined function/method.
1201     //
1202     // A defensive callee will (and should) check if the object returned by
1203     // '[super init]' is 'nil' before doing it's own initialization. However,
1204     // since 'nil' is rarely returned in practice, we should not warn when the
1205     // caller to the defensive constructor uses the object in contexts where
1206     // 'nil' is not accepted.
1207     if (!C.inTopFrame() && M.getDecl() &&
1208         M.getDecl()->getMethodFamily() == OMF_init &&
1209         M.isReceiverSelfOrSuper()) {
1210       State = assumeExprIsNonNull(M.getOriginExpr(), State, C);
1211     }
1212 
1213     FoundationClass Cl = findKnownClass(Interface);
1214 
1215     // Objects returned from
1216     // [NSArray|NSOrderedSet]::[ObjectAtIndex|ObjectAtIndexedSubscript]
1217     // are never 'nil'.
1218     if (Cl == FC_NSArray || Cl == FC_NSOrderedSet) {
1219       Selector Sel = M.getSelector();
1220       if (Sel == ObjectAtIndex || Sel == ObjectAtIndexedSubscript) {
1221         // Go ahead and assume the value is non-nil.
1222         State = assumeExprIsNonNull(M.getOriginExpr(), State, C);
1223       }
1224     }
1225 
1226     // Objects returned from [NSNull null] are not nil.
1227     if (Cl == FC_NSNull) {
1228       if (M.getSelector() == NullSelector) {
1229         // Go ahead and assume the value is non-nil.
1230         State = assumeExprIsNonNull(M.getOriginExpr(), State, C);
1231       }
1232     }
1233   }
1234   C.addTransition(State);
1235 }
1236 
1237 //===----------------------------------------------------------------------===//
1238 // Check registration.
1239 //===----------------------------------------------------------------------===//
1240 
1241 void ento::registerNilArgChecker(CheckerManager &mgr) {
1242   mgr.registerChecker<NilArgChecker>();
1243 }
1244 
1245 bool ento::shouldRegisterNilArgChecker(const CheckerManager &mgr) {
1246   return true;
1247 }
1248 
1249 void ento::registerCFNumberChecker(CheckerManager &mgr) {
1250   mgr.registerChecker<CFNumberChecker>();
1251 }
1252 
1253 bool ento::shouldRegisterCFNumberChecker(const CheckerManager &mgr) {
1254   return true;
1255 }
1256 
1257 void ento::registerCFRetainReleaseChecker(CheckerManager &mgr) {
1258   mgr.registerChecker<CFRetainReleaseChecker>();
1259 }
1260 
1261 bool ento::shouldRegisterCFRetainReleaseChecker(const CheckerManager &mgr) {
1262   return true;
1263 }
1264 
1265 void ento::registerClassReleaseChecker(CheckerManager &mgr) {
1266   mgr.registerChecker<ClassReleaseChecker>();
1267 }
1268 
1269 bool ento::shouldRegisterClassReleaseChecker(const CheckerManager &mgr) {
1270   return true;
1271 }
1272 
1273 void ento::registerVariadicMethodTypeChecker(CheckerManager &mgr) {
1274   mgr.registerChecker<VariadicMethodTypeChecker>();
1275 }
1276 
1277 bool ento::shouldRegisterVariadicMethodTypeChecker(const CheckerManager &mgr) {
1278   return true;
1279 }
1280 
1281 void ento::registerObjCLoopChecker(CheckerManager &mgr) {
1282   mgr.registerChecker<ObjCLoopChecker>();
1283 }
1284 
1285 bool ento::shouldRegisterObjCLoopChecker(const CheckerManager &mgr) {
1286   return true;
1287 }
1288 
1289 void ento::registerObjCNonNilReturnValueChecker(CheckerManager &mgr) {
1290   mgr.registerChecker<ObjCNonNilReturnValueChecker>();
1291 }
1292 
1293 bool ento::shouldRegisterObjCNonNilReturnValueChecker(const CheckerManager &mgr) {
1294   return true;
1295 }
1296