1 //==- CheckObjCDealloc.cpp - Check ObjC -dealloc implementation --*- C++ -*-==// 2 // 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 // See https://llvm.org/LICENSE.txt for license information. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 // 7 //===----------------------------------------------------------------------===// 8 // 9 // This checker analyzes Objective-C -dealloc methods and their callees 10 // to warn about improper releasing of instance variables that back synthesized 11 // properties. It warns about missing releases in the following cases: 12 // - When a class has a synthesized instance variable for a 'retain' or 'copy' 13 // property and lacks a -dealloc method in its implementation. 14 // - When a class has a synthesized instance variable for a 'retain'/'copy' 15 // property but the ivar is not released in -dealloc by either -release 16 // or by nilling out the property. 17 // 18 // It warns about extra releases in -dealloc (but not in callees) when a 19 // synthesized instance variable is released in the following cases: 20 // - When the property is 'assign' and is not 'readonly'. 21 // - When the property is 'weak'. 22 // 23 // This checker only warns for instance variables synthesized to back 24 // properties. Handling the more general case would require inferring whether 25 // an instance variable is stored retained or not. For synthesized properties, 26 // this is specified in the property declaration itself. 27 // 28 //===----------------------------------------------------------------------===// 29 30 #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" 31 #include "clang/Analysis/PathDiagnostic.h" 32 #include "clang/AST/Attr.h" 33 #include "clang/AST/DeclObjC.h" 34 #include "clang/AST/Expr.h" 35 #include "clang/AST/ExprObjC.h" 36 #include "clang/Basic/LangOptions.h" 37 #include "clang/Basic/TargetInfo.h" 38 #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h" 39 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" 40 #include "clang/StaticAnalyzer/Core/Checker.h" 41 #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h" 42 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" 43 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" 44 #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h" 45 #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramStateTrait.h" 46 #include "clang/StaticAnalyzer/Core/PathSensitive/SymbolManager.h" 47 #include "llvm/Support/raw_ostream.h" 48 #include <optional> 49 50 using namespace clang; 51 using namespace ento; 52 53 /// Indicates whether an instance variable is required to be released in 54 /// -dealloc. 55 enum class ReleaseRequirement { 56 /// The instance variable must be released, either by calling 57 /// -release on it directly or by nilling it out with a property setter. 58 MustRelease, 59 60 /// The instance variable must not be directly released with -release. 61 MustNotReleaseDirectly, 62 63 /// The requirement for the instance variable could not be determined. 64 Unknown 65 }; 66 67 /// Returns true if the property implementation is synthesized and the 68 /// type of the property is retainable. 69 static bool isSynthesizedRetainableProperty(const ObjCPropertyImplDecl *I, 70 const ObjCIvarDecl **ID, 71 const ObjCPropertyDecl **PD) { 72 73 if (I->getPropertyImplementation() != ObjCPropertyImplDecl::Synthesize) 74 return false; 75 76 (*ID) = I->getPropertyIvarDecl(); 77 if (!(*ID)) 78 return false; 79 80 QualType T = (*ID)->getType(); 81 if (!T->isObjCRetainableType()) 82 return false; 83 84 (*PD) = I->getPropertyDecl(); 85 // Shouldn't be able to synthesize a property that doesn't exist. 86 assert(*PD); 87 88 return true; 89 } 90 91 namespace { 92 93 class ObjCDeallocChecker 94 : public Checker<check::ASTDecl<ObjCImplementationDecl>, 95 check::PreObjCMessage, check::PostObjCMessage, 96 check::PreCall, 97 check::BeginFunction, check::EndFunction, 98 eval::Assume, 99 check::PointerEscape, 100 check::PreStmt<ReturnStmt>> { 101 102 mutable const IdentifierInfo *NSObjectII = nullptr; 103 mutable const IdentifierInfo *SenTestCaseII = nullptr; 104 mutable const IdentifierInfo *XCTestCaseII = nullptr; 105 mutable const IdentifierInfo *Block_releaseII = nullptr; 106 mutable const IdentifierInfo *CIFilterII = nullptr; 107 108 mutable Selector DeallocSel; 109 mutable Selector ReleaseSel; 110 111 const BugType MissingReleaseBugType{this, "Missing ivar release (leak)", 112 categories::MemoryRefCount}; 113 const BugType ExtraReleaseBugType{this, "Extra ivar release", 114 categories::MemoryRefCount}; 115 const BugType MistakenDeallocBugType{this, "Mistaken dealloc", 116 categories::MemoryRefCount}; 117 118 public: 119 void checkASTDecl(const ObjCImplementationDecl *D, AnalysisManager& Mgr, 120 BugReporter &BR) const; 121 void checkBeginFunction(CheckerContext &Ctx) const; 122 void checkPreObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const; 123 void checkPreCall(const CallEvent &Call, CheckerContext &C) const; 124 void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const; 125 126 ProgramStateRef evalAssume(ProgramStateRef State, SVal Cond, 127 bool Assumption) const; 128 129 ProgramStateRef checkPointerEscape(ProgramStateRef State, 130 const InvalidatedSymbols &Escaped, 131 const CallEvent *Call, 132 PointerEscapeKind Kind) const; 133 void checkPreStmt(const ReturnStmt *RS, CheckerContext &C) const; 134 void checkEndFunction(const ReturnStmt *RS, CheckerContext &Ctx) const; 135 136 private: 137 void diagnoseMissingReleases(CheckerContext &C) const; 138 139 bool diagnoseExtraRelease(SymbolRef ReleasedValue, const ObjCMethodCall &M, 140 CheckerContext &C) const; 141 142 bool diagnoseMistakenDealloc(SymbolRef DeallocedValue, 143 const ObjCMethodCall &M, 144 CheckerContext &C) const; 145 146 SymbolRef getValueReleasedByNillingOut(const ObjCMethodCall &M, 147 CheckerContext &C) const; 148 149 const ObjCIvarRegion *getIvarRegionForIvarSymbol(SymbolRef IvarSym) const; 150 SymbolRef getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const; 151 152 const ObjCPropertyImplDecl* 153 findPropertyOnDeallocatingInstance(SymbolRef IvarSym, 154 CheckerContext &C) const; 155 156 ReleaseRequirement 157 getDeallocReleaseRequirement(const ObjCPropertyImplDecl *PropImpl) const; 158 159 bool isInInstanceDealloc(const CheckerContext &C, SVal &SelfValOut) const; 160 bool isInInstanceDealloc(const CheckerContext &C, const LocationContext *LCtx, 161 SVal &SelfValOut) const; 162 bool instanceDeallocIsOnStack(const CheckerContext &C, 163 SVal &InstanceValOut) const; 164 165 bool isSuperDeallocMessage(const ObjCMethodCall &M) const; 166 167 const ObjCImplDecl *getContainingObjCImpl(const LocationContext *LCtx) const; 168 169 const ObjCPropertyDecl * 170 findShadowedPropertyDecl(const ObjCPropertyImplDecl *PropImpl) const; 171 172 void transitionToReleaseValue(CheckerContext &C, SymbolRef Value) const; 173 ProgramStateRef removeValueRequiringRelease(ProgramStateRef State, 174 SymbolRef InstanceSym, 175 SymbolRef ValueSym) const; 176 177 void initIdentifierInfoAndSelectors(ASTContext &Ctx) const; 178 179 bool classHasSeparateTeardown(const ObjCInterfaceDecl *ID) const; 180 181 bool isReleasedByCIFilterDealloc(const ObjCPropertyImplDecl *PropImpl) const; 182 bool isNibLoadedIvarWithoutRetain(const ObjCPropertyImplDecl *PropImpl) const; 183 }; 184 } // End anonymous namespace. 185 186 187 /// Maps from the symbol for a class instance to the set of 188 /// symbols remaining that must be released in -dealloc. 189 REGISTER_SET_FACTORY_WITH_PROGRAMSTATE(SymbolSet, SymbolRef) 190 REGISTER_MAP_WITH_PROGRAMSTATE(UnreleasedIvarMap, SymbolRef, SymbolSet) 191 192 193 /// An AST check that diagnose when the class requires a -dealloc method and 194 /// is missing one. 195 void ObjCDeallocChecker::checkASTDecl(const ObjCImplementationDecl *D, 196 AnalysisManager &Mgr, 197 BugReporter &BR) const { 198 assert(Mgr.getLangOpts().getGC() != LangOptions::GCOnly); 199 assert(!Mgr.getLangOpts().ObjCAutoRefCount); 200 initIdentifierInfoAndSelectors(Mgr.getASTContext()); 201 202 const ObjCInterfaceDecl *ID = D->getClassInterface(); 203 // If the class is known to have a lifecycle with a separate teardown method 204 // then it may not require a -dealloc method. 205 if (classHasSeparateTeardown(ID)) 206 return; 207 208 // Does the class contain any synthesized properties that are retainable? 209 // If not, skip the check entirely. 210 const ObjCPropertyImplDecl *PropImplRequiringRelease = nullptr; 211 bool HasOthers = false; 212 for (const auto *I : D->property_impls()) { 213 if (getDeallocReleaseRequirement(I) == ReleaseRequirement::MustRelease) { 214 if (!PropImplRequiringRelease) 215 PropImplRequiringRelease = I; 216 else { 217 HasOthers = true; 218 break; 219 } 220 } 221 } 222 223 if (!PropImplRequiringRelease) 224 return; 225 226 const ObjCMethodDecl *MD = nullptr; 227 228 // Scan the instance methods for "dealloc". 229 for (const auto *I : D->instance_methods()) { 230 if (I->getSelector() == DeallocSel) { 231 MD = I; 232 break; 233 } 234 } 235 236 if (!MD) { // No dealloc found. 237 const char* Name = "Missing -dealloc"; 238 239 std::string Buf; 240 llvm::raw_string_ostream OS(Buf); 241 OS << "'" << *D << "' lacks a 'dealloc' instance method but " 242 << "must release '" << *PropImplRequiringRelease->getPropertyIvarDecl() 243 << "'"; 244 245 if (HasOthers) 246 OS << " and others"; 247 PathDiagnosticLocation DLoc = 248 PathDiagnosticLocation::createBegin(D, BR.getSourceManager()); 249 250 BR.EmitBasicReport(D, this, Name, categories::CoreFoundationObjectiveC, 251 OS.str(), DLoc); 252 return; 253 } 254 } 255 256 /// If this is the beginning of -dealloc, mark the values initially stored in 257 /// instance variables that must be released by the end of -dealloc 258 /// as unreleased in the state. 259 void ObjCDeallocChecker::checkBeginFunction( 260 CheckerContext &C) const { 261 initIdentifierInfoAndSelectors(C.getASTContext()); 262 263 // Only do this if the current method is -dealloc. 264 SVal SelfVal; 265 if (!isInInstanceDealloc(C, SelfVal)) 266 return; 267 268 SymbolRef SelfSymbol = SelfVal.getAsSymbol(); 269 270 const LocationContext *LCtx = C.getLocationContext(); 271 ProgramStateRef InitialState = C.getState(); 272 273 ProgramStateRef State = InitialState; 274 275 SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>(); 276 277 // Symbols that must be released by the end of the -dealloc; 278 SymbolSet RequiredReleases = F.getEmptySet(); 279 280 // If we're an inlined -dealloc, we should add our symbols to the existing 281 // set from our subclass. 282 if (const SymbolSet *CurrSet = State->get<UnreleasedIvarMap>(SelfSymbol)) 283 RequiredReleases = *CurrSet; 284 285 for (auto *PropImpl : getContainingObjCImpl(LCtx)->property_impls()) { 286 ReleaseRequirement Requirement = getDeallocReleaseRequirement(PropImpl); 287 if (Requirement != ReleaseRequirement::MustRelease) 288 continue; 289 290 SVal LVal = State->getLValue(PropImpl->getPropertyIvarDecl(), SelfVal); 291 std::optional<Loc> LValLoc = LVal.getAs<Loc>(); 292 if (!LValLoc) 293 continue; 294 295 SVal InitialVal = State->getSVal(*LValLoc); 296 SymbolRef Symbol = InitialVal.getAsSymbol(); 297 if (!Symbol || !isa<SymbolRegionValue>(Symbol)) 298 continue; 299 300 // Mark the value as requiring a release. 301 RequiredReleases = F.add(RequiredReleases, Symbol); 302 } 303 304 if (!RequiredReleases.isEmpty()) { 305 State = State->set<UnreleasedIvarMap>(SelfSymbol, RequiredReleases); 306 } 307 308 if (State != InitialState) { 309 C.addTransition(State); 310 } 311 } 312 313 /// Given a symbol for an ivar, return the ivar region it was loaded from. 314 /// Returns nullptr if the instance symbol cannot be found. 315 const ObjCIvarRegion * 316 ObjCDeallocChecker::getIvarRegionForIvarSymbol(SymbolRef IvarSym) const { 317 return dyn_cast_or_null<ObjCIvarRegion>(IvarSym->getOriginRegion()); 318 } 319 320 /// Given a symbol for an ivar, return a symbol for the instance containing 321 /// the ivar. Returns nullptr if the instance symbol cannot be found. 322 SymbolRef 323 ObjCDeallocChecker::getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const { 324 325 const ObjCIvarRegion *IvarRegion = getIvarRegionForIvarSymbol(IvarSym); 326 if (!IvarRegion) 327 return nullptr; 328 329 const SymbolicRegion *SR = IvarRegion->getSymbolicBase(); 330 assert(SR && "Symbolic base should not be nullptr"); 331 return SR->getSymbol(); 332 } 333 334 /// If we are in -dealloc or -dealloc is on the stack, handle the call if it is 335 /// a release or a nilling-out property setter. 336 void ObjCDeallocChecker::checkPreObjCMessage( 337 const ObjCMethodCall &M, CheckerContext &C) const { 338 // Only run if -dealloc is on the stack. 339 SVal DeallocedInstance; 340 if (!instanceDeallocIsOnStack(C, DeallocedInstance)) 341 return; 342 343 SymbolRef ReleasedValue = nullptr; 344 345 if (M.getSelector() == ReleaseSel) { 346 ReleasedValue = M.getReceiverSVal().getAsSymbol(); 347 } else if (M.getSelector() == DeallocSel && !M.isReceiverSelfOrSuper()) { 348 if (diagnoseMistakenDealloc(M.getReceiverSVal().getAsSymbol(), M, C)) 349 return; 350 } 351 352 if (ReleasedValue) { 353 // An instance variable symbol was released with -release: 354 // [_property release]; 355 if (diagnoseExtraRelease(ReleasedValue,M, C)) 356 return; 357 } else { 358 // An instance variable symbol was released nilling out its property: 359 // self.property = nil; 360 ReleasedValue = getValueReleasedByNillingOut(M, C); 361 } 362 363 if (!ReleasedValue) 364 return; 365 366 transitionToReleaseValue(C, ReleasedValue); 367 } 368 369 /// If we are in -dealloc or -dealloc is on the stack, handle the call if it is 370 /// call to Block_release(). 371 void ObjCDeallocChecker::checkPreCall(const CallEvent &Call, 372 CheckerContext &C) const { 373 const IdentifierInfo *II = Call.getCalleeIdentifier(); 374 if (II != Block_releaseII) 375 return; 376 377 if (Call.getNumArgs() != 1) 378 return; 379 380 SymbolRef ReleasedValue = Call.getArgSVal(0).getAsSymbol(); 381 if (!ReleasedValue) 382 return; 383 384 transitionToReleaseValue(C, ReleasedValue); 385 } 386 /// If the message was a call to '[super dealloc]', diagnose any missing 387 /// releases. 388 void ObjCDeallocChecker::checkPostObjCMessage( 389 const ObjCMethodCall &M, CheckerContext &C) const { 390 // We perform this check post-message so that if the super -dealloc 391 // calls a helper method and that this class overrides, any ivars released in 392 // the helper method will be recorded before checking. 393 if (isSuperDeallocMessage(M)) 394 diagnoseMissingReleases(C); 395 } 396 397 /// Check for missing releases even when -dealloc does not call 398 /// '[super dealloc]'. 399 void ObjCDeallocChecker::checkEndFunction( 400 const ReturnStmt *RS, CheckerContext &C) const { 401 diagnoseMissingReleases(C); 402 } 403 404 /// Check for missing releases on early return. 405 void ObjCDeallocChecker::checkPreStmt( 406 const ReturnStmt *RS, CheckerContext &C) const { 407 diagnoseMissingReleases(C); 408 } 409 410 /// When a symbol is assumed to be nil, remove it from the set of symbols 411 /// require to be nil. 412 ProgramStateRef ObjCDeallocChecker::evalAssume(ProgramStateRef State, SVal Cond, 413 bool Assumption) const { 414 if (State->get<UnreleasedIvarMap>().isEmpty()) 415 return State; 416 417 auto *CondBSE = dyn_cast_or_null<BinarySymExpr>(Cond.getAsSymbol()); 418 if (!CondBSE) 419 return State; 420 421 BinaryOperator::Opcode OpCode = CondBSE->getOpcode(); 422 if (Assumption) { 423 if (OpCode != BO_EQ) 424 return State; 425 } else { 426 if (OpCode != BO_NE) 427 return State; 428 } 429 430 SymbolRef NullSymbol = nullptr; 431 if (auto *SIE = dyn_cast<SymIntExpr>(CondBSE)) { 432 const llvm::APInt &RHS = SIE->getRHS(); 433 if (RHS != 0) 434 return State; 435 NullSymbol = SIE->getLHS(); 436 } else if (auto *SIE = dyn_cast<IntSymExpr>(CondBSE)) { 437 const llvm::APInt &LHS = SIE->getLHS(); 438 if (LHS != 0) 439 return State; 440 NullSymbol = SIE->getRHS(); 441 } else { 442 return State; 443 } 444 445 SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(NullSymbol); 446 if (!InstanceSymbol) 447 return State; 448 449 State = removeValueRequiringRelease(State, InstanceSymbol, NullSymbol); 450 451 return State; 452 } 453 454 /// If a symbol escapes conservatively assume unseen code released it. 455 ProgramStateRef ObjCDeallocChecker::checkPointerEscape( 456 ProgramStateRef State, const InvalidatedSymbols &Escaped, 457 const CallEvent *Call, PointerEscapeKind Kind) const { 458 459 if (State->get<UnreleasedIvarMap>().isEmpty()) 460 return State; 461 462 // Don't treat calls to '[super dealloc]' as escaping for the purposes 463 // of this checker. Because the checker diagnoses missing releases in the 464 // post-message handler for '[super dealloc], escaping here would cause 465 // the checker to never warn. 466 auto *OMC = dyn_cast_or_null<ObjCMethodCall>(Call); 467 if (OMC && isSuperDeallocMessage(*OMC)) 468 return State; 469 470 for (const auto &Sym : Escaped) { 471 if (!Call || (Call && !Call->isInSystemHeader())) { 472 // If Sym is a symbol for an object with instance variables that 473 // must be released, remove these obligations when the object escapes 474 // unless via a call to a system function. System functions are 475 // very unlikely to release instance variables on objects passed to them, 476 // and are frequently called on 'self' in -dealloc (e.g., to remove 477 // observers) -- we want to avoid false negatives from escaping on 478 // them. 479 State = State->remove<UnreleasedIvarMap>(Sym); 480 } 481 482 483 SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(Sym); 484 if (!InstanceSymbol) 485 continue; 486 487 State = removeValueRequiringRelease(State, InstanceSymbol, Sym); 488 } 489 490 return State; 491 } 492 493 /// Report any unreleased instance variables for the current instance being 494 /// dealloced. 495 void ObjCDeallocChecker::diagnoseMissingReleases(CheckerContext &C) const { 496 ProgramStateRef State = C.getState(); 497 498 SVal SelfVal; 499 if (!isInInstanceDealloc(C, SelfVal)) 500 return; 501 502 const MemRegion *SelfRegion = SelfVal.castAs<loc::MemRegionVal>().getRegion(); 503 const LocationContext *LCtx = C.getLocationContext(); 504 505 ExplodedNode *ErrNode = nullptr; 506 507 SymbolRef SelfSym = SelfVal.getAsSymbol(); 508 if (!SelfSym) 509 return; 510 511 const SymbolSet *OldUnreleased = State->get<UnreleasedIvarMap>(SelfSym); 512 if (!OldUnreleased) 513 return; 514 515 SymbolSet NewUnreleased = *OldUnreleased; 516 SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>(); 517 518 ProgramStateRef InitialState = State; 519 520 for (auto *IvarSymbol : *OldUnreleased) { 521 const TypedValueRegion *TVR = 522 cast<SymbolRegionValue>(IvarSymbol)->getRegion(); 523 const ObjCIvarRegion *IvarRegion = cast<ObjCIvarRegion>(TVR); 524 525 // Don't warn if the ivar is not for this instance. 526 if (SelfRegion != IvarRegion->getSuperRegion()) 527 continue; 528 529 const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl(); 530 // Prevent an inlined call to -dealloc in a super class from warning 531 // about the values the subclass's -dealloc should release. 532 if (IvarDecl->getContainingInterface() != 533 cast<ObjCMethodDecl>(LCtx->getDecl())->getClassInterface()) 534 continue; 535 536 // Prevents diagnosing multiple times for the same instance variable 537 // at, for example, both a return and at the end of the function. 538 NewUnreleased = F.remove(NewUnreleased, IvarSymbol); 539 540 if (State->getStateManager() 541 .getConstraintManager() 542 .isNull(State, IvarSymbol) 543 .isConstrainedTrue()) { 544 continue; 545 } 546 547 // A missing release manifests as a leak, so treat as a non-fatal error. 548 if (!ErrNode) 549 ErrNode = C.generateNonFatalErrorNode(); 550 // If we've already reached this node on another path, return without 551 // diagnosing. 552 if (!ErrNode) 553 return; 554 555 std::string Buf; 556 llvm::raw_string_ostream OS(Buf); 557 558 const ObjCInterfaceDecl *Interface = IvarDecl->getContainingInterface(); 559 // If the class is known to have a lifecycle with teardown that is 560 // separate from -dealloc, do not warn about missing releases. We 561 // suppress here (rather than not tracking for instance variables in 562 // such classes) because these classes are rare. 563 if (classHasSeparateTeardown(Interface)) 564 return; 565 566 ObjCImplDecl *ImplDecl = Interface->getImplementation(); 567 568 const ObjCPropertyImplDecl *PropImpl = 569 ImplDecl->FindPropertyImplIvarDecl(IvarDecl->getIdentifier()); 570 571 const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl(); 572 573 assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Copy || 574 PropDecl->getSetterKind() == ObjCPropertyDecl::Retain); 575 576 OS << "The '" << *IvarDecl << "' ivar in '" << *ImplDecl 577 << "' was "; 578 579 if (PropDecl->getSetterKind() == ObjCPropertyDecl::Retain) 580 OS << "retained"; 581 else 582 OS << "copied"; 583 584 OS << " by a synthesized property but not released" 585 " before '[super dealloc]'"; 586 587 auto BR = std::make_unique<PathSensitiveBugReport>(MissingReleaseBugType, 588 OS.str(), ErrNode); 589 C.emitReport(std::move(BR)); 590 } 591 592 if (NewUnreleased.isEmpty()) { 593 State = State->remove<UnreleasedIvarMap>(SelfSym); 594 } else { 595 State = State->set<UnreleasedIvarMap>(SelfSym, NewUnreleased); 596 } 597 598 if (ErrNode) { 599 C.addTransition(State, ErrNode); 600 } else if (State != InitialState) { 601 C.addTransition(State); 602 } 603 604 // Make sure that after checking in the top-most frame the list of 605 // tracked ivars is empty. This is intended to detect accidental leaks in 606 // the UnreleasedIvarMap program state. 607 assert(!LCtx->inTopFrame() || State->get<UnreleasedIvarMap>().isEmpty()); 608 } 609 610 /// Given a symbol, determine whether the symbol refers to an ivar on 611 /// the top-most deallocating instance. If so, find the property for that 612 /// ivar, if one exists. Otherwise return null. 613 const ObjCPropertyImplDecl * 614 ObjCDeallocChecker::findPropertyOnDeallocatingInstance( 615 SymbolRef IvarSym, CheckerContext &C) const { 616 SVal DeallocedInstance; 617 if (!isInInstanceDealloc(C, DeallocedInstance)) 618 return nullptr; 619 620 // Try to get the region from which the ivar value was loaded. 621 auto *IvarRegion = getIvarRegionForIvarSymbol(IvarSym); 622 if (!IvarRegion) 623 return nullptr; 624 625 // Don't try to find the property if the ivar was not loaded from the 626 // given instance. 627 if (DeallocedInstance.castAs<loc::MemRegionVal>().getRegion() != 628 IvarRegion->getSuperRegion()) 629 return nullptr; 630 631 const LocationContext *LCtx = C.getLocationContext(); 632 const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl(); 633 634 const ObjCImplDecl *Container = getContainingObjCImpl(LCtx); 635 const ObjCPropertyImplDecl *PropImpl = 636 Container->FindPropertyImplIvarDecl(IvarDecl->getIdentifier()); 637 return PropImpl; 638 } 639 640 /// Emits a warning if the current context is -dealloc and ReleasedValue 641 /// must not be directly released in a -dealloc. Returns true if a diagnostic 642 /// was emitted. 643 bool ObjCDeallocChecker::diagnoseExtraRelease(SymbolRef ReleasedValue, 644 const ObjCMethodCall &M, 645 CheckerContext &C) const { 646 // Try to get the region from which the released value was loaded. 647 // Note that, unlike diagnosing for missing releases, here we don't track 648 // values that must not be released in the state. This is because even if 649 // these values escape, it is still an error under the rules of MRR to 650 // release them in -dealloc. 651 const ObjCPropertyImplDecl *PropImpl = 652 findPropertyOnDeallocatingInstance(ReleasedValue, C); 653 654 if (!PropImpl) 655 return false; 656 657 // If the ivar belongs to a property that must not be released directly 658 // in dealloc, emit a warning. 659 if (getDeallocReleaseRequirement(PropImpl) != 660 ReleaseRequirement::MustNotReleaseDirectly) { 661 return false; 662 } 663 664 // If the property is readwrite but it shadows a read-only property in its 665 // external interface, treat the property a read-only. If the outside 666 // world cannot write to a property then the internal implementation is free 667 // to make its own convention about whether the value is stored retained 668 // or not. We look up the shadow here rather than in 669 // getDeallocReleaseRequirement() because doing so can be expensive. 670 const ObjCPropertyDecl *PropDecl = findShadowedPropertyDecl(PropImpl); 671 if (PropDecl) { 672 if (PropDecl->isReadOnly()) 673 return false; 674 } else { 675 PropDecl = PropImpl->getPropertyDecl(); 676 } 677 678 ExplodedNode *ErrNode = C.generateNonFatalErrorNode(); 679 if (!ErrNode) 680 return false; 681 682 std::string Buf; 683 llvm::raw_string_ostream OS(Buf); 684 685 assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Weak || 686 (PropDecl->getSetterKind() == ObjCPropertyDecl::Assign && 687 !PropDecl->isReadOnly()) || 688 isReleasedByCIFilterDealloc(PropImpl) 689 ); 690 691 const ObjCImplDecl *Container = getContainingObjCImpl(C.getLocationContext()); 692 OS << "The '" << *PropImpl->getPropertyIvarDecl() 693 << "' ivar in '" << *Container; 694 695 696 if (isReleasedByCIFilterDealloc(PropImpl)) { 697 OS << "' will be released by '-[CIFilter dealloc]' but also released here"; 698 } else { 699 OS << "' was synthesized for "; 700 701 if (PropDecl->getSetterKind() == ObjCPropertyDecl::Weak) 702 OS << "a weak"; 703 else 704 OS << "an assign, readwrite"; 705 706 OS << " property but was released in 'dealloc'"; 707 } 708 709 auto BR = std::make_unique<PathSensitiveBugReport>(ExtraReleaseBugType, 710 OS.str(), ErrNode); 711 BR->addRange(M.getOriginExpr()->getSourceRange()); 712 713 C.emitReport(std::move(BR)); 714 715 return true; 716 } 717 718 /// Emits a warning if the current context is -dealloc and DeallocedValue 719 /// must not be directly dealloced in a -dealloc. Returns true if a diagnostic 720 /// was emitted. 721 bool ObjCDeallocChecker::diagnoseMistakenDealloc(SymbolRef DeallocedValue, 722 const ObjCMethodCall &M, 723 CheckerContext &C) const { 724 // TODO: Apart from unknown/undefined receivers, this may happen when 725 // dealloc is called as a class method. Should we warn? 726 if (!DeallocedValue) 727 return false; 728 729 // Find the property backing the instance variable that M 730 // is dealloc'ing. 731 const ObjCPropertyImplDecl *PropImpl = 732 findPropertyOnDeallocatingInstance(DeallocedValue, C); 733 if (!PropImpl) 734 return false; 735 736 if (getDeallocReleaseRequirement(PropImpl) != 737 ReleaseRequirement::MustRelease) { 738 return false; 739 } 740 741 ExplodedNode *ErrNode = C.generateErrorNode(); 742 if (!ErrNode) 743 return false; 744 745 std::string Buf; 746 llvm::raw_string_ostream OS(Buf); 747 748 OS << "'" << *PropImpl->getPropertyIvarDecl() 749 << "' should be released rather than deallocated"; 750 751 auto BR = std::make_unique<PathSensitiveBugReport>(MistakenDeallocBugType, 752 OS.str(), ErrNode); 753 BR->addRange(M.getOriginExpr()->getSourceRange()); 754 755 C.emitReport(std::move(BR)); 756 757 return true; 758 } 759 760 void ObjCDeallocChecker::initIdentifierInfoAndSelectors( 761 ASTContext &Ctx) const { 762 if (NSObjectII) 763 return; 764 765 NSObjectII = &Ctx.Idents.get("NSObject"); 766 SenTestCaseII = &Ctx.Idents.get("SenTestCase"); 767 XCTestCaseII = &Ctx.Idents.get("XCTestCase"); 768 Block_releaseII = &Ctx.Idents.get("_Block_release"); 769 CIFilterII = &Ctx.Idents.get("CIFilter"); 770 771 IdentifierInfo *DeallocII = &Ctx.Idents.get("dealloc"); 772 IdentifierInfo *ReleaseII = &Ctx.Idents.get("release"); 773 DeallocSel = Ctx.Selectors.getSelector(0, &DeallocII); 774 ReleaseSel = Ctx.Selectors.getSelector(0, &ReleaseII); 775 } 776 777 /// Returns true if M is a call to '[super dealloc]'. 778 bool ObjCDeallocChecker::isSuperDeallocMessage( 779 const ObjCMethodCall &M) const { 780 if (M.getOriginExpr()->getReceiverKind() != ObjCMessageExpr::SuperInstance) 781 return false; 782 783 return M.getSelector() == DeallocSel; 784 } 785 786 /// Returns the ObjCImplDecl containing the method declaration in LCtx. 787 const ObjCImplDecl * 788 ObjCDeallocChecker::getContainingObjCImpl(const LocationContext *LCtx) const { 789 auto *MD = cast<ObjCMethodDecl>(LCtx->getDecl()); 790 return cast<ObjCImplDecl>(MD->getDeclContext()); 791 } 792 793 /// Returns the property that shadowed by PropImpl if one exists and 794 /// nullptr otherwise. 795 const ObjCPropertyDecl *ObjCDeallocChecker::findShadowedPropertyDecl( 796 const ObjCPropertyImplDecl *PropImpl) const { 797 const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl(); 798 799 // Only readwrite properties can shadow. 800 if (PropDecl->isReadOnly()) 801 return nullptr; 802 803 auto *CatDecl = dyn_cast<ObjCCategoryDecl>(PropDecl->getDeclContext()); 804 805 // Only class extensions can contain shadowing properties. 806 if (!CatDecl || !CatDecl->IsClassExtension()) 807 return nullptr; 808 809 IdentifierInfo *ID = PropDecl->getIdentifier(); 810 DeclContext::lookup_result R = CatDecl->getClassInterface()->lookup(ID); 811 for (const NamedDecl *D : R) { 812 auto *ShadowedPropDecl = dyn_cast<ObjCPropertyDecl>(D); 813 if (!ShadowedPropDecl) 814 continue; 815 816 if (ShadowedPropDecl->isInstanceProperty()) { 817 assert(ShadowedPropDecl->isReadOnly()); 818 return ShadowedPropDecl; 819 } 820 } 821 822 return nullptr; 823 } 824 825 /// Add a transition noting the release of the given value. 826 void ObjCDeallocChecker::transitionToReleaseValue(CheckerContext &C, 827 SymbolRef Value) const { 828 assert(Value); 829 SymbolRef InstanceSym = getInstanceSymbolFromIvarSymbol(Value); 830 if (!InstanceSym) 831 return; 832 ProgramStateRef InitialState = C.getState(); 833 834 ProgramStateRef ReleasedState = 835 removeValueRequiringRelease(InitialState, InstanceSym, Value); 836 837 if (ReleasedState != InitialState) { 838 C.addTransition(ReleasedState); 839 } 840 } 841 842 /// Remove the Value requiring a release from the tracked set for 843 /// Instance and return the resultant state. 844 ProgramStateRef ObjCDeallocChecker::removeValueRequiringRelease( 845 ProgramStateRef State, SymbolRef Instance, SymbolRef Value) const { 846 assert(Instance); 847 assert(Value); 848 const ObjCIvarRegion *RemovedRegion = getIvarRegionForIvarSymbol(Value); 849 if (!RemovedRegion) 850 return State; 851 852 const SymbolSet *Unreleased = State->get<UnreleasedIvarMap>(Instance); 853 if (!Unreleased) 854 return State; 855 856 // Mark the value as no longer requiring a release. 857 SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>(); 858 SymbolSet NewUnreleased = *Unreleased; 859 for (auto &Sym : *Unreleased) { 860 const ObjCIvarRegion *UnreleasedRegion = getIvarRegionForIvarSymbol(Sym); 861 assert(UnreleasedRegion); 862 if (RemovedRegion->getDecl() == UnreleasedRegion->getDecl()) { 863 NewUnreleased = F.remove(NewUnreleased, Sym); 864 } 865 } 866 867 if (NewUnreleased.isEmpty()) { 868 return State->remove<UnreleasedIvarMap>(Instance); 869 } 870 871 return State->set<UnreleasedIvarMap>(Instance, NewUnreleased); 872 } 873 874 /// Determines whether the instance variable for \p PropImpl must or must not be 875 /// released in -dealloc or whether it cannot be determined. 876 ReleaseRequirement ObjCDeallocChecker::getDeallocReleaseRequirement( 877 const ObjCPropertyImplDecl *PropImpl) const { 878 const ObjCIvarDecl *IvarDecl; 879 const ObjCPropertyDecl *PropDecl; 880 if (!isSynthesizedRetainableProperty(PropImpl, &IvarDecl, &PropDecl)) 881 return ReleaseRequirement::Unknown; 882 883 ObjCPropertyDecl::SetterKind SK = PropDecl->getSetterKind(); 884 885 switch (SK) { 886 // Retain and copy setters retain/copy their values before storing and so 887 // the value in their instance variables must be released in -dealloc. 888 case ObjCPropertyDecl::Retain: 889 case ObjCPropertyDecl::Copy: 890 if (isReleasedByCIFilterDealloc(PropImpl)) 891 return ReleaseRequirement::MustNotReleaseDirectly; 892 893 if (isNibLoadedIvarWithoutRetain(PropImpl)) 894 return ReleaseRequirement::Unknown; 895 896 return ReleaseRequirement::MustRelease; 897 898 case ObjCPropertyDecl::Weak: 899 return ReleaseRequirement::MustNotReleaseDirectly; 900 901 case ObjCPropertyDecl::Assign: 902 // It is common for the ivars for read-only assign properties to 903 // always be stored retained, so their release requirement cannot be 904 // be determined. 905 if (PropDecl->isReadOnly()) 906 return ReleaseRequirement::Unknown; 907 908 return ReleaseRequirement::MustNotReleaseDirectly; 909 } 910 llvm_unreachable("Unrecognized setter kind"); 911 } 912 913 /// Returns the released value if M is a call a setter that releases 914 /// and nils out its underlying instance variable. 915 SymbolRef 916 ObjCDeallocChecker::getValueReleasedByNillingOut(const ObjCMethodCall &M, 917 CheckerContext &C) const { 918 SVal ReceiverVal = M.getReceiverSVal(); 919 if (!ReceiverVal.isValid()) 920 return nullptr; 921 922 if (M.getNumArgs() == 0) 923 return nullptr; 924 925 if (!M.getArgExpr(0)->getType()->isObjCRetainableType()) 926 return nullptr; 927 928 // Is the first argument nil? 929 SVal Arg = M.getArgSVal(0); 930 ProgramStateRef notNilState, nilState; 931 std::tie(notNilState, nilState) = 932 M.getState()->assume(Arg.castAs<DefinedOrUnknownSVal>()); 933 if (!(nilState && !notNilState)) 934 return nullptr; 935 936 const ObjCPropertyDecl *Prop = M.getAccessedProperty(); 937 if (!Prop) 938 return nullptr; 939 940 ObjCIvarDecl *PropIvarDecl = Prop->getPropertyIvarDecl(); 941 if (!PropIvarDecl) 942 return nullptr; 943 944 ProgramStateRef State = C.getState(); 945 946 SVal LVal = State->getLValue(PropIvarDecl, ReceiverVal); 947 std::optional<Loc> LValLoc = LVal.getAs<Loc>(); 948 if (!LValLoc) 949 return nullptr; 950 951 SVal CurrentValInIvar = State->getSVal(*LValLoc); 952 return CurrentValInIvar.getAsSymbol(); 953 } 954 955 /// Returns true if the current context is a call to -dealloc and false 956 /// otherwise. If true, it also sets SelfValOut to the value of 957 /// 'self'. 958 bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C, 959 SVal &SelfValOut) const { 960 return isInInstanceDealloc(C, C.getLocationContext(), SelfValOut); 961 } 962 963 /// Returns true if LCtx is a call to -dealloc and false 964 /// otherwise. If true, it also sets SelfValOut to the value of 965 /// 'self'. 966 bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C, 967 const LocationContext *LCtx, 968 SVal &SelfValOut) const { 969 auto *MD = dyn_cast<ObjCMethodDecl>(LCtx->getDecl()); 970 if (!MD || !MD->isInstanceMethod() || MD->getSelector() != DeallocSel) 971 return false; 972 973 const ImplicitParamDecl *SelfDecl = LCtx->getSelfDecl(); 974 assert(SelfDecl && "No self in -dealloc?"); 975 976 ProgramStateRef State = C.getState(); 977 SelfValOut = State->getSVal(State->getRegion(SelfDecl, LCtx)); 978 return true; 979 } 980 981 /// Returns true if there is a call to -dealloc anywhere on the stack and false 982 /// otherwise. If true, it also sets InstanceValOut to the value of 983 /// 'self' in the frame for -dealloc. 984 bool ObjCDeallocChecker::instanceDeallocIsOnStack(const CheckerContext &C, 985 SVal &InstanceValOut) const { 986 const LocationContext *LCtx = C.getLocationContext(); 987 988 while (LCtx) { 989 if (isInInstanceDealloc(C, LCtx, InstanceValOut)) 990 return true; 991 992 LCtx = LCtx->getParent(); 993 } 994 995 return false; 996 } 997 998 /// Returns true if the ID is a class in which is known to have 999 /// a separate teardown lifecycle. In this case, -dealloc warnings 1000 /// about missing releases should be suppressed. 1001 bool ObjCDeallocChecker::classHasSeparateTeardown( 1002 const ObjCInterfaceDecl *ID) const { 1003 // Suppress if the class is not a subclass of NSObject. 1004 for ( ; ID ; ID = ID->getSuperClass()) { 1005 IdentifierInfo *II = ID->getIdentifier(); 1006 1007 if (II == NSObjectII) 1008 return false; 1009 1010 // FIXME: For now, ignore classes that subclass SenTestCase and XCTestCase, 1011 // as these don't need to implement -dealloc. They implement tear down in 1012 // another way, which we should try and catch later. 1013 // http://llvm.org/bugs/show_bug.cgi?id=3187 1014 if (II == XCTestCaseII || II == SenTestCaseII) 1015 return true; 1016 } 1017 1018 return true; 1019 } 1020 1021 /// The -dealloc method in CIFilter highly unusual in that is will release 1022 /// instance variables belonging to its *subclasses* if the variable name 1023 /// starts with "input" or backs a property whose name starts with "input". 1024 /// Subclasses should not release these ivars in their own -dealloc method -- 1025 /// doing so could result in an over release. 1026 /// 1027 /// This method returns true if the property will be released by 1028 /// -[CIFilter dealloc]. 1029 bool ObjCDeallocChecker::isReleasedByCIFilterDealloc( 1030 const ObjCPropertyImplDecl *PropImpl) const { 1031 assert(PropImpl->getPropertyIvarDecl()); 1032 StringRef PropName = PropImpl->getPropertyDecl()->getName(); 1033 StringRef IvarName = PropImpl->getPropertyIvarDecl()->getName(); 1034 1035 const char *ReleasePrefix = "input"; 1036 if (!(PropName.starts_with(ReleasePrefix) || 1037 IvarName.starts_with(ReleasePrefix))) { 1038 return false; 1039 } 1040 1041 const ObjCInterfaceDecl *ID = 1042 PropImpl->getPropertyIvarDecl()->getContainingInterface(); 1043 for ( ; ID ; ID = ID->getSuperClass()) { 1044 IdentifierInfo *II = ID->getIdentifier(); 1045 if (II == CIFilterII) 1046 return true; 1047 } 1048 1049 return false; 1050 } 1051 1052 /// Returns whether the ivar backing the property is an IBOutlet that 1053 /// has its value set by nib loading code without retaining the value. 1054 /// 1055 /// On macOS, if there is no setter, the nib-loading code sets the ivar 1056 /// directly, without retaining the value, 1057 /// 1058 /// On iOS and its derivatives, the nib-loading code will call 1059 /// -setValue:forKey:, which retains the value before directly setting the ivar. 1060 bool ObjCDeallocChecker::isNibLoadedIvarWithoutRetain( 1061 const ObjCPropertyImplDecl *PropImpl) const { 1062 const ObjCIvarDecl *IvarDecl = PropImpl->getPropertyIvarDecl(); 1063 if (!IvarDecl->hasAttr<IBOutletAttr>()) 1064 return false; 1065 1066 const llvm::Triple &Target = 1067 IvarDecl->getASTContext().getTargetInfo().getTriple(); 1068 1069 if (!Target.isMacOSX()) 1070 return false; 1071 1072 if (PropImpl->getPropertyDecl()->getSetterMethodDecl()) 1073 return false; 1074 1075 return true; 1076 } 1077 1078 void ento::registerObjCDeallocChecker(CheckerManager &Mgr) { 1079 Mgr.registerChecker<ObjCDeallocChecker>(); 1080 } 1081 1082 bool ento::shouldRegisterObjCDeallocChecker(const CheckerManager &mgr) { 1083 // These checker only makes sense under MRR. 1084 const LangOptions &LO = mgr.getLangOpts(); 1085 return LO.getGC() != LangOptions::GCOnly && !LO.ObjCAutoRefCount; 1086 } 1087