xref: /freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/NonNullParamChecker.cpp (revision 1db9f3b21e39176dd5b67cf8ac378633b172463e)
1 //===--- NonNullParamChecker.cpp - Undefined arguments checker -*- C++ -*--===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // This defines NonNullParamChecker, which checks for arguments expected not to
10 // be null due to:
11 //   - the corresponding parameters being declared to have nonnull attribute
12 //   - the corresponding parameters being references; since the call would form
13 //     a reference to a null pointer
14 //
15 //===----------------------------------------------------------------------===//
16 
17 #include "clang/AST/Attr.h"
18 #include "clang/Analysis/AnyCall.h"
19 #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
20 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
21 #include "clang/StaticAnalyzer/Core/BugReporter/CommonBugCategories.h"
22 #include "clang/StaticAnalyzer/Core/Checker.h"
23 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
24 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
25 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
26 #include "llvm/ADT/StringExtras.h"
27 
28 using namespace clang;
29 using namespace ento;
30 
31 namespace {
32 class NonNullParamChecker
33     : public Checker<check::PreCall, check::BeginFunction,
34                      EventDispatcher<ImplicitNullDerefEvent>> {
35   const BugType BTAttrNonNull{
36       this, "Argument with 'nonnull' attribute passed null", "API"};
37   const BugType BTNullRefArg{this, "Dereference of null pointer"};
38 
39 public:
40   void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
41   void checkBeginFunction(CheckerContext &C) const;
42 
43   std::unique_ptr<PathSensitiveBugReport>
44   genReportNullAttrNonNull(const ExplodedNode *ErrorN, const Expr *ArgE,
45                            unsigned IdxOfArg) const;
46   std::unique_ptr<PathSensitiveBugReport>
47   genReportReferenceToNullPointer(const ExplodedNode *ErrorN,
48                                   const Expr *ArgE) const;
49 };
50 
51 template <class CallType>
52 void setBitsAccordingToFunctionAttributes(const CallType &Call,
53                                           llvm::SmallBitVector &AttrNonNull) {
54   const Decl *FD = Call.getDecl();
55 
56   for (const auto *NonNull : FD->specific_attrs<NonNullAttr>()) {
57     if (!NonNull->args_size()) {
58       // Lack of attribute parameters means that all of the parameters are
59       // implicitly marked as non-null.
60       AttrNonNull.set();
61       break;
62     }
63 
64     for (const ParamIdx &Idx : NonNull->args()) {
65       // 'nonnull' attribute's parameters are 1-based and should be adjusted to
66       // match actual AST parameter/argument indices.
67       unsigned IdxAST = Idx.getASTIndex();
68       if (IdxAST >= AttrNonNull.size())
69         continue;
70       AttrNonNull.set(IdxAST);
71     }
72   }
73 }
74 
75 template <class CallType>
76 void setBitsAccordingToParameterAttributes(const CallType &Call,
77                                            llvm::SmallBitVector &AttrNonNull) {
78   for (const ParmVarDecl *Parameter : Call.parameters()) {
79     unsigned ParameterIndex = Parameter->getFunctionScopeIndex();
80     if (ParameterIndex == AttrNonNull.size())
81       break;
82 
83     if (Parameter->hasAttr<NonNullAttr>())
84       AttrNonNull.set(ParameterIndex);
85   }
86 }
87 
88 template <class CallType>
89 llvm::SmallBitVector getNonNullAttrsImpl(const CallType &Call,
90                                          unsigned ExpectedSize) {
91   llvm::SmallBitVector AttrNonNull(ExpectedSize);
92 
93   setBitsAccordingToFunctionAttributes(Call, AttrNonNull);
94   setBitsAccordingToParameterAttributes(Call, AttrNonNull);
95 
96   return AttrNonNull;
97 }
98 
99 /// \return Bitvector marking non-null attributes.
100 llvm::SmallBitVector getNonNullAttrs(const CallEvent &Call) {
101   return getNonNullAttrsImpl(Call, Call.getNumArgs());
102 }
103 
104 /// \return Bitvector marking non-null attributes.
105 llvm::SmallBitVector getNonNullAttrs(const AnyCall &Call) {
106   return getNonNullAttrsImpl(Call, Call.param_size());
107 }
108 } // end anonymous namespace
109 
110 void NonNullParamChecker::checkPreCall(const CallEvent &Call,
111                                        CheckerContext &C) const {
112   if (!Call.getDecl())
113     return;
114 
115   llvm::SmallBitVector AttrNonNull = getNonNullAttrs(Call);
116   unsigned NumArgs = Call.getNumArgs();
117 
118   ProgramStateRef state = C.getState();
119   ArrayRef<ParmVarDecl *> parms = Call.parameters();
120 
121   for (unsigned idx = 0; idx < NumArgs; ++idx) {
122     // For vararg functions, a corresponding parameter decl may not exist.
123     bool HasParam = idx < parms.size();
124 
125     // Check if the parameter is a reference. We want to report when reference
126     // to a null pointer is passed as a parameter.
127     bool HasRefTypeParam =
128         HasParam ? parms[idx]->getType()->isReferenceType() : false;
129     bool ExpectedToBeNonNull = AttrNonNull.test(idx);
130 
131     if (!ExpectedToBeNonNull && !HasRefTypeParam)
132       continue;
133 
134     // If the value is unknown or undefined, we can't perform this check.
135     const Expr *ArgE = Call.getArgExpr(idx);
136     SVal V = Call.getArgSVal(idx);
137     auto DV = V.getAs<DefinedSVal>();
138     if (!DV)
139       continue;
140 
141     assert(!HasRefTypeParam || isa<Loc>(*DV));
142 
143     // Process the case when the argument is not a location.
144     if (ExpectedToBeNonNull && !isa<Loc>(*DV)) {
145       // If the argument is a union type, we want to handle a potential
146       // transparent_union GCC extension.
147       if (!ArgE)
148         continue;
149 
150       QualType T = ArgE->getType();
151       const RecordType *UT = T->getAsUnionType();
152       if (!UT || !UT->getDecl()->hasAttr<TransparentUnionAttr>())
153         continue;
154 
155       auto CSV = DV->getAs<nonloc::CompoundVal>();
156 
157       // FIXME: Handle LazyCompoundVals?
158       if (!CSV)
159         continue;
160 
161       V = *(CSV->begin());
162       DV = V.getAs<DefinedSVal>();
163       assert(++CSV->begin() == CSV->end());
164       // FIXME: Handle (some_union){ some_other_union_val }, which turns into
165       // a LazyCompoundVal inside a CompoundVal.
166       if (!isa<Loc>(V))
167         continue;
168 
169       // Retrieve the corresponding expression.
170       if (const auto *CE = dyn_cast<CompoundLiteralExpr>(ArgE))
171         if (const auto *IE = dyn_cast<InitListExpr>(CE->getInitializer()))
172           ArgE = dyn_cast<Expr>(*(IE->begin()));
173     }
174 
175     ConstraintManager &CM = C.getConstraintManager();
176     ProgramStateRef stateNotNull, stateNull;
177     std::tie(stateNotNull, stateNull) = CM.assumeDual(state, *DV);
178 
179     // Generate an error node.  Check for a null node in case
180     // we cache out.
181     if (stateNull && !stateNotNull) {
182       if (ExplodedNode *errorNode = C.generateErrorNode(stateNull)) {
183 
184         std::unique_ptr<BugReport> R;
185         if (ExpectedToBeNonNull)
186           R = genReportNullAttrNonNull(errorNode, ArgE, idx + 1);
187         else if (HasRefTypeParam)
188           R = genReportReferenceToNullPointer(errorNode, ArgE);
189 
190         // Highlight the range of the argument that was null.
191         R->addRange(Call.getArgSourceRange(idx));
192 
193         // Emit the bug report.
194         C.emitReport(std::move(R));
195       }
196 
197       // Always return.  Either we cached out or we just emitted an error.
198       return;
199     }
200 
201     if (stateNull) {
202       if (ExplodedNode *N = C.generateSink(stateNull, C.getPredecessor())) {
203         ImplicitNullDerefEvent event = {
204             V, false, N, &C.getBugReporter(),
205             /*IsDirectDereference=*/HasRefTypeParam};
206         dispatchEvent(event);
207       }
208     }
209 
210     // If a pointer value passed the check we should assume that it is
211     // indeed not null from this point forward.
212     state = stateNotNull;
213   }
214 
215   // If we reach here all of the arguments passed the nonnull check.
216   // If 'state' has been updated generated a new node.
217   C.addTransition(state);
218 }
219 
220 /// We want to trust developer annotations and consider all 'nonnull' parameters
221 /// as non-null indeed. Each marked parameter will get a corresponding
222 /// constraint.
223 ///
224 /// This approach will not only help us to get rid of some false positives, but
225 /// remove duplicates and shorten warning traces as well.
226 ///
227 /// \code
228 ///   void foo(int *x) [[gnu::nonnull]] {
229 ///     // . . .
230 ///     *x = 42;    // we don't want to consider this as an error...
231 ///     // . . .
232 ///   }
233 ///
234 ///   foo(nullptr); // ...and report here instead
235 /// \endcode
236 void NonNullParamChecker::checkBeginFunction(CheckerContext &Context) const {
237   // Planned assumption makes sense only for top-level functions.
238   // Inlined functions will get similar constraints as part of 'checkPreCall'.
239   if (!Context.inTopFrame())
240     return;
241 
242   const LocationContext *LocContext = Context.getLocationContext();
243 
244   const Decl *FD = LocContext->getDecl();
245   // AnyCall helps us here to avoid checking for FunctionDecl and ObjCMethodDecl
246   // separately and aggregates interfaces of these classes.
247   auto AbstractCall = AnyCall::forDecl(FD);
248   if (!AbstractCall)
249     return;
250 
251   ProgramStateRef State = Context.getState();
252   llvm::SmallBitVector ParameterNonNullMarks = getNonNullAttrs(*AbstractCall);
253 
254   for (const ParmVarDecl *Parameter : AbstractCall->parameters()) {
255     // 1. Check parameter if it is annotated as non-null
256     if (!ParameterNonNullMarks.test(Parameter->getFunctionScopeIndex()))
257       continue;
258 
259     // 2. Check that parameter is a pointer.
260     //    Nonnull attribute can be applied to non-pointers (by default
261     //    __attribute__(nonnull) implies "all parameters").
262     if (!Parameter->getType()->isPointerType())
263       continue;
264 
265     Loc ParameterLoc = State->getLValue(Parameter, LocContext);
266     // We never consider top-level function parameters undefined.
267     auto StoredVal =
268         State->getSVal(ParameterLoc).castAs<DefinedOrUnknownSVal>();
269 
270     // 3. Assume that it is indeed non-null
271     if (ProgramStateRef NewState = State->assume(StoredVal, true)) {
272       State = NewState;
273     }
274   }
275 
276   Context.addTransition(State);
277 }
278 
279 std::unique_ptr<PathSensitiveBugReport>
280 NonNullParamChecker::genReportNullAttrNonNull(const ExplodedNode *ErrorNode,
281                                               const Expr *ArgE,
282                                               unsigned IdxOfArg) const {
283   llvm::SmallString<256> SBuf;
284   llvm::raw_svector_ostream OS(SBuf);
285   OS << "Null pointer passed to "
286      << IdxOfArg << llvm::getOrdinalSuffix(IdxOfArg)
287      << " parameter expecting 'nonnull'";
288 
289   auto R =
290       std::make_unique<PathSensitiveBugReport>(BTAttrNonNull, SBuf, ErrorNode);
291   if (ArgE)
292     bugreporter::trackExpressionValue(ErrorNode, ArgE, *R);
293 
294   return R;
295 }
296 
297 std::unique_ptr<PathSensitiveBugReport>
298 NonNullParamChecker::genReportReferenceToNullPointer(
299     const ExplodedNode *ErrorNode, const Expr *ArgE) const {
300   auto R = std::make_unique<PathSensitiveBugReport>(
301       BTNullRefArg, "Forming reference to null pointer", ErrorNode);
302   if (ArgE) {
303     const Expr *ArgEDeref = bugreporter::getDerefExpr(ArgE);
304     if (!ArgEDeref)
305       ArgEDeref = ArgE;
306     bugreporter::trackExpressionValue(ErrorNode, ArgEDeref, *R);
307   }
308   return R;
309 }
310 
311 void ento::registerNonNullParamChecker(CheckerManager &mgr) {
312   mgr.registerChecker<NonNullParamChecker>();
313 }
314 
315 bool ento::shouldRegisterNonNullParamChecker(const CheckerManager &mgr) {
316   return true;
317 }
318