| 1 | // MoveChecker.cpp - Check use of moved-from objects. - C++ ---------------===// |
| 2 | // |
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // This defines checker which checks for potential misuses of a moved-from |
| 10 | // object. That means method calls on the object or copying it in moved-from |
| 11 | // state. |
| 12 | // |
| 13 | //===----------------------------------------------------------------------===// |
| 14 | |
| 15 | #include "Move.h" |
| 16 | #include "clang/AST/Attr.h" |
| 17 | #include "clang/AST/ExprCXX.h" |
| 18 | #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" |
| 19 | #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" |
| 20 | #include "clang/StaticAnalyzer/Core/Checker.h" |
| 21 | #include "clang/StaticAnalyzer/Core/CheckerManager.h" |
| 22 | #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" |
| 23 | #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" |
| 24 | #include "llvm/ADT/StringSet.h" |
| 25 | |
| 26 | using namespace clang; |
| 27 | using namespace ento; |
| 28 | |
| 29 | namespace { |
| 30 | struct RegionState { |
| 31 | private: |
| 32 | enum Kind { Moved, Reported } K; |
| 33 | RegionState(Kind InK) : K(InK) {} |
| 34 | |
| 35 | public: |
| 36 | bool isReported() const { return K == Reported; } |
| 37 | bool isMoved() const { return K == Moved; } |
| 38 | |
| 39 | static RegionState getReported() { return RegionState(Reported); } |
| 40 | static RegionState getMoved() { return RegionState(Moved); } |
| 41 | |
| 42 | bool operator==(const RegionState &X) const { return K == X.K; } |
| 43 | void Profile(llvm::FoldingSetNodeID &ID) const { ID.AddInteger(I: K); } |
| 44 | }; |
| 45 | } // end of anonymous namespace |
| 46 | |
| 47 | namespace { |
| 48 | class MoveChecker |
| 49 | : public Checker<check::PreCall, check::PostCall, |
| 50 | check::DeadSymbols, check::RegionChanges> { |
| 51 | public: |
| 52 | void checkPreCall(const CallEvent &MC, CheckerContext &C) const; |
| 53 | void checkPostCall(const CallEvent &MC, CheckerContext &C) const; |
| 54 | void checkDeadSymbols(SymbolReaper &SR, CheckerContext &C) const; |
| 55 | ProgramStateRef |
| 56 | checkRegionChanges(ProgramStateRef State, |
| 57 | const InvalidatedSymbols *Invalidated, |
| 58 | ArrayRef<const MemRegion *> RequestedRegions, |
| 59 | ArrayRef<const MemRegion *> InvalidatedRegions, |
| 60 | const LocationContext *LCtx, const CallEvent *Call) const; |
| 61 | void printState(raw_ostream &Out, ProgramStateRef State, |
| 62 | const char *NL, const char *Sep) const override; |
| 63 | |
| 64 | private: |
| 65 | enum MisuseKind { MK_FunCall, MK_Copy, MK_Move, MK_Dereference }; |
| 66 | enum StdObjectKind { SK_NonStd, SK_Unsafe, SK_Safe, SK_SmartPtr }; |
| 67 | |
| 68 | enum AggressivenessKind { // In any case, don't warn after a reset. |
| 69 | AK_Invalid = -1, |
| 70 | AK_KnownsOnly = 0, // Warn only about known move-unsafe classes. |
| 71 | AK_KnownsAndLocals = 1, // Also warn about all local objects. |
| 72 | AK_All = 2, // Warn on any use-after-move. |
| 73 | AK_NumKinds = AK_All |
| 74 | }; |
| 75 | |
| 76 | static bool misuseCausesCrash(MisuseKind MK) { |
| 77 | return MK == MK_Dereference; |
| 78 | } |
| 79 | |
| 80 | struct ObjectKind { |
| 81 | // Is this a local variable or a local rvalue reference? |
| 82 | bool IsLocal; |
| 83 | // Is this an STL object? If so, of what kind? |
| 84 | StdObjectKind StdKind; |
| 85 | }; |
| 86 | |
| 87 | // STL smart pointers are automatically re-initialized to null when moved |
| 88 | // from. So we can't warn on many methods, but we can warn when it is |
| 89 | // dereferenced, which is UB even if the resulting lvalue never gets read. |
| 90 | const llvm::StringSet<> StdSmartPtrClasses = { |
| 91 | "shared_ptr" , |
| 92 | "unique_ptr" , |
| 93 | "weak_ptr" , |
| 94 | }; |
| 95 | |
| 96 | // Not all of these are entirely move-safe, but they do provide *some* |
| 97 | // guarantees, and it means that somebody is using them after move |
| 98 | // in a valid manner. |
| 99 | // TODO: We can still try to identify *unsafe* use after move, |
| 100 | // like we did with smart pointers. |
| 101 | const llvm::StringSet<> StdSafeClasses = { |
| 102 | "basic_filebuf" , |
| 103 | "basic_ios" , |
| 104 | "future" , |
| 105 | "optional" , |
| 106 | "packaged_task" , |
| 107 | "promise" , |
| 108 | "shared_future" , |
| 109 | "shared_lock" , |
| 110 | "thread" , |
| 111 | "unique_lock" , |
| 112 | }; |
| 113 | |
| 114 | // Should we bother tracking the state of the object? |
| 115 | bool shouldBeTracked(ObjectKind OK) const { |
| 116 | // In non-aggressive mode, only warn on use-after-move of local variables |
| 117 | // (or local rvalue references) and of STL objects. The former is possible |
| 118 | // because local variables (or local rvalue references) are not tempting |
| 119 | // their user to re-use the storage. The latter is possible because STL |
| 120 | // objects are known to end up in a valid but unspecified state after the |
| 121 | // move and their state-reset methods are also known, which allows us to |
| 122 | // predict precisely when use-after-move is invalid. |
| 123 | // Some STL objects are known to conform to additional contracts after move, |
| 124 | // so they are not tracked. However, smart pointers specifically are tracked |
| 125 | // because we can perform extra checking over them. |
| 126 | // In aggressive mode, warn on any use-after-move because the user has |
| 127 | // intentionally asked us to completely eliminate use-after-move |
| 128 | // in his code. |
| 129 | return (Aggressiveness == AK_All) || |
| 130 | (Aggressiveness >= AK_KnownsAndLocals && OK.IsLocal) || |
| 131 | OK.StdKind == SK_Unsafe || OK.StdKind == SK_SmartPtr; |
| 132 | } |
| 133 | |
| 134 | // Some objects only suffer from some kinds of misuses, but we need to track |
| 135 | // them anyway because we cannot know in advance what misuse will we find. |
| 136 | bool shouldWarnAbout(ObjectKind OK, MisuseKind MK) const { |
| 137 | // Additionally, only warn on smart pointers when they are dereferenced (or |
| 138 | // local or we are aggressive). |
| 139 | return shouldBeTracked(OK) && |
| 140 | ((Aggressiveness == AK_All) || |
| 141 | (Aggressiveness >= AK_KnownsAndLocals && OK.IsLocal) || |
| 142 | OK.StdKind != SK_SmartPtr || MK == MK_Dereference); |
| 143 | } |
| 144 | |
| 145 | // Obtains ObjectKind of an object. Because class declaration cannot always |
| 146 | // be easily obtained from the memory region, it is supplied separately. |
| 147 | ObjectKind classifyObject(ProgramStateRef State, const MemRegion *MR, |
| 148 | const CXXRecordDecl *RD) const; |
| 149 | |
| 150 | // Classifies the object and dumps a user-friendly description string to |
| 151 | // the stream. |
| 152 | void explainObject(ProgramStateRef State, llvm::raw_ostream &OS, |
| 153 | const MemRegion *MR, const CXXRecordDecl *RD, |
| 154 | MisuseKind MK) const; |
| 155 | |
| 156 | bool belongsTo(const CXXRecordDecl *RD, const llvm::StringSet<> &Set) const; |
| 157 | |
| 158 | class MovedBugVisitor : public BugReporterVisitor { |
| 159 | public: |
| 160 | MovedBugVisitor(const MoveChecker &Chk, const MemRegion *R, |
| 161 | const CXXRecordDecl *RD, MisuseKind MK) |
| 162 | : Chk(Chk), Region(R), RD(RD), MK(MK), Found(false) {} |
| 163 | |
| 164 | void Profile(llvm::FoldingSetNodeID &ID) const override { |
| 165 | static int X = 0; |
| 166 | ID.AddPointer(Ptr: &X); |
| 167 | ID.AddPointer(Ptr: Region); |
| 168 | // Don't add RD because it's, in theory, uniquely determined by |
| 169 | // the region. In practice though, it's not always possible to obtain |
| 170 | // the declaration directly from the region, that's why we store it |
| 171 | // in the first place. |
| 172 | } |
| 173 | |
| 174 | PathDiagnosticPieceRef VisitNode(const ExplodedNode *N, |
| 175 | BugReporterContext &BRC, |
| 176 | PathSensitiveBugReport &BR) override; |
| 177 | |
| 178 | private: |
| 179 | const MoveChecker &Chk; |
| 180 | // The tracked region. |
| 181 | const MemRegion *Region; |
| 182 | // The class of the tracked object. |
| 183 | const CXXRecordDecl *RD; |
| 184 | // How exactly the object was misused. |
| 185 | const MisuseKind MK; |
| 186 | bool Found; |
| 187 | }; |
| 188 | |
| 189 | AggressivenessKind Aggressiveness = AK_KnownsAndLocals; |
| 190 | |
| 191 | public: |
| 192 | void setAggressiveness(StringRef Str, CheckerManager &Mgr) { |
| 193 | Aggressiveness = |
| 194 | llvm::StringSwitch<AggressivenessKind>(Str) |
| 195 | .Case(S: "KnownsOnly" , Value: AK_KnownsOnly) |
| 196 | .Case(S: "KnownsAndLocals" , Value: AK_KnownsAndLocals) |
| 197 | .Case(S: "All" , Value: AK_All) |
| 198 | .Default(Value: AK_Invalid); |
| 199 | |
| 200 | if (Aggressiveness == AK_Invalid) |
| 201 | Mgr.reportInvalidCheckerOptionValue(Checker: this, OptionName: "WarnOn" , |
| 202 | ExpectedValueDesc: "either \"KnownsOnly\", \"KnownsAndLocals\" or \"All\" string value" ); |
| 203 | }; |
| 204 | |
| 205 | private: |
| 206 | BugType BT{this, "Use-after-move" , categories::CXXMoveSemantics}; |
| 207 | |
| 208 | // Check if the given form of potential misuse of a given object |
| 209 | // should be reported. If so, get it reported. The callback from which |
| 210 | // this function was called should immediately return after the call |
| 211 | // because this function adds one or two transitions. |
| 212 | void modelUse(ProgramStateRef State, const MemRegion *Region, |
| 213 | const CXXRecordDecl *RD, MisuseKind MK, |
| 214 | CheckerContext &C) const; |
| 215 | |
| 216 | // Returns the exploded node against which the report was emitted. |
| 217 | // The caller *must* add any further transitions against this node. |
| 218 | // Returns nullptr and does not report if such node already exists. |
| 219 | ExplodedNode *tryToReportBug(const MemRegion *Region, const CXXRecordDecl *RD, |
| 220 | CheckerContext &C, MisuseKind MK) const; |
| 221 | |
| 222 | bool isInMoveSafeContext(const LocationContext *LC) const; |
| 223 | bool isStateResetMethod(const CXXMethodDecl *MethodDec) const; |
| 224 | bool isMoveSafeMethod(const CXXMethodDecl *MethodDec) const; |
| 225 | const ExplodedNode *getMoveLocation(const ExplodedNode *N, |
| 226 | const MemRegion *Region, |
| 227 | CheckerContext &C) const; |
| 228 | }; |
| 229 | } // end anonymous namespace |
| 230 | |
| 231 | REGISTER_MAP_WITH_PROGRAMSTATE(TrackedRegionMap, const MemRegion *, RegionState) |
| 232 | |
| 233 | // Define the inter-checker API. |
| 234 | namespace clang { |
| 235 | namespace ento { |
| 236 | namespace move { |
| 237 | bool isMovedFrom(ProgramStateRef State, const MemRegion *Region) { |
| 238 | const RegionState *RS = State->get<TrackedRegionMap>(key: Region); |
| 239 | return RS && (RS->isMoved() || RS->isReported()); |
| 240 | } |
| 241 | } // namespace move |
| 242 | } // namespace ento |
| 243 | } // namespace clang |
| 244 | |
| 245 | // If a region is removed all of the subregions needs to be removed too. |
| 246 | static ProgramStateRef removeFromState(ProgramStateRef State, |
| 247 | const MemRegion *Region) { |
| 248 | if (!Region) |
| 249 | return State; |
| 250 | for (auto &E : State->get<TrackedRegionMap>()) { |
| 251 | if (E.first->isSubRegionOf(R: Region)) |
| 252 | State = State->remove<TrackedRegionMap>(K: E.first); |
| 253 | } |
| 254 | return State; |
| 255 | } |
| 256 | |
| 257 | static bool isAnyBaseRegionReported(ProgramStateRef State, |
| 258 | const MemRegion *Region) { |
| 259 | for (auto &E : State->get<TrackedRegionMap>()) { |
| 260 | if (Region->isSubRegionOf(R: E.first) && E.second.isReported()) |
| 261 | return true; |
| 262 | } |
| 263 | return false; |
| 264 | } |
| 265 | |
| 266 | static const MemRegion *unwrapRValueReferenceIndirection(const MemRegion *MR) { |
| 267 | if (const auto *SR = dyn_cast_or_null<SymbolicRegion>(Val: MR)) { |
| 268 | SymbolRef Sym = SR->getSymbol(); |
| 269 | if (Sym->getType()->isRValueReferenceType()) |
| 270 | if (const MemRegion *OriginMR = Sym->getOriginRegion()) |
| 271 | return OriginMR; |
| 272 | } |
| 273 | return MR; |
| 274 | } |
| 275 | |
| 276 | PathDiagnosticPieceRef |
| 277 | MoveChecker::MovedBugVisitor::VisitNode(const ExplodedNode *N, |
| 278 | BugReporterContext &BRC, |
| 279 | PathSensitiveBugReport &BR) { |
| 280 | // We need only the last move of the reported object's region. |
| 281 | // The visitor walks the ExplodedGraph backwards. |
| 282 | if (Found) |
| 283 | return nullptr; |
| 284 | ProgramStateRef State = N->getState(); |
| 285 | ProgramStateRef StatePrev = N->getFirstPred()->getState(); |
| 286 | const RegionState *TrackedObject = State->get<TrackedRegionMap>(key: Region); |
| 287 | const RegionState *TrackedObjectPrev = |
| 288 | StatePrev->get<TrackedRegionMap>(key: Region); |
| 289 | if (!TrackedObject) |
| 290 | return nullptr; |
| 291 | if (TrackedObjectPrev && TrackedObject) |
| 292 | return nullptr; |
| 293 | |
| 294 | // Retrieve the associated statement. |
| 295 | const Stmt *S = N->getStmtForDiagnostics(); |
| 296 | if (!S) |
| 297 | return nullptr; |
| 298 | Found = true; |
| 299 | |
| 300 | SmallString<128> Str; |
| 301 | llvm::raw_svector_ostream OS(Str); |
| 302 | |
| 303 | ObjectKind OK = Chk.classifyObject(State, MR: Region, RD); |
| 304 | switch (OK.StdKind) { |
| 305 | case SK_SmartPtr: |
| 306 | if (MK == MK_Dereference) { |
| 307 | OS << "Smart pointer" ; |
| 308 | Chk.explainObject(State, OS, MR: Region, RD, MK); |
| 309 | OS << " is reset to null when moved from" ; |
| 310 | break; |
| 311 | } |
| 312 | |
| 313 | // If it's not a dereference, we don't care if it was reset to null |
| 314 | // or that it is even a smart pointer. |
| 315 | [[fallthrough]]; |
| 316 | case SK_NonStd: |
| 317 | case SK_Safe: |
| 318 | OS << "Object" ; |
| 319 | Chk.explainObject(State, OS, MR: Region, RD, MK); |
| 320 | OS << " is moved" ; |
| 321 | break; |
| 322 | case SK_Unsafe: |
| 323 | OS << "Object" ; |
| 324 | Chk.explainObject(State, OS, MR: Region, RD, MK); |
| 325 | OS << " is left in a valid but unspecified state after move" ; |
| 326 | break; |
| 327 | } |
| 328 | |
| 329 | // Generate the extra diagnostic. |
| 330 | PathDiagnosticLocation Pos(S, BRC.getSourceManager(), |
| 331 | N->getLocationContext()); |
| 332 | return std::make_shared<PathDiagnosticEventPiece>(args&: Pos, args: OS.str(), args: true); |
| 333 | } |
| 334 | |
| 335 | const ExplodedNode *MoveChecker::getMoveLocation(const ExplodedNode *N, |
| 336 | const MemRegion *Region, |
| 337 | CheckerContext &C) const { |
| 338 | // Walk the ExplodedGraph backwards and find the first node that referred to |
| 339 | // the tracked region. |
| 340 | const ExplodedNode *MoveNode = N; |
| 341 | |
| 342 | while (N) { |
| 343 | ProgramStateRef State = N->getState(); |
| 344 | if (!State->get<TrackedRegionMap>(key: Region)) |
| 345 | break; |
| 346 | MoveNode = N; |
| 347 | N = N->pred_empty() ? nullptr : *(N->pred_begin()); |
| 348 | } |
| 349 | return MoveNode; |
| 350 | } |
| 351 | |
| 352 | void MoveChecker::modelUse(ProgramStateRef State, const MemRegion *Region, |
| 353 | const CXXRecordDecl *RD, MisuseKind MK, |
| 354 | CheckerContext &C) const { |
| 355 | assert(!C.isDifferent() && "No transitions should have been made by now" ); |
| 356 | const RegionState *RS = State->get<TrackedRegionMap>(key: Region); |
| 357 | ObjectKind OK = classifyObject(State, MR: Region, RD); |
| 358 | |
| 359 | // Just in case: if it's not a smart pointer but it does have operator *, |
| 360 | // we shouldn't call the bug a dereference. |
| 361 | if (MK == MK_Dereference && OK.StdKind != SK_SmartPtr) |
| 362 | MK = MK_FunCall; |
| 363 | |
| 364 | if (!RS || !shouldWarnAbout(OK, MK) |
| 365 | || isInMoveSafeContext(LC: C.getLocationContext())) { |
| 366 | // Finalize changes made by the caller. |
| 367 | C.addTransition(State); |
| 368 | return; |
| 369 | } |
| 370 | |
| 371 | // Don't report it in case if any base region is already reported. |
| 372 | // But still generate a sink in case of UB. |
| 373 | // And still finalize changes made by the caller. |
| 374 | if (isAnyBaseRegionReported(State, Region)) { |
| 375 | if (misuseCausesCrash(MK)) { |
| 376 | C.generateSink(State, Pred: C.getPredecessor()); |
| 377 | } else { |
| 378 | C.addTransition(State); |
| 379 | } |
| 380 | return; |
| 381 | } |
| 382 | |
| 383 | ExplodedNode *N = tryToReportBug(Region, RD, C, MK); |
| 384 | |
| 385 | // If the program has already crashed on this path, don't bother. |
| 386 | if (!N || N->isSink()) |
| 387 | return; |
| 388 | |
| 389 | State = State->set<TrackedRegionMap>(K: Region, E: RegionState::getReported()); |
| 390 | C.addTransition(State, Pred: N); |
| 391 | } |
| 392 | |
| 393 | ExplodedNode *MoveChecker::tryToReportBug(const MemRegion *Region, |
| 394 | const CXXRecordDecl *RD, |
| 395 | CheckerContext &C, |
| 396 | MisuseKind MK) const { |
| 397 | if (ExplodedNode *N = misuseCausesCrash(MK) ? C.generateErrorNode() |
| 398 | : C.generateNonFatalErrorNode()) { |
| 399 | // Uniqueing report to the same object. |
| 400 | PathDiagnosticLocation LocUsedForUniqueing; |
| 401 | const ExplodedNode *MoveNode = getMoveLocation(N, Region, C); |
| 402 | |
| 403 | if (const Stmt *MoveStmt = MoveNode->getStmtForDiagnostics()) |
| 404 | LocUsedForUniqueing = PathDiagnosticLocation::createBegin( |
| 405 | S: MoveStmt, SM: C.getSourceManager(), LAC: MoveNode->getLocationContext()); |
| 406 | |
| 407 | // Creating the error message. |
| 408 | llvm::SmallString<128> Str; |
| 409 | llvm::raw_svector_ostream OS(Str); |
| 410 | ProgramStateRef State = N->getState(); |
| 411 | switch(MK) { |
| 412 | case MK_FunCall: |
| 413 | OS << "Method called on moved-from object" ; |
| 414 | explainObject(State, OS, MR: Region, RD, MK); |
| 415 | break; |
| 416 | case MK_Copy: |
| 417 | OS << "Moved-from object" ; |
| 418 | explainObject(State, OS, MR: Region, RD, MK); |
| 419 | OS << " is copied" ; |
| 420 | break; |
| 421 | case MK_Move: |
| 422 | OS << "Moved-from object" ; |
| 423 | explainObject(State, OS, MR: Region, RD, MK); |
| 424 | OS << " is moved" ; |
| 425 | break; |
| 426 | case MK_Dereference: |
| 427 | OS << "Dereference of null smart pointer" ; |
| 428 | explainObject(State, OS, MR: Region, RD, MK); |
| 429 | break; |
| 430 | } |
| 431 | |
| 432 | auto R = std::make_unique<PathSensitiveBugReport>( |
| 433 | args: BT, args: OS.str(), args&: N, args&: LocUsedForUniqueing, |
| 434 | args: MoveNode->getLocationContext()->getDecl()); |
| 435 | R->addVisitor(visitor: std::make_unique<MovedBugVisitor>(args: *this, args&: Region, args&: RD, args&: MK)); |
| 436 | C.emitReport(R: std::move(R)); |
| 437 | return N; |
| 438 | } |
| 439 | return nullptr; |
| 440 | } |
| 441 | |
| 442 | void MoveChecker::checkPostCall(const CallEvent &Call, |
| 443 | CheckerContext &C) const { |
| 444 | const auto *AFC = dyn_cast<AnyFunctionCall>(Val: &Call); |
| 445 | if (!AFC) |
| 446 | return; |
| 447 | |
| 448 | ProgramStateRef State = C.getState(); |
| 449 | const auto MethodDecl = dyn_cast_or_null<CXXMethodDecl>(Val: AFC->getDecl()); |
| 450 | if (!MethodDecl) |
| 451 | return; |
| 452 | |
| 453 | // Check if an object became moved-from. |
| 454 | // Object can become moved from after a call to move assignment operator or |
| 455 | // move constructor . |
| 456 | const auto *ConstructorDecl = dyn_cast<CXXConstructorDecl>(Val: MethodDecl); |
| 457 | if (ConstructorDecl && !ConstructorDecl->isMoveConstructor()) |
| 458 | return; |
| 459 | |
| 460 | if (!ConstructorDecl && !MethodDecl->isMoveAssignmentOperator()) |
| 461 | return; |
| 462 | |
| 463 | const auto ArgRegion = AFC->getArgSVal(Index: 0).getAsRegion(); |
| 464 | if (!ArgRegion) |
| 465 | return; |
| 466 | |
| 467 | // Skip moving the object to itself. |
| 468 | const auto *CC = dyn_cast_or_null<CXXConstructorCall>(Val: &Call); |
| 469 | if (CC && CC->getCXXThisVal().getAsRegion() == ArgRegion) |
| 470 | return; |
| 471 | |
| 472 | if (const auto *IC = dyn_cast<CXXInstanceCall>(Val: AFC)) |
| 473 | if (IC->getCXXThisVal().getAsRegion() == ArgRegion) |
| 474 | return; |
| 475 | |
| 476 | const MemRegion *BaseRegion = ArgRegion->getBaseRegion(); |
| 477 | // Skip temp objects because of their short lifetime. |
| 478 | if (BaseRegion->getAs<CXXTempObjectRegion>() || |
| 479 | AFC->getArgExpr(Index: 0)->isPRValue()) |
| 480 | return; |
| 481 | // If it has already been reported do not need to modify the state. |
| 482 | |
| 483 | if (State->get<TrackedRegionMap>(key: ArgRegion)) |
| 484 | return; |
| 485 | |
| 486 | const CXXRecordDecl *RD = MethodDecl->getParent(); |
| 487 | ObjectKind OK = classifyObject(State, MR: ArgRegion, RD); |
| 488 | if (shouldBeTracked(OK)) { |
| 489 | // Mark object as moved-from. |
| 490 | State = State->set<TrackedRegionMap>(K: ArgRegion, E: RegionState::getMoved()); |
| 491 | C.addTransition(State); |
| 492 | return; |
| 493 | } |
| 494 | assert(!C.isDifferent() && "Should not have made transitions on this path!" ); |
| 495 | } |
| 496 | |
| 497 | bool MoveChecker::isMoveSafeMethod(const CXXMethodDecl *MethodDec) const { |
| 498 | // We abandon the cases where bool/void/void* conversion happens. |
| 499 | if (const auto *ConversionDec = |
| 500 | dyn_cast_or_null<CXXConversionDecl>(Val: MethodDec)) { |
| 501 | const Type *Tp = ConversionDec->getConversionType().getTypePtrOrNull(); |
| 502 | if (!Tp) |
| 503 | return false; |
| 504 | if (Tp->isBooleanType() || Tp->isVoidType() || Tp->isVoidPointerType()) |
| 505 | return true; |
| 506 | } |
| 507 | // Function call `empty` can be skipped. |
| 508 | return (MethodDec && MethodDec->getDeclName().isIdentifier() && |
| 509 | (MethodDec->getName().lower() == "empty" || |
| 510 | MethodDec->getName().lower() == "isempty" )); |
| 511 | } |
| 512 | |
| 513 | bool MoveChecker::isStateResetMethod(const CXXMethodDecl *MethodDec) const { |
| 514 | if (!MethodDec) |
| 515 | return false; |
| 516 | if (MethodDec->hasAttr<ReinitializesAttr>()) |
| 517 | return true; |
| 518 | if (MethodDec->getDeclName().isIdentifier()) { |
| 519 | std::string MethodName = MethodDec->getName().lower(); |
| 520 | // TODO: Some of these methods (eg., resize) are not always resetting |
| 521 | // the state, so we should consider looking at the arguments. |
| 522 | if (MethodName == "assign" || MethodName == "clear" || |
| 523 | MethodName == "destroy" || MethodName == "reset" || |
| 524 | MethodName == "resize" || MethodName == "shrink" ) |
| 525 | return true; |
| 526 | } |
| 527 | return false; |
| 528 | } |
| 529 | |
| 530 | // Don't report an error inside a move related operation. |
| 531 | // We assume that the programmer knows what she does. |
| 532 | bool MoveChecker::isInMoveSafeContext(const LocationContext *LC) const { |
| 533 | do { |
| 534 | const auto *CtxDec = LC->getDecl(); |
| 535 | auto *CtorDec = dyn_cast_or_null<CXXConstructorDecl>(Val: CtxDec); |
| 536 | auto *DtorDec = dyn_cast_or_null<CXXDestructorDecl>(Val: CtxDec); |
| 537 | auto *MethodDec = dyn_cast_or_null<CXXMethodDecl>(Val: CtxDec); |
| 538 | if (DtorDec || (CtorDec && CtorDec->isCopyOrMoveConstructor()) || |
| 539 | (MethodDec && MethodDec->isOverloadedOperator() && |
| 540 | MethodDec->getOverloadedOperator() == OO_Equal) || |
| 541 | isStateResetMethod(MethodDec) || isMoveSafeMethod(MethodDec)) |
| 542 | return true; |
| 543 | } while ((LC = LC->getParent())); |
| 544 | return false; |
| 545 | } |
| 546 | |
| 547 | bool MoveChecker::belongsTo(const CXXRecordDecl *RD, |
| 548 | const llvm::StringSet<> &Set) const { |
| 549 | const IdentifierInfo *II = RD->getIdentifier(); |
| 550 | return II && Set.count(Key: II->getName()); |
| 551 | } |
| 552 | |
| 553 | MoveChecker::ObjectKind |
| 554 | MoveChecker::classifyObject(ProgramStateRef State, const MemRegion *MR, |
| 555 | const CXXRecordDecl *RD) const { |
| 556 | // Local variables and local rvalue references are classified as "Local". |
| 557 | // For the purposes of this checker, we classify move-safe STL types |
| 558 | // as not-"STL" types, because that's how the checker treats them. |
| 559 | MR = unwrapRValueReferenceIndirection(MR); |
| 560 | bool IsLocal = |
| 561 | isa_and_nonnull<VarRegion, CXXLifetimeExtendedObjectRegion>(Val: MR) && |
| 562 | MR->hasMemorySpace<StackSpaceRegion>(State); |
| 563 | |
| 564 | if (!RD || !RD->getDeclContext()->isStdNamespace()) |
| 565 | return { .IsLocal: IsLocal, .StdKind: SK_NonStd }; |
| 566 | |
| 567 | if (belongsTo(RD, Set: StdSmartPtrClasses)) |
| 568 | return { .IsLocal: IsLocal, .StdKind: SK_SmartPtr }; |
| 569 | |
| 570 | if (belongsTo(RD, Set: StdSafeClasses)) |
| 571 | return { .IsLocal: IsLocal, .StdKind: SK_Safe }; |
| 572 | |
| 573 | return { .IsLocal: IsLocal, .StdKind: SK_Unsafe }; |
| 574 | } |
| 575 | |
| 576 | void MoveChecker::explainObject(ProgramStateRef State, llvm::raw_ostream &OS, |
| 577 | const MemRegion *MR, const CXXRecordDecl *RD, |
| 578 | MisuseKind MK) const { |
| 579 | // We may need a leading space every time we actually explain anything, |
| 580 | // and we never know if we are to explain anything until we try. |
| 581 | if (const auto DR = |
| 582 | dyn_cast_or_null<DeclRegion>(Val: unwrapRValueReferenceIndirection(MR))) { |
| 583 | const auto *RegionDecl = cast<NamedDecl>(Val: DR->getDecl()); |
| 584 | OS << " '" << RegionDecl->getDeclName() << "'" ; |
| 585 | } |
| 586 | |
| 587 | ObjectKind OK = classifyObject(State, MR, RD); |
| 588 | switch (OK.StdKind) { |
| 589 | case SK_NonStd: |
| 590 | case SK_Safe: |
| 591 | break; |
| 592 | case SK_SmartPtr: |
| 593 | if (MK != MK_Dereference) |
| 594 | break; |
| 595 | |
| 596 | // We only care about the type if it's a dereference. |
| 597 | [[fallthrough]]; |
| 598 | case SK_Unsafe: |
| 599 | OS << " of type '" << RD->getQualifiedNameAsString() << "'" ; |
| 600 | break; |
| 601 | }; |
| 602 | } |
| 603 | |
| 604 | void MoveChecker::checkPreCall(const CallEvent &Call, CheckerContext &C) const { |
| 605 | ProgramStateRef State = C.getState(); |
| 606 | |
| 607 | // Remove the MemRegions from the map on which a ctor/dtor call or assignment |
| 608 | // happened. |
| 609 | |
| 610 | // Checking constructor calls. |
| 611 | if (const auto *CC = dyn_cast<CXXConstructorCall>(Val: &Call)) { |
| 612 | State = removeFromState(State, Region: CC->getCXXThisVal().getAsRegion()); |
| 613 | auto CtorDec = CC->getDecl(); |
| 614 | // Check for copying a moved-from object and report the bug. |
| 615 | if (CtorDec && CtorDec->isCopyOrMoveConstructor()) { |
| 616 | const MemRegion *ArgRegion = CC->getArgSVal(Index: 0).getAsRegion(); |
| 617 | const CXXRecordDecl *RD = CtorDec->getParent(); |
| 618 | MisuseKind MK = CtorDec->isMoveConstructor() ? MK_Move : MK_Copy; |
| 619 | modelUse(State, Region: ArgRegion, RD, MK, C); |
| 620 | return; |
| 621 | } |
| 622 | } |
| 623 | |
| 624 | const auto IC = dyn_cast<CXXInstanceCall>(Val: &Call); |
| 625 | if (!IC) |
| 626 | return; |
| 627 | |
| 628 | const MemRegion *ThisRegion = IC->getCXXThisVal().getAsRegion(); |
| 629 | if (!ThisRegion) |
| 630 | return; |
| 631 | |
| 632 | // The remaining part is check only for method call on a moved-from object. |
| 633 | const auto MethodDecl = dyn_cast_or_null<CXXMethodDecl>(Val: IC->getDecl()); |
| 634 | if (!MethodDecl) |
| 635 | return; |
| 636 | |
| 637 | // Calling a destructor on a moved object is fine. |
| 638 | if (isa<CXXDestructorDecl>(Val: MethodDecl)) |
| 639 | return; |
| 640 | |
| 641 | // We want to investigate the whole object, not only sub-object of a parent |
| 642 | // class in which the encountered method defined. |
| 643 | ThisRegion = ThisRegion->getMostDerivedObjectRegion(); |
| 644 | |
| 645 | if (isStateResetMethod(MethodDec: MethodDecl)) { |
| 646 | State = removeFromState(State, Region: ThisRegion); |
| 647 | C.addTransition(State); |
| 648 | return; |
| 649 | } |
| 650 | |
| 651 | if (isMoveSafeMethod(MethodDec: MethodDecl)) |
| 652 | return; |
| 653 | |
| 654 | // Store class declaration as well, for bug reporting purposes. |
| 655 | const CXXRecordDecl *RD = MethodDecl->getParent(); |
| 656 | |
| 657 | if (MethodDecl->isOverloadedOperator()) { |
| 658 | OverloadedOperatorKind OOK = MethodDecl->getOverloadedOperator(); |
| 659 | |
| 660 | if (OOK == OO_Equal) { |
| 661 | // Remove the tracked object for every assignment operator, but report bug |
| 662 | // only for move or copy assignment's argument. |
| 663 | State = removeFromState(State, Region: ThisRegion); |
| 664 | |
| 665 | if (MethodDecl->isCopyAssignmentOperator() || |
| 666 | MethodDecl->isMoveAssignmentOperator()) { |
| 667 | const MemRegion *ArgRegion = IC->getArgSVal(Index: 0).getAsRegion(); |
| 668 | MisuseKind MK = |
| 669 | MethodDecl->isMoveAssignmentOperator() ? MK_Move : MK_Copy; |
| 670 | modelUse(State, Region: ArgRegion, RD, MK, C); |
| 671 | return; |
| 672 | } |
| 673 | C.addTransition(State); |
| 674 | return; |
| 675 | } |
| 676 | |
| 677 | if (OOK == OO_Star || OOK == OO_Arrow) { |
| 678 | modelUse(State, Region: ThisRegion, RD, MK: MK_Dereference, C); |
| 679 | return; |
| 680 | } |
| 681 | } |
| 682 | |
| 683 | modelUse(State, Region: ThisRegion, RD, MK: MK_FunCall, C); |
| 684 | } |
| 685 | |
| 686 | void MoveChecker::checkDeadSymbols(SymbolReaper &SymReaper, |
| 687 | CheckerContext &C) const { |
| 688 | ProgramStateRef State = C.getState(); |
| 689 | TrackedRegionMapTy TrackedRegions = State->get<TrackedRegionMap>(); |
| 690 | for (auto E : TrackedRegions) { |
| 691 | const MemRegion *Region = E.first; |
| 692 | bool IsRegDead = !SymReaper.isLiveRegion(region: Region); |
| 693 | |
| 694 | // Remove the dead regions from the region map. |
| 695 | if (IsRegDead) { |
| 696 | State = State->remove<TrackedRegionMap>(K: Region); |
| 697 | } |
| 698 | } |
| 699 | C.addTransition(State); |
| 700 | } |
| 701 | |
| 702 | ProgramStateRef MoveChecker::checkRegionChanges( |
| 703 | ProgramStateRef State, const InvalidatedSymbols *Invalidated, |
| 704 | ArrayRef<const MemRegion *> RequestedRegions, |
| 705 | ArrayRef<const MemRegion *> InvalidatedRegions, |
| 706 | const LocationContext *LCtx, const CallEvent *Call) const { |
| 707 | if (Call) { |
| 708 | // Relax invalidation upon function calls: only invalidate parameters |
| 709 | // that are passed directly via non-const pointers or non-const references |
| 710 | // or rvalue references. |
| 711 | // In case of an InstanceCall don't invalidate the this-region since |
| 712 | // it is fully handled in checkPreCall and checkPostCall. |
| 713 | const MemRegion *ThisRegion = nullptr; |
| 714 | if (const auto *IC = dyn_cast<CXXInstanceCall>(Val: Call)) |
| 715 | ThisRegion = IC->getCXXThisVal().getAsRegion(); |
| 716 | |
| 717 | // Requested ("explicit") regions are the regions passed into the call |
| 718 | // directly, but not all of them end up being invalidated. |
| 719 | // But when they do, they appear in the InvalidatedRegions array as well. |
| 720 | for (const auto *Region : RequestedRegions) { |
| 721 | if (ThisRegion != Region && |
| 722 | llvm::is_contained(Range&: InvalidatedRegions, Element: Region)) |
| 723 | State = removeFromState(State, Region); |
| 724 | } |
| 725 | } else { |
| 726 | // For invalidations that aren't caused by calls, assume nothing. In |
| 727 | // particular, direct write into an object's field invalidates the status. |
| 728 | for (const auto *Region : InvalidatedRegions) |
| 729 | State = removeFromState(State, Region: Region->getBaseRegion()); |
| 730 | } |
| 731 | |
| 732 | return State; |
| 733 | } |
| 734 | |
| 735 | void MoveChecker::printState(raw_ostream &Out, ProgramStateRef State, |
| 736 | const char *NL, const char *Sep) const { |
| 737 | |
| 738 | TrackedRegionMapTy RS = State->get<TrackedRegionMap>(); |
| 739 | |
| 740 | if (!RS.isEmpty()) { |
| 741 | Out << Sep << "Moved-from objects :" << NL; |
| 742 | for (auto I: RS) { |
| 743 | I.first->dumpToStream(os&: Out); |
| 744 | if (I.second.isMoved()) |
| 745 | Out << ": moved" ; |
| 746 | else |
| 747 | Out << ": moved and reported" ; |
| 748 | Out << NL; |
| 749 | } |
| 750 | } |
| 751 | } |
| 752 | void ento::registerMoveChecker(CheckerManager &mgr) { |
| 753 | MoveChecker *chk = mgr.registerChecker<MoveChecker>(); |
| 754 | chk->setAggressiveness( |
| 755 | Str: mgr.getAnalyzerOptions().getCheckerStringOption(C: chk, OptionName: "WarnOn" ), Mgr&: mgr); |
| 756 | } |
| 757 | |
| 758 | bool ento::shouldRegisterMoveChecker(const CheckerManager &mgr) { |
| 759 | return true; |
| 760 | } |
| 761 | |