| 1 | //== RetainCountDiagnostics.h - Checks for leaks and other issues -*- C++ -*--// |
| 2 | // |
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // This file defines diagnostics for RetainCountChecker, which implements |
| 10 | // a reference count checker for Core Foundation and Cocoa on (Mac OS X). |
| 11 | // |
| 12 | //===----------------------------------------------------------------------===// |
| 13 | |
| 14 | #ifndef LLVM_CLANG_LIB_STATICANALYZER_CHECKERS_RETAINCOUNTCHECKER_DIAGNOSTICS_H |
| 15 | #define LLVM_CLANG_LIB_STATICANALYZER_CHECKERS_RETAINCOUNTCHECKER_DIAGNOSTICS_H |
| 16 | |
| 17 | #include "clang/Analysis/PathDiagnostic.h" |
| 18 | #include "clang/Analysis/RetainSummaryManager.h" |
| 19 | #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" |
| 20 | #include "clang/StaticAnalyzer/Core/BugReporter/BugReporterVisitors.h" |
| 21 | #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" |
| 22 | |
| 23 | namespace clang { |
| 24 | namespace ento { |
| 25 | namespace retaincountchecker { |
| 26 | |
| 27 | class RefCountBug : public BugType { |
| 28 | public: |
| 29 | enum RefCountBugKind { |
| 30 | UseAfterRelease, |
| 31 | ReleaseNotOwned, |
| 32 | DeallocNotOwned, |
| 33 | FreeNotOwned, |
| 34 | OverAutorelease, |
| 35 | ReturnNotOwnedForOwned, |
| 36 | LeakWithinFunction, |
| 37 | LeakAtReturn, |
| 38 | }; |
| 39 | RefCountBug(CheckerNameRef Checker, RefCountBugKind BT); |
| 40 | StringRef getDescription() const; |
| 41 | |
| 42 | RefCountBugKind getBugType() const { return BT; } |
| 43 | |
| 44 | private: |
| 45 | RefCountBugKind BT; |
| 46 | static StringRef bugTypeToName(RefCountBugKind BT); |
| 47 | }; |
| 48 | |
| 49 | class RefCountReport : public PathSensitiveBugReport { |
| 50 | protected: |
| 51 | SymbolRef Sym; |
| 52 | bool isLeak = false; |
| 53 | |
| 54 | public: |
| 55 | RefCountReport(const RefCountBug &D, const LangOptions &LOpts, |
| 56 | ExplodedNode *n, SymbolRef sym, |
| 57 | bool isLeak=false); |
| 58 | |
| 59 | RefCountReport(const RefCountBug &D, const LangOptions &LOpts, |
| 60 | ExplodedNode *n, SymbolRef sym, |
| 61 | StringRef endText); |
| 62 | |
| 63 | ArrayRef<SourceRange> getRanges() const override { |
| 64 | if (!isLeak) |
| 65 | return PathSensitiveBugReport::getRanges(); |
| 66 | return {}; |
| 67 | } |
| 68 | }; |
| 69 | |
| 70 | class RefLeakReport : public RefCountReport { |
| 71 | const MemRegion *AllocFirstBinding = nullptr; |
| 72 | const MemRegion *AllocBindingToReport = nullptr; |
| 73 | const Stmt *AllocStmt = nullptr; |
| 74 | PathDiagnosticLocation Location; |
| 75 | |
| 76 | // Finds the function declaration where a leak warning for the parameter |
| 77 | // 'sym' should be raised. |
| 78 | void deriveParamLocation(CheckerContext &Ctx); |
| 79 | // Finds the location where the leaking object is allocated. |
| 80 | void deriveAllocLocation(CheckerContext &Ctx); |
| 81 | // Produces description of a leak warning which is printed on the console. |
| 82 | void createDescription(CheckerContext &Ctx); |
| 83 | // Finds the binding that we should use in a leak warning. |
| 84 | void findBindingToReport(CheckerContext &Ctx, ExplodedNode *Node); |
| 85 | |
| 86 | public: |
| 87 | RefLeakReport(const RefCountBug &D, const LangOptions &LOpts, ExplodedNode *n, |
| 88 | SymbolRef sym, CheckerContext &Ctx); |
| 89 | PathDiagnosticLocation getLocation() const override { |
| 90 | assert(Location.isValid()); |
| 91 | return Location; |
| 92 | } |
| 93 | |
| 94 | PathDiagnosticLocation getEndOfPath() const { |
| 95 | return PathSensitiveBugReport::getLocation(); |
| 96 | } |
| 97 | }; |
| 98 | |
| 99 | } // end namespace retaincountchecker |
| 100 | } // end namespace ento |
| 101 | } // end namespace clang |
| 102 | |
| 103 | #endif |
| 104 | |