1//===--- NonNullParamChecker.cpp - Undefined arguments checker -*- C++ -*--===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8//
9// This defines NonNullParamChecker, which checks for arguments expected not to
10// be null due to:
11// - the corresponding parameters being declared to have nonnull attribute
12// - the corresponding parameters being references; since the call would form
13// a reference to a null pointer
14//
15//===----------------------------------------------------------------------===//
16
17#include "clang/AST/Attr.h"
18#include "clang/Analysis/AnyCall.h"
19#include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
20#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
21#include "clang/StaticAnalyzer/Core/BugReporter/CommonBugCategories.h"
22#include "clang/StaticAnalyzer/Core/Checker.h"
23#include "clang/StaticAnalyzer/Core/CheckerManager.h"
24#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
25#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
26#include "llvm/ADT/StringExtras.h"
27
28using namespace clang;
29using namespace ento;
30
31namespace {
32class NonNullParamChecker
33 : public Checker<check::PreCall, check::BeginFunction,
34 EventDispatcher<ImplicitNullDerefEvent>> {
35 const BugType BTAttrNonNull{
36 this, "Argument with 'nonnull' attribute passed null", "API"};
37 const BugType BTNullRefArg{this, "Dereference of null pointer"};
38
39public:
40 void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
41 void checkBeginFunction(CheckerContext &C) const;
42
43 std::unique_ptr<PathSensitiveBugReport>
44 genReportNullAttrNonNull(const ExplodedNode *ErrorN, const Expr *ArgE,
45 unsigned IdxOfArg) const;
46 std::unique_ptr<PathSensitiveBugReport>
47 genReportReferenceToNullPointer(const ExplodedNode *ErrorN,
48 const Expr *ArgE) const;
49};
50
51template <class CallType>
52void setBitsAccordingToFunctionAttributes(const CallType &Call,
53 llvm::SmallBitVector &AttrNonNull) {
54 const Decl *FD = Call.getDecl();
55
56 for (const auto *NonNull : FD->specific_attrs<NonNullAttr>()) {
57 if (!NonNull->args_size()) {
58 // Lack of attribute parameters means that all of the parameters are
59 // implicitly marked as non-null.
60 AttrNonNull.set();
61 break;
62 }
63
64 for (const ParamIdx &Idx : NonNull->args()) {
65 // 'nonnull' attribute's parameters are 1-based and should be adjusted to
66 // match actual AST parameter/argument indices.
67 unsigned IdxAST = Idx.getASTIndex();
68 if (IdxAST >= AttrNonNull.size())
69 continue;
70 AttrNonNull.set(IdxAST);
71 }
72 }
73}
74
75template <class CallType>
76void setBitsAccordingToParameterAttributes(const CallType &Call,
77 llvm::SmallBitVector &AttrNonNull) {
78 for (const ParmVarDecl *Parameter : Call.parameters()) {
79 unsigned ParameterIndex = Parameter->getFunctionScopeIndex();
80 if (ParameterIndex == AttrNonNull.size())
81 break;
82
83 if (Parameter->hasAttr<NonNullAttr>())
84 AttrNonNull.set(ParameterIndex);
85 }
86}
87
88template <class CallType>
89llvm::SmallBitVector getNonNullAttrsImpl(const CallType &Call,
90 unsigned ExpectedSize) {
91 llvm::SmallBitVector AttrNonNull(ExpectedSize);
92
93 setBitsAccordingToFunctionAttributes(Call, AttrNonNull);
94 setBitsAccordingToParameterAttributes(Call, AttrNonNull);
95
96 return AttrNonNull;
97}
98
99/// \return Bitvector marking non-null attributes.
100llvm::SmallBitVector getNonNullAttrs(const CallEvent &Call) {
101 return getNonNullAttrsImpl(Call, ExpectedSize: Call.getNumArgs());
102}
103
104/// \return Bitvector marking non-null attributes.
105llvm::SmallBitVector getNonNullAttrs(const AnyCall &Call) {
106 return getNonNullAttrsImpl(Call, ExpectedSize: Call.param_size());
107}
108} // end anonymous namespace
109
110void NonNullParamChecker::checkPreCall(const CallEvent &Call,
111 CheckerContext &C) const {
112 if (!Call.getDecl())
113 return;
114
115 llvm::SmallBitVector AttrNonNull = getNonNullAttrs(Call);
116 unsigned NumArgs = Call.getNumArgs();
117
118 ProgramStateRef state = C.getState();
119 ArrayRef<ParmVarDecl *> parms = Call.parameters();
120
121 for (unsigned idx = 0; idx < NumArgs; ++idx) {
122 // For vararg functions, a corresponding parameter decl may not exist.
123 bool HasParam = idx < parms.size();
124
125 // Check if the parameter is a reference. We want to report when reference
126 // to a null pointer is passed as a parameter.
127 bool HasRefTypeParam =
128 HasParam ? parms[idx]->getType()->isReferenceType() : false;
129 bool ExpectedToBeNonNull = AttrNonNull.test(Idx: idx);
130
131 if (!ExpectedToBeNonNull && !HasRefTypeParam)
132 continue;
133
134 // If the value is unknown or undefined, we can't perform this check.
135 const Expr *ArgE = Call.getArgExpr(Index: idx);
136 SVal V = Call.getArgSVal(Index: idx);
137 auto DV = V.getAs<DefinedSVal>();
138 if (!DV)
139 continue;
140
141 assert(!HasRefTypeParam || isa<Loc>(*DV));
142
143 // Process the case when the argument is not a location.
144 if (ExpectedToBeNonNull && !isa<Loc>(Val: *DV)) {
145 // If the argument is a union type, we want to handle a potential
146 // transparent_union GCC extension.
147 if (!ArgE)
148 continue;
149
150 QualType T = ArgE->getType();
151 const RecordType *UT = T->getAsUnionType();
152 if (!UT || !UT->getDecl()->hasAttr<TransparentUnionAttr>())
153 continue;
154
155 auto CSV = DV->getAs<nonloc::CompoundVal>();
156
157 // FIXME: Handle LazyCompoundVals?
158 if (!CSV)
159 continue;
160
161 V = *(CSV->begin());
162 DV = V.getAs<DefinedSVal>();
163 assert(++CSV->begin() == CSV->end());
164 // FIXME: Handle (some_union){ some_other_union_val }, which turns into
165 // a LazyCompoundVal inside a CompoundVal.
166 if (!isa<Loc>(Val: V))
167 continue;
168
169 // Retrieve the corresponding expression.
170 if (const auto *CE = dyn_cast<CompoundLiteralExpr>(Val: ArgE))
171 if (const auto *IE = dyn_cast<InitListExpr>(Val: CE->getInitializer()))
172 ArgE = dyn_cast<Expr>(Val: *(IE->begin()));
173 }
174
175 ConstraintManager &CM = C.getConstraintManager();
176 ProgramStateRef stateNotNull, stateNull;
177 std::tie(args&: stateNotNull, args&: stateNull) = CM.assumeDual(State: state, Cond: *DV);
178
179 // Generate an error node. Check for a null node in case
180 // we cache out.
181 if (stateNull && !stateNotNull) {
182 if (ExplodedNode *errorNode = C.generateErrorNode(State: stateNull)) {
183
184 std::unique_ptr<BugReport> R;
185 if (ExpectedToBeNonNull)
186 R = genReportNullAttrNonNull(ErrorN: errorNode, ArgE, IdxOfArg: idx + 1);
187 else if (HasRefTypeParam)
188 R = genReportReferenceToNullPointer(ErrorN: errorNode, ArgE);
189
190 // Highlight the range of the argument that was null.
191 R->addRange(R: Call.getArgSourceRange(Index: idx));
192
193 // Emit the bug report.
194 C.emitReport(R: std::move(R));
195 }
196
197 // Always return. Either we cached out or we just emitted an error.
198 return;
199 }
200
201 if (stateNull) {
202 if (ExplodedNode *N = C.generateSink(State: stateNull, Pred: C.getPredecessor())) {
203 ImplicitNullDerefEvent event = {
204 .Location: V, .IsLoad: false, .SinkNode: N, .BR: &C.getBugReporter(),
205 /*IsDirectDereference=*/HasRefTypeParam};
206 dispatchEvent(event);
207 }
208 }
209
210 // If a pointer value passed the check we should assume that it is
211 // indeed not null from this point forward.
212 state = stateNotNull;
213 }
214
215 // If we reach here all of the arguments passed the nonnull check.
216 // If 'state' has been updated generated a new node.
217 C.addTransition(State: state);
218}
219
220/// We want to trust developer annotations and consider all 'nonnull' parameters
221/// as non-null indeed. Each marked parameter will get a corresponding
222/// constraint.
223///
224/// This approach will not only help us to get rid of some false positives, but
225/// remove duplicates and shorten warning traces as well.
226///
227/// \code
228/// void foo(int *x) [[gnu::nonnull]] {
229/// // . . .
230/// *x = 42; // we don't want to consider this as an error...
231/// // . . .
232/// }
233///
234/// foo(nullptr); // ...and report here instead
235/// \endcode
236void NonNullParamChecker::checkBeginFunction(CheckerContext &Context) const {
237 // Planned assumption makes sense only for top-level functions.
238 // Inlined functions will get similar constraints as part of 'checkPreCall'.
239 if (!Context.inTopFrame())
240 return;
241
242 const LocationContext *LocContext = Context.getLocationContext();
243
244 const Decl *FD = LocContext->getDecl();
245 // AnyCall helps us here to avoid checking for FunctionDecl and ObjCMethodDecl
246 // separately and aggregates interfaces of these classes.
247 auto AbstractCall = AnyCall::forDecl(D: FD);
248 if (!AbstractCall)
249 return;
250
251 ProgramStateRef State = Context.getState();
252 llvm::SmallBitVector ParameterNonNullMarks = getNonNullAttrs(Call: *AbstractCall);
253
254 for (const ParmVarDecl *Parameter : AbstractCall->parameters()) {
255 // 1. Check parameter if it is annotated as non-null
256 if (!ParameterNonNullMarks.test(Idx: Parameter->getFunctionScopeIndex()))
257 continue;
258
259 // 2. Check that parameter is a pointer.
260 // Nonnull attribute can be applied to non-pointers (by default
261 // __attribute__(nonnull) implies "all parameters").
262 if (!Parameter->getType()->isPointerType())
263 continue;
264
265 Loc ParameterLoc = State->getLValue(Parameter, LocContext);
266 // We never consider top-level function parameters undefined.
267 auto StoredVal =
268 State->getSVal(LV: ParameterLoc).castAs<DefinedOrUnknownSVal>();
269
270 // 3. Assume that it is indeed non-null
271 if (ProgramStateRef NewState = State->assume(StoredVal, true)) {
272 State = NewState;
273 }
274 }
275
276 Context.addTransition(State);
277}
278
279std::unique_ptr<PathSensitiveBugReport>
280NonNullParamChecker::genReportNullAttrNonNull(const ExplodedNode *ErrorNode,
281 const Expr *ArgE,
282 unsigned IdxOfArg) const {
283 llvm::SmallString<256> SBuf;
284 llvm::raw_svector_ostream OS(SBuf);
285 OS << "Null pointer passed to "
286 << IdxOfArg << llvm::getOrdinalSuffix(Val: IdxOfArg)
287 << " parameter expecting 'nonnull'";
288
289 auto R =
290 std::make_unique<PathSensitiveBugReport>(args: BTAttrNonNull, args&: SBuf, args&: ErrorNode);
291 if (ArgE)
292 bugreporter::trackExpressionValue(N: ErrorNode, E: ArgE, R&: *R);
293
294 return R;
295}
296
297std::unique_ptr<PathSensitiveBugReport>
298NonNullParamChecker::genReportReferenceToNullPointer(
299 const ExplodedNode *ErrorNode, const Expr *ArgE) const {
300 auto R = std::make_unique<PathSensitiveBugReport>(
301 args: BTNullRefArg, args: "Forming reference to null pointer", args&: ErrorNode);
302 if (ArgE) {
303 const Expr *ArgEDeref = bugreporter::getDerefExpr(ArgE);
304 if (!ArgEDeref)
305 ArgEDeref = ArgE;
306 bugreporter::trackExpressionValue(N: ErrorNode, E: ArgEDeref, R&: *R);
307 }
308 return R;
309}
310
311void ento::registerNonNullParamChecker(CheckerManager &mgr) {
312 mgr.registerChecker<NonNullParamChecker>();
313}
314
315bool ento::shouldRegisterNonNullParamChecker(const CheckerManager &mgr) {
316 return true;
317}
318

source code of clang/lib/StaticAnalyzer/Checkers/NonNullParamChecker.cpp