mirror of
https://github.com/llvm/llvm-project.git
synced 2025-04-30 22:36:05 +00:00

Cleanup most of the lazy-init `BugType` legacy. Some will be preserved, as those are slightly more complicated to refactor. Notice, that the default category for `BugType` is `LogicError`. I omitted setting this explicitly where I could. Please, actually have a look at the diff. I did this manually, and we rarely check the bug type descriptions and stuff in tests, so the testing might be shallow on this one.
93 lines
3.1 KiB
C++
93 lines
3.1 KiB
C++
//== ObjCAtSyncChecker.cpp - nil mutex checker for @synchronized -*- C++ -*--=//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This defines ObjCAtSyncChecker, a builtin check that checks for null pointers
|
|
// used as mutexes for @synchronized.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
|
|
#include "clang/AST/StmtObjC.h"
|
|
#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
|
|
#include "clang/StaticAnalyzer/Core/Checker.h"
|
|
#include "clang/StaticAnalyzer/Core/CheckerManager.h"
|
|
#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
|
|
#include "clang/StaticAnalyzer/Core/PathSensitive/ExprEngine.h"
|
|
|
|
using namespace clang;
|
|
using namespace ento;
|
|
|
|
namespace {
|
|
class ObjCAtSyncChecker
|
|
: public Checker< check::PreStmt<ObjCAtSynchronizedStmt> > {
|
|
const BugType BT_null{this, "Nil value used as mutex for @synchronized() "
|
|
"(no synchronization will occur)"};
|
|
const BugType BT_undef{this, "Uninitialized value used as mutex "
|
|
"for @synchronized"};
|
|
|
|
public:
|
|
void checkPreStmt(const ObjCAtSynchronizedStmt *S, CheckerContext &C) const;
|
|
};
|
|
} // end anonymous namespace
|
|
|
|
void ObjCAtSyncChecker::checkPreStmt(const ObjCAtSynchronizedStmt *S,
|
|
CheckerContext &C) const {
|
|
|
|
const Expr *Ex = S->getSynchExpr();
|
|
ProgramStateRef state = C.getState();
|
|
SVal V = C.getSVal(Ex);
|
|
|
|
// Uninitialized value used for the mutex?
|
|
if (isa<UndefinedVal>(V)) {
|
|
if (ExplodedNode *N = C.generateErrorNode()) {
|
|
auto report = std::make_unique<PathSensitiveBugReport>(
|
|
BT_undef, BT_undef.getDescription(), N);
|
|
bugreporter::trackExpressionValue(N, Ex, *report);
|
|
C.emitReport(std::move(report));
|
|
}
|
|
return;
|
|
}
|
|
|
|
if (V.isUnknown())
|
|
return;
|
|
|
|
// Check for null mutexes.
|
|
ProgramStateRef notNullState, nullState;
|
|
std::tie(notNullState, nullState) = state->assume(V.castAs<DefinedSVal>());
|
|
|
|
if (nullState) {
|
|
if (!notNullState) {
|
|
// Generate an error node. This isn't a sink since
|
|
// a null mutex just means no synchronization occurs.
|
|
if (ExplodedNode *N = C.generateNonFatalErrorNode(nullState)) {
|
|
auto report = std::make_unique<PathSensitiveBugReport>(
|
|
BT_null, BT_null.getDescription(), N);
|
|
bugreporter::trackExpressionValue(N, Ex, *report);
|
|
|
|
C.emitReport(std::move(report));
|
|
return;
|
|
}
|
|
}
|
|
// Don't add a transition for 'nullState'. If the value is
|
|
// under-constrained to be null or non-null, assume it is non-null
|
|
// afterwards.
|
|
}
|
|
|
|
if (notNullState)
|
|
C.addTransition(notNullState);
|
|
}
|
|
|
|
void ento::registerObjCAtSyncChecker(CheckerManager &mgr) {
|
|
mgr.registerChecker<ObjCAtSyncChecker>();
|
|
}
|
|
|
|
bool ento::shouldRegisterObjCAtSyncChecker(const CheckerManager &mgr) {
|
|
const LangOptions &LO = mgr.getLangOpts();
|
|
return LO.ObjC;
|
|
}
|