Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp
35269 views
1
//==- CheckObjCDealloc.cpp - Check ObjC -dealloc implementation --*- C++ -*-==//
2
//
3
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4
// See https://llvm.org/LICENSE.txt for license information.
5
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6
//
7
//===----------------------------------------------------------------------===//
8
//
9
// This checker analyzes Objective-C -dealloc methods and their callees
10
// to warn about improper releasing of instance variables that back synthesized
11
// properties. It warns about missing releases in the following cases:
12
// - When a class has a synthesized instance variable for a 'retain' or 'copy'
13
// property and lacks a -dealloc method in its implementation.
14
// - When a class has a synthesized instance variable for a 'retain'/'copy'
15
// property but the ivar is not released in -dealloc by either -release
16
// or by nilling out the property.
17
//
18
// It warns about extra releases in -dealloc (but not in callees) when a
19
// synthesized instance variable is released in the following cases:
20
// - When the property is 'assign' and is not 'readonly'.
21
// - When the property is 'weak'.
22
//
23
// This checker only warns for instance variables synthesized to back
24
// properties. Handling the more general case would require inferring whether
25
// an instance variable is stored retained or not. For synthesized properties,
26
// this is specified in the property declaration itself.
27
//
28
//===----------------------------------------------------------------------===//
29
30
#include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
31
#include "clang/Analysis/PathDiagnostic.h"
32
#include "clang/AST/Attr.h"
33
#include "clang/AST/DeclObjC.h"
34
#include "clang/AST/Expr.h"
35
#include "clang/AST/ExprObjC.h"
36
#include "clang/Basic/LangOptions.h"
37
#include "clang/Basic/TargetInfo.h"
38
#include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
39
#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
40
#include "clang/StaticAnalyzer/Core/Checker.h"
41
#include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h"
42
#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
43
#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
44
#include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h"
45
#include "clang/StaticAnalyzer/Core/PathSensitive/ProgramStateTrait.h"
46
#include "clang/StaticAnalyzer/Core/PathSensitive/SymbolManager.h"
47
#include "llvm/Support/raw_ostream.h"
48
#include <optional>
49
50
using namespace clang;
51
using namespace ento;
52
53
/// Indicates whether an instance variable is required to be released in
54
/// -dealloc.
55
enum class ReleaseRequirement {
56
/// The instance variable must be released, either by calling
57
/// -release on it directly or by nilling it out with a property setter.
58
MustRelease,
59
60
/// The instance variable must not be directly released with -release.
61
MustNotReleaseDirectly,
62
63
/// The requirement for the instance variable could not be determined.
64
Unknown
65
};
66
67
/// Returns true if the property implementation is synthesized and the
68
/// type of the property is retainable.
69
static bool isSynthesizedRetainableProperty(const ObjCPropertyImplDecl *I,
70
const ObjCIvarDecl **ID,
71
const ObjCPropertyDecl **PD) {
72
73
if (I->getPropertyImplementation() != ObjCPropertyImplDecl::Synthesize)
74
return false;
75
76
(*ID) = I->getPropertyIvarDecl();
77
if (!(*ID))
78
return false;
79
80
QualType T = (*ID)->getType();
81
if (!T->isObjCRetainableType())
82
return false;
83
84
(*PD) = I->getPropertyDecl();
85
// Shouldn't be able to synthesize a property that doesn't exist.
86
assert(*PD);
87
88
return true;
89
}
90
91
namespace {
92
93
class ObjCDeallocChecker
94
: public Checker<check::ASTDecl<ObjCImplementationDecl>,
95
check::PreObjCMessage, check::PostObjCMessage,
96
check::PreCall,
97
check::BeginFunction, check::EndFunction,
98
eval::Assume,
99
check::PointerEscape,
100
check::PreStmt<ReturnStmt>> {
101
102
mutable const IdentifierInfo *NSObjectII = nullptr;
103
mutable const IdentifierInfo *SenTestCaseII = nullptr;
104
mutable const IdentifierInfo *XCTestCaseII = nullptr;
105
mutable const IdentifierInfo *Block_releaseII = nullptr;
106
mutable const IdentifierInfo *CIFilterII = nullptr;
107
108
mutable Selector DeallocSel;
109
mutable Selector ReleaseSel;
110
111
const BugType MissingReleaseBugType{this, "Missing ivar release (leak)",
112
categories::MemoryRefCount};
113
const BugType ExtraReleaseBugType{this, "Extra ivar release",
114
categories::MemoryRefCount};
115
const BugType MistakenDeallocBugType{this, "Mistaken dealloc",
116
categories::MemoryRefCount};
117
118
public:
119
void checkASTDecl(const ObjCImplementationDecl *D, AnalysisManager& Mgr,
120
BugReporter &BR) const;
121
void checkBeginFunction(CheckerContext &Ctx) const;
122
void checkPreObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
123
void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
124
void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
125
126
ProgramStateRef evalAssume(ProgramStateRef State, SVal Cond,
127
bool Assumption) const;
128
129
ProgramStateRef checkPointerEscape(ProgramStateRef State,
130
const InvalidatedSymbols &Escaped,
131
const CallEvent *Call,
132
PointerEscapeKind Kind) const;
133
void checkPreStmt(const ReturnStmt *RS, CheckerContext &C) const;
134
void checkEndFunction(const ReturnStmt *RS, CheckerContext &Ctx) const;
135
136
private:
137
void diagnoseMissingReleases(CheckerContext &C) const;
138
139
bool diagnoseExtraRelease(SymbolRef ReleasedValue, const ObjCMethodCall &M,
140
CheckerContext &C) const;
141
142
bool diagnoseMistakenDealloc(SymbolRef DeallocedValue,
143
const ObjCMethodCall &M,
144
CheckerContext &C) const;
145
146
SymbolRef getValueReleasedByNillingOut(const ObjCMethodCall &M,
147
CheckerContext &C) const;
148
149
const ObjCIvarRegion *getIvarRegionForIvarSymbol(SymbolRef IvarSym) const;
150
SymbolRef getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const;
151
152
const ObjCPropertyImplDecl*
153
findPropertyOnDeallocatingInstance(SymbolRef IvarSym,
154
CheckerContext &C) const;
155
156
ReleaseRequirement
157
getDeallocReleaseRequirement(const ObjCPropertyImplDecl *PropImpl) const;
158
159
bool isInInstanceDealloc(const CheckerContext &C, SVal &SelfValOut) const;
160
bool isInInstanceDealloc(const CheckerContext &C, const LocationContext *LCtx,
161
SVal &SelfValOut) const;
162
bool instanceDeallocIsOnStack(const CheckerContext &C,
163
SVal &InstanceValOut) const;
164
165
bool isSuperDeallocMessage(const ObjCMethodCall &M) const;
166
167
const ObjCImplDecl *getContainingObjCImpl(const LocationContext *LCtx) const;
168
169
const ObjCPropertyDecl *
170
findShadowedPropertyDecl(const ObjCPropertyImplDecl *PropImpl) const;
171
172
void transitionToReleaseValue(CheckerContext &C, SymbolRef Value) const;
173
ProgramStateRef removeValueRequiringRelease(ProgramStateRef State,
174
SymbolRef InstanceSym,
175
SymbolRef ValueSym) const;
176
177
void initIdentifierInfoAndSelectors(ASTContext &Ctx) const;
178
179
bool classHasSeparateTeardown(const ObjCInterfaceDecl *ID) const;
180
181
bool isReleasedByCIFilterDealloc(const ObjCPropertyImplDecl *PropImpl) const;
182
bool isNibLoadedIvarWithoutRetain(const ObjCPropertyImplDecl *PropImpl) const;
183
};
184
} // End anonymous namespace.
185
186
187
/// Maps from the symbol for a class instance to the set of
188
/// symbols remaining that must be released in -dealloc.
189
REGISTER_SET_FACTORY_WITH_PROGRAMSTATE(SymbolSet, SymbolRef)
190
REGISTER_MAP_WITH_PROGRAMSTATE(UnreleasedIvarMap, SymbolRef, SymbolSet)
191
192
193
/// An AST check that diagnose when the class requires a -dealloc method and
194
/// is missing one.
195
void ObjCDeallocChecker::checkASTDecl(const ObjCImplementationDecl *D,
196
AnalysisManager &Mgr,
197
BugReporter &BR) const {
198
assert(Mgr.getLangOpts().getGC() != LangOptions::GCOnly);
199
assert(!Mgr.getLangOpts().ObjCAutoRefCount);
200
initIdentifierInfoAndSelectors(Mgr.getASTContext());
201
202
const ObjCInterfaceDecl *ID = D->getClassInterface();
203
// If the class is known to have a lifecycle with a separate teardown method
204
// then it may not require a -dealloc method.
205
if (classHasSeparateTeardown(ID))
206
return;
207
208
// Does the class contain any synthesized properties that are retainable?
209
// If not, skip the check entirely.
210
const ObjCPropertyImplDecl *PropImplRequiringRelease = nullptr;
211
bool HasOthers = false;
212
for (const auto *I : D->property_impls()) {
213
if (getDeallocReleaseRequirement(I) == ReleaseRequirement::MustRelease) {
214
if (!PropImplRequiringRelease)
215
PropImplRequiringRelease = I;
216
else {
217
HasOthers = true;
218
break;
219
}
220
}
221
}
222
223
if (!PropImplRequiringRelease)
224
return;
225
226
const ObjCMethodDecl *MD = nullptr;
227
228
// Scan the instance methods for "dealloc".
229
for (const auto *I : D->instance_methods()) {
230
if (I->getSelector() == DeallocSel) {
231
MD = I;
232
break;
233
}
234
}
235
236
if (!MD) { // No dealloc found.
237
const char* Name = "Missing -dealloc";
238
239
std::string Buf;
240
llvm::raw_string_ostream OS(Buf);
241
OS << "'" << *D << "' lacks a 'dealloc' instance method but "
242
<< "must release '" << *PropImplRequiringRelease->getPropertyIvarDecl()
243
<< "'";
244
245
if (HasOthers)
246
OS << " and others";
247
PathDiagnosticLocation DLoc =
248
PathDiagnosticLocation::createBegin(D, BR.getSourceManager());
249
250
BR.EmitBasicReport(D, this, Name, categories::CoreFoundationObjectiveC, Buf,
251
DLoc);
252
return;
253
}
254
}
255
256
/// If this is the beginning of -dealloc, mark the values initially stored in
257
/// instance variables that must be released by the end of -dealloc
258
/// as unreleased in the state.
259
void ObjCDeallocChecker::checkBeginFunction(
260
CheckerContext &C) const {
261
initIdentifierInfoAndSelectors(C.getASTContext());
262
263
// Only do this if the current method is -dealloc.
264
SVal SelfVal;
265
if (!isInInstanceDealloc(C, SelfVal))
266
return;
267
268
SymbolRef SelfSymbol = SelfVal.getAsSymbol();
269
270
const LocationContext *LCtx = C.getLocationContext();
271
ProgramStateRef InitialState = C.getState();
272
273
ProgramStateRef State = InitialState;
274
275
SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
276
277
// Symbols that must be released by the end of the -dealloc;
278
SymbolSet RequiredReleases = F.getEmptySet();
279
280
// If we're an inlined -dealloc, we should add our symbols to the existing
281
// set from our subclass.
282
if (const SymbolSet *CurrSet = State->get<UnreleasedIvarMap>(SelfSymbol))
283
RequiredReleases = *CurrSet;
284
285
for (auto *PropImpl : getContainingObjCImpl(LCtx)->property_impls()) {
286
ReleaseRequirement Requirement = getDeallocReleaseRequirement(PropImpl);
287
if (Requirement != ReleaseRequirement::MustRelease)
288
continue;
289
290
SVal LVal = State->getLValue(PropImpl->getPropertyIvarDecl(), SelfVal);
291
std::optional<Loc> LValLoc = LVal.getAs<Loc>();
292
if (!LValLoc)
293
continue;
294
295
SVal InitialVal = State->getSVal(*LValLoc);
296
SymbolRef Symbol = InitialVal.getAsSymbol();
297
if (!Symbol || !isa<SymbolRegionValue>(Symbol))
298
continue;
299
300
// Mark the value as requiring a release.
301
RequiredReleases = F.add(RequiredReleases, Symbol);
302
}
303
304
if (!RequiredReleases.isEmpty()) {
305
State = State->set<UnreleasedIvarMap>(SelfSymbol, RequiredReleases);
306
}
307
308
if (State != InitialState) {
309
C.addTransition(State);
310
}
311
}
312
313
/// Given a symbol for an ivar, return the ivar region it was loaded from.
314
/// Returns nullptr if the instance symbol cannot be found.
315
const ObjCIvarRegion *
316
ObjCDeallocChecker::getIvarRegionForIvarSymbol(SymbolRef IvarSym) const {
317
return dyn_cast_or_null<ObjCIvarRegion>(IvarSym->getOriginRegion());
318
}
319
320
/// Given a symbol for an ivar, return a symbol for the instance containing
321
/// the ivar. Returns nullptr if the instance symbol cannot be found.
322
SymbolRef
323
ObjCDeallocChecker::getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const {
324
325
const ObjCIvarRegion *IvarRegion = getIvarRegionForIvarSymbol(IvarSym);
326
if (!IvarRegion)
327
return nullptr;
328
329
const SymbolicRegion *SR = IvarRegion->getSymbolicBase();
330
assert(SR && "Symbolic base should not be nullptr");
331
return SR->getSymbol();
332
}
333
334
/// If we are in -dealloc or -dealloc is on the stack, handle the call if it is
335
/// a release or a nilling-out property setter.
336
void ObjCDeallocChecker::checkPreObjCMessage(
337
const ObjCMethodCall &M, CheckerContext &C) const {
338
// Only run if -dealloc is on the stack.
339
SVal DeallocedInstance;
340
if (!instanceDeallocIsOnStack(C, DeallocedInstance))
341
return;
342
343
SymbolRef ReleasedValue = nullptr;
344
345
if (M.getSelector() == ReleaseSel) {
346
ReleasedValue = M.getReceiverSVal().getAsSymbol();
347
} else if (M.getSelector() == DeallocSel && !M.isReceiverSelfOrSuper()) {
348
if (diagnoseMistakenDealloc(M.getReceiverSVal().getAsSymbol(), M, C))
349
return;
350
}
351
352
if (ReleasedValue) {
353
// An instance variable symbol was released with -release:
354
// [_property release];
355
if (diagnoseExtraRelease(ReleasedValue,M, C))
356
return;
357
} else {
358
// An instance variable symbol was released nilling out its property:
359
// self.property = nil;
360
ReleasedValue = getValueReleasedByNillingOut(M, C);
361
}
362
363
if (!ReleasedValue)
364
return;
365
366
transitionToReleaseValue(C, ReleasedValue);
367
}
368
369
/// If we are in -dealloc or -dealloc is on the stack, handle the call if it is
370
/// call to Block_release().
371
void ObjCDeallocChecker::checkPreCall(const CallEvent &Call,
372
CheckerContext &C) const {
373
const IdentifierInfo *II = Call.getCalleeIdentifier();
374
if (II != Block_releaseII)
375
return;
376
377
if (Call.getNumArgs() != 1)
378
return;
379
380
SymbolRef ReleasedValue = Call.getArgSVal(0).getAsSymbol();
381
if (!ReleasedValue)
382
return;
383
384
transitionToReleaseValue(C, ReleasedValue);
385
}
386
/// If the message was a call to '[super dealloc]', diagnose any missing
387
/// releases.
388
void ObjCDeallocChecker::checkPostObjCMessage(
389
const ObjCMethodCall &M, CheckerContext &C) const {
390
// We perform this check post-message so that if the super -dealloc
391
// calls a helper method and that this class overrides, any ivars released in
392
// the helper method will be recorded before checking.
393
if (isSuperDeallocMessage(M))
394
diagnoseMissingReleases(C);
395
}
396
397
/// Check for missing releases even when -dealloc does not call
398
/// '[super dealloc]'.
399
void ObjCDeallocChecker::checkEndFunction(
400
const ReturnStmt *RS, CheckerContext &C) const {
401
diagnoseMissingReleases(C);
402
}
403
404
/// Check for missing releases on early return.
405
void ObjCDeallocChecker::checkPreStmt(
406
const ReturnStmt *RS, CheckerContext &C) const {
407
diagnoseMissingReleases(C);
408
}
409
410
/// When a symbol is assumed to be nil, remove it from the set of symbols
411
/// require to be nil.
412
ProgramStateRef ObjCDeallocChecker::evalAssume(ProgramStateRef State, SVal Cond,
413
bool Assumption) const {
414
if (State->get<UnreleasedIvarMap>().isEmpty())
415
return State;
416
417
auto *CondBSE = dyn_cast_or_null<BinarySymExpr>(Cond.getAsSymbol());
418
if (!CondBSE)
419
return State;
420
421
BinaryOperator::Opcode OpCode = CondBSE->getOpcode();
422
if (Assumption) {
423
if (OpCode != BO_EQ)
424
return State;
425
} else {
426
if (OpCode != BO_NE)
427
return State;
428
}
429
430
SymbolRef NullSymbol = nullptr;
431
if (auto *SIE = dyn_cast<SymIntExpr>(CondBSE)) {
432
const llvm::APInt &RHS = SIE->getRHS();
433
if (RHS != 0)
434
return State;
435
NullSymbol = SIE->getLHS();
436
} else if (auto *SIE = dyn_cast<IntSymExpr>(CondBSE)) {
437
const llvm::APInt &LHS = SIE->getLHS();
438
if (LHS != 0)
439
return State;
440
NullSymbol = SIE->getRHS();
441
} else {
442
return State;
443
}
444
445
SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(NullSymbol);
446
if (!InstanceSymbol)
447
return State;
448
449
State = removeValueRequiringRelease(State, InstanceSymbol, NullSymbol);
450
451
return State;
452
}
453
454
/// If a symbol escapes conservatively assume unseen code released it.
455
ProgramStateRef ObjCDeallocChecker::checkPointerEscape(
456
ProgramStateRef State, const InvalidatedSymbols &Escaped,
457
const CallEvent *Call, PointerEscapeKind Kind) const {
458
459
if (State->get<UnreleasedIvarMap>().isEmpty())
460
return State;
461
462
// Don't treat calls to '[super dealloc]' as escaping for the purposes
463
// of this checker. Because the checker diagnoses missing releases in the
464
// post-message handler for '[super dealloc], escaping here would cause
465
// the checker to never warn.
466
auto *OMC = dyn_cast_or_null<ObjCMethodCall>(Call);
467
if (OMC && isSuperDeallocMessage(*OMC))
468
return State;
469
470
for (const auto &Sym : Escaped) {
471
if (!Call || (Call && !Call->isInSystemHeader())) {
472
// If Sym is a symbol for an object with instance variables that
473
// must be released, remove these obligations when the object escapes
474
// unless via a call to a system function. System functions are
475
// very unlikely to release instance variables on objects passed to them,
476
// and are frequently called on 'self' in -dealloc (e.g., to remove
477
// observers) -- we want to avoid false negatives from escaping on
478
// them.
479
State = State->remove<UnreleasedIvarMap>(Sym);
480
}
481
482
483
SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(Sym);
484
if (!InstanceSymbol)
485
continue;
486
487
State = removeValueRequiringRelease(State, InstanceSymbol, Sym);
488
}
489
490
return State;
491
}
492
493
/// Report any unreleased instance variables for the current instance being
494
/// dealloced.
495
void ObjCDeallocChecker::diagnoseMissingReleases(CheckerContext &C) const {
496
ProgramStateRef State = C.getState();
497
498
SVal SelfVal;
499
if (!isInInstanceDealloc(C, SelfVal))
500
return;
501
502
const MemRegion *SelfRegion = SelfVal.castAs<loc::MemRegionVal>().getRegion();
503
const LocationContext *LCtx = C.getLocationContext();
504
505
ExplodedNode *ErrNode = nullptr;
506
507
SymbolRef SelfSym = SelfVal.getAsSymbol();
508
if (!SelfSym)
509
return;
510
511
const SymbolSet *OldUnreleased = State->get<UnreleasedIvarMap>(SelfSym);
512
if (!OldUnreleased)
513
return;
514
515
SymbolSet NewUnreleased = *OldUnreleased;
516
SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
517
518
ProgramStateRef InitialState = State;
519
520
for (auto *IvarSymbol : *OldUnreleased) {
521
const TypedValueRegion *TVR =
522
cast<SymbolRegionValue>(IvarSymbol)->getRegion();
523
const ObjCIvarRegion *IvarRegion = cast<ObjCIvarRegion>(TVR);
524
525
// Don't warn if the ivar is not for this instance.
526
if (SelfRegion != IvarRegion->getSuperRegion())
527
continue;
528
529
const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl();
530
// Prevent an inlined call to -dealloc in a super class from warning
531
// about the values the subclass's -dealloc should release.
532
if (IvarDecl->getContainingInterface() !=
533
cast<ObjCMethodDecl>(LCtx->getDecl())->getClassInterface())
534
continue;
535
536
// Prevents diagnosing multiple times for the same instance variable
537
// at, for example, both a return and at the end of the function.
538
NewUnreleased = F.remove(NewUnreleased, IvarSymbol);
539
540
if (State->getStateManager()
541
.getConstraintManager()
542
.isNull(State, IvarSymbol)
543
.isConstrainedTrue()) {
544
continue;
545
}
546
547
// A missing release manifests as a leak, so treat as a non-fatal error.
548
if (!ErrNode)
549
ErrNode = C.generateNonFatalErrorNode();
550
// If we've already reached this node on another path, return without
551
// diagnosing.
552
if (!ErrNode)
553
return;
554
555
std::string Buf;
556
llvm::raw_string_ostream OS(Buf);
557
558
const ObjCInterfaceDecl *Interface = IvarDecl->getContainingInterface();
559
// If the class is known to have a lifecycle with teardown that is
560
// separate from -dealloc, do not warn about missing releases. We
561
// suppress here (rather than not tracking for instance variables in
562
// such classes) because these classes are rare.
563
if (classHasSeparateTeardown(Interface))
564
return;
565
566
ObjCImplDecl *ImplDecl = Interface->getImplementation();
567
568
const ObjCPropertyImplDecl *PropImpl =
569
ImplDecl->FindPropertyImplIvarDecl(IvarDecl->getIdentifier());
570
571
const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl();
572
573
assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Copy ||
574
PropDecl->getSetterKind() == ObjCPropertyDecl::Retain);
575
576
OS << "The '" << *IvarDecl << "' ivar in '" << *ImplDecl
577
<< "' was ";
578
579
if (PropDecl->getSetterKind() == ObjCPropertyDecl::Retain)
580
OS << "retained";
581
else
582
OS << "copied";
583
584
OS << " by a synthesized property but not released"
585
" before '[super dealloc]'";
586
587
auto BR = std::make_unique<PathSensitiveBugReport>(MissingReleaseBugType,
588
Buf, ErrNode);
589
C.emitReport(std::move(BR));
590
}
591
592
if (NewUnreleased.isEmpty()) {
593
State = State->remove<UnreleasedIvarMap>(SelfSym);
594
} else {
595
State = State->set<UnreleasedIvarMap>(SelfSym, NewUnreleased);
596
}
597
598
if (ErrNode) {
599
C.addTransition(State, ErrNode);
600
} else if (State != InitialState) {
601
C.addTransition(State);
602
}
603
604
// Make sure that after checking in the top-most frame the list of
605
// tracked ivars is empty. This is intended to detect accidental leaks in
606
// the UnreleasedIvarMap program state.
607
assert(!LCtx->inTopFrame() || State->get<UnreleasedIvarMap>().isEmpty());
608
}
609
610
/// Given a symbol, determine whether the symbol refers to an ivar on
611
/// the top-most deallocating instance. If so, find the property for that
612
/// ivar, if one exists. Otherwise return null.
613
const ObjCPropertyImplDecl *
614
ObjCDeallocChecker::findPropertyOnDeallocatingInstance(
615
SymbolRef IvarSym, CheckerContext &C) const {
616
SVal DeallocedInstance;
617
if (!isInInstanceDealloc(C, DeallocedInstance))
618
return nullptr;
619
620
// Try to get the region from which the ivar value was loaded.
621
auto *IvarRegion = getIvarRegionForIvarSymbol(IvarSym);
622
if (!IvarRegion)
623
return nullptr;
624
625
// Don't try to find the property if the ivar was not loaded from the
626
// given instance.
627
if (DeallocedInstance.castAs<loc::MemRegionVal>().getRegion() !=
628
IvarRegion->getSuperRegion())
629
return nullptr;
630
631
const LocationContext *LCtx = C.getLocationContext();
632
const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl();
633
634
const ObjCImplDecl *Container = getContainingObjCImpl(LCtx);
635
const ObjCPropertyImplDecl *PropImpl =
636
Container->FindPropertyImplIvarDecl(IvarDecl->getIdentifier());
637
return PropImpl;
638
}
639
640
/// Emits a warning if the current context is -dealloc and ReleasedValue
641
/// must not be directly released in a -dealloc. Returns true if a diagnostic
642
/// was emitted.
643
bool ObjCDeallocChecker::diagnoseExtraRelease(SymbolRef ReleasedValue,
644
const ObjCMethodCall &M,
645
CheckerContext &C) const {
646
// Try to get the region from which the released value was loaded.
647
// Note that, unlike diagnosing for missing releases, here we don't track
648
// values that must not be released in the state. This is because even if
649
// these values escape, it is still an error under the rules of MRR to
650
// release them in -dealloc.
651
const ObjCPropertyImplDecl *PropImpl =
652
findPropertyOnDeallocatingInstance(ReleasedValue, C);
653
654
if (!PropImpl)
655
return false;
656
657
// If the ivar belongs to a property that must not be released directly
658
// in dealloc, emit a warning.
659
if (getDeallocReleaseRequirement(PropImpl) !=
660
ReleaseRequirement::MustNotReleaseDirectly) {
661
return false;
662
}
663
664
// If the property is readwrite but it shadows a read-only property in its
665
// external interface, treat the property a read-only. If the outside
666
// world cannot write to a property then the internal implementation is free
667
// to make its own convention about whether the value is stored retained
668
// or not. We look up the shadow here rather than in
669
// getDeallocReleaseRequirement() because doing so can be expensive.
670
const ObjCPropertyDecl *PropDecl = findShadowedPropertyDecl(PropImpl);
671
if (PropDecl) {
672
if (PropDecl->isReadOnly())
673
return false;
674
} else {
675
PropDecl = PropImpl->getPropertyDecl();
676
}
677
678
ExplodedNode *ErrNode = C.generateNonFatalErrorNode();
679
if (!ErrNode)
680
return false;
681
682
std::string Buf;
683
llvm::raw_string_ostream OS(Buf);
684
685
assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Weak ||
686
(PropDecl->getSetterKind() == ObjCPropertyDecl::Assign &&
687
!PropDecl->isReadOnly()) ||
688
isReleasedByCIFilterDealloc(PropImpl)
689
);
690
691
const ObjCImplDecl *Container = getContainingObjCImpl(C.getLocationContext());
692
OS << "The '" << *PropImpl->getPropertyIvarDecl()
693
<< "' ivar in '" << *Container;
694
695
696
if (isReleasedByCIFilterDealloc(PropImpl)) {
697
OS << "' will be released by '-[CIFilter dealloc]' but also released here";
698
} else {
699
OS << "' was synthesized for ";
700
701
if (PropDecl->getSetterKind() == ObjCPropertyDecl::Weak)
702
OS << "a weak";
703
else
704
OS << "an assign, readwrite";
705
706
OS << " property but was released in 'dealloc'";
707
}
708
709
auto BR = std::make_unique<PathSensitiveBugReport>(ExtraReleaseBugType, Buf,
710
ErrNode);
711
BR->addRange(M.getOriginExpr()->getSourceRange());
712
713
C.emitReport(std::move(BR));
714
715
return true;
716
}
717
718
/// Emits a warning if the current context is -dealloc and DeallocedValue
719
/// must not be directly dealloced in a -dealloc. Returns true if a diagnostic
720
/// was emitted.
721
bool ObjCDeallocChecker::diagnoseMistakenDealloc(SymbolRef DeallocedValue,
722
const ObjCMethodCall &M,
723
CheckerContext &C) const {
724
// TODO: Apart from unknown/undefined receivers, this may happen when
725
// dealloc is called as a class method. Should we warn?
726
if (!DeallocedValue)
727
return false;
728
729
// Find the property backing the instance variable that M
730
// is dealloc'ing.
731
const ObjCPropertyImplDecl *PropImpl =
732
findPropertyOnDeallocatingInstance(DeallocedValue, C);
733
if (!PropImpl)
734
return false;
735
736
if (getDeallocReleaseRequirement(PropImpl) !=
737
ReleaseRequirement::MustRelease) {
738
return false;
739
}
740
741
ExplodedNode *ErrNode = C.generateErrorNode();
742
if (!ErrNode)
743
return false;
744
745
std::string Buf;
746
llvm::raw_string_ostream OS(Buf);
747
748
OS << "'" << *PropImpl->getPropertyIvarDecl()
749
<< "' should be released rather than deallocated";
750
751
auto BR = std::make_unique<PathSensitiveBugReport>(MistakenDeallocBugType,
752
Buf, ErrNode);
753
BR->addRange(M.getOriginExpr()->getSourceRange());
754
755
C.emitReport(std::move(BR));
756
757
return true;
758
}
759
760
void ObjCDeallocChecker::initIdentifierInfoAndSelectors(
761
ASTContext &Ctx) const {
762
if (NSObjectII)
763
return;
764
765
NSObjectII = &Ctx.Idents.get("NSObject");
766
SenTestCaseII = &Ctx.Idents.get("SenTestCase");
767
XCTestCaseII = &Ctx.Idents.get("XCTestCase");
768
Block_releaseII = &Ctx.Idents.get("_Block_release");
769
CIFilterII = &Ctx.Idents.get("CIFilter");
770
771
const IdentifierInfo *DeallocII = &Ctx.Idents.get("dealloc");
772
const IdentifierInfo *ReleaseII = &Ctx.Idents.get("release");
773
DeallocSel = Ctx.Selectors.getSelector(0, &DeallocII);
774
ReleaseSel = Ctx.Selectors.getSelector(0, &ReleaseII);
775
}
776
777
/// Returns true if M is a call to '[super dealloc]'.
778
bool ObjCDeallocChecker::isSuperDeallocMessage(
779
const ObjCMethodCall &M) const {
780
if (M.getOriginExpr()->getReceiverKind() != ObjCMessageExpr::SuperInstance)
781
return false;
782
783
return M.getSelector() == DeallocSel;
784
}
785
786
/// Returns the ObjCImplDecl containing the method declaration in LCtx.
787
const ObjCImplDecl *
788
ObjCDeallocChecker::getContainingObjCImpl(const LocationContext *LCtx) const {
789
auto *MD = cast<ObjCMethodDecl>(LCtx->getDecl());
790
return cast<ObjCImplDecl>(MD->getDeclContext());
791
}
792
793
/// Returns the property that shadowed by PropImpl if one exists and
794
/// nullptr otherwise.
795
const ObjCPropertyDecl *ObjCDeallocChecker::findShadowedPropertyDecl(
796
const ObjCPropertyImplDecl *PropImpl) const {
797
const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl();
798
799
// Only readwrite properties can shadow.
800
if (PropDecl->isReadOnly())
801
return nullptr;
802
803
auto *CatDecl = dyn_cast<ObjCCategoryDecl>(PropDecl->getDeclContext());
804
805
// Only class extensions can contain shadowing properties.
806
if (!CatDecl || !CatDecl->IsClassExtension())
807
return nullptr;
808
809
IdentifierInfo *ID = PropDecl->getIdentifier();
810
DeclContext::lookup_result R = CatDecl->getClassInterface()->lookup(ID);
811
for (const NamedDecl *D : R) {
812
auto *ShadowedPropDecl = dyn_cast<ObjCPropertyDecl>(D);
813
if (!ShadowedPropDecl)
814
continue;
815
816
if (ShadowedPropDecl->isInstanceProperty()) {
817
assert(ShadowedPropDecl->isReadOnly());
818
return ShadowedPropDecl;
819
}
820
}
821
822
return nullptr;
823
}
824
825
/// Add a transition noting the release of the given value.
826
void ObjCDeallocChecker::transitionToReleaseValue(CheckerContext &C,
827
SymbolRef Value) const {
828
assert(Value);
829
SymbolRef InstanceSym = getInstanceSymbolFromIvarSymbol(Value);
830
if (!InstanceSym)
831
return;
832
ProgramStateRef InitialState = C.getState();
833
834
ProgramStateRef ReleasedState =
835
removeValueRequiringRelease(InitialState, InstanceSym, Value);
836
837
if (ReleasedState != InitialState) {
838
C.addTransition(ReleasedState);
839
}
840
}
841
842
/// Remove the Value requiring a release from the tracked set for
843
/// Instance and return the resultant state.
844
ProgramStateRef ObjCDeallocChecker::removeValueRequiringRelease(
845
ProgramStateRef State, SymbolRef Instance, SymbolRef Value) const {
846
assert(Instance);
847
assert(Value);
848
const ObjCIvarRegion *RemovedRegion = getIvarRegionForIvarSymbol(Value);
849
if (!RemovedRegion)
850
return State;
851
852
const SymbolSet *Unreleased = State->get<UnreleasedIvarMap>(Instance);
853
if (!Unreleased)
854
return State;
855
856
// Mark the value as no longer requiring a release.
857
SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
858
SymbolSet NewUnreleased = *Unreleased;
859
for (auto &Sym : *Unreleased) {
860
const ObjCIvarRegion *UnreleasedRegion = getIvarRegionForIvarSymbol(Sym);
861
assert(UnreleasedRegion);
862
if (RemovedRegion->getDecl() == UnreleasedRegion->getDecl()) {
863
NewUnreleased = F.remove(NewUnreleased, Sym);
864
}
865
}
866
867
if (NewUnreleased.isEmpty()) {
868
return State->remove<UnreleasedIvarMap>(Instance);
869
}
870
871
return State->set<UnreleasedIvarMap>(Instance, NewUnreleased);
872
}
873
874
/// Determines whether the instance variable for \p PropImpl must or must not be
875
/// released in -dealloc or whether it cannot be determined.
876
ReleaseRequirement ObjCDeallocChecker::getDeallocReleaseRequirement(
877
const ObjCPropertyImplDecl *PropImpl) const {
878
const ObjCIvarDecl *IvarDecl;
879
const ObjCPropertyDecl *PropDecl;
880
if (!isSynthesizedRetainableProperty(PropImpl, &IvarDecl, &PropDecl))
881
return ReleaseRequirement::Unknown;
882
883
ObjCPropertyDecl::SetterKind SK = PropDecl->getSetterKind();
884
885
switch (SK) {
886
// Retain and copy setters retain/copy their values before storing and so
887
// the value in their instance variables must be released in -dealloc.
888
case ObjCPropertyDecl::Retain:
889
case ObjCPropertyDecl::Copy:
890
if (isReleasedByCIFilterDealloc(PropImpl))
891
return ReleaseRequirement::MustNotReleaseDirectly;
892
893
if (isNibLoadedIvarWithoutRetain(PropImpl))
894
return ReleaseRequirement::Unknown;
895
896
return ReleaseRequirement::MustRelease;
897
898
case ObjCPropertyDecl::Weak:
899
return ReleaseRequirement::MustNotReleaseDirectly;
900
901
case ObjCPropertyDecl::Assign:
902
// It is common for the ivars for read-only assign properties to
903
// always be stored retained, so their release requirement cannot be
904
// be determined.
905
if (PropDecl->isReadOnly())
906
return ReleaseRequirement::Unknown;
907
908
return ReleaseRequirement::MustNotReleaseDirectly;
909
}
910
llvm_unreachable("Unrecognized setter kind");
911
}
912
913
/// Returns the released value if M is a call a setter that releases
914
/// and nils out its underlying instance variable.
915
SymbolRef
916
ObjCDeallocChecker::getValueReleasedByNillingOut(const ObjCMethodCall &M,
917
CheckerContext &C) const {
918
SVal ReceiverVal = M.getReceiverSVal();
919
if (!ReceiverVal.isValid())
920
return nullptr;
921
922
if (M.getNumArgs() == 0)
923
return nullptr;
924
925
if (!M.getArgExpr(0)->getType()->isObjCRetainableType())
926
return nullptr;
927
928
// Is the first argument nil?
929
SVal Arg = M.getArgSVal(0);
930
ProgramStateRef notNilState, nilState;
931
std::tie(notNilState, nilState) =
932
M.getState()->assume(Arg.castAs<DefinedOrUnknownSVal>());
933
if (!(nilState && !notNilState))
934
return nullptr;
935
936
const ObjCPropertyDecl *Prop = M.getAccessedProperty();
937
if (!Prop)
938
return nullptr;
939
940
ObjCIvarDecl *PropIvarDecl = Prop->getPropertyIvarDecl();
941
if (!PropIvarDecl)
942
return nullptr;
943
944
ProgramStateRef State = C.getState();
945
946
SVal LVal = State->getLValue(PropIvarDecl, ReceiverVal);
947
std::optional<Loc> LValLoc = LVal.getAs<Loc>();
948
if (!LValLoc)
949
return nullptr;
950
951
SVal CurrentValInIvar = State->getSVal(*LValLoc);
952
return CurrentValInIvar.getAsSymbol();
953
}
954
955
/// Returns true if the current context is a call to -dealloc and false
956
/// otherwise. If true, it also sets SelfValOut to the value of
957
/// 'self'.
958
bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C,
959
SVal &SelfValOut) const {
960
return isInInstanceDealloc(C, C.getLocationContext(), SelfValOut);
961
}
962
963
/// Returns true if LCtx is a call to -dealloc and false
964
/// otherwise. If true, it also sets SelfValOut to the value of
965
/// 'self'.
966
bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C,
967
const LocationContext *LCtx,
968
SVal &SelfValOut) const {
969
auto *MD = dyn_cast<ObjCMethodDecl>(LCtx->getDecl());
970
if (!MD || !MD->isInstanceMethod() || MD->getSelector() != DeallocSel)
971
return false;
972
973
const ImplicitParamDecl *SelfDecl = LCtx->getSelfDecl();
974
assert(SelfDecl && "No self in -dealloc?");
975
976
ProgramStateRef State = C.getState();
977
SelfValOut = State->getSVal(State->getRegion(SelfDecl, LCtx));
978
return true;
979
}
980
981
/// Returns true if there is a call to -dealloc anywhere on the stack and false
982
/// otherwise. If true, it also sets InstanceValOut to the value of
983
/// 'self' in the frame for -dealloc.
984
bool ObjCDeallocChecker::instanceDeallocIsOnStack(const CheckerContext &C,
985
SVal &InstanceValOut) const {
986
const LocationContext *LCtx = C.getLocationContext();
987
988
while (LCtx) {
989
if (isInInstanceDealloc(C, LCtx, InstanceValOut))
990
return true;
991
992
LCtx = LCtx->getParent();
993
}
994
995
return false;
996
}
997
998
/// Returns true if the ID is a class in which is known to have
999
/// a separate teardown lifecycle. In this case, -dealloc warnings
1000
/// about missing releases should be suppressed.
1001
bool ObjCDeallocChecker::classHasSeparateTeardown(
1002
const ObjCInterfaceDecl *ID) const {
1003
// Suppress if the class is not a subclass of NSObject.
1004
for ( ; ID ; ID = ID->getSuperClass()) {
1005
IdentifierInfo *II = ID->getIdentifier();
1006
1007
if (II == NSObjectII)
1008
return false;
1009
1010
// FIXME: For now, ignore classes that subclass SenTestCase and XCTestCase,
1011
// as these don't need to implement -dealloc. They implement tear down in
1012
// another way, which we should try and catch later.
1013
// http://llvm.org/bugs/show_bug.cgi?id=3187
1014
if (II == XCTestCaseII || II == SenTestCaseII)
1015
return true;
1016
}
1017
1018
return true;
1019
}
1020
1021
/// The -dealloc method in CIFilter highly unusual in that is will release
1022
/// instance variables belonging to its *subclasses* if the variable name
1023
/// starts with "input" or backs a property whose name starts with "input".
1024
/// Subclasses should not release these ivars in their own -dealloc method --
1025
/// doing so could result in an over release.
1026
///
1027
/// This method returns true if the property will be released by
1028
/// -[CIFilter dealloc].
1029
bool ObjCDeallocChecker::isReleasedByCIFilterDealloc(
1030
const ObjCPropertyImplDecl *PropImpl) const {
1031
assert(PropImpl->getPropertyIvarDecl());
1032
StringRef PropName = PropImpl->getPropertyDecl()->getName();
1033
StringRef IvarName = PropImpl->getPropertyIvarDecl()->getName();
1034
1035
const char *ReleasePrefix = "input";
1036
if (!(PropName.starts_with(ReleasePrefix) ||
1037
IvarName.starts_with(ReleasePrefix))) {
1038
return false;
1039
}
1040
1041
const ObjCInterfaceDecl *ID =
1042
PropImpl->getPropertyIvarDecl()->getContainingInterface();
1043
for ( ; ID ; ID = ID->getSuperClass()) {
1044
IdentifierInfo *II = ID->getIdentifier();
1045
if (II == CIFilterII)
1046
return true;
1047
}
1048
1049
return false;
1050
}
1051
1052
/// Returns whether the ivar backing the property is an IBOutlet that
1053
/// has its value set by nib loading code without retaining the value.
1054
///
1055
/// On macOS, if there is no setter, the nib-loading code sets the ivar
1056
/// directly, without retaining the value,
1057
///
1058
/// On iOS and its derivatives, the nib-loading code will call
1059
/// -setValue:forKey:, which retains the value before directly setting the ivar.
1060
bool ObjCDeallocChecker::isNibLoadedIvarWithoutRetain(
1061
const ObjCPropertyImplDecl *PropImpl) const {
1062
const ObjCIvarDecl *IvarDecl = PropImpl->getPropertyIvarDecl();
1063
if (!IvarDecl->hasAttr<IBOutletAttr>())
1064
return false;
1065
1066
const llvm::Triple &Target =
1067
IvarDecl->getASTContext().getTargetInfo().getTriple();
1068
1069
if (!Target.isMacOSX())
1070
return false;
1071
1072
if (PropImpl->getPropertyDecl()->getSetterMethodDecl())
1073
return false;
1074
1075
return true;
1076
}
1077
1078
void ento::registerObjCDeallocChecker(CheckerManager &Mgr) {
1079
Mgr.registerChecker<ObjCDeallocChecker>();
1080
}
1081
1082
bool ento::shouldRegisterObjCDeallocChecker(const CheckerManager &mgr) {
1083
// These checker only makes sense under MRR.
1084
const LangOptions &LO = mgr.getLangOpts();
1085
return LO.getGC() != LangOptions::GCOnly && !LO.ObjCAutoRefCount;
1086
}
1087
1088