Skip to content
  1. Mar 19, 2013
  2. Mar 18, 2013
  3. Mar 16, 2013
  4. Mar 15, 2013
  5. Mar 14, 2013
    • Anna Zaks's avatar
      [analyzer] Change the way in which IDC Visitor decides to kick in and make... · 2672a4cc
      Anna Zaks authored
      [analyzer] Change the way in which IDC Visitor decides to kick in and make sure it attaches in the given edge case
      
      In the test case below, the value V is not constrained to 0 in ErrorNode but it is in node N.
      So we used to fail to register the Suppression visitor.
      
      We also need to change the way we determine that the Visitor should kick in because the node N belongs to
      the ExplodedGraph and might not be on the BugReporter path that the visitor sees. Instead of trying to match the node,
      turn on the visitor when we see the last node in which the symbol is ‘0’.
      
      llvm-svn: 177121
      2672a4cc
    • Jordan Rose's avatar
      [analyzer] Fix scan-build's -stats mode. · 529e239a
      Jordan Rose authored
      We were failing to match the output line, which led to us collecting no
      stats at all, which led to a divide-by-zero error.
      
      Fixes PR15510.
      
      llvm-svn: 177084
      529e239a
  6. Mar 13, 2013
  7. Mar 11, 2013
  8. Mar 09, 2013
    • Anna Zaks's avatar
      [analyzer] Make Suppress IDC checker aware that it might not start from the... · 5497d1a5
      Anna Zaks authored
      [analyzer] Make Suppress IDC checker aware that it might not start from the same node it was registered at
      
      The visitor used to assume that the value it’s tracking is null in the first node it examines. This is not true.
      If we are registering the Suppress Inlined Defensive checks visitor while traversing in another visitor
      (such as FindlastStoreVisitor). When we restart with the IDC visitor, the invariance of the visitor does
      not hold since the symbol we are tracking no longer exists at that point.
      
      I had to pass the ErrorNode when creating the IDC visitor, because, in some cases, node N is
      neither the error node nor will be visible along the path (we had not finalized the path at that point
      and are dealing with ExplodedGraph.)
      
      We should revisit the other visitors which might not be aware that they might get nodes, which are
      later in path than the trigger point.
      
      This suppresses a number of inline defensive checks in JavaScriptCore.
      
      llvm-svn: 176756
      5497d1a5
    • Anna Zaks's avatar
      [analyzer] Rename AttrNonNullChecker -> NonNullParamChecker · ef893399
      Anna Zaks authored
      llvm-svn: 176755
      ef893399
    • Anna Zaks's avatar
      [analyzer] Add test case for reference to null pointer param check · cdbca7ae
      Anna Zaks authored
      This tests that we track the original Expr if getDerefExpr fails.
      
      llvm-svn: 176754
      cdbca7ae
    • Jordan Rose's avatar
      [analyzer] Be more consistent about Objective-C methods that free memory. · 613f3c00
      Jordan Rose authored
      Previously, MallocChecker's pointer escape check and its post-call state
      update for Objective-C method calls had a fair amount duplicated logic
      and not-entirely-consistent checks. This commit restructures all this to
      be more consistent and possibly allow us to be more aggressive in warning
      about double-frees.
      
      New policy (applies to system header methods only):
      (1) If this is a method we know about, model it as taking/holding ownership
          of the passed-in buffer.
        (1a) ...unless there's a "freeWhenDone:" parameter with a zero (NO) value.
      (2) If there's a "freeWhenDone:" parameter (but it's not a method we know
          about), treat the buffer as escaping if the value is non-zero (YES) and
          non-escaping if it's zero (NO).
      (3) If the first selector piece ends with "NoCopy" (but it's not a method we
          know about and there's no "freeWhenDone:" parameter), treat the buffer
          as escaping.
      
      The reason that (2) and (3) don't explicitly model the ownership transfer is
      because we can't be sure that they will actually free the memory using free(),
      and we wouldn't want to emit a spurious "mismatched allocator" warning
      (coming in Anton's upcoming patch). In the future, we may have an idea of a
      "generic deallocation", i.e. we assume that the deallocator is correct but
      still continue tracking the region so that we can warn about double-frees.
      
      Patch by Anton Yartsev, with modifications from me.
      
      llvm-svn: 176744
      613f3c00
    • Jordan Rose's avatar
      [analyzer] Look for lvalue nodes when tracking a null pointer. · bce05836
      Jordan Rose authored
      r176010 introduced the notion of "interesting" lvalue expressions, whose
      nodes are guaranteed never to be reclaimed by the ExplodedGraph. This was
      used in bugreporter::trackNullOrUndefValue to find the region that contains
      the null or undef value being tracked.
      
      However, the /rvalue/ nodes (i.e. the loads from these lvalues that produce
      a null or undef value) /are/ still being reclaimed, and if we couldn't
      find the node for the rvalue, we just give up. This patch changes that so
      that we look for the node for either the rvalue or the lvalue -- preferring
      the former, since it lets us fall back to value-only tracking in cases
      where we can't get a region, but allowing the latter as well.
      
      <rdar://problem/13342842>
      
      llvm-svn: 176737
      bce05836
  9. Mar 08, 2013
    • Jan Wen Voung's avatar
      Move clang tests that depend on llvm/ADT/Statistic.h to a subdir. · 058927b8
      Jan Wen Voung authored
      The subdirectory has a lit.local.cfg that marks the tests unsupported
      if llvm was built without Asserts.  There will be a patch in LLVM
      that disables statistics gathering when built without Asserts so
      that full Release builds can be faster.  Statistics can also
      be enabled by building with -DLLVM_ENABLE_STATS.
      
      llvm-svn: 176730
      058927b8
  10. Mar 07, 2013
    • Anna Zaks's avatar
      [analyzer] Warn on passing a reference to null pointer as an argument in a call · 9e0da9e0
      Anna Zaks authored
      Warn about null pointer dereference earlier when a reference to a null pointer is
      passed in a call. The idea is that even though the standard might allow this, reporting
      the issue earlier is better for diagnostics (the error is reported closer to the place where
      the pointer was set to NULL). This also simplifies analyzer’s diagnostic logic, which has
      to track “where the null came from”. As a consequence, some of our null pointer
      warning suppression mechanisms started triggering more often.
      
      TODO: Change the name of the file and class to reflect the new check.
      llvm-svn: 176612
      9e0da9e0
    • Jordan Rose's avatar
      [analyzer] Check for returning null references in ReturnUndefChecker. · b41977f8
      Jordan Rose authored
      Officially in the C++ standard, a null reference cannot exist. However,
      it's still very easy to create one:
      
      int &getNullRef() {
        int *p = 0;
        return *p;
      }
      
      We already check that binds to reference regions don't create null references.
      This patch checks that we don't create null references by returning, either.
      
      <rdar://problem/13364378>
      
      llvm-svn: 176601
      b41977f8
  11. Mar 06, 2013
  12. Mar 05, 2013
  13. Mar 02, 2013
    • Anna Zaks's avatar
      [analyzer] Simple inline defensive checks suppression · 8d7c8a4d
      Anna Zaks authored
      Inlining brought a few "null pointer use" false positives, which occur because
      the callee defensively checks if a pointer is NULL, whereas the caller knows
      that the pointer cannot be NULL in the context of the given call.
      
      This is a first attempt to silence these warnings by tracking the symbolic value
      along the execution path in the BugReporter. The new visitor finds the node
      in which the symbol was first constrained to NULL. If the node belongs to
      a function on the active stack, the warning is reported, otherwise, it is
      suppressed.
      
      There are several areas for follow up work, for example:
       - How do we differentiate the cases where the first check is followed by
      another one, which does happen on the active stack?
      
      Also, this only silences a fraction of null pointer use warnings. For example, it
      does not do anything for the cases where NULL was assigned inside a callee.
      
      llvm-svn: 176402
      8d7c8a4d
    • Jordan Rose's avatar
      [analyzer] Special-case bitfields when finding sub-region bindings. · e185d731
      Jordan Rose authored
      Previously we were assuming that we'd never ask for the sub-region bindings
      of a bitfield, since a bitfield cannot have subregions. However,
      unification of code paths has made that assumption invalid. While we could
      take advantage of this by just checking for the single possible binding,
      it's probably better to do the right thing, so that if/when we someday
      support unions we'll do the right thing there, too.
      
      This fixes a handful of false positives in analyzing LLVM.
      
      <rdar://problem/13325522>
      
      llvm-svn: 176388
      e185d731
  14. Mar 01, 2013
    • Jordan Rose's avatar
      [analyzer] Suppress paths involving a reference whose rvalue is null. · 801916ba
      Jordan Rose authored
      Most map types have an operator[] that inserts a new element if the key
      isn't found, then returns a reference to the value slot so that you can
      assign into it. However, if the value type is a pointer, it will be
      initialized to null. This is usually no problem.
      
      However, if the user /knows/ the map contains a value for a particular key,
      they may just use it immediately:
      
         // From ClangSACheckersEmitter.cpp
         recordGroupMap[group]->Checkers
      
      In this case the analyzer reports a null dereference on the path where the
      key is not in the map, even though the user knows that path is impossible
      here. They could silence the warning by adding an assertion, but that means
      splitting up the expression and introducing a local variable. (Note that
      the analyzer has no way of knowing that recordGroupMap[group] will return
      the same reference if called twice in a row!)
      
      We already have logic that says a null dereference has a high chance of
      being a false positive if the null came from an inlined function. This
      patch simply extends that to references whose rvalues are null as well,
      silencing several false positives in LLVM.
      
      <rdar://problem/13239854>
      
      llvm-svn: 176371
      801916ba
  15. Feb 27, 2013
    • Jordan Rose's avatar
      [analyzer] Fix test for previous commit. · 2c377fea
      Jordan Rose authored
      llvm-svn: 176202
      2c377fea
    • Jordan Rose's avatar
      [analyzer] Teach FindLastStoreBRVisitor to understand stores of the same value. · f7f32d52
      Jordan Rose authored
      Consider this case:
      
        int *p = 0;
        p = getPointerThatMayBeNull();
        *p = 1;
      
      If we inline 'getPointerThatMayBeNull', we might know that the value of 'p'
      is NULL, and thus emit a null pointer dereference report. However, we
      usually want to suppress such warnings as error paths, and we do so by using
      FindLastStoreBRVisitor to see where the NULL came from. In this case, though,
      because 'p' was NULL both before and after the assignment, the visitor
      would decide that the "last store" was the initialization, not the
      re-assignment.
      
      This commit changes FindLastStoreBRVisitor to consider all PostStore nodes
      that assign to this region. This still won't catches changes made directly
      by checkers if they re-assign the same value, but it does handle the common
      case in user-written code and will trigger ReturnVisitor's suppression
      machinery as expected.
      
      <rdar://problem/13299738>
      
      llvm-svn: 176201
      f7f32d52
    • Jordan Rose's avatar
      [analyzer] Turn on C++ constructor inlining by default. · 4587b287
      Jordan Rose authored
      This enables constructor inlining for types with non-trivial destructors.
      The plan is to enable destructor inlining within the next month, but that
      needs further verification.
      
      <rdar://problem/12295329>
      
      llvm-svn: 176200
      4587b287
    • Jordan Rose's avatar
      [analyzer] If a struct has a partial lazy binding, its fields aren't Undef. · 4a7bf49b
      Jordan Rose authored
      This is essentially the same problem as r174031: a lazy binding for the first
      field of a struct may stomp on an existing default binding for the
      entire struct. Because of the way RegionStore is set up, we can't help
      but lose the top-level binding, but then we need to make sure that accessing
      one of the other fields doesn't come back as Undefined.
      
      In this case, RegionStore is now correctly detecting that the lazy binding
      we have isn't the right type, but then failing to follow through on the
      implications of that: we don't know anything about the other fields in the
      aggregate. This fix adds a test when searching for other kinds of default
      values to see if there's a lazy binding we rejected, and if so returns
      a symbolic value instead of Undefined.
      
      The long-term fix for this is probably a new Store model; see
      <rdar://problem/12701038>.
      
      Fixes <rdar://problem/13292559>.
      
      llvm-svn: 176144
      4a7bf49b
  16. Feb 26, 2013
    • Ted Kremenek's avatar
      [analyzer] Use 'MemRegion::printPretty()' instead of assuming the region is a VarRegion. · 37c777ec
      Ted Kremenek authored
      Fixes PR15358 and <rdar://problem/13295437>.
      
      Along the way, shorten path diagnostics that say "Variable 'x'" to just
      be "'x'".  By the context, it is obvious that we have a variable,
      and so this just consumes text space.
      
      llvm-svn: 176115
      37c777ec
    • Jordan Rose's avatar
      [analyzer] Don't look through casts when creating pointer temporaries. · 861a1740
      Jordan Rose authored
      Normally, we need to look through derived-to-base casts when creating
      temporary object regions (added in r175854). However, if the temporary
      is a pointer (rather than a struct/class instance), we need to /preserve/
      the base casts that have been applied.
      
      This also ensures that we really do create a new temporary region when
      we need to: MaterializeTemporaryExpr and lvalue CXXDefaultArgExprs.
      
      Fixes PR15342, although the test case doesn't include the crash because
      I couldn't isolate it.
      
      llvm-svn: 176069
      861a1740
    • Jordan Rose's avatar
      [analyzer] StackAddrEscapeChecker: strip qualifiers from temporary types. · c948709c
      Jordan Rose authored
      With the new support for trivial copy constructors, we are not always
      consistent about whether a CXXTempObjectRegion gets reused or created
      from scratch, which affects whether qualifiers are preserved. However,
      we probably don't care anyway.
      
      This also switches to using the current PrintingPolicy for the type,
      which means C++ types don't get a spurious 'struct' prefix anymore.
      
      llvm-svn: 176068
      c948709c
  17. Feb 25, 2013
    • Anna Zaks's avatar
      [analyzer] Restrict ObjC type inference to methods that have related result type. · ba342723
      Anna Zaks authored
      This addresses a case when we inline a wrong method due to incorrect
      dynamic type inference. Specifically, when user code contains a method from init
      family, which creates an instance of another class.
      
      Use hasRelatedResultType() to find out if our inference rules should be triggered.
      
      llvm-svn: 176054
      ba342723
    • Jordan Rose's avatar
      [analyzer] Handle reference parameters with default values. · 77cdb53c
      Jordan Rose authored
      r175026 added support for default values, but didn't take reference
      parameters into account, which expect the default argument to be an
      lvalue. Use createTemporaryRegionIfNeeded if we can evaluate the default
      expr as an rvalue but the expected result is an lvalue.
      
      Fixes the most recent report of PR12915. The original report predates
      default argument support, so that can't be it.
      
      llvm-svn: 176042
      77cdb53c
    • Jordan Rose's avatar
      [analyzer] Base regions may be invalid when layered on symbolic regions. · f9e9a9f4
      Jordan Rose authored
      While RegionStore checks to make sure casts on TypedValueRegions are valid,
      it does not do the same for SymbolicRegions, which do not have perfect type
      info anyway. Additionally, MemRegion::getAsOffset does not take a
      ProgramState, so it can't use dynamic type info to determine a better type
      for the regions. (This could also be dangerous if the type of a super-region
      changes!)
      
      Account for this by checking that a base object region is valid on top of a
      symbolic region, and falling back to "symbolic offset" mode if not.
      
      Fixes PR15345.
      
      llvm-svn: 176034
      f9e9a9f4
  18. Feb 24, 2013
    • Ted Kremenek's avatar
      [analyzer] tracking stores/constraints now works for ObjC ivars or struct fields. · 96250482
      Ted Kremenek authored
      This required more changes than I originally expected:
      
      - ObjCIvarRegion implements "canPrintPretty" et al
      - DereferenceChecker indicates the null pointer source is an ivar
      - bugreporter::trackNullOrUndefValue() uses an alternate algorithm
        to compute the location region to track by scouring the ExplodedGraph.
        This allows us to get the actual MemRegion for variables, ivars,
        fields, etc.  We only hand construct a VarRegion for C++ references.
      - ExplodedGraph no longer drops nodes for expressions that are marked
        'lvalue'.  This is to facilitate the logic in the previous bullet.
        This may lead to a slight increase in size in the ExplodedGraph,
        which I have not measured, but it is likely not to be a big deal.
      
      I have validated each of the changed plist output.
      
      Fixes <rdar://problem/12114812>
      
      llvm-svn: 175988
      96250482
  19. Feb 22, 2013
Loading