Home | History | Annotate | Line # | Download | only in Checkers
      1 //==- CheckObjCDealloc.cpp - Check ObjC -dealloc implementation --*- C++ -*-==//
      2 //
      3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
      4 // See https://llvm.org/LICENSE.txt for license information.
      5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
      6 //
      7 //===----------------------------------------------------------------------===//
      8 //
      9 //  This checker analyzes Objective-C -dealloc methods and their callees
     10 //  to warn about improper releasing of instance variables that back synthesized
     11 // properties. It warns about missing releases in the following cases:
     12 //  - When a class has a synthesized instance variable for a 'retain' or 'copy'
     13 //    property and lacks a -dealloc method in its implementation.
     14 //  - When a class has a synthesized instance variable for a 'retain'/'copy'
     15 //   property but the ivar is not released in -dealloc by either -release
     16 //   or by nilling out the property.
     17 //
     18 //  It warns about extra releases in -dealloc (but not in callees) when a
     19 //  synthesized instance variable is released in the following cases:
     20 //  - When the property is 'assign' and is not 'readonly'.
     21 //  - When the property is 'weak'.
     22 //
     23 //  This checker only warns for instance variables synthesized to back
     24 //  properties. Handling the more general case would require inferring whether
     25 //  an instance variable is stored retained or not. For synthesized properties,
     26 //  this is specified in the property declaration itself.
     27 //
     28 //===----------------------------------------------------------------------===//
     29 
     30 #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
     31 #include "clang/Analysis/PathDiagnostic.h"
     32 #include "clang/AST/Attr.h"
     33 #include "clang/AST/DeclObjC.h"
     34 #include "clang/AST/Expr.h"
     35 #include "clang/AST/ExprObjC.h"
     36 #include "clang/Basic/LangOptions.h"
     37 #include "clang/Basic/TargetInfo.h"
     38 #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
     39 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
     40 #include "clang/StaticAnalyzer/Core/Checker.h"
     41 #include "clang/StaticAnalyzer/Core/PathSensitive/AnalysisManager.h"
     42 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
     43 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
     44 #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramState.h"
     45 #include "clang/StaticAnalyzer/Core/PathSensitive/ProgramStateTrait.h"
     46 #include "clang/StaticAnalyzer/Core/PathSensitive/SymbolManager.h"
     47 #include "llvm/Support/raw_ostream.h"
     48 
     49 using namespace clang;
     50 using namespace ento;
     51 
     52 /// Indicates whether an instance variable is required to be released in
     53 /// -dealloc.
     54 enum class ReleaseRequirement {
     55   /// The instance variable must be released, either by calling
     56   /// -release on it directly or by nilling it out with a property setter.
     57   MustRelease,
     58 
     59   /// The instance variable must not be directly released with -release.
     60   MustNotReleaseDirectly,
     61 
     62   /// The requirement for the instance variable could not be determined.
     63   Unknown
     64 };
     65 
     66 /// Returns true if the property implementation is synthesized and the
     67 /// type of the property is retainable.
     68 static bool isSynthesizedRetainableProperty(const ObjCPropertyImplDecl *I,
     69                                             const ObjCIvarDecl **ID,
     70                                             const ObjCPropertyDecl **PD) {
     71 
     72   if (I->getPropertyImplementation() != ObjCPropertyImplDecl::Synthesize)
     73     return false;
     74 
     75   (*ID) = I->getPropertyIvarDecl();
     76   if (!(*ID))
     77     return false;
     78 
     79   QualType T = (*ID)->getType();
     80   if (!T->isObjCRetainableType())
     81     return false;
     82 
     83   (*PD) = I->getPropertyDecl();
     84   // Shouldn't be able to synthesize a property that doesn't exist.
     85   assert(*PD);
     86 
     87   return true;
     88 }
     89 
     90 namespace {
     91 
     92 class ObjCDeallocChecker
     93     : public Checker<check::ASTDecl<ObjCImplementationDecl>,
     94                      check::PreObjCMessage, check::PostObjCMessage,
     95                      check::PreCall,
     96                      check::BeginFunction, check::EndFunction,
     97                      eval::Assume,
     98                      check::PointerEscape,
     99                      check::PreStmt<ReturnStmt>> {
    100 
    101   mutable IdentifierInfo *NSObjectII, *SenTestCaseII, *XCTestCaseII,
    102       *Block_releaseII, *CIFilterII;
    103 
    104   mutable Selector DeallocSel, ReleaseSel;
    105 
    106   std::unique_ptr<BugType> MissingReleaseBugType;
    107   std::unique_ptr<BugType> ExtraReleaseBugType;
    108   std::unique_ptr<BugType> MistakenDeallocBugType;
    109 
    110 public:
    111   ObjCDeallocChecker();
    112 
    113   void checkASTDecl(const ObjCImplementationDecl *D, AnalysisManager& Mgr,
    114                     BugReporter &BR) const;
    115   void checkBeginFunction(CheckerContext &Ctx) const;
    116   void checkPreObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
    117   void checkPreCall(const CallEvent &Call, CheckerContext &C) const;
    118   void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const;
    119 
    120   ProgramStateRef evalAssume(ProgramStateRef State, SVal Cond,
    121                              bool Assumption) const;
    122 
    123   ProgramStateRef checkPointerEscape(ProgramStateRef State,
    124                                      const InvalidatedSymbols &Escaped,
    125                                      const CallEvent *Call,
    126                                      PointerEscapeKind Kind) const;
    127   void checkPreStmt(const ReturnStmt *RS, CheckerContext &C) const;
    128   void checkEndFunction(const ReturnStmt *RS, CheckerContext &Ctx) const;
    129 
    130 private:
    131   void diagnoseMissingReleases(CheckerContext &C) const;
    132 
    133   bool diagnoseExtraRelease(SymbolRef ReleasedValue, const ObjCMethodCall &M,
    134                             CheckerContext &C) const;
    135 
    136   bool diagnoseMistakenDealloc(SymbolRef DeallocedValue,
    137                                const ObjCMethodCall &M,
    138                                CheckerContext &C) const;
    139 
    140   SymbolRef getValueReleasedByNillingOut(const ObjCMethodCall &M,
    141                                          CheckerContext &C) const;
    142 
    143   const ObjCIvarRegion *getIvarRegionForIvarSymbol(SymbolRef IvarSym) const;
    144   SymbolRef getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const;
    145 
    146   const ObjCPropertyImplDecl*
    147   findPropertyOnDeallocatingInstance(SymbolRef IvarSym,
    148                                      CheckerContext &C) const;
    149 
    150   ReleaseRequirement
    151   getDeallocReleaseRequirement(const ObjCPropertyImplDecl *PropImpl) const;
    152 
    153   bool isInInstanceDealloc(const CheckerContext &C, SVal &SelfValOut) const;
    154   bool isInInstanceDealloc(const CheckerContext &C, const LocationContext *LCtx,
    155                            SVal &SelfValOut) const;
    156   bool instanceDeallocIsOnStack(const CheckerContext &C,
    157                                 SVal &InstanceValOut) const;
    158 
    159   bool isSuperDeallocMessage(const ObjCMethodCall &M) const;
    160 
    161   const ObjCImplDecl *getContainingObjCImpl(const LocationContext *LCtx) const;
    162 
    163   const ObjCPropertyDecl *
    164   findShadowedPropertyDecl(const ObjCPropertyImplDecl *PropImpl) const;
    165 
    166   void transitionToReleaseValue(CheckerContext &C, SymbolRef Value) const;
    167   ProgramStateRef removeValueRequiringRelease(ProgramStateRef State,
    168                                               SymbolRef InstanceSym,
    169                                               SymbolRef ValueSym) const;
    170 
    171   void initIdentifierInfoAndSelectors(ASTContext &Ctx) const;
    172 
    173   bool classHasSeparateTeardown(const ObjCInterfaceDecl *ID) const;
    174 
    175   bool isReleasedByCIFilterDealloc(const ObjCPropertyImplDecl *PropImpl) const;
    176   bool isNibLoadedIvarWithoutRetain(const ObjCPropertyImplDecl *PropImpl) const;
    177 };
    178 } // End anonymous namespace.
    179 
    180 
    181 /// Maps from the symbol for a class instance to the set of
    182 /// symbols remaining that must be released in -dealloc.
    183 REGISTER_SET_FACTORY_WITH_PROGRAMSTATE(SymbolSet, SymbolRef)
    184 REGISTER_MAP_WITH_PROGRAMSTATE(UnreleasedIvarMap, SymbolRef, SymbolSet)
    185 
    186 
    187 /// An AST check that diagnose when the class requires a -dealloc method and
    188 /// is missing one.
    189 void ObjCDeallocChecker::checkASTDecl(const ObjCImplementationDecl *D,
    190                                       AnalysisManager &Mgr,
    191                                       BugReporter &BR) const {
    192   assert(Mgr.getLangOpts().getGC() != LangOptions::GCOnly);
    193   assert(!Mgr.getLangOpts().ObjCAutoRefCount);
    194   initIdentifierInfoAndSelectors(Mgr.getASTContext());
    195 
    196   const ObjCInterfaceDecl *ID = D->getClassInterface();
    197   // If the class is known to have a lifecycle with a separate teardown method
    198   // then it may not require a -dealloc method.
    199   if (classHasSeparateTeardown(ID))
    200     return;
    201 
    202   // Does the class contain any synthesized properties that are retainable?
    203   // If not, skip the check entirely.
    204   const ObjCPropertyImplDecl *PropImplRequiringRelease = nullptr;
    205   bool HasOthers = false;
    206   for (const auto *I : D->property_impls()) {
    207     if (getDeallocReleaseRequirement(I) == ReleaseRequirement::MustRelease) {
    208       if (!PropImplRequiringRelease)
    209         PropImplRequiringRelease = I;
    210       else {
    211         HasOthers = true;
    212         break;
    213       }
    214     }
    215   }
    216 
    217   if (!PropImplRequiringRelease)
    218     return;
    219 
    220   const ObjCMethodDecl *MD = nullptr;
    221 
    222   // Scan the instance methods for "dealloc".
    223   for (const auto *I : D->instance_methods()) {
    224     if (I->getSelector() == DeallocSel) {
    225       MD = I;
    226       break;
    227     }
    228   }
    229 
    230   if (!MD) { // No dealloc found.
    231     const char* Name = "Missing -dealloc";
    232 
    233     std::string Buf;
    234     llvm::raw_string_ostream OS(Buf);
    235     OS << "'" << *D << "' lacks a 'dealloc' instance method but "
    236        << "must release '" << *PropImplRequiringRelease->getPropertyIvarDecl()
    237        << "'";
    238 
    239     if (HasOthers)
    240       OS << " and others";
    241     PathDiagnosticLocation DLoc =
    242         PathDiagnosticLocation::createBegin(D, BR.getSourceManager());
    243 
    244     BR.EmitBasicReport(D, this, Name, categories::CoreFoundationObjectiveC,
    245                        OS.str(), DLoc);
    246     return;
    247   }
    248 }
    249 
    250 /// If this is the beginning of -dealloc, mark the values initially stored in
    251 /// instance variables that must be released by the end of -dealloc
    252 /// as unreleased in the state.
    253 void ObjCDeallocChecker::checkBeginFunction(
    254     CheckerContext &C) const {
    255   initIdentifierInfoAndSelectors(C.getASTContext());
    256 
    257   // Only do this if the current method is -dealloc.
    258   SVal SelfVal;
    259   if (!isInInstanceDealloc(C, SelfVal))
    260     return;
    261 
    262   SymbolRef SelfSymbol = SelfVal.getAsSymbol();
    263 
    264   const LocationContext *LCtx = C.getLocationContext();
    265   ProgramStateRef InitialState = C.getState();
    266 
    267   ProgramStateRef State = InitialState;
    268 
    269   SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
    270 
    271   // Symbols that must be released by the end of the -dealloc;
    272   SymbolSet RequiredReleases = F.getEmptySet();
    273 
    274   // If we're an inlined -dealloc, we should add our symbols to the existing
    275   // set from our subclass.
    276   if (const SymbolSet *CurrSet = State->get<UnreleasedIvarMap>(SelfSymbol))
    277     RequiredReleases = *CurrSet;
    278 
    279   for (auto *PropImpl : getContainingObjCImpl(LCtx)->property_impls()) {
    280     ReleaseRequirement Requirement = getDeallocReleaseRequirement(PropImpl);
    281     if (Requirement != ReleaseRequirement::MustRelease)
    282       continue;
    283 
    284     SVal LVal = State->getLValue(PropImpl->getPropertyIvarDecl(), SelfVal);
    285     Optional<Loc> LValLoc = LVal.getAs<Loc>();
    286     if (!LValLoc)
    287       continue;
    288 
    289     SVal InitialVal = State->getSVal(LValLoc.getValue());
    290     SymbolRef Symbol = InitialVal.getAsSymbol();
    291     if (!Symbol || !isa<SymbolRegionValue>(Symbol))
    292       continue;
    293 
    294     // Mark the value as requiring a release.
    295     RequiredReleases = F.add(RequiredReleases, Symbol);
    296   }
    297 
    298   if (!RequiredReleases.isEmpty()) {
    299     State = State->set<UnreleasedIvarMap>(SelfSymbol, RequiredReleases);
    300   }
    301 
    302   if (State != InitialState) {
    303     C.addTransition(State);
    304   }
    305 }
    306 
    307 /// Given a symbol for an ivar, return the ivar region it was loaded from.
    308 /// Returns nullptr if the instance symbol cannot be found.
    309 const ObjCIvarRegion *
    310 ObjCDeallocChecker::getIvarRegionForIvarSymbol(SymbolRef IvarSym) const {
    311   return dyn_cast_or_null<ObjCIvarRegion>(IvarSym->getOriginRegion());
    312 }
    313 
    314 /// Given a symbol for an ivar, return a symbol for the instance containing
    315 /// the ivar. Returns nullptr if the instance symbol cannot be found.
    316 SymbolRef
    317 ObjCDeallocChecker::getInstanceSymbolFromIvarSymbol(SymbolRef IvarSym) const {
    318 
    319   const ObjCIvarRegion *IvarRegion = getIvarRegionForIvarSymbol(IvarSym);
    320   if (!IvarRegion)
    321     return nullptr;
    322 
    323   return IvarRegion->getSymbolicBase()->getSymbol();
    324 }
    325 
    326 /// If we are in -dealloc or -dealloc is on the stack, handle the call if it is
    327 /// a release or a nilling-out property setter.
    328 void ObjCDeallocChecker::checkPreObjCMessage(
    329     const ObjCMethodCall &M, CheckerContext &C) const {
    330   // Only run if -dealloc is on the stack.
    331   SVal DeallocedInstance;
    332   if (!instanceDeallocIsOnStack(C, DeallocedInstance))
    333     return;
    334 
    335   SymbolRef ReleasedValue = nullptr;
    336 
    337   if (M.getSelector() == ReleaseSel) {
    338     ReleasedValue = M.getReceiverSVal().getAsSymbol();
    339   } else if (M.getSelector() == DeallocSel && !M.isReceiverSelfOrSuper()) {
    340     if (diagnoseMistakenDealloc(M.getReceiverSVal().getAsSymbol(), M, C))
    341       return;
    342   }
    343 
    344   if (ReleasedValue) {
    345     // An instance variable symbol was released with -release:
    346     //    [_property release];
    347     if (diagnoseExtraRelease(ReleasedValue,M, C))
    348       return;
    349   } else {
    350     // An instance variable symbol was released nilling out its property:
    351     //    self.property = nil;
    352     ReleasedValue = getValueReleasedByNillingOut(M, C);
    353   }
    354 
    355   if (!ReleasedValue)
    356     return;
    357 
    358   transitionToReleaseValue(C, ReleasedValue);
    359 }
    360 
    361 /// If we are in -dealloc or -dealloc is on the stack, handle the call if it is
    362 /// call to Block_release().
    363 void ObjCDeallocChecker::checkPreCall(const CallEvent &Call,
    364                                       CheckerContext &C) const {
    365   const IdentifierInfo *II = Call.getCalleeIdentifier();
    366   if (II != Block_releaseII)
    367     return;
    368 
    369   if (Call.getNumArgs() != 1)
    370     return;
    371 
    372   SymbolRef ReleasedValue = Call.getArgSVal(0).getAsSymbol();
    373   if (!ReleasedValue)
    374     return;
    375 
    376   transitionToReleaseValue(C, ReleasedValue);
    377 }
    378 /// If the message was a call to '[super dealloc]', diagnose any missing
    379 /// releases.
    380 void ObjCDeallocChecker::checkPostObjCMessage(
    381     const ObjCMethodCall &M, CheckerContext &C) const {
    382   // We perform this check post-message so that if the super -dealloc
    383   // calls a helper method and that this class overrides, any ivars released in
    384   // the helper method will be recorded before checking.
    385   if (isSuperDeallocMessage(M))
    386     diagnoseMissingReleases(C);
    387 }
    388 
    389 /// Check for missing releases even when -dealloc does not call
    390 /// '[super dealloc]'.
    391 void ObjCDeallocChecker::checkEndFunction(
    392     const ReturnStmt *RS, CheckerContext &C) const {
    393   diagnoseMissingReleases(C);
    394 }
    395 
    396 /// Check for missing releases on early return.
    397 void ObjCDeallocChecker::checkPreStmt(
    398     const ReturnStmt *RS, CheckerContext &C) const {
    399   diagnoseMissingReleases(C);
    400 }
    401 
    402 /// When a symbol is assumed to be nil, remove it from the set of symbols
    403 /// require to be nil.
    404 ProgramStateRef ObjCDeallocChecker::evalAssume(ProgramStateRef State, SVal Cond,
    405                                                bool Assumption) const {
    406   if (State->get<UnreleasedIvarMap>().isEmpty())
    407     return State;
    408 
    409   auto *CondBSE = dyn_cast_or_null<BinarySymExpr>(Cond.getAsSymbol());
    410   if (!CondBSE)
    411     return State;
    412 
    413   BinaryOperator::Opcode OpCode = CondBSE->getOpcode();
    414   if (Assumption) {
    415     if (OpCode != BO_EQ)
    416       return State;
    417   } else {
    418     if (OpCode != BO_NE)
    419       return State;
    420   }
    421 
    422   SymbolRef NullSymbol = nullptr;
    423   if (auto *SIE = dyn_cast<SymIntExpr>(CondBSE)) {
    424     const llvm::APInt &RHS = SIE->getRHS();
    425     if (RHS != 0)
    426       return State;
    427     NullSymbol = SIE->getLHS();
    428   } else if (auto *SIE = dyn_cast<IntSymExpr>(CondBSE)) {
    429     const llvm::APInt &LHS = SIE->getLHS();
    430     if (LHS != 0)
    431       return State;
    432     NullSymbol = SIE->getRHS();
    433   } else {
    434     return State;
    435   }
    436 
    437   SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(NullSymbol);
    438   if (!InstanceSymbol)
    439     return State;
    440 
    441   State = removeValueRequiringRelease(State, InstanceSymbol, NullSymbol);
    442 
    443   return State;
    444 }
    445 
    446 /// If a symbol escapes conservatively assume unseen code released it.
    447 ProgramStateRef ObjCDeallocChecker::checkPointerEscape(
    448     ProgramStateRef State, const InvalidatedSymbols &Escaped,
    449     const CallEvent *Call, PointerEscapeKind Kind) const {
    450 
    451   if (State->get<UnreleasedIvarMap>().isEmpty())
    452     return State;
    453 
    454   // Don't treat calls to '[super dealloc]' as escaping for the purposes
    455   // of this checker. Because the checker diagnoses missing releases in the
    456   // post-message handler for '[super dealloc], escaping here would cause
    457   // the checker to never warn.
    458   auto *OMC = dyn_cast_or_null<ObjCMethodCall>(Call);
    459   if (OMC && isSuperDeallocMessage(*OMC))
    460     return State;
    461 
    462   for (const auto &Sym : Escaped) {
    463     if (!Call || (Call && !Call->isInSystemHeader())) {
    464       // If Sym is a symbol for an object with instance variables that
    465       // must be released, remove these obligations when the object escapes
    466       // unless via a call to a system function. System functions are
    467       // very unlikely to release instance variables on objects passed to them,
    468       // and are frequently called on 'self' in -dealloc (e.g., to remove
    469       // observers) -- we want to avoid false negatives from escaping on
    470       // them.
    471       State = State->remove<UnreleasedIvarMap>(Sym);
    472     }
    473 
    474 
    475     SymbolRef InstanceSymbol = getInstanceSymbolFromIvarSymbol(Sym);
    476     if (!InstanceSymbol)
    477       continue;
    478 
    479     State = removeValueRequiringRelease(State, InstanceSymbol, Sym);
    480   }
    481 
    482   return State;
    483 }
    484 
    485 /// Report any unreleased instance variables for the current instance being
    486 /// dealloced.
    487 void ObjCDeallocChecker::diagnoseMissingReleases(CheckerContext &C) const {
    488   ProgramStateRef State = C.getState();
    489 
    490   SVal SelfVal;
    491   if (!isInInstanceDealloc(C, SelfVal))
    492     return;
    493 
    494   const MemRegion *SelfRegion = SelfVal.castAs<loc::MemRegionVal>().getRegion();
    495   const LocationContext *LCtx = C.getLocationContext();
    496 
    497   ExplodedNode *ErrNode = nullptr;
    498 
    499   SymbolRef SelfSym = SelfVal.getAsSymbol();
    500   if (!SelfSym)
    501     return;
    502 
    503   const SymbolSet *OldUnreleased = State->get<UnreleasedIvarMap>(SelfSym);
    504   if (!OldUnreleased)
    505     return;
    506 
    507   SymbolSet NewUnreleased = *OldUnreleased;
    508   SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
    509 
    510   ProgramStateRef InitialState = State;
    511 
    512   for (auto *IvarSymbol : *OldUnreleased) {
    513     const TypedValueRegion *TVR =
    514         cast<SymbolRegionValue>(IvarSymbol)->getRegion();
    515     const ObjCIvarRegion *IvarRegion = cast<ObjCIvarRegion>(TVR);
    516 
    517     // Don't warn if the ivar is not for this instance.
    518     if (SelfRegion != IvarRegion->getSuperRegion())
    519       continue;
    520 
    521     const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl();
    522     // Prevent an inlined call to -dealloc in a super class from warning
    523     // about the values the subclass's -dealloc should release.
    524     if (IvarDecl->getContainingInterface() !=
    525         cast<ObjCMethodDecl>(LCtx->getDecl())->getClassInterface())
    526       continue;
    527 
    528     // Prevents diagnosing multiple times for the same instance variable
    529     // at, for example, both a return and at the end of the function.
    530     NewUnreleased = F.remove(NewUnreleased, IvarSymbol);
    531 
    532     if (State->getStateManager()
    533             .getConstraintManager()
    534             .isNull(State, IvarSymbol)
    535             .isConstrainedTrue()) {
    536       continue;
    537     }
    538 
    539     // A missing release manifests as a leak, so treat as a non-fatal error.
    540     if (!ErrNode)
    541       ErrNode = C.generateNonFatalErrorNode();
    542     // If we've already reached this node on another path, return without
    543     // diagnosing.
    544     if (!ErrNode)
    545       return;
    546 
    547     std::string Buf;
    548     llvm::raw_string_ostream OS(Buf);
    549 
    550     const ObjCInterfaceDecl *Interface = IvarDecl->getContainingInterface();
    551     // If the class is known to have a lifecycle with teardown that is
    552     // separate from -dealloc, do not warn about missing releases. We
    553     // suppress here (rather than not tracking for instance variables in
    554     // such classes) because these classes are rare.
    555     if (classHasSeparateTeardown(Interface))
    556       return;
    557 
    558     ObjCImplDecl *ImplDecl = Interface->getImplementation();
    559 
    560     const ObjCPropertyImplDecl *PropImpl =
    561         ImplDecl->FindPropertyImplIvarDecl(IvarDecl->getIdentifier());
    562 
    563     const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl();
    564 
    565     assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Copy ||
    566            PropDecl->getSetterKind() == ObjCPropertyDecl::Retain);
    567 
    568     OS << "The '" << *IvarDecl << "' ivar in '" << *ImplDecl
    569        << "' was ";
    570 
    571     if (PropDecl->getSetterKind() == ObjCPropertyDecl::Retain)
    572       OS << "retained";
    573     else
    574       OS << "copied";
    575 
    576     OS << " by a synthesized property but not released"
    577           " before '[super dealloc]'";
    578 
    579     auto BR = std::make_unique<PathSensitiveBugReport>(*MissingReleaseBugType,
    580                                                        OS.str(), ErrNode);
    581     C.emitReport(std::move(BR));
    582   }
    583 
    584   if (NewUnreleased.isEmpty()) {
    585     State = State->remove<UnreleasedIvarMap>(SelfSym);
    586   } else {
    587     State = State->set<UnreleasedIvarMap>(SelfSym, NewUnreleased);
    588   }
    589 
    590   if (ErrNode) {
    591     C.addTransition(State, ErrNode);
    592   } else if (State != InitialState) {
    593     C.addTransition(State);
    594   }
    595 
    596   // Make sure that after checking in the top-most frame the list of
    597   // tracked ivars is empty. This is intended to detect accidental leaks in
    598   // the UnreleasedIvarMap program state.
    599   assert(!LCtx->inTopFrame() || State->get<UnreleasedIvarMap>().isEmpty());
    600 }
    601 
    602 /// Given a symbol, determine whether the symbol refers to an ivar on
    603 /// the top-most deallocating instance. If so, find the property for that
    604 /// ivar, if one exists. Otherwise return null.
    605 const ObjCPropertyImplDecl *
    606 ObjCDeallocChecker::findPropertyOnDeallocatingInstance(
    607     SymbolRef IvarSym, CheckerContext &C) const {
    608   SVal DeallocedInstance;
    609   if (!isInInstanceDealloc(C, DeallocedInstance))
    610     return nullptr;
    611 
    612   // Try to get the region from which the ivar value was loaded.
    613   auto *IvarRegion = getIvarRegionForIvarSymbol(IvarSym);
    614   if (!IvarRegion)
    615     return nullptr;
    616 
    617   // Don't try to find the property if the ivar was not loaded from the
    618   // given instance.
    619   if (DeallocedInstance.castAs<loc::MemRegionVal>().getRegion() !=
    620       IvarRegion->getSuperRegion())
    621     return nullptr;
    622 
    623   const LocationContext *LCtx = C.getLocationContext();
    624   const ObjCIvarDecl *IvarDecl = IvarRegion->getDecl();
    625 
    626   const ObjCImplDecl *Container = getContainingObjCImpl(LCtx);
    627   const ObjCPropertyImplDecl *PropImpl =
    628       Container->FindPropertyImplIvarDecl(IvarDecl->getIdentifier());
    629   return PropImpl;
    630 }
    631 
    632 /// Emits a warning if the current context is -dealloc and ReleasedValue
    633 /// must not be directly released in a -dealloc. Returns true if a diagnostic
    634 /// was emitted.
    635 bool ObjCDeallocChecker::diagnoseExtraRelease(SymbolRef ReleasedValue,
    636                                               const ObjCMethodCall &M,
    637                                               CheckerContext &C) const {
    638   // Try to get the region from which the released value was loaded.
    639   // Note that, unlike diagnosing for missing releases, here we don't track
    640   // values that must not be released in the state. This is because even if
    641   // these values escape, it is still an error under the rules of MRR to
    642   // release them in -dealloc.
    643   const ObjCPropertyImplDecl *PropImpl =
    644       findPropertyOnDeallocatingInstance(ReleasedValue, C);
    645 
    646   if (!PropImpl)
    647     return false;
    648 
    649   // If the ivar belongs to a property that must not be released directly
    650   // in dealloc, emit a warning.
    651   if (getDeallocReleaseRequirement(PropImpl) !=
    652       ReleaseRequirement::MustNotReleaseDirectly) {
    653     return false;
    654   }
    655 
    656   // If the property is readwrite but it shadows a read-only property in its
    657   // external interface, treat the property a read-only. If the outside
    658   // world cannot write to a property then the internal implementation is free
    659   // to make its own convention about whether the value is stored retained
    660   // or not. We look up the shadow here rather than in
    661   // getDeallocReleaseRequirement() because doing so can be expensive.
    662   const ObjCPropertyDecl *PropDecl = findShadowedPropertyDecl(PropImpl);
    663   if (PropDecl) {
    664     if (PropDecl->isReadOnly())
    665       return false;
    666   } else {
    667     PropDecl = PropImpl->getPropertyDecl();
    668   }
    669 
    670   ExplodedNode *ErrNode = C.generateNonFatalErrorNode();
    671   if (!ErrNode)
    672     return false;
    673 
    674   std::string Buf;
    675   llvm::raw_string_ostream OS(Buf);
    676 
    677   assert(PropDecl->getSetterKind() == ObjCPropertyDecl::Weak ||
    678          (PropDecl->getSetterKind() == ObjCPropertyDecl::Assign &&
    679           !PropDecl->isReadOnly()) ||
    680          isReleasedByCIFilterDealloc(PropImpl)
    681          );
    682 
    683   const ObjCImplDecl *Container = getContainingObjCImpl(C.getLocationContext());
    684   OS << "The '" << *PropImpl->getPropertyIvarDecl()
    685      << "' ivar in '" << *Container;
    686 
    687 
    688   if (isReleasedByCIFilterDealloc(PropImpl)) {
    689     OS << "' will be released by '-[CIFilter dealloc]' but also released here";
    690   } else {
    691     OS << "' was synthesized for ";
    692 
    693     if (PropDecl->getSetterKind() == ObjCPropertyDecl::Weak)
    694       OS << "a weak";
    695     else
    696       OS << "an assign, readwrite";
    697 
    698     OS <<  " property but was released in 'dealloc'";
    699   }
    700 
    701   auto BR = std::make_unique<PathSensitiveBugReport>(*ExtraReleaseBugType,
    702                                                      OS.str(), ErrNode);
    703   BR->addRange(M.getOriginExpr()->getSourceRange());
    704 
    705   C.emitReport(std::move(BR));
    706 
    707   return true;
    708 }
    709 
    710 /// Emits a warning if the current context is -dealloc and DeallocedValue
    711 /// must not be directly dealloced in a -dealloc. Returns true if a diagnostic
    712 /// was emitted.
    713 bool ObjCDeallocChecker::diagnoseMistakenDealloc(SymbolRef DeallocedValue,
    714                                                  const ObjCMethodCall &M,
    715                                                  CheckerContext &C) const {
    716   // TODO: Apart from unknown/undefined receivers, this may happen when
    717   // dealloc is called as a class method. Should we warn?
    718   if (!DeallocedValue)
    719     return false;
    720 
    721   // Find the property backing the instance variable that M
    722   // is dealloc'ing.
    723   const ObjCPropertyImplDecl *PropImpl =
    724       findPropertyOnDeallocatingInstance(DeallocedValue, C);
    725   if (!PropImpl)
    726     return false;
    727 
    728   if (getDeallocReleaseRequirement(PropImpl) !=
    729       ReleaseRequirement::MustRelease) {
    730     return false;
    731   }
    732 
    733   ExplodedNode *ErrNode = C.generateErrorNode();
    734   if (!ErrNode)
    735     return false;
    736 
    737   std::string Buf;
    738   llvm::raw_string_ostream OS(Buf);
    739 
    740   OS << "'" << *PropImpl->getPropertyIvarDecl()
    741      << "' should be released rather than deallocated";
    742 
    743   auto BR = std::make_unique<PathSensitiveBugReport>(*MistakenDeallocBugType,
    744                                                      OS.str(), ErrNode);
    745   BR->addRange(M.getOriginExpr()->getSourceRange());
    746 
    747   C.emitReport(std::move(BR));
    748 
    749   return true;
    750 }
    751 
    752 ObjCDeallocChecker::ObjCDeallocChecker()
    753     : NSObjectII(nullptr), SenTestCaseII(nullptr), XCTestCaseII(nullptr),
    754       CIFilterII(nullptr) {
    755 
    756   MissingReleaseBugType.reset(
    757       new BugType(this, "Missing ivar release (leak)",
    758                   categories::MemoryRefCount));
    759 
    760   ExtraReleaseBugType.reset(
    761       new BugType(this, "Extra ivar release",
    762                   categories::MemoryRefCount));
    763 
    764   MistakenDeallocBugType.reset(
    765       new BugType(this, "Mistaken dealloc",
    766                   categories::MemoryRefCount));
    767 }
    768 
    769 void ObjCDeallocChecker::initIdentifierInfoAndSelectors(
    770     ASTContext &Ctx) const {
    771   if (NSObjectII)
    772     return;
    773 
    774   NSObjectII = &Ctx.Idents.get("NSObject");
    775   SenTestCaseII = &Ctx.Idents.get("SenTestCase");
    776   XCTestCaseII = &Ctx.Idents.get("XCTestCase");
    777   Block_releaseII = &Ctx.Idents.get("_Block_release");
    778   CIFilterII = &Ctx.Idents.get("CIFilter");
    779 
    780   IdentifierInfo *DeallocII = &Ctx.Idents.get("dealloc");
    781   IdentifierInfo *ReleaseII = &Ctx.Idents.get("release");
    782   DeallocSel = Ctx.Selectors.getSelector(0, &DeallocII);
    783   ReleaseSel = Ctx.Selectors.getSelector(0, &ReleaseII);
    784 }
    785 
    786 /// Returns true if M is a call to '[super dealloc]'.
    787 bool ObjCDeallocChecker::isSuperDeallocMessage(
    788     const ObjCMethodCall &M) const {
    789   if (M.getOriginExpr()->getReceiverKind() != ObjCMessageExpr::SuperInstance)
    790     return false;
    791 
    792   return M.getSelector() == DeallocSel;
    793 }
    794 
    795 /// Returns the ObjCImplDecl containing the method declaration in LCtx.
    796 const ObjCImplDecl *
    797 ObjCDeallocChecker::getContainingObjCImpl(const LocationContext *LCtx) const {
    798   auto *MD = cast<ObjCMethodDecl>(LCtx->getDecl());
    799   return cast<ObjCImplDecl>(MD->getDeclContext());
    800 }
    801 
    802 /// Returns the property that shadowed by PropImpl if one exists and
    803 /// nullptr otherwise.
    804 const ObjCPropertyDecl *ObjCDeallocChecker::findShadowedPropertyDecl(
    805     const ObjCPropertyImplDecl *PropImpl) const {
    806   const ObjCPropertyDecl *PropDecl = PropImpl->getPropertyDecl();
    807 
    808   // Only readwrite properties can shadow.
    809   if (PropDecl->isReadOnly())
    810     return nullptr;
    811 
    812   auto *CatDecl = dyn_cast<ObjCCategoryDecl>(PropDecl->getDeclContext());
    813 
    814   // Only class extensions can contain shadowing properties.
    815   if (!CatDecl || !CatDecl->IsClassExtension())
    816     return nullptr;
    817 
    818   IdentifierInfo *ID = PropDecl->getIdentifier();
    819   DeclContext::lookup_result R = CatDecl->getClassInterface()->lookup(ID);
    820   for (DeclContext::lookup_iterator I = R.begin(), E = R.end(); I != E; ++I) {
    821     auto *ShadowedPropDecl = dyn_cast<ObjCPropertyDecl>(*I);
    822     if (!ShadowedPropDecl)
    823       continue;
    824 
    825     if (ShadowedPropDecl->isInstanceProperty()) {
    826       assert(ShadowedPropDecl->isReadOnly());
    827       return ShadowedPropDecl;
    828     }
    829   }
    830 
    831   return nullptr;
    832 }
    833 
    834 /// Add a transition noting the release of the given value.
    835 void ObjCDeallocChecker::transitionToReleaseValue(CheckerContext &C,
    836                                                   SymbolRef Value) const {
    837   assert(Value);
    838   SymbolRef InstanceSym = getInstanceSymbolFromIvarSymbol(Value);
    839   if (!InstanceSym)
    840     return;
    841   ProgramStateRef InitialState = C.getState();
    842 
    843   ProgramStateRef ReleasedState =
    844       removeValueRequiringRelease(InitialState, InstanceSym, Value);
    845 
    846   if (ReleasedState != InitialState) {
    847     C.addTransition(ReleasedState);
    848   }
    849 }
    850 
    851 /// Remove the Value requiring a release from the tracked set for
    852 /// Instance and return the resultant state.
    853 ProgramStateRef ObjCDeallocChecker::removeValueRequiringRelease(
    854     ProgramStateRef State, SymbolRef Instance, SymbolRef Value) const {
    855   assert(Instance);
    856   assert(Value);
    857   const ObjCIvarRegion *RemovedRegion = getIvarRegionForIvarSymbol(Value);
    858   if (!RemovedRegion)
    859     return State;
    860 
    861   const SymbolSet *Unreleased = State->get<UnreleasedIvarMap>(Instance);
    862   if (!Unreleased)
    863     return State;
    864 
    865   // Mark the value as no longer requiring a release.
    866   SymbolSet::Factory &F = State->getStateManager().get_context<SymbolSet>();
    867   SymbolSet NewUnreleased = *Unreleased;
    868   for (auto &Sym : *Unreleased) {
    869     const ObjCIvarRegion *UnreleasedRegion = getIvarRegionForIvarSymbol(Sym);
    870     assert(UnreleasedRegion);
    871     if (RemovedRegion->getDecl() == UnreleasedRegion->getDecl()) {
    872       NewUnreleased = F.remove(NewUnreleased, Sym);
    873     }
    874   }
    875 
    876   if (NewUnreleased.isEmpty()) {
    877     return State->remove<UnreleasedIvarMap>(Instance);
    878   }
    879 
    880   return State->set<UnreleasedIvarMap>(Instance, NewUnreleased);
    881 }
    882 
    883 /// Determines whether the instance variable for \p PropImpl must or must not be
    884 /// released in -dealloc or whether it cannot be determined.
    885 ReleaseRequirement ObjCDeallocChecker::getDeallocReleaseRequirement(
    886     const ObjCPropertyImplDecl *PropImpl) const {
    887   const ObjCIvarDecl *IvarDecl;
    888   const ObjCPropertyDecl *PropDecl;
    889   if (!isSynthesizedRetainableProperty(PropImpl, &IvarDecl, &PropDecl))
    890     return ReleaseRequirement::Unknown;
    891 
    892   ObjCPropertyDecl::SetterKind SK = PropDecl->getSetterKind();
    893 
    894   switch (SK) {
    895   // Retain and copy setters retain/copy their values before storing and so
    896   // the value in their instance variables must be released in -dealloc.
    897   case ObjCPropertyDecl::Retain:
    898   case ObjCPropertyDecl::Copy:
    899     if (isReleasedByCIFilterDealloc(PropImpl))
    900       return ReleaseRequirement::MustNotReleaseDirectly;
    901 
    902     if (isNibLoadedIvarWithoutRetain(PropImpl))
    903       return ReleaseRequirement::Unknown;
    904 
    905     return ReleaseRequirement::MustRelease;
    906 
    907   case ObjCPropertyDecl::Weak:
    908     return ReleaseRequirement::MustNotReleaseDirectly;
    909 
    910   case ObjCPropertyDecl::Assign:
    911     // It is common for the ivars for read-only assign properties to
    912     // always be stored retained, so their release requirement cannot be
    913     // be determined.
    914     if (PropDecl->isReadOnly())
    915       return ReleaseRequirement::Unknown;
    916 
    917     return ReleaseRequirement::MustNotReleaseDirectly;
    918   }
    919   llvm_unreachable("Unrecognized setter kind");
    920 }
    921 
    922 /// Returns the released value if M is a call a setter that releases
    923 /// and nils out its underlying instance variable.
    924 SymbolRef
    925 ObjCDeallocChecker::getValueReleasedByNillingOut(const ObjCMethodCall &M,
    926                                                  CheckerContext &C) const {
    927   SVal ReceiverVal = M.getReceiverSVal();
    928   if (!ReceiverVal.isValid())
    929     return nullptr;
    930 
    931   if (M.getNumArgs() == 0)
    932     return nullptr;
    933 
    934   if (!M.getArgExpr(0)->getType()->isObjCRetainableType())
    935     return nullptr;
    936 
    937   // Is the first argument nil?
    938   SVal Arg = M.getArgSVal(0);
    939   ProgramStateRef notNilState, nilState;
    940   std::tie(notNilState, nilState) =
    941       M.getState()->assume(Arg.castAs<DefinedOrUnknownSVal>());
    942   if (!(nilState && !notNilState))
    943     return nullptr;
    944 
    945   const ObjCPropertyDecl *Prop = M.getAccessedProperty();
    946   if (!Prop)
    947     return nullptr;
    948 
    949   ObjCIvarDecl *PropIvarDecl = Prop->getPropertyIvarDecl();
    950   if (!PropIvarDecl)
    951     return nullptr;
    952 
    953   ProgramStateRef State = C.getState();
    954 
    955   SVal LVal = State->getLValue(PropIvarDecl, ReceiverVal);
    956   Optional<Loc> LValLoc = LVal.getAs<Loc>();
    957   if (!LValLoc)
    958     return nullptr;
    959 
    960   SVal CurrentValInIvar = State->getSVal(LValLoc.getValue());
    961   return CurrentValInIvar.getAsSymbol();
    962 }
    963 
    964 /// Returns true if the current context is a call to -dealloc and false
    965 /// otherwise. If true, it also sets SelfValOut to the value of
    966 /// 'self'.
    967 bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C,
    968                                              SVal &SelfValOut) const {
    969   return isInInstanceDealloc(C, C.getLocationContext(), SelfValOut);
    970 }
    971 
    972 /// Returns true if LCtx is a call to -dealloc and false
    973 /// otherwise. If true, it also sets SelfValOut to the value of
    974 /// 'self'.
    975 bool ObjCDeallocChecker::isInInstanceDealloc(const CheckerContext &C,
    976                                              const LocationContext *LCtx,
    977                                              SVal &SelfValOut) const {
    978   auto *MD = dyn_cast<ObjCMethodDecl>(LCtx->getDecl());
    979   if (!MD || !MD->isInstanceMethod() || MD->getSelector() != DeallocSel)
    980     return false;
    981 
    982   const ImplicitParamDecl *SelfDecl = LCtx->getSelfDecl();
    983   assert(SelfDecl && "No self in -dealloc?");
    984 
    985   ProgramStateRef State = C.getState();
    986   SelfValOut = State->getSVal(State->getRegion(SelfDecl, LCtx));
    987   return true;
    988 }
    989 
    990 /// Returns true if there is a call to -dealloc anywhere on the stack and false
    991 /// otherwise. If true, it also sets InstanceValOut to the value of
    992 /// 'self' in the frame for -dealloc.
    993 bool ObjCDeallocChecker::instanceDeallocIsOnStack(const CheckerContext &C,
    994                                                   SVal &InstanceValOut) const {
    995   const LocationContext *LCtx = C.getLocationContext();
    996 
    997   while (LCtx) {
    998     if (isInInstanceDealloc(C, LCtx, InstanceValOut))
    999       return true;
   1000 
   1001     LCtx = LCtx->getParent();
   1002   }
   1003 
   1004   return false;
   1005 }
   1006 
   1007 /// Returns true if the ID is a class in which which is known to have
   1008 /// a separate teardown lifecycle. In this case, -dealloc warnings
   1009 /// about missing releases should be suppressed.
   1010 bool ObjCDeallocChecker::classHasSeparateTeardown(
   1011     const ObjCInterfaceDecl *ID) const {
   1012   // Suppress if the class is not a subclass of NSObject.
   1013   for ( ; ID ; ID = ID->getSuperClass()) {
   1014     IdentifierInfo *II = ID->getIdentifier();
   1015 
   1016     if (II == NSObjectII)
   1017       return false;
   1018 
   1019     // FIXME: For now, ignore classes that subclass SenTestCase and XCTestCase,
   1020     // as these don't need to implement -dealloc.  They implement tear down in
   1021     // another way, which we should try and catch later.
   1022     //  http://llvm.org/bugs/show_bug.cgi?id=3187
   1023     if (II == XCTestCaseII || II == SenTestCaseII)
   1024       return true;
   1025   }
   1026 
   1027   return true;
   1028 }
   1029 
   1030 /// The -dealloc method in CIFilter highly unusual in that is will release
   1031 /// instance variables belonging to its *subclasses* if the variable name
   1032 /// starts with "input" or backs a property whose name starts with "input".
   1033 /// Subclasses should not release these ivars in their own -dealloc method --
   1034 /// doing so could result in an over release.
   1035 ///
   1036 /// This method returns true if the property will be released by
   1037 /// -[CIFilter dealloc].
   1038 bool ObjCDeallocChecker::isReleasedByCIFilterDealloc(
   1039     const ObjCPropertyImplDecl *PropImpl) const {
   1040   assert(PropImpl->getPropertyIvarDecl());
   1041   StringRef PropName = PropImpl->getPropertyDecl()->getName();
   1042   StringRef IvarName = PropImpl->getPropertyIvarDecl()->getName();
   1043 
   1044   const char *ReleasePrefix = "input";
   1045   if (!(PropName.startswith(ReleasePrefix) ||
   1046         IvarName.startswith(ReleasePrefix))) {
   1047     return false;
   1048   }
   1049 
   1050   const ObjCInterfaceDecl *ID =
   1051       PropImpl->getPropertyIvarDecl()->getContainingInterface();
   1052   for ( ; ID ; ID = ID->getSuperClass()) {
   1053     IdentifierInfo *II = ID->getIdentifier();
   1054     if (II == CIFilterII)
   1055       return true;
   1056   }
   1057 
   1058   return false;
   1059 }
   1060 
   1061 /// Returns whether the ivar backing the property is an IBOutlet that
   1062 /// has its value set by nib loading code without retaining the value.
   1063 ///
   1064 /// On macOS, if there is no setter, the nib-loading code sets the ivar
   1065 /// directly, without retaining the value,
   1066 ///
   1067 /// On iOS and its derivatives, the nib-loading code will call
   1068 /// -setValue:forKey:, which retains the value before directly setting the ivar.
   1069 bool ObjCDeallocChecker::isNibLoadedIvarWithoutRetain(
   1070     const ObjCPropertyImplDecl *PropImpl) const {
   1071   const ObjCIvarDecl *IvarDecl = PropImpl->getPropertyIvarDecl();
   1072   if (!IvarDecl->hasAttr<IBOutletAttr>())
   1073     return false;
   1074 
   1075   const llvm::Triple &Target =
   1076       IvarDecl->getASTContext().getTargetInfo().getTriple();
   1077 
   1078   if (!Target.isMacOSX())
   1079     return false;
   1080 
   1081   if (PropImpl->getPropertyDecl()->getSetterMethodDecl())
   1082     return false;
   1083 
   1084   return true;
   1085 }
   1086 
   1087 void ento::registerObjCDeallocChecker(CheckerManager &Mgr) {
   1088   Mgr.registerChecker<ObjCDeallocChecker>();
   1089 }
   1090 
   1091 bool ento::shouldRegisterObjCDeallocChecker(const CheckerManager &mgr) {
   1092   // These checker only makes sense under MRR.
   1093   const LangOptions &LO = mgr.getLangOpts();
   1094   return LO.getGC() != LangOptions::GCOnly && !LO.ObjCAutoRefCount;
   1095 }
   1096