/Users/buildslave/jenkins/workspace/coverage/llvm-project/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker/RetainCountDiagnostics.h
Line | Count | Source |
1 | | //== RetainCountDiagnostics.h - Checks for leaks and other issues -*- C++ -*--// |
2 | | // |
3 | | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
4 | | // See https://llvm.org/LICENSE.txt for license information. |
5 | | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
6 | | // |
7 | | //===----------------------------------------------------------------------===// |
8 | | // |
9 | | // This file defines diagnostics for RetainCountChecker, which implements |
10 | | // a reference count checker for Core Foundation and Cocoa on (Mac OS X). |
11 | | // |
12 | | //===----------------------------------------------------------------------===// |
13 | | |
14 | | #ifndef LLVM_CLANG_LIB_STATICANALYZER_CHECKERS_RETAINCOUNTCHECKER_DIAGNOSTICS_H |
15 | | #define LLVM_CLANG_LIB_STATICANALYZER_CHECKERS_RETAINCOUNTCHECKER_DIAGNOSTICS_H |
16 | | |
17 | | #include "clang/Analysis/PathDiagnostic.h" |
18 | | #include "clang/Analysis/RetainSummaryManager.h" |
19 | | #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" |
20 | | #include "clang/StaticAnalyzer/Core/BugReporter/BugReporterVisitors.h" |
21 | | #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" |
22 | | |
23 | | namespace clang { |
24 | | namespace ento { |
25 | | namespace retaincountchecker { |
26 | | |
27 | | class RefCountBug : public BugType { |
28 | | public: |
29 | | enum RefCountBugKind { |
30 | | UseAfterRelease, |
31 | | ReleaseNotOwned, |
32 | | DeallocNotOwned, |
33 | | FreeNotOwned, |
34 | | OverAutorelease, |
35 | | ReturnNotOwnedForOwned, |
36 | | LeakWithinFunction, |
37 | | LeakAtReturn, |
38 | | }; |
39 | | RefCountBug(CheckerNameRef Checker, RefCountBugKind BT); |
40 | | StringRef getDescription() const; |
41 | | |
42 | 52.5k | RefCountBugKind getBugType() const { return BT; } |
43 | | |
44 | | private: |
45 | | RefCountBugKind BT; |
46 | | static StringRef bugTypeToName(RefCountBugKind BT); |
47 | | }; |
48 | | |
49 | | class RefCountReport : public PathSensitiveBugReport { |
50 | | protected: |
51 | | SymbolRef Sym; |
52 | | bool isLeak = false; |
53 | | |
54 | | public: |
55 | | RefCountReport(const RefCountBug &D, const LangOptions &LOpts, |
56 | | ExplodedNode *n, SymbolRef sym, |
57 | | bool isLeak=false); |
58 | | |
59 | | RefCountReport(const RefCountBug &D, const LangOptions &LOpts, |
60 | | ExplodedNode *n, SymbolRef sym, |
61 | | StringRef endText); |
62 | | |
63 | 644 | ArrayRef<SourceRange> getRanges() const override { |
64 | 644 | if (!isLeak) |
65 | 305 | return PathSensitiveBugReport::getRanges(); |
66 | 339 | return {}; |
67 | 644 | } |
68 | | }; |
69 | | |
70 | | class RefLeakReport : public RefCountReport { |
71 | | const MemRegion *AllocFirstBinding = nullptr; |
72 | | const MemRegion *AllocBindingToReport = nullptr; |
73 | | const Stmt *AllocStmt = nullptr; |
74 | | PathDiagnosticLocation Location; |
75 | | |
76 | | // Finds the function declaration where a leak warning for the parameter |
77 | | // 'sym' should be raised. |
78 | | void deriveParamLocation(CheckerContext &Ctx); |
79 | | // Finds the location where the leaking object is allocated. |
80 | | void deriveAllocLocation(CheckerContext &Ctx); |
81 | | // Produces description of a leak warning which is printed on the console. |
82 | | void createDescription(CheckerContext &Ctx); |
83 | | // Finds the binding that we should use in a leak warning. |
84 | | void findBindingToReport(CheckerContext &Ctx, ExplodedNode *Node); |
85 | | |
86 | | public: |
87 | | RefLeakReport(const RefCountBug &D, const LangOptions &LOpts, ExplodedNode *n, |
88 | | SymbolRef sym, CheckerContext &Ctx); |
89 | 1.16k | PathDiagnosticLocation getLocation() const override { |
90 | 1.16k | assert(Location.isValid()); |
91 | 1.16k | return Location; |
92 | 1.16k | } |
93 | | |
94 | 389 | PathDiagnosticLocation getEndOfPath() const { |
95 | 389 | return PathSensitiveBugReport::getLocation(); |
96 | 389 | } |
97 | | }; |
98 | | |
99 | | } // end namespace retaincountchecker |
100 | | } // end namespace ento |
101 | | } // end namespace clang |
102 | | |
103 | | #endif |