[cfe-dev] bug with NonNullParamChecker?
Jordan Rose
jordan_rose at apple.com
Tue May 7 18:52:11 PDT 2013
Hi, Mathieu...sorry for the delay. There's no reason why a new checker wouldn't be able to check new kinds of annotations, but the annotations it supports today are the same attributes provided by the Clang compiler. Now, we can always add attributes to the compiler, but that's not something we usually want to do lightly.
Anna, Ted, and I have kicked around the idea of a more generic 'analyzer_annotate' attribute, which could make one-off analyzer language extensions cheaper, but we didn't quite finish designing it. Does this sound like the sort of thing you're asking about? This would require modifying Clang's attribute parser to support this generic attribute and provide convenient access to its possible fields for any checkers.
(Meanwhile, we've hacked some things together using the existing string-only 'annotate' attribute; see IvarInvalidationChecker. You could use this to prototype your checker if you didn't want to work on the general attribute problem just yet.)
In this particular case, something else we've thought of is an attribute that stipulates that a function return value is always non-null, and another requiring that the result is checked. These also haven't been fully designed yet (are they inherited? do they piggyback on existing attributes like 'nonnull', or do they get their own syntax?).
Jordan
On May 6, 2013, at 19:20 , Mathieu Baudet <mathieubaudet at fb.com> wrote:
> Hi list,
>
> Is anyone in the position to offer some insight on the question (below) about possibly using Clang analyzer for more "contract-based" null-pointer analyses?
>
> --
> Mathieu
>
> On May 2, 2013, at 5:43 PM, Mathieu Baudet <mathieubaudet at fb.com> wrote:
>
>> On a slightly different topic, has anyone ever considered using the core of clang-analyzer to bring more fine-grained annotations to life, in the spirit of Findbugs for Java?
>> http://findbugs.sourceforge.net/manual/annotations.html
>>
>> From this page
>> http://clang-analyzer.llvm.org/annotations.html
>> I understand that we can already attach attributes to various syntactic elements (not sure exactly which ones yet, though).
>>
>> Is there any reason to believe that this project would require more than just writing a new checker?
>>
>> -- Mathieu
>>
>> On May 2, 2013, at 1:33 PM, Jordan Rose <jordan_rose at apple.com> wrote:
>>
>>> Hi, Mathieu. You've run into one of the analyzer's haziest features: false positive suppression based on return values. To put it simply, if there's a null pointer dereference, and it turns out the null pointer came from an inlined function, we suppress the warning.
>>>
>>> Why? Well, for better or for worse the analyzer does not have perfect information. Consider an example like this:
>>>
>>> targetMap[targetName]->process(input);
>>>
>>> Seems harmless, right? Well, what does the map's operator[] look like?
>>>
>>> Target *getItem(StringRef name) {
>>> if (map contains a target for name)
>>> return it
>>> return NULL;
>>> }
>>>
>>> Most likely, the analyzer doesn't have perfect knowledge about the contents of the map, so it assumes both branches can be taken—which is totally reasonable! However, the caller could very well have some extra knowledge: the targetName is checked at the beginning of the program, and so the map lookup will never fail at this point.
>>>
>>> Usually, the response to this sort of bug is to add an assertion, but in this case you wouldn't be able to do that without introducing a temporary variable and breaking apart the original expression.
>>>
>>> When we first turned on C++ inlining, this sort of example resulting in hundreds of false posiitves on the LLVM code base. It did find some true positives, such as unchecked calls to dyn_cast, but in general it was just not compatible with the way people write code. A lot of times, generic functions have to handle error cases that the caller knows won't happen, but would find annoying or difficult to actually assert() about. We've found that a lot of these cases correspond to a null value being returned, which is entirely a heuristic.
>>>
>>> The false positive suppression heuristics can definitely be improved, but in general false negatives are better for the analyzer than false positives. The former reduces bugs caught and confidence in the tool, but the latter results in people turning off a checker wholesale or not running the analyzer at all.
>>>
>>> Anyway, thanks for the report, and if you come up with any "counter-suppression" ideas, please send them to the list!
>>>
>>> Jordan
>>>
>>>
>>> On May 1, 2013, at 22:16 , Mathieu Baudet <mathieubaudet at fb.com> wrote:
>>>
>>>> Hi,
>>>>
>>>> As I was testing NonNullParamChecker this afternoon, I ran into this troubling example:
>>>>
>>>> // --------- example 1 ------------
>>>> void *getNull() {
>>>> return 0;
>>>> }
>>>>
>>>> void check(void *p) __attribute__(( nonnull ));
>>>> void check(void *p) {
>>>> }
>>>>
>>>> int main(int argc, char **argv) {
>>>> void *p = getNull();
>>>> check(p);
>>>> return 0;
>>>> }
>>>> // --------------------------------
>>>>
>>>> This code gives no warning on the versions of clang that I could test:
>>>> - Apple LLVM version 4.2 (clang-425.0.28) (based on LLVM 3.2svn)
>>>> - clang version 3.3 (trunk 180768)
>>>> - clang version 3.3 (trunk 180907) (llvm/trunk 180768)
>>>>
>>>> To get an error one I have to replace p = getNull() by p = 0.
>>>>
>>>> First I was tempted to think it was just a limitation of the core analyzer, but
>>>> 1) I obtain an error with a similar example where the nonnull attribute is replaced by a division by zero (see example 2 at the end)
>>>>
>>>> 2) I debugged the file NonNullParamChecker.cpp : I am very new to this codebase but it seems that a report is actually emitted (lines 119-139). Then it never shows up for some reason...
>>>>
>>>> Is this a bug? If not, how can we improve this checker?
>>>>
>>>> Thanks!
>>>> --
>>>> Mathieu
>>>>
>>>>
>>>> // --------- example 2 -----------
>>>> int getX() {
>>>> return 0;
>>>> }
>>>>
>>>> void check(int p) {
>>>> 1 / p;
>>>> }
>>>>
>>>> int main(int argc, char **argv) {
>>>> int x = getX();
>>>> check(x);
>>>> return 0;
>>>> }
>>>>
>>>>
>>>> _______________________________________________
>>>> cfe-dev mailing list
>>>> cfe-dev at cs.uiuc.edu
>>>> http://lists.cs.uiuc.edu/mailman/listinfo/cfe-dev
>>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/cfe-dev/attachments/20130507/6ad3cd0a/attachment.html>
More information about the cfe-dev
mailing list