003 File Manager
Current Path:
/usr/src/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers
usr
/
src
/
contrib
/
llvm-project
/
clang
/
lib
/
StaticAnalyzer
/
Checkers
/
📁
..
📄
AllocationState.h
(1.41 KB)
📄
AnalysisOrderChecker.cpp
(8.62 KB)
📄
AnalyzerStatsChecker.cpp
(5.04 KB)
📄
ArrayBoundChecker.cpp
(3.22 KB)
📄
ArrayBoundCheckerV2.cpp
(13.07 KB)
📄
BasicObjCFoundationChecks.cpp
(43.82 KB)
📄
BlockInCriticalSectionChecker.cpp
(6.69 KB)
📄
BoolAssignmentChecker.cpp
(3.45 KB)
📄
BuiltinFunctionChecker.cpp
(5 KB)
📄
CStringChecker.cpp
(93.24 KB)
📄
CStringSyntaxChecker.cpp
(9.8 KB)
📄
CXXSelfAssignmentChecker.cpp
(3.08 KB)
📄
CallAndMessageChecker.cpp
(26.57 KB)
📄
CastSizeChecker.cpp
(4.96 KB)
📄
CastToStructChecker.cpp
(4.43 KB)
📄
CastValueChecker.cpp
(19.65 KB)
📄
CheckObjCDealloc.cpp
(37.83 KB)
📄
CheckObjCInstMethSignature.cpp
(4.8 KB)
📄
CheckPlacementNew.cpp
(11.91 KB)
📄
CheckSecuritySyntaxOnly.cpp
(38.79 KB)
📄
CheckSizeofPointer.cpp
(3.16 KB)
📄
CheckerDocumentation.cpp
(14.64 KB)
📄
ChrootChecker.cpp
(4.88 KB)
📄
CloneChecker.cpp
(8.28 KB)
📄
ContainerModeling.cpp
(39.85 KB)
📄
ConversionChecker.cpp
(7.11 KB)
📄
DeadStoresChecker.cpp
(17.82 KB)
📄
DebugCheckers.cpp
(10.41 KB)
📄
DebugContainerModeling.cpp
(4.94 KB)
📄
DebugIteratorModeling.cpp
(5.15 KB)
📄
DeleteWithNonVirtualDtorChecker.cpp
(5.35 KB)
📄
DereferenceChecker.cpp
(10.54 KB)
📄
DirectIvarAssignment.cpp
(8.02 KB)
📄
DivZeroChecker.cpp
(3.42 KB)
📄
DynamicTypeChecker.cpp
(7.31 KB)
📄
DynamicTypePropagation.cpp
(42.11 KB)
📄
EnumCastOutOfRangeChecker.cpp
(5.75 KB)
📄
ExprInspectionChecker.cpp
(15.6 KB)
📄
FixedAddressChecker.cpp
(2.33 KB)
📄
FuchsiaHandleChecker.cpp
(23.1 KB)
📄
GCDAntipatternChecker.cpp
(7.85 KB)
📄
GTestChecker.cpp
(10.52 KB)
📄
GenericTaintChecker.cpp
(34.31 KB)
📄
IdenticalExprChecker.cpp
(18.88 KB)
📄
InnerPointerChecker.cpp
(11.54 KB)
📄
InterCheckerAPI.h
(1.09 KB)
📄
InvalidatedIteratorChecker.cpp
(4.93 KB)
📄
Iterator.cpp
(10.62 KB)
📄
Iterator.h
(6.32 KB)
📄
IteratorModeling.cpp
(31.33 KB)
📄
IteratorRangeChecker.cpp
(12.64 KB)
📄
IvarInvalidationChecker.cpp
(27.63 KB)
📄
LLVMConventionsChecker.cpp
(9.9 KB)
📄
LocalizationChecker.cpp
(52.38 KB)
📄
MIGChecker.cpp
(11.3 KB)
📁
MPI-Checker
📄
MacOSKeychainAPIChecker.cpp
(25.21 KB)
📄
MacOSXAPIChecker.cpp
(6.61 KB)
📄
MallocChecker.cpp
(127.38 KB)
📄
MallocOverflowSecurityChecker.cpp
(11.91 KB)
📄
MallocSizeofChecker.cpp
(8.03 KB)
📄
MismatchedIteratorChecker.cpp
(11.01 KB)
📄
MmapWriteExecChecker.cpp
(3.22 KB)
📄
Move.h
(1.07 KB)
📄
MoveChecker.cpp
(27 KB)
📄
NSAutoreleasePoolChecker.cpp
(2.93 KB)
📄
NSErrorChecker.cpp
(10.6 KB)
📄
NoReturnFunctionChecker.cpp
(5.48 KB)
📄
NonNullParamChecker.cpp
(11.22 KB)
📄
NonnullGlobalConstantsChecker.cpp
(5.09 KB)
📄
NullabilityChecker.cpp
(46.95 KB)
📄
NumberObjectConversionChecker.cpp
(13.69 KB)
📄
OSObjectCStyleCast.cpp
(3.14 KB)
📄
ObjCAtSyncChecker.cpp
(3.34 KB)
📄
ObjCAutoreleaseWriteChecker.cpp
(8.62 KB)
📄
ObjCContainersASTChecker.cpp
(5.5 KB)
📄
ObjCContainersChecker.cpp
(6.71 KB)
📄
ObjCMissingSuperCallChecker.cpp
(9.23 KB)
📄
ObjCPropertyChecker.cpp
(3.03 KB)
📄
ObjCSelfInitChecker.cpp
(16.21 KB)
📄
ObjCSuperDeallocChecker.cpp
(9.33 KB)
📄
ObjCUnusedIVarsChecker.cpp
(6.01 KB)
📄
PaddingChecker.cpp
(14.26 KB)
📄
PointerArithChecker.cpp
(12.18 KB)
📄
PointerIterationChecker.cpp
(3.79 KB)
📄
PointerSortingChecker.cpp
(4.5 KB)
📄
PointerSubChecker.cpp
(2.56 KB)
📄
PthreadLockChecker.cpp
(28.42 KB)
📁
RetainCountChecker
📄
ReturnPointerRangeChecker.cpp
(3.39 KB)
📄
ReturnUndefChecker.cpp
(4.1 KB)
📄
ReturnValueChecker.cpp
(5.79 KB)
📄
RunLoopAutoreleaseLeakChecker.cpp
(7.2 KB)
📄
STLAlgorithmModeling.cpp
(7 KB)
📄
SimpleStreamChecker.cpp
(9.43 KB)
📄
SmartPtr.h
(1.17 KB)
📄
SmartPtrChecker.cpp
(2.68 KB)
📄
SmartPtrModeling.cpp
(8.05 KB)
📄
StackAddrEscapeChecker.cpp
(15 KB)
📄
StdLibraryFunctionsChecker.cpp
(74.86 KB)
📄
StreamChecker.cpp
(37.36 KB)
📄
Taint.cpp
(9.04 KB)
📄
Taint.h
(4.19 KB)
📄
TaintTesterChecker.cpp
(2.17 KB)
📄
TestAfterDivZeroChecker.cpp
(8.19 KB)
📄
TraversalChecker.cpp
(4.38 KB)
📄
TrustNonnullChecker.cpp
(9.12 KB)
📄
UndefBranchChecker.cpp
(3.82 KB)
📄
UndefCapturedBlockVarChecker.cpp
(3.64 KB)
📄
UndefResultChecker.cpp
(7.19 KB)
📄
UndefinedArraySubscriptChecker.cpp
(2.36 KB)
📄
UndefinedAssignmentChecker.cpp
(3.74 KB)
📁
UninitializedObject
📄
UnixAPIChecker.cpp
(18.05 KB)
📄
UnreachableCodeChecker.cpp
(9.59 KB)
📄
VLASizeChecker.cpp
(10.95 KB)
📄
ValistChecker.cpp
(15.65 KB)
📄
VforkChecker.cpp
(7.67 KB)
📄
VirtualCallChecker.cpp
(8.11 KB)
📁
WebKit
📄
Yaml.h
(2.06 KB)
📁
cert
Editing: MismatchedIteratorChecker.cpp
//===-- MismatchedIteratorChecker.cpp -----------------------------*- C++ -*--// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // Defines a checker for mistakenly applying a foreign iterator on a container // and for using iterators of two different containers in a context where // iterators of the same container should be used. // //===----------------------------------------------------------------------===// #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h" #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h" #include "clang/StaticAnalyzer/Core/Checker.h" #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h" #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" #include "Iterator.h" using namespace clang; using namespace ento; using namespace iterator; namespace { class MismatchedIteratorChecker : public Checker<check::PreCall, check::PreStmt<BinaryOperator>> { std::unique_ptr<BugType> MismatchedBugType; void verifyMatch(CheckerContext &C, const SVal &Iter, const MemRegion *Cont) const; void verifyMatch(CheckerContext &C, const SVal &Iter1, const SVal &Iter2) const; void reportBug(const StringRef &Message, const SVal &Val1, const SVal &Val2, CheckerContext &C, ExplodedNode *ErrNode) const; void reportBug(const StringRef &Message, const SVal &Val, const MemRegion *Reg, CheckerContext &C, ExplodedNode *ErrNode) const; public: MismatchedIteratorChecker(); void checkPreCall(const CallEvent &Call, CheckerContext &C) const; void checkPreStmt(const BinaryOperator *BO, CheckerContext &C) const; }; } // namespace MismatchedIteratorChecker::MismatchedIteratorChecker() { MismatchedBugType.reset( new BugType(this, "Iterator(s) mismatched", "Misuse of STL APIs", /*SuppressOnSink=*/true)); } void MismatchedIteratorChecker::checkPreCall(const CallEvent &Call, CheckerContext &C) const { // Check for iterator mismatches const auto *Func = dyn_cast_or_null<FunctionDecl>(Call.getDecl()); if (!Func) return; if (Func->isOverloadedOperator() && isComparisonOperator(Func->getOverloadedOperator())) { // Check for comparisons of iterators of different containers if (const auto *InstCall = dyn_cast<CXXInstanceCall>(&Call)) { if (Call.getNumArgs() < 1) return; if (!isIteratorType(InstCall->getCXXThisExpr()->getType()) || !isIteratorType(Call.getArgExpr(0)->getType())) return; verifyMatch(C, InstCall->getCXXThisVal(), Call.getArgSVal(0)); } else { if (Call.getNumArgs() < 2) return; if (!isIteratorType(Call.getArgExpr(0)->getType()) || !isIteratorType(Call.getArgExpr(1)->getType())) return; verifyMatch(C, Call.getArgSVal(0), Call.getArgSVal(1)); } } else if (const auto *InstCall = dyn_cast<CXXInstanceCall>(&Call)) { const auto *ContReg = InstCall->getCXXThisVal().getAsRegion(); if (!ContReg) return; // Check for erase, insert and emplace using iterator of another container if (isEraseCall(Func) || isEraseAfterCall(Func)) { verifyMatch(C, Call.getArgSVal(0), InstCall->getCXXThisVal().getAsRegion()); if (Call.getNumArgs() == 2) { verifyMatch(C, Call.getArgSVal(1), InstCall->getCXXThisVal().getAsRegion()); } } else if (isInsertCall(Func)) { verifyMatch(C, Call.getArgSVal(0), InstCall->getCXXThisVal().getAsRegion()); if (Call.getNumArgs() == 3 && isIteratorType(Call.getArgExpr(1)->getType()) && isIteratorType(Call.getArgExpr(2)->getType())) { verifyMatch(C, Call.getArgSVal(1), Call.getArgSVal(2)); } } else if (isEmplaceCall(Func)) { verifyMatch(C, Call.getArgSVal(0), InstCall->getCXXThisVal().getAsRegion()); } } else if (isa<CXXConstructorCall>(&Call)) { // Check match of first-last iterator pair in a constructor of a container if (Call.getNumArgs() < 2) return; const auto *Ctr = cast<CXXConstructorDecl>(Call.getDecl()); if (Ctr->getNumParams() < 2) return; if (Ctr->getParamDecl(0)->getName() != "first" || Ctr->getParamDecl(1)->getName() != "last") return; if (!isIteratorType(Call.getArgExpr(0)->getType()) || !isIteratorType(Call.getArgExpr(1)->getType())) return; verifyMatch(C, Call.getArgSVal(0), Call.getArgSVal(1)); } else { // The main purpose of iterators is to abstract away from different // containers and provide a (maybe limited) uniform access to them. // This implies that any correctly written template function that // works on multiple containers using iterators takes different // template parameters for different containers. So we can safely // assume that passing iterators of different containers as arguments // whose type replaces the same template parameter is a bug. // // Example: // template<typename I1, typename I2> // void f(I1 first1, I1 last1, I2 first2, I2 last2); // // In this case the first two arguments to f() must be iterators must belong // to the same container and the last to also to the same container but // not necessarily to the same as the first two. const auto *Templ = Func->getPrimaryTemplate(); if (!Templ) return; const auto *TParams = Templ->getTemplateParameters(); const auto *TArgs = Func->getTemplateSpecializationArgs(); // Iterate over all the template parameters for (size_t I = 0; I < TParams->size(); ++I) { const auto *TPDecl = dyn_cast<TemplateTypeParmDecl>(TParams->getParam(I)); if (!TPDecl) continue; if (TPDecl->isParameterPack()) continue; const auto TAType = TArgs->get(I).getAsType(); if (!isIteratorType(TAType)) continue; SVal LHS = UndefinedVal(); // For every template parameter which is an iterator type in the // instantiation look for all functions' parameters' type by it and // check whether they belong to the same container for (auto J = 0U; J < Func->getNumParams(); ++J) { const auto *Param = Func->getParamDecl(J); const auto *ParamType = Param->getType()->getAs<SubstTemplateTypeParmType>(); if (!ParamType || ParamType->getReplacedParameter()->getDecl() != TPDecl) continue; if (LHS.isUndef()) { LHS = Call.getArgSVal(J); } else { verifyMatch(C, LHS, Call.getArgSVal(J)); } } } } } void MismatchedIteratorChecker::checkPreStmt(const BinaryOperator *BO, CheckerContext &C) const { if (!BO->isComparisonOp()) return; ProgramStateRef State = C.getState(); SVal LVal = State->getSVal(BO->getLHS(), C.getLocationContext()); SVal RVal = State->getSVal(BO->getRHS(), C.getLocationContext()); verifyMatch(C, LVal, RVal); } void MismatchedIteratorChecker::verifyMatch(CheckerContext &C, const SVal &Iter, const MemRegion *Cont) const { // Verify match between a container and the container of an iterator Cont = Cont->getMostDerivedObjectRegion(); if (const auto *ContSym = Cont->getSymbolicBase()) { if (isa<SymbolConjured>(ContSym->getSymbol())) return; } auto State = C.getState(); const auto *Pos = getIteratorPosition(State, Iter); if (!Pos) return; const auto *IterCont = Pos->getContainer(); // Skip symbolic regions based on conjured symbols. Two conjured symbols // may or may not be the same. For example, the same function can return // the same or a different container but we get different conjured symbols // for each call. This may cause false positives so omit them from the check. if (const auto *ContSym = IterCont->getSymbolicBase()) { if (isa<SymbolConjured>(ContSym->getSymbol())) return; } if (IterCont != Cont) { auto *N = C.generateNonFatalErrorNode(State); if (!N) { return; } reportBug("Container accessed using foreign iterator argument.", Iter, Cont, C, N); } } void MismatchedIteratorChecker::verifyMatch(CheckerContext &C, const SVal &Iter1, const SVal &Iter2) const { // Verify match between the containers of two iterators auto State = C.getState(); const auto *Pos1 = getIteratorPosition(State, Iter1); if (!Pos1) return; const auto *IterCont1 = Pos1->getContainer(); // Skip symbolic regions based on conjured symbols. Two conjured symbols // may or may not be the same. For example, the same function can return // the same or a different container but we get different conjured symbols // for each call. This may cause false positives so omit them from the check. if (const auto *ContSym = IterCont1->getSymbolicBase()) { if (isa<SymbolConjured>(ContSym->getSymbol())) return; } const auto *Pos2 = getIteratorPosition(State, Iter2); if (!Pos2) return; const auto *IterCont2 = Pos2->getContainer(); if (const auto *ContSym = IterCont2->getSymbolicBase()) { if (isa<SymbolConjured>(ContSym->getSymbol())) return; } if (IterCont1 != IterCont2) { auto *N = C.generateNonFatalErrorNode(State); if (!N) return; reportBug("Iterators of different containers used where the " "same container is expected.", Iter1, Iter2, C, N); } } void MismatchedIteratorChecker::reportBug(const StringRef &Message, const SVal &Val1, const SVal &Val2, CheckerContext &C, ExplodedNode *ErrNode) const { auto R = std::make_unique<PathSensitiveBugReport>(*MismatchedBugType, Message, ErrNode); R->markInteresting(Val1); R->markInteresting(Val2); C.emitReport(std::move(R)); } void MismatchedIteratorChecker::reportBug(const StringRef &Message, const SVal &Val, const MemRegion *Reg, CheckerContext &C, ExplodedNode *ErrNode) const { auto R = std::make_unique<PathSensitiveBugReport>(*MismatchedBugType, Message, ErrNode); R->markInteresting(Val); R->markInteresting(Reg); C.emitReport(std::move(R)); } void ento::registerMismatchedIteratorChecker(CheckerManager &mgr) { mgr.registerChecker<MismatchedIteratorChecker>(); } bool ento::shouldRegisterMismatchedIteratorChecker(const CheckerManager &mgr) { return true; }
Upload File
Create Folder