1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071 |
- #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
- #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
- #include "clang/StaticAnalyzer/Core/Checker.h"
- #include "clang/StaticAnalyzer/Core/CheckerManager.h"
- #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
- using namespace clang;
- using namespace ento;
- namespace {
- class FixedAddressChecker
- : public Checker< check::PreStmt<BinaryOperator> > {
- mutable std::unique_ptr<BuiltinBug> BT;
- public:
- void checkPreStmt(const BinaryOperator *B, CheckerContext &C) const;
- };
- }
- void FixedAddressChecker::checkPreStmt(const BinaryOperator *B,
- CheckerContext &C) const {
-
-
- if (B->getOpcode() != BO_Assign)
- return;
- QualType T = B->getType();
- if (!T->isPointerType())
- return;
- SVal RV = C.getSVal(B->getRHS());
- if (!RV.isConstant() || RV.isZeroConstant())
- return;
- if (ExplodedNode *N = C.generateNonFatalErrorNode()) {
- if (!BT)
- BT.reset(
- new BuiltinBug(this, "Use fixed address",
- "Using a fixed address is not portable because that "
- "address will probably not be valid in all "
- "environments or platforms."));
- auto R =
- std::make_unique<PathSensitiveBugReport>(*BT, BT->getDescription(), N);
- R->addRange(B->getRHS()->getSourceRange());
- C.emitReport(std::move(R));
- }
- }
- void ento::registerFixedAddressChecker(CheckerManager &mgr) {
- mgr.registerChecker<FixedAddressChecker>();
- }
- bool ento::shouldRegisterFixedAddressChecker(const CheckerManager &mgr) {
- return true;
- }
|