blob: 5f5badb3d2df10e49937a389c0b0bcc6b12be0bb [file] [log] [blame]
Zhongxing Xuede7eb22009-11-09 13:23:31 +00001//=== PointerArithChecker.cpp - Pointer arithmetic checker -----*- C++ -*--===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This files defines PointerArithChecker, a builtin checker that checks for
11// pointer arithmetic on locations other than array elements.
12//
13//===----------------------------------------------------------------------===//
14
15#include "clang/Analysis/PathSensitive/CheckerVisitor.h"
16#include "GRExprEngineInternalChecks.h"
17
18using namespace clang;
19
20namespace {
21class VISIBILITY_HIDDEN PointerArithChecker
22 : public CheckerVisitor<PointerArithChecker> {
23 BuiltinBug *BT;
24public:
25 PointerArithChecker() : BT(0) {}
26 static void *getTag();
27 void PreVisitBinaryOperator(CheckerContext &C, const BinaryOperator *B);
28};
29}
30
31void *PointerArithChecker::getTag() {
32 static int x;
33 return &x;
34}
35
36void PointerArithChecker::PreVisitBinaryOperator(CheckerContext &C,
37 const BinaryOperator *B) {
38 if (B->getOpcode() != BinaryOperator::Sub &&
39 B->getOpcode() != BinaryOperator::Add)
40 return;
41
42 const GRState *state = C.getState();
43 SVal LV = state->getSVal(B->getLHS());
44 SVal RV = state->getSVal(B->getRHS());
45
46 const MemRegion *LR = LV.getAsRegion();
47
48 if (!LR || !RV.isConstant())
49 return;
50
51 // If pointer arithmetic is done on variables of non-array type, this often
52 // means behavior rely on memory organization, which is dangerous.
53 if (isa<VarRegion>(LR) || isa<CodeTextRegion>(LR) ||
54 isa<CompoundLiteralRegion>(LR)) {
55
56 if (ExplodedNode *N = C.GenerateNode(B)) {
57 if (!BT)
58 BT = new BuiltinBug("Dangerous pointer arithmetic",
59 "Pointer arithmetic done on non-array variables "
60 "means reliance on memory layout, which is "
61 "dangerous.");
62 RangedBugReport *R = new RangedBugReport(*BT,BT->getDescription().c_str(),
63 N);
64 R->addRange(B->getSourceRange());
65 C.EmitReport(R);
66 }
67 }
68}
69
70void clang::RegisterPointerArithChecker(GRExprEngine &Eng) {
71 Eng.registerCheck(new PointerArithChecker());
72}