Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 1 | //=== BuiltinFunctionChecker.cpp --------------------------------*- C++ -*-===// |
| 2 | // |
| 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
| 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
| 7 | // |
| 8 | //===----------------------------------------------------------------------===// |
| 9 | // |
| 10 | // This checker evaluates clang builtin functions. |
| 11 | // |
| 12 | //===----------------------------------------------------------------------===// |
| 13 | |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 14 | #include "ClangSACheckers.h" |
Chandler Carruth | 3a02247 | 2012-12-04 09:13:33 +0000 | [diff] [blame] | 15 | #include "clang/Basic/Builtins.h" |
Argyrios Kyrtzidis | 6a5674f | 2011-03-01 01:16:21 +0000 | [diff] [blame] | 16 | #include "clang/StaticAnalyzer/Core/Checker.h" |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 17 | #include "clang/StaticAnalyzer/Core/CheckerManager.h" |
| 18 | #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 19 | |
| 20 | using namespace clang; |
Ted Kremenek | 98857c9 | 2010-12-23 07:20:52 +0000 | [diff] [blame] | 21 | using namespace ento; |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 22 | |
| 23 | namespace { |
| 24 | |
Argyrios Kyrtzidis | 6a5674f | 2011-03-01 01:16:21 +0000 | [diff] [blame] | 25 | class BuiltinFunctionChecker : public Checker<eval::Call> { |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 26 | public: |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 27 | bool evalCall(const CallExpr *CE, CheckerContext &C) const; |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 28 | }; |
| 29 | |
| 30 | } |
| 31 | |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 32 | bool BuiltinFunctionChecker::evalCall(const CallExpr *CE, |
Anna Zaks | c6aa531 | 2011-12-01 05:57:37 +0000 | [diff] [blame] | 33 | CheckerContext &C) const { |
Ted Kremenek | 49b1e38 | 2012-01-26 21:29:00 +0000 | [diff] [blame] | 34 | ProgramStateRef state = C.getState(); |
Anna Zaks | c6aa531 | 2011-12-01 05:57:37 +0000 | [diff] [blame] | 35 | const FunctionDecl *FD = C.getCalleeDecl(CE); |
Ted Kremenek | 632e3b7 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 36 | const LocationContext *LCtx = C.getLocationContext(); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 37 | if (!FD) |
| 38 | return false; |
| 39 | |
| 40 | unsigned id = FD->getBuiltinID(); |
| 41 | |
| 42 | if (!id) |
| 43 | return false; |
| 44 | |
| 45 | switch (id) { |
Jordan Rose | 78cd51b | 2013-07-12 00:26:14 +0000 | [diff] [blame^] | 46 | case Builtin::BI__builtin_expect: |
| 47 | case Builtin::BI__builtin_addressof: { |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 48 | // For __builtin_expect, just return the value of the subexpression. |
Jordan Rose | 78cd51b | 2013-07-12 00:26:14 +0000 | [diff] [blame^] | 49 | // __builtin_addressof is going from a reference to a pointer, but those |
| 50 | // are represented the same way in the analyzer. |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 51 | assert (CE->arg_begin() != CE->arg_end()); |
Ted Kremenek | 632e3b7 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 52 | SVal X = state->getSVal(*(CE->arg_begin()), LCtx); |
| 53 | C.addTransition(state->BindExpr(CE, LCtx, X)); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 54 | return true; |
| 55 | } |
| 56 | |
| 57 | case Builtin::BI__builtin_alloca: { |
| 58 | // FIXME: Refactor into StoreManager itself? |
| 59 | MemRegionManager& RM = C.getStoreManager().getRegionManager(); |
Jordy Rose | 674bd55 | 2010-07-04 00:00:41 +0000 | [diff] [blame] | 60 | const AllocaRegion* R = |
Ted Kremenek | d94854a | 2012-08-22 06:26:15 +0000 | [diff] [blame] | 61 | RM.getAllocaRegion(CE, C.blockCount(), C.getLocationContext()); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 62 | |
| 63 | // Set the extent of the region in bytes. This enables us to use the |
| 64 | // SVal of the argument directly. If we save the extent in bits, we |
| 65 | // cannot represent values like symbol*8. |
Jordy Rose | 674bd55 | 2010-07-04 00:00:41 +0000 | [diff] [blame] | 66 | DefinedOrUnknownSVal Size = |
David Blaikie | 2fdacbc | 2013-02-20 05:52:05 +0000 | [diff] [blame] | 67 | state->getSVal(*(CE->arg_begin()), LCtx).castAs<DefinedOrUnknownSVal>(); |
Jordy Rose | 674bd55 | 2010-07-04 00:00:41 +0000 | [diff] [blame] | 68 | |
Ted Kremenek | 90af909 | 2010-12-02 07:49:45 +0000 | [diff] [blame] | 69 | SValBuilder& svalBuilder = C.getSValBuilder(); |
| 70 | DefinedOrUnknownSVal Extent = R->getExtent(svalBuilder); |
| 71 | DefinedOrUnknownSVal extentMatchesSizeArg = |
Ted Kremenek | dc89142 | 2010-12-01 21:57:22 +0000 | [diff] [blame] | 72 | svalBuilder.evalEQ(state, Extent, Size); |
Ted Kremenek | 90af909 | 2010-12-02 07:49:45 +0000 | [diff] [blame] | 73 | state = state->assume(extentMatchesSizeArg, true); |
Anna Zaks | e3beeaa | 2012-11-26 19:11:46 +0000 | [diff] [blame] | 74 | assert(state && "The region should not have any previous constraints"); |
Jordy Rose | 674bd55 | 2010-07-04 00:00:41 +0000 | [diff] [blame] | 75 | |
Ted Kremenek | 632e3b7 | 2012-01-06 22:09:28 +0000 | [diff] [blame] | 76 | C.addTransition(state->BindExpr(CE, LCtx, loc::MemRegionVal(R))); |
Zhongxing Xu | fe2f901 | 2009-12-08 09:07:59 +0000 | [diff] [blame] | 77 | return true; |
| 78 | } |
| 79 | } |
| 80 | |
| 81 | return false; |
| 82 | } |
Argyrios Kyrtzidis | f3ed8b6 | 2011-02-28 01:27:07 +0000 | [diff] [blame] | 83 | |
| 84 | void ento::registerBuiltinFunctionChecker(CheckerManager &mgr) { |
| 85 | mgr.registerChecker<BuiltinFunctionChecker>(); |
| 86 | } |