]> granicus.if.org Git - clang/commitdiff
Pull UndefinedArgChecker into its own files.
authorZhongxing Xu <xuzhongxing@gmail.com>
Tue, 3 Nov 2009 06:46:03 +0000 (06:46 +0000)
committerZhongxing Xu <xuzhongxing@gmail.com>
Tue, 3 Nov 2009 06:46:03 +0000 (06:46 +0000)
git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@85875 91177308-0d34-0410-b5e6-96231b3b80d8

include/clang/Analysis/PathSensitive/BugType.h
include/clang/Analysis/PathSensitive/Checkers/UndefinedArgChecker.h [new file with mode: 0644]
lib/Analysis/GRExprEngineInternalChecks.cpp
lib/Analysis/UndefinedArgChecker.cpp [new file with mode: 0644]

index 09acb157d023434d09ffbe181fffa4c541db5484..46b3edd3172ecee7f75e9d83c43069547beefc3f 100644 (file)
@@ -81,5 +81,6 @@ public:
 
   template <typename ITER> void Emit(BugReporter& BR, ITER I, ITER E);
 };
+
 } // end clang namespace
 #endif
diff --git a/include/clang/Analysis/PathSensitive/Checkers/UndefinedArgChecker.h b/include/clang/Analysis/PathSensitive/Checkers/UndefinedArgChecker.h
new file mode 100644 (file)
index 0000000..ebb7f37
--- /dev/null
@@ -0,0 +1,30 @@
+//===--- UndefinedArgChecker.h - Undefined arguments checker ----*- C++ -*--==//
+//
+//                     The LLVM Compiler Infrastructure
+//
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+//
+// This defines BadCallChecker, a builtin check in GRExprEngine that performs
+// checks for undefined arguments.
+//
+//===----------------------------------------------------------------------===//
+
+#include "clang/Analysis/PathSensitive/CheckerVisitor.h"
+
+namespace clang {
+
+class UndefinedArgChecker : public CheckerVisitor<UndefinedArgChecker> {
+  BugType *BT;
+
+public:
+  UndefinedArgChecker() : BT(0) {}
+
+  static void *getTag();
+
+  void PreVisitCallExpr(CheckerContext &C, const CallExpr *CE);
+};
+
+}
index 630e617a095a0b3f30f64eb94600b94b53fd19cc..9bf7672e4c589c1c5ae751cd4ae49f4d49f3f300 100644 (file)
@@ -19,6 +19,7 @@
 #include "clang/Analysis/PathSensitive/Checkers/UndefDerefChecker.h"
 #include "clang/Analysis/PathSensitive/Checkers/DivZeroChecker.h"
 #include "clang/Analysis/PathSensitive/Checkers/BadCallChecker.h"
+#include "clang/Analysis/PathSensitive/Checkers/UndefinedArgChecker.h"
 #include "clang/Analysis/PathDiagnostic.h"
 #include "clang/Basic/SourceManager.h"
 #include "llvm/Support/Compiler.h"
@@ -596,42 +597,6 @@ public:
   }
 };
 
-// Undefined arguments checking.
-
-class VISIBILITY_HIDDEN CheckUndefinedArg
-  : public CheckerVisitor<CheckUndefinedArg> {
-
-  BadArg *BT;
-
-public:
-  CheckUndefinedArg() : BT(0) {}
-  ~CheckUndefinedArg() {}
-
-  static void *getTag() {
-    static int x = 0;
-    return &x;
-  }
-
-  void PreVisitCallExpr(CheckerContext &C, const CallExpr *CE);
-};
-
-void CheckUndefinedArg::PreVisitCallExpr(CheckerContext &C, const CallExpr *CE){
-  for (CallExpr::const_arg_iterator I = CE->arg_begin(), E = CE->arg_end();
-       I != E; ++I) {
-    if (C.getState()->getSVal(*I).isUndef()) {
-      if (ExplodedNode *ErrorNode = C.GenerateNode(CE, true)) {
-        if (!BT)
-          BT = new BadArg();
-        // Generate a report for this bug.
-        ArgReport *Report = new ArgReport(*BT, BT->getDescription().c_str(),
-                                          ErrorNode, *I);
-        Report->addRange((*I)->getSourceRange());
-        C.EmitReport(Report);
-      }
-    }
-  }
-}
-
 } // end clang namespace
 
 //===----------------------------------------------------------------------===//
@@ -661,7 +626,7 @@ void GRExprEngine::RegisterInternalChecks() {
   // automatically.  Note that the check itself is owned by the GRExprEngine
   // object.
   registerCheck<CheckAttrNonNull>(new CheckAttrNonNull());
-  registerCheck<CheckUndefinedArg>(new CheckUndefinedArg());
+  registerCheck<UndefinedArgChecker>(new UndefinedArgChecker());
   registerCheck<BadCallChecker>(new BadCallChecker());
   registerCheck<DivZeroChecker>(new DivZeroChecker());
   registerCheck<UndefDerefChecker>(new UndefDerefChecker());
diff --git a/lib/Analysis/UndefinedArgChecker.cpp b/lib/Analysis/UndefinedArgChecker.cpp
new file mode 100644 (file)
index 0000000..a229f55
--- /dev/null
@@ -0,0 +1,43 @@
+//===--- UndefinedArgChecker.h - Undefined arguments checker ----*- C++ -*--==//
+//
+//                     The LLVM Compiler Infrastructure
+//
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+//
+// This defines BadCallChecker, a builtin check in GRExprEngine that performs
+// checks for undefined arguments.
+//
+//===----------------------------------------------------------------------===//
+
+#include "clang/Analysis/PathSensitive/Checkers/UndefinedArgChecker.h"
+#include "clang/Analysis/PathSensitive/BugReporter.h"
+
+using namespace clang;
+
+void *UndefinedArgChecker::getTag() {
+  static int x = 0;
+  return &x;
+}
+
+void UndefinedArgChecker::PreVisitCallExpr(CheckerContext &C, 
+                                           const CallExpr *CE){
+  for (CallExpr::const_arg_iterator I = CE->arg_begin(), E = CE->arg_end();
+       I != E; ++I) {
+    if (C.getState()->getSVal(*I).isUndef()) {
+      if (ExplodedNode *N = C.GenerateNode(CE, true)) {
+        if (!BT)
+          BT = new BugType("Pass-by-value argument in function call is "
+                           "undefined", "Logic error");
+        // Generate a report for this bug.
+        EnhancedBugReport *R = new EnhancedBugReport(*BT, BT->getName().c_str(),
+                                                     N);
+        R->addRange((*I)->getSourceRange());
+        R->addVisitorCreator(bugreporter::registerTrackNullOrUndefValue, *I);
+        C.EmitReport(R);
+      }
+    }
+  }
+}