clang 22.0.0git
UnsafeBufferUsage.h
Go to the documentation of this file.
1//===- UnsafeBufferUsage.h - Replace pointers with modern C++ ---*- C++ -*-===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8//
9// This file defines an analysis that aids replacing buffer accesses through
10// raw pointers with safer C++ abstractions such as containers and views/spans.
11//
12//===----------------------------------------------------------------------===//
13
14#ifndef LLVM_CLANG_ANALYSIS_ANALYSES_UNSAFEBUFFERUSAGE_H
15#define LLVM_CLANG_ANALYSIS_ANALYSES_UNSAFEBUFFERUSAGE_H
16
17#include "clang/AST/Decl.h"
18#include "clang/AST/Expr.h"
19#include "clang/AST/Stmt.h"
21#include "llvm/Support/Debug.h"
22#include <set>
23
24namespace clang {
25
26using VarGrpTy = std::vector<const VarDecl *>;
28
30public:
32 virtual ~VariableGroupsManager() = default;
33 /// Returns the set of variables (including `Var`) that need to be fixed
34 /// together in one step.
35 ///
36 /// `Var` must be a variable that needs fix (so it must be in a group).
37 /// `HasParm` is an optional argument that will be set to true if the set of
38 /// variables, where `Var` is in, contains parameters.
39 virtual VarGrpRef getGroupOfVar(const VarDecl *Var,
40 bool *HasParm = nullptr) const =0;
41
42 /// Returns the non-empty group of variables that include parameters of the
43 /// analyzing function, if such a group exists. An empty group, otherwise.
44 virtual VarGrpRef getGroupOfParms() const =0;
45};
46
47// FixitStrategy is a map from variables to the way we plan to emit fixes for
48// these variables. It is figured out gradually by trying different fixes
49// for different variables depending on gadgets in which these variables
50// participate.
52public:
53 enum class Kind {
54 Wontfix, // We don't plan to emit a fixit for this variable.
55 Span, // We recommend replacing the variable with std::span.
56 Iterator, // We recommend replacing the variable with std::span::iterator.
57 Array, // We recommend replacing the variable with std::array.
58 Vector // We recommend replacing the variable with std::vector.
59 };
60
61private:
62 using MapTy = llvm::DenseMap<const VarDecl *, Kind>;
63
64 MapTy Map;
65
66public:
67 FixitStrategy() = default;
68 FixitStrategy(const FixitStrategy &) = delete; // Let's avoid copies.
72
73 void set(const VarDecl *VD, Kind K) { Map[VD] = K; }
74
75 Kind lookup(const VarDecl *VD) const {
76 auto I = Map.find(VD);
77 if (I == Map.end())
78 return Kind::Wontfix;
79
80 return I->second;
81 }
82};
83
84/// The interface that lets the caller handle unsafe buffer usage analysis
85/// results by overriding this class's handle... methods.
87#ifndef NDEBUG
88public:
89 // A self-debugging facility that you can use to notify the user when
90 // suggestions or fixits are incomplete.
91 // Uses std::function to avoid computing the message when it won't
92 // actually be displayed.
93 using DebugNote = std::pair<SourceLocation, std::string>;
94 using DebugNoteList = std::vector<DebugNote>;
95 using DebugNoteByVar = std::map<const VarDecl *, DebugNoteList>;
97#endif
98
99public:
101 virtual ~UnsafeBufferUsageHandler() = default;
102
103 /// This analyses produces large fixits that are organized into lists
104 /// of primitive fixits (individual insertions/removals/replacements).
106
107 /// Invoked when an unsafe operation over raw pointers is found.
108 virtual void handleUnsafeOperation(const Stmt *Operation,
109 bool IsRelatedToDecl, ASTContext &Ctx) = 0;
110
111 /// Invoked when a call to an unsafe libc function is found.
112 /// \param PrintfInfo
113 /// is 0 if the callee function is not a member of the printf family;
114 /// is 1 if the callee is `sprintf`;
115 /// is 2 if arguments of the call have `__size_by` relation but are not in a
116 /// safe pattern;
117 /// is 3 if string arguments do not guarantee null-termination
118 /// is 4 if the callee takes va_list
119 /// \param UnsafeArg one of the actual arguments that is unsafe, non-null
120 /// only when `2 <= PrintfInfo <= 3`
121 virtual void handleUnsafeLibcCall(const CallExpr *Call, unsigned PrintfInfo,
122 ASTContext &Ctx,
123 const Expr *UnsafeArg = nullptr) = 0;
124
125 /// Invoked when an unsafe operation with a std container is found.
126 virtual void handleUnsafeOperationInContainer(const Stmt *Operation,
127 bool IsRelatedToDecl,
128 ASTContext &Ctx) = 0;
129
130 /// Invoked when a fix is suggested against a variable. This function groups
131 /// all variables that must be fixed together (i.e their types must be changed
132 /// to the same target type to prevent type mismatches) into a single fixit.
133 ///
134 /// `D` is the declaration of the callable under analysis that owns `Variable`
135 /// and all of its group mates.
136 virtual void
138 const VariableGroupsManager &VarGrpMgr,
139 FixItList &&Fixes, const Decl *D,
140 const FixitStrategy &VarTargetTypes) = 0;
141
142#ifndef NDEBUG
143public:
145 DEBUG_WITH_TYPE("SafeBuffers", return true);
146 return false;
147 }
148
150 std::string Text) {
152 DebugNotesByVar[VD].push_back(std::make_pair(Loc, Text));
153 }
154
157 DebugNotesByVar.clear();
158 }
159#endif
160
161public:
162 /// \return true iff buffer safety is opt-out at `Loc`; false otherwise.
163 virtual bool isSafeBufferOptOut(const SourceLocation &Loc) const = 0;
164
165 /// \return true iff unsafe uses in containers should NOT be reported at
166 /// `Loc`; false otherwise.
167 virtual bool
169
170 /// \return true iff unsafe libc call should NOT be reported at `Loc`
171 virtual bool
173
174 virtual std::string
176 StringRef WSSuffix = "") const = 0;
177};
178
179// This function invokes the analysis and allows the caller to react to it
180// through the handler class.
182 bool EmitSuggestions);
183
184namespace internal {
185// Tests if any two `FixItHint`s in `FixIts` conflict. Two `FixItHint`s
186// conflict if they have overlapping source ranges.
188 const SourceManager &SM);
189} // namespace internal
190
191std::set<const Expr *> findUnsafePointers(const FunctionDecl *FD);
192} // end namespace clang
193
194#endif /* LLVM_CLANG_ANALYSIS_ANALYSES_UNSAFEBUFFERUSAGE_H */
const Decl * D
#define SM(sm)
Definition: OffloadArch.cpp:16
llvm::DenseMap< Stmt *, Stmt * > MapTy
Definition: ParentMap.cpp:21
VarDecl * Variable
Definition: SemaObjC.cpp:752
SourceLocation Loc
Definition: SemaObjC.cpp:754
Defines the clang::SourceLocation class and associated facilities.
Holds long-lived AST nodes (such as types and decls) that can be referred to throughout the semantic ...
Definition: ASTContext.h:188
CallExpr - Represents a function call (C99 6.5.2.2, C++ [expr.call]).
Definition: Expr.h:2879
Decl - This represents one declaration (or definition), e.g.
Definition: DeclBase.h:86
This represents one expression.
Definition: Expr.h:112
FixitStrategy(FixitStrategy &&)=default
FixitStrategy & operator=(const FixitStrategy &)=delete
FixitStrategy & operator=(FixitStrategy &&)=default
FixitStrategy(const FixitStrategy &)=delete
Kind lookup(const VarDecl *VD) const
void set(const VarDecl *VD, Kind K)
Encodes a location in the source.
This class handles loading and caching of source files into memory.
Stmt - This represents one statement.
Definition: Stmt.h:85
The interface that lets the caller handle unsafe buffer usage analysis results by overriding this cla...
void addDebugNoteForVar(const VarDecl *VD, SourceLocation Loc, std::string Text)
std::vector< DebugNote > DebugNoteList
virtual std::string getUnsafeBufferUsageAttributeTextAt(SourceLocation Loc, StringRef WSSuffix="") const =0
virtual bool isSafeBufferOptOut(const SourceLocation &Loc) const =0
std::map< const VarDecl *, DebugNoteList > DebugNoteByVar
std::pair< SourceLocation, std::string > DebugNote
virtual bool ignoreUnsafeBufferInContainer(const SourceLocation &Loc) const =0
virtual void handleUnsafeOperation(const Stmt *Operation, bool IsRelatedToDecl, ASTContext &Ctx)=0
Invoked when an unsafe operation over raw pointers is found.
virtual void handleUnsafeVariableGroup(const VarDecl *Variable, const VariableGroupsManager &VarGrpMgr, FixItList &&Fixes, const Decl *D, const FixitStrategy &VarTargetTypes)=0
Invoked when a fix is suggested against a variable.
virtual ~UnsafeBufferUsageHandler()=default
virtual void handleUnsafeOperationInContainer(const Stmt *Operation, bool IsRelatedToDecl, ASTContext &Ctx)=0
Invoked when an unsafe operation with a std container is found.
virtual bool ignoreUnsafeBufferInLibcCall(const SourceLocation &Loc) const =0
virtual void handleUnsafeLibcCall(const CallExpr *Call, unsigned PrintfInfo, ASTContext &Ctx, const Expr *UnsafeArg=nullptr)=0
Invoked when a call to an unsafe libc function is found.
Represents a variable declaration or definition.
Definition: Decl.h:925
virtual ~VariableGroupsManager()=default
virtual VarGrpRef getGroupOfVar(const VarDecl *Var, bool *HasParm=nullptr) const =0
Returns the set of variables (including Var) that need to be fixed together in one step.
virtual VarGrpRef getGroupOfParms() const =0
Returns the non-empty group of variables that include parameters of the analyzing function,...
bool anyConflict(const llvm::SmallVectorImpl< FixItHint > &FixIts, const SourceManager &SM)
The JSON file list parser is used to communicate input to InstallAPI.
void checkUnsafeBufferUsage(const Decl *D, UnsafeBufferUsageHandler &Handler, bool EmitSuggestions)
std::vector< const VarDecl * > VarGrpTy
std::set< const Expr * > findUnsafePointers(const FunctionDecl *FD)