2009-11-09 13:34:10 +08:00
|
|
|
//=== PointerSubChecker.cpp - Pointer subtraction checker ------*- C++ -*--===//
|
|
|
|
//
|
|
|
|
// The LLVM Compiler Infrastructure
|
|
|
|
//
|
|
|
|
// This file is distributed under the University of Illinois Open Source
|
|
|
|
// License. See LICENSE.TXT for details.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This files defines PointerSubChecker, a builtin checker that checks for
|
|
|
|
// pointer subtractions on two pointers pointing to different memory chunks.
|
|
|
|
// This check corresponds to CWE-469.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
|
2011-02-09 06:30:02 +08:00
|
|
|
#include "InternalChecks.h"
|
2010-12-24 03:38:26 +08:00
|
|
|
#include "clang/StaticAnalyzer/BugReporter/BugType.h"
|
|
|
|
#include "clang/StaticAnalyzer/PathSensitive/CheckerVisitor.h"
|
2009-11-09 13:34:10 +08:00
|
|
|
|
|
|
|
using namespace clang;
|
2010-12-23 15:20:52 +08:00
|
|
|
using namespace ento;
|
2009-11-09 13:34:10 +08:00
|
|
|
|
|
|
|
namespace {
|
2009-11-28 14:07:30 +08:00
|
|
|
class PointerSubChecker
|
2009-11-09 13:34:10 +08:00
|
|
|
: public CheckerVisitor<PointerSubChecker> {
|
|
|
|
BuiltinBug *BT;
|
|
|
|
public:
|
|
|
|
PointerSubChecker() : BT(0) {}
|
|
|
|
static void *getTag();
|
|
|
|
void PreVisitBinaryOperator(CheckerContext &C, const BinaryOperator *B);
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
void *PointerSubChecker::getTag() {
|
|
|
|
static int x;
|
|
|
|
return &x;
|
|
|
|
}
|
|
|
|
|
|
|
|
void PointerSubChecker::PreVisitBinaryOperator(CheckerContext &C,
|
|
|
|
const BinaryOperator *B) {
|
|
|
|
// When doing pointer subtraction, if the two pointers do not point to the
|
|
|
|
// same memory chunk, emit a warning.
|
2010-08-25 19:45:40 +08:00
|
|
|
if (B->getOpcode() != BO_Sub)
|
2009-11-09 13:34:10 +08:00
|
|
|
return;
|
|
|
|
|
|
|
|
const GRState *state = C.getState();
|
2010-02-09 00:18:51 +08:00
|
|
|
SVal LV = state->getSVal(B->getLHS());
|
|
|
|
SVal RV = state->getSVal(B->getRHS());
|
2009-11-09 13:34:10 +08:00
|
|
|
|
|
|
|
const MemRegion *LR = LV.getAsRegion();
|
|
|
|
const MemRegion *RR = RV.getAsRegion();
|
|
|
|
|
2009-11-10 10:37:53 +08:00
|
|
|
if (!(LR && RR))
|
2009-11-09 13:34:10 +08:00
|
|
|
return;
|
|
|
|
|
2009-11-10 10:37:53 +08:00
|
|
|
const MemRegion *BaseLR = LR->getBaseRegion();
|
|
|
|
const MemRegion *BaseRR = RR->getBaseRegion();
|
|
|
|
|
|
|
|
if (BaseLR == BaseRR)
|
|
|
|
return;
|
|
|
|
|
|
|
|
// Allow arithmetic on different symbolic regions.
|
|
|
|
if (isa<SymbolicRegion>(BaseLR) || isa<SymbolicRegion>(BaseRR))
|
2009-11-09 13:34:10 +08:00
|
|
|
return;
|
|
|
|
|
2010-12-21 05:19:09 +08:00
|
|
|
if (ExplodedNode *N = C.generateNode()) {
|
2009-11-09 13:34:10 +08:00
|
|
|
if (!BT)
|
|
|
|
BT = new BuiltinBug("Pointer subtraction",
|
2009-11-09 15:29:39 +08:00
|
|
|
"Subtraction of two pointers that do not point to "
|
|
|
|
"the same memory chunk may cause incorrect result.");
|
2009-11-14 20:08:24 +08:00
|
|
|
RangedBugReport *R = new RangedBugReport(*BT, BT->getDescription(), N);
|
2009-11-09 13:34:10 +08:00
|
|
|
R->addRange(B->getSourceRange());
|
|
|
|
C.EmitReport(R);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-12-23 15:20:52 +08:00
|
|
|
void ento::RegisterPointerSubChecker(ExprEngine &Eng) {
|
2009-11-09 13:34:10 +08:00
|
|
|
Eng.registerCheck(new PointerSubChecker());
|
|
|
|
}
|