| //===-- UncheckedOptionalAccessModel.h --------------------------*- C++ -*-===// |
| // |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| // See https://llvm.org/LICENSE.txt for license information. |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // This file defines a dataflow analysis that detects unsafe uses of optional |
| // values. |
| // |
| //===----------------------------------------------------------------------===// |
| |
| #ifndef CLANG_ANALYSIS_FLOWSENSITIVE_MODELS_UNCHECKEDOPTIONALACCESSMODEL_H |
| #define CLANG_ANALYSIS_FLOWSENSITIVE_MODELS_UNCHECKEDOPTIONALACCESSMODEL_H |
| |
| #include "clang/AST/ASTContext.h" |
| #include "clang/AST/Stmt.h" |
| #include "clang/Analysis/FlowSensitive/DataflowAnalysis.h" |
| #include "clang/Analysis/FlowSensitive/DataflowEnvironment.h" |
| #include "clang/Analysis/FlowSensitive/MatchSwitch.h" |
| #include "clang/Analysis/FlowSensitive/SourceLocationsLattice.h" |
| |
| namespace clang { |
| namespace dataflow { |
| |
| // FIXME: Explore using an allowlist-approach, where constructs supported by the |
| // analysis are always enabled and additional constructs are enabled through the |
| // `Options`. |
| struct UncheckedOptionalAccessModelOptions { |
| /// Ignore optionals reachable through overloaded `operator*` or `operator->` |
| /// (other than those of the optional type itself). The analysis does not |
| /// equate the results of such calls, so it can't identify when their results |
| /// are used safely (across calls), resulting in false positives in all such |
| /// cases. Note: this option does not cover access through `operator[]`. |
| bool IgnoreSmartPointerDereference = false; |
| }; |
| |
| /// Dataflow analysis that discovers unsafe accesses of optional values and |
| /// adds the respective source locations to the lattice. |
| /// |
| /// Models the `std::optional`, `absl::optional`, and `base::Optional` types. |
| /// |
| /// FIXME: Consider separating the models from the unchecked access analysis. |
| class UncheckedOptionalAccessModel |
| : public DataflowAnalysis<UncheckedOptionalAccessModel, |
| SourceLocationsLattice> { |
| public: |
| UncheckedOptionalAccessModel( |
| ASTContext &AstContext, UncheckedOptionalAccessModelOptions Options = {}); |
| |
| static SourceLocationsLattice initialElement() { |
| return SourceLocationsLattice(); |
| } |
| |
| void transfer(const Stmt *Stmt, SourceLocationsLattice &State, |
| Environment &Env); |
| |
| private: |
| MatchSwitch<TransferState<SourceLocationsLattice>> TransferMatchSwitch; |
| }; |
| |
| } // namespace dataflow |
| } // namespace clang |
| |
| #endif // CLANG_ANALYSIS_FLOWSENSITIVE_MODELS_UNCHECKEDOPTIONALACCESSMODEL_H |