[analyzer][NFC] Switch to using CallDescription::matches() instead of isCalled()

This patch replaces each use of the previous API with the new one.
In variadic cases, it will use the ADL `matchesAny(Call, CDs...)`
variadic function.
Also simplifies some code involving such operations.

Reviewed By: martong, xazax.hun

Differential Revision: https://reviews.llvm.org/D113591
This commit is contained in:
Balazs Benics 2021-11-19 18:32:13 +01:00
parent 6c512703a9
commit f18da190b0
16 changed files with 34 additions and 77 deletions

View File

@ -257,20 +257,6 @@ public:
return false; return false;
} }
/// Returns true if the CallEvent is a call to a function that matches
/// the CallDescription.
///
/// Note that this function is not intended to be used to match Obj-C method
/// calls.
bool isCalled(const CallDescription &CD) const;
/// Returns true whether the CallEvent is any of the CallDescriptions supplied
/// as a parameter.
template <typename FirstCallDesc, typename... CallDescs>
bool isCalled(const FirstCallDesc &First, const CallDescs &... Rest) const {
return isCalled(First) || isCalled(Rest...);
}
/// Returns a source range for the entire call, suitable for /// Returns a source range for the entire call, suitable for
/// outputting in diagnostics. /// outputting in diagnostics.
virtual SourceRange getSourceRange() const { virtual SourceRange getSourceRange() const {

View File

@ -551,8 +551,8 @@ void CFRetainReleaseChecker::checkPreCall(const CallEvent &Call,
return; return;
// Check if we called CFRetain/CFRelease/CFMakeCollectable/CFAutorelease. // Check if we called CFRetain/CFRelease/CFMakeCollectable/CFAutorelease.
if (!(Call.isCalled(CFRetain) || Call.isCalled(CFRelease) ||
Call.isCalled(CFMakeCollectable) || Call.isCalled(CFAutorelease))) if (!matchesAny(Call, CFRetain, CFRelease, CFMakeCollectable, CFAutorelease))
return; return;
// Get the argument's value. // Get the argument's value.

View File

@ -97,14 +97,7 @@ void BlockInCriticalSectionChecker::initIdentifierInfo(ASTContext &Ctx) const {
} }
bool BlockInCriticalSectionChecker::isBlockingFunction(const CallEvent &Call) const { bool BlockInCriticalSectionChecker::isBlockingFunction(const CallEvent &Call) const {
if (Call.isCalled(SleepFn) return matchesAny(Call, SleepFn, GetcFn, FgetsFn, ReadFn, RecvFn);
|| Call.isCalled(GetcFn)
|| Call.isCalled(FgetsFn)
|| Call.isCalled(ReadFn)
|| Call.isCalled(RecvFn)) {
return true;
}
return false;
} }
bool BlockInCriticalSectionChecker::isLockFunction(const CallEvent &Call) const { bool BlockInCriticalSectionChecker::isLockFunction(const CallEvent &Call) const {
@ -114,15 +107,8 @@ bool BlockInCriticalSectionChecker::isLockFunction(const CallEvent &Call) const
return true; return true;
} }
if (Call.isCalled(LockFn) return matchesAny(Call, LockFn, PthreadLockFn, PthreadTryLockFn, MtxLock,
|| Call.isCalled(PthreadLockFn) MtxTimedLock, MtxTryLock);
|| Call.isCalled(PthreadTryLockFn)
|| Call.isCalled(MtxLock)
|| Call.isCalled(MtxTimedLock)
|| Call.isCalled(MtxTryLock)) {
return true;
}
return false;
} }
bool BlockInCriticalSectionChecker::isUnlockFunction(const CallEvent &Call) const { bool BlockInCriticalSectionChecker::isUnlockFunction(const CallEvent &Call) const {
@ -133,12 +119,7 @@ bool BlockInCriticalSectionChecker::isUnlockFunction(const CallEvent &Call) cons
return true; return true;
} }
if (Call.isCalled(UnlockFn) return matchesAny(Call, UnlockFn, PthreadUnlockFn, MtxUnlock);
|| Call.isCalled(PthreadUnlockFn)
|| Call.isCalled(MtxUnlock)) {
return true;
}
return false;
} }
void BlockInCriticalSectionChecker::checkPostCall(const CallEvent &Call, void BlockInCriticalSectionChecker::checkPostCall(const CallEvent &Call,

View File

@ -2272,11 +2272,10 @@ CStringChecker::FnCheck CStringChecker::identifyCall(const CallEvent &Call,
if (!FD) if (!FD)
return nullptr; return nullptr;
if (Call.isCalled(StdCopy)) { if (StdCopy.matches(Call))
return &CStringChecker::evalStdCopy; return &CStringChecker::evalStdCopy;
} else if (Call.isCalled(StdCopyBackward)) { if (StdCopyBackward.matches(Call))
return &CStringChecker::evalStdCopyBackward; return &CStringChecker::evalStdCopyBackward;
}
// Pro-actively check that argument types are safe to do arithmetic upon. // Pro-actively check that argument types are safe to do arithmetic upon.
// We do not want to crash if someone accidentally passes a structure // We do not want to crash if someone accidentally passes a structure

View File

@ -64,11 +64,11 @@ private:
} // end anonymous namespace } // end anonymous namespace
bool ChrootChecker::evalCall(const CallEvent &Call, CheckerContext &C) const { bool ChrootChecker::evalCall(const CallEvent &Call, CheckerContext &C) const {
if (Call.isCalled(Chroot)) { if (Chroot.matches(Call)) {
evalChroot(Call, C); evalChroot(Call, C);
return true; return true;
} }
if (Call.isCalled(Chdir)) { if (Chdir.matches(Call)) {
evalChdir(Call, C); evalChdir(Call, C);
return true; return true;
} }
@ -116,7 +116,7 @@ void ChrootChecker::evalChdir(const CallEvent &Call, CheckerContext &C) const {
void ChrootChecker::checkPreCall(const CallEvent &Call, void ChrootChecker::checkPreCall(const CallEvent &Call,
CheckerContext &C) const { CheckerContext &C) const {
// Ignore chroot and chdir. // Ignore chroot and chdir.
if (Call.isCalled(Chroot) || Call.isCalled(Chdir)) if (matchesAny(Call, Chroot, Chdir))
return; return;
// If jail state is ROOT_CHANGED, generate BugReport. // If jail state is ROOT_CHANGED, generate BugReport.

View File

@ -126,19 +126,15 @@ bool InnerPointerChecker::isInvalidatingMemberFunction(
return true; return true;
return false; return false;
} }
return (isa<CXXDestructorCall>(Call) || Call.isCalled(AppendFn) || return isa<CXXDestructorCall>(Call) ||
Call.isCalled(AssignFn) || Call.isCalled(ClearFn) || matchesAny(Call, AppendFn, AssignFn, ClearFn, EraseFn, InsertFn,
Call.isCalled(EraseFn) || Call.isCalled(InsertFn) || PopBackFn, PushBackFn, ReplaceFn, ReserveFn, ResizeFn,
Call.isCalled(PopBackFn) || Call.isCalled(PushBackFn) || ShrinkToFitFn, SwapFn);
Call.isCalled(ReplaceFn) || Call.isCalled(ReserveFn) ||
Call.isCalled(ResizeFn) || Call.isCalled(ShrinkToFitFn) ||
Call.isCalled(SwapFn));
} }
bool InnerPointerChecker::isInnerPointerAccessFunction( bool InnerPointerChecker::isInnerPointerAccessFunction(
const CallEvent &Call) const { const CallEvent &Call) const {
return (Call.isCalled(CStrFn) || Call.isCalled(DataFn) || return matchesAny(Call, CStrFn, DataFn, DataMemberFn);
Call.isCalled(DataMemberFn));
} }
void InnerPointerChecker::markPtrSymbolsReleased(const CallEvent &Call, void InnerPointerChecker::markPtrSymbolsReleased(const CallEvent &Call,
@ -185,7 +181,7 @@ void InnerPointerChecker::checkFunctionArguments(const CallEvent &Call,
// std::addressof function accepts a non-const reference as an argument, // std::addressof function accepts a non-const reference as an argument,
// but doesn't modify it. // but doesn't modify it.
if (Call.isCalled(AddressofFn)) if (AddressofFn.matches(Call))
continue; continue;
markPtrSymbolsReleased(Call, State, ArgRegion, C); markPtrSymbolsReleased(Call, State, ArgRegion, C);

View File

@ -181,7 +181,7 @@ static bool isInMIGCall(CheckerContext &C) {
} }
void MIGChecker::checkPostCall(const CallEvent &Call, CheckerContext &C) const { void MIGChecker::checkPostCall(const CallEvent &Call, CheckerContext &C) const {
if (Call.isCalled(OsRefRetain)) { if (OsRefRetain.matches(Call)) {
// If the code is doing reference counting over the parameter, // If the code is doing reference counting over the parameter,
// it opens up an opportunity for safely calling a destructor function. // it opens up an opportunity for safely calling a destructor function.
// TODO: We should still check for over-releases. // TODO: We should still check for over-releases.
@ -199,7 +199,7 @@ void MIGChecker::checkPostCall(const CallEvent &Call, CheckerContext &C) const {
auto I = llvm::find_if(Deallocators, auto I = llvm::find_if(Deallocators,
[&](const std::pair<CallDescription, unsigned> &Item) { [&](const std::pair<CallDescription, unsigned> &Item) {
return Call.isCalled(Item.first); return Item.first.matches(Call);
}); });
if (I == Deallocators.end()) if (I == Deallocators.end())
return; return;

View File

@ -47,7 +47,7 @@ int MmapWriteExecChecker::ProtRead = 0x01;
void MmapWriteExecChecker::checkPreCall(const CallEvent &Call, void MmapWriteExecChecker::checkPreCall(const CallEvent &Call,
CheckerContext &C) const { CheckerContext &C) const {
if (Call.isCalled(MmapFn) || Call.isCalled(MprotectFn)) { if (matchesAny(Call, MmapFn, MprotectFn)) {
SVal ProtVal = Call.getArgSVal(2); SVal ProtVal = Call.getArgSVal(2);
Optional<nonloc::ConcreteInt> ProtLoc = ProtVal.getAs<nonloc::ConcreteInt>(); Optional<nonloc::ConcreteInt> ProtLoc = ProtVal.getAs<nonloc::ConcreteInt>();
int64_t Prot = ProtLoc->getValue().getSExtValue(); int64_t Prot = ProtLoc->getValue().getSExtValue();

View File

@ -120,7 +120,7 @@ void SimpleStreamChecker::checkPostCall(const CallEvent &Call,
if (!Call.isGlobalCFunction()) if (!Call.isGlobalCFunction())
return; return;
if (!Call.isCalled(OpenFn)) if (!OpenFn.matches(Call))
return; return;
// Get the symbolic value corresponding to the file handle. // Get the symbolic value corresponding to the file handle.
@ -139,7 +139,7 @@ void SimpleStreamChecker::checkPreCall(const CallEvent &Call,
if (!Call.isGlobalCFunction()) if (!Call.isGlobalCFunction())
return; return;
if (!Call.isCalled(CloseFn)) if (!CloseFn.matches(Call))
return; return;
// Get the symbolic value corresponding to the file handle. // Get the symbolic value corresponding to the file handle.

View File

@ -286,7 +286,7 @@ bool SmartPtrModeling::evalCall(const CallEvent &Call,
if (ModelSmartPtrDereference && isStdOstreamOperatorCall(Call)) if (ModelSmartPtrDereference && isStdOstreamOperatorCall(Call))
return handleOstreamOperator(Call, C); return handleOstreamOperator(Call, C);
if (Call.isCalled(StdSwapCall)) { if (StdSwapCall.matches(Call)) {
// Check the first arg, if it is of std::unique_ptr type. // Check the first arg, if it is of std::unique_ptr type.
assert(Call.getNumArgs() == 2 && "std::swap should have two arguments"); assert(Call.getNumArgs() == 2 && "std::swap should have two arguments");
const Expr *FirstArg = Call.getArgExpr(0); const Expr *FirstArg = Call.getArgExpr(0);
@ -295,8 +295,7 @@ bool SmartPtrModeling::evalCall(const CallEvent &Call,
return handleSwap(State, Call.getArgSVal(0), Call.getArgSVal(1), C); return handleSwap(State, Call.getArgSVal(0), Call.getArgSVal(1), C);
} }
if (Call.isCalled(StdMakeUniqueCall) || if (matchesAny(Call, StdMakeUniqueCall, StdMakeUniqueForOverwriteCall)) {
Call.isCalled(StdMakeUniqueForOverwriteCall)) {
if (!ModelSmartPtrDereference) if (!ModelSmartPtrDereference)
return false; return false;

View File

@ -37,7 +37,7 @@ public:
bool StringChecker::isCharToStringCtor(const CallEvent &Call, bool StringChecker::isCharToStringCtor(const CallEvent &Call,
const ASTContext &ACtx) const { const ASTContext &ACtx) const {
if (!Call.isCalled(TwoParamStdStringCtor)) if (!TwoParamStdStringCtor.matches(Call))
return false; return false;
const auto *FD = dyn_cast<FunctionDecl>(Call.getDecl()); const auto *FD = dyn_cast<FunctionDecl>(Call.getDecl());
assert(FD); assert(FD);

View File

@ -127,15 +127,15 @@ void ValistChecker::checkPreCall(const CallEvent &Call,
CheckerContext &C) const { CheckerContext &C) const {
if (!Call.isGlobalCFunction()) if (!Call.isGlobalCFunction())
return; return;
if (Call.isCalled(VaStart)) if (VaStart.matches(Call))
checkVAListStartCall(Call, C, false); checkVAListStartCall(Call, C, false);
else if (Call.isCalled(VaCopy)) else if (VaCopy.matches(Call))
checkVAListStartCall(Call, C, true); checkVAListStartCall(Call, C, true);
else if (Call.isCalled(VaEnd)) else if (VaEnd.matches(Call))
checkVAListEndCall(Call, C); checkVAListEndCall(Call, C);
else { else {
for (auto FuncInfo : VAListAccepters) { for (auto FuncInfo : VAListAccepters) {
if (!Call.isCalled(FuncInfo.Func)) if (!FuncInfo.Func.matches(Call))
continue; continue;
bool Symbolic; bool Symbolic;
const MemRegion *VAList = const MemRegion *VAList =

View File

@ -39,7 +39,7 @@ public:
void PutenvWithAutoChecker::checkPostCall(const CallEvent &Call, void PutenvWithAutoChecker::checkPostCall(const CallEvent &Call,
CheckerContext &C) const { CheckerContext &C) const {
if (!Call.isCalled(Putenv)) if (!Putenv.matches(Call))
return; return;
SVal ArgV = Call.getArgSVal(0); SVal ArgV = Call.getArgSVal(0);

View File

@ -303,10 +303,6 @@ ProgramPoint CallEvent::getProgramPoint(bool IsPreVisit,
return PostImplicitCall(D, Loc, getLocationContext(), Tag); return PostImplicitCall(D, Loc, getLocationContext(), Tag);
} }
bool CallEvent::isCalled(const CallDescription &CD) const {
return CD.matches(*this);
}
SVal CallEvent::getArgSVal(unsigned Index) const { SVal CallEvent::getArgSVal(unsigned Index) const {
const Expr *ArgE = getArgExpr(Index); const Expr *ArgE = getArgExpr(Index);
if (!ArgE) if (!ArgE)

View File

@ -22,7 +22,7 @@ class EvalCallBase : public Checker<eval::Call> {
public: public:
bool evalCall(const CallEvent &Call, CheckerContext &C) const { bool evalCall(const CallEvent &Call, CheckerContext &C) const {
return Call.isCalled(Foo); return Foo.matches(Call);
} }
}; };

View File

@ -86,17 +86,17 @@ class StatefulChecker : public Checker<check::PreCall> {
public: public:
void checkPreCall(const CallEvent &Call, CheckerContext &C) const { void checkPreCall(const CallEvent &Call, CheckerContext &C) const {
if (Call.isCalled(CallDescription{"preventError", 0})) { if (CallDescription{"preventError", 0}.matches(Call)) {
C.addTransition(C.getState()->set<ErrorPrevented>(true)); C.addTransition(C.getState()->set<ErrorPrevented>(true));
return; return;
} }
if (Call.isCalled(CallDescription{"allowError", 0})) { if (CallDescription{"allowError", 0}.matches(Call)) {
C.addTransition(C.getState()->set<ErrorPrevented>(false)); C.addTransition(C.getState()->set<ErrorPrevented>(false));
return; return;
} }
if (Call.isCalled(CallDescription{"error", 0})) { if (CallDescription{"error", 0}.matches(Call)) {
if (C.getState()->get<ErrorPrevented>()) if (C.getState()->get<ErrorPrevented>())
return; return;
const ExplodedNode *N = C.generateErrorNode(); const ExplodedNode *N = C.generateErrorNode();