mirror of
https://github.com/capstone-engine/llvm-capstone.git
synced 2025-05-14 09:56:33 +00:00

This avoids recomputing string length that is already known at compile time. It has a slight impact on preprocessing / compile time, see https://llvm-compile-time-tracker.com/compare.php?from=3f36d2d579d8b0e8824d9dd99bfa79f456858f88&to=e49640c507ddc6615b5e503144301c8e41f8f434&stat=instructions:u This a recommit of e953ae5bbc313fd0cc980ce021d487e5b5199ea4 and the subsequent fixes caa713559bd38f337d7d35de35686775e8fb5175 and 06b90e2e9c991e211fecc97948e533320a825470. The above patchset caused some version of GCC to take eons to compile clang/lib/Basic/Targets/AArch64.cpp, as spotted in aa171833ab0017d9732e82b8682c9848ab25ff9e. The fix is to make BuiltinInfo tables a compilation unit static variable, instead of a private static variable. Differential Revision: https://reviews.llvm.org/D139881
60 lines
2.1 KiB
C++
60 lines
2.1 KiB
C++
//===----------------------------------------------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "CheckerRegistration.h"
|
|
#include "clang/StaticAnalyzer/Core/Checker.h"
|
|
#include "clang/StaticAnalyzer/Core/PathSensitive/CallDescription.h"
|
|
#include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
|
|
#include "clang/StaticAnalyzer/Frontend/CheckerRegistry.h"
|
|
#include "gtest/gtest.h"
|
|
|
|
using namespace clang;
|
|
using namespace ento;
|
|
|
|
namespace {
|
|
class EvalCallBase : public Checker<eval::Call> {
|
|
const CallDescription Foo = {{"foo"}, 0};
|
|
|
|
public:
|
|
bool evalCall(const CallEvent &Call, CheckerContext &C) const {
|
|
return Foo.matches(Call);
|
|
}
|
|
};
|
|
|
|
class EvalCallFoo1 : public EvalCallBase {};
|
|
class EvalCallFoo2 : public EvalCallBase {};
|
|
void addEvalFooCheckers(AnalysisASTConsumer &AnalysisConsumer,
|
|
AnalyzerOptions &AnOpts) {
|
|
AnOpts.CheckersAndPackages = {{"test.EvalFoo1", true},
|
|
{"test.EvalFoo2", true}};
|
|
AnalysisConsumer.AddCheckerRegistrationFn([](CheckerRegistry &Registry) {
|
|
Registry.addChecker<EvalCallFoo1>("test.EvalFoo1", "EmptyDescription",
|
|
"EmptyDocsUri");
|
|
Registry.addChecker<EvalCallFoo2>("test.EvalFoo2", "EmptyDescription",
|
|
"EmptyDocsUri");
|
|
});
|
|
}
|
|
} // namespace
|
|
|
|
TEST(EvalCall, DetectConflictingEvalCalls) {
|
|
#ifdef NDEBUG
|
|
GTEST_SKIP() << "This test is only available for debug builds.";
|
|
#endif
|
|
const std::string Code = R"code(
|
|
void foo();
|
|
void top() {
|
|
foo(); // crash
|
|
}
|
|
)code";
|
|
constexpr auto Regex =
|
|
"The 'foo\\(\\)' call has been already evaluated by the test\\.EvalFoo1 "
|
|
"checker, while the test\\.EvalFoo2 checker also tried to evaluate the "
|
|
"same call\\. At most one checker supposed to evaluate a call\\.";
|
|
ASSERT_DEATH(runCheckerOnCode<addEvalFooCheckers>(Code), Regex);
|
|
}
|