• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //==- IdempotentOperationChecker.cpp - Idempotent Operations ----*- C++ -*-==//
2 //
3 //                     The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This file defines a set of path-sensitive checks for idempotent and/or
11 // tautological operations. Each potential operation is checked along all paths
12 // to see if every path results in a pointless operation.
13 //                 +-------------------------------------------+
14 //                 |Table of idempotent/tautological operations|
15 //                 +-------------------------------------------+
16 //+--------------------------------------------------------------------------+
17 //|Operator | x op x | x op 1 | 1 op x | x op 0 | 0 op x | x op ~0 | ~0 op x |
18 //+--------------------------------------------------------------------------+
19 //  +, +=   |        |        |        |   x    |   x    |         |
20 //  -, -=   |        |        |        |   x    |   -x   |         |
21 //  *, *=   |        |   x    |   x    |   0    |   0    |         |
22 //  /, /=   |   1    |   x    |        |  N/A   |   0    |         |
23 //  &, &=   |   x    |        |        |   0    |   0    |   x     |    x
24 //  |, |=   |   x    |        |        |   x    |   x    |   ~0    |    ~0
25 //  ^, ^=   |   0    |        |        |   x    |   x    |         |
26 //  <<, <<= |        |        |        |   x    |   0    |         |
27 //  >>, >>= |        |        |        |   x    |   0    |         |
28 //  ||      |   1    |   1    |   1    |   x    |   x    |   1     |    1
29 //  &&      |   1    |   x    |   x    |   0    |   0    |   x     |    x
30 //  =       |   x    |        |        |        |        |         |
31 //  ==      |   1    |        |        |        |        |         |
32 //  >=      |   1    |        |        |        |        |         |
33 //  <=      |   1    |        |        |        |        |         |
34 //  >       |   0    |        |        |        |        |         |
35 //  <       |   0    |        |        |        |        |         |
36 //  !=      |   0    |        |        |        |        |         |
37 //===----------------------------------------------------------------------===//
38 //
39 // Things TODO:
40 // - Improved error messages
41 // - Handle mixed assumptions (which assumptions can belong together?)
42 // - Finer grained false positive control (levels)
43 // - Handling ~0 values
44 
45 #include "ClangSACheckers.h"
46 #include "clang/Analysis/CFGStmtMap.h"
47 #include "clang/Analysis/Analyses/PseudoConstantAnalysis.h"
48 #include "clang/Analysis/Analyses/CFGReachabilityAnalysis.h"
49 #include "clang/StaticAnalyzer/Core/Checker.h"
50 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
51 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
52 #include "clang/StaticAnalyzer/Core/BugReporter/BugReporter.h"
53 #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
54 #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerHelpers.h"
55 #include "clang/StaticAnalyzer/Core/PathSensitive/CoreEngine.h"
56 #include "clang/StaticAnalyzer/Core/PathSensitive/SVals.h"
57 #include "clang/AST/Stmt.h"
58 #include "llvm/ADT/DenseMap.h"
59 #include "llvm/ADT/SmallSet.h"
60 #include "llvm/ADT/SmallString.h"
61 #include "llvm/ADT/BitVector.h"
62 #include "llvm/Support/ErrorHandling.h"
63 
64 using namespace clang;
65 using namespace ento;
66 
67 namespace {
68 class IdempotentOperationChecker
69   : public Checker<check::PreStmt<BinaryOperator>,
70                      check::PostStmt<BinaryOperator>,
71                      check::EndAnalysis> {
72 public:
73   void checkPreStmt(const BinaryOperator *B, CheckerContext &C) const;
74   void checkPostStmt(const BinaryOperator *B, CheckerContext &C) const;
75   void checkEndAnalysis(ExplodedGraph &G, BugReporter &B,ExprEngine &Eng) const;
76 
77 private:
78   // Our assumption about a particular operation.
79   enum Assumption { Possible = 0, Impossible, Equal, LHSis1, RHSis1, LHSis0,
80       RHSis0 };
81 
82   static void UpdateAssumption(Assumption &A, const Assumption &New);
83 
84   // False positive reduction methods
85   static bool isSelfAssign(const Expr *LHS, const Expr *RHS);
86   static bool isUnused(const Expr *E, AnalysisDeclContext *AC);
87   static bool isTruncationExtensionAssignment(const Expr *LHS,
88                                               const Expr *RHS);
89   static bool pathWasCompletelyAnalyzed(AnalysisDeclContext *AC,
90                                         const CFGBlock *CB,
91                                         const CoreEngine &CE);
92   static bool CanVary(const Expr *Ex,
93                       AnalysisDeclContext *AC);
94   static bool isConstantOrPseudoConstant(const DeclRefExpr *DR,
95                                          AnalysisDeclContext *AC);
96   static bool containsNonLocalVarDecl(const Stmt *S);
97 
98   // Hash table and related data structures
99   struct BinaryOperatorData {
BinaryOperatorData__anon7f6ffd550111::IdempotentOperationChecker::BinaryOperatorData100     BinaryOperatorData() : assumption(Possible) {}
101 
102     Assumption assumption;
103     ExplodedNodeSet explodedNodes; // Set of ExplodedNodes that refer to a
104                                    // BinaryOperator
105   };
106   typedef llvm::DenseMap<const BinaryOperator *, BinaryOperatorData>
107       AssumptionMap;
108   mutable AssumptionMap hash;
109   mutable OwningPtr<BugType> BT;
110 };
111 }
112 
checkPreStmt(const BinaryOperator * B,CheckerContext & C) const113 void IdempotentOperationChecker::checkPreStmt(const BinaryOperator *B,
114                                               CheckerContext &C) const {
115   // Find or create an entry in the hash for this BinaryOperator instance.
116   // If we haven't done a lookup before, it will get default initialized to
117   // 'Possible'. At this stage we do not store the ExplodedNode, as it has not
118   // been created yet.
119   BinaryOperatorData &Data = hash[B];
120   Assumption &A = Data.assumption;
121   AnalysisDeclContext *AC = C.getCurrentAnalysisDeclContext();
122 
123   // If we already have visited this node on a path that does not contain an
124   // idempotent operation, return immediately.
125   if (A == Impossible)
126     return;
127 
128   // Retrieve both sides of the operator and determine if they can vary (which
129   // may mean this is a false positive.
130   const Expr *LHS = B->getLHS();
131   const Expr *RHS = B->getRHS();
132 
133   // At this stage we can calculate whether each side contains a false positive
134   // that applies to all operators. We only need to calculate this the first
135   // time.
136   bool LHSContainsFalsePositive = false, RHSContainsFalsePositive = false;
137   if (A == Possible) {
138     // An expression contains a false positive if it can't vary, or if it
139     // contains a known false positive VarDecl.
140     LHSContainsFalsePositive = !CanVary(LHS, AC)
141         || containsNonLocalVarDecl(LHS);
142     RHSContainsFalsePositive = !CanVary(RHS, AC)
143         || containsNonLocalVarDecl(RHS);
144   }
145 
146   ProgramStateRef state = C.getState();
147   const LocationContext *LCtx = C.getLocationContext();
148   SVal LHSVal = state->getSVal(LHS, LCtx);
149   SVal RHSVal = state->getSVal(RHS, LCtx);
150 
151   // If either value is unknown, we can't be 100% sure of all paths.
152   if (LHSVal.isUnknownOrUndef() || RHSVal.isUnknownOrUndef()) {
153     A = Impossible;
154     return;
155   }
156   BinaryOperator::Opcode Op = B->getOpcode();
157 
158   // Dereference the LHS SVal if this is an assign operation
159   switch (Op) {
160   default:
161     break;
162 
163   // Fall through intentional
164   case BO_AddAssign:
165   case BO_SubAssign:
166   case BO_MulAssign:
167   case BO_DivAssign:
168   case BO_AndAssign:
169   case BO_OrAssign:
170   case BO_XorAssign:
171   case BO_ShlAssign:
172   case BO_ShrAssign:
173   case BO_Assign:
174   // Assign statements have one extra level of indirection
175     if (!isa<Loc>(LHSVal)) {
176       A = Impossible;
177       return;
178     }
179     LHSVal = state->getSVal(cast<Loc>(LHSVal), LHS->getType());
180   }
181 
182 
183   // We now check for various cases which result in an idempotent operation.
184 
185   // x op x
186   switch (Op) {
187   default:
188     break; // We don't care about any other operators.
189 
190   // Fall through intentional
191   case BO_Assign:
192     // x Assign x can be used to silence unused variable warnings intentionally.
193     // If this is a self assignment and the variable is referenced elsewhere,
194     // and the assignment is not a truncation or extension, then it is a false
195     // positive.
196     if (isSelfAssign(LHS, RHS)) {
197       if (!isUnused(LHS, AC) && !isTruncationExtensionAssignment(LHS, RHS)) {
198         UpdateAssumption(A, Equal);
199         return;
200       }
201       else {
202         A = Impossible;
203         return;
204       }
205     }
206 
207   case BO_SubAssign:
208   case BO_DivAssign:
209   case BO_AndAssign:
210   case BO_OrAssign:
211   case BO_XorAssign:
212   case BO_Sub:
213   case BO_Div:
214   case BO_And:
215   case BO_Or:
216   case BO_Xor:
217   case BO_LOr:
218   case BO_LAnd:
219   case BO_EQ:
220   case BO_NE:
221     if (LHSVal != RHSVal || LHSContainsFalsePositive
222         || RHSContainsFalsePositive)
223       break;
224     UpdateAssumption(A, Equal);
225     return;
226   }
227 
228   // x op 1
229   switch (Op) {
230    default:
231      break; // We don't care about any other operators.
232 
233    // Fall through intentional
234    case BO_MulAssign:
235    case BO_DivAssign:
236    case BO_Mul:
237    case BO_Div:
238    case BO_LOr:
239    case BO_LAnd:
240      if (!RHSVal.isConstant(1) || RHSContainsFalsePositive)
241        break;
242      UpdateAssumption(A, RHSis1);
243      return;
244   }
245 
246   // 1 op x
247   switch (Op) {
248   default:
249     break; // We don't care about any other operators.
250 
251   // Fall through intentional
252   case BO_MulAssign:
253   case BO_Mul:
254   case BO_LOr:
255   case BO_LAnd:
256     if (!LHSVal.isConstant(1) || LHSContainsFalsePositive)
257       break;
258     UpdateAssumption(A, LHSis1);
259     return;
260   }
261 
262   // x op 0
263   switch (Op) {
264   default:
265     break; // We don't care about any other operators.
266 
267   // Fall through intentional
268   case BO_AddAssign:
269   case BO_SubAssign:
270   case BO_MulAssign:
271   case BO_AndAssign:
272   case BO_OrAssign:
273   case BO_XorAssign:
274   case BO_Add:
275   case BO_Sub:
276   case BO_Mul:
277   case BO_And:
278   case BO_Or:
279   case BO_Xor:
280   case BO_Shl:
281   case BO_Shr:
282   case BO_LOr:
283   case BO_LAnd:
284     if (!RHSVal.isConstant(0) || RHSContainsFalsePositive)
285       break;
286     UpdateAssumption(A, RHSis0);
287     return;
288   }
289 
290   // 0 op x
291   switch (Op) {
292   default:
293     break; // We don't care about any other operators.
294 
295   // Fall through intentional
296   //case BO_AddAssign: // Common false positive
297   case BO_SubAssign: // Check only if unsigned
298   case BO_MulAssign:
299   case BO_DivAssign:
300   case BO_AndAssign:
301   //case BO_OrAssign: // Common false positive
302   //case BO_XorAssign: // Common false positive
303   case BO_ShlAssign:
304   case BO_ShrAssign:
305   case BO_Add:
306   case BO_Sub:
307   case BO_Mul:
308   case BO_Div:
309   case BO_And:
310   case BO_Or:
311   case BO_Xor:
312   case BO_Shl:
313   case BO_Shr:
314   case BO_LOr:
315   case BO_LAnd:
316     if (!LHSVal.isConstant(0) || LHSContainsFalsePositive)
317       break;
318     UpdateAssumption(A, LHSis0);
319     return;
320   }
321 
322   // If we get to this point, there has been a valid use of this operation.
323   A = Impossible;
324 }
325 
326 // At the post visit stage, the predecessor ExplodedNode will be the
327 // BinaryOperator that was just created. We use this hook to collect the
328 // ExplodedNode.
checkPostStmt(const BinaryOperator * B,CheckerContext & C) const329 void IdempotentOperationChecker::checkPostStmt(const BinaryOperator *B,
330                                                CheckerContext &C) const {
331   // Add the ExplodedNode we just visited
332   BinaryOperatorData &Data = hash[B];
333 
334   const Stmt *predStmt
335     = cast<StmtPoint>(C.getPredecessor()->getLocation()).getStmt();
336 
337   // Ignore implicit calls to setters.
338   if (!isa<BinaryOperator>(predStmt))
339     return;
340 
341   Data.explodedNodes.Add(C.getPredecessor());
342 }
343 
checkEndAnalysis(ExplodedGraph & G,BugReporter & BR,ExprEngine & Eng) const344 void IdempotentOperationChecker::checkEndAnalysis(ExplodedGraph &G,
345                                                   BugReporter &BR,
346                                                   ExprEngine &Eng) const {
347   if (!BT)
348     BT.reset(new BugType("Idempotent operation", "Dead code"));
349 
350   // Iterate over the hash to see if we have any paths with definite
351   // idempotent operations.
352   for (AssumptionMap::const_iterator i = hash.begin(); i != hash.end(); ++i) {
353     // Unpack the hash contents
354     const BinaryOperatorData &Data = i->second;
355     const Assumption &A = Data.assumption;
356     const ExplodedNodeSet &ES = Data.explodedNodes;
357 
358     // If there are no nodes accosted with the expression, nothing to report.
359     // FIXME: This is possible because the checker does part of processing in
360     // checkPreStmt and part in checkPostStmt.
361     if (ES.begin() == ES.end())
362       continue;
363 
364     const BinaryOperator *B = i->first;
365 
366     if (A == Impossible)
367       continue;
368 
369     // If the analyzer did not finish, check to see if we can still emit this
370     // warning
371     if (Eng.hasWorkRemaining()) {
372       // If we can trace back
373       AnalysisDeclContext *AC = (*ES.begin())->getLocationContext()
374                                          ->getAnalysisDeclContext();
375       if (!pathWasCompletelyAnalyzed(AC,
376                                      AC->getCFGStmtMap()->getBlock(B),
377                                      Eng.getCoreEngine()))
378         continue;
379     }
380 
381     // Select the error message and SourceRanges to report.
382     SmallString<128> buf;
383     llvm::raw_svector_ostream os(buf);
384     bool LHSRelevant = false, RHSRelevant = false;
385     switch (A) {
386     case Equal:
387       LHSRelevant = true;
388       RHSRelevant = true;
389       if (B->getOpcode() == BO_Assign)
390         os << "Assigned value is always the same as the existing value";
391       else
392         os << "Both operands to '" << B->getOpcodeStr()
393            << "' always have the same value";
394       break;
395     case LHSis1:
396       LHSRelevant = true;
397       os << "The left operand to '" << B->getOpcodeStr() << "' is always 1";
398       break;
399     case RHSis1:
400       RHSRelevant = true;
401       os << "The right operand to '" << B->getOpcodeStr() << "' is always 1";
402       break;
403     case LHSis0:
404       LHSRelevant = true;
405       os << "The left operand to '" << B->getOpcodeStr() << "' is always 0";
406       break;
407     case RHSis0:
408       RHSRelevant = true;
409       os << "The right operand to '" << B->getOpcodeStr() << "' is always 0";
410       break;
411     case Possible:
412       llvm_unreachable("Operation was never marked with an assumption");
413     case Impossible:
414       llvm_unreachable(0);
415     }
416 
417     // Add a report for each ExplodedNode
418     for (ExplodedNodeSet::iterator I = ES.begin(), E = ES.end(); I != E; ++I) {
419       BugReport *report = new BugReport(*BT, os.str(), *I);
420 
421       // Add source ranges and visitor hooks
422       if (LHSRelevant) {
423         const Expr *LHS = i->first->getLHS();
424         report->addRange(LHS->getSourceRange());
425         FindLastStoreBRVisitor::registerStatementVarDecls(*report, LHS);
426       }
427       if (RHSRelevant) {
428         const Expr *RHS = i->first->getRHS();
429         report->addRange(i->first->getRHS()->getSourceRange());
430         FindLastStoreBRVisitor::registerStatementVarDecls(*report, RHS);
431       }
432 
433       BR.EmitReport(report);
434     }
435   }
436 
437   hash.clear();
438 }
439 
440 // Updates the current assumption given the new assumption
UpdateAssumption(Assumption & A,const Assumption & New)441 inline void IdempotentOperationChecker::UpdateAssumption(Assumption &A,
442                                                         const Assumption &New) {
443 // If the assumption is the same, there is nothing to do
444   if (A == New)
445     return;
446 
447   switch (A) {
448   // If we don't currently have an assumption, set it
449   case Possible:
450     A = New;
451     return;
452 
453   // If we have determined that a valid state happened, ignore the new
454   // assumption.
455   case Impossible:
456     return;
457 
458   // Any other case means that we had a different assumption last time. We don't
459   // currently support mixing assumptions for diagnostic reasons, so we set
460   // our assumption to be impossible.
461   default:
462     A = Impossible;
463     return;
464   }
465 }
466 
467 // Check for a statement where a variable is self assigned to possibly avoid an
468 // unused variable warning.
isSelfAssign(const Expr * LHS,const Expr * RHS)469 bool IdempotentOperationChecker::isSelfAssign(const Expr *LHS, const Expr *RHS) {
470   LHS = LHS->IgnoreParenCasts();
471   RHS = RHS->IgnoreParenCasts();
472 
473   const DeclRefExpr *LHS_DR = dyn_cast<DeclRefExpr>(LHS);
474   if (!LHS_DR)
475     return false;
476 
477   const VarDecl *VD = dyn_cast<VarDecl>(LHS_DR->getDecl());
478   if (!VD)
479     return false;
480 
481   const DeclRefExpr *RHS_DR = dyn_cast<DeclRefExpr>(RHS);
482   if (!RHS_DR)
483     return false;
484 
485   if (VD != RHS_DR->getDecl())
486     return false;
487 
488   return true;
489 }
490 
491 // Returns true if the Expr points to a VarDecl that is not read anywhere
492 // outside of self-assignments.
isUnused(const Expr * E,AnalysisDeclContext * AC)493 bool IdempotentOperationChecker::isUnused(const Expr *E,
494                                           AnalysisDeclContext *AC) {
495   if (!E)
496     return false;
497 
498   const DeclRefExpr *DR = dyn_cast<DeclRefExpr>(E->IgnoreParenCasts());
499   if (!DR)
500     return false;
501 
502   const VarDecl *VD = dyn_cast<VarDecl>(DR->getDecl());
503   if (!VD)
504     return false;
505 
506   if (AC->getPseudoConstantAnalysis()->wasReferenced(VD))
507     return false;
508 
509   return true;
510 }
511 
512 // Check for self casts truncating/extending a variable
isTruncationExtensionAssignment(const Expr * LHS,const Expr * RHS)513 bool IdempotentOperationChecker::isTruncationExtensionAssignment(
514                                                               const Expr *LHS,
515                                                               const Expr *RHS) {
516 
517   const DeclRefExpr *LHS_DR = dyn_cast<DeclRefExpr>(LHS->IgnoreParenCasts());
518   if (!LHS_DR)
519     return false;
520 
521   const VarDecl *VD = dyn_cast<VarDecl>(LHS_DR->getDecl());
522   if (!VD)
523     return false;
524 
525   const DeclRefExpr *RHS_DR = dyn_cast<DeclRefExpr>(RHS->IgnoreParenCasts());
526   if (!RHS_DR)
527     return false;
528 
529   if (VD != RHS_DR->getDecl())
530      return false;
531 
532   return dyn_cast<DeclRefExpr>(RHS->IgnoreParenLValueCasts()) == NULL;
533 }
534 
535 // Returns false if a path to this block was not completely analyzed, or true
536 // otherwise.
537 bool
pathWasCompletelyAnalyzed(AnalysisDeclContext * AC,const CFGBlock * CB,const CoreEngine & CE)538 IdempotentOperationChecker::pathWasCompletelyAnalyzed(AnalysisDeclContext *AC,
539                                                       const CFGBlock *CB,
540                                                       const CoreEngine &CE) {
541 
542   CFGReverseBlockReachabilityAnalysis *CRA = AC->getCFGReachablityAnalysis();
543 
544   // Test for reachability from any aborted blocks to this block
545   typedef CoreEngine::BlocksExhausted::const_iterator ExhaustedIterator;
546   for (ExhaustedIterator I = CE.blocks_exhausted_begin(),
547       E = CE.blocks_exhausted_end(); I != E; ++I) {
548     const BlockEdge &BE =  I->first;
549 
550     // The destination block on the BlockEdge is the first block that was not
551     // analyzed. If we can reach this block from the aborted block, then this
552     // block was not completely analyzed.
553     //
554     // Also explicitly check if the current block is the destination block.
555     // While technically reachable, it means we aborted the analysis on
556     // a path that included that block.
557     const CFGBlock *destBlock = BE.getDst();
558     if (destBlock == CB || CRA->isReachable(destBlock, CB))
559       return false;
560   }
561 
562   // Test for reachability from blocks we just gave up on.
563   typedef CoreEngine::BlocksAborted::const_iterator AbortedIterator;
564   for (AbortedIterator I = CE.blocks_aborted_begin(),
565        E = CE.blocks_aborted_end(); I != E; ++I) {
566     const CFGBlock *destBlock = I->first;
567     if (destBlock == CB || CRA->isReachable(destBlock, CB))
568       return false;
569   }
570 
571   // For the items still on the worklist, see if they are in blocks that
572   // can eventually reach 'CB'.
573   class VisitWL : public WorkList::Visitor {
574     const CFGStmtMap *CBM;
575     const CFGBlock *TargetBlock;
576     CFGReverseBlockReachabilityAnalysis &CRA;
577   public:
578     VisitWL(const CFGStmtMap *cbm, const CFGBlock *targetBlock,
579             CFGReverseBlockReachabilityAnalysis &cra)
580       : CBM(cbm), TargetBlock(targetBlock), CRA(cra) {}
581     virtual bool visit(const WorkListUnit &U) {
582       ProgramPoint P = U.getNode()->getLocation();
583       const CFGBlock *B = 0;
584       if (StmtPoint *SP = dyn_cast<StmtPoint>(&P)) {
585         B = CBM->getBlock(SP->getStmt());
586       }
587       else if (BlockEdge *BE = dyn_cast<BlockEdge>(&P)) {
588         B = BE->getDst();
589       }
590       else if (BlockEntrance *BEnt = dyn_cast<BlockEntrance>(&P)) {
591         B = BEnt->getBlock();
592       }
593       else if (BlockExit *BExit = dyn_cast<BlockExit>(&P)) {
594         B = BExit->getBlock();
595       }
596       if (!B)
597         return true;
598 
599       return B == TargetBlock || CRA.isReachable(B, TargetBlock);
600     }
601   };
602   VisitWL visitWL(AC->getCFGStmtMap(), CB, *CRA);
603   // Were there any items in the worklist that could potentially reach
604   // this block?
605   if (CE.getWorkList()->visitItemsInWorkList(visitWL))
606     return false;
607 
608   // Verify that this block is reachable from the entry block
609   if (!CRA->isReachable(&AC->getCFG()->getEntry(), CB))
610     return false;
611 
612   // If we get to this point, there is no connection to the entry block or an
613   // aborted block. This path is unreachable and we can report the error.
614   return true;
615 }
616 
617 // Recursive function that determines whether an expression contains any element
618 // that varies. This could be due to a compile-time constant like sizeof. An
619 // expression may also involve a variable that behaves like a constant. The
620 // function returns true if the expression varies, and false otherwise.
CanVary(const Expr * Ex,AnalysisDeclContext * AC)621 bool IdempotentOperationChecker::CanVary(const Expr *Ex,
622                                          AnalysisDeclContext *AC) {
623   // Parentheses and casts are irrelevant here
624   Ex = Ex->IgnoreParenCasts();
625 
626   if (Ex->getLocStart().isMacroID())
627     return false;
628 
629   switch (Ex->getStmtClass()) {
630   // Trivially true cases
631   case Stmt::ArraySubscriptExprClass:
632   case Stmt::MemberExprClass:
633   case Stmt::StmtExprClass:
634   case Stmt::CallExprClass:
635   case Stmt::VAArgExprClass:
636   case Stmt::ShuffleVectorExprClass:
637     return true;
638   default:
639     return true;
640 
641   // Trivially false cases
642   case Stmt::IntegerLiteralClass:
643   case Stmt::CharacterLiteralClass:
644   case Stmt::FloatingLiteralClass:
645   case Stmt::PredefinedExprClass:
646   case Stmt::ImaginaryLiteralClass:
647   case Stmt::StringLiteralClass:
648   case Stmt::OffsetOfExprClass:
649   case Stmt::CompoundLiteralExprClass:
650   case Stmt::AddrLabelExprClass:
651   case Stmt::BinaryTypeTraitExprClass:
652   case Stmt::GNUNullExprClass:
653   case Stmt::InitListExprClass:
654   case Stmt::DesignatedInitExprClass:
655   case Stmt::BlockExprClass:
656     return false;
657 
658   // Cases requiring custom logic
659   case Stmt::UnaryExprOrTypeTraitExprClass: {
660     const UnaryExprOrTypeTraitExpr *SE =
661                        cast<const UnaryExprOrTypeTraitExpr>(Ex);
662     if (SE->getKind() != UETT_SizeOf)
663       return false;
664     return SE->getTypeOfArgument()->isVariableArrayType();
665   }
666   case Stmt::DeclRefExprClass:
667     // Check for constants/pseudoconstants
668     return !isConstantOrPseudoConstant(cast<DeclRefExpr>(Ex), AC);
669 
670   // The next cases require recursion for subexpressions
671   case Stmt::BinaryOperatorClass: {
672     const BinaryOperator *B = cast<const BinaryOperator>(Ex);
673 
674     // Exclude cases involving pointer arithmetic.  These are usually
675     // false positives.
676     if (B->getOpcode() == BO_Sub || B->getOpcode() == BO_Add)
677       if (B->getLHS()->getType()->getAs<PointerType>())
678         return false;
679 
680     return CanVary(B->getRHS(), AC)
681         || CanVary(B->getLHS(), AC);
682    }
683   case Stmt::UnaryOperatorClass: {
684     const UnaryOperator *U = cast<const UnaryOperator>(Ex);
685     // Handle trivial case first
686     switch (U->getOpcode()) {
687     case UO_Extension:
688       return false;
689     default:
690       return CanVary(U->getSubExpr(), AC);
691     }
692   }
693   case Stmt::ChooseExprClass:
694     return CanVary(cast<const ChooseExpr>(Ex)->getChosenSubExpr(
695         AC->getASTContext()), AC);
696   case Stmt::ConditionalOperatorClass:
697   case Stmt::BinaryConditionalOperatorClass:
698     return CanVary(cast<AbstractConditionalOperator>(Ex)->getCond(), AC);
699   }
700 }
701 
702 // Returns true if a DeclRefExpr is or behaves like a constant.
isConstantOrPseudoConstant(const DeclRefExpr * DR,AnalysisDeclContext * AC)703 bool IdempotentOperationChecker::isConstantOrPseudoConstant(
704                                                           const DeclRefExpr *DR,
705                                                           AnalysisDeclContext *AC) {
706   // Check if the type of the Decl is const-qualified
707   if (DR->getType().isConstQualified())
708     return true;
709 
710   // Check for an enum
711   if (isa<EnumConstantDecl>(DR->getDecl()))
712     return true;
713 
714   const VarDecl *VD = dyn_cast<VarDecl>(DR->getDecl());
715   if (!VD)
716     return true;
717 
718   // Check if the Decl behaves like a constant. This check also takes care of
719   // static variables, which can only change between function calls if they are
720   // modified in the AST.
721   PseudoConstantAnalysis *PCA = AC->getPseudoConstantAnalysis();
722   if (PCA->isPseudoConstant(VD))
723     return true;
724 
725   return false;
726 }
727 
728 // Recursively find any substatements containing VarDecl's with storage other
729 // than local
containsNonLocalVarDecl(const Stmt * S)730 bool IdempotentOperationChecker::containsNonLocalVarDecl(const Stmt *S) {
731   const DeclRefExpr *DR = dyn_cast<DeclRefExpr>(S);
732 
733   if (DR)
734     if (const VarDecl *VD = dyn_cast<VarDecl>(DR->getDecl()))
735       if (!VD->hasLocalStorage())
736         return true;
737 
738   for (Stmt::const_child_iterator I = S->child_begin(); I != S->child_end();
739       ++I)
740     if (const Stmt *child = *I)
741       if (containsNonLocalVarDecl(child))
742         return true;
743 
744   return false;
745 }
746 
747 
registerIdempotentOperationChecker(CheckerManager & mgr)748 void ento::registerIdempotentOperationChecker(CheckerManager &mgr) {
749   mgr.registerChecker<IdempotentOperationChecker>();
750 }
751