CheckerManager.cpp revision af498a28797c075c48d7e943df5f5a8e78ed8eb0
1//===--- CheckerManager.cpp - Static Analyzer Checker Manager -------------===//
2//
3//                     The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// Defines the Static Analyzer Checker Manager.
11//
12//===----------------------------------------------------------------------===//
13
14#include "clang/StaticAnalyzer/Core/CheckerManager.h"
15#include "clang/StaticAnalyzer/Core/Checker.h"
16#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
17#include "clang/StaticAnalyzer/Core/PathSensitive/ObjCMessage.h"
18#include "clang/Analysis/ProgramPoint.h"
19#include "clang/AST/DeclBase.h"
20
21using namespace clang;
22using namespace ento;
23
24bool CheckerManager::hasPathSensitiveCheckers() const {
25  return !StmtCheckers.empty()              ||
26         !PreObjCMessageCheckers.empty()    ||
27         !PostObjCMessageCheckers.empty()   ||
28         !LocationCheckers.empty()          ||
29         !BindCheckers.empty()              ||
30         !EndAnalysisCheckers.empty()       ||
31         !EndPathCheckers.empty()           ||
32         !BranchConditionCheckers.empty()   ||
33         !LiveSymbolsCheckers.empty()       ||
34         !DeadSymbolsCheckers.empty()       ||
35         !RegionChangesCheckers.empty()     ||
36         !EvalAssumeCheckers.empty()        ||
37         !EvalCallCheckers.empty()          ||
38         !InlineCallCheckers.empty();
39}
40
41void CheckerManager::finishedCheckerRegistration() {
42#ifndef NDEBUG
43  // Make sure that for every event that has listeners, there is at least
44  // one dispatcher registered for it.
45  for (llvm::DenseMap<EventTag, EventInfo>::iterator
46         I = Events.begin(), E = Events.end(); I != E; ++I)
47    assert(I->second.HasDispatcher && "No dispatcher registered for an event");
48#endif
49}
50
51//===----------------------------------------------------------------------===//
52// Functions for running checkers for AST traversing..
53//===----------------------------------------------------------------------===//
54
55void CheckerManager::runCheckersOnASTDecl(const Decl *D, AnalysisManager& mgr,
56                                          BugReporter &BR) {
57  assert(D);
58
59  unsigned DeclKind = D->getKind();
60  CachedDeclCheckers *checkers = 0;
61  CachedDeclCheckersMapTy::iterator CCI = CachedDeclCheckersMap.find(DeclKind);
62  if (CCI != CachedDeclCheckersMap.end()) {
63    checkers = &(CCI->second);
64  } else {
65    // Find the checkers that should run for this Decl and cache them.
66    checkers = &CachedDeclCheckersMap[DeclKind];
67    for (unsigned i = 0, e = DeclCheckers.size(); i != e; ++i) {
68      DeclCheckerInfo &info = DeclCheckers[i];
69      if (info.IsForDeclFn(D))
70        checkers->push_back(info.CheckFn);
71    }
72  }
73
74  assert(checkers);
75  for (CachedDeclCheckers::iterator
76         I = checkers->begin(), E = checkers->end(); I != E; ++I)
77    (*I)(D, mgr, BR);
78}
79
80void CheckerManager::runCheckersOnASTBody(const Decl *D, AnalysisManager& mgr,
81                                          BugReporter &BR) {
82  assert(D && D->hasBody());
83
84  for (unsigned i = 0, e = BodyCheckers.size(); i != e; ++i)
85    BodyCheckers[i](D, mgr, BR);
86}
87
88//===----------------------------------------------------------------------===//
89// Functions for running checkers for path-sensitive checking.
90//===----------------------------------------------------------------------===//
91
92template <typename CHECK_CTX>
93static void expandGraphWithCheckers(CHECK_CTX checkCtx,
94                                    ExplodedNodeSet &Dst,
95                                    const ExplodedNodeSet &Src) {
96  const NodeBuilderContext &BldrCtx = checkCtx.Eng.getBuilderContext();
97  if (Src.empty())
98    return;
99
100  typename CHECK_CTX::CheckersTy::const_iterator
101      I = checkCtx.checkers_begin(), E = checkCtx.checkers_end();
102  if (I == E) {
103    Dst.insert(Src);
104    return;
105  }
106
107  ExplodedNodeSet Tmp1, Tmp2;
108  const ExplodedNodeSet *PrevSet = &Src;
109
110  for (; I != E; ++I) {
111    ExplodedNodeSet *CurrSet = 0;
112    if (I+1 == E)
113      CurrSet = &Dst;
114    else {
115      CurrSet = (PrevSet == &Tmp1) ? &Tmp2 : &Tmp1;
116      CurrSet->clear();
117    }
118
119    NodeBuilder B(*PrevSet, *CurrSet, BldrCtx);
120    for (ExplodedNodeSet::iterator NI = PrevSet->begin(), NE = PrevSet->end();
121         NI != NE; ++NI) {
122      checkCtx.runChecker(*I, B, *NI);
123    }
124
125    // If all the produced transitions are sinks, stop.
126    if (CurrSet->empty())
127      return;
128
129    // Update which NodeSet is the current one.
130    PrevSet = CurrSet;
131  }
132}
133
134namespace {
135  struct CheckStmtContext {
136    typedef SmallVectorImpl<CheckerManager::CheckStmtFunc> CheckersTy;
137    bool IsPreVisit;
138    const CheckersTy &Checkers;
139    const Stmt *S;
140    ExprEngine &Eng;
141
142    CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
143    CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
144
145    CheckStmtContext(bool isPreVisit, const CheckersTy &checkers,
146                     const Stmt *s, ExprEngine &eng)
147      : IsPreVisit(isPreVisit), Checkers(checkers), S(s), Eng(eng) { }
148
149    void runChecker(CheckerManager::CheckStmtFunc checkFn,
150                    NodeBuilder &Bldr, ExplodedNode *Pred) {
151      // FIXME: Remove respondsToCallback from CheckerContext;
152      ProgramPoint::Kind K =  IsPreVisit ? ProgramPoint::PreStmtKind :
153                                           ProgramPoint::PostStmtKind;
154      const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K,
155                                Pred->getLocationContext(), checkFn.Checker);
156      CheckerContext C(Bldr, Eng, Pred, L, 0);
157
158      checkFn(S, C);
159    }
160  };
161}
162
163/// \brief Run checkers for visiting Stmts.
164void CheckerManager::runCheckersForStmt(bool isPreVisit,
165                                        ExplodedNodeSet &Dst,
166                                        const ExplodedNodeSet &Src,
167                                        const Stmt *S,
168                                        ExprEngine &Eng) {
169  CheckStmtContext C(isPreVisit, *getCachedStmtCheckersFor(S, isPreVisit),
170                     S, Eng);
171  expandGraphWithCheckers(C, Dst, Src);
172}
173
174namespace {
175  struct CheckObjCMessageContext {
176    typedef std::vector<CheckerManager::CheckObjCMessageFunc> CheckersTy;
177    bool IsPreVisit;
178    const CheckersTy &Checkers;
179    const ObjCMessage &Msg;
180    ExprEngine &Eng;
181
182    CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
183    CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
184
185    CheckObjCMessageContext(bool isPreVisit, const CheckersTy &checkers,
186                            const ObjCMessage &msg, ExprEngine &eng)
187      : IsPreVisit(isPreVisit), Checkers(checkers), Msg(msg), Eng(eng) { }
188
189    void runChecker(CheckerManager::CheckObjCMessageFunc checkFn,
190                    NodeBuilder &Bldr, ExplodedNode *Pred) {
191      ProgramPoint::Kind K =  IsPreVisit ? ProgramPoint::PreStmtKind :
192                                           ProgramPoint::PostStmtKind;
193      const ProgramPoint &L = ProgramPoint::getProgramPoint(Msg.getOriginExpr(),
194                                K, Pred->getLocationContext(), checkFn.Checker);
195      CheckerContext C(Bldr, Eng, Pred, L, 0);
196
197      checkFn(Msg, C);
198    }
199  };
200}
201
202/// \brief Run checkers for visiting obj-c messages.
203void CheckerManager::runCheckersForObjCMessage(bool isPreVisit,
204                                               ExplodedNodeSet &Dst,
205                                               const ExplodedNodeSet &Src,
206                                               const ObjCMessage &msg,
207                                               ExprEngine &Eng) {
208  CheckObjCMessageContext C(isPreVisit,
209                            isPreVisit ? PreObjCMessageCheckers
210                                       : PostObjCMessageCheckers,
211                            msg, Eng);
212  expandGraphWithCheckers(C, Dst, Src);
213}
214
215namespace {
216  struct CheckLocationContext {
217    typedef std::vector<CheckerManager::CheckLocationFunc> CheckersTy;
218    const CheckersTy &Checkers;
219    SVal Loc;
220    bool IsLoad;
221    const Stmt *S;
222    ExprEngine &Eng;
223
224    CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
225    CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
226
227    CheckLocationContext(const CheckersTy &checkers,
228                         SVal loc, bool isLoad, const Stmt *s, ExprEngine &eng)
229      : Checkers(checkers), Loc(loc), IsLoad(isLoad), S(s), Eng(eng) { }
230
231    void runChecker(CheckerManager::CheckLocationFunc checkFn,
232                    NodeBuilder &Bldr, ExplodedNode *Pred) {
233      ProgramPoint::Kind K =  IsLoad ? ProgramPoint::PreLoadKind :
234                                       ProgramPoint::PreStoreKind;
235      const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K,
236                                Pred->getLocationContext(), checkFn.Checker);
237      CheckerContext C(Bldr, Eng, Pred, L, 0);
238
239      checkFn(Loc, IsLoad, S, C);
240    }
241  };
242}
243
244/// \brief Run checkers for load/store of a location.
245
246void CheckerManager::runCheckersForLocation(ExplodedNodeSet &Dst,
247                                            const ExplodedNodeSet &Src,
248                                            SVal location, bool isLoad,
249                                            const Stmt *S, ExprEngine &Eng) {
250  CheckLocationContext C(LocationCheckers, location, isLoad, S, Eng);
251  expandGraphWithCheckers(C, Dst, Src);
252}
253
254namespace {
255  struct CheckBindContext {
256    typedef std::vector<CheckerManager::CheckBindFunc> CheckersTy;
257    const CheckersTy &Checkers;
258    SVal Loc;
259    SVal Val;
260    const Stmt *S;
261    ExprEngine &Eng;
262    ProgramPoint::Kind PointKind;
263
264    CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
265    CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
266
267    CheckBindContext(const CheckersTy &checkers,
268                     SVal loc, SVal val, const Stmt *s, ExprEngine &eng,
269                     ProgramPoint::Kind PK)
270      : Checkers(checkers), Loc(loc), Val(val), S(s), Eng(eng), PointKind(PK) {}
271
272    void runChecker(CheckerManager::CheckBindFunc checkFn,
273                    NodeBuilder &Bldr, ExplodedNode *Pred) {
274      const ProgramPoint &L = ProgramPoint::getProgramPoint(S, PointKind,
275                                Pred->getLocationContext(), checkFn.Checker);
276      CheckerContext C(Bldr, Eng, Pred, L, 0);
277
278      checkFn(Loc, Val, S, C);
279    }
280  };
281}
282
283/// \brief Run checkers for binding of a value to a location.
284void CheckerManager::runCheckersForBind(ExplodedNodeSet &Dst,
285                                        const ExplodedNodeSet &Src,
286                                        SVal location, SVal val,
287                                        const Stmt *S, ExprEngine &Eng,
288                                        ProgramPoint::Kind PointKind) {
289  CheckBindContext C(BindCheckers, location, val, S, Eng, PointKind);
290  expandGraphWithCheckers(C, Dst, Src);
291}
292
293void CheckerManager::runCheckersForEndAnalysis(ExplodedGraph &G,
294                                               BugReporter &BR,
295                                               ExprEngine &Eng) {
296  for (unsigned i = 0, e = EndAnalysisCheckers.size(); i != e; ++i)
297    EndAnalysisCheckers[i](G, BR, Eng);
298}
299
300/// \brief Run checkers for end of path.
301// Note, We do not chain the checker output (like in expandGraphWithCheckers)
302// for this callback since end of path nodes are expected to be final.
303void CheckerManager::runCheckersForEndPath(NodeBuilderContext &BC,
304                                           ExplodedNodeSet &Dst,
305                                           ExprEngine &Eng) {
306  ExplodedNode *Pred = BC.Pred;
307
308  // We define the builder outside of the loop bacause if at least one checkers
309  // creates a sucsessor for Pred, we do not need to generate an
310  // autotransition for it.
311  NodeBuilder Bldr(Pred, Dst, BC);
312  for (unsigned i = 0, e = EndPathCheckers.size(); i != e; ++i) {
313    CheckEndPathFunc checkFn = EndPathCheckers[i];
314
315    const ProgramPoint &L = BlockEntrance(BC.Block,
316                                          Pred->getLocationContext(),
317                                          checkFn.Checker);
318    CheckerContext C(Bldr, Eng, Pred, L, 0);
319    checkFn(C);
320  }
321}
322
323/// \brief Run checkers for branch condition.
324void CheckerManager::runCheckersForBranchCondition(const Stmt *condition,
325                                                   NodeBuilder &B,
326                                                   ExplodedNode *Pred,
327                                                   ExprEngine &Eng) {
328  for (unsigned i = 0, e = BranchConditionCheckers.size(); i != e; ++i) {
329    CheckBranchConditionFunc fn = BranchConditionCheckers[i];
330    fn(condition, B, Pred, Eng);
331  }
332}
333
334/// \brief Run checkers for live symbols.
335void CheckerManager::runCheckersForLiveSymbols(const ProgramState *state,
336                                               SymbolReaper &SymReaper) {
337  for (unsigned i = 0, e = LiveSymbolsCheckers.size(); i != e; ++i)
338    LiveSymbolsCheckers[i](state, SymReaper);
339}
340
341namespace {
342  struct CheckDeadSymbolsContext {
343    typedef std::vector<CheckerManager::CheckDeadSymbolsFunc> CheckersTy;
344    const CheckersTy &Checkers;
345    SymbolReaper &SR;
346    const Stmt *S;
347    ExprEngine &Eng;
348
349    CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); }
350    CheckersTy::const_iterator checkers_end() { return Checkers.end(); }
351
352    CheckDeadSymbolsContext(const CheckersTy &checkers, SymbolReaper &sr,
353                            const Stmt *s, ExprEngine &eng)
354      : Checkers(checkers), SR(sr), S(s), Eng(eng) { }
355
356    void runChecker(CheckerManager::CheckDeadSymbolsFunc checkFn,
357                    NodeBuilder &Bldr, ExplodedNode *Pred) {
358      ProgramPoint::Kind K = ProgramPoint::PostPurgeDeadSymbolsKind;
359      const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K,
360                                Pred->getLocationContext(), checkFn.Checker);
361      CheckerContext C(Bldr, Eng, Pred, L, 0);
362
363      checkFn(SR, C);
364    }
365  };
366}
367
368/// \brief Run checkers for dead symbols.
369void CheckerManager::runCheckersForDeadSymbols(ExplodedNodeSet &Dst,
370                                               const ExplodedNodeSet &Src,
371                                               SymbolReaper &SymReaper,
372                                               const Stmt *S,
373                                               ExprEngine &Eng) {
374  CheckDeadSymbolsContext C(DeadSymbolsCheckers, SymReaper, S, Eng);
375  expandGraphWithCheckers(C, Dst, Src);
376}
377
378/// \brief True if at least one checker wants to check region changes.
379bool CheckerManager::wantsRegionChangeUpdate(const ProgramState *state) {
380  for (unsigned i = 0, e = RegionChangesCheckers.size(); i != e; ++i)
381    if (RegionChangesCheckers[i].WantUpdateFn(state))
382      return true;
383
384  return false;
385}
386
387/// \brief Run checkers for region changes.
388const ProgramState *
389CheckerManager::runCheckersForRegionChanges(const ProgramState *state,
390                            const StoreManager::InvalidatedSymbols *invalidated,
391                                    ArrayRef<const MemRegion *> ExplicitRegions,
392                                          ArrayRef<const MemRegion *> Regions) {
393  for (unsigned i = 0, e = RegionChangesCheckers.size(); i != e; ++i) {
394    // If any checker declares the state infeasible (or if it starts that way),
395    // bail out.
396    if (!state)
397      return NULL;
398    state = RegionChangesCheckers[i].CheckFn(state, invalidated,
399                                             ExplicitRegions, Regions);
400  }
401  return state;
402}
403
404/// \brief Run checkers for handling assumptions on symbolic values.
405const ProgramState *
406CheckerManager::runCheckersForEvalAssume(const ProgramState *state,
407                                         SVal Cond, bool Assumption) {
408  for (unsigned i = 0, e = EvalAssumeCheckers.size(); i != e; ++i) {
409    // If any checker declares the state infeasible (or if it starts that way),
410    // bail out.
411    if (!state)
412      return NULL;
413    state = EvalAssumeCheckers[i](state, Cond, Assumption);
414  }
415  return state;
416}
417
418/// \brief Run checkers for evaluating a call.
419/// Only one checker will evaluate the call.
420void CheckerManager::runCheckersForEvalCall(ExplodedNodeSet &Dst,
421                                            const ExplodedNodeSet &Src,
422                                            const CallExpr *CE,
423                                            ExprEngine &Eng,
424                                            GraphExpander *defaultEval) {
425  if (EvalCallCheckers.empty()   &&
426      InlineCallCheckers.empty() &&
427      defaultEval == 0) {
428    Dst.insert(Src);
429    return;
430  }
431
432  for (ExplodedNodeSet::iterator
433         NI = Src.begin(), NE = Src.end(); NI != NE; ++NI) {
434
435    ExplodedNode *Pred = *NI;
436    bool anyEvaluated = false;
437
438    // First, check if any of the InlineCall callbacks can evaluate the call.
439    assert(InlineCallCheckers.size() <= 1 &&
440           "InlineCall is a special hacky callback to allow intrusive"
441           "evaluation of the call (which simulates inlining). It is "
442           "currently only used by OSAtomicChecker and should go away "
443           "at some point.");
444    for (std::vector<InlineCallFunc>::iterator
445           EI = InlineCallCheckers.begin(), EE = InlineCallCheckers.end();
446         EI != EE; ++EI) {
447      ExplodedNodeSet checkDst;
448      bool evaluated = (*EI)(CE, Eng, Pred, checkDst);
449      assert(!(evaluated && anyEvaluated)
450             && "There are more than one checkers evaluating the call");
451      if (evaluated) {
452        anyEvaluated = true;
453        Dst.insert(checkDst);
454#ifdef NDEBUG
455        break; // on release don't check that no other checker also evals.
456#endif
457      }
458    }
459
460#ifdef NDEBUG // on release don't check that no other checker also evals.
461    if (anyEvaluated) {
462      break;
463    }
464#endif
465
466    ExplodedNodeSet checkDst;
467    NodeBuilder B(Pred, checkDst, Eng.getBuilderContext());
468    // Next, check if any of the EvalCall callbacks can evaluate the call.
469    for (std::vector<EvalCallFunc>::iterator
470           EI = EvalCallCheckers.begin(), EE = EvalCallCheckers.end();
471         EI != EE; ++EI) {
472      ProgramPoint::Kind K = ProgramPoint::PostStmtKind;
473      const ProgramPoint &L = ProgramPoint::getProgramPoint(CE, K,
474                                Pred->getLocationContext(), EI->Checker);
475      bool evaluated = false;
476      { // CheckerContext generates transitions(populates checkDest) on
477        // destruction, so introduce the scope to make sure it gets properly
478        // populated.
479        CheckerContext C(B, Eng, Pred, L, 0);
480        evaluated = (*EI)(CE, C);
481      }
482      assert(!(evaluated && anyEvaluated)
483             && "There are more than one checkers evaluating the call");
484      if (evaluated) {
485        anyEvaluated = true;
486        Dst.insert(checkDst);
487#ifdef NDEBUG
488        break; // on release don't check that no other checker also evals.
489#endif
490      }
491    }
492
493    // If none of the checkers evaluated the call, ask ExprEngine to handle it.
494    if (!anyEvaluated) {
495      if (defaultEval)
496        defaultEval->expandGraph(Dst, Pred);
497      else
498        Dst.insert(Pred);
499    }
500  }
501}
502
503/// \brief Run checkers for the entire Translation Unit.
504void CheckerManager::runCheckersOnEndOfTranslationUnit(
505                                                  const TranslationUnitDecl *TU,
506                                                  AnalysisManager &mgr,
507                                                  BugReporter &BR) {
508  for (unsigned i = 0, e = EndOfTranslationUnitCheckers.size(); i != e; ++i)
509    EndOfTranslationUnitCheckers[i](TU, mgr, BR);
510}
511
512void CheckerManager::runCheckersForPrintState(raw_ostream &Out,
513                                              const ProgramState *State,
514                                              const char *NL, const char *Sep) {
515  for (llvm::DenseMap<CheckerTag, CheckerRef>::iterator
516        I = CheckerTags.begin(), E = CheckerTags.end(); I != E; ++I)
517    I->second->printState(Out, State, NL, Sep);
518}
519
520//===----------------------------------------------------------------------===//
521// Internal registration functions for AST traversing.
522//===----------------------------------------------------------------------===//
523
524void CheckerManager::_registerForDecl(CheckDeclFunc checkfn,
525                                      HandlesDeclFunc isForDeclFn) {
526  DeclCheckerInfo info = { checkfn, isForDeclFn };
527  DeclCheckers.push_back(info);
528}
529
530void CheckerManager::_registerForBody(CheckDeclFunc checkfn) {
531  BodyCheckers.push_back(checkfn);
532}
533
534//===----------------------------------------------------------------------===//
535// Internal registration functions for path-sensitive checking.
536//===----------------------------------------------------------------------===//
537
538void CheckerManager::_registerForPreStmt(CheckStmtFunc checkfn,
539                                         HandlesStmtFunc isForStmtFn) {
540  StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/true };
541  StmtCheckers.push_back(info);
542}
543void CheckerManager::_registerForPostStmt(CheckStmtFunc checkfn,
544                                          HandlesStmtFunc isForStmtFn) {
545  StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/false };
546  StmtCheckers.push_back(info);
547}
548
549void CheckerManager::_registerForPreObjCMessage(CheckObjCMessageFunc checkfn) {
550  PreObjCMessageCheckers.push_back(checkfn);
551}
552void CheckerManager::_registerForPostObjCMessage(CheckObjCMessageFunc checkfn) {
553  PostObjCMessageCheckers.push_back(checkfn);
554}
555
556void CheckerManager::_registerForLocation(CheckLocationFunc checkfn) {
557  LocationCheckers.push_back(checkfn);
558}
559
560void CheckerManager::_registerForBind(CheckBindFunc checkfn) {
561  BindCheckers.push_back(checkfn);
562}
563
564void CheckerManager::_registerForEndAnalysis(CheckEndAnalysisFunc checkfn) {
565  EndAnalysisCheckers.push_back(checkfn);
566}
567
568void CheckerManager::_registerForEndPath(CheckEndPathFunc checkfn) {
569  EndPathCheckers.push_back(checkfn);
570}
571
572void CheckerManager::_registerForBranchCondition(
573                                             CheckBranchConditionFunc checkfn) {
574  BranchConditionCheckers.push_back(checkfn);
575}
576
577void CheckerManager::_registerForLiveSymbols(CheckLiveSymbolsFunc checkfn) {
578  LiveSymbolsCheckers.push_back(checkfn);
579}
580
581void CheckerManager::_registerForDeadSymbols(CheckDeadSymbolsFunc checkfn) {
582  DeadSymbolsCheckers.push_back(checkfn);
583}
584
585void CheckerManager::_registerForRegionChanges(CheckRegionChangesFunc checkfn,
586                                     WantsRegionChangeUpdateFunc wantUpdateFn) {
587  RegionChangesCheckerInfo info = {checkfn, wantUpdateFn};
588  RegionChangesCheckers.push_back(info);
589}
590
591void CheckerManager::_registerForEvalAssume(EvalAssumeFunc checkfn) {
592  EvalAssumeCheckers.push_back(checkfn);
593}
594
595void CheckerManager::_registerForEvalCall(EvalCallFunc checkfn) {
596  EvalCallCheckers.push_back(checkfn);
597}
598
599void CheckerManager::_registerForInlineCall(InlineCallFunc checkfn) {
600  InlineCallCheckers.push_back(checkfn);
601}
602
603void CheckerManager::_registerForEndOfTranslationUnit(
604                                            CheckEndOfTranslationUnit checkfn) {
605  EndOfTranslationUnitCheckers.push_back(checkfn);
606}
607
608//===----------------------------------------------------------------------===//
609// Implementation details.
610//===----------------------------------------------------------------------===//
611
612CheckerManager::CachedStmtCheckers *
613CheckerManager::getCachedStmtCheckersFor(const Stmt *S, bool isPreVisit) {
614  assert(S);
615
616  CachedStmtCheckersKey key(S->getStmtClass(), isPreVisit);
617  CachedStmtCheckers *checkers = 0;
618  CachedStmtCheckersMapTy::iterator CCI = CachedStmtCheckersMap.find(key);
619  if (CCI != CachedStmtCheckersMap.end()) {
620    checkers = &(CCI->second);
621  } else {
622    // Find the checkers that should run for this Stmt and cache them.
623    checkers = &CachedStmtCheckersMap[key];
624    for (unsigned i = 0, e = StmtCheckers.size(); i != e; ++i) {
625      StmtCheckerInfo &info = StmtCheckers[i];
626      if (info.IsPreVisit == isPreVisit && info.IsForStmtFn(S))
627        checkers->push_back(info.CheckFn);
628    }
629  }
630
631  assert(checkers);
632  return checkers;
633}
634
635CheckerManager::~CheckerManager() {
636  for (unsigned i = 0, e = CheckerDtors.size(); i != e; ++i)
637    CheckerDtors[i]();
638}
639
640// Anchor for the vtable.
641GraphExpander::~GraphExpander() { }
642