CheckerManager.cpp revision af498a28797c075c48d7e943df5f5a8e78ed8eb0
1//===--- CheckerManager.cpp - Static Analyzer Checker Manager -------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// Defines the Static Analyzer Checker Manager. 11// 12//===----------------------------------------------------------------------===// 13 14#include "clang/StaticAnalyzer/Core/CheckerManager.h" 15#include "clang/StaticAnalyzer/Core/Checker.h" 16#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h" 17#include "clang/StaticAnalyzer/Core/PathSensitive/ObjCMessage.h" 18#include "clang/Analysis/ProgramPoint.h" 19#include "clang/AST/DeclBase.h" 20 21using namespace clang; 22using namespace ento; 23 24bool CheckerManager::hasPathSensitiveCheckers() const { 25 return !StmtCheckers.empty() || 26 !PreObjCMessageCheckers.empty() || 27 !PostObjCMessageCheckers.empty() || 28 !LocationCheckers.empty() || 29 !BindCheckers.empty() || 30 !EndAnalysisCheckers.empty() || 31 !EndPathCheckers.empty() || 32 !BranchConditionCheckers.empty() || 33 !LiveSymbolsCheckers.empty() || 34 !DeadSymbolsCheckers.empty() || 35 !RegionChangesCheckers.empty() || 36 !EvalAssumeCheckers.empty() || 37 !EvalCallCheckers.empty() || 38 !InlineCallCheckers.empty(); 39} 40 41void CheckerManager::finishedCheckerRegistration() { 42#ifndef NDEBUG 43 // Make sure that for every event that has listeners, there is at least 44 // one dispatcher registered for it. 45 for (llvm::DenseMap<EventTag, EventInfo>::iterator 46 I = Events.begin(), E = Events.end(); I != E; ++I) 47 assert(I->second.HasDispatcher && "No dispatcher registered for an event"); 48#endif 49} 50 51//===----------------------------------------------------------------------===// 52// Functions for running checkers for AST traversing.. 53//===----------------------------------------------------------------------===// 54 55void CheckerManager::runCheckersOnASTDecl(const Decl *D, AnalysisManager& mgr, 56 BugReporter &BR) { 57 assert(D); 58 59 unsigned DeclKind = D->getKind(); 60 CachedDeclCheckers *checkers = 0; 61 CachedDeclCheckersMapTy::iterator CCI = CachedDeclCheckersMap.find(DeclKind); 62 if (CCI != CachedDeclCheckersMap.end()) { 63 checkers = &(CCI->second); 64 } else { 65 // Find the checkers that should run for this Decl and cache them. 66 checkers = &CachedDeclCheckersMap[DeclKind]; 67 for (unsigned i = 0, e = DeclCheckers.size(); i != e; ++i) { 68 DeclCheckerInfo &info = DeclCheckers[i]; 69 if (info.IsForDeclFn(D)) 70 checkers->push_back(info.CheckFn); 71 } 72 } 73 74 assert(checkers); 75 for (CachedDeclCheckers::iterator 76 I = checkers->begin(), E = checkers->end(); I != E; ++I) 77 (*I)(D, mgr, BR); 78} 79 80void CheckerManager::runCheckersOnASTBody(const Decl *D, AnalysisManager& mgr, 81 BugReporter &BR) { 82 assert(D && D->hasBody()); 83 84 for (unsigned i = 0, e = BodyCheckers.size(); i != e; ++i) 85 BodyCheckers[i](D, mgr, BR); 86} 87 88//===----------------------------------------------------------------------===// 89// Functions for running checkers for path-sensitive checking. 90//===----------------------------------------------------------------------===// 91 92template <typename CHECK_CTX> 93static void expandGraphWithCheckers(CHECK_CTX checkCtx, 94 ExplodedNodeSet &Dst, 95 const ExplodedNodeSet &Src) { 96 const NodeBuilderContext &BldrCtx = checkCtx.Eng.getBuilderContext(); 97 if (Src.empty()) 98 return; 99 100 typename CHECK_CTX::CheckersTy::const_iterator 101 I = checkCtx.checkers_begin(), E = checkCtx.checkers_end(); 102 if (I == E) { 103 Dst.insert(Src); 104 return; 105 } 106 107 ExplodedNodeSet Tmp1, Tmp2; 108 const ExplodedNodeSet *PrevSet = &Src; 109 110 for (; I != E; ++I) { 111 ExplodedNodeSet *CurrSet = 0; 112 if (I+1 == E) 113 CurrSet = &Dst; 114 else { 115 CurrSet = (PrevSet == &Tmp1) ? &Tmp2 : &Tmp1; 116 CurrSet->clear(); 117 } 118 119 NodeBuilder B(*PrevSet, *CurrSet, BldrCtx); 120 for (ExplodedNodeSet::iterator NI = PrevSet->begin(), NE = PrevSet->end(); 121 NI != NE; ++NI) { 122 checkCtx.runChecker(*I, B, *NI); 123 } 124 125 // If all the produced transitions are sinks, stop. 126 if (CurrSet->empty()) 127 return; 128 129 // Update which NodeSet is the current one. 130 PrevSet = CurrSet; 131 } 132} 133 134namespace { 135 struct CheckStmtContext { 136 typedef SmallVectorImpl<CheckerManager::CheckStmtFunc> CheckersTy; 137 bool IsPreVisit; 138 const CheckersTy &Checkers; 139 const Stmt *S; 140 ExprEngine &Eng; 141 142 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); } 143 CheckersTy::const_iterator checkers_end() { return Checkers.end(); } 144 145 CheckStmtContext(bool isPreVisit, const CheckersTy &checkers, 146 const Stmt *s, ExprEngine &eng) 147 : IsPreVisit(isPreVisit), Checkers(checkers), S(s), Eng(eng) { } 148 149 void runChecker(CheckerManager::CheckStmtFunc checkFn, 150 NodeBuilder &Bldr, ExplodedNode *Pred) { 151 // FIXME: Remove respondsToCallback from CheckerContext; 152 ProgramPoint::Kind K = IsPreVisit ? ProgramPoint::PreStmtKind : 153 ProgramPoint::PostStmtKind; 154 const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K, 155 Pred->getLocationContext(), checkFn.Checker); 156 CheckerContext C(Bldr, Eng, Pred, L, 0); 157 158 checkFn(S, C); 159 } 160 }; 161} 162 163/// \brief Run checkers for visiting Stmts. 164void CheckerManager::runCheckersForStmt(bool isPreVisit, 165 ExplodedNodeSet &Dst, 166 const ExplodedNodeSet &Src, 167 const Stmt *S, 168 ExprEngine &Eng) { 169 CheckStmtContext C(isPreVisit, *getCachedStmtCheckersFor(S, isPreVisit), 170 S, Eng); 171 expandGraphWithCheckers(C, Dst, Src); 172} 173 174namespace { 175 struct CheckObjCMessageContext { 176 typedef std::vector<CheckerManager::CheckObjCMessageFunc> CheckersTy; 177 bool IsPreVisit; 178 const CheckersTy &Checkers; 179 const ObjCMessage &Msg; 180 ExprEngine &Eng; 181 182 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); } 183 CheckersTy::const_iterator checkers_end() { return Checkers.end(); } 184 185 CheckObjCMessageContext(bool isPreVisit, const CheckersTy &checkers, 186 const ObjCMessage &msg, ExprEngine &eng) 187 : IsPreVisit(isPreVisit), Checkers(checkers), Msg(msg), Eng(eng) { } 188 189 void runChecker(CheckerManager::CheckObjCMessageFunc checkFn, 190 NodeBuilder &Bldr, ExplodedNode *Pred) { 191 ProgramPoint::Kind K = IsPreVisit ? ProgramPoint::PreStmtKind : 192 ProgramPoint::PostStmtKind; 193 const ProgramPoint &L = ProgramPoint::getProgramPoint(Msg.getOriginExpr(), 194 K, Pred->getLocationContext(), checkFn.Checker); 195 CheckerContext C(Bldr, Eng, Pred, L, 0); 196 197 checkFn(Msg, C); 198 } 199 }; 200} 201 202/// \brief Run checkers for visiting obj-c messages. 203void CheckerManager::runCheckersForObjCMessage(bool isPreVisit, 204 ExplodedNodeSet &Dst, 205 const ExplodedNodeSet &Src, 206 const ObjCMessage &msg, 207 ExprEngine &Eng) { 208 CheckObjCMessageContext C(isPreVisit, 209 isPreVisit ? PreObjCMessageCheckers 210 : PostObjCMessageCheckers, 211 msg, Eng); 212 expandGraphWithCheckers(C, Dst, Src); 213} 214 215namespace { 216 struct CheckLocationContext { 217 typedef std::vector<CheckerManager::CheckLocationFunc> CheckersTy; 218 const CheckersTy &Checkers; 219 SVal Loc; 220 bool IsLoad; 221 const Stmt *S; 222 ExprEngine &Eng; 223 224 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); } 225 CheckersTy::const_iterator checkers_end() { return Checkers.end(); } 226 227 CheckLocationContext(const CheckersTy &checkers, 228 SVal loc, bool isLoad, const Stmt *s, ExprEngine &eng) 229 : Checkers(checkers), Loc(loc), IsLoad(isLoad), S(s), Eng(eng) { } 230 231 void runChecker(CheckerManager::CheckLocationFunc checkFn, 232 NodeBuilder &Bldr, ExplodedNode *Pred) { 233 ProgramPoint::Kind K = IsLoad ? ProgramPoint::PreLoadKind : 234 ProgramPoint::PreStoreKind; 235 const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K, 236 Pred->getLocationContext(), checkFn.Checker); 237 CheckerContext C(Bldr, Eng, Pred, L, 0); 238 239 checkFn(Loc, IsLoad, S, C); 240 } 241 }; 242} 243 244/// \brief Run checkers for load/store of a location. 245 246void CheckerManager::runCheckersForLocation(ExplodedNodeSet &Dst, 247 const ExplodedNodeSet &Src, 248 SVal location, bool isLoad, 249 const Stmt *S, ExprEngine &Eng) { 250 CheckLocationContext C(LocationCheckers, location, isLoad, S, Eng); 251 expandGraphWithCheckers(C, Dst, Src); 252} 253 254namespace { 255 struct CheckBindContext { 256 typedef std::vector<CheckerManager::CheckBindFunc> CheckersTy; 257 const CheckersTy &Checkers; 258 SVal Loc; 259 SVal Val; 260 const Stmt *S; 261 ExprEngine &Eng; 262 ProgramPoint::Kind PointKind; 263 264 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); } 265 CheckersTy::const_iterator checkers_end() { return Checkers.end(); } 266 267 CheckBindContext(const CheckersTy &checkers, 268 SVal loc, SVal val, const Stmt *s, ExprEngine &eng, 269 ProgramPoint::Kind PK) 270 : Checkers(checkers), Loc(loc), Val(val), S(s), Eng(eng), PointKind(PK) {} 271 272 void runChecker(CheckerManager::CheckBindFunc checkFn, 273 NodeBuilder &Bldr, ExplodedNode *Pred) { 274 const ProgramPoint &L = ProgramPoint::getProgramPoint(S, PointKind, 275 Pred->getLocationContext(), checkFn.Checker); 276 CheckerContext C(Bldr, Eng, Pred, L, 0); 277 278 checkFn(Loc, Val, S, C); 279 } 280 }; 281} 282 283/// \brief Run checkers for binding of a value to a location. 284void CheckerManager::runCheckersForBind(ExplodedNodeSet &Dst, 285 const ExplodedNodeSet &Src, 286 SVal location, SVal val, 287 const Stmt *S, ExprEngine &Eng, 288 ProgramPoint::Kind PointKind) { 289 CheckBindContext C(BindCheckers, location, val, S, Eng, PointKind); 290 expandGraphWithCheckers(C, Dst, Src); 291} 292 293void CheckerManager::runCheckersForEndAnalysis(ExplodedGraph &G, 294 BugReporter &BR, 295 ExprEngine &Eng) { 296 for (unsigned i = 0, e = EndAnalysisCheckers.size(); i != e; ++i) 297 EndAnalysisCheckers[i](G, BR, Eng); 298} 299 300/// \brief Run checkers for end of path. 301// Note, We do not chain the checker output (like in expandGraphWithCheckers) 302// for this callback since end of path nodes are expected to be final. 303void CheckerManager::runCheckersForEndPath(NodeBuilderContext &BC, 304 ExplodedNodeSet &Dst, 305 ExprEngine &Eng) { 306 ExplodedNode *Pred = BC.Pred; 307 308 // We define the builder outside of the loop bacause if at least one checkers 309 // creates a sucsessor for Pred, we do not need to generate an 310 // autotransition for it. 311 NodeBuilder Bldr(Pred, Dst, BC); 312 for (unsigned i = 0, e = EndPathCheckers.size(); i != e; ++i) { 313 CheckEndPathFunc checkFn = EndPathCheckers[i]; 314 315 const ProgramPoint &L = BlockEntrance(BC.Block, 316 Pred->getLocationContext(), 317 checkFn.Checker); 318 CheckerContext C(Bldr, Eng, Pred, L, 0); 319 checkFn(C); 320 } 321} 322 323/// \brief Run checkers for branch condition. 324void CheckerManager::runCheckersForBranchCondition(const Stmt *condition, 325 NodeBuilder &B, 326 ExplodedNode *Pred, 327 ExprEngine &Eng) { 328 for (unsigned i = 0, e = BranchConditionCheckers.size(); i != e; ++i) { 329 CheckBranchConditionFunc fn = BranchConditionCheckers[i]; 330 fn(condition, B, Pred, Eng); 331 } 332} 333 334/// \brief Run checkers for live symbols. 335void CheckerManager::runCheckersForLiveSymbols(const ProgramState *state, 336 SymbolReaper &SymReaper) { 337 for (unsigned i = 0, e = LiveSymbolsCheckers.size(); i != e; ++i) 338 LiveSymbolsCheckers[i](state, SymReaper); 339} 340 341namespace { 342 struct CheckDeadSymbolsContext { 343 typedef std::vector<CheckerManager::CheckDeadSymbolsFunc> CheckersTy; 344 const CheckersTy &Checkers; 345 SymbolReaper &SR; 346 const Stmt *S; 347 ExprEngine &Eng; 348 349 CheckersTy::const_iterator checkers_begin() { return Checkers.begin(); } 350 CheckersTy::const_iterator checkers_end() { return Checkers.end(); } 351 352 CheckDeadSymbolsContext(const CheckersTy &checkers, SymbolReaper &sr, 353 const Stmt *s, ExprEngine &eng) 354 : Checkers(checkers), SR(sr), S(s), Eng(eng) { } 355 356 void runChecker(CheckerManager::CheckDeadSymbolsFunc checkFn, 357 NodeBuilder &Bldr, ExplodedNode *Pred) { 358 ProgramPoint::Kind K = ProgramPoint::PostPurgeDeadSymbolsKind; 359 const ProgramPoint &L = ProgramPoint::getProgramPoint(S, K, 360 Pred->getLocationContext(), checkFn.Checker); 361 CheckerContext C(Bldr, Eng, Pred, L, 0); 362 363 checkFn(SR, C); 364 } 365 }; 366} 367 368/// \brief Run checkers for dead symbols. 369void CheckerManager::runCheckersForDeadSymbols(ExplodedNodeSet &Dst, 370 const ExplodedNodeSet &Src, 371 SymbolReaper &SymReaper, 372 const Stmt *S, 373 ExprEngine &Eng) { 374 CheckDeadSymbolsContext C(DeadSymbolsCheckers, SymReaper, S, Eng); 375 expandGraphWithCheckers(C, Dst, Src); 376} 377 378/// \brief True if at least one checker wants to check region changes. 379bool CheckerManager::wantsRegionChangeUpdate(const ProgramState *state) { 380 for (unsigned i = 0, e = RegionChangesCheckers.size(); i != e; ++i) 381 if (RegionChangesCheckers[i].WantUpdateFn(state)) 382 return true; 383 384 return false; 385} 386 387/// \brief Run checkers for region changes. 388const ProgramState * 389CheckerManager::runCheckersForRegionChanges(const ProgramState *state, 390 const StoreManager::InvalidatedSymbols *invalidated, 391 ArrayRef<const MemRegion *> ExplicitRegions, 392 ArrayRef<const MemRegion *> Regions) { 393 for (unsigned i = 0, e = RegionChangesCheckers.size(); i != e; ++i) { 394 // If any checker declares the state infeasible (or if it starts that way), 395 // bail out. 396 if (!state) 397 return NULL; 398 state = RegionChangesCheckers[i].CheckFn(state, invalidated, 399 ExplicitRegions, Regions); 400 } 401 return state; 402} 403 404/// \brief Run checkers for handling assumptions on symbolic values. 405const ProgramState * 406CheckerManager::runCheckersForEvalAssume(const ProgramState *state, 407 SVal Cond, bool Assumption) { 408 for (unsigned i = 0, e = EvalAssumeCheckers.size(); i != e; ++i) { 409 // If any checker declares the state infeasible (or if it starts that way), 410 // bail out. 411 if (!state) 412 return NULL; 413 state = EvalAssumeCheckers[i](state, Cond, Assumption); 414 } 415 return state; 416} 417 418/// \brief Run checkers for evaluating a call. 419/// Only one checker will evaluate the call. 420void CheckerManager::runCheckersForEvalCall(ExplodedNodeSet &Dst, 421 const ExplodedNodeSet &Src, 422 const CallExpr *CE, 423 ExprEngine &Eng, 424 GraphExpander *defaultEval) { 425 if (EvalCallCheckers.empty() && 426 InlineCallCheckers.empty() && 427 defaultEval == 0) { 428 Dst.insert(Src); 429 return; 430 } 431 432 for (ExplodedNodeSet::iterator 433 NI = Src.begin(), NE = Src.end(); NI != NE; ++NI) { 434 435 ExplodedNode *Pred = *NI; 436 bool anyEvaluated = false; 437 438 // First, check if any of the InlineCall callbacks can evaluate the call. 439 assert(InlineCallCheckers.size() <= 1 && 440 "InlineCall is a special hacky callback to allow intrusive" 441 "evaluation of the call (which simulates inlining). It is " 442 "currently only used by OSAtomicChecker and should go away " 443 "at some point."); 444 for (std::vector<InlineCallFunc>::iterator 445 EI = InlineCallCheckers.begin(), EE = InlineCallCheckers.end(); 446 EI != EE; ++EI) { 447 ExplodedNodeSet checkDst; 448 bool evaluated = (*EI)(CE, Eng, Pred, checkDst); 449 assert(!(evaluated && anyEvaluated) 450 && "There are more than one checkers evaluating the call"); 451 if (evaluated) { 452 anyEvaluated = true; 453 Dst.insert(checkDst); 454#ifdef NDEBUG 455 break; // on release don't check that no other checker also evals. 456#endif 457 } 458 } 459 460#ifdef NDEBUG // on release don't check that no other checker also evals. 461 if (anyEvaluated) { 462 break; 463 } 464#endif 465 466 ExplodedNodeSet checkDst; 467 NodeBuilder B(Pred, checkDst, Eng.getBuilderContext()); 468 // Next, check if any of the EvalCall callbacks can evaluate the call. 469 for (std::vector<EvalCallFunc>::iterator 470 EI = EvalCallCheckers.begin(), EE = EvalCallCheckers.end(); 471 EI != EE; ++EI) { 472 ProgramPoint::Kind K = ProgramPoint::PostStmtKind; 473 const ProgramPoint &L = ProgramPoint::getProgramPoint(CE, K, 474 Pred->getLocationContext(), EI->Checker); 475 bool evaluated = false; 476 { // CheckerContext generates transitions(populates checkDest) on 477 // destruction, so introduce the scope to make sure it gets properly 478 // populated. 479 CheckerContext C(B, Eng, Pred, L, 0); 480 evaluated = (*EI)(CE, C); 481 } 482 assert(!(evaluated && anyEvaluated) 483 && "There are more than one checkers evaluating the call"); 484 if (evaluated) { 485 anyEvaluated = true; 486 Dst.insert(checkDst); 487#ifdef NDEBUG 488 break; // on release don't check that no other checker also evals. 489#endif 490 } 491 } 492 493 // If none of the checkers evaluated the call, ask ExprEngine to handle it. 494 if (!anyEvaluated) { 495 if (defaultEval) 496 defaultEval->expandGraph(Dst, Pred); 497 else 498 Dst.insert(Pred); 499 } 500 } 501} 502 503/// \brief Run checkers for the entire Translation Unit. 504void CheckerManager::runCheckersOnEndOfTranslationUnit( 505 const TranslationUnitDecl *TU, 506 AnalysisManager &mgr, 507 BugReporter &BR) { 508 for (unsigned i = 0, e = EndOfTranslationUnitCheckers.size(); i != e; ++i) 509 EndOfTranslationUnitCheckers[i](TU, mgr, BR); 510} 511 512void CheckerManager::runCheckersForPrintState(raw_ostream &Out, 513 const ProgramState *State, 514 const char *NL, const char *Sep) { 515 for (llvm::DenseMap<CheckerTag, CheckerRef>::iterator 516 I = CheckerTags.begin(), E = CheckerTags.end(); I != E; ++I) 517 I->second->printState(Out, State, NL, Sep); 518} 519 520//===----------------------------------------------------------------------===// 521// Internal registration functions for AST traversing. 522//===----------------------------------------------------------------------===// 523 524void CheckerManager::_registerForDecl(CheckDeclFunc checkfn, 525 HandlesDeclFunc isForDeclFn) { 526 DeclCheckerInfo info = { checkfn, isForDeclFn }; 527 DeclCheckers.push_back(info); 528} 529 530void CheckerManager::_registerForBody(CheckDeclFunc checkfn) { 531 BodyCheckers.push_back(checkfn); 532} 533 534//===----------------------------------------------------------------------===// 535// Internal registration functions for path-sensitive checking. 536//===----------------------------------------------------------------------===// 537 538void CheckerManager::_registerForPreStmt(CheckStmtFunc checkfn, 539 HandlesStmtFunc isForStmtFn) { 540 StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/true }; 541 StmtCheckers.push_back(info); 542} 543void CheckerManager::_registerForPostStmt(CheckStmtFunc checkfn, 544 HandlesStmtFunc isForStmtFn) { 545 StmtCheckerInfo info = { checkfn, isForStmtFn, /*IsPreVisit*/false }; 546 StmtCheckers.push_back(info); 547} 548 549void CheckerManager::_registerForPreObjCMessage(CheckObjCMessageFunc checkfn) { 550 PreObjCMessageCheckers.push_back(checkfn); 551} 552void CheckerManager::_registerForPostObjCMessage(CheckObjCMessageFunc checkfn) { 553 PostObjCMessageCheckers.push_back(checkfn); 554} 555 556void CheckerManager::_registerForLocation(CheckLocationFunc checkfn) { 557 LocationCheckers.push_back(checkfn); 558} 559 560void CheckerManager::_registerForBind(CheckBindFunc checkfn) { 561 BindCheckers.push_back(checkfn); 562} 563 564void CheckerManager::_registerForEndAnalysis(CheckEndAnalysisFunc checkfn) { 565 EndAnalysisCheckers.push_back(checkfn); 566} 567 568void CheckerManager::_registerForEndPath(CheckEndPathFunc checkfn) { 569 EndPathCheckers.push_back(checkfn); 570} 571 572void CheckerManager::_registerForBranchCondition( 573 CheckBranchConditionFunc checkfn) { 574 BranchConditionCheckers.push_back(checkfn); 575} 576 577void CheckerManager::_registerForLiveSymbols(CheckLiveSymbolsFunc checkfn) { 578 LiveSymbolsCheckers.push_back(checkfn); 579} 580 581void CheckerManager::_registerForDeadSymbols(CheckDeadSymbolsFunc checkfn) { 582 DeadSymbolsCheckers.push_back(checkfn); 583} 584 585void CheckerManager::_registerForRegionChanges(CheckRegionChangesFunc checkfn, 586 WantsRegionChangeUpdateFunc wantUpdateFn) { 587 RegionChangesCheckerInfo info = {checkfn, wantUpdateFn}; 588 RegionChangesCheckers.push_back(info); 589} 590 591void CheckerManager::_registerForEvalAssume(EvalAssumeFunc checkfn) { 592 EvalAssumeCheckers.push_back(checkfn); 593} 594 595void CheckerManager::_registerForEvalCall(EvalCallFunc checkfn) { 596 EvalCallCheckers.push_back(checkfn); 597} 598 599void CheckerManager::_registerForInlineCall(InlineCallFunc checkfn) { 600 InlineCallCheckers.push_back(checkfn); 601} 602 603void CheckerManager::_registerForEndOfTranslationUnit( 604 CheckEndOfTranslationUnit checkfn) { 605 EndOfTranslationUnitCheckers.push_back(checkfn); 606} 607 608//===----------------------------------------------------------------------===// 609// Implementation details. 610//===----------------------------------------------------------------------===// 611 612CheckerManager::CachedStmtCheckers * 613CheckerManager::getCachedStmtCheckersFor(const Stmt *S, bool isPreVisit) { 614 assert(S); 615 616 CachedStmtCheckersKey key(S->getStmtClass(), isPreVisit); 617 CachedStmtCheckers *checkers = 0; 618 CachedStmtCheckersMapTy::iterator CCI = CachedStmtCheckersMap.find(key); 619 if (CCI != CachedStmtCheckersMap.end()) { 620 checkers = &(CCI->second); 621 } else { 622 // Find the checkers that should run for this Stmt and cache them. 623 checkers = &CachedStmtCheckersMap[key]; 624 for (unsigned i = 0, e = StmtCheckers.size(); i != e; ++i) { 625 StmtCheckerInfo &info = StmtCheckers[i]; 626 if (info.IsPreVisit == isPreVisit && info.IsForStmtFn(S)) 627 checkers->push_back(info.CheckFn); 628 } 629 } 630 631 assert(checkers); 632 return checkers; 633} 634 635CheckerManager::~CheckerManager() { 636 for (unsigned i = 0, e = CheckerDtors.size(); i != e; ++i) 637 CheckerDtors[i](); 638} 639 640// Anchor for the vtable. 641GraphExpander::~GraphExpander() { } 642