File: SignalHandlerCheck.h

package info (click to toggle)
llvm-toolchain-15 1%3A15.0.6-4
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 1,554,644 kB
  • sloc: cpp: 5,922,452; ansic: 1,012,136; asm: 674,362; python: 191,568; objc: 73,855; f90: 42,327; lisp: 31,913; pascal: 11,973; javascript: 10,144; sh: 9,421; perl: 7,447; ml: 5,527; awk: 3,523; makefile: 2,520; xml: 885; cs: 573; fortran: 567
file content (70 lines) | stat: -rw-r--r-- 3,139 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
//===--- SignalHandlerCheck.h - clang-tidy ----------------------*- C++ -*-===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//

#ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SIGNALHANDLERCHECK_H
#define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SIGNALHANDLERCHECK_H

#include "../ClangTidyCheck.h"
#include "clang/Analysis/CallGraph.h"
#include "llvm/ADT/DepthFirstIterator.h"
#include "llvm/ADT/StringSet.h"

namespace clang {
namespace tidy {
namespace bugprone {

/// Checker for signal handler functions.
///
/// For the user-facing documentation see:
/// http://clang.llvm.org/extra/clang-tidy/checks/bugprone/signal-handler-check.html
class SignalHandlerCheck : public ClangTidyCheck {
public:
  enum class AsyncSafeFunctionSetKind { Minimal, POSIX };

  SignalHandlerCheck(StringRef Name, ClangTidyContext *Context);
  void storeOptions(ClangTidyOptions::OptionMap &Opts) override;
  bool isLanguageVersionSupported(const LangOptions &LangOpts) const override;
  void registerMatchers(ast_matchers::MatchFinder *Finder) override;
  void check(const ast_matchers::MatchFinder::MatchResult &Result) override;

private:
  /// Check if a function is allowed as a signal handler.
  /// Should test the properties of the function, and check in the code body.
  /// Should not check function calls in the code (this part is done by the call
  /// graph scan).
  /// @param FD The function to check. It may or may not have a definition.
  /// @param CallOrRef Location of the call to this function (in another
  /// function) or the reference to the function (if it is used as a registered
  /// signal handler). This is the location where diagnostics are to be placed.
  /// @return Returns true if a diagnostic was emitted for this function.
  bool checkFunction(const FunctionDecl *FD, const Expr *CallOrRef);
  /// Returns true if a standard library function is considered as
  /// asynchronous-safe.
  bool isStandardFunctionAsyncSafe(const FunctionDecl *FD) const;
  /// Add diagnostic notes to show the call chain of functions from a signal
  /// handler to a function that is called (directly or indirectly) from it.
  /// Also add a note to the place where the signal handler is registered.
  /// @param Itr Position during a call graph depth-first iteration. It contains
  /// the "path" (call chain) from the signal handler to the actual found
  /// function call.
  /// @param HandlerRef Reference to the signal handler function where it is
  /// registered as signal handler.
  void reportHandlerChain(const llvm::df_iterator<clang::CallGraphNode *> &Itr,
                          const DeclRefExpr *HandlerRef);

  clang::CallGraph CG;

  AsyncSafeFunctionSetKind AsyncSafeFunctionSet;
  const llvm::StringSet<> ConformingFunctions;
};

} // namespace bugprone
} // namespace tidy
} // namespace clang

#endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SIGNALHANDLERCHECK_H