1 //===-- UncheckedOptionalAccessModel.h --------------------------*- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 //  This file defines a dataflow analysis that detects unsafe uses of optional
10 //  values.
11 //
12 //===----------------------------------------------------------------------===//
13 
14 #ifndef CLANG_ANALYSIS_FLOWSENSITIVE_MODELS_UNCHECKEDOPTIONALACCESSMODEL_H
15 #define CLANG_ANALYSIS_FLOWSENSITIVE_MODELS_UNCHECKEDOPTIONALACCESSMODEL_H
16 
17 #include "clang/AST/ASTContext.h"
18 #include "clang/Analysis/CFG.h"
19 #include "clang/Analysis/FlowSensitive/CFGMatchSwitch.h"
20 #include "clang/Analysis/FlowSensitive/DataflowAnalysis.h"
21 #include "clang/Analysis/FlowSensitive/DataflowEnvironment.h"
22 #include "clang/Analysis/FlowSensitive/NoopLattice.h"
23 #include "clang/Basic/SourceLocation.h"
24 #include "llvm/ADT/SmallVector.h"
25 
26 namespace clang {
27 namespace dataflow {
28 
29 // FIXME: Explore using an allowlist-approach, where constructs supported by the
30 // analysis are always enabled and additional constructs are enabled through the
31 // `Options`.
32 struct UncheckedOptionalAccessModelOptions {
33   /// In generating diagnostics, ignore optionals reachable through overloaded
34   /// `operator*` or `operator->` (other than those of the optional type
35   /// itself). The analysis does not equate the results of such calls, so it
36   /// can't identify when their results are used safely (across calls),
37   /// resulting in false positives in all such cases. Note: this option does not
38   /// cover access through `operator[]`.
39   bool IgnoreSmartPointerDereference = false;
40 };
41 
42 /// Dataflow analysis that models whether optionals hold values or not.
43 ///
44 /// Models the `std::optional`, `absl::optional`, and `base::Optional` types.
45 class UncheckedOptionalAccessModel
46     : public DataflowAnalysis<UncheckedOptionalAccessModel, NoopLattice> {
47 public:
48   UncheckedOptionalAccessModel(ASTContext &Ctx, dataflow::Environment &Env);
49 
50   /// Returns a matcher for the optional classes covered by this model.
51   static ast_matchers::DeclarationMatcher optionalClassDecl();
52 
53   static NoopLattice initialElement() { return {}; }
54 
55   void transfer(const CFGElement &Elt, NoopLattice &L, Environment &Env);
56 
57 private:
58   CFGMatchSwitch<TransferState<NoopLattice>> TransferMatchSwitch;
59 };
60 
61 class UncheckedOptionalAccessDiagnoser {
62 public:
63   UncheckedOptionalAccessDiagnoser(
64       UncheckedOptionalAccessModelOptions Options = {});
65 
66   llvm::SmallVector<SourceLocation>
67   operator()(const CFGElement &Elt, ASTContext &Ctx,
68              const TransferStateForDiagnostics<NoopLattice> &State) {
69     return DiagnoseMatchSwitch(Elt, Ctx, State.Env);
70   }
71 
72 private:
73   CFGMatchSwitch<const Environment, llvm::SmallVector<SourceLocation>>
74       DiagnoseMatchSwitch;
75 };
76 
77 } // namespace dataflow
78 } // namespace clang
79 
80 #endif // CLANG_ANALYSIS_FLOWSENSITIVE_MODELS_UNCHECKEDOPTIONALACCESSMODEL_H
81