blob: f81705304f3abdf04ed3aff99825a3a03b0d446d [file] [log] [blame]
//== TaintTesterChecker.cpp ----------------------------------- -*- C++ -*--=//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
// This checker can be used for testing how taint data is propagated.
#include "Taint.h"
#include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
#include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
#include "clang/StaticAnalyzer/Core/Checker.h"
#include "clang/StaticAnalyzer/Core/CheckerManager.h"
#include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
using namespace clang;
using namespace ento;
using namespace taint;
namespace {
class TaintTesterChecker : public Checker< check::PostStmt<Expr> > {
mutable std::unique_ptr<BugType> BT;
void initBugType() const;
/// Given a pointer argument, get the symbol of the value it contains
/// (points to).
SymbolRef getPointedToSymbol(CheckerContext &C,
const Expr* Arg,
bool IssueWarning = true) const;
void checkPostStmt(const Expr *E, CheckerContext &C) const;
inline void TaintTesterChecker::initBugType() const {
if (!BT)
BT.reset(new BugType(this, "Tainted data", "General"));
void TaintTesterChecker::checkPostStmt(const Expr *E,
CheckerContext &C) const {
ProgramStateRef State = C.getState();
if (!State)
if (isTainted(State, E, C.getLocationContext())) {
if (ExplodedNode *N = C.generateNonFatalErrorNode()) {
auto report = std::make_unique<PathSensitiveBugReport>(*BT, "tainted", N);
void ento::registerTaintTesterChecker(CheckerManager &mgr) {
bool ento::shouldRegisterTaintTesterChecker(const LangOptions &LO) {
return true;