| 1 | //===--- ExceptionEscapeCheck.cpp - clang-tidy ----------------------------===// |
| 2 | // |
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | |
| 9 | #include "ExceptionEscapeCheck.h" |
| 10 | |
| 11 | #include "clang/ASTMatchers/ASTMatchFinder.h" |
| 12 | #include "llvm/ADT/StringSet.h" |
| 13 | |
| 14 | using namespace clang::ast_matchers; |
| 15 | |
| 16 | namespace clang::tidy::bugprone { |
| 17 | namespace { |
| 18 | |
| 19 | AST_MATCHER_P(FunctionDecl, isEnabled, llvm::StringSet<>, |
| 20 | FunctionsThatShouldNotThrow) { |
| 21 | return FunctionsThatShouldNotThrow.contains(key: Node.getNameAsString()); |
| 22 | } |
| 23 | |
| 24 | AST_MATCHER(FunctionDecl, isExplicitThrow) { |
| 25 | return isExplicitThrowExceptionSpec(ESpecType: Node.getExceptionSpecType()) && |
| 26 | Node.getExceptionSpecSourceRange().isValid(); |
| 27 | } |
| 28 | |
| 29 | AST_MATCHER(FunctionDecl, hasAtLeastOneParameter) { |
| 30 | return Node.getNumParams() > 0; |
| 31 | } |
| 32 | |
| 33 | } // namespace |
| 34 | |
| 35 | ExceptionEscapeCheck::ExceptionEscapeCheck(StringRef Name, |
| 36 | ClangTidyContext *Context) |
| 37 | : ClangTidyCheck(Name, Context), RawFunctionsThatShouldNotThrow(Options.get( |
| 38 | LocalName: "FunctionsThatShouldNotThrow" , Default: "" )), |
| 39 | RawIgnoredExceptions(Options.get(LocalName: "IgnoredExceptions" , Default: "" )) { |
| 40 | llvm::SmallVector<StringRef, 8> FunctionsThatShouldNotThrowVec, |
| 41 | IgnoredExceptionsVec; |
| 42 | StringRef(RawFunctionsThatShouldNotThrow) |
| 43 | .split(A&: FunctionsThatShouldNotThrowVec, Separator: "," , MaxSplit: -1, KeepEmpty: false); |
| 44 | FunctionsThatShouldNotThrow.insert_range(R&: FunctionsThatShouldNotThrowVec); |
| 45 | |
| 46 | llvm::StringSet<> IgnoredExceptions; |
| 47 | StringRef(RawIgnoredExceptions).split(A&: IgnoredExceptionsVec, Separator: "," , MaxSplit: -1, KeepEmpty: false); |
| 48 | IgnoredExceptions.insert_range(R&: IgnoredExceptionsVec); |
| 49 | Tracer.ignoreExceptions(ExceptionNames: std::move(IgnoredExceptions)); |
| 50 | Tracer.ignoreBadAlloc(ShallIgnore: true); |
| 51 | } |
| 52 | |
| 53 | void ExceptionEscapeCheck::storeOptions(ClangTidyOptions::OptionMap &Opts) { |
| 54 | Options.store(Options&: Opts, LocalName: "FunctionsThatShouldNotThrow" , |
| 55 | Value: RawFunctionsThatShouldNotThrow); |
| 56 | Options.store(Options&: Opts, LocalName: "IgnoredExceptions" , Value: RawIgnoredExceptions); |
| 57 | } |
| 58 | |
| 59 | void ExceptionEscapeCheck::registerMatchers(MatchFinder *Finder) { |
| 60 | Finder->addMatcher( |
| 61 | NodeMatch: functionDecl( |
| 62 | isDefinition(), |
| 63 | anyOf(isNoThrow(), |
| 64 | allOf(anyOf(cxxDestructorDecl(), |
| 65 | cxxConstructorDecl(isMoveConstructor()), |
| 66 | cxxMethodDecl(isMoveAssignmentOperator()), isMain(), |
| 67 | allOf(hasAnyName("swap" , "iter_swap" , "iter_move" ), |
| 68 | hasAtLeastOneParameter())), |
| 69 | unless(isExplicitThrow())), |
| 70 | isEnabled(FunctionsThatShouldNotThrow))) |
| 71 | .bind(ID: "thrower" ), |
| 72 | Action: this); |
| 73 | } |
| 74 | |
| 75 | void ExceptionEscapeCheck::check(const MatchFinder::MatchResult &Result) { |
| 76 | const auto *MatchedDecl = Result.Nodes.getNodeAs<FunctionDecl>(ID: "thrower" ); |
| 77 | |
| 78 | if (!MatchedDecl) |
| 79 | return; |
| 80 | |
| 81 | const utils::ExceptionAnalyzer::ExceptionInfo Info = |
| 82 | Tracer.analyze(Func: MatchedDecl); |
| 83 | |
| 84 | if (Info.getBehaviour() != utils::ExceptionAnalyzer::State::Throwing) |
| 85 | return; |
| 86 | |
| 87 | diag(Loc: MatchedDecl->getLocation(), Description: "an exception may be thrown in function " |
| 88 | "%0 which should not throw exceptions" ) |
| 89 | << MatchedDecl; |
| 90 | |
| 91 | const auto &[ThrowType, ThrowInfo] = *Info.getExceptions().begin(); |
| 92 | |
| 93 | if (ThrowInfo.Loc.isInvalid()) |
| 94 | return; |
| 95 | |
| 96 | const utils::ExceptionAnalyzer::CallStack &Stack = ThrowInfo.Stack; |
| 97 | diag(Loc: ThrowInfo.Loc, |
| 98 | Description: "frame #0: unhandled exception of type %0 may be thrown in function %1 " |
| 99 | "here" , |
| 100 | Level: DiagnosticIDs::Note) |
| 101 | << QualType(ThrowType, 0U) << Stack.back().first; |
| 102 | |
| 103 | size_t FrameNo = 1; |
| 104 | for (auto CurrIt = ++Stack.rbegin(), PrevIt = Stack.rbegin(); |
| 105 | CurrIt != Stack.rend(); ++CurrIt, ++PrevIt) { |
| 106 | const FunctionDecl *CurrFunction = CurrIt->first; |
| 107 | const FunctionDecl *PrevFunction = PrevIt->first; |
| 108 | const SourceLocation PrevLocation = PrevIt->second; |
| 109 | if (PrevLocation.isValid()) { |
| 110 | diag(Loc: PrevLocation, Description: "frame #%0: function %1 calls function %2 here" , |
| 111 | Level: DiagnosticIDs::Note) |
| 112 | << FrameNo << CurrFunction << PrevFunction; |
| 113 | } else { |
| 114 | diag(Loc: CurrFunction->getLocation(), |
| 115 | Description: "frame #%0: function %1 calls function %2" , Level: DiagnosticIDs::Note) |
| 116 | << FrameNo << CurrFunction << PrevFunction; |
| 117 | } |
| 118 | ++FrameNo; |
| 119 | } |
| 120 | } |
| 121 | |
| 122 | } // namespace clang::tidy::bugprone |
| 123 | |