2009-01-26 20:14:46 +01:00
/*
* Cppcheck - A tool for static C / C + + code analysis
2022-02-05 11:45:17 +01:00
* Copyright ( C ) 2007 - 2022 Cppcheck team .
2009-01-26 20:14:46 +01:00
*
* This program is free software : you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation , either version 3 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
2009-09-27 17:08:31 +02:00
* along with this program . If not , see < http : //www.gnu.org/licenses/>.
2009-01-26 20:14:46 +01:00
*/
//---------------------------------------------------------------------------
# include "checkother.h"
2020-05-23 07:16:49 +02:00
2015-08-02 21:57:32 +02:00
# include "astutils.h"
2017-05-27 04:33:47 +02:00
# include "library.h"
2009-05-02 10:45:15 +02:00
# include "mathlib.h"
2017-05-27 04:33:47 +02:00
# include "settings.h"
# include "standards.h"
2010-12-16 19:04:47 +01:00
# include "symboldatabase.h"
2017-05-27 04:33:47 +02:00
# include "token.h"
# include "tokenize.h"
2020-05-31 10:10:10 +02:00
# include "valueflow.h"
2010-10-31 12:31:11 +01:00
2022-01-27 19:03:20 +01:00
# include "checkuninitvar.h" // CheckUninitVar::isVariableUsage
2022-02-11 19:40:11 +01:00
# include "checkclass.h" // CheckClass::stl_containers_not_const
2022-01-27 19:03:20 +01:00
2011-11-29 19:46:36 +01:00
# include <algorithm> // find_if()
2022-01-27 19:03:20 +01:00
# include <cctype>
2017-05-27 04:33:47 +02:00
# include <list>
# include <map>
2022-01-27 19:03:20 +01:00
# include <memory>
# include <ostream>
# include <set>
2022-02-11 19:44:08 +01:00
# include <type_traits>
2017-05-27 04:33:47 +02:00
# include <utility>
2022-02-01 17:17:08 +01:00
# include <numeric>
2022-01-27 19:03:20 +01:00
2009-01-26 20:14:46 +01:00
//---------------------------------------------------------------------------
2009-03-20 18:16:21 +01:00
// Register this check class (by creating a static instance of it)
2011-10-13 20:53:06 +02:00
namespace {
CheckOther instance ;
2009-01-26 20:14:46 +01:00
}
CWE mapping of signedCharArrayIndex, unknownSignCharArrayIndex, suspiciousCase, suspiciousEqualityComparison, duplicateBranch, duplicateExpressionTernary, suspiciousSemicolon, incompleteArrayFill, redundantPointerOp, unusedLabelSwitch, unusedLabel, unknownEvaluationOrder, stlIfFind, useAutoPointerCopy
2016-08-25 16:40:23 +02:00
static const struct CWE CWE128 ( 128U ) ; // Wrap-around Error
static const struct CWE CWE131 ( 131U ) ; // Incorrect Calculation of Buffer Size
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
2016-04-12 19:29:40 +02:00
static const struct CWE CWE197 ( 197U ) ; // Numeric Truncation Error
2016-08-25 19:17:07 +02:00
static const struct CWE CWE362 ( 362U ) ; // Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
static const struct CWE CWE369 ( 369U ) ; // Divide By Zero
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
2016-04-12 19:29:40 +02:00
static const struct CWE CWE398 ( 398U ) ; // Indicator of Poor Code Quality
CWE mapping of duplicateExpression, duplicateBreak (CWE561), unreachableCode, unsignedLessThanZero, unsignedPositive, pointerLessThanZero, pointerPositive, varFuncNullUB, nanInArithmeticExpression, commaSeparatedReturn, (#797)
ignoredReturnValue
2016-05-22 13:17:38 +02:00
static const struct CWE CWE475 ( 475U ) ; // Undefined Behavior for Input to API
CWE mapping of signedCharArrayIndex, unknownSignCharArrayIndex, suspiciousCase, suspiciousEqualityComparison, duplicateBranch, duplicateExpressionTernary, suspiciousSemicolon, incompleteArrayFill, redundantPointerOp, unusedLabelSwitch, unusedLabel, unknownEvaluationOrder, stlIfFind, useAutoPointerCopy
2016-08-25 16:40:23 +02:00
static const struct CWE CWE482 ( 482U ) ; // Comparing instead of Assigning
CWE mapping of duplicateExpression, duplicateBreak (CWE561), unreachableCode, unsignedLessThanZero, unsignedPositive, pointerLessThanZero, pointerPositive, varFuncNullUB, nanInArithmeticExpression, commaSeparatedReturn, (#797)
ignoredReturnValue
2016-05-22 13:17:38 +02:00
static const struct CWE CWE561 ( 561U ) ; // Dead Code
2016-04-29 19:01:37 +02:00
static const struct CWE CWE563 ( 563U ) ; // Assignment to Variable without Use ('Unused Variable')
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
2016-04-12 19:29:40 +02:00
static const struct CWE CWE570 ( 570U ) ; // Expression is Always False
static const struct CWE CWE571 ( 571U ) ; // Expression is Always True
2016-12-25 00:07:37 +01:00
static const struct CWE CWE672 ( 672U ) ; // Operation on a Resource after Expiration or Release
2017-04-01 08:36:46 +02:00
static const struct CWE CWE628 ( 628U ) ; // Function Call with Incorrectly Specified Arguments
static const struct CWE CWE683 ( 683U ) ; // Function Call With Incorrect Order of Arguments
2016-05-14 11:13:33 +02:00
static const struct CWE CWE686 ( 686U ) ; // Function Call With Incorrect Argument Type
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
2016-04-12 19:29:40 +02:00
static const struct CWE CWE704 ( 704U ) ; // Incorrect Type Conversion or Cast
2016-05-14 11:13:33 +02:00
static const struct CWE CWE758 ( 758U ) ; // Reliance on Undefined, Unspecified, or Implementation-Defined Behavior
2016-08-25 19:17:07 +02:00
static const struct CWE CWE768 ( 768U ) ; // Incorrect Short Circuit Evaluation
2016-05-14 11:13:33 +02:00
static const struct CWE CWE783 ( 783U ) ; // Operator Precedence Logic Error
2013-11-07 14:38:08 +01:00
2013-02-27 21:02:12 +01:00
//----------------------------------------------------------------------------------
// The return value of fgetc(), getc(), ungetc(), getchar() etc. is an integer value.
// If this return value is stored in a character variable and then compared
2017-04-23 07:19:44 +02:00
// to EOF, which is an integer, the comparison maybe be false.
2013-02-27 21:02:12 +01:00
//
// Reference:
// - Ticket #160
// - http://www.cplusplus.com/reference/cstdio/fgetc/
// - http://www.cplusplus.com/reference/cstdio/getc/
// - http://www.cplusplus.com/reference/cstdio/getchar/
2013-04-09 13:57:42 +02:00
// - http://www.cplusplus.com/reference/cstdio/ungetc/ ...
2013-02-27 21:02:12 +01:00
//----------------------------------------------------------------------------------
void CheckOther : : checkCastIntToCharAndBack ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2013-02-27 21:02:12 +01:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2019-07-16 09:10:10 +02:00
std : : map < int , std : : string > vars ;
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2015-09-03 17:30:05 +02:00
// Quick check to see if any of the matches below have any chances
2017-04-23 07:19:44 +02:00
if ( ! Token : : Match ( tok , " %var%|EOF %comp%|= " ) )
2015-09-03 17:30:05 +02:00
continue ;
2013-02-27 21:02:12 +01:00
if ( Token : : Match ( tok , " %var% = fclose|fflush|fputc|fputs|fscanf|getchar|getc|fgetc|putchar|putc|puts|scanf|sscanf|ungetc ( " ) ) {
2013-03-03 18:54:44 +01:00
const Variable * var = tok - > variable ( ) ;
if ( var & & var - > typeEndToken ( ) - > str ( ) = = " char " & & ! var - > typeEndToken ( ) - > isSigned ( ) ) {
vars [ tok - > varId ( ) ] = tok - > strAt ( 2 ) ;
2013-02-27 21:02:12 +01:00
}
} else if ( Token : : Match ( tok , " EOF %comp% ( %var% = fclose|fflush|fputc|fputs|fscanf|getchar|getc|fgetc|putchar|putc|puts|scanf|sscanf|ungetc ( " ) ) {
tok = tok - > tokAt ( 3 ) ;
2013-07-29 12:01:52 +02:00
const Variable * var = tok - > variable ( ) ;
if ( var & & var - > typeEndToken ( ) - > str ( ) = = " char " & & ! var - > typeEndToken ( ) - > isSigned ( ) ) {
checkCastIntToCharAndBackError ( tok , tok - > strAt ( 2 ) ) ;
2013-02-27 21:02:12 +01:00
}
2018-06-16 16:10:28 +02:00
} else if ( mTokenizer - > isCPP ( ) & & ( Token : : Match ( tok , " EOF %comp% ( %var% = std :: cin . get ( " ) | | Token : : Match ( tok , " EOF %comp% ( %var% = cin . get ( " ) ) ) {
2013-03-04 14:25:35 +01:00
tok = tok - > tokAt ( 3 ) ;
2013-07-29 12:01:52 +02:00
const Variable * var = tok - > variable ( ) ;
if ( var & & var - > typeEndToken ( ) - > str ( ) = = " char " & & ! var - > typeEndToken ( ) - > isSigned ( ) ) {
checkCastIntToCharAndBackError ( tok , " cin.get " ) ;
2013-03-04 14:25:35 +01:00
}
2018-06-16 16:10:28 +02:00
} else if ( mTokenizer - > isCPP ( ) & & ( Token : : Match ( tok , " %var% = std :: cin . get ( " ) | | Token : : Match ( tok , " %var% = cin . get ( " ) ) ) {
2013-03-04 14:25:35 +01:00
const Variable * var = tok - > variable ( ) ;
if ( var & & var - > typeEndToken ( ) - > str ( ) = = " char " & & ! var - > typeEndToken ( ) - > isSigned ( ) ) {
vars [ tok - > varId ( ) ] = " cin.get " ;
}
2015-09-03 17:30:05 +02:00
} else if ( Token : : Match ( tok , " %var% %comp% EOF " ) ) {
2013-03-03 18:54:44 +01:00
if ( vars . find ( tok - > varId ( ) ) ! = vars . end ( ) ) {
checkCastIntToCharAndBackError ( tok , vars [ tok - > varId ( ) ] ) ;
2013-02-27 21:02:12 +01:00
}
} else if ( Token : : Match ( tok , " EOF %comp% %var% " ) ) {
tok = tok - > tokAt ( 2 ) ;
2013-03-03 18:54:44 +01:00
if ( vars . find ( tok - > varId ( ) ) ! = vars . end ( ) ) {
checkCastIntToCharAndBackError ( tok , vars [ tok - > varId ( ) ] ) ;
2013-02-27 21:02:12 +01:00
}
}
}
}
}
void CheckOther : : checkCastIntToCharAndBackError ( const Token * tok , const std : : string & strFunctionName )
{
reportError (
tok ,
Severity : : warning ,
" checkCastIntToCharAndBack " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + strFunctionName + " \n "
" Storing $symbol() return value in char variable and then comparing with EOF. \n "
" When saving $symbol() return value in char variable there is loss of precision. "
2018-06-05 10:24:19 +02:00
" When $symbol() returns EOF this value is truncated. Comparing the char "
2018-04-09 06:43:48 +02:00
" variable with EOF can have unexpected results. For instance a loop \" while (EOF != (c = $symbol()); \" "
2013-02-27 21:02:12 +01:00
" loops forever on some compilers/platforms and on other compilers/platforms it will stop "
2021-02-24 22:00:06 +01:00
" when the file contains a matching character. " , CWE197 , Certainty : : normal
2021-08-07 20:51:18 +02:00
) ;
2013-02-27 21:02:12 +01:00
}
2011-02-11 23:38:23 +01:00
//---------------------------------------------------------------------------
2014-08-27 09:42:09 +02:00
// Clarify calculation precedence for ternary operators.
2011-08-19 17:53:43 +02:00
//---------------------------------------------------------------------------
2011-01-24 21:40:49 +01:00
void CheckOther : : clarifyCalculation ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2011-01-24 21:40:49 +01:00
return ;
2011-11-30 20:23:29 +01:00
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2013-12-24 10:07:20 +01:00
// ? operator where lhs is arithmetical expression
2014-12-30 17:55:29 +01:00
if ( tok - > str ( ) ! = " ? " | | ! tok - > astOperand1 ( ) | | ! tok - > astOperand1 ( ) - > isCalculation ( ) )
continue ;
2015-08-14 20:46:13 +02:00
if ( ! tok - > astOperand1 ( ) - > isArithmeticalOp ( ) & & tok - > astOperand1 ( ) - > tokType ( ) ! = Token : : eBitOp )
2013-12-24 10:07:20 +01:00
continue ;
2020-09-29 08:29:05 +02:00
// non-pointer calculation in lhs and pointer in rhs => no clarification is needed
if ( tok - > astOperand1 ( ) - > isBinaryOp ( ) & & Token : : Match ( tok - > astOperand1 ( ) , " %or%|&|%|*|/ " ) & & tok - > astOperand2 ( ) - > valueType ( ) & & tok - > astOperand2 ( ) - > valueType ( ) - > pointer > 0 )
2020-08-05 13:20:18 +02:00
continue ;
2020-09-28 19:18:34 +02:00
// bit operation in lhs and char literals in rhs => probably no mistake
if ( tok - > astOperand1 ( ) - > tokType ( ) = = Token : : eBitOp & & Token : : Match ( tok - > astOperand2 ( ) - > astOperand1 ( ) , " %char% " ) & & Token : : Match ( tok - > astOperand2 ( ) - > astOperand2 ( ) , " %char% " ) )
continue ;
2020-09-29 08:39:21 +02:00
// 2nd operand in lhs has known integer value => probably no mistake
if ( tok - > astOperand1 ( ) - > isBinaryOp ( ) & & tok - > astOperand1 ( ) - > astOperand2 ( ) - > hasKnownIntValue ( ) ) {
2020-09-28 19:18:34 +02:00
const Token * op = tok - > astOperand1 ( ) - > astOperand2 ( ) ;
if ( op - > isNumber ( ) )
continue ;
if ( op - > valueType ( ) & & op - > valueType ( ) - > isEnum ( ) )
continue ;
}
2013-12-24 10:07:20 +01:00
// Is code clarified by parentheses already?
const Token * tok2 = tok - > astOperand1 ( ) ;
for ( ; tok2 ; tok2 = tok2 - > next ( ) ) {
if ( tok2 - > str ( ) = = " ( " )
tok2 = tok2 - > link ( ) ;
2015-12-02 15:28:21 +01:00
else if ( tok2 - > str ( ) = = " ) " )
2013-12-24 10:07:20 +01:00
break ;
2015-12-02 15:28:21 +01:00
else if ( tok2 - > str ( ) = = " ? " ) {
clarifyCalculationError ( tok , tok - > astOperand1 ( ) - > str ( ) ) ;
break ;
}
2011-01-24 21:40:49 +01:00
}
}
}
}
2011-04-03 22:12:22 +02:00
void CheckOther : : clarifyCalculationError ( const Token * tok , const std : : string & op )
2011-01-24 21:40:49 +01:00
{
2011-04-02 11:43:20 +02:00
// suspicious calculation
2011-04-03 22:12:22 +02:00
const std : : string calc ( " 'a " + op + " b?c:d' " ) ;
2011-04-02 11:43:20 +02:00
// recommended calculation #1
2011-04-03 22:12:22 +02:00
const std : : string s1 ( " '(a " + op + " b)?c:d' " ) ;
2011-04-02 11:43:20 +02:00
// recommended calculation #2
2011-04-03 22:12:22 +02:00
const std : : string s2 ( " 'a " + op + " (b?c:d)' " ) ;
2011-04-02 11:43:20 +02:00
2011-01-24 21:40:49 +01:00
reportError ( tok ,
2011-03-09 22:20:14 +01:00
Severity : : style ,
2011-01-24 21:40:49 +01:00
" clarifyCalculation " ,
2012-09-16 19:44:02 +02:00
" Clarify calculation precedence for ' " + op + " ' and '?'. \n "
2011-04-02 11:43:20 +02:00
" Suspicious calculation. Please use parentheses to clarify the code. "
2021-02-24 22:00:06 +01:00
" The code ' " + calc + " ' should be written as either ' " + s1 + " ' or ' " + s2 + " '. " , CWE783 , Certainty : : normal ) ;
2011-01-24 21:40:49 +01:00
}
2012-08-24 11:28:50 +02:00
//---------------------------------------------------------------------------
2013-02-10 07:43:09 +01:00
// Clarify (meaningless) statements like *foo++; with parentheses.
2012-08-24 11:28:50 +02:00
//---------------------------------------------------------------------------
void CheckOther : : clarifyStatement ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2012-08-24 11:28:50 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart ; tok & & tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2015-01-31 10:50:39 +01:00
if ( Token : : Match ( tok , " * %name% " ) & & tok - > astOperand1 ( ) ) {
2015-07-08 13:41:27 +02:00
const Token * tok2 = tok - > previous ( ) ;
2012-11-14 18:12:33 +01:00
while ( tok2 & & tok2 - > str ( ) = = " * " )
2014-05-18 13:35:00 +02:00
tok2 = tok2 - > previous ( ) ;
2012-11-14 18:12:33 +01:00
2015-07-08 13:41:27 +02:00
if ( tok2 & & ! tok2 - > astParent ( ) & & Token : : Match ( tok2 , " [{};] " ) ) {
2014-05-18 13:35:00 +02:00
tok2 = tok - > astOperand1 ( ) ;
if ( Token : : Match ( tok2 , " ++|-- [;,] " ) )
clarifyStatementError ( tok2 ) ;
2012-09-03 17:10:27 +02:00
}
2012-08-24 11:28:50 +02:00
}
}
}
}
2012-09-15 20:19:02 +02:00
void CheckOther : : clarifyStatementError ( const Token * tok )
2012-08-24 11:28:50 +02:00
{
2019-06-22 08:44:41 +02:00
reportError ( tok , Severity : : warning , " clarifyStatement " , " In expression like '*A++' the result of '*' is unused. Did you intend to write '(*A)++;'? \n "
2012-09-15 20:19:02 +02:00
" A statement like '*A++;' might not do what you intended. Postfix 'operator++' is executed before 'operator*'. "
2021-02-24 22:00:06 +01:00
" Thus, the dereference is meaningless. Did you intend to write '(*A)++;'? " , CWE783 , Certainty : : normal ) ;
2012-08-24 11:28:50 +02:00
}
2014-08-27 09:42:09 +02:00
//---------------------------------------------------------------------------
2014-10-02 04:39:41 +02:00
// Check for suspicious occurrences of 'if(); {}'.
2014-08-27 09:42:09 +02:00
//---------------------------------------------------------------------------
2011-10-11 08:41:39 +02:00
void CheckOther : : checkSuspiciousSemicolon ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) | | ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2011-10-11 08:41:39 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * const symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2011-12-09 22:28:10 +01:00
// Look for "if(); {}", "for(); {}" or "while(); {}"
2018-07-14 12:28:57 +02:00
for ( const Scope & scope : symbolDatabase - > scopeList ) {
if ( scope . type = = Scope : : eIf | | scope . type = = Scope : : eElse | | scope . type = = Scope : : eWhile | | scope . type = = Scope : : eFor ) {
2011-10-11 08:41:39 +02:00
// Ensure the semicolon is at the same line number as the if/for/while statement
// and the {..} block follows it without an extra empty line.
2018-07-14 12:28:57 +02:00
if ( Token : : simpleMatch ( scope . bodyStart , " { ; } { " ) & &
2020-10-09 20:34:05 +02:00
scope . bodyStart - > previous ( ) - > linenr ( ) = = scope . bodyStart - > tokAt ( 2 ) - > linenr ( ) & &
scope . bodyStart - > linenr ( ) + 1 > = scope . bodyStart - > tokAt ( 3 ) - > linenr ( ) & &
! scope . bodyStart - > tokAt ( 3 ) - > isExpandedMacro ( ) ) {
2019-11-20 15:37:09 +01:00
suspiciousSemicolonError ( scope . classDef ) ;
2011-10-11 08:41:39 +02:00
}
}
}
}
2019-11-20 15:37:09 +01:00
void CheckOther : : suspiciousSemicolonError ( const Token * tok )
2011-10-11 08:41:39 +02:00
{
2012-05-06 19:37:41 +02:00
reportError ( tok , Severity : : warning , " suspiciousSemicolon " ,
2021-02-24 22:00:06 +01:00
" Suspicious use of ; at the end of ' " + ( tok ? tok - > str ( ) : std : : string ( ) ) + " ' statement. " , CWE398 , Certainty : : normal ) ;
2011-10-11 08:41:39 +02:00
}
2011-10-06 22:01:48 +02:00
//---------------------------------------------------------------------------
2014-08-27 09:42:09 +02:00
// For C++ code, warn if C-style casts are used on pointer types
2011-08-19 17:53:43 +02:00
//---------------------------------------------------------------------------
2009-07-05 22:16:43 +02:00
void CheckOther : : warningOldStylePointerCast ( )
2009-01-26 20:14:46 +01:00
{
2012-03-03 21:14:20 +01:00
// Only valid on C++ code
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) | | ! mTokenizer - > isCPP ( ) )
2011-10-26 21:17:27 +02:00
return ;
2010-04-21 08:38:25 +02:00
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2014-08-04 11:20:48 +02:00
const Token * tok ;
if ( scope - > function & & scope - > function - > isConstructor ( ) )
tok = scope - > classDef ;
else
2018-04-27 22:36:30 +02:00
tok = scope - > bodyStart ;
for ( ; tok & & tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2014-04-29 06:21:30 +02:00
// Old style pointer casting..
2022-02-10 20:48:51 +01:00
if ( ! Token : : Match ( tok , " ( const|volatile| const|volatile|class|struct| %type% * const|&| ) (| %name%|%num%|%bool%|%char%|%str% " ) )
2014-04-29 06:21:30 +02:00
continue ;
2022-02-23 09:12:14 +01:00
if ( Token : : Match ( tok - > previous ( ) , " %type% " ) )
continue ;
2009-01-26 20:14:46 +01:00
2014-09-01 14:40:28 +02:00
// skip first "const" in "const Type* const"
2022-02-10 20:48:51 +01:00
while ( Token : : Match ( tok - > next ( ) , " const|volatile|class|struct " ) )
2014-04-29 06:21:30 +02:00
tok = tok - > next ( ) ;
2015-11-09 11:12:22 +01:00
const Token * typeTok = tok - > next ( ) ;
2014-09-01 14:40:28 +02:00
// skip second "const" in "const Type* const"
if ( tok - > strAt ( 3 ) = = " const " )
tok = tok - > next ( ) ;
2009-07-20 21:52:27 +02:00
2016-10-18 22:56:33 +02:00
const Token * p = tok - > tokAt ( 4 ) ;
2017-03-27 18:48:34 +02:00
if ( p - > hasKnownIntValue ( ) & & p - > values ( ) . front ( ) . intvalue = = 0 ) // Casting nullpointers is safe
2014-08-04 11:42:14 +02:00
continue ;
2022-02-10 20:48:51 +01:00
if ( typeTok - > tokType ( ) = = Token : : eType | | typeTok - > tokType ( ) = = Token : : eName )
2014-04-29 06:21:30 +02:00
cstyleCastError ( tok ) ;
}
2009-01-26 20:14:46 +01:00
}
}
2011-08-19 17:53:43 +02:00
void CheckOther : : cstyleCastError ( const Token * tok )
{
2014-05-22 08:57:45 +02:00
reportError ( tok , Severity : : style , " cstyleCast " ,
" C-style pointer casting \n "
" C-style pointer casting detected. C++ offers four different kinds of casts as replacements: "
" static_cast, const_cast, dynamic_cast and reinterpret_cast. A C-style cast could evaluate to "
2014-05-22 15:45:28 +02:00
" any of those automatically, thus it is considered safer if the programmer explicitly states "
2021-02-24 22:00:06 +01:00
" which kind of cast is expected. See also: https://www.securecoding.cert.org/confluence/display/cplusplus/EXP05-CPP.+Do+not+use+C-style+casts. " , CWE398 , Certainty : : normal ) ;
2011-08-19 17:53:43 +02:00
}
2012-02-26 11:56:32 +01:00
//---------------------------------------------------------------------------
// float* f; double* d = (double*)f; <-- Pointer cast to a type with an incompatible binary data representation
//---------------------------------------------------------------------------
void CheckOther : : invalidPointerCast ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : portability ) )
2012-02-26 11:56:32 +01:00
return ;
2021-02-24 22:00:06 +01:00
const bool printInconclusive = mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * const symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2015-08-09 13:45:35 +02:00
const Token * toTok = nullptr ;
2016-02-05 19:51:45 +01:00
const Token * fromTok = nullptr ;
2012-11-14 18:12:33 +01:00
// Find cast
2018-05-10 07:40:01 +02:00
if ( Token : : Match ( tok , " ( const|volatile| const|volatile| %type% %type%| const| * ) " ) ) {
2016-02-05 19:51:45 +01:00
toTok = tok ;
fromTok = tok - > astOperand1 ( ) ;
2016-02-05 21:06:07 +01:00
} else if ( Token : : simpleMatch ( tok , " reinterpret_cast < " ) & & tok - > linkAt ( 1 ) ) {
2016-02-05 19:51:45 +01:00
toTok = tok - > linkAt ( 1 ) - > next ( ) ;
fromTok = toTok - > astOperand2 ( ) ;
2012-11-14 18:12:33 +01:00
}
2016-02-05 19:51:45 +01:00
if ( ! fromTok )
2014-11-30 14:14:53 +01:00
continue ;
2012-02-26 11:56:32 +01:00
2016-02-05 19:51:45 +01:00
const ValueType * fromType = fromTok - > valueType ( ) ;
const ValueType * toType = toTok - > valueType ( ) ;
if ( ! fromType | | ! toType | | ! fromType - > pointer | | ! toType - > pointer )
2012-11-14 18:12:33 +01:00
continue ;
2012-02-26 11:56:32 +01:00
2016-02-05 19:51:45 +01:00
if ( fromType - > type ! = toType - > type & & fromType - > type > = ValueType : : Type : : BOOL & & toType - > type > = ValueType : : Type : : BOOL & & ( toType - > type ! = ValueType : : Type : : CHAR | | printInconclusive ) ) {
if ( toType - > isIntegral ( ) & & fromType - > isIntegral ( ) )
2012-11-14 18:12:33 +01:00
continue ;
2016-02-05 19:51:45 +01:00
2019-11-11 07:17:50 +01:00
invalidPointerCastError ( tok , fromType - > str ( ) , toType - > str ( ) , toType - > type = = ValueType : : Type : : CHAR , toType - > isIntegral ( ) ) ;
2012-11-14 18:12:33 +01:00
}
}
2012-02-26 11:56:32 +01:00
}
}
2019-11-11 07:17:50 +01:00
void CheckOther : : invalidPointerCastError ( const Token * tok , const std : : string & from , const std : : string & to , bool inconclusive , bool toIsInt )
2012-02-26 11:56:32 +01:00
{
2019-11-11 07:17:50 +01:00
if ( toIsInt ) { // If we cast something to int*, this can be useful to play with its binary data representation
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : portability , " invalidPointerCast " , " Casting from " + from + " to " + to + " is not portable due to different binary data representations on different platforms. " , CWE704 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2012-03-25 12:55:39 +02:00
} else
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : portability , " invalidPointerCast " , " Casting between " + from + " and " + to + " which have an incompatible binary data representation. " , CWE704 , Certainty : : normal ) ;
2012-02-26 11:56:32 +01:00
}
2013-02-17 17:33:32 +01:00
//---------------------------------------------------------------------------
// This check detects errors on POSIX systems, when a pipe command called
// with a wrong dimensioned file descriptor array. The pipe command requires
// exactly an integer array of dimension two as parameter.
//
// References:
// - http://linux.die.net/man/2/pipe
// - ticket #3521
//---------------------------------------------------------------------------
void CheckOther : : checkPipeParameterSize ( )
{
2019-04-12 06:47:28 +02:00
if ( ! mSettings - > posix ( ) )
2013-02-17 17:33:32 +01:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2013-02-17 17:33:32 +01:00
if ( Token : : Match ( tok , " pipe ( %var% ) " ) | |
Token : : Match ( tok , " pipe2 ( %var% , " ) ) {
const Token * const varTok = tok - > tokAt ( 2 ) ;
const Variable * var = varTok - > variable ( ) ;
MathLib : : bigint dim ;
2013-07-02 13:28:44 +02:00
if ( var & & var - > isArray ( ) & & ! var - > isArgument ( ) & & ( ( dim = var - > dimension ( 0U ) ) < 2 ) ) {
2013-09-21 18:48:48 +02:00
const std : : string strDim = MathLib : : toString ( dim ) ;
2013-02-17 17:33:32 +01:00
checkPipeParameterSizeError ( varTok , varTok - > str ( ) , strDim ) ;
}
}
}
}
}
void CheckOther : : checkPipeParameterSizeError ( const Token * tok , const std : : string & strVarName , const std : : string & strDim )
{
reportError ( tok , Severity : : error ,
2018-04-09 06:43:48 +02:00
" wrongPipeParameterSize " ,
" $symbol: " + strVarName + " \n "
" Buffer '$symbol' must have size of 2 integers if used as parameter of pipe(). \n "
2013-03-03 18:54:44 +01:00
" The pipe()/pipe2() system command takes an argument, which is an array of exactly two integers. \n "
2021-02-24 22:00:06 +01:00
" The variable '$symbol' is an array of size " + strDim + " , which does not match. " , CWE686 , Certainty : : safe ) ;
2013-02-17 17:33:32 +01:00
}
2012-09-02 13:09:32 +02:00
//---------------------------------------------------------------------------
// Detect redundant assignments: x = 0; x = 4;
//---------------------------------------------------------------------------
2018-11-24 10:03:54 +01:00
void CheckOther : : checkRedundantAssignment ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2018-11-27 13:04:50 +01:00
return ;
2018-11-24 10:03:54 +01:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
if ( ! scope - > bodyStart )
continue ;
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
if ( Token : : simpleMatch ( tok , " ] ( " ) )
// todo: handle lambdas
break ;
if ( Token : : simpleMatch ( tok , " try { " ) )
// todo: check try blocks
tok = tok - > linkAt ( 1 ) ;
if ( ( tok - > isAssignmentOp ( ) | | Token : : Match ( tok , " ++|-- " ) ) & & tok - > astOperand1 ( ) ) {
if ( tok - > astParent ( ) )
continue ;
2018-11-25 08:49:09 +01:00
2018-11-26 11:16:50 +01:00
// Do not warn about redundant initialization when rhs is trivial
2018-11-25 08:49:09 +01:00
// TODO : do not simplify the variable declarations
2019-08-25 09:45:39 +02:00
bool isInitialization = false ;
2020-09-09 16:22:36 +02:00
if ( Token : : Match ( tok - > tokAt ( - 2 ) , " ; %var% = " ) & & tok - > tokAt ( - 2 ) - > isSplittedVarDeclEq ( ) ) {
2019-08-25 09:45:39 +02:00
isInitialization = true ;
2018-11-26 11:16:50 +01:00
bool trivial = true ;
visitAstNodes ( tok - > astOperand2 ( ) ,
2021-08-07 20:51:18 +02:00
[ & ] ( const Token * rhs ) {
2019-08-23 16:56:28 +02:00
if ( Token : : simpleMatch ( rhs , " { 0 } " ) )
2019-08-23 08:51:16 +02:00
return ChildrenToVisit : : none ;
2019-08-23 15:23:49 +02:00
if ( Token : : Match ( rhs , " %str%|%num%|%name% " ) & & ! rhs - > varId ( ) )
return ChildrenToVisit : : none ;
2019-10-20 07:07:38 +02:00
if ( Token : : Match ( rhs , " :: %name% " ) & & rhs - > hasKnownIntValue ( ) )
return ChildrenToVisit : : none ;
2019-08-23 08:51:16 +02:00
if ( rhs - > isCast ( ) )
return ChildrenToVisit : : op2 ;
2018-11-26 11:16:50 +01:00
trivial = false ;
return ChildrenToVisit : : done ;
} ) ;
if ( trivial )
continue ;
}
2018-11-25 08:49:09 +01:00
2020-02-09 11:16:08 +01:00
const Token * rhs = tok - > astOperand2 ( ) ;
2018-11-25 08:49:09 +01:00
// Do not warn about assignment with 0 / NULL
2020-02-09 11:16:08 +01:00
if ( ( rhs & & MathLib : : isNullValue ( rhs - > str ( ) ) ) | | isNullOperand ( rhs ) )
2018-11-24 10:03:54 +01:00
continue ;
2018-11-25 08:49:09 +01:00
2018-11-24 10:03:54 +01:00
if ( tok - > astOperand1 ( ) - > variable ( ) & & tok - > astOperand1 ( ) - > variable ( ) - > isReference ( ) )
// todo: check references
continue ;
2018-11-25 08:49:09 +01:00
2018-11-24 10:03:54 +01:00
if ( tok - > astOperand1 ( ) - > variable ( ) & & tok - > astOperand1 ( ) - > variable ( ) - > isStatic ( ) )
// todo: check static variables
continue ;
2018-11-25 08:49:09 +01:00
2018-11-24 10:03:54 +01:00
bool inconclusive = false ;
2022-01-24 21:50:50 +01:00
if ( mTokenizer - > isCPP ( ) & & tok - > astOperand1 ( ) - > valueType ( ) ) {
// If there is a custom assignment operator => this is inconclusive
if ( tok - > astOperand1 ( ) - > valueType ( ) - > typeScope ) {
const std : : string op = " operator " + tok - > str ( ) ;
for ( const Function & f : tok - > astOperand1 ( ) - > valueType ( ) - > typeScope - > functionList ) {
if ( f . name ( ) = = op ) {
inconclusive = true ;
break ;
}
2018-10-08 21:07:21 +02:00
}
}
2022-01-24 21:50:50 +01:00
// assigning a smart pointer has side effects
if ( tok - > astOperand1 ( ) - > valueType ( ) - > type = = ValueType : : SMART_POINTER )
break ;
2018-10-08 21:07:21 +02:00
}
2021-02-24 22:00:06 +01:00
if ( inconclusive & & ! mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) )
2018-11-24 10:03:54 +01:00
continue ;
2018-10-08 21:07:21 +02:00
2018-12-31 18:00:47 +01:00
FwdAnalysis fwdAnalysis ( mTokenizer - > isCPP ( ) , mSettings - > library ) ;
2018-12-02 17:01:52 +01:00
if ( fwdAnalysis . hasOperand ( tok - > astOperand2 ( ) , tok - > astOperand1 ( ) ) )
continue ;
2018-11-25 08:49:09 +01:00
// Is there a redundant assignment?
2018-11-24 10:03:54 +01:00
const Token * start ;
if ( tok - > isAssignmentOp ( ) )
start = tok - > next ( ) ;
else
start = tok - > findExpressionStartEndTokens ( ) . second - > next ( ) ;
2018-12-02 14:04:59 +01:00
// Get next assignment..
2018-12-02 18:29:16 +01:00
const Token * nextAssign = fwdAnalysis . reassign ( tok - > astOperand1 ( ) , start , scope - > bodyEnd ) ;
2018-12-02 14:04:59 +01:00
2018-12-02 18:29:16 +01:00
if ( ! nextAssign )
2018-11-24 10:03:54 +01:00
continue ;
2018-11-25 08:49:09 +01:00
// there is redundant assignment. Is there a case between the assignments?
2018-11-24 10:03:54 +01:00
bool hasCase = false ;
2018-12-02 18:29:16 +01:00
for ( const Token * tok2 = tok ; tok2 ! = nextAssign ; tok2 = tok2 - > next ( ) ) {
2018-12-17 16:10:43 +01:00
if ( tok2 - > str ( ) = = " break " | | tok2 - > str ( ) = = " return " )
break ;
2018-11-24 10:03:54 +01:00
if ( tok2 - > str ( ) = = " case " ) {
hasCase = true ;
break ;
2012-09-02 13:09:32 +02:00
}
}
2018-11-24 10:03:54 +01:00
2018-11-25 08:49:09 +01:00
// warn
2018-11-24 10:03:54 +01:00
if ( hasCase )
2018-12-02 18:29:16 +01:00
redundantAssignmentInSwitchError ( tok , nextAssign , tok - > astOperand1 ( ) - > expressionString ( ) ) ;
2019-08-25 09:45:39 +02:00
else if ( isInitialization )
redundantInitializationError ( tok , nextAssign , tok - > astOperand1 ( ) - > expressionString ( ) , inconclusive ) ;
2018-11-24 10:03:54 +01:00
else
2018-12-02 18:29:16 +01:00
redundantAssignmentError ( tok , nextAssign , tok - > astOperand1 ( ) - > expressionString ( ) , inconclusive ) ;
2012-09-02 13:09:32 +02:00
}
}
}
}
void CheckOther : : redundantCopyError ( const Token * tok1 , const Token * tok2 , const std : : string & var )
{
2018-04-08 22:54:10 +02:00
const std : : list < const Token * > callstack = { tok1 , tok2 } ;
2012-09-02 13:09:32 +02:00
reportError ( callstack , Severity : : performance , " redundantCopy " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + var + " \n "
2021-02-24 22:00:06 +01:00
" Buffer '$symbol' is being written before its old content has been used. " , CWE563 , Certainty : : normal ) ;
2012-09-02 13:09:32 +02:00
}
void CheckOther : : redundantCopyInSwitchError ( const Token * tok1 , const Token * tok2 , const std : : string & var )
{
2018-04-08 22:54:10 +02:00
const std : : list < const Token * > callstack = { tok1 , tok2 } ;
2020-11-15 13:09:28 +01:00
reportError ( callstack , Severity : : style , " redundantCopyInSwitch " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + var + " \n "
2021-02-24 22:00:06 +01:00
" Buffer '$symbol' is being written before its old content has been used. 'break;' missing? " , CWE563 , Certainty : : normal ) ;
2012-09-02 13:09:32 +02:00
}
2013-02-15 18:01:10 +01:00
void CheckOther : : redundantAssignmentError ( const Token * tok1 , const Token * tok2 , const std : : string & var , bool inconclusive )
2012-09-02 13:09:32 +02:00
{
2019-09-04 10:55:41 +02:00
const ErrorPath errorPath = { ErrorPathItem ( tok1 , var + " is assigned " ) , ErrorPathItem ( tok2 , var + " is overwritten " ) } ;
2013-02-15 18:01:10 +01:00
if ( inconclusive )
2019-09-04 10:55:41 +02:00
reportError ( errorPath , Severity : : style , " redundantAssignment " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + var + " \n "
" Variable '$symbol' is reassigned a value before the old one has been used if variable is no semaphore variable. \n "
2021-02-24 22:00:06 +01:00
" Variable '$symbol' is reassigned a value before the old one has been used. Make sure that this variable is not used like a semaphore in a threading environment before simplifying this code. " , CWE563 , Certainty : : inconclusive ) ;
2013-02-15 18:01:10 +01:00
else
2019-09-04 10:55:41 +02:00
reportError ( errorPath , Severity : : style , " redundantAssignment " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + var + " \n "
2021-02-24 22:00:06 +01:00
" Variable '$symbol' is reassigned a value before the old one has been used. " , CWE563 , Certainty : : normal ) ;
2012-09-02 13:09:32 +02:00
}
2019-08-25 09:45:39 +02:00
void CheckOther : : redundantInitializationError ( const Token * tok1 , const Token * tok2 , const std : : string & var , bool inconclusive )
{
2019-09-04 10:55:41 +02:00
const ErrorPath errorPath = { ErrorPathItem ( tok1 , var + " is initialized " ) , ErrorPathItem ( tok2 , var + " is overwritten " ) } ;
reportError ( errorPath , Severity : : style , " redundantInitialization " ,
2019-08-25 10:24:13 +02:00
" $symbol: " + var + " \n Redundant initialization for '$symbol'. The initialized value is overwritten before it is read. " ,
2019-08-25 09:45:39 +02:00
CWE563 ,
2021-02-24 22:00:06 +01:00
inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2019-08-25 09:45:39 +02:00
}
2012-09-02 13:09:32 +02:00
void CheckOther : : redundantAssignmentInSwitchError ( const Token * tok1 , const Token * tok2 , const std : : string & var )
{
2019-09-04 10:55:41 +02:00
const ErrorPath errorPath = { ErrorPathItem ( tok1 , " $symbol is assigned " ) , ErrorPathItem ( tok2 , " $symbol is overwritten " ) } ;
2020-11-15 13:09:28 +01:00
reportError ( errorPath , Severity : : style , " redundantAssignInSwitch " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + var + " \n "
2021-02-24 22:00:06 +01:00
" Variable '$symbol' is reassigned a value before the old one has been used. 'break;' missing? " , CWE563 , Certainty : : normal ) ;
2012-09-02 13:09:32 +02:00
}
2010-06-30 09:10:30 +02:00
//---------------------------------------------------------------------------
// switch (x)
// {
// case 2:
// y = a; // <- this assignment is redundant
// case 3:
// y = b; // <- case 2 falls through and sets y twice
// }
//---------------------------------------------------------------------------
2013-01-17 10:15:01 +01:00
static inline bool isFunctionOrBreakPattern ( const Token * tok )
{
2015-01-31 10:50:39 +01:00
if ( Token : : Match ( tok , " %name% ( " ) | | Token : : Match ( tok , " break|continue|return|exit|goto|throw " ) )
2013-01-17 10:15:01 +01:00
return true ;
return false ;
}
2010-06-30 09:10:30 +02:00
void CheckOther : : checkRedundantAssignmentInSwitch ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2011-12-16 19:21:14 +01:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2012-03-03 21:14:20 +01:00
2010-06-30 09:10:30 +02:00
// Find the beginning of a switch. E.g.:
// switch (var) { ...
2018-07-14 12:28:57 +02:00
for ( const Scope & switchScope : symbolDatabase - > scopeList ) {
if ( switchScope . type ! = Scope : : eSwitch | | ! switchScope . bodyStart )
2012-03-03 21:14:20 +01:00
continue ;
2010-06-30 09:10:30 +02:00
// Check the contents of the switch statement
2019-07-16 09:10:10 +02:00
std : : map < int , const Token * > varsWithBitsSet ;
std : : map < int , std : : string > bitOperations ;
2012-05-29 06:19:22 +02:00
2018-07-14 12:28:57 +02:00
for ( const Token * tok2 = switchScope . bodyStart - > next ( ) ; tok2 ! = switchScope . bodyEnd ; tok2 = tok2 - > next ( ) ) {
2011-10-13 20:53:06 +02:00
if ( tok2 - > str ( ) = = " { " ) {
2010-06-30 09:10:30 +02:00
// Inside a conditional or loop. Don't mark variable accesses as being redundant. E.g.:
// case 3: b = 1;
// case 4: if (a) { b = 2; } // Doesn't make the b=1 redundant because it's conditional
2011-10-13 20:53:06 +02:00
if ( Token : : Match ( tok2 - > previous ( ) , " )|else { " ) & & tok2 - > link ( ) ) {
2010-06-30 09:10:30 +02:00
const Token * endOfConditional = tok2 - > link ( ) ;
2011-10-13 20:53:06 +02:00
for ( const Token * tok3 = tok2 ; tok3 ! = endOfConditional ; tok3 = tok3 - > next ( ) ) {
if ( tok3 - > varId ( ) ! = 0 ) {
2012-05-29 06:19:22 +02:00
varsWithBitsSet . erase ( tok3 - > varId ( ) ) ;
bitOperations . erase ( tok3 - > varId ( ) ) ;
2013-01-17 10:15:01 +01:00
} else if ( isFunctionOrBreakPattern ( tok3 ) ) {
2012-05-29 06:19:22 +02:00
varsWithBitsSet . clear ( ) ;
bitOperations . clear ( ) ;
2011-10-13 10:27:22 +02:00
}
2010-06-30 09:10:30 +02:00
}
tok2 = endOfConditional ;
2012-03-03 21:14:20 +01:00
}
2010-06-30 09:10:30 +02:00
}
// Variable assignment. Report an error if it's assigned to twice before a break. E.g.:
// case 3: b = 1; // <== redundant
// case 4: b = 2;
2012-08-22 14:40:57 +02:00
2015-01-31 10:50:39 +01:00
if ( Token : : Match ( tok2 - > previous ( ) , " ;|{|}|: %var% = %any% ; " ) ) {
2012-05-29 06:19:22 +02:00
varsWithBitsSet . erase ( tok2 - > varId ( ) ) ;
bitOperations . erase ( tok2 - > varId ( ) ) ;
}
// Bitwise operation. Report an error if it's performed twice before a break. E.g.:
// case 3: b |= 1; // <== redundant
// case 4: b |= 1;
2015-12-31 01:15:49 +01:00
else if ( Token : : Match ( tok2 - > previous ( ) , " ; | { | } | : % var % % assign % % num % ; " ) &&
( tok2 - > strAt ( 1 ) = = " |= " | | tok2 - > strAt ( 1 ) = = " &= " ) & &
Token : : Match ( tok2 - > next ( ) - > astOperand2 ( ) , " %num% " ) ) {
2018-04-04 21:51:31 +02:00
const std : : string bitOp = tok2 - > strAt ( 1 ) [ 0 ] + tok2 - > strAt ( 2 ) ;
2019-07-16 09:10:10 +02:00
const std : : map < int , const Token * > : : const_iterator i2 = varsWithBitsSet . find ( tok2 - > varId ( ) ) ;
2015-12-31 01:15:49 +01:00
// This variable has not had a bit operation performed on it yet, so just make a note of it
if ( i2 = = varsWithBitsSet . end ( ) ) {
varsWithBitsSet [ tok2 - > varId ( ) ] = tok2 ;
bitOperations [ tok2 - > varId ( ) ] = bitOp ;
}
// The same bit operation has been performed on the same variable twice, so report an error
else if ( bitOperations [ tok2 - > varId ( ) ] = = bitOp )
redundantBitwiseOperationInSwitchError ( i2 - > second , i2 - > second - > str ( ) ) ;
// A different bit operation was performed on the variable, so clear it
else {
varsWithBitsSet . erase ( tok2 - > varId ( ) ) ;
bitOperations . erase ( tok2 - > varId ( ) ) ;
}
}
// Bitwise operation. Report an error if it's performed twice before a break. E.g.:
// case 3: b = b | 1; // <== redundant
// case 4: b = b | 1;
2015-01-31 10:50:39 +01:00
else if ( Token : : Match ( tok2 - > previous ( ) , " ; | { | } | : % var % = % name % % or % | & % num % ; " ) &&
tok2 - > varId ( ) = = tok2 - > tokAt ( 2 ) - > varId ( ) ) {
2018-04-04 21:51:31 +02:00
const std : : string bitOp = tok2 - > strAt ( 3 ) + tok2 - > strAt ( 4 ) ;
2019-07-16 09:10:10 +02:00
const std : : map < int , const Token * > : : const_iterator i2 = varsWithBitsSet . find ( tok2 - > varId ( ) ) ;
2012-05-29 06:19:22 +02:00
// This variable has not had a bit operation performed on it yet, so just make a note of it
if ( i2 = = varsWithBitsSet . end ( ) ) {
varsWithBitsSet [ tok2 - > varId ( ) ] = tok2 ;
bitOperations [ tok2 - > varId ( ) ] = bitOp ;
}
// The same bit operation has been performed on the same variable twice, so report an error
else if ( bitOperations [ tok2 - > varId ( ) ] = = bitOp )
redundantBitwiseOperationInSwitchError ( i2 - > second , i2 - > second - > str ( ) ) ;
// A different bit operation was performed on the variable, so clear it
else {
varsWithBitsSet . erase ( tok2 - > varId ( ) ) ;
bitOperations . erase ( tok2 - > varId ( ) ) ;
}
2011-10-13 10:27:22 +02:00
}
2012-05-29 06:19:22 +02:00
2010-06-30 09:10:30 +02:00
// Not a simple assignment so there may be good reason if this variable is assigned to twice. E.g.:
// case 3: b = 1;
// case 4: b++;
2012-05-29 06:19:22 +02:00
else if ( tok2 - > varId ( ) ! = 0 & & tok2 - > strAt ( 1 ) ! = " | " & & tok2 - > strAt ( 1 ) ! = " & " ) {
varsWithBitsSet . erase ( tok2 - > varId ( ) ) ;
bitOperations . erase ( tok2 - > varId ( ) ) ;
}
2010-06-30 09:10:30 +02:00
// Reset our record of assignments if there is a break or function call. E.g.:
// case 3: b = 1; break;
2013-01-17 10:15:01 +01:00
if ( isFunctionOrBreakPattern ( tok2 ) ) {
2012-05-29 06:19:22 +02:00
varsWithBitsSet . clear ( ) ;
bitOperations . clear ( ) ;
2011-10-13 10:27:22 +02:00
}
2010-06-30 09:10:30 +02:00
}
}
}
2012-05-29 06:19:22 +02:00
void CheckOther : : redundantBitwiseOperationInSwitchError ( const Token * tok , const std : : string & varname )
{
2020-11-15 13:09:28 +01:00
reportError ( tok , Severity : : style ,
2018-04-09 06:43:48 +02:00
" redundantBitwiseOperationInSwitch " ,
" $symbol: " + varname + " \n "
" Redundant bitwise operation on '$symbol' in 'switch' statement. 'break;' missing? " ) ;
2012-05-29 06:19:22 +02:00
}
2011-10-13 10:27:22 +02:00
2012-12-07 21:27:32 +01:00
//---------------------------------------------------------------------------
// Check for statements like case A||B: in switch()
//---------------------------------------------------------------------------
void CheckOther : : checkSuspiciousCaseInSwitch ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) | | ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2012-12-07 21:27:32 +01:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2012-12-07 21:27:32 +01:00
2018-04-19 22:31:36 +02:00
for ( const Scope & scope : symbolDatabase - > scopeList ) {
if ( scope . type ! = Scope : : eSwitch )
2012-12-07 21:27:32 +01:00
continue ;
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope . bodyStart - > next ( ) ; tok ! = scope . bodyEnd ; tok = tok - > next ( ) ) {
2012-12-07 21:27:32 +01:00
if ( tok - > str ( ) = = " case " ) {
2014-04-11 11:56:25 +02:00
const Token * finding = nullptr ;
2012-12-07 21:27:32 +01:00
for ( const Token * tok2 = tok - > next ( ) ; tok2 ; tok2 = tok2 - > next ( ) ) {
2014-04-11 11:56:25 +02:00
if ( tok2 - > str ( ) = = " : " )
2012-12-07 21:27:32 +01:00
break ;
2014-04-11 11:56:25 +02:00
if ( Token : : Match ( tok2 , " [;}{] " ) )
2012-12-07 21:44:30 +01:00
break ;
2015-09-04 09:42:26 +02:00
2014-04-11 11:56:25 +02:00
if ( tok2 - > str ( ) = = " ? " )
finding = nullptr ;
2015-09-04 09:42:26 +02:00
else if ( Token : : Match ( tok2 , " &&|%oror% " ) )
2014-04-11 11:56:25 +02:00
finding = tok2 ;
2012-12-07 21:27:32 +01:00
}
2014-04-11 11:56:25 +02:00
if ( finding )
suspiciousCaseInSwitchError ( finding , finding - > str ( ) ) ;
2012-12-07 21:27:32 +01:00
}
}
}
}
void CheckOther : : suspiciousCaseInSwitchError ( const Token * tok , const std : : string & operatorString )
{
reportError ( tok , Severity : : warning , " suspiciousCase " ,
" Found suspicious case label in switch(). Operator ' " + operatorString + " ' probably doesn't work as intended. \n "
2021-02-24 22:00:06 +01:00
" Using an operator like ' " + operatorString + " ' in a case label is suspicious. Did you intend to use a bitwise operator, multiple case labels or if/else instead? " , CWE398 , Certainty : : inconclusive ) ;
2012-12-07 21:27:32 +01:00
}
2011-07-15 02:12:56 +02:00
//---------------------------------------------------------------------------
2011-12-03 11:43:23 +01:00
// Find consecutive return, break, continue, goto or throw statements. e.g.:
// break; break;
// Detect dead code, that follows such a statement. e.g.:
// return(0); foo();
2011-07-15 02:12:56 +02:00
//---------------------------------------------------------------------------
2011-12-03 11:43:23 +01:00
void CheckOther : : checkUnreachableCode ( )
2011-07-15 02:12:56 +02:00
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2011-07-15 02:12:56 +02:00
return ;
2021-02-24 22:00:06 +01:00
const bool printInconclusive = mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart ; tok & & tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2017-07-28 15:20:43 +02:00
const Token * secondBreak = nullptr ;
const Token * labelName = nullptr ;
2014-09-01 11:29:39 +02:00
if ( tok - > link ( ) & & Token : : Match ( tok , " (|[|< " ) )
tok = tok - > link ( ) ;
else if ( Token : : Match ( tok , " break|continue ; " ) )
secondBreak = tok - > tokAt ( 2 ) ;
2021-04-05 04:53:07 +02:00
else if ( Token : : Match ( tok , " [;{}:] return|throw " ) & & tok - > next ( ) - > isKeyword ( ) ) {
2018-11-12 06:31:17 +01:00
if ( Token : : simpleMatch ( tok - > astParent ( ) , " ? " ) )
continue ;
2014-09-01 11:29:39 +02:00
tok = tok - > next ( ) ; // tok should point to return or throw
for ( const Token * tok2 = tok - > next ( ) ; tok2 ; tok2 = tok2 - > next ( ) ) {
if ( tok2 - > str ( ) = = " ( " | | tok2 - > str ( ) = = " { " )
tok2 = tok2 - > link ( ) ;
if ( tok2 - > str ( ) = = " ; " ) {
secondBreak = tok2 - > next ( ) ;
break ;
}
2011-12-03 11:43:23 +01:00
}
2014-09-01 11:29:39 +02:00
} else if ( Token : : Match ( tok , " goto %any% ; " ) ) {
secondBreak = tok - > tokAt ( 3 ) ;
labelName = tok - > next ( ) ;
2018-06-16 16:10:28 +02:00
} else if ( Token : : Match ( tok , " %name% ( " ) & & mSettings - > library . isnoreturn ( tok ) & & ! Token : : Match ( tok - > next ( ) - > astParent ( ) , " ?|: " ) ) {
2014-09-01 11:29:39 +02:00
if ( ( ! tok - > function ( ) | | ( tok - > function ( ) - > token ! = tok & & tok - > function ( ) - > tokenDef ! = tok ) ) & & tok - > linkAt ( 1 ) - > strAt ( 1 ) ! = " { " )
secondBreak = tok - > linkAt ( 1 ) - > tokAt ( 2 ) ;
2021-06-29 11:16:54 +02:00
if ( Token : : simpleMatch ( secondBreak , " return " ) ) {
// clarification for tools that function returns
continue ;
}
2013-05-11 17:50:59 +02:00
}
2011-12-03 11:43:23 +01:00
2014-09-01 11:29:39 +02:00
// Statements follow directly, no line between them. (#3383)
// TODO: Try to find a better way to avoid false positives due to preprocessor configurations.
2015-05-25 08:20:14 +02:00
const bool inconclusive = secondBreak & & ( secondBreak - > linenr ( ) - 1 > secondBreak - > previous ( ) - > linenr ( ) ) ;
2014-09-01 11:29:39 +02:00
2015-04-10 14:18:52 +02:00
if ( secondBreak & & ( printInconclusive | | ! inconclusive ) ) {
2021-04-05 04:53:07 +02:00
if ( Token : : Match ( secondBreak , " continue|goto|throw|return " ) & & secondBreak - > isKeyword ( ) ) {
2012-04-05 10:38:29 +02:00
duplicateBreakError ( secondBreak , inconclusive ) ;
2014-09-01 11:29:39 +02:00
tok = Token : : findmatch ( secondBreak , " [}:] " ) ;
} else if ( secondBreak - > str ( ) = = " break " ) { // break inside switch as second break statement should not issue a warning
if ( tok - > str ( ) = = " break " ) // If the previous was a break, too: Issue warning
2012-08-12 12:13:07 +02:00
duplicateBreakError ( secondBreak , inconclusive ) ;
2014-09-01 11:29:39 +02:00
else {
if ( tok - > scope ( ) - > type ! = Scope : : eSwitch ) // Check, if the enclosing scope is a switch
duplicateBreakError ( secondBreak , inconclusive ) ;
}
tok = Token : : findmatch ( secondBreak , " [}:] " ) ;
} else if ( ! Token : : Match ( secondBreak , " return|}|case|default " ) & & secondBreak - > strAt ( 1 ) ! = " : " ) { // TODO: No bailout for unconditional scopes
// If the goto label is followed by a loop construct in which the label is defined it's quite likely
// that the goto jump was intended to skip some code on the first loop iteration.
bool labelInFollowingLoop = false ;
if ( labelName & & Token : : Match ( secondBreak , " while|do|for " ) ) {
2014-09-02 19:18:30 +02:00
const Token * scope2 = Token : : findsimplematch ( secondBreak , " { " ) ;
if ( scope2 ) {
for ( const Token * tokIter = scope2 ; tokIter ! = scope2 - > link ( ) & & tokIter ; tokIter = tokIter - > next ( ) ) {
2014-09-01 11:29:39 +02:00
if ( Token : : Match ( tokIter , " [;{}] %any% : " ) & & labelName - > str ( ) = = tokIter - > strAt ( 1 ) ) {
labelInFollowingLoop = true ;
break ;
}
2011-12-31 23:11:03 +01:00
}
}
}
2014-12-22 11:15:22 +01:00
// hide FP for statements that just hide compiler warnings about unused function arguments
bool silencedCompilerWarningOnly = false ;
const Token * silencedWarning = secondBreak ;
for ( ; ; ) {
2015-01-31 10:50:39 +01:00
if ( Token : : Match ( silencedWarning , " ( void ) %name% ; " ) ) {
2014-12-22 11:15:22 +01:00
silencedWarning = silencedWarning - > tokAt ( 5 ) ;
continue ;
2018-04-27 22:36:30 +02:00
} else if ( silencedWarning & & silencedWarning = = scope - > bodyEnd )
2014-12-22 11:15:22 +01:00
silencedCompilerWarningOnly = true ;
break ;
}
if ( silencedWarning )
secondBreak = silencedWarning ;
if ( ! labelInFollowingLoop & & ! silencedCompilerWarningOnly )
2014-09-01 11:29:39 +02:00
unreachableCodeError ( secondBreak , inconclusive ) ;
tok = Token : : findmatch ( secondBreak , " [}:] " ) ;
} else
tok = secondBreak ;
2011-12-23 12:46:59 +01:00
2014-09-01 11:29:39 +02:00
if ( ! tok )
break ;
tok = tok - > previous ( ) ; // Will be advanced again by for loop
}
2011-12-03 11:43:23 +01:00
}
2011-07-15 02:12:56 +02:00
}
}
2012-04-05 10:38:29 +02:00
void CheckOther : : duplicateBreakError ( const Token * tok , bool inconclusive )
2010-08-14 15:15:12 +02:00
{
2012-05-06 19:37:41 +02:00
reportError ( tok , Severity : : style , " duplicateBreak " ,
" Consecutive return, break, continue, goto or throw statements are unnecessary. \n "
2012-09-16 19:44:02 +02:00
" Consecutive return, break, continue, goto or throw statements are unnecessary. "
2021-02-24 22:00:06 +01:00
" The second statement can never be executed, and so should be removed. " , CWE561 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2010-08-14 15:15:12 +02:00
}
2009-01-26 20:14:46 +01:00
2012-04-05 10:38:29 +02:00
void CheckOther : : unreachableCodeError ( const Token * tok , bool inconclusive )
2011-12-03 11:43:23 +01:00
{
2012-05-06 19:37:41 +02:00
reportError ( tok , Severity : : style , " unreachableCode " ,
2021-02-24 22:00:06 +01:00
" Statements following return, break, continue, goto or throw will never be executed. " , CWE561 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2011-12-03 11:43:23 +01:00
}
2009-01-26 20:14:46 +01:00
//---------------------------------------------------------------------------
// Check scope of variables..
//---------------------------------------------------------------------------
2009-07-05 22:16:43 +02:00
void CheckOther : : checkVariableScope ( )
2009-01-26 20:14:46 +01:00
{
2021-04-30 16:47:02 +02:00
if ( mSettings - > clang )
return ;
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2010-04-21 08:38:25 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2010-12-16 19:04:47 +01:00
2020-09-25 08:34:47 +02:00
// In C it is common practice to declare local variables at the
// start of functions.
2020-09-29 17:20:19 +02:00
if ( mSettings - > daca & & mTokenizer - > isC ( ) )
return ;
2020-09-25 08:34:47 +02:00
2018-04-28 09:38:33 +02:00
for ( const Variable * var : symbolDatabase - > variableList ( ) ) {
2018-07-01 22:31:45 +02:00
if ( ! var | | ! var - > isLocal ( ) | | ( ! var - > isPointer ( ) & & ! var - > isReference ( ) & & ! var - > typeStartToken ( ) - > isStandardType ( ) ) )
2010-12-16 19:04:47 +01:00
continue ;
2013-10-19 17:27:02 +02:00
if ( var - > isConst ( ) )
continue ;
2020-07-01 08:24:52 +02:00
if ( mTokenizer - > hasIfdef ( var - > nameToken ( ) , var - > scope ( ) - > bodyEnd ) )
continue ;
2019-04-02 12:59:24 +02:00
// reference of range for loop variable..
if ( Token : : Match ( var - > nameToken ( ) - > previous ( ) , " & %var% = %var% . " ) ) {
const Token * otherVarToken = var - > nameToken ( ) - > tokAt ( 2 ) ;
const Variable * otherVar = otherVarToken - > variable ( ) ;
if ( otherVar & & Token : : Match ( otherVar - > nameToken ( ) , " %var% : " ) & &
otherVar - > nameToken ( ) - > next ( ) - > astParent ( ) & &
2019-04-06 06:55:46 +02:00
Token : : simpleMatch ( otherVar - > nameToken ( ) - > next ( ) - > astParent ( ) - > previous ( ) , " for ( " ) )
2019-04-02 12:59:24 +02:00
continue ;
}
2012-05-24 15:34:59 +02:00
bool forHead = false ; // Don't check variables declared in header of a for loop
for ( const Token * tok = var - > typeStartToken ( ) ; tok ; tok = tok - > previous ( ) ) {
if ( tok - > str ( ) = = " ( " ) {
forHead = true ;
break ;
2017-03-03 19:07:00 +01:00
} else if ( Token : : Match ( tok , " [;{}] " ) )
2012-05-24 15:34:59 +02:00
break ;
2009-01-26 20:14:46 +01:00
}
2012-05-24 15:34:59 +02:00
if ( forHead )
continue ;
const Token * tok = var - > nameToken ( ) - > next ( ) ;
2013-07-20 12:31:04 +02:00
if ( Token : : Match ( tok , " ; %varid% = %any% ; " , var - > declarationId ( ) ) ) {
2012-05-24 15:34:59 +02:00
tok = tok - > tokAt ( 3 ) ;
2015-08-14 20:46:13 +02:00
if ( ! tok - > isNumber ( ) & & tok - > tokType ( ) ! = Token : : eString & & tok - > tokType ( ) ! = Token : : eChar & & ! tok - > isBoolean ( ) )
2012-05-24 15:34:59 +02:00
continue ;
2013-10-19 17:27:02 +02:00
}
2016-12-26 14:14:40 +01:00
// bailout if initialized with function call that has possible side effects
2017-03-03 19:09:32 +01:00
if ( Token : : Match ( tok , " [(=] " ) & & Token : : simpleMatch ( tok - > astOperand2 ( ) , " ( " ) )
2017-03-03 19:07:00 +01:00
continue ;
2013-03-03 19:35:33 +01:00
bool reduce = true ;
bool used = false ; // Don't warn about unused variables
2018-04-27 22:36:30 +02:00
for ( ; tok & & tok ! = var - > scope ( ) - > bodyEnd ; tok = tok - > next ( ) ) {
2014-09-10 20:56:34 +02:00
if ( tok - > str ( ) = = " { " & & tok - > scope ( ) ! = tok - > previous ( ) - > scope ( ) & & ! tok - > isExpandedMacro ( ) & & tok - > scope ( ) - > type ! = Scope : : eLambda ) {
2013-03-18 16:17:53 +01:00
if ( used ) {
bool used2 = false ;
if ( ! checkInnerScope ( tok , var , used2 ) | | used2 ) {
reduce = false ;
break ;
}
} else if ( ! checkInnerScope ( tok , var , used ) ) {
2013-03-03 19:35:33 +01:00
reduce = false ;
break ;
2011-01-17 20:51:15 +01:00
}
2013-03-18 16:17:53 +01:00
2011-01-17 20:51:15 +01:00
tok = tok - > link ( ) ;
2014-01-12 17:47:02 +01:00
// parse else if blocks..
} else if ( Token : : simpleMatch ( tok , " else { if ( " ) & & Token : : simpleMatch ( tok - > linkAt ( 3 ) , " ) { " )) {
const Token * endif = tok - > linkAt ( 3 ) - > linkAt ( 1 ) ;
bool elseif = false ;
if ( Token : : simpleMatch ( endif , " } } " ) )
elseif = true ;
else if ( Token : : simpleMatch ( endif , " } else { " ) & & Token : : simpleMatch ( endif - > linkAt ( 2 ) , " } } " ) )
elseif = true ;
2014-08-27 09:42:09 +02:00
if ( elseif & & Token : : findmatch ( tok - > next ( ) , " %varid% " , tok - > linkAt ( 1 ) , var - > declarationId ( ) ) ) {
2014-01-12 17:47:02 +01:00
reduce = false ;
2014-08-27 09:42:09 +02:00
break ;
}
2013-07-20 12:31:04 +02:00
} else if ( tok - > varId ( ) = = var - > declarationId ( ) | | tok - > str ( ) = = " goto " ) {
2013-03-03 19:35:33 +01:00
reduce = false ;
2009-06-12 16:17:51 +02:00
break ;
2009-01-26 20:14:46 +01:00
}
}
2013-03-03 19:35:33 +01:00
if ( reduce & & used )
variableScopeError ( var - > nameToken ( ) , var - > name ( ) ) ;
}
}
2009-01-26 20:14:46 +01:00
2013-03-03 19:35:33 +01:00
bool CheckOther : : checkInnerScope ( const Token * tok , const Variable * var , bool & used )
{
const Scope * scope = tok - > next ( ) - > scope ( ) ;
2020-12-24 22:58:19 +01:00
bool loopVariable = scope - > isLoopScope ( ) ;
2013-03-03 19:35:33 +01:00
bool noContinue = true ;
2017-07-28 15:20:43 +02:00
const Token * forHeadEnd = nullptr ;
2013-03-03 19:35:33 +01:00
const Token * end = tok - > link ( ) ;
if ( scope - > type = = Scope : : eUnconditional & & ( tok - > strAt ( - 1 ) = = " ) " | | tok - > previous ( ) - > isName ( ) ) ) // Might be an unknown macro like BOOST_FOREACH
loopVariable = true ;
if ( scope - > type = = Scope : : eDo ) {
end = end - > linkAt ( 2 ) ;
} else if ( loopVariable & & tok - > strAt ( - 1 ) = = " ) " ) {
tok = tok - > linkAt ( - 1 ) ; // Jump to opening ( of for/while statement
2013-03-23 11:28:33 +01:00
} else if ( scope - > type = = Scope : : eSwitch ) {
2018-07-14 12:28:57 +02:00
for ( const Scope * innerScope : scope - > nestedList ) {
2013-03-23 11:28:33 +01:00
if ( used ) {
bool used2 = false ;
2018-07-14 12:28:57 +02:00
if ( ! checkInnerScope ( innerScope - > bodyStart , var , used2 ) | | used2 ) {
2013-03-23 11:28:33 +01:00
return false ;
}
2018-07-14 12:28:57 +02:00
} else if ( ! checkInnerScope ( innerScope - > bodyStart , var , used ) ) {
2013-03-23 11:28:33 +01:00
return false ;
}
}
}
2013-03-03 19:35:33 +01:00
2014-04-17 21:32:56 +02:00
bool bFirstAssignment = false ;
2015-06-22 11:12:46 +02:00
for ( ; tok & & tok ! = end ; tok = tok - > next ( ) ) {
2013-03-03 19:35:33 +01:00
if ( tok - > str ( ) = = " goto " )
return false ;
if ( tok - > str ( ) = = " continue " )
noContinue = false ;
if ( Token : : simpleMatch ( tok , " for ( " ) )
forHeadEnd = tok - > linkAt ( 1 ) ;
if ( tok = = forHeadEnd )
2017-08-09 20:00:26 +02:00
forHeadEnd = nullptr ;
2013-03-03 19:35:33 +01:00
2013-07-20 12:31:04 +02:00
if ( loopVariable & & noContinue & & tok - > scope ( ) = = scope & & ! forHeadEnd & & scope - > type ! = Scope : : eSwitch & & Token : : Match ( tok , " %varid% = " , var - > declarationId ( ) ) ) { // Assigned in outer scope.
2013-03-03 19:35:33 +01:00
loopVariable = false ;
2019-07-16 09:10:10 +02:00
int indent = 0 ;
2013-03-03 19:35:33 +01:00
for ( const Token * tok2 = tok - > tokAt ( 2 ) ; tok2 ; tok2 = tok2 - > next ( ) ) { // Ensure that variable isn't used on right side of =, too
if ( tok2 - > str ( ) = = " ( " )
indent + + ;
else if ( tok2 - > str ( ) = = " ) " ) {
if ( indent = = 0 )
break ;
indent - - ;
} else if ( tok2 - > str ( ) = = " ; " )
break ;
2013-07-20 12:31:04 +02:00
else if ( tok2 - > varId ( ) = = var - > declarationId ( ) ) {
2013-03-03 19:35:33 +01:00
loopVariable = true ;
break ;
}
2009-09-29 23:56:43 +02:00
}
2013-03-03 19:35:33 +01:00
}
2009-09-29 23:56:43 +02:00
2013-07-20 12:31:04 +02:00
if ( loopVariable & & Token : : Match ( tok , " %varid% !!= " , var - > declarationId ( ) ) ) // Variable used in loop
2013-03-03 19:35:33 +01:00
return false ;
2009-09-29 23:56:43 +02:00
2013-07-20 12:31:04 +02:00
if ( Token : : Match ( tok , " & %varid% " , var - > declarationId ( ) ) ) // Taking address of variable
2013-03-03 19:35:33 +01:00
return false ;
2010-08-26 21:57:48 +02:00
2015-12-24 14:40:48 +01:00
if ( Token : : Match ( tok , " %varid% = " , var - > declarationId ( ) ) )
2014-04-17 21:32:56 +02:00
bFirstAssignment = true ;
if ( ! bFirstAssignment & & Token : : Match ( tok , " * %varid% " , var - > declarationId ( ) ) ) // dereferencing means access to previous content
return false ;
2013-07-20 12:31:04 +02:00
if ( Token : : Match ( tok , " = %varid% " , var - > declarationId ( ) ) & & ( var - > isArray ( ) | | var - > isPointer ( ) ) ) // Create a copy of array/pointer. Bailout, because the memory it points to might be necessary in outer scope
2013-03-03 19:35:33 +01:00
return false ;
2009-01-26 20:14:46 +01:00
2013-07-20 12:31:04 +02:00
if ( tok - > varId ( ) = = var - > declarationId ( ) ) {
2013-03-03 19:35:33 +01:00
used = true ;
2022-02-08 16:12:09 +01:00
if ( scope = = tok - > scope ( ) ) {
if ( scope - > type = = Scope : : eSwitch )
return false ; // Used in outer switch scope - unsafe or impossible to reduce scope
if ( scope - > bodyStart & & scope - > bodyStart - > isSimplifiedScope ( ) )
return false ; // simplified if/for/switch init statement
}
2013-03-23 11:28:33 +01:00
}
2009-01-26 20:14:46 +01:00
}
2013-03-03 19:35:33 +01:00
return true ;
2009-01-26 20:14:46 +01:00
}
2011-08-19 17:53:43 +02:00
void CheckOther : : variableScopeError ( const Token * tok , const std : : string & varname )
{
reportError ( tok ,
2011-10-05 19:44:00 +02:00
Severity : : style ,
2011-08-19 17:53:43 +02:00
" variableScope " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + varname + " \n "
" The scope of the variable '$symbol' can be reduced. \n "
" The scope of the variable '$symbol' can be reduced. Warning: Be careful "
2012-09-16 19:44:02 +02:00
" when fixing this message, especially when there are inner loops. Here is an "
2011-08-19 17:53:43 +02:00
" example where cppcheck will write that the scope for 'i' can be reduced: \n "
" void f(int x) \n "
" { \n "
" int i = 0; \n "
" if (x) { \n "
2012-09-16 19:44:02 +02:00
" // it's safe to move 'int i = 0;' here \n "
2011-08-19 17:53:43 +02:00
" for (int n = 0; n < 10; ++n) { \n "
2012-09-16 19:44:02 +02:00
" // it is possible but not safe to move 'int i = 0;' here \n "
2011-08-19 17:53:43 +02:00
" do_something(&i); \n "
" } \n "
" } \n "
" } \n "
2021-02-24 22:00:06 +01:00
" When you see this message it is always safe to reduce the variable scope 1 level. " , CWE398 , Certainty : : normal ) ;
2011-08-19 17:53:43 +02:00
}
2009-01-26 20:14:46 +01:00
2014-08-27 09:42:09 +02:00
//---------------------------------------------------------------------------
// Comma in return statement: return a+1, b++;. (experimental)
//---------------------------------------------------------------------------
2013-06-15 17:49:10 +02:00
void CheckOther : : checkCommaSeparatedReturn ( )
{
2013-10-08 18:05:07 +02:00
// This is experimental for now. See #5076
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > certainty . isEnabled ( Certainty : : experimental ) )
2013-10-08 18:05:07 +02:00
return ;
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2013-06-15 17:49:10 +02:00
return ;
2018-06-16 16:10:28 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
2013-08-06 20:27:09 +02:00
if ( tok - > str ( ) = = " return " ) {
2015-08-16 14:22:46 +02:00
tok = tok - > next ( ) ;
2013-08-06 20:27:09 +02:00
while ( tok & & tok - > str ( ) ! = " ; " ) {
2015-08-16 14:22:46 +02:00
if ( tok - > link ( ) & & Token : : Match ( tok , " [([{<] " ) )
2013-08-06 20:27:09 +02:00
tok = tok - > link ( ) ;
2013-06-18 00:13:45 +02:00
if ( ! tok - > isExpandedMacro ( ) & & tok - > str ( ) = = " , " & & tok - > linenr ( ) ! = tok - > next ( ) - > linenr ( ) )
2013-06-15 17:49:10 +02:00
commaSeparatedReturnError ( tok ) ;
2013-08-06 20:27:09 +02:00
tok = tok - > next ( ) ;
2013-06-15 17:49:10 +02:00
}
2013-07-28 10:39:58 +02:00
// bailout: missing semicolon (invalid code / bad tokenizer)
if ( ! tok )
break ;
2013-06-15 17:49:10 +02:00
}
}
}
void CheckOther : : commaSeparatedReturnError ( const Token * tok )
{
reportError ( tok ,
Severity : : style ,
" commaSeparatedReturn " ,
" Comma is used in return statement. The comma can easily be misread as a ';'. \n "
" Comma is used in return statement. When comma is used in a return statement it can "
" easily be misread as a semicolon. For example in the code below the value "
" of 'b' is returned if the condition is true, but it is easy to think that 'a+1' is "
" returned: \n "
" if (x) \n "
" return a + 1, \n "
" b++; \n "
" However it can be useful to use comma in macros. Cppcheck does not warn when such a "
2021-02-24 22:00:06 +01:00
" macro is then used in a return statement, it is less likely such code is misunderstood. " , CWE398 , Certainty : : normal ) ;
2013-06-15 17:49:10 +02:00
}
2009-01-26 20:14:46 +01:00
//---------------------------------------------------------------------------
2018-04-20 17:33:42 +02:00
// Check for function parameters that should be passed by const reference
2009-01-26 20:14:46 +01:00
//---------------------------------------------------------------------------
2019-07-16 09:10:10 +02:00
static int estimateSize ( const Type * type , const Settings * settings , const SymbolDatabase * symbolDatabase , int recursionDepth = 0 )
2016-07-28 13:19:24 +02:00
{
if ( recursionDepth > 20 )
return 0 ;
2019-07-16 09:10:10 +02:00
int cumulatedSize = 0 ;
2022-02-01 17:17:08 +01:00
const bool isUnion = type - > classScope - > type = = Scope : : ScopeType : : eUnion ;
2022-02-21 18:35:02 +01:00
// cppcheck-suppress varid0
2022-02-01 17:17:08 +01:00
const auto accumulateSize = [ ] ( int & cumulatedSize , int size , bool isUnion ) - > void {
if ( isUnion )
cumulatedSize = std : : max ( cumulatedSize , size ) ;
else
cumulatedSize + = size ;
} ;
2018-06-23 15:58:44 +02:00
for ( const Variable & var : type - > classScope - > varlist ) {
2019-07-16 09:10:10 +02:00
int size = 0 ;
2018-06-23 15:58:44 +02:00
if ( var . isStatic ( ) )
2016-07-28 13:19:24 +02:00
continue ;
2018-06-23 15:58:44 +02:00
if ( var . isPointer ( ) | | var . isReference ( ) )
2016-07-28 13:19:24 +02:00
size = settings - > sizeof_pointer ;
2018-06-23 15:58:44 +02:00
else if ( var . type ( ) & & var . type ( ) - > classScope )
size = estimateSize ( var . type ( ) , settings , symbolDatabase , recursionDepth + 1 ) ;
else if ( var . valueType ( ) - > type = = ValueType : : Type : : CONTAINER )
2017-06-06 08:48:11 +02:00
size = 3 * settings - > sizeof_pointer ; // Just guess
2016-07-28 13:19:24 +02:00
else
2018-06-23 16:07:02 +02:00
size = symbolDatabase - > sizeOfType ( var . typeStartToken ( ) ) ;
2016-07-28 13:19:24 +02:00
2018-06-23 15:58:44 +02:00
if ( var . isArray ( ) )
2022-02-01 17:17:08 +01:00
size * = std : : accumulate ( var . dimensions ( ) . begin ( ) , var . dimensions ( ) . end ( ) , 1 , [ ] ( int v , const Dimension & d ) {
return v * = d . num ;
} ) ;
accumulateSize ( cumulatedSize , size , isUnion ) ;
2016-07-28 13:19:24 +02:00
}
2018-06-23 15:58:44 +02:00
for ( const Type : : BaseInfo & baseInfo : type - > derivedFrom ) {
if ( baseInfo . type & & baseInfo . type - > classScope )
cumulatedSize + = estimateSize ( baseInfo . type , settings , symbolDatabase , recursionDepth + 1 ) ;
}
2016-07-28 13:19:24 +02:00
return cumulatedSize ;
}
2022-01-18 20:17:05 +01:00
static bool canBeConst ( const Variable * var , const Settings * settings )
2018-04-20 17:33:42 +02:00
{
2018-07-25 07:44:06 +02:00
{
// check initializer list. If variable is moved from it can't be const.
const Function * func_scope = var - > scope ( ) - > function ;
if ( func_scope - > type = = Function : : Type : : eConstructor ) {
//could be initialized in initializer list
if ( func_scope - > arg - > link ( ) - > next ( ) - > str ( ) = = " : " ) {
for ( const Token * tok2 = func_scope - > arg - > link ( ) - > next ( ) - > next ( ) ; tok2 ! = var - > scope ( ) - > bodyStart ; tok2 = tok2 - > next ( ) ) {
if ( tok2 - > varId ( ) ! = var - > declarationId ( ) )
continue ;
const Token * parent = tok2 - > astParent ( ) ;
if ( parent & & Token : : simpleMatch ( parent - > previous ( ) , " move ( " ) )
return false ;
}
}
}
}
2018-04-27 22:36:30 +02:00
for ( const Token * tok2 = var - > scope ( ) - > bodyStart ; tok2 ! = var - > scope ( ) - > bodyEnd ; tok2 = tok2 - > next ( ) ) {
2018-06-23 23:26:37 +02:00
if ( tok2 - > varId ( ) ! = var - > declarationId ( ) )
continue ;
const Token * parent = tok2 - > astParent ( ) ;
if ( ! parent )
2018-07-20 21:44:23 +02:00
continue ;
if ( parent - > str ( ) = = " << " | | isLikelyStreamRead ( true , parent ) ) {
2018-06-23 23:26:37 +02:00
if ( parent - > str ( ) = = " << " & & parent - > astOperand1 ( ) = = tok2 )
2018-06-23 23:25:06 +02:00
return false ;
2018-06-23 23:26:37 +02:00
if ( parent - > str ( ) = = " >> " & & parent - > astOperand2 ( ) = = tok2 )
return false ;
} else if ( parent - > str ( ) = = " , " | | parent - > str ( ) = = " ( " ) { // function argument
const Token * tok3 = tok2 - > previous ( ) ;
2019-07-16 09:10:10 +02:00
int argNr = 0 ;
2018-06-23 23:26:37 +02:00
while ( tok3 & & tok3 - > str ( ) ! = " ( " ) {
if ( tok3 - > link ( ) & & Token : : Match ( tok3 , " )|]|}|> " ) )
tok3 = tok3 - > link ( ) ;
else if ( tok3 - > link ( ) )
break ;
else if ( tok3 - > str ( ) = = " ; " )
break ;
else if ( tok3 - > str ( ) = = " , " )
argNr + + ;
tok3 = tok3 - > previous ( ) ;
}
2022-01-18 20:17:05 +01:00
if ( ! tok3 | | tok3 - > str ( ) ! = " ( " )
2018-06-23 23:26:37 +02:00
return false ;
2022-01-18 20:17:05 +01:00
const Token * functionTok = tok3 - > astOperand1 ( ) ;
if ( ! functionTok )
return false ;
const Function * tokFunction = functionTok - > function ( ) ;
if ( ! tokFunction & & functionTok - > str ( ) = = " . " & & ( functionTok = functionTok - > astOperand2 ( ) ) )
tokFunction = functionTok - > function ( ) ;
if ( tokFunction ) {
const Variable * argVar = tokFunction - > getArgumentVar ( argNr ) ;
2021-08-07 20:51:18 +02:00
if ( ! argVar | | ( ! argVar - > isConst ( ) & & argVar - > isReference ( ) ) )
2018-04-20 17:33:42 +02:00
return false ;
2018-06-23 23:26:37 +02:00
}
2022-01-18 20:17:05 +01:00
else if ( ! settings - > library . isFunctionConst ( functionTok ) )
return false ;
2018-07-14 13:01:24 +02:00
} else if ( parent - > isUnaryOp ( " & " ) ) {
2018-06-23 23:26:37 +02:00
// TODO: check how pointer is used
return false ;
2022-01-18 20:17:05 +01:00
} else if ( parent - > isConstOp ( ) | |
( parent - > astOperand2 ( ) & & settings - > library . isFunctionConst ( parent - > astOperand2 ( ) ) ) )
2018-07-20 21:44:23 +02:00
continue ;
2018-06-23 23:26:37 +02:00
else if ( parent - > isAssignmentOp ( ) ) {
if ( parent - > astOperand1 ( ) = = tok2 )
return false ;
2020-06-22 14:31:34 +02:00
const Variable * assignedVar = parent - > astOperand1 ( ) ? parent - > astOperand1 ( ) - > variable ( ) : nullptr ;
if ( assignedVar & &
! assignedVar - > isConst ( ) & &
assignedVar - > isReference ( ) & &
assignedVar - > nameToken ( ) = = parent - > astOperand1 ( ) )
return false ;
2018-06-23 23:26:37 +02:00
} else if ( Token : : Match ( tok2 , " %var% . %name% ( " ) ) {
const Function * func = tok2 - > tokAt ( 2 ) - > function ( ) ;
if ( func & & ( func - > isConst ( ) | | func - > isStatic ( ) ) )
2018-07-20 21:44:23 +02:00
continue ;
2018-06-23 23:26:37 +02:00
else
2018-04-20 17:33:42 +02:00
return false ;
2018-06-23 23:26:37 +02:00
} else
return false ;
2018-04-20 17:33:42 +02:00
}
return true ;
}
2016-07-28 13:19:24 +02:00
void CheckOther : : checkPassByReference ( )
2009-01-26 20:14:46 +01:00
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : performance ) | | mTokenizer - > isC ( ) )
2010-04-21 08:38:25 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * const symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2011-01-16 19:57:29 +01:00
2018-04-28 09:38:33 +02:00
for ( const Variable * var : symbolDatabase - > variableList ( ) ) {
2016-07-28 13:19:24 +02:00
if ( ! var | | ! var - > isArgument ( ) | | ! var - > isClass ( ) | | var - > isPointer ( ) | | var - > isArray ( ) | | var - > isReference ( ) | | var - > isEnumType ( ) )
2012-05-24 17:40:43 +02:00
continue ;
2019-09-04 08:07:30 +02:00
if ( var - > scope ( ) & & var - > scope ( ) - > function - > arg - > link ( ) - > strAt ( - 1 ) = = " ... " )
2014-08-06 12:06:36 +02:00
continue ; // references could not be used as va_start parameters (#5824)
2019-10-08 17:48:09 +02:00
if ( ( var - > declEndToken ( ) & & var - > declEndToken ( ) - > isExternC ( ) ) | |
( var - > scope ( ) & & var - > scope ( ) - > function & & var - > scope ( ) - > function - > tokenDef & & var - > scope ( ) - > function - > tokenDef - > isExternC ( ) ) )
continue ; // references cannot be used in functions in extern "C" blocks
2016-07-28 13:19:24 +02:00
bool inconclusive = false ;
2022-02-18 12:59:21 +01:00
const bool isContainer = var - > valueType ( ) & & var - > valueType ( ) - > type = = ValueType : : Type : : CONTAINER & & var - > valueType ( ) - > container & & ! var - > valueType ( ) - > container - > view ;
if ( ! isContainer ) {
if ( var - > type ( ) & & ! var - > type ( ) - > isEnumType ( ) ) { // Check if type is a struct or class.
// Ensure that it is a large object.
if ( ! var - > type ( ) - > classScope )
inconclusive = true ;
else if ( estimateSize ( var - > type ( ) , mSettings , symbolDatabase ) < = 2 * mSettings - > sizeof_pointer )
continue ;
}
else
2016-07-28 13:19:24 +02:00
continue ;
2022-02-18 12:59:21 +01:00
}
2016-07-28 13:19:24 +02:00
2021-02-24 22:00:06 +01:00
if ( inconclusive & & ! mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) )
2016-07-28 13:19:24 +02:00
continue ;
2018-05-29 13:24:48 +02:00
const bool isConst = var - > isConst ( ) ;
2018-04-20 17:33:42 +02:00
if ( isConst ) {
2018-06-23 16:42:36 +02:00
passedByValueError ( var - > nameToken ( ) , var - > name ( ) , inconclusive ) ;
2018-04-20 17:33:42 +02:00
continue ;
2009-01-26 20:14:46 +01:00
}
2016-07-28 13:19:24 +02:00
2018-04-20 17:33:42 +02:00
// Check if variable could be const
2019-07-04 12:32:32 +02:00
if ( ! var - > scope ( ) | | var - > scope ( ) - > function - > hasVirtualSpecifier ( ) )
2018-04-20 17:33:42 +02:00
continue ;
2022-01-18 20:17:05 +01:00
if ( canBeConst ( var , mSettings ) ) {
2018-06-23 16:42:36 +02:00
passedByValueError ( var - > nameToken ( ) , var - > name ( ) , inconclusive ) ;
2018-04-20 17:33:42 +02:00
}
2009-01-26 20:14:46 +01:00
}
}
2011-08-19 17:53:43 +02:00
2016-07-28 13:19:24 +02:00
void CheckOther : : passedByValueError ( const Token * tok , const std : : string & parname , bool inconclusive )
2011-08-19 17:53:43 +02:00
{
reportError ( tok , Severity : : performance , " passedByValue " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + parname + " \n "
2018-04-20 17:33:42 +02:00
" Function parameter '$symbol' should be passed by const reference. \n "
2018-04-09 06:43:48 +02:00
" Parameter '$symbol' is passed by value. It could be passed "
2021-02-24 22:00:06 +01:00
" as a const reference which is usually faster and recommended in C++. " , CWE398 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2011-08-19 17:53:43 +02:00
}
2009-01-26 20:14:46 +01:00
2019-07-24 09:59:01 +02:00
static bool isUnusedVariable ( const Variable * var )
{
if ( ! var )
return false ;
if ( ! var - > scope ( ) )
return false ;
const Token * start = var - > declEndToken ( ) ;
if ( ! start )
return false ;
if ( Token : : Match ( start , " ; %varid% = " , var - > declarationId ( ) ) )
start = start - > tokAt ( 2 ) ;
return ! Token : : findmatch ( start - > next ( ) , " %varid% " , var - > scope ( ) - > bodyEnd , var - > declarationId ( ) ) ;
}
2019-07-24 20:59:58 +02:00
static bool isVariableMutableInInitializer ( const Token * start , const Token * end , nonneg int varid )
{
if ( ! start )
return false ;
if ( ! end )
return false ;
for ( const Token * tok = start ; tok ! = end ; tok = tok - > next ( ) ) {
if ( tok - > varId ( ) ! = varid )
continue ;
if ( tok - > astParent ( ) ) {
const Token * memberTok = tok - > astParent ( ) - > previous ( ) ;
if ( Token : : Match ( memberTok , " %var% ( " ) & & memberTok - > variable ( ) ) {
const Variable * memberVar = memberTok - > variable ( ) ;
2020-01-04 18:47:05 +01:00
if ( memberVar - > isClass ( ) )
2020-01-04 11:36:45 +01:00
//TODO: check if the called constructor could live with a const variable
// pending that, assume the worst (that it can't)
return true ;
2019-07-24 20:59:58 +02:00
if ( ! memberVar - > isReference ( ) )
continue ;
if ( memberVar - > isConst ( ) )
continue ;
}
return true ;
} else {
return true ;
}
}
return false ;
}
2019-07-24 09:59:01 +02:00
void CheckOther : : checkConstVariable ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) | | mTokenizer - > isC ( ) )
2019-07-24 09:59:01 +02:00
return ;
const SymbolDatabase * const symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
for ( const Variable * var : symbolDatabase - > variableList ( ) ) {
if ( ! var )
continue ;
if ( ! var - > isReference ( ) )
continue ;
if ( var - > isRValueReference ( ) )
continue ;
2020-11-22 08:47:24 +01:00
if ( var - > isPointer ( ) )
continue ;
2019-07-24 09:59:01 +02:00
if ( var - > isConst ( ) )
continue ;
if ( ! var - > scope ( ) )
continue ;
const Scope * scope = var - > scope ( ) ;
if ( ! scope - > function )
continue ;
2020-09-23 22:10:47 +02:00
const Function * function = scope - > function ;
2019-07-24 09:59:01 +02:00
if ( var - > isArgument ( ) ) {
if ( function - > isImplicitlyVirtual ( ) | | function - > templateDef )
continue ;
if ( isUnusedVariable ( var ) )
continue ;
2019-07-24 20:59:58 +02:00
if ( function - > isConstructor ( ) & & isVariableMutableInInitializer ( function - > constructorMemberInitialization ( ) , scope - > bodyStart , var - > declarationId ( ) ) )
2019-07-24 09:59:01 +02:00
continue ;
}
if ( var - > isGlobal ( ) )
continue ;
if ( var - > isStatic ( ) )
continue ;
if ( var - > isArray ( ) )
continue ;
if ( var - > isEnumType ( ) )
continue ;
if ( var - > isVolatile ( ) )
continue ;
if ( isAliased ( var ) )
continue ;
if ( isVariableChanged ( var , mSettings , mTokenizer - > isCPP ( ) ) )
continue ;
2021-04-30 17:47:08 +02:00
if ( Function : : returnsReference ( function ) & & ! Function : : returnsConst ( function ) ) {
2020-05-31 10:10:10 +02:00
std : : vector < const Token * > returns = Function : : findReturns ( function ) ;
if ( std : : any_of ( returns . begin ( ) , returns . end ( ) , [ & ] ( const Token * retTok ) {
2021-08-07 20:51:18 +02:00
if ( retTok - > varId ( ) = = var - > declarationId ( ) )
2021-05-01 07:35:03 +02:00
return true ;
while ( retTok & & retTok - > isCast ( ) )
retTok = retTok - > astOperand2 ( ) ;
while ( Token : : simpleMatch ( retTok , " . " ) )
retTok = retTok - > astOperand2 ( ) ;
return hasLifetimeToken ( getParentLifetime ( retTok ) , var - > nameToken ( ) ) ;
} ) )
2021-08-07 20:51:18 +02:00
continue ;
2020-05-31 10:10:10 +02:00
}
2019-07-24 09:59:01 +02:00
// Skip if address is taken
if ( Token : : findmatch ( var - > nameToken ( ) , " & %varid% " , scope - > bodyEnd , var - > declarationId ( ) ) )
continue ;
2020-09-03 18:44:44 +02:00
// Skip if another non-const variable is initialized with this variable
{
//Is it the right side of an initialization of a non-const reference
bool usedInAssignment = false ;
2020-09-03 18:55:40 +02:00
for ( const Token * tok = var - > nameToken ( ) ; tok ! = scope - > bodyEnd & & tok ! = nullptr ; tok = tok - > next ( ) ) {
2021-05-08 13:40:52 +02:00
if ( Token : : Match ( tok , " & %var% = %varid% " , var - > declarationId ( ) ) ) {
const Variable * refvar = tok - > next ( ) - > variable ( ) ;
if ( refvar & & ! refvar - > isConst ( ) & & refvar - > nameToken ( ) = = tok - > next ( ) ) {
usedInAssignment = true ;
break ;
}
2020-09-03 18:44:44 +02:00
}
}
if ( usedInAssignment )
continue ;
}
// Skip if we ever cast this variable to a pointer/reference to a non-const type
{
2020-09-03 18:58:25 +02:00
bool castToNonConst = false ;
for ( const Token * tok = var - > nameToken ( ) ; tok ! = scope - > bodyEnd & & tok ! = nullptr ; tok = tok - > next ( ) ) {
if ( tok - > isCast ( ) ) {
2020-09-04 19:15:48 +02:00
if ( ! tok - > valueType ( ) ) {
castToNonConst = true ; // safe guess
break ;
}
2020-09-03 18:58:25 +02:00
bool isConst = 0 ! = ( tok - > valueType ( ) - > constness & ( 1 < < tok - > valueType ( ) - > pointer ) ) ;
2020-09-04 19:15:48 +02:00
if ( ! isConst ) {
2020-09-03 18:58:25 +02:00
castToNonConst = true ;
2020-09-04 19:15:48 +02:00
break ;
}
2020-09-03 18:55:40 +02:00
}
2020-09-03 18:58:25 +02:00
}
2020-09-03 18:44:44 +02:00
if ( castToNonConst )
continue ;
}
2021-09-15 21:25:01 +02:00
// Do not warn if struct data is changed
{
bool changeStructData = false ;
for ( const Token * tok = var - > nameToken ( ) ; tok ! = scope - > bodyEnd & & tok ! = nullptr ; tok = tok - > next ( ) ) {
if ( tok - > variable ( ) = = var & & Token : : Match ( tok , " %var% . " ) ) {
const Token * parent = tok ;
while ( Token : : simpleMatch ( parent - > astParent ( ) , " . " ) & & parent = = parent - > astParent ( ) - > astOperand1 ( ) )
parent = parent - > astParent ( ) ;
if ( parent - > valueType ( ) & &
parent - > valueType ( ) - > pointer > 0 & &
parent - > valueType ( ) - > constness = = 0 & &
isVariableChanged ( parent , 1 , mSettings , mTokenizer - > isCPP ( ) ) ) {
changeStructData = true ;
break ;
}
}
}
if ( changeStructData )
continue ;
}
2021-11-21 20:03:10 +01:00
// Calling non-const method using non-const reference
if ( var - > isReference ( ) ) {
bool callNonConstMethod = false ;
for ( const Token * tok = var - > nameToken ( ) ; tok ! = scope - > bodyEnd & & tok ! = nullptr ; tok = tok - > next ( ) ) {
2022-02-11 19:40:11 +01:00
if ( tok - > variable ( ) = = var ) {
if ( Token : : Match ( tok , " %var% . * ( & %name% :: " ) ) {
const Token * ftok = tok - > linkAt ( 3 ) - > previous ( ) ;
if ( ! ftok - > function ( ) | | ! ftok - > function ( ) - > isConst ( ) )
callNonConstMethod = true ;
break ;
}
if ( var - > isStlType ( ) & & Token : : Match ( tok , " %var% [ " ) ) { // containers whose operator[] is non-const
const Token * typeTok = var - > typeStartToken ( ) ? var - > typeStartToken ( ) - > tokAt ( 2 ) : nullptr ;
const auto & notConst = CheckClass : : stl_containers_not_const ;
if ( typeTok & & notConst . find ( typeTok - > str ( ) ) ! = notConst . end ( ) ) {
callNonConstMethod = true ;
break ;
}
}
2021-11-21 20:03:10 +01:00
}
}
if ( callNonConstMethod )
continue ;
}
2020-09-03 18:44:44 +02:00
2020-09-23 22:10:47 +02:00
constVariableError ( var , function ) ;
2019-07-24 09:59:01 +02:00
}
}
2021-07-18 10:59:52 +02:00
void CheckOther : : checkConstPointer ( )
{
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
return ;
std : : set < const Variable * > pointers ;
std : : set < const Variable * > nonConstPointers ;
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
if ( ! tok - > variable ( ) )
continue ;
2021-07-21 07:36:13 +02:00
if ( ! tok - > variable ( ) - > isLocal ( ) & & ! tok - > variable ( ) - > isArgument ( ) )
continue ;
2022-02-13 08:40:45 +01:00
if ( tok = = tok - > variable ( ) - > nameToken ( ) )
continue ;
2021-07-18 10:59:52 +02:00
if ( ! tok - > valueType ( ) )
continue ;
if ( tok - > valueType ( ) - > pointer = = 0 | | tok - > valueType ( ) - > constness > 0 )
continue ;
if ( nonConstPointers . find ( tok - > variable ( ) ) ! = nonConstPointers . end ( ) )
continue ;
pointers . insert ( tok - > variable ( ) ) ;
const Token * parent = tok - > astParent ( ) ;
bool deref = false ;
if ( parent & & parent - > isUnaryOp ( " * " ) )
deref = true ;
else if ( Token : : simpleMatch ( parent , " [ " ) & & parent - > astOperand1 ( ) = = tok )
deref = true ;
if ( deref ) {
2021-07-20 10:38:38 +02:00
if ( Token : : Match ( parent - > astParent ( ) , " %cop% " ) & & ! parent - > astParent ( ) - > isUnaryOp ( " & " ) & & ! parent - > astParent ( ) - > isUnaryOp ( " * " ) )
continue ;
2021-07-18 10:59:52 +02:00
if ( Token : : simpleMatch ( parent - > astParent ( ) , " return " ) )
2021-07-20 10:38:38 +02:00
continue ;
2021-07-18 10:59:52 +02:00
else if ( Token : : Match ( parent - > astParent ( ) , " %assign% " ) & & parent = = parent - > astParent ( ) - > astOperand2 ( ) ) {
bool takingRef = false ;
const Token * lhs = parent - > astParent ( ) - > astOperand1 ( ) ;
if ( lhs & & lhs - > variable ( ) & & lhs - > variable ( ) - > isReference ( ) & & lhs - > variable ( ) - > nameToken ( ) = = lhs )
takingRef = true ;
2021-07-20 10:38:38 +02:00
if ( ! takingRef )
continue ;
2021-07-18 10:59:52 +02:00
} else if ( Token : : simpleMatch ( parent - > astParent ( ) , " [ " ) & & parent - > astParent ( ) - > astOperand2 ( ) = = parent )
2021-07-20 10:38:38 +02:00
continue ;
2021-07-20 10:28:35 +02:00
} else {
if ( Token : : Match ( parent , " %oror%|%comp%|&&|?|!|- " ) )
2021-07-20 10:38:38 +02:00
continue ;
2021-07-20 10:28:35 +02:00
else if ( Token : : simpleMatch ( parent , " ( " ) & & Token : : Match ( parent - > astOperand1 ( ) , " if|while " ) )
2021-07-20 10:38:38 +02:00
continue ;
2021-07-18 10:59:52 +02:00
}
2021-07-20 10:38:38 +02:00
nonConstPointers . insert ( tok - > variable ( ) ) ;
2021-07-18 10:59:52 +02:00
}
for ( const Variable * p : pointers ) {
2021-08-10 15:37:59 +02:00
if ( p - > isArgument ( ) ) {
if ( ! p - > scope ( ) | | ! p - > scope ( ) - > function | | p - > scope ( ) - > function - > isImplicitlyVirtual ( true ) | | p - > scope ( ) - > function - > hasVirtualSpecifier ( ) )
continue ;
}
2021-10-18 19:38:53 +02:00
if ( nonConstPointers . find ( p ) = = nonConstPointers . end ( ) ) {
const Token * start = ( p - > isArgument ( ) ) ? p - > scope ( ) - > bodyStart : p - > nameToken ( ) - > next ( ) ;
const int indirect = p - > isArray ( ) ? p - > dimensions ( ) . size ( ) : 1 ;
if ( isVariableChanged ( start , p - > scope ( ) - > bodyEnd , indirect , p - > declarationId ( ) , false , mSettings , mTokenizer - > isCPP ( ) ) )
continue ;
2021-07-18 10:59:52 +02:00
constVariableError ( p , nullptr ) ;
2021-10-18 19:38:53 +02:00
}
2021-07-18 10:59:52 +02:00
}
}
2020-09-23 22:10:47 +02:00
void CheckOther : : constVariableError ( const Variable * var , const Function * function )
2019-07-24 09:59:01 +02:00
{
2022-02-13 16:17:53 +01:00
if ( ! var ) {
reportError ( nullptr , Severity : : style , " constParameter " , " Parameter 'x' can be declared with const " ) ;
reportError ( nullptr , Severity : : style , " constVariable " , " Variable 'x' can be declared with const " ) ;
reportError ( nullptr , Severity : : style , " constParameterCallback " , " Parameter 'x' can be declared with const, however it seems that 'f' is a callback function. " ) ;
return ;
}
const std : : string vartype ( var - > isArgument ( ) ? " Parameter " : " Variable " ) ;
const std : : string varname ( var - > name ( ) ) ;
2020-09-23 22:10:47 +02:00
ErrorPath errorPath ;
std : : string id = " const " + vartype ;
std : : string message = " $symbol: " + varname + " \n " + vartype + " '$symbol' can be declared with const " ;
errorPath . push_back ( ErrorPathItem ( var ? var - > nameToken ( ) : nullptr , message ) ) ;
if ( var & & var - > isArgument ( ) & & function & & function - > functionPointerUsage ) {
2020-09-25 19:04:22 +02:00
errorPath . push_front ( ErrorPathItem ( function - > functionPointerUsage , " You might need to cast the function pointer here " ) ) ;
2020-09-23 22:10:47 +02:00
id + = " Callback " ;
message + = " . However it seems that ' " + function - > name ( ) + " ' is a callback function, if '$symbol' is declared with const you might also need to cast function pointer(s). " ;
2019-07-24 09:59:01 +02:00
}
2020-09-23 22:10:47 +02:00
2021-02-24 22:00:06 +01:00
reportError ( errorPath , Severity : : style , id . c_str ( ) , message , CWE398 , Certainty : : normal ) ;
2019-07-24 09:59:01 +02:00
}
2009-01-26 20:14:46 +01:00
//---------------------------------------------------------------------------
// Check usage of char variables..
//---------------------------------------------------------------------------
2014-04-01 19:16:06 +02:00
2009-07-05 22:16:43 +02:00
void CheckOther : : checkCharVariable ( )
2009-01-26 20:14:46 +01:00
{
2021-02-24 22:00:06 +01:00
const bool warning = mSettings - > severity . isEnabled ( Severity : : warning ) ;
const bool portability = mSettings - > severity . isEnabled ( Severity : : portability ) ;
2016-02-08 08:08:35 +01:00
if ( ! warning & & ! portability )
2010-04-21 08:38:25 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2015-10-06 17:30:51 +02:00
if ( Token : : Match ( tok , " %var% [ " ) ) {
2016-02-08 08:08:35 +01:00
if ( ! tok - > variable ( ) )
continue ;
if ( ! tok - > variable ( ) - > isArray ( ) & & ! tok - > variable ( ) - > isPointer ( ) )
2015-10-06 17:30:51 +02:00
continue ;
const Token * index = tok - > next ( ) - > astOperand2 ( ) ;
2018-06-16 16:10:28 +02:00
if ( warning & & tok - > variable ( ) - > isArray ( ) & & astIsSignedChar ( index ) & & index - > getValueGE ( 0x80 , mSettings ) )
2016-02-08 08:08:35 +01:00
signedCharArrayIndexError ( tok ) ;
2018-06-16 16:10:28 +02:00
if ( portability & & astIsUnknownSignChar ( index ) & & index - > getValueGE ( 0x80 , mSettings ) )
2016-02-08 08:08:35 +01:00
unknownSignCharArrayIndexError ( tok ) ;
2018-07-14 13:01:24 +02:00
} else if ( warning & & Token : : Match ( tok , " [&|^] " ) & & tok - > isBinaryOp ( ) ) {
2015-10-06 17:30:51 +02:00
bool warn = false ;
if ( astIsSignedChar ( tok - > astOperand1 ( ) ) ) {
2018-06-16 16:10:28 +02:00
const ValueFlow : : Value * v1 = tok - > astOperand1 ( ) - > getValueLE ( - 1 , mSettings ) ;
2015-10-06 17:30:51 +02:00
const ValueFlow : : Value * v2 = tok - > astOperand2 ( ) - > getMaxValue ( false ) ;
if ( ! v1 )
2018-06-16 16:10:28 +02:00
v1 = tok - > astOperand1 ( ) - > getValueGE ( 0x80 , mSettings ) ;
2015-10-06 17:30:51 +02:00
if ( v1 & & ! ( tok - > str ( ) = = " & " & & v2 & & v2 - > isKnown ( ) & & v2 - > intvalue > = 0 & & v2 - > intvalue < 0x100 ) )
warn = true ;
2018-01-26 22:49:07 +01:00
} else if ( astIsSignedChar ( tok - > astOperand2 ( ) ) ) {
2018-06-16 16:10:28 +02:00
const ValueFlow : : Value * v1 = tok - > astOperand2 ( ) - > getValueLE ( - 1 , mSettings ) ;
2015-10-06 17:30:51 +02:00
const ValueFlow : : Value * v2 = tok - > astOperand1 ( ) - > getMaxValue ( false ) ;
if ( ! v1 )
2018-06-16 16:10:28 +02:00
v1 = tok - > astOperand2 ( ) - > getValueGE ( 0x80 , mSettings ) ;
2015-10-06 17:30:51 +02:00
if ( v1 & & ! ( tok - > str ( ) = = " & " & & v2 & & v2 - > isKnown ( ) & & v2 - > intvalue > = 0 & & v2 - > intvalue < 0x100 ) )
warn = true ;
}
2011-07-05 18:41:27 +02:00
2012-11-15 07:11:45 +01:00
// is the result stored in a short|int|long?
2016-01-06 15:49:44 +01:00
if ( warn & & Token : : simpleMatch ( tok - > astParent ( ) , " = " ) ) {
2015-10-06 17:30:51 +02:00
const Token * lhs = tok - > astParent ( ) - > astOperand1 ( ) ;
if ( lhs & & lhs - > valueType ( ) & & lhs - > valueType ( ) - > type > = ValueType : : Type : : SHORT )
2014-04-01 19:16:06 +02:00
charBitOpError ( tok ) ; // This is an error..
}
2012-11-15 07:11:45 +01:00
}
2009-01-26 20:14:46 +01:00
}
}
}
2016-02-08 08:08:35 +01:00
void CheckOther : : signedCharArrayIndexError ( const Token * tok )
2011-08-19 17:53:43 +02:00
{
reportError ( tok ,
Severity : : warning ,
2016-02-08 08:08:35 +01:00
" signedCharArrayIndex " ,
2012-09-16 19:44:02 +02:00
" Signed 'char' type used as array index. \n "
" Signed 'char' type used as array index. If the value "
" can be greater than 127 there will be a buffer underflow "
2021-02-24 22:00:06 +01:00
" because of sign extension. " , CWE128 , Certainty : : normal ) ;
2011-08-19 17:53:43 +02:00
}
2009-01-26 20:14:46 +01:00
2016-02-08 08:08:35 +01:00
void CheckOther : : unknownSignCharArrayIndexError ( const Token * tok )
{
reportError ( tok ,
Severity : : portability ,
" unknownSignCharArrayIndex " ,
" 'char' type used as array index. \n "
2019-09-11 19:21:38 +02:00
" 'char' type used as array index. Values greater than 127 will be "
2021-02-24 22:00:06 +01:00
" treated depending on whether 'char' is signed or unsigned on target platform. " , CWE758 , Certainty : : normal ) ;
2016-02-08 08:08:35 +01:00
}
2011-08-19 17:53:43 +02:00
void CheckOther : : charBitOpError ( const Token * tok )
{
reportError ( tok ,
Severity : : warning ,
" charBitOp " ,
2012-09-16 19:44:02 +02:00
" When using 'char' variables in bit operations, sign extension can generate unexpected results. \n "
" When using 'char' variables in bit operations, sign extension can generate unexpected results. For example: \n "
2011-08-19 17:53:43 +02:00
" char c = 0x80; \n "
" int i = 0 | c; \n "
" if (i & 0x8000) \n "
" printf( \" not expected \" ); \n "
2021-02-24 22:00:06 +01:00
" The \" not expected \" will be printed on the screen. " , CWE398 , Certainty : : normal ) ;
2011-08-19 17:53:43 +02:00
}
2009-01-26 20:14:46 +01:00
//---------------------------------------------------------------------------
// Incomplete statement..
//---------------------------------------------------------------------------
2019-02-15 13:31:40 +01:00
2019-02-19 07:08:36 +01:00
static bool isType ( const Token * tok , bool unknown )
{
if ( Token : : Match ( tok , " %type% " ) )
return true ;
if ( Token : : simpleMatch ( tok , " :: " ) )
return isType ( tok - > astOperand2 ( ) , unknown ) ;
if ( Token : : simpleMatch ( tok , " < " ) & & tok - > link ( ) )
return true ;
if ( unknown & & Token : : Match ( tok , " %name% !!( " ) )
return true ;
return false ;
}
static bool isVarDeclOp ( const Token * tok )
{
if ( ! tok )
return false ;
const Token * vartok = tok - > astOperand2 ( ) ;
if ( vartok & & vartok - > variable ( ) & & vartok - > variable ( ) - > nameToken ( ) = = vartok )
return true ;
const Token * typetok = tok - > astOperand1 ( ) ;
return isType ( typetok , Token : : Match ( vartok , " %var% " ) ) ;
}
2019-02-15 13:31:40 +01:00
static bool isConstStatement ( const Token * tok )
{
if ( ! tok )
return false ;
if ( tok - > isExpandedMacro ( ) )
return false ;
if ( Token : : Match ( tok , " %bool%|%num%|%str%|%char%|nullptr|NULL " ) )
return true ;
if ( Token : : Match ( tok , " %var% " ) )
return true ;
if ( Token : : Match ( tok , " *|&|&& " ) & &
2019-02-27 07:09:22 +01:00
( Token : : Match ( tok - > previous ( ) , " ::|.|const|volatile|restrict " ) | | isVarDeclOp ( tok ) ) )
2019-02-15 13:31:40 +01:00
return false ;
if ( Token : : Match ( tok , " <<|>> " ) & & ! astIsIntegral ( tok , false ) )
return false ;
if ( Token : : Match ( tok , " !|~|%cop% " ) & & ( tok - > astOperand1 ( ) | | tok - > astOperand2 ( ) ) )
return true ;
if ( Token : : simpleMatch ( tok - > previous ( ) , " sizeof ( " ) )
return true ;
if ( isCPPCast ( tok ) )
return isConstStatement ( tok - > astOperand2 ( ) ) ;
if ( Token : : Match ( tok , " ( %type% " ) )
return isConstStatement ( tok - > astOperand1 ( ) ) ;
if ( Token : : simpleMatch ( tok , " , " ) )
return isConstStatement ( tok - > astOperand2 ( ) ) ;
return false ;
}
static bool isVoidStmt ( const Token * tok )
{
if ( Token : : simpleMatch ( tok , " ( void " ) )
return true ;
const Token * tok2 = tok ;
while ( tok2 - > astOperand1 ( ) )
tok2 = tok2 - > astOperand1 ( ) ;
if ( Token : : simpleMatch ( tok2 - > previous ( ) , " ) " ) & & Token : : simpleMatch ( tok2 - > previous ( ) - > link ( ) , " ( void " ) )
return true ;
if ( Token : : simpleMatch ( tok2 , " ( void " ) )
return true ;
return Token : : Match ( tok2 - > previous ( ) , " delete|throw|return " ) ;
}
static bool isConstTop ( const Token * tok )
{
if ( ! tok )
return false ;
2020-09-29 11:32:48 +02:00
if ( ! tok - > astParent ( ) )
2019-02-15 13:31:40 +01:00
return true ;
2020-09-29 11:32:48 +02:00
if ( Token : : simpleMatch ( tok - > astParent ( ) , " ; " ) & &
2019-02-15 13:31:40 +01:00
Token : : Match ( tok - > astTop ( ) - > previous ( ) , " for|if ( " ) & & Token : : simpleMatch ( tok - > astTop ( ) - > astOperand2 ( ) , " ; " ) ) {
if ( Token : : simpleMatch ( tok - > astParent ( ) - > astParent ( ) , " ; " ) )
return tok - > astParent ( ) - > astOperand2 ( ) = = tok ;
else
return tok - > astParent ( ) - > astOperand1 ( ) = = tok ;
}
return false ;
}
2009-07-05 22:16:43 +02:00
void CheckOther : : checkIncompleteStatement ( )
2009-01-26 20:14:46 +01:00
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2010-04-21 08:38:25 +02:00
return ;
2018-06-16 16:10:28 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
2019-02-15 13:31:40 +01:00
const Scope * scope = tok - > scope ( ) ;
if ( scope & & ! scope - > isExecutable ( ) )
2017-09-21 22:53:15 +02:00
continue ;
2019-02-15 13:31:40 +01:00
if ( ! isConstTop ( tok ) )
2017-09-21 22:53:15 +02:00
continue ;
2020-09-29 11:32:48 +02:00
if ( tok - > str ( ) = = " , " & & Token : : simpleMatch ( tok - > astTop ( ) - > previous ( ) , " for ( " ) )
continue ;
2020-09-29 13:35:39 +02:00
// Do not warn for statement when both lhs and rhs has side effects:
// dostuff() || x=213;
if ( Token : : Match ( tok , " %oror%|&& " ) ) {
bool warn = false ;
visitAstNodes ( tok , [ & warn ] ( const Token * child ) {
if ( Token : : Match ( child , " %oror%|&& " ) )
return ChildrenToVisit : : op1_and_op2 ;
if ( child - > isAssignmentOp ( ) )
return ChildrenToVisit : : none ;
if ( child - > tokType ( ) = = Token : : Type : : eIncDecOp )
return ChildrenToVisit : : none ;
if ( Token : : Match ( child - > previous ( ) , " %name% ( " ) )
return ChildrenToVisit : : none ;
warn = true ;
return ChildrenToVisit : : done ;
} ) ;
if ( ! warn )
continue ;
}
2019-02-15 13:31:40 +01:00
const Token * rtok = nextAfterAstRightmostLeaf ( tok ) ;
if ( ! Token : : simpleMatch ( tok - > astParent ( ) , " ; " ) & & ! Token : : simpleMatch ( rtok , " ; " ) & &
! Token : : Match ( tok - > previous ( ) , " ;|}|{ %any% ; " ) )
2017-09-21 22:53:15 +02:00
continue ;
2019-11-28 17:49:07 +01:00
// Skip statement expressions
2019-02-15 13:31:40 +01:00
if ( Token : : simpleMatch ( rtok , " ; } ) " ) )
2017-09-21 22:53:15 +02:00
continue ;
2019-02-15 13:31:40 +01:00
if ( ! isConstStatement ( tok ) )
2017-09-21 22:53:15 +02:00
continue ;
2019-02-15 13:31:40 +01:00
if ( isVoidStmt ( tok ) )
continue ;
2019-03-31 11:50:57 +02:00
if ( mTokenizer - > isCPP ( ) & & tok - > str ( ) = = " & " & & ! ( tok - > astOperand1 ( ) - > valueType ( ) & & tok - > astOperand1 ( ) - > valueType ( ) - > isIntegral ( ) ) )
2019-03-31 16:20:06 +02:00
// Possible archive
continue ;
2019-02-15 13:31:40 +01:00
bool inconclusive = Token : : Match ( tok , " %cop% " ) ;
2021-02-24 22:00:06 +01:00
if ( mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) | | ! inconclusive )
2019-02-15 13:31:40 +01:00
constStatementError ( tok , tok - > isNumber ( ) ? " numeric " : " string " , inconclusive ) ;
2009-01-26 20:14:46 +01:00
}
}
2019-02-15 13:31:40 +01:00
void CheckOther : : constStatementError ( const Token * tok , const std : : string & type , bool inconclusive )
2011-08-19 17:53:43 +02:00
{
2019-11-28 17:49:07 +01:00
const Token * valueTok = tok ;
while ( valueTok & & valueTok - > isCast ( ) )
valueTok = valueTok - > astOperand2 ( ) ? valueTok - > astOperand2 ( ) : valueTok - > astOperand1 ( ) ;
2019-02-15 13:31:40 +01:00
std : : string msg ;
if ( Token : : simpleMatch ( tok , " == " ) )
msg = " Found suspicious equality comparison. Did you intend to assign a value instead? " ;
else if ( Token : : Match ( tok , " ,|!|~|%cop% " ) )
msg = " Found suspicious operator ' " + tok - > str ( ) + " ' " ;
else if ( Token : : Match ( tok , " %var% " ) )
msg = " Unused variable value ' " + tok - > str ( ) + " ' " ;
2019-11-28 17:49:07 +01:00
else if ( Token : : Match ( valueTok , " %str%|%num% " ) )
msg = " Redundant code: Found a statement that begins with " + std : : string ( valueTok - > isNumber ( ) ? " numeric " : " string " ) + " constant. " ;
else if ( ! tok )
2019-02-15 13:31:40 +01:00
msg = " Redundant code: Found a statement that begins with " + type + " constant. " ;
2019-11-28 17:49:07 +01:00
else
return ; // Strange!
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : warning , " constStatement " , msg , CWE398 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2011-08-19 17:53:43 +02:00
}
2009-01-26 20:14:46 +01:00
//---------------------------------------------------------------------------
2014-08-27 09:42:09 +02:00
// Detect division by zero.
2011-08-19 17:53:43 +02:00
//---------------------------------------------------------------------------
2009-07-05 22:16:43 +02:00
void CheckOther : : checkZeroDivision ( )
2009-03-28 07:49:47 +01:00
{
2018-06-16 16:10:28 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
2016-02-02 17:17:33 +01:00
if ( ! tok - > astOperand2 ( ) | | ! tok - > astOperand1 ( ) )
continue ;
if ( tok - > str ( ) ! = " % " & & tok - > str ( ) ! = " / " & & tok - > str ( ) ! = " %= " & & tok - > str ( ) ! = " /= " )
2015-07-30 13:48:51 +02:00
continue ;
2015-10-08 19:50:10 +02:00
if ( ! tok - > valueType ( ) | | ! tok - > valueType ( ) - > isIntegral ( ) )
2015-07-30 13:48:51 +02:00
continue ;
2016-02-02 17:17:33 +01:00
2015-07-30 13:48:51 +02:00
// Value flow..
const ValueFlow : : Value * value = tok - > astOperand2 ( ) - > getValue ( 0LL ) ;
2018-06-16 16:10:28 +02:00
if ( value & & mSettings - > isEnabled ( value , false ) )
2017-05-15 20:05:11 +02:00
zerodivError ( tok , value ) ;
2009-03-28 07:49:47 +01:00
}
}
2017-05-15 20:05:11 +02:00
void CheckOther : : zerodivError ( const Token * tok , const ValueFlow : : Value * value )
2011-08-19 17:53:43 +02:00
{
2017-05-15 20:05:11 +02:00
if ( ! tok & & ! value ) {
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : error , " zerodiv " , " Division by zero. " , CWE369 , Certainty : : normal ) ;
reportError ( tok , Severity : : error , " zerodivcond " , ValueFlow : : eitherTheConditionIsRedundant ( nullptr ) + " or there is division by zero. " , CWE369 , Certainty : : normal ) ;
2017-05-15 20:05:11 +02:00
return ;
}
2009-03-28 07:49:47 +01:00
2017-05-19 17:29:16 +02:00
const ErrorPath errorPath = getErrorPath ( tok , value , " Division by zero " ) ;
2017-05-15 20:05:11 +02:00
2017-05-16 19:08:47 +02:00
std : : ostringstream errmsg ;
2017-09-04 23:17:51 +02:00
if ( value - > condition ) {
2019-07-16 09:10:10 +02:00
const int line = tok ? tok - > linenr ( ) : 0 ;
2017-05-16 19:08:47 +02:00
errmsg < < ValueFlow : : eitherTheConditionIsRedundant ( value - > condition )
2017-09-04 23:17:51 +02:00
< < " or there is division by zero at line " < < line < < " . " ;
} else
2017-05-16 19:08:47 +02:00
errmsg < < " Division by zero. " ;
reportError ( errorPath ,
2017-05-23 11:43:56 +02:00
value - > errorSeverity ( ) ? Severity : : error : Severity : : warning ,
2017-05-16 19:08:47 +02:00
value - > condition ? " zerodivcond " : " zerodiv " ,
2021-02-24 22:00:06 +01:00
errmsg . str ( ) , CWE369 , value - > isInconclusive ( ) ? Certainty : : inconclusive : Certainty : : normal ) ;
2013-09-07 07:40:10 +02:00
}
2014-08-27 09:42:09 +02:00
2013-06-10 08:13:08 +02:00
//---------------------------------------------------------------------------
2014-08-27 09:42:09 +02:00
// Check for NaN (not-a-number) in an arithmetic expression, e.g.
// double d = 1.0 / 0.0 + 100.0;
2013-06-10 08:13:08 +02:00
//---------------------------------------------------------------------------
void CheckOther : : checkNanInArithmeticExpression ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2018-10-20 10:51:50 +02:00
return ;
2018-06-16 16:10:28 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
2018-10-20 10:51:50 +02:00
if ( tok - > str ( ) ! = " / " )
continue ;
if ( ! Token : : Match ( tok - > astParent ( ) , " [+-] " ) )
continue ;
if ( Token : : simpleMatch ( tok - > astOperand2 ( ) , " 0.0 " ) )
2013-06-10 08:13:08 +02:00
nanInArithmeticExpressionError ( tok ) ;
}
}
void CheckOther : : nanInArithmeticExpressionError ( const Token * tok )
{
reportError ( tok , Severity : : style , " nanInArithmeticExpression " ,
" Using NaN/Inf in a computation. \n "
2013-06-11 08:11:44 +02:00
" Using NaN/Inf in a computation. "
2021-02-24 22:00:06 +01:00
" Although nothing bad really happens, it is suspicious. " , CWE369 , Certainty : : normal ) ;
2013-06-10 08:13:08 +02:00
}
2011-08-19 17:53:43 +02:00
//---------------------------------------------------------------------------
2016-11-04 15:01:05 +01:00
// Creating instance of classes which are destroyed immediately
2011-08-19 17:53:43 +02:00
//---------------------------------------------------------------------------
2010-10-01 17:23:22 +02:00
void CheckOther : : checkMisusedScopedObject ( )
{
2010-12-25 08:43:52 +01:00
// Skip this check for .c files
2018-06-16 16:10:28 +02:00
if ( mTokenizer - > isC ( ) )
2015-06-20 11:22:15 +02:00
return ;
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2011-08-19 18:06:28 +02:00
return ;
2010-12-25 08:43:52 +01:00
2018-06-16 16:10:28 +02:00
const SymbolDatabase * const symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart ; tok & & tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2015-08-14 20:46:13 +02:00
if ( ( tok - > next ( ) - > type ( ) | | ( tok - > next ( ) - > function ( ) & & tok - > next ( ) - > function ( ) - > isConstructor ( ) ) ) // TODO: The rhs of || should be removed; It is a workaround for a symboldatabase bug
& & Token : : Match ( tok , " [;{}] %name% ( " )
2013-10-22 19:37:11 +02:00
& & Token : : Match ( tok - > linkAt ( 2 ) , " ) ; !!} " )
2013-07-22 07:25:53 +02:00
& & ( ! tok - > next ( ) - > function ( ) | | // is not a function on this scope
2015-06-10 19:07:04 +02:00
tok - > next ( ) - > function ( ) - > isConstructor ( ) ) ) { // or is function in this scope and it's a ctor
2010-10-01 17:23:22 +02:00
tok = tok - > next ( ) ;
misusedScopeObjectError ( tok , tok - > str ( ) ) ;
tok = tok - > next ( ) ;
}
}
}
}
2011-08-19 17:53:43 +02:00
void CheckOther : : misusedScopeObjectError ( const Token * tok , const std : : string & varname )
{
2015-06-20 11:22:15 +02:00
reportError ( tok , Severity : : style ,
2018-04-09 06:43:48 +02:00
" unusedScopedObject " ,
" $symbol: " + varname + " \n "
2021-02-24 22:00:06 +01:00
" Instance of '$symbol' object is destroyed immediately. " , CWE563 , Certainty : : normal ) ;
2011-08-19 17:53:43 +02:00
}
2018-10-18 11:56:23 +02:00
static const Token * getSingleExpressionInBlock ( const Token * tok )
{
2018-10-18 20:08:32 +02:00
if ( ! tok )
2018-10-18 11:56:23 +02:00
return nullptr ;
const Token * top = tok - > astTop ( ) ;
2018-10-18 20:08:32 +02:00
if ( ! top )
2018-10-18 11:56:23 +02:00
return nullptr ;
const Token * nextExpression = nextAfterAstRightmostLeaf ( top ) ;
if ( ! Token : : simpleMatch ( nextExpression , " ; } " ) )
return nullptr ;
return top ;
}
2011-04-09 21:14:01 +02:00
//-----------------------------------------------------------------------------
2011-04-09 23:05:27 +02:00
// check for duplicate code in if and else branches
// if (a) { b = true; } else { b = true; }
//-----------------------------------------------------------------------------
void CheckOther : : checkDuplicateBranch ( )
{
2014-02-16 11:04:27 +01:00
// This is inconclusive since in practice most warnings are noise:
// * There can be unfixed low-priority todos. The code is fine as it
// is but it could be possible to enhance it. Writing a warning
// here is noise since the code is fine (see cppcheck, abiword, ..)
// * There can be overspecified code so some conditions can't be true
// and their conditional code is a duplicate of the condition that
// is always true just in case it would be false. See for instance
// abiword.
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) | | ! mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) )
2011-04-09 23:05:27 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2011-04-09 23:05:27 +02:00
2018-04-20 22:08:22 +02:00
for ( const Scope & scope : symbolDatabase - > scopeList ) {
if ( scope . type ! = Scope : : eIf )
2011-12-13 21:42:38 +01:00
continue ;
2011-04-09 23:05:27 +02:00
// check all the code in the function for if (..) else
2018-04-27 22:36:30 +02:00
if ( Token : : simpleMatch ( scope . bodyEnd , " } else { " ) ) {
2013-02-18 17:18:33 +01:00
// Make sure there are no macros (different macros might be expanded
// to the same code)
bool macro = false ;
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope . bodyStart ; tok ! = scope . bodyEnd - > linkAt ( 2 ) ; tok = tok - > next ( ) ) {
2013-02-18 17:18:33 +01:00
if ( tok - > isExpandedMacro ( ) ) {
macro = true ;
break ;
}
}
if ( macro )
continue ;
2011-12-09 22:28:10 +01:00
// save if branch code
2018-04-27 22:36:30 +02:00
const std : : string branch1 = scope . bodyStart - > next ( ) - > stringifyList ( scope . bodyEnd ) ;
2011-04-09 23:05:27 +02:00
2015-01-02 11:24:28 +01:00
if ( branch1 . empty ( ) )
continue ;
2011-12-09 22:28:10 +01:00
// save else branch code
2018-04-27 22:36:30 +02:00
const std : : string branch2 = scope . bodyEnd - > tokAt ( 3 ) - > stringifyList ( scope . bodyEnd - > linkAt ( 2 ) ) ;
2011-04-09 23:05:27 +02:00
2018-10-18 11:56:23 +02:00
ErrorPath errorPath ;
2011-12-09 22:28:10 +01:00
// check for duplicates
2018-10-18 11:56:23 +02:00
if ( branch1 = = branch2 ) {
duplicateBranchError ( scope . classDef , scope . bodyEnd - > next ( ) , errorPath ) ;
continue ;
}
// check for duplicates using isSameExpression
const Token * branchTop1 = getSingleExpressionInBlock ( scope . bodyStart - > next ( ) ) ;
const Token * branchTop2 = getSingleExpressionInBlock ( scope . bodyEnd - > tokAt ( 3 ) ) ;
if ( ! branchTop1 | | ! branchTop2 )
continue ;
2018-10-18 20:08:32 +02:00
if ( branchTop1 - > str ( ) ! = branchTop2 - > str ( ) )
2018-10-18 11:56:23 +02:00
continue ;
2018-10-18 20:08:32 +02:00
if ( isSameExpression ( mTokenizer - > isCPP ( ) , false , branchTop1 - > astOperand1 ( ) , branchTop2 - > astOperand1 ( ) , mSettings - > library , true , true , & errorPath ) & &
2018-10-18 11:56:23 +02:00
isSameExpression ( mTokenizer - > isCPP ( ) , false , branchTop1 - > astOperand2 ( ) , branchTop2 - > astOperand2 ( ) , mSettings - > library , true , true , & errorPath ) )
duplicateBranchError ( scope . classDef , scope . bodyEnd - > next ( ) , errorPath ) ;
2011-04-09 23:05:27 +02:00
}
}
}
2018-10-18 11:56:23 +02:00
void CheckOther : : duplicateBranchError ( const Token * tok1 , const Token * tok2 , ErrorPath errors )
2012-09-16 19:44:02 +02:00
{
2018-10-18 11:56:23 +02:00
errors . emplace_back ( tok2 , " " ) ;
errors . emplace_back ( tok1 , " " ) ;
2012-09-16 19:44:02 +02:00
2018-10-18 11:56:23 +02:00
reportError ( errors , Severity : : style , " duplicateBranch " , " Found duplicate branches for 'if' and 'else'. \n "
2012-09-16 19:44:02 +02:00
" Finding the same code in an 'if' and related 'else' branch is suspicious and "
" might indicate a cut and paste or logic error. Please examine this code "
2021-02-24 22:00:06 +01:00
" carefully to determine if it is correct. " , CWE398 , Certainty : : inconclusive ) ;
2012-09-16 19:44:02 +02:00
}
2012-09-05 08:31:23 +02:00
//-----------------------------------------------------------------------------
// Check for a free() of an invalid address
// char* p = malloc(100);
// free(p + 10);
//-----------------------------------------------------------------------------
void CheckOther : : checkInvalidFree ( )
{
2019-07-16 09:10:10 +02:00
std : : map < int , bool > inconclusive ;
std : : map < int , std : : string > allocation ;
2012-09-05 08:31:23 +02:00
2021-02-24 22:00:06 +01:00
const bool printInconclusive = mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2012-09-05 08:31:23 +02:00
2014-10-31 11:40:42 +01:00
// Keep track of which variables were assigned addresses to newly-allocated memory
if ( Token : : Match ( tok , " %var% = malloc|g_malloc|new " ) ) {
2019-03-07 06:35:11 +01:00
allocation . insert ( std : : make_pair ( tok - > varId ( ) , tok - > strAt ( 2 ) ) ) ;
inconclusive . insert ( std : : make_pair ( tok - > varId ( ) , false ) ) ;
2014-10-31 11:40:42 +01:00
}
2012-11-06 06:02:51 +01:00
2014-10-31 11:40:42 +01:00
// If a previously-allocated pointer is incremented or decremented, any subsequent
// free involving pointer arithmetic may or may not be invalid, so we should only
// report an inconclusive result.
2015-01-31 10:50:39 +01:00
else if ( Token : : Match ( tok , " %var% = %name% +|- " ) & &
2014-10-31 11:40:42 +01:00
tok - > varId ( ) = = tok - > tokAt ( 2 ) - > varId ( ) & &
2019-03-07 06:35:11 +01:00
allocation . find ( tok - > varId ( ) ) ! = allocation . end ( ) ) {
2015-04-10 14:18:52 +02:00
if ( printInconclusive )
2019-03-07 06:35:11 +01:00
inconclusive [ tok - > varId ( ) ] = true ;
else {
allocation . erase ( tok - > varId ( ) ) ;
inconclusive . erase ( tok - > varId ( ) ) ;
}
2014-10-31 11:40:42 +01:00
}
2012-09-05 08:31:23 +02:00
2014-10-31 11:40:42 +01:00
// If a previously-allocated pointer is assigned a completely new value,
// we can't know if any subsequent free() on that pointer is valid or not.
else if ( Token : : Match ( tok , " %var% = " ) ) {
2019-03-07 06:35:11 +01:00
allocation . erase ( tok - > varId ( ) ) ;
inconclusive . erase ( tok - > varId ( ) ) ;
2014-10-31 11:40:42 +01:00
}
// If a variable that was previously assigned a newly-allocated memory location is
// added or subtracted from when used to free the memory, report an error.
2015-12-24 14:40:48 +01:00
else if ( Token : : Match ( tok , " free|g_free|delete ( %any% +|- " ) | |
Token : : Match ( tok , " delete [ ] ( %any% +|- " ) | |
2014-10-31 11:40:42 +01:00
Token : : Match ( tok , " delete %any% +|- %any% " ) ) {
const int varIndex = tok - > strAt ( 1 ) = = " ( " ? 2 :
tok - > strAt ( 3 ) = = " ( " ? 4 : 1 ;
2019-07-16 09:10:10 +02:00
const int var1 = tok - > tokAt ( varIndex ) - > varId ( ) ;
const int var2 = tok - > tokAt ( varIndex + 2 ) - > varId ( ) ;
const std : : map < int , bool > : : const_iterator alloc1 = inconclusive . find ( var1 ) ;
const std : : map < int , bool > : : const_iterator alloc2 = inconclusive . find ( var2 ) ;
2019-03-07 06:35:11 +01:00
if ( alloc1 ! = inconclusive . end ( ) ) {
invalidFreeError ( tok , allocation [ var1 ] , alloc1 - > second ) ;
} else if ( alloc2 ! = inconclusive . end ( ) ) {
invalidFreeError ( tok , allocation [ var2 ] , alloc2 - > second ) ;
2014-10-31 11:40:42 +01:00
}
2012-09-05 08:31:23 +02:00
}
2014-10-31 11:40:42 +01:00
// If the previously-allocated variable is passed in to another function
// as a parameter, it might be modified, so we shouldn't report an error
// if it is later used to free memory
2018-06-16 16:10:28 +02:00
else if ( Token : : Match ( tok , " %name% ( " ) & & ! mSettings - > library . isFunctionConst ( tok - > str ( ) , true ) ) {
2014-10-31 11:40:42 +01:00
const Token * tok2 = Token : : findmatch ( tok - > next ( ) , " %var% " , tok - > linkAt ( 1 ) ) ;
while ( tok2 ! = nullptr ) {
2019-03-07 06:35:11 +01:00
allocation . erase ( tok - > varId ( ) ) ;
inconclusive . erase ( tok2 - > varId ( ) ) ;
2014-10-31 11:40:42 +01:00
tok2 = Token : : findmatch ( tok2 - > next ( ) , " %var% " , tok - > linkAt ( 1 ) ) ;
}
2012-09-05 08:31:23 +02:00
}
}
}
}
2019-03-07 06:35:11 +01:00
void CheckOther : : invalidFreeError ( const Token * tok , const std : : string & allocation , bool inconclusive )
2012-09-05 08:31:23 +02:00
{
2019-03-07 06:35:11 +01:00
std : : string alloc = allocation ;
if ( alloc ! = " new " )
alloc + = " () " ;
std : : string deallocated = ( alloc = = " new " ) ? " deleted " : " freed " ;
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : error , " invalidFree " , " Mismatching address is " + deallocated + " . The address you get from " + alloc + " must be " + deallocated + " without offset. " , CWE ( 0U ) , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2012-09-05 08:31:23 +02:00
}
2014-08-27 09:42:09 +02:00
//---------------------------------------------------------------------------
// check for the same expression on both sides of an operator
// (x == x), (x && x), (x || x)
// (x.y == x.y), (x.y && x.y), (x.y || x.y)
//---------------------------------------------------------------------------
2011-11-08 21:22:31 +01:00
namespace {
2012-05-24 17:40:43 +02:00
bool notconst ( const Function * func )
2011-11-10 21:49:14 +01:00
{
2015-01-08 05:45:31 +01:00
return ! func - > isConst ( ) ;
2011-11-10 21:49:14 +01:00
}
2012-05-24 17:40:43 +02:00
void getConstFunctions ( const SymbolDatabase * symbolDatabase , std : : list < const Function * > & constFunctions )
2011-11-10 21:49:14 +01:00
{
2018-07-14 12:28:57 +02:00
for ( const Scope & scope : symbolDatabase - > scopeList ) {
2011-11-10 21:49:14 +01:00
// only add const functions that do not have a non-const overloaded version
// since it is pretty much impossible to tell which is being called.
2021-08-07 20:51:18 +02:00
using StringFunctionMap = std : : map < std : : string , std : : list < const Function * > > ;
2011-11-10 21:49:14 +01:00
StringFunctionMap functionsByName ;
2018-07-14 12:28:57 +02:00
for ( const Function & func : scope . functionList ) {
functionsByName [ func . tokenDef - > str ( ) ] . push_back ( & func ) ;
2011-11-10 21:49:14 +01:00
}
2020-09-21 19:30:47 +02:00
for ( std : : pair < const std : : string , std : : list < const Function * > > & it : functionsByName ) {
const std : : list < const Function * > : : const_iterator nc = std : : find_if ( it . second . begin ( ) , it . second . end ( ) , notconst ) ;
if ( nc = = it . second . end ( ) ) {
2011-11-10 21:49:14 +01:00
// ok to add all of them
2020-09-21 19:30:47 +02:00
constFunctions . splice ( constFunctions . end ( ) , it . second ) ;
2011-11-10 21:49:14 +01:00
}
}
}
}
2011-11-08 21:22:31 +01:00
}
2011-04-10 16:25:02 +02:00
void CheckOther : : checkDuplicateExpression ( )
{
2021-02-24 22:00:06 +01:00
const bool styleEnabled = mSettings - > severity . isEnabled ( Severity : : style ) ;
const bool warningEnabled = mSettings - > severity . isEnabled ( Severity : : warning ) ;
2015-08-09 13:45:35 +02:00
if ( ! styleEnabled & & ! warningEnabled )
2011-04-10 16:25:02 +02:00
return ;
// Parse all executing scopes..
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2011-04-10 16:25:02 +02:00
2012-05-24 17:40:43 +02:00
std : : list < const Function * > constFunctions ;
2011-11-10 21:49:14 +01:00
getConstFunctions ( symbolDatabase , constFunctions ) ;
2011-04-10 16:25:02 +02:00
2019-07-13 21:45:54 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
for ( const Token * tok = scope - > bodyStart ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2018-04-08 20:29:52 +02:00
if ( tok - > str ( ) = = " = " & & Token : : Match ( tok - > astOperand1 ( ) , " %var% " ) ) {
2018-04-08 14:43:19 +02:00
const Token * endStatement = Token : : findsimplematch ( tok , " ; " ) ;
2018-04-08 20:29:52 +02:00
if ( Token : : Match ( endStatement , " ; %type% %var% ; " ) ) {
2018-04-08 14:43:19 +02:00
endStatement = endStatement - > tokAt ( 4 ) ;
}
2018-04-08 20:29:52 +02:00
if ( Token : : Match ( endStatement , " %var% %assign% " ) ) {
2018-04-08 14:43:19 +02:00
const Token * nextAssign = endStatement - > tokAt ( 1 ) ;
const Token * var1 = tok - > astOperand1 ( ) ;
const Token * var2 = nextAssign - > astOperand1 ( ) ;
2018-04-08 20:29:52 +02:00
if ( var1 & & var2 & &
2018-04-08 14:43:19 +02:00
Token : : Match ( var1 - > previous ( ) , " ;|{|} %var% " ) & &
Token : : Match ( var2 - > previous ( ) , " ;|{|} %var% " ) & &
2018-04-08 20:29:52 +02:00
var2 - > valueType ( ) & & var1 - > valueType ( ) & &
2018-04-08 14:43:19 +02:00
var2 - > valueType ( ) - > originalTypeName = = var1 - > valueType ( ) - > originalTypeName & &
var2 - > valueType ( ) - > pointer = = var1 - > valueType ( ) - > pointer & &
var2 - > valueType ( ) - > constness = = var1 - > valueType ( ) - > constness & &
var2 - > varId ( ) ! = var1 - > varId ( ) & & (
tok - > astOperand2 ( ) - > isArithmeticalOp ( ) | |
tok - > astOperand2 ( ) - > str ( ) = = " . " | |
Token : : Match ( tok - > astOperand2 ( ) - > previous ( ) , " %name% ( " )
2021-08-07 20:51:18 +02:00
) & &
2018-04-08 14:43:19 +02:00
tok - > next ( ) - > tokType ( ) ! = Token : : eType & &
2018-09-28 08:38:24 +02:00
isSameExpression ( mTokenizer - > isCPP ( ) , true , tok - > next ( ) , nextAssign - > next ( ) , mSettings - > library , true , false ) & &
isSameExpression ( mTokenizer - > isCPP ( ) , true , tok - > astOperand2 ( ) , nextAssign - > astOperand2 ( ) , mSettings - > library , true , false ) & &
2018-10-17 06:57:33 +02:00
tok - > astOperand2 ( ) - > expressionString ( ) = = nextAssign - > astOperand2 ( ) - > expressionString ( ) ) {
2020-09-26 10:31:40 +02:00
bool differentDomain = false ;
2019-07-13 21:45:54 +02:00
const Scope * varScope = var1 - > scope ( ) ? var1 - > scope ( ) : scope ;
2018-06-10 00:05:23 +02:00
for ( const Token * assignTok = Token : : findsimplematch ( var2 , " ; " ) ; assignTok & & assignTok ! = varScope - > bodyEnd ; assignTok = assignTok - > next ( ) ) {
2020-09-26 10:31:40 +02:00
if ( ! Token : : Match ( assignTok , " %assign%|%comp% " ) )
continue ;
if ( ! assignTok - > astOperand1 ( ) )
continue ;
if ( ! assignTok - > astOperand2 ( ) )
continue ;
if ( assignTok - > astOperand1 ( ) - > varId ( ) ! = var1 - > varId ( ) & &
assignTok - > astOperand1 ( ) - > varId ( ) ! = var2 - > varId ( ) & &
! isSameExpression ( mTokenizer - > isCPP ( ) ,
true ,
tok - > astOperand2 ( ) ,
assignTok - > astOperand1 ( ) ,
mSettings - > library ,
true ,
true ) )
continue ;
if ( assignTok - > astOperand2 ( ) - > varId ( ) ! = var1 - > varId ( ) & &
assignTok - > astOperand2 ( ) - > varId ( ) ! = var2 - > varId ( ) & &
! isSameExpression ( mTokenizer - > isCPP ( ) ,
true ,
tok - > astOperand2 ( ) ,
assignTok - > astOperand2 ( ) ,
mSettings - > library ,
true ,
true ) )
continue ;
differentDomain = true ;
break ;
2018-06-10 00:05:23 +02:00
}
2020-09-26 10:31:40 +02:00
if ( ! differentDomain & & ! isUniqueExpression ( tok - > astOperand2 ( ) ) )
2018-10-17 06:57:33 +02:00
duplicateAssignExpressionError ( var1 , var2 , false ) ;
2021-02-24 22:00:06 +01:00
else if ( mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) )
2018-10-17 06:57:33 +02:00
duplicateAssignExpressionError ( var1 , var2 , true ) ;
2018-04-08 14:43:19 +02:00
}
}
}
2018-08-07 09:32:16 +02:00
ErrorPath errorPath ;
2015-08-07 20:28:25 +02:00
if ( tok - > isOp ( ) & & tok - > astOperand1 ( ) & & ! Token : : Match ( tok , " +|*|<<|>>|+=|*=|<<=|>>= " ) ) {
2014-03-22 18:42:29 +01:00
if ( Token : : Match ( tok , " ==|!=|- " ) & & astIsFloat ( tok - > astOperand1 ( ) , true ) )
2012-05-17 07:26:57 +02:00
continue ;
2020-07-11 13:42:57 +02:00
const bool pointerDereference = ( tok - > astOperand1 ( ) & & tok - > astOperand1 ( ) - > isUnaryOp ( " * " ) ) | |
( tok - > astOperand2 ( ) & & tok - > astOperand2 ( ) - > isUnaryOp ( " * " ) ) ;
const bool followVar = ( ! isConstVarExpression ( tok ) | | Token : : Match ( tok , " %comp%|%oror%|&& " ) ) & & ! pointerDereference ;
2019-12-14 09:15:00 +01:00
if ( isSameExpression ( mTokenizer - > isCPP ( ) ,
true ,
tok - > astOperand1 ( ) ,
tok - > astOperand2 ( ) ,
mSettings - > library ,
true ,
followVar ,
& errorPath ) ) {
2018-06-16 16:10:28 +02:00
if ( isWithoutSideEffects ( mTokenizer - > isCPP ( ) , tok - > astOperand1 ( ) ) ) {
2014-07-10 09:23:14 +02:00
const bool assignment = tok - > str ( ) = = " = " ;
2015-08-09 13:45:35 +02:00
if ( assignment & & warningEnabled )
2014-06-28 15:26:22 +02:00
selfAssignmentError ( tok , tok - > astOperand1 ( ) - > expressionString ( ) ) ;
2017-05-19 00:33:48 +02:00
else if ( styleEnabled ) {
2020-11-10 18:22:08 +01:00
if ( mTokenizer - > isCPP ( ) & & mSettings - > standards . cpp > = Standards : : CPP11 & & tok - > str ( ) = = " == " ) {
2014-11-13 16:04:34 +01:00
const Token * parent = tok - > astParent ( ) ;
while ( parent & & parent - > astParent ( ) ) {
parent = parent - > astParent ( ) ;
}
if ( parent & & parent - > previous ( ) & & parent - > previous ( ) - > str ( ) = = " static_assert " ) {
continue ;
}
}
2018-08-07 09:32:16 +02:00
duplicateExpressionError ( tok - > astOperand1 ( ) , tok - > astOperand2 ( ) , tok , errorPath ) ;
2014-11-13 16:04:34 +01:00
}
2018-04-21 13:28:31 +02:00
}
2019-12-14 09:15:00 +01:00
} else if ( tok - > str ( ) = = " = " & & Token : : simpleMatch ( tok - > astOperand2 ( ) , " = " ) & &
isSameExpression ( mTokenizer - > isCPP ( ) ,
false ,
tok - > astOperand1 ( ) ,
tok - > astOperand2 ( ) - > astOperand1 ( ) ,
mSettings - > library ,
true ,
false ) ) {
2019-07-13 21:45:54 +02:00
if ( warningEnabled & & isWithoutSideEffects ( mTokenizer - > isCPP ( ) , tok - > astOperand1 ( ) ) ) {
selfAssignmentError ( tok , tok - > astOperand1 ( ) - > expressionString ( ) ) ;
}
2018-04-21 13:28:31 +02:00
} else if ( styleEnabled & &
2019-12-14 09:15:00 +01:00
isOppositeExpression ( mTokenizer - > isCPP ( ) ,
tok - > astOperand1 ( ) ,
tok - > astOperand2 ( ) ,
mSettings - > library ,
false ,
true ,
& errorPath ) & &
2018-05-02 06:32:33 +02:00
! Token : : Match ( tok , " =|-|-=|/|/= " ) & &
2018-06-16 16:10:28 +02:00
isWithoutSideEffects ( mTokenizer - > isCPP ( ) , tok - > astOperand1 ( ) ) ) {
2018-10-05 08:36:49 +02:00
oppositeExpressionError ( tok , errorPath ) ;
2014-05-21 18:19:42 +02:00
} else if ( ! Token : : Match ( tok , " [-/%] " ) ) { // These operators are not associative
2019-12-14 09:15:00 +01:00
if ( styleEnabled & & tok - > astOperand2 ( ) & & tok - > str ( ) = = tok - > astOperand1 ( ) - > str ( ) & &
isSameExpression ( mTokenizer - > isCPP ( ) ,
true ,
tok - > astOperand2 ( ) ,
tok - > astOperand1 ( ) - > astOperand2 ( ) ,
mSettings - > library ,
true ,
followVar ,
& errorPath ) & &
isWithoutSideEffects ( mTokenizer - > isCPP ( ) , tok - > astOperand2 ( ) ) )
2018-08-07 09:32:16 +02:00
duplicateExpressionError ( tok - > astOperand2 ( ) , tok - > astOperand1 ( ) - > astOperand2 ( ) , tok , errorPath ) ;
2018-10-21 07:09:20 +02:00
else if ( tok - > astOperand2 ( ) & & isConstExpression ( tok - > astOperand1 ( ) , mSettings - > library , true , mTokenizer - > isCPP ( ) ) ) {
2014-03-17 18:35:36 +01:00
const Token * ast1 = tok - > astOperand1 ( ) ;
while ( ast1 & & tok - > str ( ) = = ast1 - > str ( ) ) {
2018-10-21 20:28:46 +02:00
if ( isSameExpression ( mTokenizer - > isCPP ( ) , true , ast1 - > astOperand1 ( ) , tok - > astOperand2 ( ) , mSettings - > library , true , true , & errorPath ) & &
isWithoutSideEffects ( mTokenizer - > isCPP ( ) , ast1 - > astOperand1 ( ) ) & &
2018-10-21 07:09:20 +02:00
isWithoutSideEffects ( mTokenizer - > isCPP ( ) , ast1 - > astOperand2 ( ) ) )
2014-04-16 16:04:46 +02:00
// Probably the message should be changed to 'duplicate expressions X in condition or something like that'.
2018-10-21 07:09:20 +02:00
duplicateExpressionError ( ast1 - > astOperand1 ( ) , tok - > astOperand2 ( ) , tok , errorPath ) ;
2014-03-17 18:35:36 +01:00
ast1 = ast1 - > astOperand1 ( ) ;
}
2013-12-24 07:21:46 +01:00
}
}
2015-08-09 13:45:35 +02:00
} else if ( styleEnabled & & tok - > astOperand1 ( ) & & tok - > astOperand2 ( ) & & tok - > str ( ) = = " : " & & tok - > astParent ( ) & & tok - > astParent ( ) - > str ( ) = = " ? " ) {
2021-12-16 22:32:15 +01:00
if ( ! isVariableChanged ( tok - > astParent ( ) , /*indirect*/ 0 , mSettings , mTokenizer - > isCPP ( ) ) & & ! tok - > astOperand1 ( ) - > values ( ) . empty ( ) & & ! tok - > astOperand2 ( ) - > values ( ) . empty ( ) & & isEqualKnownValue ( tok - > astOperand1 ( ) , tok - > astOperand2 ( ) ) )
2018-04-03 21:43:55 +02:00
duplicateValueTernaryError ( tok ) ;
2018-10-01 14:31:06 +02:00
else if ( isSameExpression ( mTokenizer - > isCPP ( ) , true , tok - > astOperand1 ( ) , tok - > astOperand2 ( ) , mSettings - > library , false , true , & errorPath ) )
duplicateExpressionTernaryError ( tok , errorPath ) ;
2011-04-10 16:25:02 +02:00
}
}
}
}
2018-10-05 08:36:49 +02:00
void CheckOther : : oppositeExpressionError ( const Token * opTok , ErrorPath errors )
2018-04-21 11:28:21 +02:00
{
2018-10-04 21:17:47 +02:00
errors . emplace_back ( opTok , " " ) ;
const std : : string & op = opTok ? opTok - > str ( ) : " && " ;
2018-04-21 11:28:21 +02:00
2018-08-17 09:25:07 +02:00
reportError ( errors , Severity : : style , " oppositeExpression " , " Opposite expression on both sides of \' " + op + " \' . \n "
2018-04-21 11:28:21 +02:00
" Finding the opposite expression on both sides of an operator is suspicious and might "
" indicate a cut and paste or logic error. Please examine this code carefully to "
2021-02-24 22:00:06 +01:00
" determine if it is correct. " , CWE398 , Certainty : : normal ) ;
2018-04-21 11:28:21 +02:00
}
2018-08-07 09:32:16 +02:00
void CheckOther : : duplicateExpressionError ( const Token * tok1 , const Token * tok2 , const Token * opTok , ErrorPath errors )
2011-04-10 16:25:02 +02:00
{
2018-08-07 09:32:16 +02:00
errors . emplace_back ( opTok , " " ) ;
2011-04-10 16:25:02 +02:00
2018-08-07 09:32:16 +02:00
const std : : string & expr1 = tok1 ? tok1 - > expressionString ( ) : " x " ;
const std : : string & expr2 = tok2 ? tok2 - > expressionString ( ) : " x " ;
const std : : string & op = opTok ? opTok - > str ( ) : " && " ;
2018-08-25 14:25:31 +02:00
std : : string msg = " Same expression on both sides of \' " + op + " \' " ;
2020-02-15 20:21:13 +01:00
const char * id = " duplicateExpression " ;
if ( expr1 ! = expr2 & & ( ! opTok | | ! opTok - > isArithmeticalOp ( ) ) ) {
2018-10-05 06:00:24 +02:00
id = " knownConditionTrueFalse " ;
2020-02-15 20:21:13 +01:00
std : : string exprMsg = " The comparison \' " + expr1 + " " + op + " " + expr2 + " \' is always " ;
2018-08-25 21:32:52 +02:00
if ( Token : : Match ( opTok , " ==|>=|<= " ) )
2018-08-25 14:25:31 +02:00
msg = exprMsg + " true " ;
2018-08-25 21:32:52 +02:00
else if ( Token : : Match ( opTok , " !=|>|< " ) )
2018-08-25 14:25:31 +02:00
msg = exprMsg + " false " ;
2018-08-30 18:28:34 +02:00
if ( ! Token : : Match ( tok1 , " %num%|NULL|nullptr " ) & & ! Token : : Match ( tok2 , " %num%|NULL|nullptr " ) )
msg + = " because ' " + expr1 + " ' and ' " + expr2 + " ' represent the same value " ;
2018-08-25 14:25:31 +02:00
}
2020-02-15 20:21:13 +01:00
reportError ( errors , Severity : : style , id , msg + " . \n "
2011-04-10 16:25:02 +02:00
" Finding the same expression on both sides of an operator is suspicious and might "
" indicate a cut and paste or logic error. Please examine this code carefully to "
2021-02-24 22:00:06 +01:00
" determine if it is correct. " , CWE398 , Certainty : : normal ) ;
2011-04-10 16:25:02 +02:00
}
2018-10-17 06:57:33 +02:00
void CheckOther : : duplicateAssignExpressionError ( const Token * tok1 , const Token * tok2 , bool inconclusive )
2018-04-08 14:43:19 +02:00
{
2018-04-08 22:54:10 +02:00
const std : : list < const Token * > toks = { tok2 , tok1 } ;
2018-04-08 14:43:19 +02:00
2018-10-17 06:57:33 +02:00
const std : : string & var1 = tok1 ? tok1 - > str ( ) : " x " ;
const std : : string & var2 = tok2 ? tok2 - > str ( ) : " x " ;
2018-04-08 20:29:52 +02:00
reportError ( toks , Severity : : style , " duplicateAssignExpression " ,
2018-10-17 06:57:33 +02:00
" Same expression used in consecutive assignments of ' " + var1 + " ' and ' " + var2 + " '. \n "
" Finding variables ' " + var1 + " ' and ' " + var2 + " ' that are assigned the same expression "
2018-04-08 20:29:52 +02:00
" is suspicious and might indicate a cut and paste or logic error. Please examine this code carefully to "
2021-02-24 22:00:06 +01:00
" determine if it is correct. " , CWE398 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2018-04-08 14:43:19 +02:00
}
2018-10-01 14:31:06 +02:00
void CheckOther : : duplicateExpressionTernaryError ( const Token * tok , ErrorPath errors )
2015-01-03 18:01:49 +01:00
{
2018-10-01 14:31:06 +02:00
errors . emplace_back ( tok , " " ) ;
reportError ( errors , Severity : : style , " duplicateExpressionTernary " , " Same expression in both branches of ternary operator. \n "
2015-01-03 18:01:49 +01:00
" Finding the same expression in both branches of ternary operator is suspicious as "
2021-02-24 22:00:06 +01:00
" the same code is executed regardless of the condition. " , CWE398 , Certainty : : normal ) ;
2018-04-03 21:43:55 +02:00
}
void CheckOther : : duplicateValueTernaryError ( const Token * tok )
{
reportError ( tok , Severity : : style , " duplicateValueTernary " , " Same value in both branches of ternary operator. \n "
" Finding the same value in both branches of ternary operator is suspicious as "
2021-02-24 22:00:06 +01:00
" the same code is executed regardless of the condition. " , CWE398 , Certainty : : normal ) ;
2015-01-03 18:01:49 +01:00
}
2014-05-21 18:19:42 +02:00
void CheckOther : : selfAssignmentError ( const Token * tok , const std : : string & varname )
{
reportError ( tok , Severity : : warning ,
2018-04-09 06:43:48 +02:00
" selfAssignment " ,
" $symbol: " + varname + " \n "
2021-02-24 22:00:06 +01:00
" Redundant assignment of '$symbol' to itself. " , CWE398 , Certainty : : normal ) ;
2014-05-21 18:19:42 +02:00
}
2013-09-26 07:07:48 +02:00
//-----------------------------------------------------------------------------
2013-11-09 16:07:28 +01:00
// Check is a comparison of two variables leads to condition, which is
// always true or false.
2013-09-26 07:07:48 +02:00
// For instance: int a = 1; if(isless(a,a)){...}
2015-08-11 13:17:38 +02:00
// In this case isless(a,a) always evaluates to false.
2013-09-26 07:07:48 +02:00
//
// Reference:
// - http://www.cplusplus.com/reference/cmath/
//-----------------------------------------------------------------------------
2014-04-12 23:28:13 +02:00
void CheckOther : : checkComparisonFunctionIsAlwaysTrueOrFalse ( )
2013-09-26 07:07:48 +02:00
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2013-09-26 07:07:48 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2013-09-26 07:07:48 +02:00
if ( tok - > isName ( ) & & Token : : Match ( tok , " isgreater|isless|islessgreater|isgreaterequal|islessequal ( %var% , %var% ) " ) ) {
2019-07-16 09:10:10 +02:00
const int varidLeft = tok - > tokAt ( 2 ) - > varId ( ) ; // get the left varid
const int varidRight = tok - > tokAt ( 4 ) - > varId ( ) ; // get the right varid
2013-09-26 07:07:48 +02:00
// compare varids: if they are not zero but equal
2016-11-04 15:01:05 +01:00
// --> the comparison function is called with the same variables
2015-01-31 10:50:39 +01:00
if ( varidLeft = = varidRight ) {
2014-07-10 09:23:14 +02:00
const std : : string & functionName = tok - > str ( ) ; // store function name
const std : : string & varNameLeft = tok - > strAt ( 2 ) ; // get the left variable name
2013-09-26 07:07:48 +02:00
if ( functionName = = " isgreater " | | functionName = = " isless " | | functionName = = " islessgreater " ) {
// e.g.: isgreater(x,x) --> (x)>(x) --> false
2014-08-27 09:42:09 +02:00
checkComparisonFunctionIsAlwaysTrueOrFalseError ( tok , functionName , varNameLeft , false ) ;
2013-09-26 07:07:48 +02:00
} else { // functionName == "isgreaterequal" || functionName == "islessequal"
// e.g.: isgreaterequal(x,x) --> (x)>=(x) --> true
2014-08-27 09:42:09 +02:00
checkComparisonFunctionIsAlwaysTrueOrFalseError ( tok , functionName , varNameLeft , true ) ;
2013-09-26 07:07:48 +02:00
}
}
}
}
}
}
void CheckOther : : checkComparisonFunctionIsAlwaysTrueOrFalseError ( const Token * tok , const std : : string & functionName , const std : : string & varName , const bool result )
{
const std : : string strResult = result ? " true " : " false " ;
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
CWE mapping of unsafeClassCanLeak, zerodivcond, invalidPointerCast, redundantCopy, redundantAssignment, comparisonFunctionIsAlwaysTrueOrFalse, checkCastIntToCharAndBack, cstyleCast, passedByValue, clarifyCondition, exceptThrowInDestructor, exceptDeallocThrow, exceptRethrowCopy, catchExceptionByValue, fflushOnInputStream, seekOnAppendedFile, publicAllocationError
2016-04-12 19:29:40 +02:00
const struct CWE cweResult = result ? CWE571 : CWE570 ;
2013-09-26 07:07:48 +02:00
reportError ( tok , Severity : : warning , " comparisonFunctionIsAlwaysTrueOrFalse " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + functionName + " \n "
" Comparison of two identical variables with $symbol( " + varName + " , " + varName + " ) always evaluates to " + strResult + " . \n "
" The function $symbol is designed to compare two variables. Calling this function with one variable ( " + varName + " ) "
2021-02-24 22:00:06 +01:00
" for both parameters leads to a statement which is always " + strResult + " . " , cweResult , Certainty : : normal ) ;
2013-09-26 07:07:48 +02:00
}
2012-08-24 14:25:17 +02:00
2011-08-07 01:23:09 +02:00
//---------------------------------------------------------------------------
2012-08-21 12:28:02 +02:00
// Check testing sign of unsigned variables and pointers.
2011-08-07 01:23:09 +02:00
//---------------------------------------------------------------------------
void CheckOther : : checkSignOfUnsignedVariable ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2011-08-07 01:23:09 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2011-08-07 01:23:09 +02:00
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2011-08-07 01:23:09 +02:00
// check all the code in the function
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2021-06-25 16:25:14 +02:00
const ValueFlow : : Value * zeroValue = nullptr ;
const Token * nonZeroExpr = nullptr ;
if ( comparisonNonZeroExpressionLessThanZero ( tok , & zeroValue , & nonZeroExpr ) ) {
const ValueType * vt = nonZeroExpr - > valueType ( ) ;
if ( vt - > pointer )
pointerLessThanZeroError ( tok , zeroValue ) ;
else
unsignedLessThanZeroError ( tok , zeroValue , nonZeroExpr - > expressionString ( ) ) ;
} else if ( testIfNonZeroExpressionIsPositive ( tok , & zeroValue , & nonZeroExpr ) ) {
const ValueType * vt = nonZeroExpr - > valueType ( ) ;
if ( vt - > pointer )
pointerPositiveError ( tok , zeroValue ) ;
else
unsignedPositiveError ( tok , zeroValue , nonZeroExpr - > expressionString ( ) ) ;
2011-09-27 03:24:34 +02:00
}
2011-08-07 01:23:09 +02:00
}
}
}
2021-06-25 16:25:14 +02:00
bool CheckOther : : comparisonNonZeroExpressionLessThanZero ( const Token * tok , const ValueFlow : : Value * * zeroValue , const Token * * nonZeroExpr )
{
if ( ! tok - > isComparisonOp ( ) | | ! tok - > astOperand1 ( ) | | ! tok - > astOperand2 ( ) )
return false ;
const ValueFlow : : Value * v1 = tok - > astOperand1 ( ) - > getValue ( 0 ) ;
const ValueFlow : : Value * v2 = tok - > astOperand2 ( ) - > getValue ( 0 ) ;
if ( Token : : Match ( tok , " <|<= " ) & & v2 & & v2 - > isKnown ( ) ) {
* zeroValue = v2 ;
* nonZeroExpr = tok - > astOperand1 ( ) ;
} else if ( Token : : Match ( tok , " >|>= " ) & & v1 & & v1 - > isKnown ( ) ) {
* zeroValue = v1 ;
* nonZeroExpr = tok - > astOperand2 ( ) ;
} else {
return false ;
}
const ValueType * vt = ( * nonZeroExpr ) - > valueType ( ) ;
return vt & & ( vt - > pointer | | vt - > sign = = ValueType : : UNSIGNED ) ;
}
bool CheckOther : : testIfNonZeroExpressionIsPositive ( const Token * tok , const ValueFlow : : Value * * zeroValue , const Token * * nonZeroExpr )
{
if ( ! tok - > isComparisonOp ( ) | | ! tok - > astOperand1 ( ) | | ! tok - > astOperand2 ( ) )
return false ;
const ValueFlow : : Value * v1 = tok - > astOperand1 ( ) - > getValue ( 0 ) ;
const ValueFlow : : Value * v2 = tok - > astOperand2 ( ) - > getValue ( 0 ) ;
if ( Token : : simpleMatch ( tok , " >= " ) & & v2 & & v2 - > isKnown ( ) ) {
* zeroValue = v2 ;
* nonZeroExpr = tok - > astOperand1 ( ) ;
} else if ( Token : : simpleMatch ( tok , " <= " ) & & v1 & & v1 - > isKnown ( ) ) {
* zeroValue = v1 ;
* nonZeroExpr = tok - > astOperand2 ( ) ;
} else {
return false ;
}
const ValueType * vt = ( * nonZeroExpr ) - > valueType ( ) ;
return vt & & ( vt - > pointer | | vt - > sign = = ValueType : : UNSIGNED ) ;
}
Use valueflow in unsigned less than zero checker (#1630)
The unsigned less than zero checker looked for patterns like "<= 0".
Switching to use valueflow improves the checker in a few aspects.
First, it removes false positives where instead of 0, the code is using
0L, 0U, etc. Instead of having to hard code the different variants of 0,
valueflow handles this automatically. This fixes FPs on the form
uint32_t value = 0xFUL;
void f() {
if (value < 0u)
{
value = 0u;
}
}
where 0u was previously not recognized by the checker. This fixes #8836.
Morover, it makes it possible to handle templates properly. In commit
fa076598ade8a751ad85d5375bc976439e32c117, all warnings inside templates
were made inconclusive, since the checker had no idea if "0" came from
a template parameter or not.
This makes it possible to not warn for the following case which was
reported as a FP in #3233
template<int n> void foo(unsigned int x) {
if (x <= n);
}
foo<0>();
but give a warning for the following case
template<int n> void foo(unsigned int x) {
if (x <= 0);
}
Previously, both these cases gave inconclusive warnings.
Finally, it makes it possible to give warnings for the following code:
void f(unsigned x) {
int y = 0;
if (x <= y) {}
}
Also, previously, the checker for unsigned variables larger than 0, the
checker used the string of the astoperand. This meant that for code like
the following:
void f(unsigned x, unsigned y) {
if (x -y >= 0) {}
}
cppcheck would output
[unsigned-expression-positive.c] (style) Unsigned variable '-' can't be negative so it is unnecessary to test it.
using expressionString() instead gives a better error message
[unsigned-expression-positive.c] (style) Unsigned expression 'x-z' can't be negative so it is unnecessary to test it.
2019-01-31 09:30:29 +01:00
void CheckOther : : unsignedLessThanZeroError ( const Token * tok , const ValueFlow : : Value * v , const std : : string & varname )
{
reportError ( getErrorPath ( tok , v , " Unsigned less than zero " ) , Severity : : style , " unsignedLessThanZero " ,
" $symbol: " + varname + " \n "
" Checking if unsigned expression '$symbol' is less than zero. \n "
" The unsigned expression '$symbol' will never be negative so it "
2021-02-24 22:00:06 +01:00
" is either pointless or an error to check if it is. " , CWE570 , Certainty : : normal ) ;
2011-08-07 01:23:09 +02:00
}
Use valueflow in unsigned less than zero checker (#1630)
The unsigned less than zero checker looked for patterns like "<= 0".
Switching to use valueflow improves the checker in a few aspects.
First, it removes false positives where instead of 0, the code is using
0L, 0U, etc. Instead of having to hard code the different variants of 0,
valueflow handles this automatically. This fixes FPs on the form
uint32_t value = 0xFUL;
void f() {
if (value < 0u)
{
value = 0u;
}
}
where 0u was previously not recognized by the checker. This fixes #8836.
Morover, it makes it possible to handle templates properly. In commit
fa076598ade8a751ad85d5375bc976439e32c117, all warnings inside templates
were made inconclusive, since the checker had no idea if "0" came from
a template parameter or not.
This makes it possible to not warn for the following case which was
reported as a FP in #3233
template<int n> void foo(unsigned int x) {
if (x <= n);
}
foo<0>();
but give a warning for the following case
template<int n> void foo(unsigned int x) {
if (x <= 0);
}
Previously, both these cases gave inconclusive warnings.
Finally, it makes it possible to give warnings for the following code:
void f(unsigned x) {
int y = 0;
if (x <= y) {}
}
Also, previously, the checker for unsigned variables larger than 0, the
checker used the string of the astoperand. This meant that for code like
the following:
void f(unsigned x, unsigned y) {
if (x -y >= 0) {}
}
cppcheck would output
[unsigned-expression-positive.c] (style) Unsigned variable '-' can't be negative so it is unnecessary to test it.
using expressionString() instead gives a better error message
[unsigned-expression-positive.c] (style) Unsigned expression 'x-z' can't be negative so it is unnecessary to test it.
2019-01-31 09:30:29 +01:00
void CheckOther : : pointerLessThanZeroError ( const Token * tok , const ValueFlow : : Value * v )
2012-08-21 12:28:02 +02:00
{
Use valueflow in unsigned less than zero checker (#1630)
The unsigned less than zero checker looked for patterns like "<= 0".
Switching to use valueflow improves the checker in a few aspects.
First, it removes false positives where instead of 0, the code is using
0L, 0U, etc. Instead of having to hard code the different variants of 0,
valueflow handles this automatically. This fixes FPs on the form
uint32_t value = 0xFUL;
void f() {
if (value < 0u)
{
value = 0u;
}
}
where 0u was previously not recognized by the checker. This fixes #8836.
Morover, it makes it possible to handle templates properly. In commit
fa076598ade8a751ad85d5375bc976439e32c117, all warnings inside templates
were made inconclusive, since the checker had no idea if "0" came from
a template parameter or not.
This makes it possible to not warn for the following case which was
reported as a FP in #3233
template<int n> void foo(unsigned int x) {
if (x <= n);
}
foo<0>();
but give a warning for the following case
template<int n> void foo(unsigned int x) {
if (x <= 0);
}
Previously, both these cases gave inconclusive warnings.
Finally, it makes it possible to give warnings for the following code:
void f(unsigned x) {
int y = 0;
if (x <= y) {}
}
Also, previously, the checker for unsigned variables larger than 0, the
checker used the string of the astoperand. This meant that for code like
the following:
void f(unsigned x, unsigned y) {
if (x -y >= 0) {}
}
cppcheck would output
[unsigned-expression-positive.c] (style) Unsigned variable '-' can't be negative so it is unnecessary to test it.
using expressionString() instead gives a better error message
[unsigned-expression-positive.c] (style) Unsigned expression 'x-z' can't be negative so it is unnecessary to test it.
2019-01-31 09:30:29 +01:00
reportError ( getErrorPath ( tok , v , " Pointer less than zero " ) , Severity : : style , " pointerLessThanZero " ,
2021-02-24 22:00:06 +01:00
" A pointer can not be negative so it is either pointless or an error to check if it is. " , CWE570 , Certainty : : normal ) ;
2012-08-21 12:28:02 +02:00
}
Use valueflow in unsigned less than zero checker (#1630)
The unsigned less than zero checker looked for patterns like "<= 0".
Switching to use valueflow improves the checker in a few aspects.
First, it removes false positives where instead of 0, the code is using
0L, 0U, etc. Instead of having to hard code the different variants of 0,
valueflow handles this automatically. This fixes FPs on the form
uint32_t value = 0xFUL;
void f() {
if (value < 0u)
{
value = 0u;
}
}
where 0u was previously not recognized by the checker. This fixes #8836.
Morover, it makes it possible to handle templates properly. In commit
fa076598ade8a751ad85d5375bc976439e32c117, all warnings inside templates
were made inconclusive, since the checker had no idea if "0" came from
a template parameter or not.
This makes it possible to not warn for the following case which was
reported as a FP in #3233
template<int n> void foo(unsigned int x) {
if (x <= n);
}
foo<0>();
but give a warning for the following case
template<int n> void foo(unsigned int x) {
if (x <= 0);
}
Previously, both these cases gave inconclusive warnings.
Finally, it makes it possible to give warnings for the following code:
void f(unsigned x) {
int y = 0;
if (x <= y) {}
}
Also, previously, the checker for unsigned variables larger than 0, the
checker used the string of the astoperand. This meant that for code like
the following:
void f(unsigned x, unsigned y) {
if (x -y >= 0) {}
}
cppcheck would output
[unsigned-expression-positive.c] (style) Unsigned variable '-' can't be negative so it is unnecessary to test it.
using expressionString() instead gives a better error message
[unsigned-expression-positive.c] (style) Unsigned expression 'x-z' can't be negative so it is unnecessary to test it.
2019-01-31 09:30:29 +01:00
void CheckOther : : unsignedPositiveError ( const Token * tok , const ValueFlow : : Value * v , const std : : string & varname )
2011-11-06 18:24:37 +01:00
{
Use valueflow in unsigned less than zero checker (#1630)
The unsigned less than zero checker looked for patterns like "<= 0".
Switching to use valueflow improves the checker in a few aspects.
First, it removes false positives where instead of 0, the code is using
0L, 0U, etc. Instead of having to hard code the different variants of 0,
valueflow handles this automatically. This fixes FPs on the form
uint32_t value = 0xFUL;
void f() {
if (value < 0u)
{
value = 0u;
}
}
where 0u was previously not recognized by the checker. This fixes #8836.
Morover, it makes it possible to handle templates properly. In commit
fa076598ade8a751ad85d5375bc976439e32c117, all warnings inside templates
were made inconclusive, since the checker had no idea if "0" came from
a template parameter or not.
This makes it possible to not warn for the following case which was
reported as a FP in #3233
template<int n> void foo(unsigned int x) {
if (x <= n);
}
foo<0>();
but give a warning for the following case
template<int n> void foo(unsigned int x) {
if (x <= 0);
}
Previously, both these cases gave inconclusive warnings.
Finally, it makes it possible to give warnings for the following code:
void f(unsigned x) {
int y = 0;
if (x <= y) {}
}
Also, previously, the checker for unsigned variables larger than 0, the
checker used the string of the astoperand. This meant that for code like
the following:
void f(unsigned x, unsigned y) {
if (x -y >= 0) {}
}
cppcheck would output
[unsigned-expression-positive.c] (style) Unsigned variable '-' can't be negative so it is unnecessary to test it.
using expressionString() instead gives a better error message
[unsigned-expression-positive.c] (style) Unsigned expression 'x-z' can't be negative so it is unnecessary to test it.
2019-01-31 09:30:29 +01:00
reportError ( getErrorPath ( tok , v , " Unsigned positive " ) , Severity : : style , " unsignedPositive " ,
" $symbol: " + varname + " \n "
2021-02-24 22:00:06 +01:00
" Unsigned expression '$symbol' can't be negative so it is unnecessary to test it. " , CWE570 , Certainty : : normal ) ;
2011-08-07 01:23:09 +02:00
}
2012-07-22 09:17:00 +02:00
Use valueflow in unsigned less than zero checker (#1630)
The unsigned less than zero checker looked for patterns like "<= 0".
Switching to use valueflow improves the checker in a few aspects.
First, it removes false positives where instead of 0, the code is using
0L, 0U, etc. Instead of having to hard code the different variants of 0,
valueflow handles this automatically. This fixes FPs on the form
uint32_t value = 0xFUL;
void f() {
if (value < 0u)
{
value = 0u;
}
}
where 0u was previously not recognized by the checker. This fixes #8836.
Morover, it makes it possible to handle templates properly. In commit
fa076598ade8a751ad85d5375bc976439e32c117, all warnings inside templates
were made inconclusive, since the checker had no idea if "0" came from
a template parameter or not.
This makes it possible to not warn for the following case which was
reported as a FP in #3233
template<int n> void foo(unsigned int x) {
if (x <= n);
}
foo<0>();
but give a warning for the following case
template<int n> void foo(unsigned int x) {
if (x <= 0);
}
Previously, both these cases gave inconclusive warnings.
Finally, it makes it possible to give warnings for the following code:
void f(unsigned x) {
int y = 0;
if (x <= y) {}
}
Also, previously, the checker for unsigned variables larger than 0, the
checker used the string of the astoperand. This meant that for code like
the following:
void f(unsigned x, unsigned y) {
if (x -y >= 0) {}
}
cppcheck would output
[unsigned-expression-positive.c] (style) Unsigned variable '-' can't be negative so it is unnecessary to test it.
using expressionString() instead gives a better error message
[unsigned-expression-positive.c] (style) Unsigned expression 'x-z' can't be negative so it is unnecessary to test it.
2019-01-31 09:30:29 +01:00
void CheckOther : : pointerPositiveError ( const Token * tok , const ValueFlow : : Value * v )
2012-08-21 12:28:02 +02:00
{
Use valueflow in unsigned less than zero checker (#1630)
The unsigned less than zero checker looked for patterns like "<= 0".
Switching to use valueflow improves the checker in a few aspects.
First, it removes false positives where instead of 0, the code is using
0L, 0U, etc. Instead of having to hard code the different variants of 0,
valueflow handles this automatically. This fixes FPs on the form
uint32_t value = 0xFUL;
void f() {
if (value < 0u)
{
value = 0u;
}
}
where 0u was previously not recognized by the checker. This fixes #8836.
Morover, it makes it possible to handle templates properly. In commit
fa076598ade8a751ad85d5375bc976439e32c117, all warnings inside templates
were made inconclusive, since the checker had no idea if "0" came from
a template parameter or not.
This makes it possible to not warn for the following case which was
reported as a FP in #3233
template<int n> void foo(unsigned int x) {
if (x <= n);
}
foo<0>();
but give a warning for the following case
template<int n> void foo(unsigned int x) {
if (x <= 0);
}
Previously, both these cases gave inconclusive warnings.
Finally, it makes it possible to give warnings for the following code:
void f(unsigned x) {
int y = 0;
if (x <= y) {}
}
Also, previously, the checker for unsigned variables larger than 0, the
checker used the string of the astoperand. This meant that for code like
the following:
void f(unsigned x, unsigned y) {
if (x -y >= 0) {}
}
cppcheck would output
[unsigned-expression-positive.c] (style) Unsigned variable '-' can't be negative so it is unnecessary to test it.
using expressionString() instead gives a better error message
[unsigned-expression-positive.c] (style) Unsigned expression 'x-z' can't be negative so it is unnecessary to test it.
2019-01-31 09:30:29 +01:00
reportError ( getErrorPath ( tok , v , " Pointer positive " ) , Severity : : style , " pointerPositive " ,
2021-02-24 22:00:06 +01:00
" A pointer can not be negative so it is either pointless or an error to check if it is not. " , CWE570 , Certainty : : normal ) ;
2012-08-21 12:28:02 +02:00
}
2013-12-14 08:46:18 +01:00
/* check if a constructor in given class scope takes a reference */
static bool constructorTakesReference ( const Scope * const classScope )
{
2018-07-14 12:28:57 +02:00
for ( const Function & constructor : classScope - > functionList ) {
if ( constructor . isConstructor ( ) ) {
2019-07-16 09:10:10 +02:00
for ( int argnr = 0U ; argnr < constructor . argCount ( ) ; argnr + + ) {
2014-05-23 18:11:44 +02:00
const Variable * const argVar = constructor . getArgumentVar ( argnr ) ;
if ( argVar & & argVar - > isReference ( ) ) {
2013-12-14 08:46:18 +01:00
return true ;
2014-05-23 18:11:44 +02:00
}
2013-12-14 08:46:18 +01:00
}
}
}
return false ;
}
2014-08-27 09:42:09 +02:00
//---------------------------------------------------------------------------
// This check rule works for checking the "const A a = getA()" usage when getA() returns "const A &" or "A &".
// In most scenarios, "const A & a = getA()" will be more efficient.
//---------------------------------------------------------------------------
2012-07-22 09:17:00 +02:00
void CheckOther : : checkRedundantCopy ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : performance ) | | mTokenizer - > isC ( ) | | ! mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) )
2012-07-22 09:17:00 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2012-07-22 09:17:00 +02:00
2018-04-28 09:38:33 +02:00
for ( const Variable * var : symbolDatabase - > variableList ( ) ) {
2014-03-27 11:15:17 +01:00
if ( ! var | | var - > isReference ( ) | | ! var - > isConst ( ) | | var - > isPointer ( ) | | ( ! var - > type ( ) & & ! var - > isStlType ( ) ) ) // bailout if var is of standard type, if it is a pointer or non-const
2012-08-24 00:03:22 +02:00
continue ;
2013-03-05 15:53:09 +01:00
const Token * startTok = var - > nameToken ( ) ;
2015-01-31 10:50:39 +01:00
if ( startTok - > strAt ( 1 ) = = " = " ) // %type% %name% = ... ;
2013-12-14 08:46:18 +01:00
;
else if ( startTok - > strAt ( 1 ) = = " ( " & & var - > isClass ( ) & & var - > typeScope ( ) ) {
// Object is instantiated. Warn if constructor takes arguments by value.
if ( constructorTakesReference ( var - > typeScope ( ) ) )
continue ;
} else
2012-08-24 00:03:22 +02:00
continue ;
2013-03-05 15:53:09 +01:00
2014-05-18 12:52:15 +02:00
const Token * tok = startTok - > next ( ) - > astOperand2 ( ) ;
2014-05-29 02:58:18 +02:00
if ( ! tok )
continue ;
2015-01-31 10:50:39 +01:00
if ( ! Token : : Match ( tok - > previous ( ) , " %name% ( " ) )
2013-03-05 15:53:09 +01:00
continue ;
2014-05-18 12:52:15 +02:00
if ( ! Token : : Match ( tok - > link ( ) , " ) )| ; " ) ) // bailout for usage like "const A a = getA()+3"
2013-03-05 15:53:09 +01:00
continue ;
2014-05-18 12:52:15 +02:00
const Function * func = tok - > previous ( ) - > function ( ) ;
2013-03-05 15:53:09 +01:00
if ( func & & func - > tokenDef - > strAt ( - 1 ) = = " & " ) {
redundantCopyError ( startTok , startTok - > str ( ) ) ;
2012-08-24 00:03:22 +02:00
}
}
}
void CheckOther : : redundantCopyError ( const Token * tok , const std : : string & varname )
2012-07-22 09:17:00 +02:00
{
2013-03-05 15:53:09 +01:00
reportError ( tok , Severity : : performance , " redundantCopyLocalConst " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + varname + " \n "
" Use const reference for '$symbol' to avoid unnecessary data copying. \n "
" The const variable '$symbol' is assigned a copy of the data. You can avoid "
" the unnecessary data copying by converting '$symbol' to const reference. " ,
2016-04-29 19:01:37 +02:00
CWE398 ,
2021-02-24 22:00:06 +01:00
Certainty : : inconclusive ) ; // since #5618 that check became inconclusive
2012-08-24 00:03:22 +02:00
}
2012-08-22 15:44:20 +02:00
2012-08-24 00:03:22 +02:00
//---------------------------------------------------------------------------
// Checking for shift by negative values
//---------------------------------------------------------------------------
2012-08-22 15:44:20 +02:00
2015-12-14 10:55:23 +01:00
static bool isNegative ( const Token * tok , const Settings * settings )
{
return tok - > valueType ( ) & & tok - > valueType ( ) - > sign = = ValueType : : SIGNED & & tok - > getValueLE ( - 1LL , settings ) ;
}
2012-08-24 00:03:22 +02:00
void CheckOther : : checkNegativeBitwiseShift ( )
{
2021-02-24 22:00:06 +01:00
const bool portability = mSettings - > severity . isEnabled ( Severity : : portability ) ;
2016-12-22 09:40:19 +01:00
2018-06-16 16:10:28 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
2016-02-05 20:43:06 +01:00
if ( ! tok - > astOperand1 ( ) | | ! tok - > astOperand2 ( ) )
2015-11-29 16:28:55 +01:00
continue ;
2014-03-29 13:01:30 +01:00
2016-02-05 20:43:06 +01:00
if ( ! Token : : Match ( tok , " <<|>>|<<=|>>= " ) )
2015-11-29 16:28:55 +01:00
continue ;
2014-03-29 13:01:30 +01:00
2015-11-29 16:28:55 +01:00
// don't warn if lhs is a class. this is an overloaded operator then
2018-06-16 16:10:28 +02:00
if ( mTokenizer - > isCPP ( ) ) {
2016-12-22 09:40:19 +01:00
const ValueType * lhsType = tok - > astOperand1 ( ) - > valueType ( ) ;
if ( ! lhsType | | ! lhsType - > isIntegral ( ) )
2015-11-29 16:28:55 +01:00
continue ;
}
2015-01-05 10:01:04 +01:00
2015-11-29 16:28:55 +01:00
// bailout if operation is protected by ?:
bool ternary = false ;
for ( const Token * parent = tok ; parent ; parent = parent - > astParent ( ) ) {
if ( Token : : Match ( parent , " ?|: " ) ) {
ternary = true ;
break ;
}
2012-08-22 15:44:20 +02:00
}
2015-11-29 16:28:55 +01:00
if ( ternary )
continue ;
// Get negative rhs value. preferably a value which doesn't have 'condition'.
2018-06-16 16:10:28 +02:00
if ( portability & & isNegative ( tok - > astOperand1 ( ) , mSettings ) )
2015-11-29 16:28:55 +01:00
negativeBitwiseShiftError ( tok , 1 ) ;
2018-06-16 16:10:28 +02:00
else if ( isNegative ( tok - > astOperand2 ( ) , mSettings ) )
2015-11-29 16:28:55 +01:00
negativeBitwiseShiftError ( tok , 2 ) ;
2012-08-22 15:44:20 +02:00
}
}
2012-08-24 00:03:22 +02:00
2015-11-29 16:28:55 +01:00
void CheckOther : : negativeBitwiseShiftError ( const Token * tok , int op )
2012-08-22 15:44:20 +02:00
{
2016-12-22 09:40:19 +01:00
if ( op = = 1 )
// LHS - this is used by intention in various software, if it
// is used often in a project and works as expected then this is
// a portability issue
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : portability , " shiftNegativeLHS " , " Shifting a negative value is technically undefined behaviour " , CWE758 , Certainty : : normal ) ;
2015-11-29 16:28:55 +01:00
else // RHS
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : error , " shiftNegative " , " Shifting by a negative value is undefined behaviour " , CWE758 , Certainty : : normal ) ;
2012-08-22 15:44:20 +02:00
}
2012-08-24 11:28:50 +02:00
//---------------------------------------------------------------------------
// Check for incompletely filled buffers.
//---------------------------------------------------------------------------
void CheckOther : : checkIncompleteArrayFill ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) )
2015-04-02 09:26:19 +02:00
return ;
2021-02-24 22:00:06 +01:00
const bool printWarning = mSettings - > severity . isEnabled ( Severity : : warning ) ;
const bool printPortability = mSettings - > severity . isEnabled ( Severity : : portability ) ;
2015-04-10 14:18:52 +02:00
if ( ! printPortability & & ! printWarning )
2012-08-24 11:28:50 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2012-08-24 11:28:50 +02:00
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2012-11-16 06:50:49 +01:00
if ( Token : : Match ( tok , " memset|memcpy|memmove ( %var% , " ) & & Token : : Match ( tok - > linkAt ( 1 ) - > tokAt ( - 2 ) , " , %num% ) " ) ) {
2013-02-06 06:39:58 +01:00
const Variable * var = tok - > tokAt ( 2 ) - > variable ( ) ;
2012-11-16 06:50:49 +01:00
if ( ! var | | ! var - > isArray ( ) | | var - > dimensions ( ) . empty ( ) | | ! var - > dimension ( 0 ) )
continue ;
2012-08-24 11:28:50 +02:00
2012-11-16 06:50:49 +01:00
if ( MathLib : : toLongNumber ( tok - > linkAt ( 1 ) - > strAt ( - 1 ) ) = = var - > dimension ( 0 ) ) {
2019-07-16 09:10:10 +02:00
int size = mTokenizer - > sizeOfType ( var - > typeStartToken ( ) ) ;
2018-06-23 16:49:26 +02:00
if ( size = = 0 & & var - > valueType ( ) - > pointer )
2018-06-16 16:10:28 +02:00
size = mSettings - > sizeof_pointer ;
2021-02-24 21:48:04 +01:00
else if ( size = = 0 & & var - > type ( ) )
size = estimateSize ( var - > type ( ) , mSettings , symbolDatabase ) ;
2013-04-10 18:25:50 +02:00
if ( ( size ! = 1 & & size ! = 100 & & size ! = 0 ) | | var - > isPointer ( ) ) {
2015-04-10 14:18:52 +02:00
if ( printWarning )
2013-03-03 11:41:59 +01:00
incompleteArrayFillError ( tok , var - > name ( ) , tok - > str ( ) , false ) ;
2018-06-23 16:52:40 +02:00
} else if ( var - > valueType ( ) - > type = = ValueType : : Type : : BOOL & & printPortability ) // sizeof(bool) is not 1 on all platforms
2012-11-16 06:50:49 +01:00
incompleteArrayFillError ( tok , var - > name ( ) , tok - > str ( ) , true ) ;
}
2012-08-24 11:28:50 +02:00
}
}
}
}
void CheckOther : : incompleteArrayFillError ( const Token * tok , const std : : string & buffer , const std : : string & function , bool boolean )
{
if ( boolean )
reportError ( tok , Severity : : portability , " incompleteArrayFill " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + buffer + " \n "
" $symbol: " + function + " \n "
2012-08-24 11:28:50 +02:00
" Array ' " + buffer + " ' might be filled incompletely. Did you forget to multiply the size given to ' " + function + " ()' with 'sizeof(* " + buffer + " )'? \n "
2021-02-24 22:00:06 +01:00
" The array ' " + buffer + " ' is filled incompletely. The function ' " + function + " ()' needs the size given in bytes, but the type 'bool' is larger than 1 on some platforms. Did you forget to multiply the size with 'sizeof(* " + buffer + " )'? " , CWE131 , Certainty : : inconclusive ) ;
2012-08-24 11:28:50 +02:00
else
reportError ( tok , Severity : : warning , " incompleteArrayFill " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + buffer + " \n "
" $symbol: " + function + " \n "
2012-08-24 11:28:50 +02:00
" Array ' " + buffer + " ' is filled incompletely. Did you forget to multiply the size given to ' " + function + " ()' with 'sizeof(* " + buffer + " )'? \n "
2021-02-24 22:00:06 +01:00
" The array ' " + buffer + " ' is filled incompletely. The function ' " + function + " ()' needs the size given in bytes, but an element of the given array is larger than one byte. Did you forget to multiply the size with 'sizeof(* " + buffer + " )'? " , CWE131 , Certainty : : inconclusive ) ;
2012-08-24 11:28:50 +02:00
}
2012-09-05 13:48:00 +02:00
2014-08-27 09:42:09 +02:00
//---------------------------------------------------------------------------
// Detect NULL being passed to variadic function.
//---------------------------------------------------------------------------
2013-01-13 12:02:10 +01:00
void CheckOther : : checkVarFuncNullUB ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : portability ) )
2013-01-13 12:02:10 +01:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2013-01-13 12:02:10 +01:00
// Is NULL passed to a function?
if ( Token : : Match ( tok , " [(,] NULL [,)] " ) ) {
// Locate function name in this function call.
const Token * ftok = tok ;
2019-07-16 09:10:10 +02:00
int argnr = 1 ;
2013-01-13 12:02:10 +01:00
while ( ftok & & ftok - > str ( ) ! = " ( " ) {
if ( ftok - > str ( ) = = " ) " )
ftok = ftok - > link ( ) ;
2013-01-14 06:44:52 +01:00
else if ( ftok - > str ( ) = = " , " )
+ + argnr ;
2013-01-13 12:02:10 +01:00
ftok = ftok - > previous ( ) ;
}
2014-02-15 08:46:28 +01:00
ftok = ftok ? ftok - > previous ( ) : nullptr ;
2013-01-13 12:02:10 +01:00
if ( ftok & & ftok - > isName ( ) ) {
// If this is a variadic function then report error
2013-01-31 06:41:18 +01:00
const Function * f = ftok - > function ( ) ;
2013-01-14 06:44:52 +01:00
if ( f & & f - > argCount ( ) < = argnr ) {
2013-01-13 12:02:10 +01:00
const Token * tok2 = f - > argDef ;
2014-02-15 08:46:28 +01:00
tok2 = tok2 ? tok2 - > link ( ) : nullptr ; // goto ')'
2019-09-04 08:07:30 +02:00
if ( tok2 & & Token : : simpleMatch ( tok2 - > tokAt ( - 1 ) , " ... " ) )
2013-01-13 12:02:10 +01:00
varFuncNullUBError ( tok ) ;
}
}
}
}
}
}
void CheckOther : : varFuncNullUBError ( const Token * tok )
{
reportError ( tok ,
Severity : : portability ,
" varFuncNullUB " ,
2013-01-14 18:11:16 +01:00
" Passing NULL after the last typed argument to a variadic function leads to undefined behaviour. \n "
" Passing NULL after the last typed argument to a variadic function leads to undefined behaviour. \n "
" The C99 standard, in section 7.15.1.1, states that if the type used by va_arg() is not compatible with the type of the actual next argument (as promoted according to the default argument promotions), the behavior is undefined. \n "
" The value of the NULL macro is an implementation-defined null pointer constant (7.17), which can be any integer constant expression with the value 0, or such an expression casted to (void*) (6.3.2.3). This includes values like 0, 0L, or even 0LL. \n "
" In practice on common architectures, this will cause real crashes if sizeof(int) != sizeof(void*), and NULL is defined to 0 or any other null pointer constant that promotes to int. \n "
" To reproduce you might be able to use this little code example on 64bit platforms. If the output includes \" ERROR \" , the sentinel had only 4 out of 8 bytes initialized to zero and was not detected as the final argument to stop argument processing via va_arg(). Changing the 0 to (void*)0 or 0L will make the \" ERROR \" output go away. \n "
2013-01-13 12:02:10 +01:00
" #include <stdarg.h> \n "
" #include <stdio.h> \n "
" \n "
" void f(char *s, ...) { \n "
" va_list ap; \n "
" va_start(ap,s); \n "
" for (;;) { \n "
" char *p = va_arg(ap,char*); \n "
2014-10-16 09:08:39 +02:00
" printf( \" %018p, %s \\ n \" , p, (long)p & 255 ? p : \" \" ); \n "
2013-01-13 12:02:10 +01:00
" if(!p) break; \n "
" } \n "
" va_end(ap); \n "
" } \n "
" \n "
" void g() { \n "
" char *s2 = \" x \" ; \n "
2013-01-14 18:11:16 +01:00
" char *s3 = \" ERROR \" ; \n "
2013-01-13 12:02:10 +01:00
" \n "
2013-01-14 18:11:16 +01:00
" // changing 0 to 0L for the 7th argument (which is intended to act as sentinel) makes the error go away on x86_64 \n "
2013-01-13 12:02:10 +01:00
" f( \" first \" , s2, s2, s2, s2, s2, 0, s3, (char*)0); \n "
" } \n "
" \n "
" void h() { \n "
" int i; \n "
" volatile unsigned char a[1000]; \n "
" for (i = 0; i<sizeof(a); i++) \n "
" a[i] = -1; \n "
" } \n "
" \n "
" int main() { \n "
" h(); \n "
" g(); \n "
" return 0; \n "
2021-02-24 22:00:06 +01:00
" } " , CWE475 , Certainty : : normal ) ;
2013-01-13 12:02:10 +01:00
}
2014-09-27 21:31:04 +02:00
2015-01-17 14:33:14 +01:00
void CheckOther : : checkRedundantPointerOp ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2015-01-17 14:33:14 +01:00
return ;
2018-06-16 16:10:28 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
2021-05-22 14:18:29 +02:00
if ( tok - > isExpandedMacro ( ) & & tok - > str ( ) = = " ( " )
tok = tok - > link ( ) ;
2015-01-17 14:33:14 +01:00
2021-05-22 14:18:29 +02:00
if ( ! tok - > isUnaryOp ( " & " ) | | ! tok - > astOperand1 ( ) - > isUnaryOp ( " * " ) )
2020-09-29 18:27:07 +02:00
continue ;
2018-07-14 13:01:24 +02:00
// variable
const Token * varTok = tok - > astOperand1 ( ) - > astOperand1 ( ) ;
if ( ! varTok | | varTok - > isExpandedMacro ( ) )
continue ;
2015-01-17 14:33:14 +01:00
2018-07-14 13:01:24 +02:00
const Variable * var = varTok - > variable ( ) ;
if ( ! var | | ! var - > isPointer ( ) )
continue ;
2015-01-17 14:33:14 +01:00
2018-07-14 13:01:24 +02:00
redundantPointerOpError ( tok , var - > name ( ) , false ) ;
2015-01-17 14:33:14 +01:00
}
}
void CheckOther : : redundantPointerOpError ( const Token * tok , const std : : string & varname , bool inconclusive )
{
reportError ( tok , Severity : : style , " redundantPointerOp " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + varname + " \n "
2021-02-24 22:00:06 +01:00
" Redundant pointer operation on '$symbol' - it's already a pointer. " , CWE398 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2015-01-17 14:33:14 +01:00
}
2015-01-27 17:55:18 +01:00
2015-08-05 11:20:28 +02:00
void CheckOther : : checkInterlockedDecrement ( )
{
2018-06-16 16:10:28 +02:00
if ( ! mSettings - > isWindowsPlatform ( ) ) {
2015-08-05 11:20:28 +02:00
return ;
}
2018-06-16 16:10:28 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
2015-09-07 17:35:15 +02:00
if ( tok - > isName ( ) & & Token : : Match ( tok , " InterlockedDecrement ( & %name% ) ; if ( %name%|!|0 " ) ) {
2015-08-05 11:20:28 +02:00
const Token * interlockedVarTok = tok - > tokAt ( 3 ) ;
const Token * checkStartTok = interlockedVarTok - > tokAt ( 5 ) ;
if ( ( Token : : Match ( checkStartTok , " 0 %comp% %name% ) " ) & & checkStartTok - > strAt ( 2 ) = = interlockedVarTok - > str ( ) ) | |
( Token : : Match ( checkStartTok , " ! %name% ) " ) & & checkStartTok - > strAt ( 1 ) = = interlockedVarTok - > str ( ) ) | |
( Token : : Match ( checkStartTok , " %name% ) " ) & & checkStartTok - > str ( ) = = interlockedVarTok - > str ( ) ) | |
( Token : : Match ( checkStartTok , " %name% %comp% 0 ) " ) & & checkStartTok - > str ( ) = = interlockedVarTok - > str ( ) ) ) {
raceAfterInterlockedDecrementError ( checkStartTok ) ;
}
2015-12-02 08:58:57 +01:00
} else if ( Token : : Match ( tok , " if ( ::| InterlockedDecrement ( & %name% " ) ) {
const Token * condEnd = tok - > next ( ) - > link ( ) ;
const Token * funcTok = tok - > tokAt ( 2 ) ;
const Token * firstAccessTok = funcTok - > str ( ) = = " :: " ? funcTok - > tokAt ( 4 ) : funcTok - > tokAt ( 3 ) ;
if ( condEnd & & condEnd - > next ( ) & & condEnd - > next ( ) - > link ( ) ) {
const Token * ifEndTok = condEnd - > next ( ) - > link ( ) ;
if ( Token : : Match ( ifEndTok , " } return %name% " ) ) {
const Token * secondAccessTok = ifEndTok - > tokAt ( 2 ) ;
if ( secondAccessTok - > str ( ) = = firstAccessTok - > str ( ) ) {
raceAfterInterlockedDecrementError ( secondAccessTok ) ;
}
} else if ( Token : : Match ( ifEndTok , " } else { return %name% " ) ) {
const Token * secondAccessTok = ifEndTok - > tokAt ( 4 ) ;
if ( secondAccessTok - > str ( ) = = firstAccessTok - > str ( ) ) {
2015-12-02 23:32:50 +01:00
raceAfterInterlockedDecrementError ( secondAccessTok ) ;
2015-12-02 08:58:57 +01:00
}
}
}
2015-08-05 11:20:28 +02:00
}
}
}
void CheckOther : : raceAfterInterlockedDecrementError ( const Token * tok )
{
reportError ( tok , Severity : : error , " raceAfterInterlockedDecrement " ,
2021-02-24 22:00:06 +01:00
" Race condition: non-interlocked access after InterlockedDecrement(). Use InterlockedDecrement() return value instead. " , CWE362 , Certainty : : normal ) ;
2015-08-05 11:20:28 +02:00
}
2015-08-30 16:45:47 +02:00
void CheckOther : : checkUnusedLabel ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) & & ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2015-08-30 16:45:47 +02:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2020-06-30 18:26:24 +02:00
const bool hasIfdef = mTokenizer - > hasIfdef ( scope - > bodyStart , scope - > bodyEnd ) ;
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scope - > bodyStart ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2015-08-30 16:45:47 +02:00
if ( ! tok - > scope ( ) - > isExecutable ( ) )
2018-04-27 22:36:30 +02:00
tok = tok - > scope ( ) - > bodyEnd ;
2015-08-30 16:45:47 +02:00
if ( Token : : Match ( tok , " {|}|; %name% : " ) & & tok - > strAt ( 1 ) ! = " default " ) {
2020-05-26 20:13:56 +02:00
const std : : string tmp ( " goto " + tok - > strAt ( 1 ) ) ;
if ( ! Token : : findsimplematch ( scope - > bodyStart - > next ( ) , tmp . c_str ( ) , tmp . size ( ) , scope - > bodyEnd - > previous ( ) ) )
2020-06-30 18:26:24 +02:00
unusedLabelError ( tok - > next ( ) , tok - > next ( ) - > scope ( ) - > type = = Scope : : eSwitch , hasIfdef ) ;
2015-08-30 16:45:47 +02:00
}
}
}
}
2020-06-30 18:26:24 +02:00
void CheckOther : : unusedLabelError ( const Token * tok , bool inSwitch , bool hasIfdef )
2015-08-30 16:45:47 +02:00
{
2021-02-24 22:00:06 +01:00
if ( tok & & ! mSettings - > severity . isEnabled ( inSwitch ? Severity : : warning : Severity : : style ) )
2020-06-30 18:26:24 +02:00
return ;
std : : string id = " unusedLabel " ;
if ( inSwitch )
id + = " Switch " ;
if ( hasIfdef )
id + = " Configuration " ;
std : : string msg = " $symbol: " + ( tok ? tok - > str ( ) : emptyString ) + " \n Label '$symbol' is not used. " ;
if ( hasIfdef )
msg + = " There is #if in function body so the label might be used in code that is removed by the preprocessor. " ;
if ( inSwitch )
msg + = " Should this be a 'case' of the enclosing switch()? " ;
reportError ( tok ,
inSwitch ? Severity : : warning : Severity : : style ,
id ,
msg ,
CWE398 ,
2021-02-24 22:00:06 +01:00
Certainty : : normal ) ;
2015-08-30 16:45:47 +02:00
}
2015-12-24 09:13:20 +01:00
void CheckOther : : checkEvaluationOrder ( )
{
2015-12-25 18:45:46 +01:00
// This checker is not written according to C++11 sequencing rules
2018-06-16 16:10:28 +02:00
if ( mTokenizer - > isCPP ( ) & & mSettings - > standards . cpp > = Standards : : CPP11 )
2015-12-25 18:45:46 +01:00
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * functionScope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
for ( const Token * tok = functionScope - > bodyStart ; tok ! = functionScope - > bodyEnd ; tok = tok - > next ( ) ) {
2015-12-24 09:13:20 +01:00
if ( ! Token : : Match ( tok , " ++|-- " ) & & ! tok - > isAssignmentOp ( ) )
continue ;
if ( ! tok - > astOperand1 ( ) )
continue ;
2015-12-25 18:00:19 +01:00
for ( const Token * tok2 = tok ; ; tok2 = tok2 - > astParent ( ) ) {
2015-12-25 16:45:11 +01:00
// If ast parent is a sequence point then break
2015-12-24 09:13:20 +01:00
const Token * const parent = tok2 - > astParent ( ) ;
2015-12-25 18:00:19 +01:00
if ( ! parent )
break ;
2015-12-24 09:13:20 +01:00
if ( Token : : Match ( parent , " %oror%|&&|?|:|; " ) )
break ;
if ( parent - > str ( ) = = " , " ) {
const Token * par = parent ;
while ( Token : : simpleMatch ( par , " , " ) )
par = par - > astParent ( ) ;
2018-10-09 14:44:01 +02:00
// not function or in a while clause => break
if ( ! ( par & & par - > str ( ) = = " ( " & & par - > astOperand2 ( ) & & par - > strAt ( - 1 ) ! = " while " ) )
2015-12-24 09:13:20 +01:00
break ;
2016-01-18 16:10:51 +01:00
// control flow (if|while|etc) => break
if ( Token : : simpleMatch ( par - > link ( ) , " ) { " ) )
break ;
2015-12-29 12:06:42 +01:00
// sequence point in function argument: dostuff((1,2),3) => break
par = par - > next ( ) ;
while ( par & & ( par - > previous ( ) ! = parent ) )
par = par - > nextArgument ( ) ;
if ( ! par )
break ;
2015-12-24 09:13:20 +01:00
}
2015-12-25 16:45:11 +01:00
if ( parent - > str ( ) = = " ( " & & parent - > astOperand2 ( ) )
break ;
2015-12-24 09:13:20 +01:00
2015-12-25 18:00:19 +01:00
// self assignment..
if ( tok2 = = tok & &
tok - > str ( ) = = " = " & &
parent - > str ( ) = = " = " & &
2018-09-28 08:38:24 +02:00
isSameExpression ( mTokenizer - > isCPP ( ) , false , tok - > astOperand1 ( ) , parent - > astOperand1 ( ) , mSettings - > library , true , false ) ) {
2021-02-24 22:00:06 +01:00
if ( mSettings - > severity . isEnabled ( Severity : : warning ) & &
2018-09-28 08:38:24 +02:00
isSameExpression ( mTokenizer - > isCPP ( ) , true , tok - > astOperand1 ( ) , parent - > astOperand1 ( ) , mSettings - > library , true , false ) )
2015-12-25 18:00:19 +01:00
selfAssignmentError ( parent , tok - > astOperand1 ( ) - > expressionString ( ) ) ;
break ;
}
2015-12-24 09:13:20 +01:00
// Is expression used?
bool foundError = false ;
2018-11-23 19:22:53 +01:00
visitAstNodes ( ( parent - > astOperand1 ( ) ! = tok2 ) ? parent - > astOperand1 ( ) : parent - > astOperand2 ( ) ,
2021-08-07 20:51:18 +02:00
[ & ] ( const Token * tok3 ) {
2015-12-26 15:48:43 +01:00
if ( tok3 - > str ( ) = = " & " & & ! tok3 - > astOperand2 ( ) )
2018-11-23 19:22:53 +01:00
return ChildrenToVisit : : none ; // don't handle address-of for now
2015-12-27 14:08:16 +01:00
if ( tok3 - > str ( ) = = " ( " & & Token : : simpleMatch ( tok3 - > previous ( ) , " sizeof " ) )
2018-11-23 19:22:53 +01:00
return ChildrenToVisit : : none ; // don't care about sizeof usage
if ( isSameExpression ( mTokenizer - > isCPP ( ) , false , tok - > astOperand1 ( ) , tok3 , mSettings - > library , true , false ) )
2015-12-24 09:13:20 +01:00
foundError = true ;
2018-11-23 19:22:53 +01:00
return foundError ? ChildrenToVisit : : done : ChildrenToVisit : : op1_and_op2 ;
} ) ;
2015-12-24 09:13:20 +01:00
if ( foundError ) {
unknownEvaluationOrder ( parent ) ;
break ;
}
}
}
}
}
void CheckOther : : unknownEvaluationOrder ( const Token * tok )
{
reportError ( tok , Severity : : error , " unknownEvaluationOrder " ,
2021-02-24 22:00:06 +01:00
" Expression ' " + ( tok ? tok - > expressionString ( ) : std : : string ( " x = x++; " ) ) + " ' depends on order of evaluation of side effects " , CWE768 , Certainty : : normal ) ;
2015-12-24 09:13:20 +01:00
}
2016-11-20 15:14:49 +01:00
void CheckOther : : checkAccessOfMovedVariable ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mTokenizer - > isCPP ( ) | | mSettings - > standards . cpp < Standards : : CPP11 | | ! mSettings - > severity . isEnabled ( Severity : : warning ) )
2016-11-20 15:14:49 +01:00
return ;
2018-11-11 12:47:27 +01:00
CheckUninitVar checkUninitVar ( mTokenizer , mSettings , mErrorLogger ) ;
2021-02-24 22:00:06 +01:00
const bool reportInconclusive = mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2018-04-19 22:31:36 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
2018-04-27 22:36:30 +02:00
const Token * scopeStart = scope - > bodyStart ;
2016-11-20 15:14:49 +01:00
if ( scope - > function ) {
const Token * memberInitializationStart = scope - > function - > constructorMemberInitialization ( ) ;
if ( memberInitializationStart )
scopeStart = memberInitializationStart ;
}
2018-04-27 22:36:30 +02:00
for ( const Token * tok = scopeStart - > next ( ) ; tok ! = scope - > bodyEnd ; tok = tok - > next ( ) ) {
2016-11-20 15:14:49 +01:00
const ValueFlow : : Value * movedValue = tok - > getMovedValue ( ) ;
2019-07-10 15:27:07 +02:00
if ( ! movedValue | | movedValue - > moveKind = = ValueFlow : : Value : : MoveKind : : NonMovedVariable )
2016-11-20 15:14:49 +01:00
continue ;
2017-09-20 22:41:36 +02:00
if ( movedValue - > isInconclusive ( ) & & ! reportInconclusive )
2016-11-20 15:14:49 +01:00
continue ;
bool inconclusive = false ;
bool accessOfMoved = false ;
if ( tok - > strAt ( 1 ) = = " . " ) {
if ( tok - > next ( ) - > originalName ( ) = = " -> " )
accessOfMoved = true ;
else
inconclusive = true ;
} else {
2021-09-15 20:28:58 +02:00
const bool variableChanged = isVariableChangedByFunctionCall ( tok , 0 , mSettings , & inconclusive ) ;
accessOfMoved = ! variableChanged & & checkUninitVar . isVariableUsage ( tok , false , CheckUninitVar : : NO_ALLOC ) ;
2016-11-20 15:14:49 +01:00
if ( inconclusive ) {
accessOfMoved = ! isMovedParameterAllowedForInconclusiveFunction ( tok ) ;
if ( accessOfMoved )
inconclusive = false ;
}
}
if ( accessOfMoved | | ( inconclusive & & reportInconclusive ) )
2017-10-10 15:49:15 +02:00
accessMovedError ( tok , tok - > str ( ) , movedValue , inconclusive | | movedValue - > isInconclusive ( ) ) ;
2016-11-20 15:14:49 +01:00
}
}
}
bool CheckOther : : isMovedParameterAllowedForInconclusiveFunction ( const Token * tok )
{
if ( Token : : simpleMatch ( tok - > tokAt ( - 4 ) , " std :: move ( " ) )
return false ;
const Token * tokAtM2 = tok - > tokAt ( - 2 ) ;
if ( Token : : simpleMatch ( tokAtM2 , " > ( " ) & & tokAtM2 - > link ( ) ) {
const Token * leftAngle = tokAtM2 - > link ( ) ;
if ( Token : : simpleMatch ( leftAngle - > tokAt ( - 3 ) , " std :: forward < " ) )
return false ;
}
return true ;
}
2017-10-10 15:49:15 +02:00
void CheckOther : : accessMovedError ( const Token * tok , const std : : string & varname , const ValueFlow : : Value * value , bool inconclusive )
2016-11-20 15:14:49 +01:00
{
2017-10-10 15:49:15 +02:00
if ( ! tok ) {
2021-02-24 22:00:06 +01:00
reportError ( tok , Severity : : warning , " accessMoved " , " Access of moved variable 'v'. " , CWE672 , Certainty : : normal ) ;
reportError ( tok , Severity : : warning , " accessForwarded " , " Access of forwarded variable 'v'. " , CWE672 , Certainty : : normal ) ;
2017-10-10 15:49:15 +02:00
return ;
}
2016-11-20 15:14:49 +01:00
const char * errorId = nullptr ;
2017-10-10 15:49:15 +02:00
std : : string kindString ;
switch ( value - > moveKind ) {
2019-07-10 15:27:07 +02:00
case ValueFlow : : Value : : MoveKind : : MovedVariable :
2016-11-20 15:14:49 +01:00
errorId = " accessMoved " ;
kindString = " moved " ;
break ;
2019-07-10 15:27:07 +02:00
case ValueFlow : : Value : : MoveKind : : ForwardedVariable :
2016-11-20 15:14:49 +01:00
errorId = " accessForwarded " ;
kindString = " forwarded " ;
break ;
2016-12-12 14:29:27 +01:00
default :
return ;
2016-11-20 15:14:49 +01:00
}
2018-04-09 06:43:48 +02:00
const std : : string errmsg ( " $symbol: " + varname + " \n Access of " + kindString + " variable '$symbol'. " ) ;
2017-10-10 15:49:15 +02:00
const ErrorPath errorPath = getErrorPath ( tok , value , errmsg ) ;
2021-02-24 22:00:06 +01:00
reportError ( errorPath , Severity : : warning , errorId , errmsg , CWE672 , inconclusive ? Certainty : : inconclusive : Certainty : : normal ) ;
2016-11-20 15:14:49 +01:00
}
2017-01-05 08:52:11 +01:00
void CheckOther : : checkFuncArgNamesDifferent ( )
{
2021-02-24 22:00:06 +01:00
const bool style = mSettings - > severity . isEnabled ( Severity : : style ) ;
const bool inconclusive = mSettings - > certainty . isEnabled ( Certainty : : inconclusive ) ;
const bool warning = mSettings - > severity . isEnabled ( Severity : : warning ) ;
2017-01-05 08:52:11 +01:00
if ( ! ( warning | | ( style & & inconclusive ) ) )
return ;
2018-06-16 16:10:28 +02:00
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
2017-01-05 08:52:11 +01:00
// check every function
2018-07-14 12:28:57 +02:00
for ( const Scope * scope : symbolDatabase - > functionScopes ) {
const Function * function = scope - > function ;
2017-01-05 08:52:11 +01:00
// only check functions with arguments
if ( ! function | | function - > argCount ( ) = = 0 )
continue ;
2017-02-28 12:22:59 +01:00
// only check functions with separate declarations and definitions
2017-01-05 08:52:11 +01:00
if ( function - > argDef = = function - > arg )
continue ;
// get the function argument name tokens
std : : vector < const Token * > declarations ( function - > argCount ( ) ) ;
std : : vector < const Token * > definitions ( function - > argCount ( ) ) ;
const Token * decl = function - > argDef - > next ( ) ;
2019-07-16 09:10:10 +02:00
for ( int j = 0 ; j < function - > argCount ( ) ; + + j ) {
2017-01-05 08:52:11 +01:00
declarations [ j ] = nullptr ;
definitions [ j ] = nullptr ;
// get the definition
const Variable * variable = function - > getArgumentVar ( j ) ;
if ( variable ) {
definitions [ j ] = variable - > nameToken ( ) ;
}
// get the declaration (search for first token with varId)
while ( decl & & ! Token : : Match ( decl , " ,|)|; " ) ) {
// skip everything after the assignment because
// it could also have a varId or be the first
// token with a varId if there is no name token
2017-03-24 22:01:05 +01:00
if ( decl - > str ( ) = = " = " ) {
decl = decl - > nextArgument ( ) ;
break ;
}
2017-01-05 08:52:11 +01:00
// skip over template
2017-03-24 22:01:05 +01:00
if ( decl - > link ( ) )
2017-01-05 08:52:11 +01:00
decl = decl - > link ( ) ;
2017-03-24 22:01:05 +01:00
else if ( decl - > varId ( ) )
2017-01-05 08:52:11 +01:00
declarations [ j ] = decl ;
decl = decl - > next ( ) ;
}
2017-03-24 22:01:05 +01:00
if ( Token : : simpleMatch ( decl , " , " ) )
2017-01-05 08:52:11 +01:00
decl = decl - > next ( ) ;
}
// check for different argument order
if ( warning ) {
bool order_different = false ;
2019-07-16 09:10:10 +02:00
for ( int j = 0 ; j < function - > argCount ( ) ; + + j ) {
2017-01-05 08:52:11 +01:00
if ( ! declarations [ j ] | | ! definitions [ j ] | | declarations [ j ] - > str ( ) = = definitions [ j ] - > str ( ) )
continue ;
2019-07-16 09:10:10 +02:00
for ( int k = 0 ; k < function - > argCount ( ) ; + + k ) {
2017-01-05 08:52:11 +01:00
if ( j ! = k & & definitions [ k ] & & declarations [ j ] - > str ( ) = = definitions [ k ] - > str ( ) ) {
order_different = true ;
break ;
}
}
}
if ( order_different ) {
funcArgOrderDifferent ( function - > name ( ) , function - > argDef - > next ( ) , function - > arg - > next ( ) , declarations , definitions ) ;
continue ;
}
}
// check for different argument names
if ( style & & inconclusive ) {
2019-07-16 09:10:10 +02:00
for ( int j = 0 ; j < function - > argCount ( ) ; + + j ) {
2017-01-05 08:52:11 +01:00
if ( declarations [ j ] & & definitions [ j ] & & declarations [ j ] - > str ( ) ! = definitions [ j ] - > str ( ) )
funcArgNamesDifferent ( function - > name ( ) , j , declarations [ j ] , definitions [ j ] ) ;
}
}
}
}
2019-07-16 09:10:10 +02:00
void CheckOther : : funcArgNamesDifferent ( const std : : string & functionName , nonneg int index ,
2017-01-05 08:52:11 +01:00
const Token * declaration , const Token * definition )
{
2018-04-09 09:54:39 +02:00
std : : list < const Token * > tokens = { declaration , definition } ;
2017-01-05 08:52:11 +01:00
reportError ( tokens , Severity : : style , " funcArgNamesDifferent " ,
2018-04-09 06:43:48 +02:00
" $symbol: " + functionName + " \n "
" Function '$symbol' argument " + MathLib : : toString ( index + 1 ) + " names different: declaration ' " +
2017-01-05 08:52:11 +01:00
( declaration ? declaration - > str ( ) : std : : string ( " A " ) ) + " ' definition ' " +
2021-02-24 22:00:06 +01:00
( definition ? definition - > str ( ) : std : : string ( " B " ) ) + " '. " , CWE628 , Certainty : : inconclusive ) ;
2017-01-05 08:52:11 +01:00
}
2017-03-24 22:01:05 +01:00
void CheckOther : : funcArgOrderDifferent ( const std : : string & functionName ,
2017-01-05 08:52:11 +01:00
const Token * declaration , const Token * definition ,
const std : : vector < const Token * > & declarations ,
const std : : vector < const Token * > & definitions )
{
2018-04-09 09:54:39 +02:00
std : : list < const Token * > tokens = {
declarations . size ( ) ? declarations [ 0 ] ? declarations [ 0 ] : declaration : nullptr ,
definitions . size ( ) ? definitions [ 0 ] ? definitions [ 0 ] : definition : nullptr
} ;
2018-04-09 06:43:48 +02:00
std : : string msg = " $symbol: " + functionName + " \n Function '$symbol' argument order different: declaration ' " ;
2019-07-16 09:10:10 +02:00
for ( int i = 0 ; i < declarations . size ( ) ; + + i ) {
2017-01-05 08:52:11 +01:00
if ( i ! = 0 )
msg + = " , " ;
if ( declarations [ i ] )
msg + = declarations [ i ] - > str ( ) ;
}
msg + = " ' definition ' " ;
2019-07-16 09:10:10 +02:00
for ( int i = 0 ; i < definitions . size ( ) ; + + i ) {
2017-01-05 08:52:11 +01:00
if ( i ! = 0 )
msg + = " , " ;
if ( definitions [ i ] )
msg + = definitions [ i ] - > str ( ) ;
}
msg + = " ' " ;
2021-02-24 22:00:06 +01:00
reportError ( tokens , Severity : : warning , " funcArgOrderDifferent " , msg , CWE683 , Certainty : : normal ) ;
2017-01-05 08:52:11 +01:00
}
2018-10-16 20:17:27 +02:00
static const Token * findShadowed ( const Scope * scope , const std : : string & varname , int linenr )
{
if ( ! scope )
return nullptr ;
for ( const Variable & var : scope - > varlist ) {
if ( scope - > isExecutable ( ) & & var . nameToken ( ) - > linenr ( ) > linenr )
continue ;
if ( var . name ( ) = = varname )
return var . nameToken ( ) ;
}
for ( const Function & f : scope - > functionList ) {
2020-04-20 18:02:10 +02:00
if ( f . type = = Function : : Type : : eFunction & & f . name ( ) = = varname )
2018-10-16 20:17:27 +02:00
return f . tokenDef ;
}
2019-02-23 16:22:16 +01:00
if ( scope - > type = = Scope : : eLambda )
return nullptr ;
2022-02-12 08:10:53 +01:00
const Token * shadowed = findShadowed ( scope - > nestedIn , varname , linenr ) ;
if ( ! shadowed )
shadowed = findShadowed ( scope - > functionOf , varname , linenr ) ;
return shadowed ;
2018-10-16 20:17:27 +02:00
}
void CheckOther : : checkShadowVariables ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2018-10-16 20:17:27 +02:00
return ;
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
for ( const Scope & scope : symbolDatabase - > scopeList ) {
2019-02-23 16:22:16 +01:00
if ( ! scope . isExecutable ( ) | | scope . type = = Scope : : eLambda )
2018-10-16 20:17:27 +02:00
continue ;
2019-07-17 17:08:42 +02:00
const Scope * functionScope = & scope ;
while ( functionScope & & functionScope - > type ! = Scope : : ScopeType : : eFunction & & functionScope - > type ! = Scope : : ScopeType : : eLambda )
functionScope = functionScope - > nestedIn ;
2018-10-16 20:17:27 +02:00
for ( const Variable & var : scope . varlist ) {
2019-10-19 18:51:36 +02:00
if ( var . nameToken ( ) & & var . nameToken ( ) - > isExpandedMacro ( ) ) // #8903
2019-10-19 18:50:27 +02:00
continue ;
2019-07-17 17:08:42 +02:00
if ( functionScope & & functionScope - > type = = Scope : : ScopeType : : eFunction & & functionScope - > function ) {
bool shadowArg = false ;
for ( const Variable & arg : functionScope - > function - > argumentList ) {
if ( arg . nameToken ( ) & & var . name ( ) = = arg . name ( ) ) {
shadowError ( var . nameToken ( ) , arg . nameToken ( ) , " argument " ) ;
shadowArg = true ;
break ;
}
}
if ( shadowArg )
continue ;
}
2018-10-16 20:17:27 +02:00
const Token * shadowed = findShadowed ( scope . nestedIn , var . name ( ) , var . nameToken ( ) - > linenr ( ) ) ;
2022-02-12 08:10:53 +01:00
if ( ! shadowed )
shadowed = findShadowed ( scope . functionOf , var . name ( ) , var . nameToken ( ) - > linenr ( ) ) ;
2018-10-16 20:17:27 +02:00
if ( ! shadowed )
continue ;
if ( scope . type = = Scope : : eFunction & & scope . className = = var . name ( ) )
continue ;
2022-01-28 16:03:06 +01:00
if ( functionScope - > function & & functionScope - > function - > isStatic ( ) & & shadowed - > variable ( ) & & ! shadowed - > variable ( ) - > isLocal ( ) )
continue ;
2019-07-17 17:08:42 +02:00
shadowError ( var . nameToken ( ) , shadowed , ( shadowed - > varId ( ) ! = 0 ) ? " variable " : " function " ) ;
2018-10-16 20:17:27 +02:00
}
}
}
2019-07-17 17:08:42 +02:00
void CheckOther : : shadowError ( const Token * var , const Token * shadowed , std : : string type )
2018-10-16 20:17:27 +02:00
{
ErrorPath errorPath ;
errorPath . push_back ( ErrorPathItem ( shadowed , " Shadowed declaration " ) ) ;
errorPath . push_back ( ErrorPathItem ( var , " Shadow variable " ) ) ;
2019-07-17 17:08:42 +02:00
const std : : string & varname = var ? var - > str ( ) : type ;
const std : : string Type = char ( std : : toupper ( type [ 0 ] ) ) + type . substr ( 1 ) ;
const std : : string id = " shadow " + Type ;
const std : : string message = " $symbol: " + varname + " \n Local variable \' $symbol \' shadows outer " + type ;
2021-02-24 22:00:06 +01:00
reportError ( errorPath , Severity : : style , id . c_str ( ) , message , CWE398 , Certainty : : normal ) ;
2018-10-16 20:17:27 +02:00
}
2018-12-17 06:04:24 +01:00
2019-05-21 10:41:16 +02:00
static bool isVariableExpression ( const Token * tok )
{
if ( Token : : Match ( tok , " %var% " ) )
return true ;
if ( Token : : simpleMatch ( tok , " . " ) )
2019-05-21 10:43:33 +02:00
return isVariableExpression ( tok - > astOperand1 ( ) ) & &
2019-05-21 10:41:16 +02:00
isVariableExpression ( tok - > astOperand2 ( ) ) ;
2020-01-03 19:35:28 +01:00
if ( Token : : simpleMatch ( tok , " [ " ) )
return isVariableExpression ( tok - > astOperand1 ( ) ) & &
tok - > astOperand2 ( ) & & tok - > astOperand2 ( ) - > hasKnownIntValue ( ) ;
2019-05-21 10:41:16 +02:00
return false ;
}
2020-04-22 09:13:35 +02:00
void CheckOther : : checkKnownArgument ( )
2018-12-17 06:04:24 +01:00
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2018-12-17 06:04:24 +01:00
return ;
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
for ( const Scope * functionScope : symbolDatabase - > functionScopes ) {
for ( const Token * tok = functionScope - > bodyStart ; tok ! = functionScope - > bodyEnd ; tok = tok - > next ( ) ) {
if ( ! Token : : simpleMatch ( tok - > astParent ( ) , " ( " ) )
continue ;
if ( ! Token : : Match ( tok - > astParent ( ) - > previous ( ) , " %name% " ) )
continue ;
if ( Token : : Match ( tok - > astParent ( ) - > previous ( ) , " if|while|switch|sizeof " ) )
continue ;
if ( tok = = tok - > astParent ( ) - > previous ( ) )
continue ;
if ( ! tok - > hasKnownIntValue ( ) )
continue ;
if ( Token : : Match ( tok , " ++|-- " ) )
continue ;
if ( isConstVarExpression ( tok ) )
continue ;
2019-02-07 14:59:09 +01:00
const Token * tok2 = tok ;
if ( isCPPCast ( tok2 ) )
tok2 = tok2 - > astOperand2 ( ) ;
2019-05-21 10:41:16 +02:00
if ( isVariableExpression ( tok2 ) )
2019-02-07 14:59:09 +01:00
continue ;
2020-09-20 20:17:10 +02:00
// ensure that there is a integer variable in expression with unknown value
2020-09-21 20:02:55 +02:00
std : : string varexpr ;
2020-09-26 13:49:47 +02:00
bool isVariableExprHidden = false ; // Is variable expression explicitly hidden
auto setVarExpr = [ & varexpr , & isVariableExprHidden ] ( const Token * child ) {
2020-09-21 20:02:55 +02:00
if ( Token : : Match ( child , " %var%|.|[ " ) ) {
2020-09-24 19:48:20 +02:00
if ( child - > valueType ( ) & & child - > valueType ( ) - > pointer = = 0 & & child - > valueType ( ) - > isIntegral ( ) & & child - > values ( ) . empty ( ) ) {
2020-09-21 20:02:55 +02:00
varexpr = child - > expressionString ( ) ;
return ChildrenToVisit : : done ;
}
return ChildrenToVisit : : none ;
}
2020-09-24 19:43:39 +02:00
if ( Token : : simpleMatch ( child - > previous ( ) , " sizeof ( " ) )
return ChildrenToVisit : : none ;
2020-09-26 13:49:47 +02:00
// hide variable explicitly with 'x * 0' etc
if ( ! isVariableExprHidden ) {
2020-09-26 10:50:58 +02:00
if ( Token : : simpleMatch ( child , " * " ) & & ( Token : : simpleMatch ( child - > astOperand1 ( ) , " 0 " ) | | Token : : simpleMatch ( child - > astOperand2 ( ) , " 0 " ) ) )
return ChildrenToVisit : : none ;
if ( Token : : simpleMatch ( child , " && " ) & & ( Token : : simpleMatch ( child - > astOperand1 ( ) , " false " ) | | Token : : simpleMatch ( child - > astOperand2 ( ) , " false " ) ) )
return ChildrenToVisit : : none ;
if ( Token : : simpleMatch ( child , " || " ) & & ( Token : : simpleMatch ( child - > astOperand1 ( ) , " true " ) | | Token : : simpleMatch ( child - > astOperand2 ( ) , " true " ) ) )
return ChildrenToVisit : : none ;
}
2020-09-26 13:49:47 +02:00
2020-09-20 20:17:10 +02:00
return ChildrenToVisit : : op1_and_op2 ;
2020-09-26 10:50:58 +02:00
} ;
2020-09-26 13:49:47 +02:00
visitAstNodes ( tok , setVarExpr ) ;
if ( varexpr . empty ( ) ) {
isVariableExprHidden = true ;
visitAstNodes ( tok , setVarExpr ) ;
2020-09-26 10:50:58 +02:00
}
2020-09-21 20:02:55 +02:00
if ( varexpr . empty ( ) )
2020-09-20 20:17:10 +02:00
continue ;
2020-05-22 11:49:28 +02:00
// ensure that function name does not contain "assert"
std : : string funcname = tok - > astParent ( ) - > previous ( ) - > str ( ) ;
std : : transform ( funcname . begin ( ) , funcname . end ( ) , funcname . begin ( ) , [ ] ( int c ) {
return std : : tolower ( c ) ;
} ) ;
if ( funcname . find ( " assert " ) ! = std : : string : : npos )
continue ;
2020-09-26 13:49:47 +02:00
knownArgumentError ( tok , tok - > astParent ( ) - > previous ( ) , & tok - > values ( ) . front ( ) , varexpr , isVariableExprHidden ) ;
2018-12-17 06:04:24 +01:00
}
}
}
2020-09-26 13:49:47 +02:00
void CheckOther : : knownArgumentError ( const Token * tok , const Token * ftok , const ValueFlow : : Value * value , const std : : string & varexpr , bool isVariableExpressionHidden )
2018-12-17 06:04:24 +01:00
{
2020-09-26 13:49:47 +02:00
if ( ! tok ) {
reportError ( tok , Severity : : style , " knownArgument " , " Argument 'x-x' to function 'func' is always 0. It does not matter what value 'x' has. " ) ;
reportError ( tok , Severity : : style , " knownArgumentHiddenVariableExpression " , " Argument 'x*0' to function 'func' is always 0. Constant literal calculation disable/hide variable expression 'x'. " ) ;
return ;
}
const MathLib : : bigint intvalue = value - > intvalue ;
2020-09-26 22:30:59 +02:00
const std : : string & expr = tok - > expressionString ( ) ;
const std : : string & fun = ftok - > str ( ) ;
2020-09-26 13:49:47 +02:00
2020-11-02 20:16:15 +01:00
const char * id ;
2020-09-26 13:49:47 +02:00
std : : string errmsg = " Argument ' " + expr + " ' to function " + fun + " is always " + std : : to_string ( intvalue ) + " . " ;
if ( ! isVariableExpressionHidden ) {
id = " knownArgument " ;
errmsg + = " It does not matter what value ' " + varexpr + " ' has. " ;
} else {
id = " knownArgumentHiddenVariableExpression " ;
errmsg + = " Constant literal calculation disable/hide variable expression ' " + varexpr + " '. " ;
}
2018-12-17 06:04:24 +01:00
const ErrorPath errorPath = getErrorPath ( tok , value , errmsg ) ;
2021-02-24 22:00:06 +01:00
reportError ( errorPath , Severity : : style , id , errmsg , CWE570 , Certainty : : normal ) ;
2018-12-17 06:04:24 +01:00
}
2019-02-23 08:32:08 +01:00
void CheckOther : : checkComparePointers ( )
{
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
for ( const Scope * functionScope : symbolDatabase - > functionScopes ) {
for ( const Token * tok = functionScope - > bodyStart ; tok ! = functionScope - > bodyEnd ; tok = tok - > next ( ) ) {
2019-02-27 06:55:48 +01:00
if ( ! Token : : Match ( tok , " <|>|<=|>=|- " ) )
2019-02-23 08:32:08 +01:00
continue ;
const Token * tok1 = tok - > astOperand1 ( ) ;
const Token * tok2 = tok - > astOperand2 ( ) ;
if ( ! astIsPointer ( tok1 ) | | ! astIsPointer ( tok2 ) )
continue ;
ValueFlow : : Value v1 = getLifetimeObjValue ( tok1 ) ;
ValueFlow : : Value v2 = getLifetimeObjValue ( tok2 ) ;
if ( ! v1 . isLocalLifetimeValue ( ) | | ! v2 . isLocalLifetimeValue ( ) )
continue ;
const Variable * var1 = v1 . tokvalue - > variable ( ) ;
const Variable * var2 = v2 . tokvalue - > variable ( ) ;
if ( ! var1 | | ! var2 )
continue ;
if ( v1 . tokvalue - > varId ( ) = = v2 . tokvalue - > varId ( ) )
continue ;
if ( var1 - > isReference ( ) | | var2 - > isReference ( ) )
continue ;
if ( var1 - > isRValueReference ( ) | | var2 - > isRValueReference ( ) )
continue ;
comparePointersError ( tok , & v1 , & v2 ) ;
}
}
}
void CheckOther : : comparePointersError ( const Token * tok , const ValueFlow : : Value * v1 , const ValueFlow : : Value * v2 )
{
ErrorPath errorPath ;
2019-02-27 06:55:48 +01:00
std : : string verb = " Comparing " ;
if ( Token : : simpleMatch ( tok , " - " ) )
verb = " Subtracting " ;
2019-02-23 08:32:08 +01:00
if ( v1 ) {
errorPath . emplace_back ( v1 - > tokvalue - > variable ( ) - > nameToken ( ) , " Variable declared here. " ) ;
errorPath . insert ( errorPath . end ( ) , v1 - > errorPath . begin ( ) , v1 - > errorPath . end ( ) ) ;
}
if ( v2 ) {
errorPath . emplace_back ( v2 - > tokvalue - > variable ( ) - > nameToken ( ) , " Variable declared here. " ) ;
errorPath . insert ( errorPath . end ( ) , v2 - > errorPath . begin ( ) , v2 - > errorPath . end ( ) ) ;
}
errorPath . emplace_back ( tok , " " ) ;
reportError (
2021-02-24 22:00:06 +01:00
errorPath , Severity : : error , " comparePointers " , verb + " pointers that point to different objects " , CWE570 , Certainty : : normal ) ;
2019-02-23 08:32:08 +01:00
}
2020-05-20 23:01:32 +02:00
void CheckOther : : checkModuloOfOne ( )
{
2021-02-24 22:00:06 +01:00
if ( ! mSettings - > severity . isEnabled ( Severity : : style ) )
2020-08-21 20:43:03 +02:00
return ;
2020-05-20 23:01:32 +02:00
for ( const Token * tok = mTokenizer - > tokens ( ) ; tok ; tok = tok - > next ( ) ) {
if ( ! tok - > astOperand2 ( ) | | ! tok - > astOperand1 ( ) )
continue ;
if ( tok - > str ( ) ! = " % " )
continue ;
if ( ! tok - > valueType ( ) | | ! tok - > valueType ( ) - > isIntegral ( ) )
continue ;
// Value flow..
const ValueFlow : : Value * value = tok - > astOperand2 ( ) - > getValue ( 1LL ) ;
if ( value & & value - > isKnown ( ) )
checkModuloOfOneError ( tok ) ;
}
}
void CheckOther : : checkModuloOfOneError ( const Token * tok )
{
reportError ( tok , Severity : : style , " moduloofone " , " Modulo of one is always equal to zero " ) ;
}
2021-06-12 21:16:52 +02:00
//-----------------------------------------------------------------------------
// Overlapping write (undefined behavior)
//-----------------------------------------------------------------------------
static bool getBufAndOffset ( const Token * expr , const Token * * buf , MathLib : : bigint * offset )
{
if ( ! expr )
return false ;
const Token * bufToken , * offsetToken ;
if ( expr - > isUnaryOp ( " & " ) & & Token : : simpleMatch ( expr - > astOperand1 ( ) , " [ " ) ) {
bufToken = expr - > astOperand1 ( ) - > astOperand1 ( ) ;
offsetToken = expr - > astOperand1 ( ) - > astOperand2 ( ) ;
} else if ( Token : : Match ( expr , " +|- " ) & & expr - > isBinaryOp ( ) ) {
const bool pointer1 = ( expr - > astOperand1 ( ) - > valueType ( ) & & expr - > astOperand1 ( ) - > valueType ( ) - > pointer > 0 ) ;
const bool pointer2 = ( expr - > astOperand2 ( ) - > valueType ( ) & & expr - > astOperand2 ( ) - > valueType ( ) - > pointer > 0 ) ;
if ( pointer1 & & ! pointer2 ) {
bufToken = expr - > astOperand1 ( ) ;
offsetToken = expr - > astOperand2 ( ) ;
} else if ( ! pointer1 & & pointer2 ) {
bufToken = expr - > astOperand2 ( ) ;
offsetToken = expr - > astOperand1 ( ) ;
} else {
return false ;
}
} else if ( expr - > valueType ( ) & & expr - > valueType ( ) - > pointer > 0 ) {
* buf = expr ;
* offset = 0 ;
return true ;
} else {
return false ;
}
if ( ! bufToken - > valueType ( ) | | ! bufToken - > valueType ( ) - > pointer )
return false ;
if ( ! offsetToken - > hasKnownIntValue ( ) )
return false ;
* buf = bufToken ;
* offset = offsetToken - > getKnownIntValue ( ) ;
return true ;
}
void CheckOther : : checkOverlappingWrite ( )
{
const SymbolDatabase * symbolDatabase = mTokenizer - > getSymbolDatabase ( ) ;
for ( const Scope * functionScope : symbolDatabase - > functionScopes ) {
for ( const Token * tok = functionScope - > bodyStart ; tok ! = functionScope - > bodyEnd ; tok = tok - > next ( ) ) {
if ( tok - > isAssignmentOp ( ) ) {
// check if LHS is a union member..
const Token * const lhs = tok - > astOperand1 ( ) ;
if ( ! Token : : simpleMatch ( lhs , " . " ) | | ! lhs - > isBinaryOp ( ) )
continue ;
const Variable * const lhsvar = lhs - > astOperand1 ( ) - > variable ( ) ;
if ( ! lhsvar | | ! lhsvar - > typeScope ( ) | | lhsvar - > typeScope ( ) - > type ! = Scope : : ScopeType : : eUnion )
continue ;
const Token * const lhsmember = lhs - > astOperand2 ( ) ;
if ( ! lhsmember )
continue ;
// Is other union member used in RHS?
const Token * errorToken = nullptr ;
visitAstNodes ( tok - > astOperand2 ( ) , [ lhsvar , lhsmember , & errorToken ] ( const Token * rhs ) {
if ( ! Token : : simpleMatch ( rhs , " . " ) )
return ChildrenToVisit : : op1_and_op2 ;
if ( ! rhs - > isBinaryOp ( ) | | rhs - > astOperand1 ( ) - > variable ( ) ! = lhsvar )
return ChildrenToVisit : : none ;
if ( lhsmember - > str ( ) = = rhs - > astOperand2 ( ) - > str ( ) )
return ChildrenToVisit : : none ;
errorToken = rhs - > astOperand2 ( ) ;
return ChildrenToVisit : : done ;
} ) ;
if ( errorToken )
overlappingWriteUnion ( tok ) ;
} else if ( Token : : Match ( tok , " %name% ( " ) ) {
const Library : : NonOverlappingData * nonOverlappingData = mSettings - > library . getNonOverlappingData ( tok ) ;
if ( ! nonOverlappingData )
continue ;
const std : : vector < const Token * > args = getArguments ( tok ) ;
if ( nonOverlappingData - > ptr1Arg < = 0 | | nonOverlappingData - > ptr1Arg > args . size ( ) )
continue ;
if ( nonOverlappingData - > ptr2Arg < = 0 | | nonOverlappingData - > ptr2Arg > args . size ( ) )
continue ;
2021-07-09 13:25:01 +02:00
const Token * ptr1 = args [ nonOverlappingData - > ptr1Arg - 1 ] ;
if ( ptr1 - > hasKnownIntValue ( ) & & ptr1 - > getKnownIntValue ( ) = = 0 )
2021-07-09 16:32:19 +02:00
continue ;
2021-07-09 13:25:01 +02:00
const Token * ptr2 = args [ nonOverlappingData - > ptr2Arg - 1 ] ;
if ( ptr2 - > hasKnownIntValue ( ) & & ptr2 - > getKnownIntValue ( ) = = 0 )
2021-07-09 16:32:19 +02:00
continue ;
2021-07-09 13:25:01 +02:00
// TODO: nonOverlappingData->strlenArg
if ( nonOverlappingData - > sizeArg < = 0 | | nonOverlappingData - > sizeArg > args . size ( ) ) {
if ( nonOverlappingData - > sizeArg = = - 1 ) {
ErrorPath errorPath ;
const bool macro = true ;
const bool pure = true ;
const bool follow = true ;
if ( ! isSameExpression ( mTokenizer - > isCPP ( ) , macro , ptr1 , ptr2 , mSettings - > library , pure , follow , & errorPath ) )
continue ;
overlappingWriteFunction ( tok ) ;
}
2021-06-12 21:16:52 +02:00
continue ;
2021-07-09 13:25:01 +02:00
}
2021-06-12 21:16:52 +02:00
if ( ! args [ nonOverlappingData - > sizeArg - 1 ] - > hasKnownIntValue ( ) )
continue ;
2021-07-09 13:43:29 +02:00
const MathLib : : bigint sizeValue = args [ nonOverlappingData - > sizeArg - 1 ] - > getKnownIntValue ( ) ;
2021-06-12 21:16:52 +02:00
const Token * buf1 , * buf2 ;
MathLib : : bigint offset1 , offset2 ;
2021-07-09 13:25:01 +02:00
if ( ! getBufAndOffset ( ptr1 , & buf1 , & offset1 ) )
2021-06-12 21:16:52 +02:00
continue ;
2021-07-09 13:25:01 +02:00
if ( ! getBufAndOffset ( ptr2 , & buf2 , & offset2 ) )
2021-06-12 21:16:52 +02:00
continue ;
2021-07-09 13:43:29 +02:00
if ( offset1 < offset2 & & offset1 + sizeValue < = offset2 )
continue ;
if ( offset2 < offset1 & & offset2 + sizeValue < = offset1 )
continue ;
2021-06-12 21:16:52 +02:00
ErrorPath errorPath ;
const bool macro = true ;
const bool pure = true ;
const bool follow = true ;
if ( ! isSameExpression ( mTokenizer - > isCPP ( ) , macro , buf1 , buf2 , mSettings - > library , pure , follow , & errorPath ) )
continue ;
overlappingWriteFunction ( tok ) ;
}
}
}
}
void CheckOther : : overlappingWriteUnion ( const Token * tok )
{
reportError ( tok , Severity : : error , " overlappingWriteUnion " , " Overlapping read/write of union is undefined behavior " ) ;
}
void CheckOther : : overlappingWriteFunction ( const Token * tok )
{
const std : : string funcname = tok ? tok - > str ( ) : " " ;
reportError ( tok , Severity : : error , " overlappingWriteFunction " , " Overlapping read/write in " + funcname + " () is undefined behavior " ) ;
}