2011-07-30 21:43:21 +02:00
|
|
|
/*
|
|
|
|
* Cppcheck - A tool for static C/C++ code analysis
|
2023-01-28 10:16:34 +01:00
|
|
|
* Copyright (C) 2007-2023 Cppcheck team.
|
2011-07-30 21:43:21 +02:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
2014-08-29 17:06:46 +02:00
|
|
|
#ifndef checkconditionH
|
|
|
|
#define checkconditionH
|
2011-07-30 21:43:21 +02:00
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
#include "check.h"
|
2017-05-27 04:33:47 +02:00
|
|
|
#include "config.h"
|
2011-12-01 18:32:14 +01:00
|
|
|
#include "mathlib.h"
|
2020-05-23 07:16:49 +02:00
|
|
|
#include "errortypes.h"
|
2023-08-18 12:03:50 +02:00
|
|
|
#include "tokenize.h"
|
2011-07-30 21:43:21 +02:00
|
|
|
|
2020-05-23 07:16:49 +02:00
|
|
|
#include <set>
|
2017-05-27 04:33:47 +02:00
|
|
|
#include <string>
|
|
|
|
|
|
|
|
class Settings;
|
|
|
|
class Token;
|
2020-05-23 07:16:49 +02:00
|
|
|
class ErrorLogger;
|
2021-01-05 11:38:19 +01:00
|
|
|
class ValueType;
|
2017-05-27 04:33:47 +02:00
|
|
|
|
2022-01-27 19:03:20 +01:00
|
|
|
namespace ValueFlow {
|
|
|
|
class Value;
|
|
|
|
}
|
|
|
|
|
2011-07-30 21:43:21 +02:00
|
|
|
/// @addtogroup Checks
|
|
|
|
/// @{
|
|
|
|
|
|
|
|
/**
|
2014-08-29 17:06:46 +02:00
|
|
|
* @brief Check for condition mismatches
|
2011-07-30 21:43:21 +02:00
|
|
|
*/
|
|
|
|
|
2014-08-29 17:06:46 +02:00
|
|
|
class CPPCHECKLIB CheckCondition : public Check {
|
2011-07-30 21:43:21 +02:00
|
|
|
public:
|
|
|
|
/** This constructor is used when registering the CheckAssignIf */
|
2021-08-07 20:51:18 +02:00
|
|
|
CheckCondition() : Check(myName()) {}
|
2011-07-30 21:43:21 +02:00
|
|
|
|
2023-09-11 11:12:42 +02:00
|
|
|
private:
|
2011-07-30 21:43:21 +02:00
|
|
|
/** This constructor is used when running checks. */
|
2014-08-29 17:06:46 +02:00
|
|
|
CheckCondition(const Tokenizer *tokenizer, const Settings *settings, ErrorLogger *errorLogger)
|
2021-08-07 20:51:18 +02:00
|
|
|
: Check(myName(), tokenizer, settings, errorLogger) {}
|
2011-07-30 21:43:21 +02:00
|
|
|
|
2023-08-18 12:03:50 +02:00
|
|
|
void runChecks(const Tokenizer &tokenizer, ErrorLogger *errorLogger) override {
|
|
|
|
CheckCondition checkCondition(&tokenizer, tokenizer.getSettings(), errorLogger);
|
2014-08-29 17:06:46 +02:00
|
|
|
checkCondition.multiCondition();
|
|
|
|
checkCondition.clarifyCondition(); // not simplified because ifAssign
|
2017-09-03 10:34:34 +02:00
|
|
|
checkCondition.multiCondition2();
|
2015-07-30 10:30:30 +02:00
|
|
|
checkCondition.checkIncorrectLogicOperator();
|
2015-11-30 08:51:15 +01:00
|
|
|
checkCondition.checkInvalidTestForOverflow();
|
2019-01-09 20:41:01 +01:00
|
|
|
checkCondition.duplicateCondition();
|
2017-10-22 14:32:54 +02:00
|
|
|
checkCondition.checkPointerAdditionResultNotNull();
|
2019-04-18 20:20:24 +02:00
|
|
|
checkCondition.checkDuplicateConditionalAssign();
|
2014-08-29 17:06:46 +02:00
|
|
|
checkCondition.assignIf();
|
2015-02-22 13:09:39 +01:00
|
|
|
checkCondition.checkBadBitmaskCheck();
|
2014-08-29 17:06:46 +02:00
|
|
|
checkCondition.comparison();
|
|
|
|
checkCondition.checkModuloAlwaysTrueFalse();
|
2021-04-07 17:21:34 +02:00
|
|
|
checkCondition.checkAssignmentInCondition();
|
2021-07-15 09:43:38 +02:00
|
|
|
checkCondition.checkCompareValueOutOfTypeRange();
|
2023-08-20 22:32:41 +02:00
|
|
|
checkCondition.alwaysTrueFalse();
|
2011-07-30 21:43:21 +02:00
|
|
|
}
|
|
|
|
|
2011-07-31 11:23:38 +02:00
|
|
|
/** mismatching assignment / comparison */
|
|
|
|
void assignIf();
|
|
|
|
|
2012-09-29 10:33:54 +02:00
|
|
|
/** parse scopes recursively */
|
|
|
|
bool assignIfParseScope(const Token * const assignTok,
|
|
|
|
const Token * const startTok,
|
2019-07-16 08:21:06 +02:00
|
|
|
const nonneg int varid,
|
2012-09-29 10:54:09 +02:00
|
|
|
const bool islocal,
|
2012-09-29 10:33:54 +02:00
|
|
|
const char bitop,
|
|
|
|
const MathLib::bigint num);
|
|
|
|
|
2015-02-22 13:09:39 +01:00
|
|
|
/** check bitmask using | instead of & */
|
|
|
|
void checkBadBitmaskCheck();
|
|
|
|
|
2011-07-31 11:23:38 +02:00
|
|
|
/** mismatching lhs and rhs in comparison */
|
|
|
|
void comparison();
|
2011-07-30 21:43:21 +02:00
|
|
|
|
2019-01-09 20:41:01 +01:00
|
|
|
void duplicateCondition();
|
|
|
|
|
2011-08-01 09:35:48 +02:00
|
|
|
/** match 'if' and 'else if' conditions */
|
2011-08-01 11:33:09 +02:00
|
|
|
void multiCondition();
|
2011-08-01 09:35:48 +02:00
|
|
|
|
2017-09-03 10:34:34 +02:00
|
|
|
/**
|
|
|
|
* multiconditions #2
|
|
|
|
* - Opposite inner conditions => always false
|
|
|
|
* - (TODO) Same/Overlapping inner condition => always true
|
|
|
|
* - same condition after early exit => always false
|
|
|
|
**/
|
|
|
|
void multiCondition2();
|
2014-08-29 17:06:46 +02:00
|
|
|
|
|
|
|
/** @brief %Check for testing for mutual exclusion over ||*/
|
|
|
|
void checkIncorrectLogicOperator();
|
|
|
|
|
|
|
|
/** @brief %Check for suspicious usage of modulo (e.g. "if(var % 4 == 4)") */
|
|
|
|
void checkModuloAlwaysTrueFalse();
|
|
|
|
|
|
|
|
/** @brief Suspicious condition (assignment+comparison) */
|
|
|
|
void clarifyCondition();
|
|
|
|
|
2015-07-17 15:30:23 +02:00
|
|
|
/** @brief Condition is always true/false */
|
|
|
|
void alwaysTrueFalse();
|
|
|
|
|
2015-11-30 08:51:15 +01:00
|
|
|
/** @brief %Check for invalid test for overflow 'x+100 < x' */
|
|
|
|
void checkInvalidTestForOverflow();
|
|
|
|
|
2017-10-22 14:32:54 +02:00
|
|
|
/** @brief Check if pointer addition result is NULL '(ptr + 1) == NULL' */
|
|
|
|
void checkPointerAdditionResultNotNull();
|
|
|
|
|
2019-04-18 20:20:24 +02:00
|
|
|
void checkDuplicateConditionalAssign();
|
|
|
|
|
2021-04-07 17:21:34 +02:00
|
|
|
/** @brief Assignment in condition */
|
|
|
|
void checkAssignmentInCondition();
|
|
|
|
|
2018-11-07 06:49:07 +01:00
|
|
|
// The conditions that have been diagnosed
|
|
|
|
std::set<const Token*> mCondDiags;
|
|
|
|
bool diag(const Token* tok, bool insert=true);
|
2019-07-16 08:21:06 +02:00
|
|
|
bool isAliased(const std::set<int> &vars) const;
|
2016-12-06 12:31:16 +01:00
|
|
|
bool isOverlappingCond(const Token * const cond1, const Token * const cond2, bool pure) const;
|
2012-09-28 17:03:16 +02:00
|
|
|
void assignIfError(const Token *tok1, const Token *tok2, const std::string &condition, bool result);
|
2013-01-21 19:59:34 +01:00
|
|
|
void mismatchingBitAndError(const Token *tok1, const MathLib::bigint num1, const Token *tok2, const MathLib::bigint num2);
|
2022-06-04 17:25:10 +02:00
|
|
|
void badBitmaskCheckError(const Token *tok, bool isNoOp = false);
|
2011-11-18 20:07:42 +01:00
|
|
|
void comparisonError(const Token *tok,
|
2012-09-14 19:13:44 +02:00
|
|
|
const std::string &bitop,
|
2011-12-01 18:32:14 +01:00
|
|
|
MathLib::bigint value1,
|
2011-11-18 20:07:42 +01:00
|
|
|
const std::string &op,
|
2011-12-01 18:32:14 +01:00
|
|
|
MathLib::bigint value2,
|
2011-11-18 20:07:42 +01:00
|
|
|
bool result);
|
2019-01-09 20:41:01 +01:00
|
|
|
void duplicateConditionError(const Token *tok1, const Token *tok2, ErrorPath errorPath);
|
2019-07-16 08:21:06 +02:00
|
|
|
void overlappingElseIfConditionError(const Token *tok, nonneg int line1);
|
2019-06-30 23:26:49 +02:00
|
|
|
void oppositeElseIfConditionError(const Token *ifCond, const Token *elseIfCond, ErrorPath errorPath);
|
2011-07-30 21:43:21 +02:00
|
|
|
|
2018-08-17 09:25:07 +02:00
|
|
|
void oppositeInnerConditionError(const Token *tok1, const Token* tok2, ErrorPath errorPath);
|
2014-08-29 17:06:46 +02:00
|
|
|
|
2018-08-17 09:25:07 +02:00
|
|
|
void identicalInnerConditionError(const Token *tok1, const Token* tok2, ErrorPath errorPath);
|
2018-04-08 08:13:44 +02:00
|
|
|
|
2018-08-17 09:25:07 +02:00
|
|
|
void identicalConditionAfterEarlyExitError(const Token *cond1, const Token *cond2, ErrorPath errorPath);
|
2017-09-03 10:34:34 +02:00
|
|
|
|
2018-10-01 14:40:03 +02:00
|
|
|
void incorrectLogicOperatorError(const Token *tok, const std::string &condition, bool always, bool inconclusive, ErrorPath errors);
|
2016-05-24 15:08:07 +02:00
|
|
|
void redundantConditionError(const Token *tok, const std::string &text, bool inconclusive);
|
2014-08-29 17:06:46 +02:00
|
|
|
|
|
|
|
void moduloAlwaysTrueFalseError(const Token* tok, const std::string& maxVal);
|
|
|
|
|
|
|
|
void clarifyConditionError(const Token *tok, bool assign, bool boolop);
|
|
|
|
|
2022-10-09 21:03:48 +02:00
|
|
|
void alwaysTrueFalseError(const Token* tok, const Token* condition, const ValueFlow::Value* value);
|
2015-07-17 15:30:23 +02:00
|
|
|
|
2021-01-05 11:38:19 +01:00
|
|
|
void invalidTestForOverflow(const Token* tok, const ValueType *valueType, const std::string &replace);
|
2017-10-22 14:32:54 +02:00
|
|
|
void pointerAdditionResultNotNullError(const Token *tok, const Token *calc);
|
2015-11-30 08:51:15 +01:00
|
|
|
|
2022-09-20 07:30:12 +02:00
|
|
|
void duplicateConditionalAssignError(const Token *condTok, const Token* assignTok, bool isRedundant = false);
|
2019-04-18 20:20:24 +02:00
|
|
|
|
2021-04-07 17:21:34 +02:00
|
|
|
void assignmentInCondition(const Token *eq);
|
|
|
|
|
2021-07-15 09:43:38 +02:00
|
|
|
void checkCompareValueOutOfTypeRange();
|
2021-09-12 15:08:14 +02:00
|
|
|
void compareValueOutOfTypeRangeError(const Token *comparison, const std::string &type, long long value, bool result);
|
2021-07-15 09:43:38 +02:00
|
|
|
|
2022-02-10 23:02:24 +01:00
|
|
|
void getErrorMessages(ErrorLogger *errorLogger, const Settings *settings) const override {
|
2016-05-07 16:30:54 +02:00
|
|
|
CheckCondition c(nullptr, settings, errorLogger);
|
|
|
|
|
2018-08-17 09:25:07 +02:00
|
|
|
ErrorPath errorPath;
|
|
|
|
|
2017-08-09 20:00:26 +02:00
|
|
|
c.assignIfError(nullptr, nullptr, emptyString, false);
|
2016-05-07 16:30:54 +02:00
|
|
|
c.badBitmaskCheckError(nullptr);
|
|
|
|
c.comparisonError(nullptr, "&", 6, "==", 1, false);
|
2019-01-09 20:41:01 +01:00
|
|
|
c.duplicateConditionError(nullptr, nullptr, errorPath);
|
2019-06-30 23:26:49 +02:00
|
|
|
c.overlappingElseIfConditionError(nullptr, 1);
|
2017-08-09 20:00:26 +02:00
|
|
|
c.mismatchingBitAndError(nullptr, 0xf0, nullptr, 1);
|
2018-08-17 09:25:07 +02:00
|
|
|
c.oppositeInnerConditionError(nullptr, nullptr, errorPath);
|
|
|
|
c.identicalInnerConditionError(nullptr, nullptr, errorPath);
|
|
|
|
c.identicalConditionAfterEarlyExitError(nullptr, nullptr, errorPath);
|
2018-10-01 14:40:03 +02:00
|
|
|
c.incorrectLogicOperatorError(nullptr, "foo > 3 && foo < 4", true, false, errorPath);
|
2016-05-24 15:08:07 +02:00
|
|
|
c.redundantConditionError(nullptr, "If x > 11 the condition x > 10 is always true.", false);
|
2016-05-07 16:30:54 +02:00
|
|
|
c.moduloAlwaysTrueFalseError(nullptr, "1");
|
|
|
|
c.clarifyConditionError(nullptr, true, false);
|
2022-10-09 21:03:48 +02:00
|
|
|
c.alwaysTrueFalseError(nullptr, nullptr, nullptr);
|
2021-01-05 11:38:19 +01:00
|
|
|
c.invalidTestForOverflow(nullptr, nullptr, "false");
|
2017-10-22 14:32:54 +02:00
|
|
|
c.pointerAdditionResultNotNullError(nullptr, nullptr);
|
2019-04-18 20:20:24 +02:00
|
|
|
c.duplicateConditionalAssignError(nullptr, nullptr);
|
2021-04-07 17:21:34 +02:00
|
|
|
c.assignmentInCondition(nullptr);
|
2021-09-12 15:08:14 +02:00
|
|
|
c.compareValueOutOfTypeRangeError(nullptr, "unsigned char", 256, true);
|
2011-07-30 21:43:21 +02:00
|
|
|
}
|
|
|
|
|
2014-11-20 14:20:09 +01:00
|
|
|
static std::string myName() {
|
2014-08-29 17:06:46 +02:00
|
|
|
return "Condition";
|
2011-07-30 21:43:21 +02:00
|
|
|
}
|
|
|
|
|
2022-02-10 23:02:24 +01:00
|
|
|
std::string classInfo() const override {
|
2014-08-29 17:06:46 +02:00
|
|
|
return "Match conditions with assignments and other conditions:\n"
|
2014-09-30 14:56:12 +02:00
|
|
|
"- Mismatching assignment and comparison => comparison is always true/false\n"
|
|
|
|
"- Mismatching lhs and rhs in comparison => comparison is always true/false\n"
|
2015-02-22 13:09:39 +01:00
|
|
|
"- Detect usage of | where & should be used\n"
|
2019-04-18 20:20:24 +02:00
|
|
|
"- Duplicate condition and assignment\n"
|
2014-09-30 14:56:12 +02:00
|
|
|
"- Detect matching 'if' and 'else if' conditions\n"
|
|
|
|
"- Mismatching bitand (a &= 0xf0; a &= 1; => a = 0)\n"
|
2017-09-03 10:34:34 +02:00
|
|
|
"- Opposite inner condition is always false\n"
|
2017-09-08 12:41:33 +02:00
|
|
|
"- Identical condition after early exit is always false\n"
|
2015-11-30 08:51:15 +01:00
|
|
|
"- Condition that is always true/false\n"
|
|
|
|
"- Mutual exclusion over || always evaluating to true\n"
|
2015-07-17 15:30:23 +02:00
|
|
|
"- Comparisons of modulo results that are always true/false.\n"
|
2015-11-30 08:51:15 +01:00
|
|
|
"- Known variable values => condition is always true/false\n"
|
2021-04-07 17:21:34 +02:00
|
|
|
"- Invalid test for overflow. Some mainstream compilers remove such overflow tests when optimising code.\n"
|
2021-04-07 19:46:00 +02:00
|
|
|
"- Suspicious assignment of container/iterator in condition => condition is always true.\n";
|
2011-07-30 21:43:21 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
/// @}
|
|
|
|
//---------------------------------------------------------------------------
|
2014-08-29 17:06:46 +02:00
|
|
|
#endif // checkconditionH
|