clang-tools 19.0.0git
SignedBitwiseCheck.cpp
Go to the documentation of this file.
1//===--- SignedBitwiseCheck.cpp - clang-tidy-------------------------------===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8
10#include "clang/AST/ASTContext.h"
11#include "clang/ASTMatchers/ASTMatchFinder.h"
12
13using namespace clang::ast_matchers;
14using namespace clang::ast_matchers::internal;
15
16namespace clang::tidy::hicpp {
17
19 ClangTidyContext *Context)
20 : ClangTidyCheck(Name, Context),
21 IgnorePositiveIntegerLiterals(
22 Options.get("IgnorePositiveIntegerLiterals", false)) {}
23
25 Options.store(Opts, "IgnorePositiveIntegerLiterals",
26 IgnorePositiveIntegerLiterals);
27}
28
29void SignedBitwiseCheck::registerMatchers(MatchFinder *Finder) {
30 const auto SignedIntegerOperand =
31 (IgnorePositiveIntegerLiterals
32 ? expr(ignoringImpCasts(hasType(isSignedInteger())),
33 unless(integerLiteral()))
34 : expr(ignoringImpCasts(hasType(isSignedInteger()))))
35 .bind("signed-operand");
36
37 // The standard [bitmask.types] allows some integral types to be implemented
38 // as signed types. Exclude these types from diagnosing for bitwise or(|) and
39 // bitwise and(&). Shifting and complementing such values is still not
40 // allowed.
41 const auto BitmaskType = namedDecl(
42 hasAnyName("::std::locale::category", "::std::ctype_base::mask",
43 "::std::ios_base::fmtflags", "::std::ios_base::iostate",
44 "::std::ios_base::openmode"));
45 const auto IsStdBitmask = ignoringImpCasts(declRefExpr(hasType(BitmaskType)));
46
47 // Match binary bitwise operations on signed integer arguments.
48 Finder->addMatcher(
49 binaryOperator(hasAnyOperatorName("^", "|", "&", "^=", "|=", "&="),
50
51 unless(allOf(hasLHS(IsStdBitmask), hasRHS(IsStdBitmask))),
52
53 hasEitherOperand(SignedIntegerOperand),
54 hasLHS(hasType(isInteger())), hasRHS(hasType(isInteger())))
55 .bind("binary-no-sign-interference"),
56 this);
57
58 // Shifting and complement is not allowed for any signed integer type because
59 // the sign bit may corrupt the result.
60 Finder->addMatcher(
61 binaryOperator(hasAnyOperatorName("<<", ">>", "<<=", ">>="),
62 hasEitherOperand(SignedIntegerOperand),
63 hasLHS(hasType(isInteger())), hasRHS(hasType(isInteger())))
64 .bind("binary-sign-interference"),
65 this);
66
67 // Match unary operations on signed integer types.
68 Finder->addMatcher(
69 unaryOperator(hasOperatorName("~"), hasUnaryOperand(SignedIntegerOperand))
70 .bind("unary-signed"),
71 this);
72}
73
74void SignedBitwiseCheck::check(const MatchFinder::MatchResult &Result) {
75 const ast_matchers::BoundNodes &N = Result.Nodes;
76 const auto *SignedOperand = N.getNodeAs<Expr>("signed-operand");
77 assert(SignedOperand &&
78 "No signed operand found in problematic bitwise operations");
79
80 bool IsUnary = false;
81 SourceLocation OperatorLoc;
82
83 if (const auto *UnaryOp = N.getNodeAs<UnaryOperator>("unary-signed")) {
84 IsUnary = true;
85 OperatorLoc = UnaryOp->getOperatorLoc();
86 } else {
87 if (const auto *BinaryOp =
88 N.getNodeAs<BinaryOperator>("binary-no-sign-interference"))
89 OperatorLoc = BinaryOp->getOperatorLoc();
90 else if (const auto *BinaryOp =
91 N.getNodeAs<BinaryOperator>("binary-sign-interference"))
92 OperatorLoc = BinaryOp->getOperatorLoc();
93 else
94 llvm_unreachable("unexpected matcher result");
95 }
96 diag(SignedOperand->getBeginLoc(), "use of a signed integer operand with a "
97 "%select{binary|unary}0 bitwise operator")
98 << IsUnary << SignedOperand->getSourceRange() << OperatorLoc;
99}
100
101} // namespace clang::tidy::hicpp
llvm::SmallString< 256U > Name
void store(ClangTidyOptions::OptionMap &Options, StringRef LocalName, StringRef Value) const
Stores an option with the check-local name LocalName with string value Value to Options.
Base class for all clang-tidy checks.
DiagnosticBuilder diag(SourceLocation Loc, StringRef Description, DiagnosticIDs::Level Level=DiagnosticIDs::Warning)
Add a diagnostic with the check's name.
Every ClangTidyCheck reports errors through a DiagnosticsEngine provided by this context.
void check(const ast_matchers::MatchFinder::MatchResult &Result) override
ClangTidyChecks that register ASTMatchers should do the actual work in here.
void registerMatchers(ast_matchers::MatchFinder *Finder) override
Override this to register AST matchers with Finder.
SignedBitwiseCheck(StringRef Name, ClangTidyContext *Context)
void storeOptions(ClangTidyOptions::OptionMap &Opts) override
Should store all options supported by this check with their current values or default values for opti...
llvm::StringMap< ClangTidyValue > OptionMap