clang-tools 20.0.0git
Public Member Functions | List of all members
clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck Class Reference

Identifies suspicious usages of std::string_view::data() that could lead to reading out-of-bounds data due to inadequate or incorrect string null termination. More...

#include <SuspiciousStringviewDataUsageCheck.h>

Inheritance diagram for clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck:
Inheritance graph
[legend]

Public Member Functions

 SuspiciousStringviewDataUsageCheck (StringRef Name, ClangTidyContext *Context)
 
void registerMatchers (ast_matchers::MatchFinder *Finder) override
 Override this to register AST matchers with Finder.
 
void check (const ast_matchers::MatchFinder::MatchResult &Result) override
 ClangTidyChecks that register ASTMatchers should do the actual work in here.
 
void storeOptions (ClangTidyOptions::OptionMap &Opts) override
 Should store all options supported by this check with their current values or default values for options that haven't been overridden.
 
bool isLanguageVersionSupported (const LangOptions &LangOpts) const override
 Override this to disable registering matchers and PP callbacks if an invalid language version is being used.
 
std::optional< TraversalKind > getCheckTraversalKind () const override
 
- Public Member Functions inherited from clang::tidy::ClangTidyCheck
 ClangTidyCheck (StringRef CheckName, ClangTidyContext *Context)
 Initializes the check with CheckName and Context.
 
virtual bool isLanguageVersionSupported (const LangOptions &LangOpts) const
 Override this to disable registering matchers and PP callbacks if an invalid language version is being used.
 
virtual void registerPPCallbacks (const SourceManager &SM, Preprocessor *PP, Preprocessor *ModuleExpanderPP)
 Override this to register PPCallbacks in the preprocessor.
 
virtual void registerMatchers (ast_matchers::MatchFinder *Finder)
 Override this to register AST matchers with Finder.
 
virtual void check (const ast_matchers::MatchFinder::MatchResult &Result)
 ClangTidyChecks that register ASTMatchers should do the actual work in here.
 
DiagnosticBuilder diag (SourceLocation Loc, StringRef Description, DiagnosticIDs::Level Level=DiagnosticIDs::Warning)
 Add a diagnostic with the check's name.
 
DiagnosticBuilder diag (StringRef Description, DiagnosticIDs::Level Level=DiagnosticIDs::Warning)
 Add a diagnostic with the check's name.
 
DiagnosticBuilder configurationDiag (StringRef Description, DiagnosticIDs::Level Level=DiagnosticIDs::Warning) const
 Adds a diagnostic to report errors in the check's configuration.
 
virtual void storeOptions (ClangTidyOptions::OptionMap &Options)
 Should store all options supported by this check with their current values or default values for options that haven't been overridden.
 

Additional Inherited Members

- Protected Member Functions inherited from clang::tidy::ClangTidyCheck
StringRef getCurrentMainFile () const
 Returns the main file name of the current translation unit.
 
const LangOptions & getLangOpts () const
 Returns the language options from the context.
 
bool areDiagsSelfContained () const
 Returns true when the check is run in a use case when only 1 fix will be applied at a time.
 
StringRef getID () const override
 
- Protected Attributes inherited from clang::tidy::ClangTidyCheck
OptionsView Options
 

Detailed Description

Identifies suspicious usages of std::string_view::data() that could lead to reading out-of-bounds data due to inadequate or incorrect string null termination.

For the user-facing documentation see: http://clang.llvm.org/extra/clang-tidy/checks/bugprone/suspicious-stringview-data-usage.html

Definition at line 22 of file SuspiciousStringviewDataUsageCheck.h.

Constructor & Destructor Documentation

◆ SuspiciousStringviewDataUsageCheck()

clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck::SuspiciousStringviewDataUsageCheck ( StringRef  Name,
ClangTidyContext Context 
)

Definition at line 19 of file SuspiciousStringviewDataUsageCheck.cpp.

Member Function Documentation

◆ check()

void clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck::check ( const ast_matchers::MatchFinder::MatchResult &  Result)
overridevirtual

ClangTidyChecks that register ASTMatchers should do the actual work in here.

Reimplemented from clang::tidy::ClangTidyCheck.

Definition at line 87 of file SuspiciousStringviewDataUsageCheck.cpp.

References clang::tidy::ClangTidyCheck::diag().

◆ getCheckTraversalKind()

std::optional< TraversalKind > clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck::getCheckTraversalKind ( ) const
override

Definition at line 41 of file SuspiciousStringviewDataUsageCheck.cpp.

◆ isLanguageVersionSupported()

bool clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck::isLanguageVersionSupported ( const LangOptions &  LangOpts) const
overridevirtual

Override this to disable registering matchers and PP callbacks if an invalid language version is being used.

For example if a check is examining overloaded functions then this should be overridden to return false when the CPlusPlus flag is not set in LangOpts.

Reimplemented from clang::tidy::ClangTidyCheck.

Definition at line 35 of file SuspiciousStringviewDataUsageCheck.cpp.

◆ registerMatchers()

void clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck::registerMatchers ( ast_matchers::MatchFinder *  Finder)
overridevirtual

Override this to register AST matchers with Finder.

This should be used by clang-tidy checks that analyze code properties that dependent on AST knowledge.

You can register as many matchers as necessary with Finder. Usually, "this" will be used as callback, but you can also specify other callback classes. Thereby, different matchers can trigger different callbacks.

This will only be executed if the function isLanguageVersionSupported returns true.

If you need to merge information between the different matchers, you can store these as members of the derived class. However, note that all matches occur in the order of the AST traversal.

Reimplemented from clang::tidy::ClangTidyCheck.

Definition at line 45 of file SuspiciousStringviewDataUsageCheck.cpp.

References clang::tidy::matchers::matchesAnyListedName().

◆ storeOptions()

void clang::tidy::bugprone::SuspiciousStringviewDataUsageCheck::storeOptions ( ClangTidyOptions::OptionMap Options)
overridevirtual

Should store all options supported by this check with their current values or default values for options that haven't been overridden.

The check should use Options.store() to store each option it supports whether it has the default value or it has been overridden.

Reimplemented from clang::tidy::ClangTidyCheck.

Definition at line 27 of file SuspiciousStringviewDataUsageCheck.cpp.

References clang::tidy::ClangTidyCheck::Options, clang::tidy::utils::options::serializeStringList(), and clang::tidy::ClangTidyCheck::OptionsView::store().


The documentation for this class was generated from the following files: