[all-commits] [llvm/llvm-project] d0d9e6: clang-tidy: introduce readability-containter-data-...
Saleem Abdulrasool via All-commits
all-commits at lists.llvm.org
Tue Sep 14 08:12:24 PDT 2021
Branch: refs/heads/main
Home: https://github.com/llvm/llvm-project
Commit: d0d9e6f0849b2e76e980e2edf365302f47f4e35f
https://github.com/llvm/llvm-project/commit/d0d9e6f0849b2e76e980e2edf365302f47f4e35f
Author: Saleem Abdulrasool <compnerd at compnerd.org>
Date: 2021-09-14 (Tue, 14 Sep 2021)
Changed paths:
M clang-tools-extra/clang-tidy/readability/CMakeLists.txt
A clang-tools-extra/clang-tidy/readability/ContainerDataPointerCheck.cpp
A clang-tools-extra/clang-tidy/readability/ContainerDataPointerCheck.h
M clang-tools-extra/clang-tidy/readability/ReadabilityTidyModule.cpp
M clang-tools-extra/docs/ReleaseNotes.rst
A clang-tools-extra/docs/clang-tidy/checks/readability-data-pointer.rst
A clang-tools-extra/test/clang-tidy/checkers/readability-container-data-pointer.cpp
Log Message:
-----------
clang-tidy: introduce readability-containter-data-pointer check
This introduces a new check, readability-containter-data-pointer. This
check is meant to catch the cases where the user may be trying to
materialize the data pointer by taking the address of the 0-th member of
a container. With C++11 or newer, the `data` member should be used for
this. This provides the following benefits:
- `.data()` is easier to read than `&[0]`
- it avoids an unnecessary re-materialization of the pointer
* this doesn't matter in the case of optimized code, but in the case
of unoptimized code, this will be visible
- it avoids a potential invalid memory de-reference caused by the
indexing when the container is empty (in debug mode, clang will
normally optimize away the re-materialization in optimized builds).
The small potential behavioural change raises the question of where the
check should belong. A reasoning of defense in depth applies here, and
this does an unchecked conversion, with the assumption that users can
use the static analyzer to catch cases where we can statically identify
an invalid memory de-reference. For the cases where the static analysis
is unable to prove the size of the container, UBSan can be used to track
the invalid access.
Special thanks to Aaron Ballmann for the discussion on whether this
check would be useful and where to place it.
This also partially resolves PR26817!
Reviewed By: aaron.ballman
Differential Revision: https://reviews.llvm.org/D108893
More information about the All-commits
mailing list