forked from OSchip/llvm-project
				
			
		
			
				
	
	
		
			512 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			512 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
| //= UnixAPIChecker.h - Checks preconditions for various Unix APIs --*- C++ -*-//
 | |
| //
 | |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
 | |
| // See https://llvm.org/LICENSE.txt for license information.
 | |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
 | |
| //
 | |
| //===----------------------------------------------------------------------===//
 | |
| //
 | |
| // This defines UnixAPIChecker, which is an assortment of checks on calls
 | |
| // to various, widely used UNIX/Posix functions.
 | |
| //
 | |
| //===----------------------------------------------------------------------===//
 | |
| 
 | |
| #include "clang/StaticAnalyzer/Checkers/BuiltinCheckerRegistration.h"
 | |
| #include "clang/Basic/TargetInfo.h"
 | |
| #include "clang/StaticAnalyzer/Core/BugReporter/BugType.h"
 | |
| #include "clang/StaticAnalyzer/Core/Checker.h"
 | |
| #include "clang/StaticAnalyzer/Core/CheckerManager.h"
 | |
| #include "clang/StaticAnalyzer/Core/PathSensitive/CheckerContext.h"
 | |
| #include "llvm/ADT/Optional.h"
 | |
| #include "llvm/ADT/STLExtras.h"
 | |
| #include "llvm/ADT/SmallString.h"
 | |
| #include "llvm/Support/raw_ostream.h"
 | |
| 
 | |
| using namespace clang;
 | |
| using namespace ento;
 | |
| 
 | |
| enum class OpenVariant {
 | |
|   /// The standard open() call:
 | |
|   ///    int open(const char *path, int oflag, ...);
 | |
|   Open,
 | |
| 
 | |
|   /// The variant taking a directory file descriptor and a relative path:
 | |
|   ///    int openat(int fd, const char *path, int oflag, ...);
 | |
|   OpenAt
 | |
| };
 | |
| 
 | |
| namespace {
 | |
| 
 | |
| class UnixAPIMisuseChecker : public Checker< check::PreStmt<CallExpr> > {
 | |
|   mutable std::unique_ptr<BugType> BT_open, BT_pthreadOnce;
 | |
|   mutable Optional<uint64_t> Val_O_CREAT;
 | |
| 
 | |
| public:
 | |
|   DefaultBool CheckMisuse, CheckPortability;
 | |
| 
 | |
|   void checkPreStmt(const CallExpr *CE, CheckerContext &C) const;
 | |
| 
 | |
|   void CheckOpen(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckOpenAt(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckPthreadOnce(CheckerContext &C, const CallExpr *CE) const;
 | |
| 
 | |
|   void CheckOpenVariant(CheckerContext &C,
 | |
|                         const CallExpr *CE, OpenVariant Variant) const;
 | |
| 
 | |
|   void ReportOpenBug(CheckerContext &C,
 | |
|                      ProgramStateRef State,
 | |
|                      const char *Msg,
 | |
|                      SourceRange SR) const;
 | |
| 
 | |
| };
 | |
| 
 | |
| class UnixAPIPortabilityChecker : public Checker< check::PreStmt<CallExpr> > {
 | |
| public:
 | |
|   void checkPreStmt(const CallExpr *CE, CheckerContext &C) const;
 | |
| 
 | |
| private:
 | |
|   mutable std::unique_ptr<BugType> BT_mallocZero;
 | |
| 
 | |
|   void CheckCallocZero(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckMallocZero(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckReallocZero(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckReallocfZero(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckAllocaZero(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckAllocaWithAlignZero(CheckerContext &C, const CallExpr *CE) const;
 | |
|   void CheckVallocZero(CheckerContext &C, const CallExpr *CE) const;
 | |
| 
 | |
|   bool ReportZeroByteAllocation(CheckerContext &C,
 | |
|                                 ProgramStateRef falseState,
 | |
|                                 const Expr *arg,
 | |
|                                 const char *fn_name) const;
 | |
|   void BasicAllocationCheck(CheckerContext &C,
 | |
|                             const CallExpr *CE,
 | |
|                             const unsigned numArgs,
 | |
|                             const unsigned sizeArg,
 | |
|                             const char *fn) const;
 | |
| };
 | |
| 
 | |
| } //end anonymous namespace
 | |
| 
 | |
| static void LazyInitialize(const CheckerBase *Checker,
 | |
|                            std::unique_ptr<BugType> &BT,
 | |
|                            const char *name) {
 | |
|   if (BT)
 | |
|     return;
 | |
|   BT.reset(new BugType(Checker, name, categories::UnixAPI));
 | |
| }
 | |
| 
 | |
| //===----------------------------------------------------------------------===//
 | |
| // "open" (man 2 open)
 | |
| //===----------------------------------------------------------------------===/
 | |
| 
 | |
| void UnixAPIMisuseChecker::checkPreStmt(const CallExpr *CE,
 | |
|                                         CheckerContext &C) const {
 | |
|   const FunctionDecl *FD = C.getCalleeDecl(CE);
 | |
|   if (!FD || FD->getKind() != Decl::Function)
 | |
|     return;
 | |
| 
 | |
|   // Don't treat functions in namespaces with the same name a Unix function
 | |
|   // as a call to the Unix function.
 | |
|   const DeclContext *NamespaceCtx = FD->getEnclosingNamespaceContext();
 | |
|   if (NamespaceCtx && isa<NamespaceDecl>(NamespaceCtx))
 | |
|     return;
 | |
| 
 | |
|   StringRef FName = C.getCalleeName(FD);
 | |
|   if (FName.empty())
 | |
|     return;
 | |
| 
 | |
|   if (FName == "open")
 | |
|     CheckOpen(C, CE);
 | |
| 
 | |
|   else if (FName == "openat")
 | |
|     CheckOpenAt(C, CE);
 | |
| 
 | |
|   else if (FName == "pthread_once")
 | |
|     CheckPthreadOnce(C, CE);
 | |
| }
 | |
| void UnixAPIMisuseChecker::ReportOpenBug(CheckerContext &C,
 | |
|                                          ProgramStateRef State,
 | |
|                                          const char *Msg,
 | |
|                                          SourceRange SR) const {
 | |
|   ExplodedNode *N = C.generateErrorNode(State);
 | |
|   if (!N)
 | |
|     return;
 | |
| 
 | |
|   LazyInitialize(this, BT_open, "Improper use of 'open'");
 | |
| 
 | |
|   auto Report = std::make_unique<PathSensitiveBugReport>(*BT_open, Msg, N);
 | |
|   Report->addRange(SR);
 | |
|   C.emitReport(std::move(Report));
 | |
| }
 | |
| 
 | |
| void UnixAPIMisuseChecker::CheckOpen(CheckerContext &C,
 | |
|                                      const CallExpr *CE) const {
 | |
|   CheckOpenVariant(C, CE, OpenVariant::Open);
 | |
| }
 | |
| 
 | |
| void UnixAPIMisuseChecker::CheckOpenAt(CheckerContext &C,
 | |
|                                        const CallExpr *CE) const {
 | |
|   CheckOpenVariant(C, CE, OpenVariant::OpenAt);
 | |
| }
 | |
| 
 | |
| void UnixAPIMisuseChecker::CheckOpenVariant(CheckerContext &C,
 | |
|                                             const CallExpr *CE,
 | |
|                                             OpenVariant Variant) const {
 | |
|   // The index of the argument taking the flags open flags (O_RDONLY,
 | |
|   // O_WRONLY, O_CREAT, etc.),
 | |
|   unsigned int FlagsArgIndex;
 | |
|   const char *VariantName;
 | |
|   switch (Variant) {
 | |
|   case OpenVariant::Open:
 | |
|     FlagsArgIndex = 1;
 | |
|     VariantName = "open";
 | |
|     break;
 | |
|   case OpenVariant::OpenAt:
 | |
|     FlagsArgIndex = 2;
 | |
|     VariantName = "openat";
 | |
|     break;
 | |
|   };
 | |
| 
 | |
|   // All calls should at least provide arguments up to the 'flags' parameter.
 | |
|   unsigned int MinArgCount = FlagsArgIndex + 1;
 | |
| 
 | |
|   // If the flags has O_CREAT set then open/openat() require an additional
 | |
|   // argument specifying the file mode (permission bits) for the created file.
 | |
|   unsigned int CreateModeArgIndex = FlagsArgIndex + 1;
 | |
| 
 | |
|   // The create mode argument should be the last argument.
 | |
|   unsigned int MaxArgCount = CreateModeArgIndex + 1;
 | |
| 
 | |
|   ProgramStateRef state = C.getState();
 | |
| 
 | |
|   if (CE->getNumArgs() < MinArgCount) {
 | |
|     // The frontend should issue a warning for this case, so this is a sanity
 | |
|     // check.
 | |
|     return;
 | |
|   } else if (CE->getNumArgs() == MaxArgCount) {
 | |
|     const Expr *Arg = CE->getArg(CreateModeArgIndex);
 | |
|     QualType QT = Arg->getType();
 | |
|     if (!QT->isIntegerType()) {
 | |
|       SmallString<256> SBuf;
 | |
|       llvm::raw_svector_ostream OS(SBuf);
 | |
|       OS << "The " << CreateModeArgIndex + 1
 | |
|          << llvm::getOrdinalSuffix(CreateModeArgIndex + 1)
 | |
|          << " argument to '" << VariantName << "' is not an integer";
 | |
| 
 | |
|       ReportOpenBug(C, state,
 | |
|                     SBuf.c_str(),
 | |
|                     Arg->getSourceRange());
 | |
|       return;
 | |
|     }
 | |
|   } else if (CE->getNumArgs() > MaxArgCount) {
 | |
|     SmallString<256> SBuf;
 | |
|     llvm::raw_svector_ostream OS(SBuf);
 | |
|     OS << "Call to '" << VariantName << "' with more than " << MaxArgCount
 | |
|        << " arguments";
 | |
| 
 | |
|     ReportOpenBug(C, state,
 | |
|                   SBuf.c_str(),
 | |
|                   CE->getArg(MaxArgCount)->getSourceRange());
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   // The definition of O_CREAT is platform specific.  We need a better way
 | |
|   // of querying this information from the checking environment.
 | |
|   if (!Val_O_CREAT.hasValue()) {
 | |
|     if (C.getASTContext().getTargetInfo().getTriple().getVendor()
 | |
|                                                       == llvm::Triple::Apple)
 | |
|       Val_O_CREAT = 0x0200;
 | |
|     else {
 | |
|       // FIXME: We need a more general way of getting the O_CREAT value.
 | |
|       // We could possibly grovel through the preprocessor state, but
 | |
|       // that would require passing the Preprocessor object to the ExprEngine.
 | |
|       // See also: MallocChecker.cpp / M_ZERO.
 | |
|       return;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Now check if oflags has O_CREAT set.
 | |
|   const Expr *oflagsEx = CE->getArg(FlagsArgIndex);
 | |
|   const SVal V = C.getSVal(oflagsEx);
 | |
|   if (!V.getAs<NonLoc>()) {
 | |
|     // The case where 'V' can be a location can only be due to a bad header,
 | |
|     // so in this case bail out.
 | |
|     return;
 | |
|   }
 | |
|   NonLoc oflags = V.castAs<NonLoc>();
 | |
|   NonLoc ocreateFlag = C.getSValBuilder()
 | |
|       .makeIntVal(Val_O_CREAT.getValue(), oflagsEx->getType()).castAs<NonLoc>();
 | |
|   SVal maskedFlagsUC = C.getSValBuilder().evalBinOpNN(state, BO_And,
 | |
|                                                       oflags, ocreateFlag,
 | |
|                                                       oflagsEx->getType());
 | |
|   if (maskedFlagsUC.isUnknownOrUndef())
 | |
|     return;
 | |
|   DefinedSVal maskedFlags = maskedFlagsUC.castAs<DefinedSVal>();
 | |
| 
 | |
|   // Check if maskedFlags is non-zero.
 | |
|   ProgramStateRef trueState, falseState;
 | |
|   std::tie(trueState, falseState) = state->assume(maskedFlags);
 | |
| 
 | |
|   // Only emit an error if the value of 'maskedFlags' is properly
 | |
|   // constrained;
 | |
|   if (!(trueState && !falseState))
 | |
|     return;
 | |
| 
 | |
|   if (CE->getNumArgs() < MaxArgCount) {
 | |
|     SmallString<256> SBuf;
 | |
|     llvm::raw_svector_ostream OS(SBuf);
 | |
|     OS << "Call to '" << VariantName << "' requires a "
 | |
|        << CreateModeArgIndex + 1
 | |
|        << llvm::getOrdinalSuffix(CreateModeArgIndex + 1)
 | |
|        << " argument when the 'O_CREAT' flag is set";
 | |
|     ReportOpenBug(C, trueState,
 | |
|                   SBuf.c_str(),
 | |
|                   oflagsEx->getSourceRange());
 | |
|   }
 | |
| }
 | |
| 
 | |
| //===----------------------------------------------------------------------===//
 | |
| // pthread_once
 | |
| //===----------------------------------------------------------------------===//
 | |
| 
 | |
| void UnixAPIMisuseChecker::CheckPthreadOnce(CheckerContext &C,
 | |
|                                       const CallExpr *CE) const {
 | |
| 
 | |
|   // This is similar to 'CheckDispatchOnce' in the MacOSXAPIChecker.
 | |
|   // They can possibly be refactored.
 | |
| 
 | |
|   if (CE->getNumArgs() < 1)
 | |
|     return;
 | |
| 
 | |
|   // Check if the first argument is stack allocated.  If so, issue a warning
 | |
|   // because that's likely to be bad news.
 | |
|   ProgramStateRef state = C.getState();
 | |
|   const MemRegion *R = C.getSVal(CE->getArg(0)).getAsRegion();
 | |
|   if (!R || !isa<StackSpaceRegion>(R->getMemorySpace()))
 | |
|     return;
 | |
| 
 | |
|   ExplodedNode *N = C.generateErrorNode(state);
 | |
|   if (!N)
 | |
|     return;
 | |
| 
 | |
|   SmallString<256> S;
 | |
|   llvm::raw_svector_ostream os(S);
 | |
|   os << "Call to 'pthread_once' uses";
 | |
|   if (const VarRegion *VR = dyn_cast<VarRegion>(R))
 | |
|     os << " the local variable '" << VR->getDecl()->getName() << '\'';
 | |
|   else
 | |
|     os << " stack allocated memory";
 | |
|   os << " for the \"control\" value.  Using such transient memory for "
 | |
|   "the control value is potentially dangerous.";
 | |
|   if (isa<VarRegion>(R) && isa<StackLocalsSpaceRegion>(R->getMemorySpace()))
 | |
|     os << "  Perhaps you intended to declare the variable as 'static'?";
 | |
| 
 | |
|   LazyInitialize(this, BT_pthreadOnce, "Improper use of 'pthread_once'");
 | |
| 
 | |
|   auto report =
 | |
|       std::make_unique<PathSensitiveBugReport>(*BT_pthreadOnce, os.str(), N);
 | |
|   report->addRange(CE->getArg(0)->getSourceRange());
 | |
|   C.emitReport(std::move(report));
 | |
| }
 | |
| 
 | |
| //===----------------------------------------------------------------------===//
 | |
| // "calloc", "malloc", "realloc", "reallocf", "alloca" and "valloc"
 | |
| // with allocation size 0
 | |
| //===----------------------------------------------------------------------===//
 | |
| 
 | |
| // FIXME: Eventually these should be rolled into the MallocChecker, but right now
 | |
| // they're more basic and valuable for widespread use.
 | |
| 
 | |
| // Returns true if we try to do a zero byte allocation, false otherwise.
 | |
| // Fills in trueState and falseState.
 | |
| static bool IsZeroByteAllocation(ProgramStateRef state,
 | |
|                                  const SVal argVal,
 | |
|                                  ProgramStateRef *trueState,
 | |
|                                  ProgramStateRef *falseState) {
 | |
|   std::tie(*trueState, *falseState) =
 | |
|     state->assume(argVal.castAs<DefinedSVal>());
 | |
| 
 | |
|   return (*falseState && !*trueState);
 | |
| }
 | |
| 
 | |
| // Generates an error report, indicating that the function whose name is given
 | |
| // will perform a zero byte allocation.
 | |
| // Returns false if an error occurred, true otherwise.
 | |
| bool UnixAPIPortabilityChecker::ReportZeroByteAllocation(
 | |
|                                                     CheckerContext &C,
 | |
|                                                     ProgramStateRef falseState,
 | |
|                                                     const Expr *arg,
 | |
|                                                     const char *fn_name) const {
 | |
|   ExplodedNode *N = C.generateErrorNode(falseState);
 | |
|   if (!N)
 | |
|     return false;
 | |
| 
 | |
|   LazyInitialize(this, BT_mallocZero,
 | |
|                  "Undefined allocation of 0 bytes (CERT MEM04-C; CWE-131)");
 | |
| 
 | |
|   SmallString<256> S;
 | |
|   llvm::raw_svector_ostream os(S);
 | |
|   os << "Call to '" << fn_name << "' has an allocation size of 0 bytes";
 | |
|   auto report =
 | |
|       std::make_unique<PathSensitiveBugReport>(*BT_mallocZero, os.str(), N);
 | |
| 
 | |
|   report->addRange(arg->getSourceRange());
 | |
|   bugreporter::trackExpressionValue(N, arg, *report);
 | |
|   C.emitReport(std::move(report));
 | |
| 
 | |
|   return true;
 | |
| }
 | |
| 
 | |
| // Does a basic check for 0-sized allocations suitable for most of the below
 | |
| // functions (modulo "calloc")
 | |
| void UnixAPIPortabilityChecker::BasicAllocationCheck(CheckerContext &C,
 | |
|                                                      const CallExpr *CE,
 | |
|                                                      const unsigned numArgs,
 | |
|                                                      const unsigned sizeArg,
 | |
|                                                      const char *fn) const {
 | |
|   // Sanity check for the correct number of arguments
 | |
|   if (CE->getNumArgs() != numArgs)
 | |
|     return;
 | |
| 
 | |
|   // Check if the allocation size is 0.
 | |
|   ProgramStateRef state = C.getState();
 | |
|   ProgramStateRef trueState = nullptr, falseState = nullptr;
 | |
|   const Expr *arg = CE->getArg(sizeArg);
 | |
|   SVal argVal = C.getSVal(arg);
 | |
| 
 | |
|   if (argVal.isUnknownOrUndef())
 | |
|     return;
 | |
| 
 | |
|   // Is the value perfectly constrained to zero?
 | |
|   if (IsZeroByteAllocation(state, argVal, &trueState, &falseState)) {
 | |
|     (void) ReportZeroByteAllocation(C, falseState, arg, fn);
 | |
|     return;
 | |
|   }
 | |
|   // Assume the value is non-zero going forward.
 | |
|   assert(trueState);
 | |
|   if (trueState != state)
 | |
|     C.addTransition(trueState);
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::CheckCallocZero(CheckerContext &C,
 | |
|                                                 const CallExpr *CE) const {
 | |
|   unsigned int nArgs = CE->getNumArgs();
 | |
|   if (nArgs != 2)
 | |
|     return;
 | |
| 
 | |
|   ProgramStateRef state = C.getState();
 | |
|   ProgramStateRef trueState = nullptr, falseState = nullptr;
 | |
| 
 | |
|   unsigned int i;
 | |
|   for (i = 0; i < nArgs; i++) {
 | |
|     const Expr *arg = CE->getArg(i);
 | |
|     SVal argVal = C.getSVal(arg);
 | |
|     if (argVal.isUnknownOrUndef()) {
 | |
|       if (i == 0)
 | |
|         continue;
 | |
|       else
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     if (IsZeroByteAllocation(state, argVal, &trueState, &falseState)) {
 | |
|       if (ReportZeroByteAllocation(C, falseState, arg, "calloc"))
 | |
|         return;
 | |
|       else if (i == 0)
 | |
|         continue;
 | |
|       else
 | |
|         return;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Assume the value is non-zero going forward.
 | |
|   assert(trueState);
 | |
|   if (trueState != state)
 | |
|     C.addTransition(trueState);
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::CheckMallocZero(CheckerContext &C,
 | |
|                                                 const CallExpr *CE) const {
 | |
|   BasicAllocationCheck(C, CE, 1, 0, "malloc");
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::CheckReallocZero(CheckerContext &C,
 | |
|                                                  const CallExpr *CE) const {
 | |
|   BasicAllocationCheck(C, CE, 2, 1, "realloc");
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::CheckReallocfZero(CheckerContext &C,
 | |
|                                                   const CallExpr *CE) const {
 | |
|   BasicAllocationCheck(C, CE, 2, 1, "reallocf");
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::CheckAllocaZero(CheckerContext &C,
 | |
|                                                 const CallExpr *CE) const {
 | |
|   BasicAllocationCheck(C, CE, 1, 0, "alloca");
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::CheckAllocaWithAlignZero(
 | |
|                                                      CheckerContext &C,
 | |
|                                                      const CallExpr *CE) const {
 | |
|   BasicAllocationCheck(C, CE, 2, 0, "__builtin_alloca_with_align");
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::CheckVallocZero(CheckerContext &C,
 | |
|                                                 const CallExpr *CE) const {
 | |
|   BasicAllocationCheck(C, CE, 1, 0, "valloc");
 | |
| }
 | |
| 
 | |
| void UnixAPIPortabilityChecker::checkPreStmt(const CallExpr *CE,
 | |
|                                              CheckerContext &C) const {
 | |
|   const FunctionDecl *FD = C.getCalleeDecl(CE);
 | |
|   if (!FD || FD->getKind() != Decl::Function)
 | |
|     return;
 | |
| 
 | |
|   // Don't treat functions in namespaces with the same name a Unix function
 | |
|   // as a call to the Unix function.
 | |
|   const DeclContext *NamespaceCtx = FD->getEnclosingNamespaceContext();
 | |
|   if (NamespaceCtx && isa<NamespaceDecl>(NamespaceCtx))
 | |
|     return;
 | |
| 
 | |
|   StringRef FName = C.getCalleeName(FD);
 | |
|   if (FName.empty())
 | |
|     return;
 | |
| 
 | |
|   if (FName == "calloc")
 | |
|     CheckCallocZero(C, CE);
 | |
| 
 | |
|   else if (FName == "malloc")
 | |
|     CheckMallocZero(C, CE);
 | |
| 
 | |
|   else if (FName == "realloc")
 | |
|     CheckReallocZero(C, CE);
 | |
| 
 | |
|   else if (FName == "reallocf")
 | |
|     CheckReallocfZero(C, CE);
 | |
| 
 | |
|   else if (FName == "alloca" || FName ==  "__builtin_alloca")
 | |
|     CheckAllocaZero(C, CE);
 | |
| 
 | |
|   else if (FName == "__builtin_alloca_with_align")
 | |
|     CheckAllocaWithAlignZero(C, CE);
 | |
| 
 | |
|   else if (FName == "valloc")
 | |
|     CheckVallocZero(C, CE);
 | |
| }
 | |
| 
 | |
| //===----------------------------------------------------------------------===//
 | |
| // Registration.
 | |
| //===----------------------------------------------------------------------===//
 | |
| 
 | |
| #define REGISTER_CHECKER(CHECKERNAME)                                          \
 | |
|   void ento::register##CHECKERNAME(CheckerManager &mgr) {                      \
 | |
|     mgr.registerChecker<CHECKERNAME>();                                        \
 | |
|   }                                                                            \
 | |
|                                                                                \
 | |
|   bool ento::shouldRegister##CHECKERNAME(const LangOptions &LO) {              \
 | |
|     return true;                                                               \
 | |
|   }
 | |
| 
 | |
| REGISTER_CHECKER(UnixAPIMisuseChecker)
 | |
| REGISTER_CHECKER(UnixAPIPortabilityChecker)
 |