You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
397 lines
17 KiB
397 lines
17 KiB
Inlining
|
|
========
|
|
|
|
There are several options that control which calls the analyzer will consider for
|
|
inlining. The major one is ``-analyzer-config ipa``:
|
|
|
|
* ``analyzer-config ipa=none`` - All inlining is disabled. This is the only mode
|
|
available in LLVM 3.1 and earlier and in Xcode 4.3 and earlier.
|
|
|
|
* ``analyzer-config ipa=basic-inlining`` - Turns on inlining for C functions, C++
|
|
static member functions, and blocks -- essentially, the calls that behave
|
|
like simple C function calls. This is essentially the mode used in
|
|
Xcode 4.4.
|
|
|
|
* ``analyzer-config ipa=inlining`` - Turns on inlining when we can confidently find
|
|
the function/method body corresponding to the call. (C functions, static
|
|
functions, devirtualized C++ methods, Objective-C class methods, Objective-C
|
|
instance methods when ExprEngine is confident about the dynamic type of the
|
|
instance).
|
|
|
|
* ``analyzer-config ipa=dynamic`` - Inline instance methods for which the type is
|
|
determined at runtime and we are not 100% sure that our type info is
|
|
correct. For virtual calls, inline the most plausible definition.
|
|
|
|
* ``analyzer-config ipa=dynamic-bifurcate`` - Same as -analyzer-config ipa=dynamic,
|
|
but the path is split. We inline on one branch and do not inline on the
|
|
other. This mode does not drop the coverage in cases when the parent class
|
|
has code that is only exercised when some of its methods are overridden.
|
|
|
|
Currently, ``-analyzer-config ipa=dynamic-bifurcate`` is the default mode.
|
|
|
|
While ``-analyzer-config ipa`` determines in general how aggressively the analyzer
|
|
will try to inline functions, several additional options control which types of
|
|
functions can inlined, in an all-or-nothing way. These options use the
|
|
analyzer's configuration table, so they are all specified as follows:
|
|
|
|
``-analyzer-config OPTION=VALUE``
|
|
|
|
c++-inlining
|
|
------------
|
|
|
|
This option controls which C++ member functions may be inlined.
|
|
|
|
``-analyzer-config c++-inlining=[none | methods | constructors | destructors]``
|
|
|
|
Each of these modes implies that all the previous member function kinds will be
|
|
inlined as well; it doesn't make sense to inline destructors without inlining
|
|
constructors, for example.
|
|
|
|
The default c++-inlining mode is 'destructors', meaning that all member
|
|
functions with visible definitions will be considered for inlining. In some
|
|
cases the analyzer may still choose not to inline the function.
|
|
|
|
Note that under 'constructors', constructors for types with non-trivial
|
|
destructors will not be inlined. Additionally, no C++ member functions will be
|
|
inlined under -analyzer-config ipa=none or -analyzer-config ipa=basic-inlining,
|
|
regardless of the setting of the c++-inlining mode.
|
|
|
|
c++-template-inlining
|
|
^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
This option controls whether C++ templated functions may be inlined.
|
|
|
|
``-analyzer-config c++-template-inlining=[true | false]``
|
|
|
|
Currently, template functions are considered for inlining by default.
|
|
|
|
The motivation behind this option is that very generic code can be a source
|
|
of false positives, either by considering paths that the caller considers
|
|
impossible (by some unstated precondition), or by inlining some but not all
|
|
of a deep implementation of a function.
|
|
|
|
c++-stdlib-inlining
|
|
^^^^^^^^^^^^^^^^^^^
|
|
|
|
This option controls whether functions from the C++ standard library, including
|
|
methods of the container classes in the Standard Template Library, should be
|
|
considered for inlining.
|
|
|
|
``-analyzer-config c++-stdlib-inlining=[true | false]``
|
|
|
|
Currently, C++ standard library functions are considered for inlining by
|
|
default.
|
|
|
|
The standard library functions and the STL in particular are used ubiquitously
|
|
enough that our tolerance for false positives is even lower here. A false
|
|
positive due to poor modeling of the STL leads to a poor user experience, since
|
|
most users would not be comfortable adding assertions to system headers in order
|
|
to silence analyzer warnings.
|
|
|
|
c++-container-inlining
|
|
^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
This option controls whether constructors and destructors of "container" types
|
|
should be considered for inlining.
|
|
|
|
``-analyzer-config c++-container-inlining=[true | false]``
|
|
|
|
Currently, these constructors and destructors are NOT considered for inlining
|
|
by default.
|
|
|
|
The current implementation of this setting checks whether a type has a member
|
|
named 'iterator' or a member named 'begin'; these names are idiomatic in C++,
|
|
with the latter specified in the C++11 standard. The analyzer currently does a
|
|
fairly poor job of modeling certain data structure invariants of container-like
|
|
objects. For example, these three expressions should be equivalent:
|
|
|
|
|
|
.. code-block:: cpp
|
|
|
|
std::distance(c.begin(), c.end()) == 0
|
|
c.begin() == c.end()
|
|
c.empty()
|
|
|
|
Many of these issues are avoided if containers always have unknown, symbolic
|
|
state, which is what happens when their constructors are treated as opaque.
|
|
In the future, we may decide specific containers are "safe" to model through
|
|
inlining, or choose to model them directly using checkers instead.
|
|
|
|
|
|
Basics of Implementation
|
|
------------------------
|
|
|
|
The low-level mechanism of inlining a function is handled in
|
|
ExprEngine::inlineCall and ExprEngine::processCallExit.
|
|
|
|
If the conditions are right for inlining, a CallEnter node is created and added
|
|
to the analysis work list. The CallEnter node marks the change to a new
|
|
LocationContext representing the called function, and its state includes the
|
|
contents of the new stack frame. When the CallEnter node is actually processed,
|
|
its single successor will be a edge to the first CFG block in the function.
|
|
|
|
Exiting an inlined function is a bit more work, fortunately broken up into
|
|
reasonable steps:
|
|
|
|
1. The CoreEngine realizes we're at the end of an inlined call and generates a
|
|
CallExitBegin node.
|
|
|
|
2. ExprEngine takes over (in processCallExit) and finds the return value of the
|
|
function, if it has one. This is bound to the expression that triggered the
|
|
call. (In the case of calls without origin expressions, such as destructors,
|
|
this step is skipped.)
|
|
|
|
3. Dead symbols and bindings are cleaned out from the state, including any local
|
|
bindings.
|
|
|
|
4. A CallExitEnd node is generated, which marks the transition back to the
|
|
caller's LocationContext.
|
|
|
|
5. Custom post-call checks are processed and the final nodes are pushed back
|
|
onto the work list, so that evaluation of the caller can continue.
|
|
|
|
Retry Without Inlining
|
|
^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
In some cases, we would like to retry analysis without inlining a particular
|
|
call.
|
|
|
|
Currently, we use this technique to recover coverage in case we stop
|
|
analyzing a path due to exceeding the maximum block count inside an inlined
|
|
function.
|
|
|
|
When this situation is detected, we walk up the path to find the first node
|
|
before inlining was started and enqueue it on the WorkList with a special
|
|
ReplayWithoutInlining bit added to it (ExprEngine::replayWithoutInlining). The
|
|
path is then re-analyzed from that point without inlining that particular call.
|
|
|
|
Deciding When to Inline
|
|
^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
In general, the analyzer attempts to inline as much as possible, since it
|
|
provides a better summary of what actually happens in the program. There are
|
|
some cases, however, where the analyzer chooses not to inline:
|
|
|
|
- If there is no definition available for the called function or method. In
|
|
this case, there is no opportunity to inline.
|
|
|
|
- If the CFG cannot be constructed for a called function, or the liveness
|
|
cannot be computed. These are prerequisites for analyzing a function body,
|
|
with or without inlining.
|
|
|
|
- If the LocationContext chain for a given ExplodedNode reaches a maximum cutoff
|
|
depth. This prevents unbounded analysis due to infinite recursion, but also
|
|
serves as a useful cutoff for performance reasons.
|
|
|
|
- If the function is variadic. This is not a hard limitation, but an engineering
|
|
limitation.
|
|
|
|
Tracked by: <rdar://problem/12147064> Support inlining of variadic functions
|
|
|
|
- In C++, constructors are not inlined unless the destructor call will be
|
|
processed by the ExprEngine. Thus, if the CFG was built without nodes for
|
|
implicit destructors, or if the destructors for the given object are not
|
|
represented in the CFG, the constructor will not be inlined. (As an exception,
|
|
constructors for objects with trivial constructors can still be inlined.)
|
|
See "C++ Caveats" below.
|
|
|
|
- In C++, ExprEngine does not inline custom implementations of operator 'new'
|
|
or operator 'delete', nor does it inline the constructors and destructors
|
|
associated with these. See "C++ Caveats" below.
|
|
|
|
- Calls resulting in "dynamic dispatch" are specially handled. See more below.
|
|
|
|
- The FunctionSummaries map stores additional information about declarations,
|
|
some of which is collected at runtime based on previous analyses.
|
|
We do not inline functions which were not profitable to inline in a different
|
|
context (for example, if the maximum block count was exceeded; see
|
|
"Retry Without Inlining").
|
|
|
|
|
|
Dynamic Calls and Devirtualization
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
"Dynamic" calls are those that are resolved at runtime, such as C++ virtual
|
|
method calls and Objective-C message sends. Due to the path-sensitive nature of
|
|
the analysis, the analyzer may be able to reason about the dynamic type of the
|
|
object whose method is being called and thus "devirtualize" the call.
|
|
|
|
This path-sensitive devirtualization occurs when the analyzer can determine what
|
|
method would actually be called at runtime. This is possible when the type
|
|
information is constrained enough for a simulated C++/Objective-C object that
|
|
the analyzer can make such a decision.
|
|
|
|
DynamicTypeInfo
|
|
^^^^^^^^^^^^^^^
|
|
|
|
As the analyzer analyzes a path, it may accrue information to refine the
|
|
knowledge about the type of an object. This can then be used to make better
|
|
decisions about the target method of a call.
|
|
|
|
Such type information is tracked as DynamicTypeInfo. This is path-sensitive
|
|
data that is stored in ProgramState, which defines a mapping from MemRegions to
|
|
an (optional) DynamicTypeInfo.
|
|
|
|
If no DynamicTypeInfo has been explicitly set for a MemRegion, it will be lazily
|
|
inferred from the region's type or associated symbol. Information from symbolic
|
|
regions is weaker than from true typed regions.
|
|
|
|
EXAMPLE: A C++ object declared "A obj" is known to have the class 'A', but a
|
|
reference "A &ref" may dynamically be a subclass of 'A'.
|
|
|
|
The DynamicTypePropagation checker gathers and propagates DynamicTypeInfo,
|
|
updating it as information is observed along a path that can refine that type
|
|
information for a region.
|
|
|
|
WARNING: Not all of the existing analyzer code has been retrofitted to use
|
|
DynamicTypeInfo, nor is it universally appropriate. In particular,
|
|
DynamicTypeInfo always applies to a region with all casts stripped
|
|
off, but sometimes the information provided by casts can be useful.
|
|
|
|
|
|
RuntimeDefinition
|
|
^^^^^^^^^^^^^^^^^
|
|
|
|
The basis of devirtualization is CallEvent's getRuntimeDefinition() method,
|
|
which returns a RuntimeDefinition object. When asked to provide a definition,
|
|
the CallEvents for dynamic calls will use the DynamicTypeInfo in their
|
|
ProgramState to attempt to devirtualize the call. In the case of no dynamic
|
|
dispatch, or perfectly constrained devirtualization, the resulting
|
|
RuntimeDefinition contains a Decl corresponding to the definition of the called
|
|
function, and RuntimeDefinition::mayHaveOtherDefinitions will return FALSE.
|
|
|
|
In the case of dynamic dispatch where our information is not perfect, CallEvent
|
|
can make a guess, but RuntimeDefinition::mayHaveOtherDefinitions will return
|
|
TRUE. The RuntimeDefinition object will then also include a MemRegion
|
|
corresponding to the object being called (i.e., the "receiver" in Objective-C
|
|
parlance), which ExprEngine uses to decide whether or not the call should be
|
|
inlined.
|
|
|
|
Inlining Dynamic Calls
|
|
^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
The -analyzer-config ipa option has five different modes: none, basic-inlining,
|
|
inlining, dynamic, and dynamic-bifurcate. Under -analyzer-config ipa=dynamic,
|
|
all dynamic calls are inlined, whether we are certain or not that this will
|
|
actually be the definition used at runtime. Under -analyzer-config ipa=inlining,
|
|
only "near-perfect" devirtualized calls are inlined*, and other dynamic calls
|
|
are evaluated conservatively (as if no definition were available).
|
|
|
|
* Currently, no Objective-C messages are not inlined under
|
|
-analyzer-config ipa=inlining, even if we are reasonably confident of the type
|
|
of the receiver. We plan to enable this once we have tested our heuristics
|
|
more thoroughly.
|
|
|
|
The last option, -analyzer-config ipa=dynamic-bifurcate, behaves similarly to
|
|
"dynamic", but performs a conservative invalidation in the general virtual case
|
|
in *addition* to inlining. The details of this are discussed below.
|
|
|
|
As stated above, -analyzer-config ipa=basic-inlining does not inline any C++
|
|
member functions or Objective-C method calls, even if they are non-virtual or
|
|
can be safely devirtualized.
|
|
|
|
|
|
Bifurcation
|
|
^^^^^^^^^^^
|
|
|
|
ExprEngine::BifurcateCall implements the ``-analyzer-config ipa=dynamic-bifurcate``
|
|
mode.
|
|
|
|
When a call is made on an object with imprecise dynamic type information
|
|
(RuntimeDefinition::mayHaveOtherDefinitions() evaluates to TRUE), ExprEngine
|
|
bifurcates the path and marks the object's region (retrieved from the
|
|
RuntimeDefinition object) with a path-sensitive "mode" in the ProgramState.
|
|
|
|
Currently, there are 2 modes:
|
|
|
|
* ``DynamicDispatchModeInlined`` - Models the case where the dynamic type information
|
|
of the receiver (MemoryRegion) is assumed to be perfectly constrained so
|
|
that a given definition of a method is expected to be the code actually
|
|
called. When this mode is set, ExprEngine uses the Decl from
|
|
RuntimeDefinition to inline any dynamically dispatched call sent to this
|
|
receiver because the function definition is considered to be fully resolved.
|
|
|
|
* ``DynamicDispatchModeConservative`` - Models the case where the dynamic type
|
|
information is assumed to be incorrect, for example, implies that the method
|
|
definition is overridden in a subclass. In such cases, ExprEngine does not
|
|
inline the methods sent to the receiver (MemoryRegion), even if a candidate
|
|
definition is available. This mode is conservative about simulating the
|
|
effects of a call.
|
|
|
|
Going forward along the symbolic execution path, ExprEngine consults the mode
|
|
of the receiver's MemRegion to make decisions on whether the calls should be
|
|
inlined or not, which ensures that there is at most one split per region.
|
|
|
|
At a high level, "bifurcation mode" allows for increased semantic coverage in
|
|
cases where the parent method contains code which is only executed when the
|
|
class is subclassed. The disadvantages of this mode are a (considerable?)
|
|
performance hit and the possibility of false positives on the path where the
|
|
conservative mode is used.
|
|
|
|
Objective-C Message Heuristics
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
ExprEngine relies on a set of heuristics to partition the set of Objective-C
|
|
method calls into those that require bifurcation and those that do not. Below
|
|
are the cases when the DynamicTypeInfo of the object is considered precise
|
|
(cannot be a subclass):
|
|
|
|
- If the object was created with +alloc or +new and initialized with an -init
|
|
method.
|
|
|
|
- If the calls are property accesses using dot syntax. This is based on the
|
|
assumption that children rarely override properties, or do so in an
|
|
essentially compatible way.
|
|
|
|
- If the class interface is declared inside the main source file. In this case
|
|
it is unlikely that it will be subclassed.
|
|
|
|
- If the method is not declared outside of main source file, either by the
|
|
receiver's class or by any superclasses.
|
|
|
|
C++ Caveats
|
|
^^^^^^^^^^^
|
|
|
|
C++11 [class.cdtor]p4 describes how the vtable of an object is modified as it is
|
|
being constructed or destructed; that is, the type of the object depends on
|
|
which base constructors have been completed. This is tracked using
|
|
DynamicTypeInfo in the DynamicTypePropagation checker.
|
|
|
|
There are several limitations in the current implementation:
|
|
|
|
* Temporaries are poorly modeled right now because we're not confident in the
|
|
placement of their destructors in the CFG. We currently won't inline their
|
|
constructors unless the destructor is trivial, and don't process their
|
|
destructors at all, not even to invalidate the region.
|
|
|
|
* 'new' is poorly modeled due to some nasty CFG/design issues. This is tracked
|
|
in PR12014. 'delete' is not modeled at all.
|
|
|
|
* Arrays of objects are modeled very poorly right now. ExprEngine currently
|
|
only simulates the first constructor and first destructor. Because of this,
|
|
ExprEngine does not inline any constructors or destructors for arrays.
|
|
|
|
|
|
CallEvent
|
|
^^^^^^^^^
|
|
|
|
A CallEvent represents a specific call to a function, method, or other body of
|
|
code. It is path-sensitive, containing both the current state (ProgramStateRef)
|
|
and stack space (LocationContext), and provides uniform access to the argument
|
|
values and return type of a call, no matter how the call is written in the
|
|
source or what sort of code body is being invoked.
|
|
|
|
NOTE: For those familiar with Cocoa, CallEvent is roughly equivalent to
|
|
NSInvocation.
|
|
|
|
CallEvent should be used whenever there is logic dealing with function calls
|
|
that does not care how the call occurred.
|
|
|
|
Examples include checking that arguments satisfy preconditions (such as
|
|
__attribute__((nonnull))), and attempting to inline a call.
|
|
|
|
CallEvents are reference-counted objects managed by a CallEventManager. While
|
|
there is no inherent issue with persisting them (say, in a ProgramState's GDM),
|
|
they are intended for short-lived use, and can be recreated from CFGElements or
|
|
non-top-level StackFrameContexts fairly easily.
|