1 //=-- ExprEngineCallAndReturn.cpp - Support for call/return -----*- C++ -*-===//
3 // The LLVM Compiler Infrastructure
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
8 //===----------------------------------------------------------------------===//
10 // This file defines ExprEngine's support for calls and returns.
12 //===----------------------------------------------------------------------===//
14 #include "clang/StaticAnalyzer/Core/PathSensitive/ExprEngine.h"
15 #include "PrettyStackTraceLocationContext.h"
16 #include "clang/AST/CXXInheritance.h"
17 #include "clang/AST/DeclCXX.h"
18 #include "clang/AST/ParentMap.h"
19 #include "clang/Analysis/Analyses/LiveVariables.h"
20 #include "clang/StaticAnalyzer/Core/CheckerManager.h"
21 #include "clang/StaticAnalyzer/Core/PathSensitive/CallEvent.h"
22 #include "llvm/ADT/SmallSet.h"
23 #include "llvm/ADT/Statistic.h"
24 #include "llvm/Support/SaveAndRestore.h"
26 using namespace clang;
29 #define DEBUG_TYPE "ExprEngine"
31 STATISTIC(NumOfDynamicDispatchPathSplits,
32 "The # of times we split the path due to imprecise dynamic dispatch info");
34 STATISTIC(NumInlinedCalls,
35 "The # of times we inlined a call");
37 STATISTIC(NumReachedInlineCountMax,
38 "The # of times we reached inline count maximum");
40 void ExprEngine::processCallEnter(NodeBuilderContext& BC, CallEnter CE,
42 // Get the entry block in the CFG of the callee.
43 const StackFrameContext *calleeCtx = CE.getCalleeContext();
44 PrettyStackTraceLocationContext CrashInfo(calleeCtx);
45 const CFGBlock *Entry = CE.getEntry();
48 assert(Entry->empty());
49 assert(Entry->succ_size() == 1);
51 // Get the solitary successor.
52 const CFGBlock *Succ = *(Entry->succ_begin());
54 // Construct an edge representing the starting location in the callee.
55 BlockEdge Loc(Entry, Succ, calleeCtx);
57 ProgramStateRef state = Pred->getState();
59 // Construct a new node, notify checkers that analysis of the function has
60 // begun, and add the resultant nodes to the worklist.
62 ExplodedNode *Node = G.getNode(Loc, state, false, &isNew);
63 Node->addPredecessor(Pred, G);
65 ExplodedNodeSet DstBegin;
66 processBeginOfFunction(BC, Node, DstBegin, Loc);
67 Engine.enqueue(DstBegin);
71 // Find the last statement on the path to the exploded node and the
72 // corresponding Block.
73 static std::pair<const Stmt*,
74 const CFGBlock*> getLastStmt(const ExplodedNode *Node) {
75 const Stmt *S = nullptr;
76 const CFGBlock *Blk = nullptr;
77 const StackFrameContext *SF =
78 Node->getLocation().getLocationContext()->getCurrentStackFrame();
80 // Back up through the ExplodedGraph until we reach a statement node in this
83 const ProgramPoint &PP = Node->getLocation();
85 if (PP.getLocationContext()->getCurrentStackFrame() == SF) {
86 if (Optional<StmtPoint> SP = PP.getAs<StmtPoint>()) {
89 } else if (Optional<CallExitEnd> CEE = PP.getAs<CallExitEnd>()) {
90 S = CEE->getCalleeContext()->getCallSite();
94 // If there is no statement, this is an implicitly-generated call.
95 // We'll walk backwards over it and then continue the loop to find
96 // an actual statement.
97 Optional<CallEnter> CE;
99 Node = Node->getFirstPred();
100 CE = Node->getLocationAs<CallEnter>();
101 } while (!CE || CE->getCalleeContext() != CEE->getCalleeContext());
103 // Continue searching the graph.
104 } else if (Optional<BlockEdge> BE = PP.getAs<BlockEdge>()) {
107 } else if (Optional<CallEnter> CE = PP.getAs<CallEnter>()) {
108 // If we reached the CallEnter for this function, it has no statements.
109 if (CE->getCalleeContext() == SF)
113 if (Node->pred_empty())
114 return std::make_pair(nullptr, nullptr);
116 Node = *Node->pred_begin();
119 return std::make_pair(S, Blk);
122 /// Adjusts a return value when the called function's return type does not
123 /// match the caller's expression type. This can happen when a dynamic call
124 /// is devirtualized, and the overridding method has a covariant (more specific)
125 /// return type than the parent's method. For C++ objects, this means we need
126 /// to add base casts.
127 static SVal adjustReturnValue(SVal V, QualType ExpectedTy, QualType ActualTy,
128 StoreManager &StoreMgr) {
129 // For now, the only adjustments we handle apply only to locations.
133 // If the types already match, don't do any unnecessary work.
134 ExpectedTy = ExpectedTy.getCanonicalType();
135 ActualTy = ActualTy.getCanonicalType();
136 if (ExpectedTy == ActualTy)
139 // No adjustment is needed between Objective-C pointer types.
140 if (ExpectedTy->isObjCObjectPointerType() &&
141 ActualTy->isObjCObjectPointerType())
144 // C++ object pointers may need "derived-to-base" casts.
145 const CXXRecordDecl *ExpectedClass = ExpectedTy->getPointeeCXXRecordDecl();
146 const CXXRecordDecl *ActualClass = ActualTy->getPointeeCXXRecordDecl();
147 if (ExpectedClass && ActualClass) {
148 CXXBasePaths Paths(/*FindAmbiguities=*/true, /*RecordPaths=*/true,
149 /*DetectVirtual=*/false);
150 if (ActualClass->isDerivedFrom(ExpectedClass, Paths) &&
151 !Paths.isAmbiguous(ActualTy->getCanonicalTypeUnqualified())) {
152 return StoreMgr.evalDerivedToBase(V, Paths.front());
156 // Unfortunately, Objective-C does not enforce that overridden methods have
157 // covariant return types, so we can't assert that that never happens.
158 // Be safe and return UnknownVal().
162 void ExprEngine::removeDeadOnEndOfFunction(NodeBuilderContext& BC,
164 ExplodedNodeSet &Dst) {
165 // Find the last statement in the function and the corresponding basic block.
166 const Stmt *LastSt = nullptr;
167 const CFGBlock *Blk = nullptr;
168 std::tie(LastSt, Blk) = getLastStmt(Pred);
169 if (!Blk || !LastSt) {
174 // Here, we destroy the current location context. We use the current
175 // function's entire body as a diagnostic statement, with which the program
176 // point will be associated. However, we only want to use LastStmt as a
177 // reference for what to clean up if it's a ReturnStmt; otherwise, everything
179 SaveAndRestore<const NodeBuilderContext *> NodeContextRAII(currBldrCtx, &BC);
180 const LocationContext *LCtx = Pred->getLocationContext();
181 removeDead(Pred, Dst, dyn_cast<ReturnStmt>(LastSt), LCtx,
182 LCtx->getAnalysisDeclContext()->getBody(),
183 ProgramPoint::PostStmtPurgeDeadSymbolsKind);
186 static bool wasDifferentDeclUsedForInlining(CallEventRef<> Call,
187 const StackFrameContext *calleeCtx) {
188 const Decl *RuntimeCallee = calleeCtx->getDecl();
189 const Decl *StaticDecl = Call->getDecl();
190 assert(RuntimeCallee);
193 return RuntimeCallee->getCanonicalDecl() != StaticDecl->getCanonicalDecl();
196 /// Returns true if the CXXConstructExpr \p E was intended to construct a
197 /// prvalue for the region in \p V.
199 /// Note that we can't just test for rvalue vs. glvalue because
200 /// CXXConstructExprs embedded in DeclStmts and initializers are considered
201 /// rvalues by the AST, and the analyzer would like to treat them as lvalues.
202 static bool isTemporaryPRValue(const CXXConstructExpr *E, SVal V) {
206 const MemRegion *MR = V.getAsRegion();
210 return isa<CXXTempObjectRegion>(MR);
213 /// The call exit is simulated with a sequence of nodes, which occur between
214 /// CallExitBegin and CallExitEnd. The following operations occur between the
215 /// two program points:
216 /// 1. CallExitBegin (triggers the start of call exit sequence)
217 /// 2. Bind the return value
218 /// 3. Run Remove dead bindings to clean up the dead symbols from the callee.
219 /// 4. CallExitEnd (switch to the caller context)
220 /// 5. PostStmt<CallExpr>
221 void ExprEngine::processCallExit(ExplodedNode *CEBNode) {
222 // Step 1 CEBNode was generated before the call.
223 PrettyStackTraceLocationContext CrashInfo(CEBNode->getLocationContext());
224 const StackFrameContext *calleeCtx =
225 CEBNode->getLocationContext()->getCurrentStackFrame();
227 // The parent context might not be a stack frame, so make sure we
228 // look up the first enclosing stack frame.
229 const StackFrameContext *callerCtx =
230 calleeCtx->getParent()->getCurrentStackFrame();
232 const Stmt *CE = calleeCtx->getCallSite();
233 ProgramStateRef state = CEBNode->getState();
234 // Find the last statement in the function and the corresponding basic block.
235 const Stmt *LastSt = nullptr;
236 const CFGBlock *Blk = nullptr;
237 std::tie(LastSt, Blk) = getLastStmt(CEBNode);
239 // Generate a CallEvent /before/ cleaning the state, so that we can get the
240 // correct value for 'this' (if necessary).
241 CallEventManager &CEMgr = getStateManager().getCallEventManager();
242 CallEventRef<> Call = CEMgr.getCaller(calleeCtx, state);
244 // Step 2: generate node with bound return value: CEBNode -> BindedRetNode.
246 // If the callee returns an expression, bind its value to CallExpr.
248 if (const ReturnStmt *RS = dyn_cast_or_null<ReturnStmt>(LastSt)) {
249 const LocationContext *LCtx = CEBNode->getLocationContext();
250 SVal V = state->getSVal(RS, LCtx);
252 // Ensure that the return type matches the type of the returned Expr.
253 if (wasDifferentDeclUsedForInlining(Call, calleeCtx)) {
254 QualType ReturnedTy =
255 CallEvent::getDeclaredResultType(calleeCtx->getDecl());
256 if (!ReturnedTy.isNull()) {
257 if (const Expr *Ex = dyn_cast<Expr>(CE)) {
258 V = adjustReturnValue(V, Ex->getType(), ReturnedTy,
264 state = state->BindExpr(CE, callerCtx, V);
267 // Bind the constructed object value to CXXConstructExpr.
268 if (const CXXConstructExpr *CCE = dyn_cast<CXXConstructExpr>(CE)) {
269 loc::MemRegionVal This =
270 svalBuilder.getCXXThis(CCE->getConstructor()->getParent(), calleeCtx);
271 SVal ThisV = state->getSVal(This);
273 // If the constructed object is a temporary prvalue, get its bindings.
274 if (isTemporaryPRValue(CCE, ThisV))
275 ThisV = state->getSVal(ThisV.castAs<Loc>());
277 state = state->BindExpr(CCE, callerCtx, ThisV);
281 // Step 3: BindedRetNode -> CleanedNodes
282 // If we can find a statement and a block in the inlined function, run remove
283 // dead bindings before returning from the call. This is important to ensure
284 // that we report the issues such as leaks in the stack contexts in which
286 ExplodedNodeSet CleanedNodes;
287 if (LastSt && Blk && AMgr.options.AnalysisPurgeOpt != PurgeNone) {
288 static SimpleProgramPointTag retValBind("ExprEngine", "Bind Return Value");
289 PostStmt Loc(LastSt, calleeCtx, &retValBind);
291 ExplodedNode *BindedRetNode = G.getNode(Loc, state, false, &isNew);
292 BindedRetNode->addPredecessor(CEBNode, G);
296 NodeBuilderContext Ctx(getCoreEngine(), Blk, BindedRetNode);
298 // Here, we call the Symbol Reaper with 0 statement and callee location
299 // context, telling it to clean up everything in the callee's context
300 // (and its children). We use the callee's function body as a diagnostic
301 // statement, with which the program point will be associated.
302 removeDead(BindedRetNode, CleanedNodes, nullptr, calleeCtx,
303 calleeCtx->getAnalysisDeclContext()->getBody(),
304 ProgramPoint::PostStmtPurgeDeadSymbolsKind);
305 currBldrCtx = nullptr;
307 CleanedNodes.Add(CEBNode);
310 for (ExplodedNodeSet::iterator I = CleanedNodes.begin(),
311 E = CleanedNodes.end(); I != E; ++I) {
313 // Step 4: Generate the CallExit and leave the callee's context.
314 // CleanedNodes -> CEENode
315 CallExitEnd Loc(calleeCtx, callerCtx);
317 ProgramStateRef CEEState = (*I == CEBNode) ? state : (*I)->getState();
318 ExplodedNode *CEENode = G.getNode(Loc, CEEState, false, &isNew);
319 CEENode->addPredecessor(*I, G);
323 // Step 5: Perform the post-condition check of the CallExpr and enqueue the
324 // result onto the work list.
325 // CEENode -> Dst -> WorkList
326 NodeBuilderContext Ctx(Engine, calleeCtx->getCallSiteBlock(), CEENode);
327 SaveAndRestore<const NodeBuilderContext*> NBCSave(currBldrCtx,
329 SaveAndRestore<unsigned> CBISave(currStmtIdx, calleeCtx->getIndex());
331 CallEventRef<> UpdatedCall = Call.cloneWithState(CEEState);
333 ExplodedNodeSet DstPostCall;
334 getCheckerManager().runCheckersForPostCall(DstPostCall, CEENode,
336 /*WasInlined=*/true);
339 if (const ObjCMethodCall *Msg = dyn_cast<ObjCMethodCall>(Call)) {
340 getCheckerManager().runCheckersForPostObjCMessage(Dst, DstPostCall, *Msg,
342 /*WasInlined=*/true);
344 getCheckerManager().runCheckersForPostStmt(Dst, DstPostCall, CE,
345 *this, /*WasInlined=*/true);
347 Dst.insert(DstPostCall);
350 // Enqueue the next element in the block.
351 for (ExplodedNodeSet::iterator PSI = Dst.begin(), PSE = Dst.end();
353 Engine.getWorkList()->enqueue(*PSI, calleeCtx->getCallSiteBlock(),
354 calleeCtx->getIndex()+1);
359 void ExprEngine::examineStackFrames(const Decl *D, const LocationContext *LCtx,
360 bool &IsRecursive, unsigned &StackDepth) {
365 if (const StackFrameContext *SFC = dyn_cast<StackFrameContext>(LCtx)) {
366 const Decl *DI = SFC->getDecl();
368 // Mark recursive (and mutually recursive) functions and always count
369 // them when measuring the stack depth.
373 LCtx = LCtx->getParent();
377 // Do not count the small functions when determining the stack depth.
378 AnalysisDeclContext *CalleeADC = AMgr.getAnalysisDeclContext(DI);
379 const CFG *CalleeCFG = CalleeADC->getCFG();
380 if (CalleeCFG->getNumBlockIDs() > AMgr.options.getAlwaysInlineSize())
383 LCtx = LCtx->getParent();
387 // The GDM component containing the dynamic dispatch bifurcation info. When
388 // the exact type of the receiver is not known, we want to explore both paths -
389 // one on which we do inline it and the other one on which we don't. This is
390 // done to ensure we do not drop coverage.
391 // This is the map from the receiver region to a bool, specifying either we
392 // consider this region's information precise or not along the given path.
394 enum DynamicDispatchMode {
395 DynamicDispatchModeInlined = 1,
396 DynamicDispatchModeConservative
398 } // end anonymous namespace
400 REGISTER_TRAIT_WITH_PROGRAMSTATE(DynamicDispatchBifurcationMap,
401 CLANG_ENTO_PROGRAMSTATE_MAP(const MemRegion *,
404 bool ExprEngine::inlineCall(const CallEvent &Call, const Decl *D,
405 NodeBuilder &Bldr, ExplodedNode *Pred,
406 ProgramStateRef State) {
409 const LocationContext *CurLC = Pred->getLocationContext();
410 const StackFrameContext *CallerSFC = CurLC->getCurrentStackFrame();
411 const LocationContext *ParentOfCallee = CallerSFC;
412 if (Call.getKind() == CE_Block &&
413 !cast<BlockCall>(Call).isConversionFromLambda()) {
414 const BlockDataRegion *BR = cast<BlockCall>(Call).getBlockRegion();
415 assert(BR && "If we have the block definition we should have its region");
416 AnalysisDeclContext *BlockCtx = AMgr.getAnalysisDeclContext(D);
417 ParentOfCallee = BlockCtx->getBlockInvocationContext(CallerSFC,
422 // This may be NULL, but that's fine.
423 const Expr *CallE = Call.getOriginExpr();
425 // Construct a new stack frame for the callee.
426 AnalysisDeclContext *CalleeADC = AMgr.getAnalysisDeclContext(D);
427 const StackFrameContext *CalleeSFC =
428 CalleeADC->getStackFrame(ParentOfCallee, CallE,
429 currBldrCtx->getBlock(),
432 CallEnter Loc(CallE, CalleeSFC, CurLC);
434 // Construct a new state which contains the mapping from actual to
436 State = State->enterStackFrame(Call, CalleeSFC);
439 if (ExplodedNode *N = G.getNode(Loc, State, false, &isNew)) {
440 N->addPredecessor(Pred, G);
442 Engine.getWorkList()->enqueue(N);
445 // If we decided to inline the call, the successor has been manually
446 // added onto the work list so remove it from the node builder.
447 Bldr.takeNodes(Pred);
450 Engine.FunctionSummaries->bumpNumTimesInlined(D);
452 // Mark the decl as visited.
454 VisitedCallees->insert(D);
459 static ProgramStateRef getInlineFailedState(ProgramStateRef State,
461 const void *ReplayState = State->get<ReplayWithoutInlining>();
465 assert(ReplayState == CallE && "Backtracked to the wrong call.");
468 return State->remove<ReplayWithoutInlining>();
471 void ExprEngine::VisitCallExpr(const CallExpr *CE, ExplodedNode *Pred,
472 ExplodedNodeSet &dst) {
473 // Perform the previsit of the CallExpr.
474 ExplodedNodeSet dstPreVisit;
475 getCheckerManager().runCheckersForPreStmt(dstPreVisit, Pred, CE, *this);
477 // Get the call in its initial state. We use this as a template to perform
479 CallEventManager &CEMgr = getStateManager().getCallEventManager();
480 CallEventRef<> CallTemplate
481 = CEMgr.getSimpleCall(CE, Pred->getState(), Pred->getLocationContext());
483 // Evaluate the function call. We try each of the checkers
484 // to see if the can evaluate the function call.
485 ExplodedNodeSet dstCallEvaluated;
486 for (ExplodedNodeSet::iterator I = dstPreVisit.begin(), E = dstPreVisit.end();
488 evalCall(dstCallEvaluated, *I, *CallTemplate);
491 // Finally, perform the post-condition check of the CallExpr and store
492 // the created nodes in 'Dst'.
493 // Note that if the call was inlined, dstCallEvaluated will be empty.
494 // The post-CallExpr check will occur in processCallExit.
495 getCheckerManager().runCheckersForPostStmt(dst, dstCallEvaluated, CE,
499 void ExprEngine::evalCall(ExplodedNodeSet &Dst, ExplodedNode *Pred,
500 const CallEvent &Call) {
501 // WARNING: At this time, the state attached to 'Call' may be older than the
502 // state in 'Pred'. This is a minor optimization since CheckerManager will
503 // use an updated CallEvent instance when calling checkers, but if 'Call' is
504 // ever used directly in this function all callers should be updated to pass
505 // the most recent state. (It is probably not worth doing the work here since
506 // for some callers this will not be necessary.)
508 // Run any pre-call checks using the generic call interface.
509 ExplodedNodeSet dstPreVisit;
510 getCheckerManager().runCheckersForPreCall(dstPreVisit, Pred, Call, *this);
512 // Actually evaluate the function call. We try each of the checkers
513 // to see if the can evaluate the function call, and get a callback at
514 // defaultEvalCall if all of them fail.
515 ExplodedNodeSet dstCallEvaluated;
516 getCheckerManager().runCheckersForEvalCall(dstCallEvaluated, dstPreVisit,
519 // Finally, run any post-call checks.
520 getCheckerManager().runCheckersForPostCall(Dst, dstCallEvaluated,
524 ProgramStateRef ExprEngine::bindReturnValue(const CallEvent &Call,
525 const LocationContext *LCtx,
526 ProgramStateRef State) {
527 const Expr *E = Call.getOriginExpr();
531 // Some method families have known return values.
532 if (const ObjCMethodCall *Msg = dyn_cast<ObjCMethodCall>(&Call)) {
533 switch (Msg->getMethodFamily()) {
536 case OMF_autorelease:
539 // These methods return their receivers.
540 return State->BindExpr(E, LCtx, Msg->getReceiverSVal());
543 } else if (const CXXConstructorCall *C = dyn_cast<CXXConstructorCall>(&Call)){
544 SVal ThisV = C->getCXXThisVal();
546 // If the constructed object is a temporary prvalue, get its bindings.
547 if (isTemporaryPRValue(cast<CXXConstructExpr>(E), ThisV))
548 ThisV = State->getSVal(ThisV.castAs<Loc>());
550 return State->BindExpr(E, LCtx, ThisV);
553 // Conjure a symbol if the return value is unknown.
554 QualType ResultTy = Call.getResultType();
555 SValBuilder &SVB = getSValBuilder();
556 unsigned Count = currBldrCtx->blockCount();
557 SVal R = SVB.conjureSymbolVal(nullptr, E, LCtx, ResultTy, Count);
558 return State->BindExpr(E, LCtx, R);
561 // Conservatively evaluate call by invalidating regions and binding
562 // a conjured return value.
563 void ExprEngine::conservativeEvalCall(const CallEvent &Call, NodeBuilder &Bldr,
565 ProgramStateRef State) {
566 State = Call.invalidateRegions(currBldrCtx->blockCount(), State);
567 State = bindReturnValue(Call, Pred->getLocationContext(), State);
569 // And make the result node.
570 Bldr.generateNode(Call.getProgramPoint(), State, Pred);
573 enum CallInlinePolicy {
579 static CallInlinePolicy mayInlineCallKind(const CallEvent &Call,
580 const ExplodedNode *Pred,
581 AnalyzerOptions &Opts) {
582 const LocationContext *CurLC = Pred->getLocationContext();
583 const StackFrameContext *CallerSFC = CurLC->getCurrentStackFrame();
584 switch (Call.getKind()) {
589 case CE_CXXMemberOperator:
590 if (!Opts.mayInlineCXXMemberFunction(CIMK_MemberFunctions))
591 return CIP_DisallowedAlways;
593 case CE_CXXConstructor: {
594 if (!Opts.mayInlineCXXMemberFunction(CIMK_Constructors))
595 return CIP_DisallowedAlways;
597 const CXXConstructorCall &Ctor = cast<CXXConstructorCall>(Call);
599 // FIXME: We don't handle constructors or destructors for arrays properly.
600 // Even once we do, we still need to be careful about implicitly-generated
601 // initializers for array fields in default move/copy constructors.
602 const MemRegion *Target = Ctor.getCXXThisVal().getAsRegion();
603 if (Target && isa<ElementRegion>(Target))
604 return CIP_DisallowedOnce;
606 // FIXME: This is a hack. We don't use the correct region for a new
607 // expression, so if we inline the constructor its result will just be
608 // thrown away. This short-term hack is tracked in <rdar://problem/12180598>
609 // and the longer-term possible fix is discussed in PR12014.
610 const CXXConstructExpr *CtorExpr = Ctor.getOriginExpr();
611 if (const Stmt *Parent = CurLC->getParentMap().getParent(CtorExpr))
612 if (isa<CXXNewExpr>(Parent))
613 return CIP_DisallowedOnce;
615 // Inlining constructors requires including initializers in the CFG.
616 const AnalysisDeclContext *ADC = CallerSFC->getAnalysisDeclContext();
617 assert(ADC->getCFGBuildOptions().AddInitializers && "No CFG initializers");
620 // If the destructor is trivial, it's always safe to inline the constructor.
621 if (Ctor.getDecl()->getParent()->hasTrivialDestructor())
624 // For other types, only inline constructors if destructor inlining is
626 if (!Opts.mayInlineCXXMemberFunction(CIMK_Destructors))
627 return CIP_DisallowedAlways;
629 // FIXME: This is a hack. We don't handle temporary destructors
630 // right now, so we shouldn't inline their constructors.
631 if (CtorExpr->getConstructionKind() == CXXConstructExpr::CK_Complete)
632 if (!Target || !isa<DeclRegion>(Target))
633 return CIP_DisallowedOnce;
637 case CE_CXXDestructor: {
638 if (!Opts.mayInlineCXXMemberFunction(CIMK_Destructors))
639 return CIP_DisallowedAlways;
641 // Inlining destructors requires building the CFG correctly.
642 const AnalysisDeclContext *ADC = CallerSFC->getAnalysisDeclContext();
643 assert(ADC->getCFGBuildOptions().AddImplicitDtors && "No CFG destructors");
646 const CXXDestructorCall &Dtor = cast<CXXDestructorCall>(Call);
648 // FIXME: We don't handle constructors or destructors for arrays properly.
649 const MemRegion *Target = Dtor.getCXXThisVal().getAsRegion();
650 if (Target && isa<ElementRegion>(Target))
651 return CIP_DisallowedOnce;
655 case CE_CXXAllocator:
656 if (Opts.mayInlineCXXAllocator())
658 // Do not inline allocators until we model deallocators.
659 // This is unfortunate, but basically necessary for smart pointers and such.
660 return CIP_DisallowedAlways;
662 if (!Opts.mayInlineObjCMethod())
663 return CIP_DisallowedAlways;
664 if (!(Opts.getIPAMode() == IPAK_DynamicDispatch ||
665 Opts.getIPAMode() == IPAK_DynamicDispatchBifurcate))
666 return CIP_DisallowedAlways;
673 /// Returns true if the given C++ class contains a member with the given name.
674 static bool hasMember(const ASTContext &Ctx, const CXXRecordDecl *RD,
676 const IdentifierInfo &II = Ctx.Idents.get(Name);
677 DeclarationName DeclName = Ctx.DeclarationNames.getIdentifier(&II);
678 if (!RD->lookup(DeclName).empty())
681 CXXBasePaths Paths(false, false, false);
682 if (RD->lookupInBases(
683 [DeclName](const CXXBaseSpecifier *Specifier, CXXBasePath &Path) {
684 return CXXRecordDecl::FindOrdinaryMember(Specifier, Path, DeclName);
692 /// Returns true if the given C++ class is a container or iterator.
694 /// Our heuristic for this is whether it contains a method named 'begin()' or a
695 /// nested type named 'iterator' or 'iterator_category'.
696 static bool isContainerClass(const ASTContext &Ctx, const CXXRecordDecl *RD) {
697 return hasMember(Ctx, RD, "begin") ||
698 hasMember(Ctx, RD, "iterator") ||
699 hasMember(Ctx, RD, "iterator_category");
702 /// Returns true if the given function refers to a method of a C++ container
705 /// We generally do a poor job modeling most containers right now, and might
706 /// prefer not to inline their methods.
707 static bool isContainerMethod(const ASTContext &Ctx,
708 const FunctionDecl *FD) {
709 if (const CXXMethodDecl *MD = dyn_cast<CXXMethodDecl>(FD))
710 return isContainerClass(Ctx, MD->getParent());
714 /// Returns true if the given function is the destructor of a class named
716 static bool isCXXSharedPtrDtor(const FunctionDecl *FD) {
717 const CXXDestructorDecl *Dtor = dyn_cast<CXXDestructorDecl>(FD);
721 const CXXRecordDecl *RD = Dtor->getParent();
722 if (const IdentifierInfo *II = RD->getDeclName().getAsIdentifierInfo())
723 if (II->isStr("shared_ptr"))
729 /// Returns true if the function in \p CalleeADC may be inlined in general.
731 /// This checks static properties of the function, such as its signature and
732 /// CFG, to determine whether the analyzer should ever consider inlining it,
734 static bool mayInlineDecl(AnalysisDeclContext *CalleeADC,
735 AnalyzerOptions &Opts) {
736 // FIXME: Do not inline variadic calls.
737 if (CallEvent::isVariadic(CalleeADC->getDecl()))
740 // Check certain C++-related inlining policies.
741 ASTContext &Ctx = CalleeADC->getASTContext();
742 if (Ctx.getLangOpts().CPlusPlus) {
743 if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(CalleeADC->getDecl())) {
744 // Conditionally control the inlining of template functions.
745 if (!Opts.mayInlineTemplateFunctions())
746 if (FD->getTemplatedKind() != FunctionDecl::TK_NonTemplate)
749 // Conditionally control the inlining of C++ standard library functions.
750 if (!Opts.mayInlineCXXStandardLibrary())
751 if (Ctx.getSourceManager().isInSystemHeader(FD->getLocation()))
752 if (AnalysisDeclContext::isInStdNamespace(FD))
755 // Conditionally control the inlining of methods on objects that look
756 // like C++ containers.
757 if (!Opts.mayInlineCXXContainerMethods())
758 if (!Ctx.getSourceManager().isInMainFile(FD->getLocation()))
759 if (isContainerMethod(Ctx, FD))
762 // Conditionally control the inlining of the destructor of C++ shared_ptr.
763 // We don't currently do a good job modeling shared_ptr because we can't
764 // see the reference count, so treating as opaque is probably the best
766 if (!Opts.mayInlineCXXSharedPtrDtor())
767 if (isCXXSharedPtrDtor(FD))
772 // It is possible that the CFG cannot be constructed.
773 // Be safe, and check if the CalleeCFG is valid.
774 const CFG *CalleeCFG = CalleeADC->getCFG();
778 // Do not inline large functions.
779 if (CalleeCFG->getNumBlockIDs() > Opts.getMaxInlinableSize())
782 // It is possible that the live variables analysis cannot be
783 // run. If so, bail out.
784 if (!CalleeADC->getAnalysis<RelaxedLiveVariables>())
790 bool ExprEngine::shouldInlineCall(const CallEvent &Call, const Decl *D,
791 const ExplodedNode *Pred) {
795 AnalysisManager &AMgr = getAnalysisManager();
796 AnalyzerOptions &Opts = AMgr.options;
797 AnalysisDeclContextManager &ADCMgr = AMgr.getAnalysisDeclContextManager();
798 AnalysisDeclContext *CalleeADC = ADCMgr.getContext(D);
800 // Temporary object destructor processing is currently broken, so we never
802 // FIXME: Remove this once temp destructors are working.
803 if (isa<CXXDestructorCall>(Call)) {
804 if ((*currBldrCtx->getBlock())[currStmtIdx].getAs<CFGTemporaryDtor>())
808 // The auto-synthesized bodies are essential to inline as they are
809 // usually small and commonly used. Note: we should do this check early on to
810 // ensure we always inline these calls.
811 if (CalleeADC->isBodyAutosynthesized())
814 if (!AMgr.shouldInlineCall())
817 // Check if this function has been marked as non-inlinable.
818 Optional<bool> MayInline = Engine.FunctionSummaries->mayInline(D);
819 if (MayInline.hasValue()) {
820 if (!MayInline.getValue())
824 // We haven't actually checked the static properties of this function yet.
825 // Do that now, and record our decision in the function summaries.
826 if (mayInlineDecl(CalleeADC, Opts)) {
827 Engine.FunctionSummaries->markMayInline(D);
829 Engine.FunctionSummaries->markShouldNotInline(D);
834 // Check if we should inline a call based on its kind.
835 // FIXME: this checks both static and dynamic properties of the call, which
836 // means we're redoing a bit of work that could be cached in the function
838 CallInlinePolicy CIP = mayInlineCallKind(Call, Pred, Opts);
839 if (CIP != CIP_Allowed) {
840 if (CIP == CIP_DisallowedAlways) {
841 assert(!MayInline.hasValue() || MayInline.getValue());
842 Engine.FunctionSummaries->markShouldNotInline(D);
847 const CFG *CalleeCFG = CalleeADC->getCFG();
849 // Do not inline if recursive or we've reached max stack frame count.
850 bool IsRecursive = false;
851 unsigned StackDepth = 0;
852 examineStackFrames(D, Pred->getLocationContext(), IsRecursive, StackDepth);
853 if ((StackDepth >= Opts.InlineMaxStackDepth) &&
854 ((CalleeCFG->getNumBlockIDs() > Opts.getAlwaysInlineSize())
858 // Do not inline large functions too many times.
859 if ((Engine.FunctionSummaries->getNumTimesInlined(D) >
860 Opts.getMaxTimesInlineLarge()) &&
861 CalleeCFG->getNumBlockIDs() >=
862 Opts.getMinCFGSizeTreatFunctionsAsLarge()) {
863 NumReachedInlineCountMax++;
867 if (HowToInline == Inline_Minimal &&
868 (CalleeCFG->getNumBlockIDs() > Opts.getAlwaysInlineSize()
875 static bool isTrivialObjectAssignment(const CallEvent &Call) {
876 const CXXInstanceCall *ICall = dyn_cast<CXXInstanceCall>(&Call);
880 const CXXMethodDecl *MD = dyn_cast_or_null<CXXMethodDecl>(ICall->getDecl());
883 if (!(MD->isCopyAssignmentOperator() || MD->isMoveAssignmentOperator()))
886 return MD->isTrivial();
889 void ExprEngine::defaultEvalCall(NodeBuilder &Bldr, ExplodedNode *Pred,
890 const CallEvent &CallTemplate) {
891 // Make sure we have the most recent state attached to the call.
892 ProgramStateRef State = Pred->getState();
893 CallEventRef<> Call = CallTemplate.cloneWithState(State);
895 // Special-case trivial assignment operators.
896 if (isTrivialObjectAssignment(*Call)) {
897 performTrivialCopy(Bldr, Pred, *Call);
901 // Try to inline the call.
902 // The origin expression here is just used as a kind of checksum;
903 // this should still be safe even for CallEvents that don't come from exprs.
904 const Expr *E = Call->getOriginExpr();
906 ProgramStateRef InlinedFailedState = getInlineFailedState(State, E);
907 if (InlinedFailedState) {
908 // If we already tried once and failed, make sure we don't retry later.
909 State = InlinedFailedState;
911 RuntimeDefinition RD = Call->getRuntimeDefinition();
912 const Decl *D = RD.getDecl();
913 if (shouldInlineCall(*Call, D, Pred)) {
914 if (RD.mayHaveOtherDefinitions()) {
915 AnalyzerOptions &Options = getAnalysisManager().options;
917 // Explore with and without inlining the call.
918 if (Options.getIPAMode() == IPAK_DynamicDispatchBifurcate) {
919 BifurcateCall(RD.getDispatchRegion(), *Call, D, Bldr, Pred);
923 // Don't inline if we're not in any dynamic dispatch mode.
924 if (Options.getIPAMode() != IPAK_DynamicDispatch) {
925 conservativeEvalCall(*Call, Bldr, Pred, State);
930 // We are not bifurcating and we do have a Decl, so just inline.
931 if (inlineCall(*Call, D, Bldr, Pred, State))
936 // If we can't inline it, handle the return value and invalidate the regions.
937 conservativeEvalCall(*Call, Bldr, Pred, State);
940 void ExprEngine::BifurcateCall(const MemRegion *BifurReg,
941 const CallEvent &Call, const Decl *D,
942 NodeBuilder &Bldr, ExplodedNode *Pred) {
944 BifurReg = BifurReg->StripCasts();
946 // Check if we've performed the split already - note, we only want
947 // to split the path once per memory region.
948 ProgramStateRef State = Pred->getState();
949 const unsigned *BState =
950 State->get<DynamicDispatchBifurcationMap>(BifurReg);
952 // If we are on "inline path", keep inlining if possible.
953 if (*BState == DynamicDispatchModeInlined)
954 if (inlineCall(Call, D, Bldr, Pred, State))
956 // If inline failed, or we are on the path where we assume we
957 // don't have enough info about the receiver to inline, conjure the
958 // return value and invalidate the regions.
959 conservativeEvalCall(Call, Bldr, Pred, State);
963 // If we got here, this is the first time we process a message to this
964 // region, so split the path.
965 ProgramStateRef IState =
966 State->set<DynamicDispatchBifurcationMap>(BifurReg,
967 DynamicDispatchModeInlined);
968 inlineCall(Call, D, Bldr, Pred, IState);
970 ProgramStateRef NoIState =
971 State->set<DynamicDispatchBifurcationMap>(BifurReg,
972 DynamicDispatchModeConservative);
973 conservativeEvalCall(Call, Bldr, Pred, NoIState);
975 NumOfDynamicDispatchPathSplits++;
978 void ExprEngine::VisitReturnStmt(const ReturnStmt *RS, ExplodedNode *Pred,
979 ExplodedNodeSet &Dst) {
980 ExplodedNodeSet dstPreVisit;
981 getCheckerManager().runCheckersForPreStmt(dstPreVisit, Pred, RS, *this);
983 StmtNodeBuilder B(dstPreVisit, Dst, *currBldrCtx);
985 if (RS->getRetValue()) {
986 for (ExplodedNodeSet::iterator it = dstPreVisit.begin(),
987 ei = dstPreVisit.end(); it != ei; ++it) {
988 B.generateNode(RS, *it, (*it)->getState());