[cfe-dev] [analyzer] Why use `checkPostCall()` to model the function semantics in `StdLibraryFunctionsChecker.cpp` ?

Artem Dergachev via cfe-dev cfe-dev at lists.llvm.org
Wed Apr 25 12:09:21 PDT 2018


StdLibraryFunctionsChecker uses evalCall for most calls it models. It 
uses checkPostCall only for few functions for which it models so little 
about the function that it's unlikely to ever be a problem for other 
checkers that may eventually want to model the function exactly. The 
checker's original intent was to cut away infeasible paths in the 
program, eg. preventing analysis of paths on which getline() is assumed 
to return -2. It is indeed a problem that other checkers are not able to 
reliably access this information immediately in their own checkPostCall, 
but currently there are no checkers that are actively relying on that. 
There are also discussions about introducing a system of dependencies 
between checkers so that dependent checkers automatically turned on 
checkers on which they depend and have their callbacks fire in a 
specific order, which could probably be already hacked up by writing 
weird registerChecker() functions that register dependencies first.

There are currently at least 4 different ways the analyzer can model a 
function:

1. Conservative evaluation (normal analyzer behavior when body of the 
function is unavailable).
2. Inlining (model the function precisely by jumping into it and 
proceeding with normal analysis inside it).
(1. and 2. will be collectively referred to as "default evaluation".)
3. Body farm (provide a simplified synthetic AST for the function body 
and then inline it).
4. evalCall() in checker (let a checker manipulate the program state 
manually to model arbitrary effects of the function).

Additionally, any checker may influence the analysis at almost any 
point, which should be used carefully. For instance, splitting the path 
or cutting away a path that seems infeasible is fine (as long as it is 
the desired behavior), replacing a value of an expression with a 
different value is bad.

When body farms were introduced, they seemed to be a great way of 
modeling library functions, and they are fairly effective for the few 
functions they were used for. But later a lot of functions turned out to 
be problematic to model that way - either because their simplified AST 
is too complicated to synthesize correctly (eg. std::call_once turned 
out to be extremely painful because we had to write down AST for 
template instantiations manually node-by-node without being able to rely 
on the compiler to help us with that) or because a good synthetic AST 
will not be understood by the analyzer anyway. 
StdLibraryFunctionsChecker is modeling some functions that fall to the 
latter category. You should be able to find further explanation of why 
they are hard to body-farm in the checker's comments.

The difference between evalCall and checkPostCall is that evalCall 
overrides the default evaluation. If a checker does evalCall(), the 
function will never be inlined or invalidate potentially accessible 
memory. The checker will also need to come up with a good representation 
of the return value and will have a chance to specify it. If two 
different checkers try to evalCall() the same call, the analyzer will 
defensively crash.

StdLibraryFunctionsChecker uses evalCall for modeling calls that it can 
model *exactly*.

It also uses checkPostCall for stuff that it can't model exactly, but 
for the lack of better modeling it can still model a few things that are 
safe to model in post-call, in addition to the effects of default 
evaluation. For example, it doesn't model the string (or even the length 
of the string) produced by getline() but it does know that this function 
never returns -2, so it cuts away the respective paths. If getline() is 
inlined or a different checker models it in evalCall or even in 
checkPostCall, StdLibraryFunctionsChecker will still work correctly, 
because, well, whatever the other modeling does, it shouldn't make 
getline() return -2. It might happen that another checker substitutes 
the return value in PostCall leading to a race, but that's the exact 
reason why substituting expression values after the expression is 
evaluated is a bad idea anywhere in the analyzer.

StdLibraryFunctionsChecker uses a custom system of function summaries 
which is relatively extensible but not super flexible. It should 
probably not used for modeling everything. In fact, i doubt it'd be easy 
to extend it to reliably model anything but range constraints. Side 
effects like "this function writes its 1st argument to memory pointed to 
by its 2nd argument" are already pretty unpleasant to summarize 
declaratively; add a couple of levels of pointer indirection and it'd be 
a nightmare.

So, adding more functions and side effect variants similar to what's 
already there is welcome. I'm moderately curious about how far this 
summary system can be pushed, but reliability comes first. Trying to 
model every function this way is not a great idea.

On 4/24/18 8:46 PM, Henry Wong via cfe-dev wrote:
> Hi all,
>
> `StdLibraryFunctionsChecker.cpp` is a very useful and great tool to 
> improve the modeling of library function. But I can't figure out why 
> use `checkPostCall()` to model the function samantic.
>
> What puzzles me is the order of API calls. For example, if we want to 
> make some checks on `getline()` in `CheckerA`, and use 
> `checkPostCall()` to collect information or set `ProgramState`, the 
> `checkPostCall()` of `CheckerA` is likely to be behind the 
> `checkPostCall()` of `StdLibraryFunctionsChecker.cpp`. At this point, 
> `CheckerA` does not use the model information of `getline()` in 
> `StdLibraryFunctionsChecker.cpp`. So what is the original intention of 
> using `checkPostCall()` to play the key role in modeling?
>
> And I want to know what plans community have for 
> `StdLibraryFunctionsChecker.cpp` in the future, for example, extend it 
> to handle more complex library functions?
>
> Thanks in advance!
>
> Henry Wong
> Qihoo 360 Codesafe Team
>
> _______________________________________________
> cfe-dev mailing list
> cfe-dev at lists.llvm.org
> http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-dev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/cfe-dev/attachments/20180425/c3f16e1d/attachment.html>


More information about the cfe-dev mailing list