[clang] nonblocking/nonallocating attributes: 2nd pass caller/callee analysis (PR #99656)
Doug Wyatt via cfe-commits
cfe-commits at lists.llvm.org
Wed Sep 25 17:29:56 PDT 2024
https://github.com/dougsonos updated https://github.com/llvm/llvm-project/pull/99656
>From 8c5f85492091df2432701f15f4ec4b6acfe19944 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Sun, 5 May 2024 12:36:53 -0700
Subject: [PATCH 01/59] nonblocking/nonallocating attributes: 2nd pass
caller/callee analysis/verification
---
clang/include/clang/AST/Type.h | 2 +-
clang/include/clang/Basic/DiagnosticGroups.td | 1 +
.../clang/Basic/DiagnosticSemaKinds.td | 49 +
clang/include/clang/Sema/Sema.h | 13 +
.../include/clang/Serialization/ASTBitCodes.h | 4 +
clang/include/clang/Serialization/ASTReader.h | 3 +
clang/include/clang/Serialization/ASTWriter.h | 1 +
clang/lib/Sema/AnalysisBasedWarnings.cpp | 1259 +++++++++++++++++
clang/lib/Sema/SemaDecl.cpp | 56 +
clang/lib/Sema/SemaExpr.cpp | 4 +
clang/lib/Sema/SemaLambda.cpp | 5 +
clang/lib/Serialization/ASTReader.cpp | 19 +
clang/lib/Serialization/ASTWriter.cpp | 12 +
.../Sema/attr-nonblocking-constraints.cpp | 194 +++
clang/test/Sema/attr-nonblocking-syntax.cpp | 1 +
.../attr-nonblocking-constraints.mm | 23 +
16 files changed, 1645 insertions(+), 1 deletion(-)
create mode 100644 clang/test/Sema/attr-nonblocking-constraints.cpp
create mode 100644 clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index 25defea58c2dc2..08141f75de8dbc 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4699,7 +4699,7 @@ class FunctionEffect {
private:
LLVM_PREFERRED_TYPE(Kind)
- unsigned FKind : 3;
+ uint8_t FKind : 3;
// Expansion: for hypothetical TCB+types, there could be one Kind for TCB,
// then ~16(?) bits "SubKind" to map to a specific named TCB. SubKind would
diff --git a/clang/include/clang/Basic/DiagnosticGroups.td b/clang/include/clang/Basic/DiagnosticGroups.td
index 19c3f1e0433496..55d9442a939dae 100644
--- a/clang/include/clang/Basic/DiagnosticGroups.td
+++ b/clang/include/clang/Basic/DiagnosticGroups.td
@@ -1557,6 +1557,7 @@ def UnsafeBufferUsage : DiagGroup<"unsafe-buffer-usage", [UnsafeBufferUsageInCon
// Warnings and notes related to the function effects system underlying
// the nonblocking and nonallocating attributes.
def FunctionEffects : DiagGroup<"function-effects">;
+def PerfConstraintImpliesNoexcept : DiagGroup<"perf-constraint-implies-noexcept">;
// Warnings and notes InstallAPI verification.
def InstallAPIViolation : DiagGroup<"installapi-violation">;
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index d60f32674ca3a6..ec02c02d158c89 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10928,6 +10928,55 @@ def warn_imp_cast_drops_unaligned : Warning<
InGroup<DiagGroup<"unaligned-qualifier-implicit-cast">>;
// Function effects
+def warn_func_effect_allocates : Warning<
+ "'%0' function must not allocate or deallocate memory">,
+ InGroup<FunctionEffects>;
+def note_func_effect_allocates : Note<
+ "function cannot be inferred '%0' because it allocates/deallocates memory">;
+def warn_func_effect_throws_or_catches : Warning<
+ "'%0' function must not throw or catch exceptions">,
+ InGroup<FunctionEffects>;
+def note_func_effect_throws_or_catches : Note<
+ "function cannot be inferred '%0' because it throws or catches exceptions">;
+def warn_func_effect_has_static_local : Warning<
+ "'%0' function must not have static locals">,
+ InGroup<FunctionEffects>;
+def note_func_effect_has_static_local : Note<
+ "function cannot be inferred '%0' because it has a static local">;
+def warn_func_effect_uses_thread_local : Warning<
+ "'%0' function must not use thread-local variables">,
+ InGroup<FunctionEffects>;
+def note_func_effect_uses_thread_local : Note<
+ "function cannot be inferred '%0' because it uses a thread-local variable">;
+def warn_func_effect_calls_objc : Warning<
+ "'%0' function must not access an ObjC method or property">,
+ InGroup<FunctionEffects>;
+def note_func_effect_calls_objc : Note<
+ "function cannot be inferred '%0' because it accesses an ObjC method or property">;
+def warn_func_effect_calls_func_without_effect : Warning<
+ "'%0' function must not call non-'%0' function '%1'">,
+ InGroup<FunctionEffects>;
+def warn_func_effect_calls_expr_without_effect : Warning<
+ "'%0' function must not call non-'%0' expression">,
+ InGroup<FunctionEffects>;
+def note_func_effect_calls_func_without_effect : Note<
+ "function cannot be inferred '%0' because it calls non-'%0' function '%1'">;
+def note_func_effect_call_extern : Note<
+ "function cannot be inferred '%0' because it has no definition in this translation unit">;
+def note_func_effect_call_disallows_inference : Note<
+ "function does not permit inference of '%0'">;
+def note_func_effect_call_virtual : Note<
+ "virtual method cannot be inferred '%0'">;
+def note_func_effect_call_func_ptr : Note<
+ "function pointer cannot be inferred '%0'">;
+def warn_perf_constraint_implies_noexcept : Warning<
+ "'%0' function should be declared noexcept">,
+ InGroup<PerfConstraintImpliesNoexcept>;
+
+// FIXME: It would be nice if we could provide fuller template expansion notes.
+def note_func_effect_from_template : Note<
+ "in template expansion here">;
+
// spoofing nonblocking/nonallocating
def warn_invalid_add_func_effects : Warning<
"attribute '%0' should not be added via type conversion">,
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index d638d31e050dc6..e1867348497da8 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -875,6 +875,13 @@ class Sema final : public SemaBase {
// ----- function effects ---
+ /// All functions/lambdas/blocks which have bodies and which have a non-empty
+ /// FunctionEffectsRef to be verified.
+ SmallVector<const Decl *> DeclsWithEffectsToVerify;
+ /// The union of all effects present on DeclsWithEffectsToVerify. Conditions
+ /// are all null.
+ FunctionEffectSet AllEffectsToVerify;
+
/// Warn when implicitly changing function effects.
void diagnoseFunctionEffectConversion(QualType DstType, QualType SrcType,
SourceLocation Loc);
@@ -891,6 +898,12 @@ class Sema final : public SemaBase {
SourceLocation NewLoc,
SourceLocation OldLoc);
+ /// Potentially add a FunctionDecl or BlockDecl to DeclsWithEffectsToVerify.
+ void maybeAddDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
+
+ /// Unconditionally add a Decl to DeclsWithEfffectsToVerify.
+ void addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
+
/// Try to parse the conditional expression attached to an effect attribute
/// (e.g. 'nonblocking'). (c.f. Sema::ActOnNoexceptSpec). Return an empty
/// optional on error.
diff --git a/clang/include/clang/Serialization/ASTBitCodes.h b/clang/include/clang/Serialization/ASTBitCodes.h
index 5dd0ba33f8a9c2..b975db88dbaae6 100644
--- a/clang/include/clang/Serialization/ASTBitCodes.h
+++ b/clang/include/clang/Serialization/ASTBitCodes.h
@@ -721,6 +721,10 @@ enum ASTRecordTypes {
/// Record code for \#pragma clang unsafe_buffer_usage begin/end
PP_UNSAFE_BUFFER_USAGE = 69,
+
+ /// Record code for Sema's vector of functions/blocks with effects to
+ /// be verified.
+ DECLS_WITH_EFFECTS_TO_VERIFY = 70,
};
/// Record types used within a source manager block.
diff --git a/clang/include/clang/Serialization/ASTReader.h b/clang/include/clang/Serialization/ASTReader.h
index 76e51ac7ab9792..1d8985602146ba 100644
--- a/clang/include/clang/Serialization/ASTReader.h
+++ b/clang/include/clang/Serialization/ASTReader.h
@@ -948,6 +948,9 @@ class ASTReader
/// Sema tracks these to emit deferred diags.
llvm::SmallSetVector<GlobalDeclID, 4> DeclsToCheckForDeferredDiags;
+ /// The IDs of all decls with function effects to be checked.
+ SmallVector<GlobalDeclID, 0> DeclsWithEffectsToVerify;
+
private:
struct ImportedSubmodule {
serialization::SubmoduleID ID;
diff --git a/clang/include/clang/Serialization/ASTWriter.h b/clang/include/clang/Serialization/ASTWriter.h
index a0e475ec9f862c..4eaf77e8cb8d99 100644
--- a/clang/include/clang/Serialization/ASTWriter.h
+++ b/clang/include/clang/Serialization/ASTWriter.h
@@ -592,6 +592,7 @@ class ASTWriter : public ASTDeserializationListener,
void WriteMSPointersToMembersPragmaOptions(Sema &SemaRef);
void WritePackPragmaOptions(Sema &SemaRef);
void WriteFloatControlPragmaOptions(Sema &SemaRef);
+ void WriteDeclsWithEffectsToVerify(Sema &SemaRef);
void WriteModuleFileExtension(Sema &SemaRef,
ModuleFileExtensionWriter &Writer);
diff --git a/clang/lib/Sema/AnalysisBasedWarnings.cpp b/clang/lib/Sema/AnalysisBasedWarnings.cpp
index 0f604c61fa3af9..3909d5b44a32e7 100644
--- a/clang/lib/Sema/AnalysisBasedWarnings.cpp
+++ b/clang/lib/Sema/AnalysisBasedWarnings.cpp
@@ -2397,6 +2397,1262 @@ class UnsafeBufferUsageReporter : public UnsafeBufferUsageHandler {
};
} // namespace
+// =============================================================================
+
+namespace FXAnalysis {
+
+enum class DiagnosticID : uint8_t {
+ None = 0, // sentinel for an empty Diagnostic
+ Throws,
+ Catches,
+ CallsObjC,
+ AllocatesMemory,
+ HasStaticLocal,
+ AccessesThreadLocal,
+
+ // These only apply to callees, where the analysis stops at the Decl
+ DeclDisallowsInference,
+
+ CallsDeclWithoutEffect,
+ CallsExprWithoutEffect,
+};
+
+// Holds an effect diagnosis, potentially for the entire duration of the
+// analysis phase, in order to refer to it when explaining why a caller has been
+// made unsafe by a callee.
+struct Diagnostic {
+ FunctionEffect Effect;
+ DiagnosticID ID = DiagnosticID::None;
+ SourceLocation Loc;
+ const Decl *Callee = nullptr; // only valid for Calls*
+
+ Diagnostic() = default;
+
+ Diagnostic(const FunctionEffect &Effect, DiagnosticID ID, SourceLocation Loc,
+ const Decl *Callee = nullptr)
+ : Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {}
+};
+
+enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
+enum class CallType {
+ // unknown: probably function pointer
+ Unknown,
+ Function,
+ Virtual,
+ Block
+};
+
+// Return whether a function's effects CAN be verified.
+// The question of whether it SHOULD be verified is independent.
+static bool functionIsVerifiable(const FunctionDecl *FD) {
+ if (!(FD->hasBody() || FD->isInlined())) {
+ // externally defined; we couldn't verify if we wanted to.
+ return false;
+ }
+ if (FD->isTrivial()) {
+ // Otherwise `struct x { int a; };` would have an unverifiable default
+ // constructor.
+ return true;
+ }
+ return true;
+}
+
+/// A mutable set of FunctionEffect, for use in places where any conditions
+/// have been resolved or can be ignored.
+class EffectSet {
+ // This implementation optimizes footprint, since we hold one of these for
+ // every function visited, which, due to inference, can be many more functions
+ // than have declared effects.
+
+ template <typename T, typename SizeT, SizeT Capacity> struct FixedVector {
+ SizeT Count = 0;
+ T Items[Capacity] = {};
+
+ using value_type = T;
+
+ using iterator = T *;
+ using const_iterator = const T *;
+ iterator begin() { return &Items[0]; }
+ iterator end() { return &Items[Count]; }
+ const_iterator begin() const { return &Items[0]; }
+ const_iterator end() const { return &Items[Count]; }
+ const_iterator cbegin() const { return &Items[0]; }
+ const_iterator cend() const { return &Items[Count]; }
+
+ void insert(iterator I, const T &Value) {
+ assert(Count < Capacity);
+ iterator E = end();
+ if (I != E)
+ std::copy_backward(I, E, E + 1);
+ *I = Value;
+ ++Count;
+ }
+
+ void push_back(const T &Value) {
+ assert(Count < Capacity);
+ Items[Count++] = Value;
+ }
+ };
+
+ // As long as FunctionEffect is only 1 byte, and there are only 2 verifiable
+ // effects, this fixed-size vector with a capacity of 7 is more than
+ // sufficient and is only 8 bytes.
+ FixedVector<FunctionEffect, uint8_t, 7> Impl;
+
+public:
+ EffectSet() = default;
+ explicit EffectSet(FunctionEffectsRef FX) { insert(FX); }
+
+ operator ArrayRef<FunctionEffect>() const {
+ return ArrayRef(Impl.cbegin(), Impl.cend());
+ }
+
+ using iterator = const FunctionEffect *;
+ iterator begin() const { return Impl.cbegin(); }
+ iterator end() const { return Impl.cend(); }
+
+ void insert(const FunctionEffect &Effect) {
+ FunctionEffect *Iter = Impl.begin();
+ FunctionEffect *End = Impl.end();
+ // linear search; lower_bound is overkill for a tiny vector like this
+ for (; Iter != End; ++Iter) {
+ if (*Iter == Effect)
+ return;
+ if (Effect < *Iter)
+ break;
+ }
+ Impl.insert(Iter, Effect);
+ }
+ void insert(const EffectSet &Set) {
+ for (const FunctionEffect &Item : Set) {
+ // push_back because set is already sorted
+ Impl.push_back(Item);
+ }
+ }
+ void insert(FunctionEffectsRef FX) {
+ for (const FunctionEffectWithCondition &EC : FX) {
+ assert(EC.Cond.getCondition() ==
+ nullptr); // should be resolved by now, right?
+ // push_back because set is already sorted
+ Impl.push_back(EC.Effect);
+ }
+ }
+ bool contains(const FunctionEffect::Kind EK) const {
+ for (const FunctionEffect &E : Impl)
+ if (E.kind() == EK)
+ return true;
+ return false;
+ }
+
+ void dump(llvm::raw_ostream &OS) const;
+
+ static EffectSet difference(ArrayRef<FunctionEffect> LHS,
+ ArrayRef<FunctionEffect> RHS) {
+ EffectSet Result;
+ std::set_difference(LHS.begin(), LHS.end(), RHS.begin(), RHS.end(),
+ std::back_inserter(Result.Impl));
+ return Result;
+ }
+};
+
+LLVM_DUMP_METHOD void EffectSet::dump(llvm::raw_ostream &OS) const {
+ OS << "Effects{";
+ bool First = true;
+ for (const FunctionEffect &Effect : *this) {
+ if (!First)
+ OS << ", ";
+ else
+ First = false;
+ OS << Effect.name();
+ }
+ OS << "}";
+}
+
+// Transitory, more extended information about a callable, which can be a
+// function, block, function pointer, etc.
+struct CallableInfo {
+ // CDecl holds the function's definition, if any.
+ // FunctionDecl if CallType::Function or Virtual
+ // BlockDecl if CallType::Block
+ const Decl *CDecl;
+ mutable std::optional<std::string> MaybeName;
+ SpecialFuncType FuncType = SpecialFuncType::None;
+ EffectSet Effects;
+ CallType CType = CallType::Unknown;
+
+ CallableInfo(Sema &SemaRef, const Decl &CD,
+ SpecialFuncType FT = SpecialFuncType::None)
+ : CDecl(&CD), FuncType(FT) {
+ FunctionEffectsRef FXRef;
+
+ if (auto *FD = dyn_cast<FunctionDecl>(CDecl)) {
+ // Use the function's definition, if any.
+ if (const FunctionDecl *Def = FD->getDefinition())
+ CDecl = FD = Def;
+ CType = CallType::Function;
+ if (auto *Method = dyn_cast<CXXMethodDecl>(FD);
+ Method && Method->isVirtual())
+ CType = CallType::Virtual;
+ FXRef = FD->getFunctionEffects();
+ } else if (auto *BD = dyn_cast<BlockDecl>(CDecl)) {
+ CType = CallType::Block;
+ FXRef = BD->getFunctionEffects();
+ } else if (auto *VD = dyn_cast<ValueDecl>(CDecl)) {
+ // ValueDecl is function, enum, or variable, so just look at its type.
+ FXRef = FunctionEffectsRef::get(VD->getType());
+ }
+ Effects = EffectSet(FXRef);
+ }
+
+ bool isDirectCall() const {
+ return CType == CallType::Function || CType == CallType::Block;
+ }
+
+ bool isVerifiable() const {
+ switch (CType) {
+ case CallType::Unknown:
+ case CallType::Virtual:
+ break;
+ case CallType::Block:
+ return true;
+ case CallType::Function:
+ return functionIsVerifiable(dyn_cast<FunctionDecl>(CDecl));
+ }
+ return false;
+ }
+
+ /// Generate a name for logging and diagnostics.
+ std::string name(Sema &Sem) const {
+ if (!MaybeName) {
+ std::string Name;
+ llvm::raw_string_ostream OS(Name);
+
+ if (auto *FD = dyn_cast<FunctionDecl>(CDecl))
+ FD->getNameForDiagnostic(OS, Sem.getPrintingPolicy(),
+ /*Qualified=*/true);
+ else if (auto *BD = dyn_cast<BlockDecl>(CDecl))
+ OS << "(block " << BD->getBlockManglingNumber() << ")";
+ else if (auto *VD = dyn_cast<NamedDecl>(CDecl))
+ VD->printQualifiedName(OS);
+ MaybeName = Name;
+ }
+ return *MaybeName;
+ }
+};
+
+// ----------
+// Map effects to single diagnostics, to hold the first (of potentially many)
+// diagnostics pertaining to an effect, per function.
+class EffectToDiagnosticMap {
+ // Since we currently only have a tiny number of effects (typically no more
+ // than 1), use a sorted SmallVector with an inline capacity of 1. Since it
+ // is often empty, use a unique_ptr to the SmallVector.
+ // Note that Diagnostic itself contains a FunctionEffect which is the key.
+ using ImplVec = llvm::SmallVector<Diagnostic, 1>;
+ std::unique_ptr<ImplVec> Impl;
+
+public:
+ // Insert a new diagnostic if we do not already have one for its effect.
+ void maybeInsert(const Diagnostic &Diag) {
+ if (Impl == nullptr)
+ Impl = std::make_unique<ImplVec>();
+ auto *Iter = _find(Diag.Effect);
+ if (Iter != Impl->end() && Iter->Effect == Diag.Effect)
+ return;
+
+ Impl->insert(Iter, Diag);
+ }
+
+ const Diagnostic *lookup(FunctionEffect Key) {
+ if (Impl == nullptr)
+ return nullptr;
+
+ auto *Iter = _find(Key);
+ if (Iter != Impl->end() && Iter->Effect == Key)
+ return &*Iter;
+
+ return nullptr;
+ }
+
+ size_t size() const { return Impl ? Impl->size() : 0; }
+
+private:
+ ImplVec::iterator _find(const FunctionEffect &key) {
+ // A linear search suffices for a tiny number of possible effects.
+ auto *End = Impl->end();
+ for (auto *Iter = Impl->begin(); Iter != End; ++Iter)
+ if (!(Iter->Effect < key))
+ return Iter;
+ return End;
+ }
+};
+
+// ----------
+// State pertaining to a function whose AST is walked and whose effect analysis
+// is dependent on a subsequent analysis of other functions.
+class PendingFunctionAnalysis {
+ friend class CompleteFunctionAnalysis;
+
+public:
+ struct DirectCall {
+ const Decl *Callee;
+ SourceLocation CallLoc;
+ // Not all recursive calls are detected, just enough
+ // to break cycles.
+ bool Recursed = false;
+
+ DirectCall(const Decl *D, SourceLocation CallLoc)
+ : Callee(D), CallLoc(CallLoc) {}
+ };
+
+ // We always have two disjoint sets of effects to verify:
+ // 1. Effects declared explicitly by this function.
+ // 2. All other inferrable effects needing verification.
+ EffectSet DeclaredVerifiableEffects;
+ EffectSet FXToInfer;
+
+private:
+ // Diagnostics pertaining to the function's explicit effects.
+ SmallVector<Diagnostic, 0> DiagnosticsForExplicitFX;
+
+ // Diagnostics pertaining to other, non-explicit, inferrable effects.
+ EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
+
+ // These unverified direct calls are what keeps the analysis "pending",
+ // until the callees can be verified.
+ SmallVector<DirectCall, 0> UnverifiedDirectCalls;
+
+public:
+ PendingFunctionAnalysis(
+ Sema &Sem, const CallableInfo &CInfo,
+ ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
+ DeclaredVerifiableEffects = CInfo.Effects;
+
+ // Check for effects we are not allowed to infer
+ EffectSet InferrableFX;
+
+ for (const FunctionEffect &effect : AllInferrableEffectsToVerify) {
+ if (effect.canInferOnFunction(*CInfo.CDecl))
+ InferrableFX.insert(effect);
+ else {
+ // Add a diagnostic for this effect if a caller were to
+ // try to infer it.
+ InferrableEffectToFirstDiagnostic.maybeInsert(
+ Diagnostic(effect, DiagnosticID::DeclDisallowsInference,
+ CInfo.CDecl->getLocation()));
+ }
+ }
+ // InferrableFX is now the set of inferrable effects which are not
+ // prohibited
+ FXToInfer = EffectSet::difference(InferrableFX, DeclaredVerifiableEffects);
+ }
+
+ // Hide the way that diagnostics for explicitly required effects vs. inferred
+ // ones are handled differently.
+ void checkAddDiagnostic(bool Inferring, const Diagnostic &NewDiag) {
+ if (!Inferring)
+ DiagnosticsForExplicitFX.push_back(NewDiag);
+ else
+ InferrableEffectToFirstDiagnostic.maybeInsert(NewDiag);
+ }
+
+ void addUnverifiedDirectCall(const Decl *D, SourceLocation CallLoc) {
+ UnverifiedDirectCalls.emplace_back(D, CallLoc);
+ }
+
+ // Analysis is complete when there are no unverified direct calls.
+ bool isComplete() const { return UnverifiedDirectCalls.empty(); }
+
+ const Diagnostic *diagnosticForInferrableEffect(FunctionEffect effect) {
+ return InferrableEffectToFirstDiagnostic.lookup(effect);
+ }
+
+ SmallVector<DirectCall, 0> &unverifiedCalls() {
+ assert(!isComplete());
+ return UnverifiedDirectCalls;
+ }
+
+ SmallVector<Diagnostic, 0> &getDiagnosticsForExplicitFX() {
+ return DiagnosticsForExplicitFX;
+ }
+
+ void dump(Sema &SemaRef, llvm::raw_ostream &OS) const {
+ OS << "Pending: Declared ";
+ DeclaredVerifiableEffects.dump(OS);
+ OS << ", " << DiagnosticsForExplicitFX.size() << " diags; ";
+ OS << " Infer ";
+ FXToInfer.dump(OS);
+ OS << ", " << InferrableEffectToFirstDiagnostic.size() << " diags";
+ if (!UnverifiedDirectCalls.empty()) {
+ OS << "; Calls: ";
+ for (const DirectCall &Call : UnverifiedDirectCalls) {
+ CallableInfo CI(SemaRef, *Call.Callee);
+ OS << " " << CI.name(SemaRef);
+ }
+ }
+ OS << "\n";
+ }
+};
+
+// ----------
+class CompleteFunctionAnalysis {
+ // Current size: 2 pointers
+public:
+ // Has effects which are both the declared ones -- not to be inferred -- plus
+ // ones which have been successfully inferred. These are all considered
+ // "verified" for the purposes of callers; any issue with verifying declared
+ // effects has already been reported and is not the problem of any caller.
+ EffectSet VerifiedEffects;
+
+private:
+ // This is used to generate notes about failed inference.
+ EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
+
+public:
+ // The incoming Pending analysis is consumed (member(s) are moved-from).
+ CompleteFunctionAnalysis(
+ ASTContext &Ctx, PendingFunctionAnalysis &Pending,
+ const EffectSet &DeclaredEffects,
+ ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
+ VerifiedEffects.insert(DeclaredEffects);
+ for (const FunctionEffect &effect : AllInferrableEffectsToVerify)
+ if (Pending.diagnosticForInferrableEffect(effect) == nullptr)
+ VerifiedEffects.insert(effect);
+
+ InferrableEffectToFirstDiagnostic =
+ std::move(Pending.InferrableEffectToFirstDiagnostic);
+ }
+
+ const Diagnostic *firstDiagnosticForEffect(const FunctionEffect &Effect) {
+ return InferrableEffectToFirstDiagnostic.lookup(Effect);
+ }
+
+ void dump(llvm::raw_ostream &OS) const {
+ OS << "Complete: Verified ";
+ VerifiedEffects.dump(OS);
+ OS << "; Infer ";
+ OS << InferrableEffectToFirstDiagnostic.size() << " diags\n";
+ }
+};
+
+const Decl *CanonicalFunctionDecl(const Decl *D) {
+ if (auto *FD = dyn_cast<FunctionDecl>(D)) {
+ FD = FD->getCanonicalDecl();
+ assert(FD != nullptr);
+ return FD;
+ }
+ return D;
+}
+
+// ==========
+class Analyzer {
+ constexpr static int DebugLogLevel = 0;
+ // --
+ Sema &Sem;
+
+ // Subset of Sema.AllEffectsToVerify
+ EffectSet AllInferrableEffectsToVerify;
+
+ using FuncAnalysisPtr =
+ llvm::PointerUnion<PendingFunctionAnalysis *, CompleteFunctionAnalysis *>;
+
+ // Map all Decls analyzed to FuncAnalysisPtr. Pending state is larger
+ // than complete state, so use different objects to represent them.
+ // The state pointers are owned by the container.
+ class AnalysisMap : protected llvm::DenseMap<const Decl *, FuncAnalysisPtr> {
+ using Base = llvm::DenseMap<const Decl *, FuncAnalysisPtr>;
+
+ public:
+ ~AnalysisMap();
+
+ // Use non-public inheritance in order to maintain the invariant
+ // that lookups and insertions are via the canonical Decls.
+
+ FuncAnalysisPtr lookup(const Decl *Key) const {
+ return Base::lookup(CanonicalFunctionDecl(Key));
+ }
+
+ FuncAnalysisPtr &operator[](const Decl *Key) {
+ return Base::operator[](CanonicalFunctionDecl(Key));
+ }
+
+ /// Shortcut for the case where we only care about completed analysis.
+ CompleteFunctionAnalysis *completedAnalysisForDecl(const Decl *D) const {
+ if (FuncAnalysisPtr AP = lookup(D);
+ isa_and_nonnull<CompleteFunctionAnalysis *>(AP))
+ return AP.get<CompleteFunctionAnalysis *>();
+ return nullptr;
+ }
+
+ void dump(Sema &SemaRef, llvm::raw_ostream &OS) {
+ OS << "\nAnalysisMap:\n";
+ for (const auto &item : *this) {
+ CallableInfo CI(SemaRef, *item.first);
+ const auto AP = item.second;
+ OS << item.first << " " << CI.name(SemaRef) << " : ";
+ if (AP.isNull())
+ OS << "null\n";
+ else if (isa<CompleteFunctionAnalysis *>(AP)) {
+ auto *CFA = AP.get<CompleteFunctionAnalysis *>();
+ OS << CFA << " ";
+ CFA->dump(OS);
+ } else if (isa<PendingFunctionAnalysis *>(AP)) {
+ auto *PFA = AP.get<PendingFunctionAnalysis *>();
+ OS << PFA << " ";
+ PFA->dump(SemaRef, OS);
+ } else
+ llvm_unreachable("never");
+ }
+ OS << "---\n";
+ }
+ };
+ AnalysisMap DeclAnalysis;
+
+public:
+ Analyzer(Sema &S) : Sem(S) {}
+
+ void run(const TranslationUnitDecl &TU) {
+ // Gather all of the effects to be verified to see what operations need to
+ // be checked, and to see which ones are inferrable.
+ for (const FunctionEffectWithCondition &CFE : Sem.AllEffectsToVerify) {
+ const FunctionEffect &Effect = CFE.Effect;
+ const FunctionEffect::Flags Flags = Effect.flags();
+ if (Flags & FunctionEffect::FE_InferrableOnCallees)
+ AllInferrableEffectsToVerify.insert(Effect);
+ }
+ if constexpr (DebugLogLevel > 0) {
+ llvm::outs() << "AllInferrableEffectsToVerify: ";
+ AllInferrableEffectsToVerify.dump(llvm::outs());
+ llvm::outs() << "\n";
+ }
+
+ // We can use DeclsWithEffectsToVerify as a stack for a
+ // depth-first traversal; there's no need for a second container. But first,
+ // reverse it, so when working from the end, Decls are verified in the order
+ // they are declared.
+ SmallVector<const Decl *> &VerificationQueue = Sem.DeclsWithEffectsToVerify;
+ std::reverse(VerificationQueue.begin(), VerificationQueue.end());
+
+ while (!VerificationQueue.empty()) {
+ const Decl *D = VerificationQueue.back();
+ if (FuncAnalysisPtr AP = DeclAnalysis.lookup(D)) {
+ if (isa<CompleteFunctionAnalysis *>(AP)) {
+ // already done
+ VerificationQueue.pop_back();
+ continue;
+ }
+ if (isa<PendingFunctionAnalysis *>(AP)) {
+ // All children have been traversed; finish analysis.
+ auto *Pending = AP.get<PendingFunctionAnalysis *>();
+ finishPendingAnalysis(D, Pending);
+ VerificationQueue.pop_back();
+ continue;
+ }
+ llvm_unreachable("unexpected DeclAnalysis item");
+ }
+
+ // Not previously visited; begin a new analysis for this Decl.
+ PendingFunctionAnalysis *Pending = verifyDecl(D);
+ if (Pending == nullptr) {
+ // completed now
+ VerificationQueue.pop_back();
+ continue;
+ }
+
+ // Analysis remains pending because there are direct callees to be
+ // verified first. Push them onto the queue.
+ for (PendingFunctionAnalysis::DirectCall &Call :
+ Pending->unverifiedCalls()) {
+ FuncAnalysisPtr AP = DeclAnalysis.lookup(Call.Callee);
+ if (AP.isNull()) {
+ VerificationQueue.push_back(Call.Callee);
+ continue;
+ }
+ if (isa<PendingFunctionAnalysis *>(AP)) {
+ // This indicates recursion (not necessarily direct). For the
+ // purposes of effect analysis, we can just ignore it since
+ // no effects forbid recursion.
+ Call.Recursed = true;
+ continue;
+ }
+ llvm_unreachable("unexpected DeclAnalysis item");
+ }
+ }
+ }
+
+private:
+ // Verify a single Decl. Return the pending structure if that was the result,
+ // else null. This method must not recurse.
+ PendingFunctionAnalysis *verifyDecl(const Decl *D) {
+ CallableInfo CInfo(Sem, *D);
+ bool isExternC = false;
+
+ if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
+ assert(FD->getBuiltinID() == 0);
+ isExternC = FD->getCanonicalDecl()->isExternCContext();
+ }
+
+ // For C++, with non-extern "C" linkage only - if any of the Decl's declared
+ // effects forbid throwing (e.g. nonblocking) then the function should also
+ // be declared noexcept.
+ if (Sem.getLangOpts().CPlusPlus && !isExternC) {
+ for (const FunctionEffect &Effect : CInfo.Effects) {
+ if (!(Effect.flags() & FunctionEffect::FE_ExcludeThrow))
+ continue;
+
+ bool IsNoexcept = false;
+ if (auto *FD = D->getAsFunction()) {
+ IsNoexcept = isNoexcept(FD);
+ } else if (auto *BD = dyn_cast<BlockDecl>(D)) {
+ if (auto *TSI = BD->getSignatureAsWritten()) {
+ auto *FPT = TSI->getType()->getAs<FunctionProtoType>();
+ IsNoexcept = FPT->isNothrow() || BD->hasAttr<NoThrowAttr>();
+ }
+ }
+ if (!IsNoexcept)
+ Sem.Diag(D->getBeginLoc(),
+ diag::warn_perf_constraint_implies_noexcept)
+ << Effect.name();
+ break;
+ }
+ }
+
+ // Build a PendingFunctionAnalysis on the stack. If it turns out to be
+ // complete, we'll have avoided a heap allocation; if it's incomplete, it's
+ // a fairly trivial move to a heap-allocated object.
+ PendingFunctionAnalysis FAnalysis(Sem, CInfo, AllInferrableEffectsToVerify);
+
+ if constexpr (DebugLogLevel > 0) {
+ llvm::outs() << "\nVerifying " << CInfo.name(Sem) << " ";
+ FAnalysis.dump(Sem, llvm::outs());
+ }
+
+ FunctionBodyASTVisitor Visitor(*this, FAnalysis, CInfo);
+
+ Visitor.run();
+ if (FAnalysis.isComplete()) {
+ completeAnalysis(CInfo, FAnalysis);
+ return nullptr;
+ }
+ // Move the pending analysis to the heap and save it in the map.
+ PendingFunctionAnalysis *PendingPtr =
+ new PendingFunctionAnalysis(std::move(FAnalysis));
+ DeclAnalysis[D] = PendingPtr;
+ if constexpr (DebugLogLevel > 0) {
+ llvm::outs() << "inserted pending " << PendingPtr << "\n";
+ DeclAnalysis.dump(Sem, llvm::outs());
+ }
+ return PendingPtr;
+ }
+
+ // Consume PendingFunctionAnalysis, create with it a CompleteFunctionAnalysis,
+ // inserted in the container.
+ void completeAnalysis(const CallableInfo &CInfo,
+ PendingFunctionAnalysis &Pending) {
+ if (SmallVector<Diagnostic, 0> &Diags =
+ Pending.getDiagnosticsForExplicitFX();
+ !Diags.empty())
+ emitDiagnostics(Diags, CInfo, Sem);
+
+ CompleteFunctionAnalysis *CompletePtr = new CompleteFunctionAnalysis(
+ Sem.getASTContext(), Pending, CInfo.Effects,
+ AllInferrableEffectsToVerify);
+ DeclAnalysis[CInfo.CDecl] = CompletePtr;
+ if constexpr (DebugLogLevel > 0) {
+ llvm::outs() << "inserted complete " << CompletePtr << "\n";
+ DeclAnalysis.dump(Sem, llvm::outs());
+ }
+ }
+
+ // Called after all direct calls requiring inference have been found -- or
+ // not. Repeats calls to FunctionBodyASTVisitor::followCall() but without
+ // the possibility of inference. Deletes Pending.
+ void finishPendingAnalysis(const Decl *D, PendingFunctionAnalysis *Pending) {
+ CallableInfo Caller(Sem, *D);
+ if constexpr (DebugLogLevel > 0) {
+ llvm::outs() << "finishPendingAnalysis for " << Caller.name(Sem) << " : ";
+ Pending->dump(Sem, llvm::outs());
+ llvm::outs() << "\n";
+ }
+ for (const PendingFunctionAnalysis::DirectCall &Call :
+ Pending->unverifiedCalls()) {
+ if (Call.Recursed)
+ continue;
+
+ CallableInfo Callee(Sem, *Call.Callee);
+ followCall(Caller, *Pending, Callee, Call.CallLoc,
+ /*AssertNoFurtherInference=*/true);
+ }
+ completeAnalysis(Caller, *Pending);
+ delete Pending;
+ }
+
+ // Here we have a call to a Decl, either explicitly via a CallExpr or some
+ // other AST construct. PFA pertains to the caller.
+ void followCall(const CallableInfo &Caller, PendingFunctionAnalysis &PFA,
+ const CallableInfo &Callee, SourceLocation CallLoc,
+ bool AssertNoFurtherInference) {
+ const bool DirectCall = Callee.isDirectCall();
+
+ // Initially, the declared effects; inferred effects will be added.
+ EffectSet CalleeEffects = Callee.Effects;
+
+ bool IsInferencePossible = DirectCall;
+
+ if (DirectCall) {
+ if (CompleteFunctionAnalysis *CFA =
+ DeclAnalysis.completedAnalysisForDecl(Callee.CDecl)) {
+ // Combine declared effects with those which may have been inferred.
+ CalleeEffects.insert(CFA->VerifiedEffects);
+ IsInferencePossible = false; // we've already traversed it
+ }
+ }
+
+ if (AssertNoFurtherInference) {
+ assert(!IsInferencePossible);
+ }
+
+ if (!Callee.isVerifiable())
+ IsInferencePossible = false;
+
+ if constexpr (DebugLogLevel > 0) {
+ llvm::outs() << "followCall from " << Caller.name(Sem) << " to "
+ << Callee.name(Sem)
+ << "; verifiable: " << Callee.isVerifiable() << "; callee ";
+ CalleeEffects.dump(llvm::outs());
+ llvm::outs() << "\n";
+ llvm::outs() << " callee " << Callee.CDecl << " canonical "
+ << CanonicalFunctionDecl(Callee.CDecl) << " redecls";
+ for (Decl *D : Callee.CDecl->redecls())
+ llvm::outs() << " " << D;
+
+ llvm::outs() << "\n";
+ }
+
+ auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ FunctionEffect::Flags Flags = Effect.flags();
+ bool Diagnose =
+ Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects);
+ if (Diagnose) {
+ // If inference is not allowed, or the target is indirect (virtual
+ // method/function ptr?), generate a diagnostic now.
+ if (!IsInferencePossible ||
+ !(Flags & FunctionEffect::FE_InferrableOnCallees)) {
+ if (Callee.FuncType == SpecialFuncType::None)
+ PFA.checkAddDiagnostic(
+ Inferring, {Effect, DiagnosticID::CallsDeclWithoutEffect,
+ CallLoc, Callee.CDecl});
+ else
+ PFA.checkAddDiagnostic(
+ Inferring, {Effect, DiagnosticID::AllocatesMemory, CallLoc});
+ } else {
+ // Inference is allowed and necessary; defer it.
+ PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc);
+ }
+ }
+ };
+
+ for (const FunctionEffect &Effect : PFA.DeclaredVerifiableEffects)
+ check1Effect(Effect, false);
+
+ for (const FunctionEffect &Effect : PFA.FXToInfer)
+ check1Effect(Effect, true);
+ }
+
+ // Should only be called when determined to be complete.
+ void emitDiagnostics(SmallVector<Diagnostic, 0> &Diags,
+ const CallableInfo &CInfo, Sema &S) {
+ if (Diags.empty())
+ return;
+ const SourceManager &SM = S.getSourceManager();
+ std::sort(Diags.begin(), Diags.end(),
+ [&SM](const Diagnostic &LHS, const Diagnostic &RHS) {
+ return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
+ });
+
+ auto checkAddTemplateNote = [&](const Decl *D) {
+ if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
+ while (FD != nullptr && FD->isTemplateInstantiation()) {
+ S.Diag(FD->getPointOfInstantiation(),
+ diag::note_func_effect_from_template);
+ FD = FD->getTemplateInstantiationPattern();
+ }
+ }
+ };
+
+ // Top-level diagnostics are warnings.
+ for (const Diagnostic &Diag : Diags) {
+ StringRef effectName = Diag.Effect.name();
+ switch (Diag.ID) {
+ case DiagnosticID::None:
+ case DiagnosticID::DeclDisallowsInference: // shouldn't happen
+ // here
+ llvm_unreachable("Unexpected diagnostic kind");
+ break;
+ case DiagnosticID::AllocatesMemory:
+ S.Diag(Diag.Loc, diag::warn_func_effect_allocates) << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::Throws:
+ case DiagnosticID::Catches:
+ S.Diag(Diag.Loc, diag::warn_func_effect_throws_or_catches)
+ << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::HasStaticLocal:
+ S.Diag(Diag.Loc, diag::warn_func_effect_has_static_local) << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::AccessesThreadLocal:
+ S.Diag(Diag.Loc, diag::warn_func_effect_uses_thread_local)
+ << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::CallsObjC:
+ S.Diag(Diag.Loc, diag::warn_func_effect_calls_objc) << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::CallsExprWithoutEffect:
+ S.Diag(Diag.Loc, diag::warn_func_effect_calls_expr_without_effect)
+ << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+
+ case DiagnosticID::CallsDeclWithoutEffect: {
+ CallableInfo CalleeInfo(S, *Diag.Callee);
+ std::string CalleeName = CalleeInfo.name(S);
+
+ S.Diag(Diag.Loc, diag::warn_func_effect_calls_func_without_effect)
+ << effectName << CalleeName;
+ checkAddTemplateNote(CInfo.CDecl);
+
+ // Emit notes explaining the transitive chain of inferences: Why isn't
+ // the callee safe?
+ for (const Decl *Callee = Diag.Callee; Callee != nullptr;) {
+ std::optional<CallableInfo> MaybeNextCallee;
+ CompleteFunctionAnalysis *Completed =
+ DeclAnalysis.completedAnalysisForDecl(CalleeInfo.CDecl);
+ if (Completed == nullptr) {
+ // No result - could be
+ // - non-inline
+ // - indirect (virtual or through function pointer)
+ // - effect has been explicitly disclaimed (e.g. "blocking")
+ if (CalleeInfo.CType == CallType::Virtual)
+ S.Diag(Callee->getLocation(), diag::note_func_effect_call_virtual)
+ << effectName;
+ else if (CalleeInfo.CType == CallType::Unknown)
+ S.Diag(Callee->getLocation(),
+ diag::note_func_effect_call_func_ptr)
+ << effectName;
+ else if (CalleeInfo.Effects.contains(Diag.Effect.oppositeKind()))
+ S.Diag(Callee->getLocation(),
+ diag::note_func_effect_call_disallows_inference)
+ << effectName;
+ else
+ S.Diag(Callee->getLocation(), diag::note_func_effect_call_extern)
+ << effectName;
+
+ break;
+ }
+ const Diagnostic *PtrDiag2 =
+ Completed->firstDiagnosticForEffect(Diag.Effect);
+ if (PtrDiag2 == nullptr)
+ break;
+
+ const Diagnostic &Diag2 = *PtrDiag2;
+ switch (Diag2.ID) {
+ case DiagnosticID::None:
+ llvm_unreachable("Unexpected diagnostic kind");
+ break;
+ case DiagnosticID::DeclDisallowsInference:
+ S.Diag(Diag2.Loc, diag::note_func_effect_call_disallows_inference)
+ << effectName;
+ break;
+ case DiagnosticID::CallsExprWithoutEffect:
+ S.Diag(Diag2.Loc, diag::note_func_effect_call_func_ptr)
+ << effectName;
+ break;
+ case DiagnosticID::AllocatesMemory:
+ S.Diag(Diag2.Loc, diag::note_func_effect_allocates) << effectName;
+ break;
+ case DiagnosticID::Throws:
+ case DiagnosticID::Catches:
+ S.Diag(Diag2.Loc, diag::note_func_effect_throws_or_catches)
+ << effectName;
+ break;
+ case DiagnosticID::HasStaticLocal:
+ S.Diag(Diag2.Loc, diag::note_func_effect_has_static_local)
+ << effectName;
+ break;
+ case DiagnosticID::AccessesThreadLocal:
+ S.Diag(Diag2.Loc, diag::note_func_effect_uses_thread_local)
+ << effectName;
+ break;
+ case DiagnosticID::CallsObjC:
+ S.Diag(Diag2.Loc, diag::note_func_effect_calls_objc) << effectName;
+ break;
+ case DiagnosticID::CallsDeclWithoutEffect:
+ MaybeNextCallee.emplace(S, *Diag2.Callee);
+ S.Diag(Diag2.Loc, diag::note_func_effect_calls_func_without_effect)
+ << effectName << MaybeNextCallee->name(S);
+ break;
+ }
+ checkAddTemplateNote(Callee);
+ Callee = Diag2.Callee;
+ if (MaybeNextCallee) {
+ CalleeInfo = *MaybeNextCallee;
+ CalleeName = CalleeInfo.name(S);
+ }
+ }
+ } break;
+ }
+ }
+ }
+
+ // ----------
+ // This AST visitor is used to traverse the body of a function during effect
+ // verification. This happens in 2 situations:
+ // [1] The function has declared effects which need to be validated.
+ // [2] The function has not explicitly declared an effect in question, and is
+ // being checked for implicit conformance.
+ //
+ // Diagnostics are always routed to a PendingFunctionAnalysis, which holds
+ // all diagnostic output.
+ //
+ // Q: Currently we create a new RecursiveASTVisitor for every function
+ // analysis. Is it so lightweight that this is OK? It would appear so.
+ struct FunctionBodyASTVisitor
+ : public RecursiveASTVisitor<FunctionBodyASTVisitor> {
+ // The meanings of the boolean values returned by the Visit methods can be
+ // difficult to remember.
+ constexpr static bool Stop = false;
+ constexpr static bool Proceed = true;
+
+ Analyzer &Outer;
+ PendingFunctionAnalysis &CurrentFunction;
+ CallableInfo &CurrentCaller;
+
+ FunctionBodyASTVisitor(Analyzer &outer,
+ PendingFunctionAnalysis &CurrentFunction,
+ CallableInfo &CurrentCaller)
+ : Outer(outer), CurrentFunction(CurrentFunction),
+ CurrentCaller(CurrentCaller) {}
+
+ // -- Entry point --
+ void run() {
+ // The target function itself may have some implicit code paths beyond the
+ // body: member and base constructors and destructors. Visit these first.
+ if (const auto *FD = dyn_cast<const FunctionDecl>(CurrentCaller.CDecl)) {
+ if (auto *Ctor = dyn_cast<CXXConstructorDecl>(FD)) {
+ for (const CXXCtorInitializer *Initer : Ctor->inits())
+ if (Expr *Init = Initer->getInit())
+ VisitStmt(Init);
+ } else if (auto *Dtor = dyn_cast<CXXDestructorDecl>(FD))
+ followDestructor(dyn_cast<CXXRecordDecl>(Dtor->getParent()), Dtor);
+ }
+ // else could be BlockDecl
+
+ // Do an AST traversal of the function/block body
+ TraverseDecl(const_cast<Decl *>(CurrentCaller.CDecl));
+ }
+
+ // -- Methods implementing common logic --
+
+ // Handle a language construct forbidden by some effects. Only effects whose
+ // flags include the specified flag receive a diagnostic. \p Flag describes
+ // the construct.
+ void diagnoseLanguageConstruct(FunctionEffect::FlagBit Flag, DiagnosticID D,
+ SourceLocation Loc,
+ const Decl *Callee = nullptr) {
+ // If there are any declared verifiable effects which forbid the construct
+ // represented by the flag, store just one diagnostic.
+ for (const FunctionEffect &Effect :
+ CurrentFunction.DeclaredVerifiableEffects) {
+ if (Effect.flags() & Flag) {
+ addDiagnostic(/*inferring=*/false, Effect, D, Loc, Callee);
+ break;
+ }
+ }
+ // For each inferred effect which forbids the construct, store a
+ // diagnostic, if we don't already have a diagnostic for that effect.
+ for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
+ if (Effect.flags() & Flag)
+ addDiagnostic(/*inferring=*/true, Effect, D, Loc, Callee);
+ }
+
+ void addDiagnostic(bool Inferring, const FunctionEffect &Effect,
+ DiagnosticID D, SourceLocation Loc,
+ const Decl *Callee = nullptr) {
+ CurrentFunction.checkAddDiagnostic(Inferring,
+ Diagnostic(Effect, D, Loc, Callee));
+ }
+
+ // Here we have a call to a Decl, either explicitly via a CallExpr or some
+ // other AST construct. CallableInfo pertains to the callee.
+ void followCall(const CallableInfo &CI, SourceLocation CallLoc) {
+ // Currently, built-in functions are always considered safe.
+ // FIXME: Some are not.
+ if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl);
+ FD && FD->getBuiltinID() != 0)
+ return;
+
+ Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
+ /*AssertNoFurtherInference=*/false);
+ }
+
+ void checkIndirectCall(CallExpr *Call, Expr *CalleeExpr) {
+ const QualType CalleeType = CalleeExpr->getType();
+ auto *FPT =
+ CalleeType->getAs<FunctionProtoType>(); // null if FunctionType
+ EffectSet CalleeFX;
+ if (FPT)
+ CalleeFX.insert(FPT->getFunctionEffects());
+
+ auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ if (FPT == nullptr || Effect.shouldDiagnoseFunctionCall(
+ /*direct=*/false, CalleeFX))
+ addDiagnostic(Inferring, Effect, DiagnosticID::CallsExprWithoutEffect,
+ Call->getBeginLoc());
+ };
+
+ for (const FunctionEffect &Effect :
+ CurrentFunction.DeclaredVerifiableEffects)
+ check1Effect(Effect, false);
+
+ for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
+ check1Effect(Effect, true);
+ }
+
+ // This destructor's body should be followed by the caller, but here we
+ // follow the field and base destructors.
+ void followDestructor(const CXXRecordDecl *Rec,
+ const CXXDestructorDecl *Dtor) {
+ for (const FieldDecl *Field : Rec->fields())
+ followTypeDtor(Field->getType());
+
+ if (const auto *Class = dyn_cast<CXXRecordDecl>(Rec)) {
+ for (const CXXBaseSpecifier &Base : Class->bases())
+ followTypeDtor(Base.getType());
+
+ for (const CXXBaseSpecifier &Base : Class->vbases())
+ followTypeDtor(Base.getType());
+ }
+ }
+
+ void followTypeDtor(QualType QT) {
+ const Type *Ty = QT.getTypePtr();
+ while (Ty->isArrayType()) {
+ const ArrayType *Arr = Ty->getAsArrayTypeUnsafe();
+ QT = Arr->getElementType();
+ Ty = QT.getTypePtr();
+ }
+
+ if (Ty->isRecordType()) {
+ if (const CXXRecordDecl *Class = Ty->getAsCXXRecordDecl()) {
+ if (CXXDestructorDecl *Dtor = Class->getDestructor()) {
+ CallableInfo CI(Outer.Sem, *Dtor);
+ followCall(CI, Dtor->getLocation());
+ }
+ }
+ }
+ }
+
+ // -- Methods for use of RecursiveASTVisitor --
+
+ bool shouldVisitImplicitCode() const { return true; }
+
+ bool shouldWalkTypesOfTypeLocs() const { return false; }
+
+ bool VisitCXXThrowExpr(CXXThrowExpr *Throw) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
+ DiagnosticID::Throws, Throw->getThrowLoc());
+ return Proceed;
+ }
+
+ bool VisitCXXCatchStmt(CXXCatchStmt *Catch) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
+ DiagnosticID::Catches, Catch->getCatchLoc());
+ return Proceed;
+ }
+
+ bool VisitObjCMessageExpr(ObjCMessageExpr *Msg) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeObjCMessageSend,
+ DiagnosticID::CallsObjC, Msg->getBeginLoc());
+ return Proceed;
+ }
+
+ bool VisitCallExpr(CallExpr *Call) {
+ if constexpr (DebugLogLevel > 2) {
+ llvm::errs() << "VisitCallExpr : "
+ << Call->getBeginLoc().printToString(Outer.Sem.SourceMgr)
+ << "\n";
+ }
+
+ Expr *CalleeExpr = Call->getCallee();
+ if (const Decl *Callee = CalleeExpr->getReferencedDeclOfCallee()) {
+ CallableInfo CI(Outer.Sem, *Callee);
+ followCall(CI, Call->getBeginLoc());
+ return Proceed;
+ }
+
+ if (isa<CXXPseudoDestructorExpr>(CalleeExpr))
+ // just destroying a scalar, fine.
+ return Proceed;
+
+ // No Decl, just an Expr. Just check based on its type.
+ checkIndirectCall(Call, CalleeExpr);
+
+ return Proceed;
+ }
+
+ bool VisitVarDecl(VarDecl *Var) {
+ if constexpr (DebugLogLevel > 2) {
+ llvm::errs() << "VisitVarDecl : "
+ << Var->getBeginLoc().printToString(Outer.Sem.SourceMgr)
+ << "\n";
+ }
+
+ if (Var->isStaticLocal())
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeStaticLocalVars,
+ DiagnosticID::HasStaticLocal,
+ Var->getLocation());
+
+ const QualType::DestructionKind DK =
+ Var->needsDestruction(Outer.Sem.getASTContext());
+ if (DK == QualType::DK_cxx_destructor) {
+ QualType QT = Var->getType();
+ if (const auto *ClsType = QT.getTypePtr()->getAs<RecordType>()) {
+ if (const auto *CxxRec =
+ dyn_cast<CXXRecordDecl>(ClsType->getDecl())) {
+ if (const CXXDestructorDecl *Dtor = CxxRec->getDestructor()) {
+ CallableInfo CI(Outer.Sem, *Dtor);
+ followCall(CI, Var->getLocation());
+ }
+ }
+ }
+ }
+ return Proceed;
+ }
+
+ bool VisitCXXNewExpr(CXXNewExpr *New) {
+ // BUG? It seems incorrect that RecursiveASTVisitor does not
+ // visit the call to operator new.
+ if (FunctionDecl *FD = New->getOperatorNew()) {
+ CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorNew);
+ followCall(CI, New->getBeginLoc());
+ }
+
+ // It's a bit excessive to check operator delete here, since it's
+ // just a fallback for operator new followed by a failed constructor.
+ // We could check it via New->getOperatorDelete().
+
+ // It DOES however visit the called constructor
+ return Proceed;
+ }
+
+ bool VisitCXXDeleteExpr(CXXDeleteExpr *Delete) {
+ // BUG? It seems incorrect that RecursiveASTVisitor does not
+ // visit the call to operator delete.
+ if (FunctionDecl *FD = Delete->getOperatorDelete()) {
+ CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorDelete);
+ followCall(CI, Delete->getBeginLoc());
+ }
+
+ // It DOES however visit the called destructor
+
+ return Proceed;
+ }
+
+ bool VisitCXXConstructExpr(CXXConstructExpr *Construct) {
+ if constexpr (DebugLogLevel > 2) {
+ llvm::errs() << "VisitCXXConstructExpr : "
+ << Construct->getBeginLoc().printToString(
+ Outer.Sem.SourceMgr)
+ << "\n";
+ }
+
+ // BUG? It seems incorrect that RecursiveASTVisitor does not
+ // visit the call to the constructor.
+ const CXXConstructorDecl *Ctor = Construct->getConstructor();
+ CallableInfo CI(Outer.Sem, *Ctor);
+ followCall(CI, Construct->getLocation());
+
+ return Proceed;
+ }
+
+ bool VisitCXXDefaultInitExpr(CXXDefaultInitExpr *DEI) {
+ if (Expr *E = DEI->getExpr())
+ TraverseStmt(E);
+
+ return Proceed;
+ }
+
+ bool TraverseLambdaExpr(LambdaExpr *Lambda) {
+ // We override this so as the be able to skip traversal of the lambda's
+ // body. We have to explicitly traverse the captures.
+ for (unsigned I = 0, N = Lambda->capture_size(); I < N; ++I)
+ if (TraverseLambdaCapture(Lambda, Lambda->capture_begin() + I,
+ Lambda->capture_init_begin()[I]) == Stop)
+ return Stop;
+
+ return Proceed;
+ }
+
+ bool TraverseBlockExpr(BlockExpr * /*unused*/) {
+ // TODO: are the capture expressions (ctor call?) safe?
+ return Proceed;
+ }
+
+ bool VisitDeclRefExpr(const DeclRefExpr *E) {
+ const ValueDecl *Val = E->getDecl();
+ if (isa<VarDecl>(Val)) {
+ const VarDecl *Var = cast<VarDecl>(Val);
+ VarDecl::TLSKind TLSK = Var->getTLSKind();
+ if (TLSK != VarDecl::TLS_None) {
+ // At least on macOS, thread-local variables are initialized on
+ // first access, including a heap allocation.
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThreadLocalVars,
+ DiagnosticID::AccessesThreadLocal,
+ E->getLocation());
+ }
+ }
+ return Proceed;
+ }
+
+ // Unevaluated contexts: need to skip
+ // see https://reviews.llvm.org/rG777eb4bcfc3265359edb7c979d3e5ac699ad4641
+
+ bool TraverseGenericSelectionExpr(GenericSelectionExpr *Node) {
+ return TraverseStmt(Node->getResultExpr());
+ }
+ bool TraverseUnaryExprOrTypeTraitExpr(UnaryExprOrTypeTraitExpr *Node) {
+ return Proceed;
+ }
+
+ bool TraverseTypeOfExprTypeLoc(TypeOfExprTypeLoc Node) { return Proceed; }
+
+ bool TraverseDecltypeTypeLoc(DecltypeTypeLoc Node) { return Proceed; }
+
+ bool TraverseCXXNoexceptExpr(CXXNoexceptExpr *Node) { return Proceed; }
+
+ bool TraverseCXXTypeidExpr(CXXTypeidExpr *Node) { return Proceed; }
+ };
+};
+
+Analyzer::AnalysisMap::~AnalysisMap() {
+ for (const auto &Item : *this) {
+ FuncAnalysisPtr AP = Item.second;
+ if (isa<PendingFunctionAnalysis *>(AP))
+ delete AP.get<PendingFunctionAnalysis *>();
+ else
+ delete AP.get<CompleteFunctionAnalysis *>();
+ }
+}
+
+} // namespace FXAnalysis
+
+// =============================================================================
+
//===----------------------------------------------------------------------===//
// AnalysisBasedWarnings - Worker object used by Sema to execute analysis-based
// warnings on a function, method, or block.
@@ -2551,6 +3807,9 @@ void clang::sema::AnalysisBasedWarnings::IssueWarnings(
SourceLocation())) {
CallableVisitor(CallAnalyzers).TraverseTranslationUnitDecl(TU);
}
+
+ if (S.Context.hasAnyFunctionEffects())
+ FXAnalysis::Analyzer{S}.run(*TU);
}
void clang::sema::AnalysisBasedWarnings::IssueWarnings(
diff --git a/clang/lib/Sema/SemaDecl.cpp b/clang/lib/Sema/SemaDecl.cpp
index bb25a0b3a45ae9..adb4a8f4de6853 100644
--- a/clang/lib/Sema/SemaDecl.cpp
+++ b/clang/lib/Sema/SemaDecl.cpp
@@ -3854,6 +3854,11 @@ bool Sema::MergeFunctionDecl(FunctionDecl *New, NamedDecl *&OldD, Scope *S,
OldQTypeForComparison = Context.getFunctionType(
OldFPT->getReturnType(), OldFPT->getParamTypes(), EPI);
}
+ if (OldFX.empty()) {
+ // A redeclaration may add the attribute to a previously seen function
+ // body which needs to be verified.
+ maybeAddDeclWithEffects(Old, MergedFX);
+ }
}
}
}
@@ -10897,6 +10902,53 @@ Attr *Sema::getImplicitCodeSegOrSectionAttrForFunction(const FunctionDecl *FD,
return nullptr;
}
+// Should only be called when getFunctionEffects() returns a non-empty set.
+// Decl should be a FunctionDecl or BlockDecl.
+void Sema::maybeAddDeclWithEffects(const Decl *D,
+ const FunctionEffectsRef &FX) {
+ if (!D->hasBody()) {
+ if (const auto *FD = D->getAsFunction(); FD && !FD->willHaveBody())
+ return;
+ }
+
+ if (Diags.getIgnoreAllWarnings() ||
+ (Diags.getSuppressSystemWarnings() &&
+ SourceMgr.isInSystemHeader(D->getLocation())))
+ return;
+
+ if (hasUncompilableErrorOccurred())
+ return;
+
+ // For code in dependent contexts, we'll do this at instantiation time.
+ // Without this check, we would analyze the function based on placeholder
+ // template parameters, and potentially generate spurious diagnostics.
+ if (cast<DeclContext>(D)->isDependentContext())
+ return;
+
+ addDeclWithEffects(D, FX);
+}
+
+void Sema::addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX) {
+ FunctionEffectSet::Conflicts Errs;
+
+ // To avoid the possibility of conflict, don't add effects which are
+ // not FE_InferrableOnCallees and therefore not verified; this removes
+ // blocking/allocating but keeps nonblocking/nonallocating.
+ // Also, ignore any conditions when building the list of effects.
+ bool AnyVerifiable = false;
+ for (const FunctionEffectWithCondition &EC : FX)
+ if (EC.Effect.flags() & FunctionEffect::FE_InferrableOnCallees) {
+ AllEffectsToVerify.insert(FunctionEffectWithCondition(EC.Effect, nullptr),
+ Errs);
+ AnyVerifiable = true;
+ }
+ assert(Errs.empty() && "effects conflicts should not be possible here");
+
+ // Record the declaration for later analysis.
+ if (AnyVerifiable)
+ DeclsWithEffectsToVerify.push_back(D);
+}
+
bool Sema::canFullyTypeCheckRedeclaration(ValueDecl *NewD, ValueDecl *OldD,
QualType NewT, QualType OldT) {
if (!NewD->getLexicalDeclContext()->isDependentContext())
@@ -15609,6 +15661,10 @@ Decl *Sema::ActOnStartOfFunctionDef(Scope *FnBodyScope, Decl *D,
getCurLexicalContext()->getDeclKind() != Decl::ObjCImplementation)
Diag(FD->getLocation(), diag::warn_function_def_in_objc_container);
+ if (Context.hasAnyFunctionEffects())
+ if (const auto FX = FD->getFunctionEffects(); !FX.empty())
+ maybeAddDeclWithEffects(FD, FX);
+
return D;
}
diff --git a/clang/lib/Sema/SemaExpr.cpp b/clang/lib/Sema/SemaExpr.cpp
index 8d24e34520e778..f9b04f5361f337 100644
--- a/clang/lib/Sema/SemaExpr.cpp
+++ b/clang/lib/Sema/SemaExpr.cpp
@@ -16065,6 +16065,10 @@ ExprResult Sema::ActOnBlockStmtExpr(SourceLocation CaretLoc,
BlockScopeInfo *BSI = cast<BlockScopeInfo>(FunctionScopes.back());
BlockDecl *BD = BSI->TheDecl;
+ if (Context.hasAnyFunctionEffects())
+ if (const auto FX = BD->getFunctionEffects(); !FX.empty())
+ maybeAddDeclWithEffects(BD, FX);
+
if (BSI->HasImplicitReturnType)
deduceClosureReturnType(*BSI);
diff --git a/clang/lib/Sema/SemaLambda.cpp b/clang/lib/Sema/SemaLambda.cpp
index 601077e9f3334d..e3bf582db30279 100644
--- a/clang/lib/Sema/SemaLambda.cpp
+++ b/clang/lib/Sema/SemaLambda.cpp
@@ -1947,6 +1947,11 @@ ExprResult Sema::BuildCaptureInit(const Capture &Cap,
ExprResult Sema::ActOnLambdaExpr(SourceLocation StartLoc, Stmt *Body) {
LambdaScopeInfo LSI = *cast<LambdaScopeInfo>(FunctionScopes.back());
ActOnFinishFunctionBody(LSI.CallOperator, Body);
+
+ if (Context.hasAnyFunctionEffects())
+ if (const auto FX = LSI.CallOperator->getFunctionEffects(); !FX.empty())
+ maybeAddDeclWithEffects(LSI.CallOperator, FX);
+
return BuildLambdaExpr(StartLoc, Body->getEndLoc(), &LSI);
}
diff --git a/clang/lib/Serialization/ASTReader.cpp b/clang/lib/Serialization/ASTReader.cpp
index 3cb96df12e4da0..5d81d921d0fffd 100644
--- a/clang/lib/Serialization/ASTReader.cpp
+++ b/clang/lib/Serialization/ASTReader.cpp
@@ -3874,6 +3874,11 @@ llvm::Error ASTReader::ReadASTBlock(ModuleFile &F,
FPPragmaOptions.swap(Record);
break;
+ case DECLS_WITH_EFFECTS_TO_VERIFY:
+ for (unsigned I = 0, N = Record.size(); I != N; /*in loop*/)
+ DeclsWithEffectsToVerify.push_back(ReadDeclID(F, Record, I));
+ break;
+
case OPENCL_EXTENSIONS:
for (unsigned I = 0, E = Record.size(); I != E; ) {
auto Name = ReadString(Record, I);
@@ -8279,6 +8284,20 @@ void ASTReader::InitializeSema(Sema &S) {
NewOverrides.applyOverrides(SemaObj->getLangOpts());
}
+ if (!DeclsWithEffectsToVerify.empty()) {
+ for (GlobalDeclID ID : DeclsWithEffectsToVerify) {
+ Decl *D = GetDecl(ID);
+ FunctionEffectsRef FX;
+ if (auto *FD = dyn_cast<FunctionDecl>(D))
+ FX = FD->getFunctionEffects();
+ else if (auto *BD = dyn_cast<BlockDecl>(D))
+ FX = BD->getFunctionEffects();
+ if (!FX.empty())
+ SemaObj->addDeclWithEffects(D, FX);
+ }
+ DeclsWithEffectsToVerify.clear();
+ }
+
SemaObj->OpenCLFeatures = OpenCLExtensions;
UpdateSema();
diff --git a/clang/lib/Serialization/ASTWriter.cpp b/clang/lib/Serialization/ASTWriter.cpp
index c78d8943d6d92e..faf9b9490bafc2 100644
--- a/clang/lib/Serialization/ASTWriter.cpp
+++ b/clang/lib/Serialization/ASTWriter.cpp
@@ -4627,6 +4627,17 @@ void ASTWriter::WriteFloatControlPragmaOptions(Sema &SemaRef) {
Stream.EmitRecord(FLOAT_CONTROL_PRAGMA_OPTIONS, Record);
}
+/// Write Sema's collected list of declarations with unverified effects.
+void ASTWriter::WriteDeclsWithEffectsToVerify(Sema &SemaRef) {
+ if (SemaRef.DeclsWithEffectsToVerify.empty())
+ return;
+ RecordData Record;
+ for (const auto *D : SemaRef.DeclsWithEffectsToVerify) {
+ AddDeclRef(D, Record);
+ }
+ Stream.EmitRecord(DECLS_WITH_EFFECTS_TO_VERIFY, Record);
+}
+
void ASTWriter::WriteModuleFileExtension(Sema &SemaRef,
ModuleFileExtensionWriter &Writer) {
// Enter the extension block.
@@ -5564,6 +5575,7 @@ ASTFileSignature ASTWriter::WriteASTCore(Sema &SemaRef, StringRef isysroot,
}
WritePackPragmaOptions(SemaRef);
WriteFloatControlPragmaOptions(SemaRef);
+ WriteDeclsWithEffectsToVerify(SemaRef);
// Some simple statistics
RecordData::value_type Record[] = {
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
new file mode 100644
index 00000000000000..c248293cf76342
--- /dev/null
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -0,0 +1,194 @@
+// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
+// These are in a separate file because errors (e.g. incompatible attributes) currently prevent
+// the AnalysisBasedWarnings pass from running at all.
+
+// This diagnostic is re-enabled and exercised in isolation later in this file.
+#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
+
+// --- CONSTRAINTS ---
+
+void nl1() [[clang::nonblocking]]
+{
+ auto* pInt = new int; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
+}
+
+void nl2() [[clang::nonblocking]]
+{
+ static int global; // expected-warning {{'nonblocking' function must not have static locals}}
+}
+
+void nl3() [[clang::nonblocking]]
+{
+ try {
+ throw 42; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ }
+ catch (...) { // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ }
+}
+
+void nl4_inline() {}
+void nl4_not_inline(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+
+void nl4() [[clang::nonblocking]]
+{
+ nl4_inline(); // OK
+ nl4_not_inline(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+}
+
+
+struct HasVirtual {
+ virtual void unsafe(); // expected-note {{virtual method cannot be inferred 'nonblocking'}}
+};
+
+void nl5() [[clang::nonblocking]]
+{
+ HasVirtual hv;
+ hv.unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+}
+
+void nl6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+void nl6_transitively_unsafe()
+{
+ nl6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function}}
+}
+
+void nl6() [[clang::nonblocking]]
+{
+ nl6_transitively_unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+}
+
+thread_local int tl_var{ 42 };
+
+bool tl_test() [[clang::nonblocking]]
+{
+ return tl_var > 0; // expected-warning {{'nonblocking' function must not use thread-local variables}}
+}
+
+void nl7()
+{
+ // Make sure we verify blocks
+ auto blk = ^() [[clang::nonblocking]] {
+ throw 42; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ };
+}
+
+void nl8()
+{
+ // Make sure we verify lambdas
+ auto lambda = []() [[clang::nonblocking]] {
+ throw 42; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ };
+}
+
+// Make sure template expansions are found and verified.
+ template <typename T>
+ struct Adder {
+ static T add_explicit(T x, T y) [[clang::nonblocking]]
+ {
+ return x + y; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ }
+ static T add_implicit(T x, T y)
+ {
+ return x + y; // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function}}
+ }
+ };
+
+ struct Stringy {
+ friend Stringy operator+(const Stringy& x, const Stringy& y)
+ {
+ // Do something inferably unsafe
+ auto* z = new char[42]; // expected-note {{function cannot be inferred 'nonblocking' because it allocates/deallocates memory}}
+ return {};
+ }
+ };
+
+ struct Stringy2 {
+ friend Stringy2 operator+(const Stringy2& x, const Stringy2& y)
+ {
+ // Do something inferably unsafe
+ throw 42; // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+ }
+ };
+
+void nl9() [[clang::nonblocking]]
+{
+ Adder<int>::add_explicit(1, 2);
+ Adder<int>::add_implicit(1, 2);
+
+ Adder<Stringy>::add_explicit({}, {}); // expected-note {{in template expansion here}}
+ Adder<Stringy2>::add_implicit({}, {}); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}} \
+ expected-note {{in template expansion here}}
+}
+
+void nl10(
+ void (*fp1)(), // expected-note {{function pointer cannot be inferred 'nonblocking'}}
+ void (*fp2)() [[clang::nonblocking]]
+ ) [[clang::nonblocking]]
+{
+ fp1(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ fp2();
+}
+
+// Interactions with nonblocking(false)
+void nl11_no_inference_1() [[clang::nonblocking(false)]] // expected-note {{function does not permit inference of 'nonblocking'}}
+{
+}
+void nl11_no_inference_2() [[clang::nonblocking(false)]]; // expected-note {{function does not permit inference of 'nonblocking'}}
+
+template <bool V>
+struct ComputedNB {
+ void method() [[clang::nonblocking(V)]]; // expected-note {{function does not permit inference of 'nonblocking'}}
+};
+
+void nl11() [[clang::nonblocking]]
+{
+ nl11_no_inference_1(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nl11_no_inference_2(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+
+ ComputedNB<true> CNB_true;
+ CNB_true.method();
+
+ ComputedNB<false> CNB_false;
+ CNB_false.method(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+}
+
+// Verify that when attached to a redeclaration, the attribute successfully attaches.
+void nl12() {
+ static int x; // expected-warning {{'nonblocking' function must not have static locals}}
+}
+void nl12() [[clang::nonblocking]];
+void nl13() [[clang::nonblocking]] { nl12(); }
+
+// C++ member function pointers
+struct PTMFTester {
+ typedef void (PTMFTester::*ConvertFunction)() [[clang::nonblocking]];
+
+ void convert() [[clang::nonblocking]];
+
+ ConvertFunction mConvertFunc;
+};
+
+void PTMFTester::convert() [[clang::nonblocking]]
+{
+ (this->*mConvertFunc)();
+}
+
+// Block variables
+void nl17(void (^blk)() [[clang::nonblocking]]) [[clang::nonblocking]] {
+ blk();
+}
+
+// References to blocks
+void nl18(void (^block)() [[clang::nonblocking]]) [[clang::nonblocking]]
+{
+ auto &ref = block;
+ ref();
+}
+
+
+// --- nonblocking implies noexcept ---
+#pragma clang diagnostic warning "-Wperf-constraint-implies-noexcept"
+
+void nl19() [[clang::nonblocking]] // expected-warning {{'nonblocking' function should be declared noexcept}}
+{
+}
diff --git a/clang/test/Sema/attr-nonblocking-syntax.cpp b/clang/test/Sema/attr-nonblocking-syntax.cpp
index 644ed754b04daa..90d074d01708f4 100644
--- a/clang/test/Sema/attr-nonblocking-syntax.cpp
+++ b/clang/test/Sema/attr-nonblocking-syntax.cpp
@@ -3,6 +3,7 @@
// Make sure that the attribute gets parsed and attached to the correct AST elements.
#pragma clang diagnostic ignored "-Wunused-variable"
+#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
// =========================================================================================
// Square brackets, true
diff --git a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
new file mode 100644
index 00000000000000..aeb8b21f56e442
--- /dev/null
+++ b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
@@ -0,0 +1,23 @@
+// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
+
+#if !__has_attribute(clang_nonblocking)
+#error "the 'nonblocking' attribute is not available"
+#endif
+
+#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
+
+// Objective-C
+ at interface OCClass
+- (void)method;
+ at end
+
+void nl14(OCClass *oc) [[clang::nonblocking]] {
+ [oc method]; // expected-warning {{'nonblocking' function must not access an ObjC method or property}}
+}
+void nl15(OCClass *oc) {
+ [oc method]; // expected-note {{function cannot be inferred 'nonblocking' because it accesses an ObjC method or property}}
+}
+void nl16(OCClass *oc) [[clang::nonblocking]] {
+ nl15(oc); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'nl15'}}
+}
+
>From 95b7a00467423e1a0e320a2fe45811739ce4d61e Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Sat, 20 Jul 2024 08:57:16 -0700
Subject: [PATCH 02/59] - Sema.h: Move function decls to be in the correct
per-source-file sections. - Fix ObjC++ test which was using the attribute's
old name.
---
clang/include/clang/Sema/Sema.h | 50 +++++++++----------
.../attr-nonblocking-constraints.mm | 4 --
2 files changed, 24 insertions(+), 30 deletions(-)
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index e1867348497da8..e3259f147ec884 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -873,8 +873,6 @@ class Sema final : public SemaBase {
/// Warn when implicitly casting 0 to nullptr.
void diagnoseZeroToNullptrConversion(CastKind Kind, const Expr *E);
- // ----- function effects ---
-
/// All functions/lambdas/blocks which have bodies and which have a non-empty
/// FunctionEffectsRef to be verified.
SmallVector<const Decl *> DeclsWithEffectsToVerify;
@@ -886,30 +884,6 @@ class Sema final : public SemaBase {
void diagnoseFunctionEffectConversion(QualType DstType, QualType SrcType,
SourceLocation Loc);
- /// Warn and return true if adding an effect to a set would create a conflict.
- bool diagnoseConflictingFunctionEffect(const FunctionEffectsRef &FX,
- const FunctionEffectWithCondition &EC,
- SourceLocation NewAttrLoc);
-
- // Report a failure to merge function effects between declarations due to a
- // conflict.
- void
- diagnoseFunctionEffectMergeConflicts(const FunctionEffectSet::Conflicts &Errs,
- SourceLocation NewLoc,
- SourceLocation OldLoc);
-
- /// Potentially add a FunctionDecl or BlockDecl to DeclsWithEffectsToVerify.
- void maybeAddDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
-
- /// Unconditionally add a Decl to DeclsWithEfffectsToVerify.
- void addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
-
- /// Try to parse the conditional expression attached to an effect attribute
- /// (e.g. 'nonblocking'). (c.f. Sema::ActOnNoexceptSpec). Return an empty
- /// optional on error.
- std::optional<FunctionEffectMode>
- ActOnEffectExpression(Expr *CondExpr, StringRef AttributeName);
-
/// makeUnavailableInSystemHeader - There is an error in the current
/// context. If we're still in a system header, and we can plausibly
/// make the relevant declaration unavailable instead of erroring, do
@@ -4343,6 +4317,24 @@ class Sema final : public SemaBase {
// Whether the callee should be ignored in CUDA/HIP/OpenMP host/device check.
bool shouldIgnoreInHostDeviceCheck(FunctionDecl *Callee);
+ /// Warn and return true if adding a function effect to a set would create a conflict.
+ bool diagnoseConflictingFunctionEffect(const FunctionEffectsRef &FX,
+ const FunctionEffectWithCondition &EC,
+ SourceLocation NewAttrLoc);
+
+ // Report a failure to merge function effects between declarations due to a
+ // conflict.
+ void
+ diagnoseFunctionEffectMergeConflicts(const FunctionEffectSet::Conflicts &Errs,
+ SourceLocation NewLoc,
+ SourceLocation OldLoc);
+
+ /// Potentially add a FunctionDecl or BlockDecl to DeclsWithEffectsToVerify.
+ void maybeAddDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
+
+ /// Unconditionally add a Decl to DeclsWithEfffectsToVerify.
+ void addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
+
private:
/// Function or variable declarations to be checked for whether the deferred
/// diagnostics should be emitted.
@@ -15015,6 +15007,12 @@ class Sema final : public SemaBase {
return hasAcceptableDefinition(D, &Hidden, Kind);
}
+ /// Try to parse the conditional expression attached to an effect attribute
+ /// (e.g. 'nonblocking'). (c.f. Sema::ActOnNoexceptSpec). Return an empty
+ /// optional on error.
+ std::optional<FunctionEffectMode>
+ ActOnEffectExpression(Expr *CondExpr, StringRef AttributeName);
+
private:
/// The implementation of RequireCompleteType
bool RequireCompleteTypeImpl(SourceLocation Loc, QualType T,
diff --git a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
index aeb8b21f56e442..0600062e89c045 100644
--- a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
+++ b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
@@ -1,9 +1,5 @@
// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
-#if !__has_attribute(clang_nonblocking)
-#error "the 'nonblocking' attribute is not available"
-#endif
-
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
// Objective-C
>From 21c780aaeea3deb35c3ffc972eb126e02b48ec7a Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Sat, 20 Jul 2024 09:08:16 -0700
Subject: [PATCH 03/59] clang-format
---
clang/include/clang/Sema/Sema.h | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index e3259f147ec884..a42f6af3c70e48 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -4317,7 +4317,8 @@ class Sema final : public SemaBase {
// Whether the callee should be ignored in CUDA/HIP/OpenMP host/device check.
bool shouldIgnoreInHostDeviceCheck(FunctionDecl *Callee);
- /// Warn and return true if adding a function effect to a set would create a conflict.
+ /// Warn and return true if adding a function effect to a set would create a
+ /// conflict.
bool diagnoseConflictingFunctionEffect(const FunctionEffectsRef &FX,
const FunctionEffectWithCondition &EC,
SourceLocation NewAttrLoc);
>From ff104137caa083888b51a78da5d439d45db04a1f Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 26 Jul 2024 07:40:33 -0700
Subject: [PATCH 04/59] - Detect ObjC @throw and @catch, diagnose identically
to their C++ counterparts. - Tweak test cases.
---
clang/lib/Sema/AnalysisBasedWarnings.cpp | 12 ++++++++++++
.../test/Sema/attr-nonblocking-constraints.cpp | 5 +++--
.../SemaObjCXX/attr-nonblocking-constraints.mm | 17 ++++++++++++-----
3 files changed, 27 insertions(+), 7 deletions(-)
diff --git a/clang/lib/Sema/AnalysisBasedWarnings.cpp b/clang/lib/Sema/AnalysisBasedWarnings.cpp
index 3909d5b44a32e7..f26468cfcdad54 100644
--- a/clang/lib/Sema/AnalysisBasedWarnings.cpp
+++ b/clang/lib/Sema/AnalysisBasedWarnings.cpp
@@ -3475,6 +3475,18 @@ class Analyzer {
return Proceed;
}
+ bool VisitObjCAtThrowStmt(ObjCAtThrowStmt *Throw) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
+ DiagnosticID::Throws, Throw->getThrowLoc());
+ return Proceed;
+ }
+
+ bool VisitObjCAtCatchStmt(ObjCAtCatchStmt *Catch) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
+ DiagnosticID::Catches, Catch->getAtCatchLoc());
+ return Proceed;
+ }
+
bool VisitObjCMessageExpr(ObjCMessageExpr *Msg) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeObjCMessageSend,
DiagnosticID::CallsObjC, Msg->getBeginLoc());
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index c248293cf76342..e50c5b436daafc 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -1,6 +1,6 @@
// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
// These are in a separate file because errors (e.g. incompatible attributes) currently prevent
-// the AnalysisBasedWarnings pass from running at all.
+// the FXAnalysis pass from running at all.
// This diagnostic is re-enabled and exercised in isolation later in this file.
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
@@ -9,7 +9,8 @@
void nl1() [[clang::nonblocking]]
{
- auto* pInt = new int; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
+ int *pInt = new int; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
+ delete pInt; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
}
void nl2() [[clang::nonblocking]]
diff --git a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
index 0600062e89c045..ff5873c11c4fe7 100644
--- a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
+++ b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
@@ -1,4 +1,4 @@
-// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
+// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -fobjc-exceptions -verify %s
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
@@ -7,13 +7,20 @@ @interface OCClass
- (void)method;
@end
-void nl14(OCClass *oc) [[clang::nonblocking]] {
+void nb1(OCClass *oc) [[clang::nonblocking]] {
[oc method]; // expected-warning {{'nonblocking' function must not access an ObjC method or property}}
}
-void nl15(OCClass *oc) {
+void nb2(OCClass *oc) {
[oc method]; // expected-note {{function cannot be inferred 'nonblocking' because it accesses an ObjC method or property}}
}
-void nl16(OCClass *oc) [[clang::nonblocking]] {
- nl15(oc); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'nl15'}}
+void nb3(OCClass *oc) [[clang::nonblocking]] {
+ nb2(oc); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'nb2'}}
}
+void nb4() [[clang::nonblocking]] {
+ @try {
+ @throw @"foo"; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ }
+ @catch (...) { // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ }
+}
>From d472964eb11d063b6d0afc433c69f6369d1ae1ae Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Sun, 5 May 2024 12:36:53 -0700
Subject: [PATCH 05/59] FunctionEffect constructors: cast Kind to uint8_t Make
FunctionEffect just have a Kind instead of a bitfield
(from PR #100753)
---
clang/include/clang/AST/Type.h | 11 +++++------
1 file changed, 5 insertions(+), 6 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index 08141f75de8dbc..509f0d95643b0b 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4698,26 +4698,25 @@ class FunctionEffect {
};
private:
- LLVM_PREFERRED_TYPE(Kind)
- uint8_t FKind : 3;
+ Kind FKind;
// Expansion: for hypothetical TCB+types, there could be one Kind for TCB,
// then ~16(?) bits "SubKind" to map to a specific named TCB. SubKind would
// be considered for uniqueness.
public:
- FunctionEffect() : FKind(unsigned(Kind::None)) {}
+ FunctionEffect() : FKind(Kind::None) {}
- explicit FunctionEffect(Kind K) : FKind(unsigned(K)) {}
+ explicit FunctionEffect(Kind K) : FKind(K) {}
/// The kind of the effect.
- Kind kind() const { return Kind(FKind); }
+ Kind kind() const { return FKind; }
/// Return the opposite kind, for effects which have opposites.
Kind oppositeKind() const;
/// For serialization.
- uint32_t toOpaqueInt32() const { return FKind; }
+ uint32_t toOpaqueInt32() const { return uint32_t(FKind); }
static FunctionEffect fromOpaqueInt32(uint32_t Value) {
return FunctionEffect(Kind(Value));
}
>From f1142db51dff9794be2f63c2a2aca585760b5620 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 26 Jul 2024 12:48:59 -0700
Subject: [PATCH 06/59] New file: EFfectAnalysis.cpp. Use LLVM_DEBUG for debug
logging. Remove unneeded isInline() check in functionIsVerifiable
---
clang/include/clang/Sema/Sema.h | 4 +
clang/lib/Sema/AnalysisBasedWarnings.cpp | 1269 ---------------------
clang/lib/Sema/CMakeLists.txt | 1 +
clang/lib/Sema/EffectAnalysis.cpp | 1289 ++++++++++++++++++++++
clang/lib/Sema/Sema.cpp | 3 +
5 files changed, 1297 insertions(+), 1269 deletions(-)
create mode 100644 clang/lib/Sema/EffectAnalysis.cpp
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index a42f6af3c70e48..fae0a2f4f46dee 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -530,6 +530,10 @@ struct FunctionEffectDifferences : public SmallVector<FunctionEffectDiff> {
const FunctionEffectsRef &New);
};
+// Defined in EffectAnalysis.cpp. TODO: Maybe make this a method of Sema and move
+// more of the effects implementation into that file?
+void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU);
+
/// Sema - This implements semantic analysis and AST building for C.
/// \nosubgrouping
class Sema final : public SemaBase {
diff --git a/clang/lib/Sema/AnalysisBasedWarnings.cpp b/clang/lib/Sema/AnalysisBasedWarnings.cpp
index f26468cfcdad54..8268117a0addab 100644
--- a/clang/lib/Sema/AnalysisBasedWarnings.cpp
+++ b/clang/lib/Sema/AnalysisBasedWarnings.cpp
@@ -2399,1272 +2399,6 @@ class UnsafeBufferUsageReporter : public UnsafeBufferUsageHandler {
// =============================================================================
-namespace FXAnalysis {
-
-enum class DiagnosticID : uint8_t {
- None = 0, // sentinel for an empty Diagnostic
- Throws,
- Catches,
- CallsObjC,
- AllocatesMemory,
- HasStaticLocal,
- AccessesThreadLocal,
-
- // These only apply to callees, where the analysis stops at the Decl
- DeclDisallowsInference,
-
- CallsDeclWithoutEffect,
- CallsExprWithoutEffect,
-};
-
-// Holds an effect diagnosis, potentially for the entire duration of the
-// analysis phase, in order to refer to it when explaining why a caller has been
-// made unsafe by a callee.
-struct Diagnostic {
- FunctionEffect Effect;
- DiagnosticID ID = DiagnosticID::None;
- SourceLocation Loc;
- const Decl *Callee = nullptr; // only valid for Calls*
-
- Diagnostic() = default;
-
- Diagnostic(const FunctionEffect &Effect, DiagnosticID ID, SourceLocation Loc,
- const Decl *Callee = nullptr)
- : Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {}
-};
-
-enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
-enum class CallType {
- // unknown: probably function pointer
- Unknown,
- Function,
- Virtual,
- Block
-};
-
-// Return whether a function's effects CAN be verified.
-// The question of whether it SHOULD be verified is independent.
-static bool functionIsVerifiable(const FunctionDecl *FD) {
- if (!(FD->hasBody() || FD->isInlined())) {
- // externally defined; we couldn't verify if we wanted to.
- return false;
- }
- if (FD->isTrivial()) {
- // Otherwise `struct x { int a; };` would have an unverifiable default
- // constructor.
- return true;
- }
- return true;
-}
-
-/// A mutable set of FunctionEffect, for use in places where any conditions
-/// have been resolved or can be ignored.
-class EffectSet {
- // This implementation optimizes footprint, since we hold one of these for
- // every function visited, which, due to inference, can be many more functions
- // than have declared effects.
-
- template <typename T, typename SizeT, SizeT Capacity> struct FixedVector {
- SizeT Count = 0;
- T Items[Capacity] = {};
-
- using value_type = T;
-
- using iterator = T *;
- using const_iterator = const T *;
- iterator begin() { return &Items[0]; }
- iterator end() { return &Items[Count]; }
- const_iterator begin() const { return &Items[0]; }
- const_iterator end() const { return &Items[Count]; }
- const_iterator cbegin() const { return &Items[0]; }
- const_iterator cend() const { return &Items[Count]; }
-
- void insert(iterator I, const T &Value) {
- assert(Count < Capacity);
- iterator E = end();
- if (I != E)
- std::copy_backward(I, E, E + 1);
- *I = Value;
- ++Count;
- }
-
- void push_back(const T &Value) {
- assert(Count < Capacity);
- Items[Count++] = Value;
- }
- };
-
- // As long as FunctionEffect is only 1 byte, and there are only 2 verifiable
- // effects, this fixed-size vector with a capacity of 7 is more than
- // sufficient and is only 8 bytes.
- FixedVector<FunctionEffect, uint8_t, 7> Impl;
-
-public:
- EffectSet() = default;
- explicit EffectSet(FunctionEffectsRef FX) { insert(FX); }
-
- operator ArrayRef<FunctionEffect>() const {
- return ArrayRef(Impl.cbegin(), Impl.cend());
- }
-
- using iterator = const FunctionEffect *;
- iterator begin() const { return Impl.cbegin(); }
- iterator end() const { return Impl.cend(); }
-
- void insert(const FunctionEffect &Effect) {
- FunctionEffect *Iter = Impl.begin();
- FunctionEffect *End = Impl.end();
- // linear search; lower_bound is overkill for a tiny vector like this
- for (; Iter != End; ++Iter) {
- if (*Iter == Effect)
- return;
- if (Effect < *Iter)
- break;
- }
- Impl.insert(Iter, Effect);
- }
- void insert(const EffectSet &Set) {
- for (const FunctionEffect &Item : Set) {
- // push_back because set is already sorted
- Impl.push_back(Item);
- }
- }
- void insert(FunctionEffectsRef FX) {
- for (const FunctionEffectWithCondition &EC : FX) {
- assert(EC.Cond.getCondition() ==
- nullptr); // should be resolved by now, right?
- // push_back because set is already sorted
- Impl.push_back(EC.Effect);
- }
- }
- bool contains(const FunctionEffect::Kind EK) const {
- for (const FunctionEffect &E : Impl)
- if (E.kind() == EK)
- return true;
- return false;
- }
-
- void dump(llvm::raw_ostream &OS) const;
-
- static EffectSet difference(ArrayRef<FunctionEffect> LHS,
- ArrayRef<FunctionEffect> RHS) {
- EffectSet Result;
- std::set_difference(LHS.begin(), LHS.end(), RHS.begin(), RHS.end(),
- std::back_inserter(Result.Impl));
- return Result;
- }
-};
-
-LLVM_DUMP_METHOD void EffectSet::dump(llvm::raw_ostream &OS) const {
- OS << "Effects{";
- bool First = true;
- for (const FunctionEffect &Effect : *this) {
- if (!First)
- OS << ", ";
- else
- First = false;
- OS << Effect.name();
- }
- OS << "}";
-}
-
-// Transitory, more extended information about a callable, which can be a
-// function, block, function pointer, etc.
-struct CallableInfo {
- // CDecl holds the function's definition, if any.
- // FunctionDecl if CallType::Function or Virtual
- // BlockDecl if CallType::Block
- const Decl *CDecl;
- mutable std::optional<std::string> MaybeName;
- SpecialFuncType FuncType = SpecialFuncType::None;
- EffectSet Effects;
- CallType CType = CallType::Unknown;
-
- CallableInfo(Sema &SemaRef, const Decl &CD,
- SpecialFuncType FT = SpecialFuncType::None)
- : CDecl(&CD), FuncType(FT) {
- FunctionEffectsRef FXRef;
-
- if (auto *FD = dyn_cast<FunctionDecl>(CDecl)) {
- // Use the function's definition, if any.
- if (const FunctionDecl *Def = FD->getDefinition())
- CDecl = FD = Def;
- CType = CallType::Function;
- if (auto *Method = dyn_cast<CXXMethodDecl>(FD);
- Method && Method->isVirtual())
- CType = CallType::Virtual;
- FXRef = FD->getFunctionEffects();
- } else if (auto *BD = dyn_cast<BlockDecl>(CDecl)) {
- CType = CallType::Block;
- FXRef = BD->getFunctionEffects();
- } else if (auto *VD = dyn_cast<ValueDecl>(CDecl)) {
- // ValueDecl is function, enum, or variable, so just look at its type.
- FXRef = FunctionEffectsRef::get(VD->getType());
- }
- Effects = EffectSet(FXRef);
- }
-
- bool isDirectCall() const {
- return CType == CallType::Function || CType == CallType::Block;
- }
-
- bool isVerifiable() const {
- switch (CType) {
- case CallType::Unknown:
- case CallType::Virtual:
- break;
- case CallType::Block:
- return true;
- case CallType::Function:
- return functionIsVerifiable(dyn_cast<FunctionDecl>(CDecl));
- }
- return false;
- }
-
- /// Generate a name for logging and diagnostics.
- std::string name(Sema &Sem) const {
- if (!MaybeName) {
- std::string Name;
- llvm::raw_string_ostream OS(Name);
-
- if (auto *FD = dyn_cast<FunctionDecl>(CDecl))
- FD->getNameForDiagnostic(OS, Sem.getPrintingPolicy(),
- /*Qualified=*/true);
- else if (auto *BD = dyn_cast<BlockDecl>(CDecl))
- OS << "(block " << BD->getBlockManglingNumber() << ")";
- else if (auto *VD = dyn_cast<NamedDecl>(CDecl))
- VD->printQualifiedName(OS);
- MaybeName = Name;
- }
- return *MaybeName;
- }
-};
-
-// ----------
-// Map effects to single diagnostics, to hold the first (of potentially many)
-// diagnostics pertaining to an effect, per function.
-class EffectToDiagnosticMap {
- // Since we currently only have a tiny number of effects (typically no more
- // than 1), use a sorted SmallVector with an inline capacity of 1. Since it
- // is often empty, use a unique_ptr to the SmallVector.
- // Note that Diagnostic itself contains a FunctionEffect which is the key.
- using ImplVec = llvm::SmallVector<Diagnostic, 1>;
- std::unique_ptr<ImplVec> Impl;
-
-public:
- // Insert a new diagnostic if we do not already have one for its effect.
- void maybeInsert(const Diagnostic &Diag) {
- if (Impl == nullptr)
- Impl = std::make_unique<ImplVec>();
- auto *Iter = _find(Diag.Effect);
- if (Iter != Impl->end() && Iter->Effect == Diag.Effect)
- return;
-
- Impl->insert(Iter, Diag);
- }
-
- const Diagnostic *lookup(FunctionEffect Key) {
- if (Impl == nullptr)
- return nullptr;
-
- auto *Iter = _find(Key);
- if (Iter != Impl->end() && Iter->Effect == Key)
- return &*Iter;
-
- return nullptr;
- }
-
- size_t size() const { return Impl ? Impl->size() : 0; }
-
-private:
- ImplVec::iterator _find(const FunctionEffect &key) {
- // A linear search suffices for a tiny number of possible effects.
- auto *End = Impl->end();
- for (auto *Iter = Impl->begin(); Iter != End; ++Iter)
- if (!(Iter->Effect < key))
- return Iter;
- return End;
- }
-};
-
-// ----------
-// State pertaining to a function whose AST is walked and whose effect analysis
-// is dependent on a subsequent analysis of other functions.
-class PendingFunctionAnalysis {
- friend class CompleteFunctionAnalysis;
-
-public:
- struct DirectCall {
- const Decl *Callee;
- SourceLocation CallLoc;
- // Not all recursive calls are detected, just enough
- // to break cycles.
- bool Recursed = false;
-
- DirectCall(const Decl *D, SourceLocation CallLoc)
- : Callee(D), CallLoc(CallLoc) {}
- };
-
- // We always have two disjoint sets of effects to verify:
- // 1. Effects declared explicitly by this function.
- // 2. All other inferrable effects needing verification.
- EffectSet DeclaredVerifiableEffects;
- EffectSet FXToInfer;
-
-private:
- // Diagnostics pertaining to the function's explicit effects.
- SmallVector<Diagnostic, 0> DiagnosticsForExplicitFX;
-
- // Diagnostics pertaining to other, non-explicit, inferrable effects.
- EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
-
- // These unverified direct calls are what keeps the analysis "pending",
- // until the callees can be verified.
- SmallVector<DirectCall, 0> UnverifiedDirectCalls;
-
-public:
- PendingFunctionAnalysis(
- Sema &Sem, const CallableInfo &CInfo,
- ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
- DeclaredVerifiableEffects = CInfo.Effects;
-
- // Check for effects we are not allowed to infer
- EffectSet InferrableFX;
-
- for (const FunctionEffect &effect : AllInferrableEffectsToVerify) {
- if (effect.canInferOnFunction(*CInfo.CDecl))
- InferrableFX.insert(effect);
- else {
- // Add a diagnostic for this effect if a caller were to
- // try to infer it.
- InferrableEffectToFirstDiagnostic.maybeInsert(
- Diagnostic(effect, DiagnosticID::DeclDisallowsInference,
- CInfo.CDecl->getLocation()));
- }
- }
- // InferrableFX is now the set of inferrable effects which are not
- // prohibited
- FXToInfer = EffectSet::difference(InferrableFX, DeclaredVerifiableEffects);
- }
-
- // Hide the way that diagnostics for explicitly required effects vs. inferred
- // ones are handled differently.
- void checkAddDiagnostic(bool Inferring, const Diagnostic &NewDiag) {
- if (!Inferring)
- DiagnosticsForExplicitFX.push_back(NewDiag);
- else
- InferrableEffectToFirstDiagnostic.maybeInsert(NewDiag);
- }
-
- void addUnverifiedDirectCall(const Decl *D, SourceLocation CallLoc) {
- UnverifiedDirectCalls.emplace_back(D, CallLoc);
- }
-
- // Analysis is complete when there are no unverified direct calls.
- bool isComplete() const { return UnverifiedDirectCalls.empty(); }
-
- const Diagnostic *diagnosticForInferrableEffect(FunctionEffect effect) {
- return InferrableEffectToFirstDiagnostic.lookup(effect);
- }
-
- SmallVector<DirectCall, 0> &unverifiedCalls() {
- assert(!isComplete());
- return UnverifiedDirectCalls;
- }
-
- SmallVector<Diagnostic, 0> &getDiagnosticsForExplicitFX() {
- return DiagnosticsForExplicitFX;
- }
-
- void dump(Sema &SemaRef, llvm::raw_ostream &OS) const {
- OS << "Pending: Declared ";
- DeclaredVerifiableEffects.dump(OS);
- OS << ", " << DiagnosticsForExplicitFX.size() << " diags; ";
- OS << " Infer ";
- FXToInfer.dump(OS);
- OS << ", " << InferrableEffectToFirstDiagnostic.size() << " diags";
- if (!UnverifiedDirectCalls.empty()) {
- OS << "; Calls: ";
- for (const DirectCall &Call : UnverifiedDirectCalls) {
- CallableInfo CI(SemaRef, *Call.Callee);
- OS << " " << CI.name(SemaRef);
- }
- }
- OS << "\n";
- }
-};
-
-// ----------
-class CompleteFunctionAnalysis {
- // Current size: 2 pointers
-public:
- // Has effects which are both the declared ones -- not to be inferred -- plus
- // ones which have been successfully inferred. These are all considered
- // "verified" for the purposes of callers; any issue with verifying declared
- // effects has already been reported and is not the problem of any caller.
- EffectSet VerifiedEffects;
-
-private:
- // This is used to generate notes about failed inference.
- EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
-
-public:
- // The incoming Pending analysis is consumed (member(s) are moved-from).
- CompleteFunctionAnalysis(
- ASTContext &Ctx, PendingFunctionAnalysis &Pending,
- const EffectSet &DeclaredEffects,
- ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
- VerifiedEffects.insert(DeclaredEffects);
- for (const FunctionEffect &effect : AllInferrableEffectsToVerify)
- if (Pending.diagnosticForInferrableEffect(effect) == nullptr)
- VerifiedEffects.insert(effect);
-
- InferrableEffectToFirstDiagnostic =
- std::move(Pending.InferrableEffectToFirstDiagnostic);
- }
-
- const Diagnostic *firstDiagnosticForEffect(const FunctionEffect &Effect) {
- return InferrableEffectToFirstDiagnostic.lookup(Effect);
- }
-
- void dump(llvm::raw_ostream &OS) const {
- OS << "Complete: Verified ";
- VerifiedEffects.dump(OS);
- OS << "; Infer ";
- OS << InferrableEffectToFirstDiagnostic.size() << " diags\n";
- }
-};
-
-const Decl *CanonicalFunctionDecl(const Decl *D) {
- if (auto *FD = dyn_cast<FunctionDecl>(D)) {
- FD = FD->getCanonicalDecl();
- assert(FD != nullptr);
- return FD;
- }
- return D;
-}
-
-// ==========
-class Analyzer {
- constexpr static int DebugLogLevel = 0;
- // --
- Sema &Sem;
-
- // Subset of Sema.AllEffectsToVerify
- EffectSet AllInferrableEffectsToVerify;
-
- using FuncAnalysisPtr =
- llvm::PointerUnion<PendingFunctionAnalysis *, CompleteFunctionAnalysis *>;
-
- // Map all Decls analyzed to FuncAnalysisPtr. Pending state is larger
- // than complete state, so use different objects to represent them.
- // The state pointers are owned by the container.
- class AnalysisMap : protected llvm::DenseMap<const Decl *, FuncAnalysisPtr> {
- using Base = llvm::DenseMap<const Decl *, FuncAnalysisPtr>;
-
- public:
- ~AnalysisMap();
-
- // Use non-public inheritance in order to maintain the invariant
- // that lookups and insertions are via the canonical Decls.
-
- FuncAnalysisPtr lookup(const Decl *Key) const {
- return Base::lookup(CanonicalFunctionDecl(Key));
- }
-
- FuncAnalysisPtr &operator[](const Decl *Key) {
- return Base::operator[](CanonicalFunctionDecl(Key));
- }
-
- /// Shortcut for the case where we only care about completed analysis.
- CompleteFunctionAnalysis *completedAnalysisForDecl(const Decl *D) const {
- if (FuncAnalysisPtr AP = lookup(D);
- isa_and_nonnull<CompleteFunctionAnalysis *>(AP))
- return AP.get<CompleteFunctionAnalysis *>();
- return nullptr;
- }
-
- void dump(Sema &SemaRef, llvm::raw_ostream &OS) {
- OS << "\nAnalysisMap:\n";
- for (const auto &item : *this) {
- CallableInfo CI(SemaRef, *item.first);
- const auto AP = item.second;
- OS << item.first << " " << CI.name(SemaRef) << " : ";
- if (AP.isNull())
- OS << "null\n";
- else if (isa<CompleteFunctionAnalysis *>(AP)) {
- auto *CFA = AP.get<CompleteFunctionAnalysis *>();
- OS << CFA << " ";
- CFA->dump(OS);
- } else if (isa<PendingFunctionAnalysis *>(AP)) {
- auto *PFA = AP.get<PendingFunctionAnalysis *>();
- OS << PFA << " ";
- PFA->dump(SemaRef, OS);
- } else
- llvm_unreachable("never");
- }
- OS << "---\n";
- }
- };
- AnalysisMap DeclAnalysis;
-
-public:
- Analyzer(Sema &S) : Sem(S) {}
-
- void run(const TranslationUnitDecl &TU) {
- // Gather all of the effects to be verified to see what operations need to
- // be checked, and to see which ones are inferrable.
- for (const FunctionEffectWithCondition &CFE : Sem.AllEffectsToVerify) {
- const FunctionEffect &Effect = CFE.Effect;
- const FunctionEffect::Flags Flags = Effect.flags();
- if (Flags & FunctionEffect::FE_InferrableOnCallees)
- AllInferrableEffectsToVerify.insert(Effect);
- }
- if constexpr (DebugLogLevel > 0) {
- llvm::outs() << "AllInferrableEffectsToVerify: ";
- AllInferrableEffectsToVerify.dump(llvm::outs());
- llvm::outs() << "\n";
- }
-
- // We can use DeclsWithEffectsToVerify as a stack for a
- // depth-first traversal; there's no need for a second container. But first,
- // reverse it, so when working from the end, Decls are verified in the order
- // they are declared.
- SmallVector<const Decl *> &VerificationQueue = Sem.DeclsWithEffectsToVerify;
- std::reverse(VerificationQueue.begin(), VerificationQueue.end());
-
- while (!VerificationQueue.empty()) {
- const Decl *D = VerificationQueue.back();
- if (FuncAnalysisPtr AP = DeclAnalysis.lookup(D)) {
- if (isa<CompleteFunctionAnalysis *>(AP)) {
- // already done
- VerificationQueue.pop_back();
- continue;
- }
- if (isa<PendingFunctionAnalysis *>(AP)) {
- // All children have been traversed; finish analysis.
- auto *Pending = AP.get<PendingFunctionAnalysis *>();
- finishPendingAnalysis(D, Pending);
- VerificationQueue.pop_back();
- continue;
- }
- llvm_unreachable("unexpected DeclAnalysis item");
- }
-
- // Not previously visited; begin a new analysis for this Decl.
- PendingFunctionAnalysis *Pending = verifyDecl(D);
- if (Pending == nullptr) {
- // completed now
- VerificationQueue.pop_back();
- continue;
- }
-
- // Analysis remains pending because there are direct callees to be
- // verified first. Push them onto the queue.
- for (PendingFunctionAnalysis::DirectCall &Call :
- Pending->unverifiedCalls()) {
- FuncAnalysisPtr AP = DeclAnalysis.lookup(Call.Callee);
- if (AP.isNull()) {
- VerificationQueue.push_back(Call.Callee);
- continue;
- }
- if (isa<PendingFunctionAnalysis *>(AP)) {
- // This indicates recursion (not necessarily direct). For the
- // purposes of effect analysis, we can just ignore it since
- // no effects forbid recursion.
- Call.Recursed = true;
- continue;
- }
- llvm_unreachable("unexpected DeclAnalysis item");
- }
- }
- }
-
-private:
- // Verify a single Decl. Return the pending structure if that was the result,
- // else null. This method must not recurse.
- PendingFunctionAnalysis *verifyDecl(const Decl *D) {
- CallableInfo CInfo(Sem, *D);
- bool isExternC = false;
-
- if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
- assert(FD->getBuiltinID() == 0);
- isExternC = FD->getCanonicalDecl()->isExternCContext();
- }
-
- // For C++, with non-extern "C" linkage only - if any of the Decl's declared
- // effects forbid throwing (e.g. nonblocking) then the function should also
- // be declared noexcept.
- if (Sem.getLangOpts().CPlusPlus && !isExternC) {
- for (const FunctionEffect &Effect : CInfo.Effects) {
- if (!(Effect.flags() & FunctionEffect::FE_ExcludeThrow))
- continue;
-
- bool IsNoexcept = false;
- if (auto *FD = D->getAsFunction()) {
- IsNoexcept = isNoexcept(FD);
- } else if (auto *BD = dyn_cast<BlockDecl>(D)) {
- if (auto *TSI = BD->getSignatureAsWritten()) {
- auto *FPT = TSI->getType()->getAs<FunctionProtoType>();
- IsNoexcept = FPT->isNothrow() || BD->hasAttr<NoThrowAttr>();
- }
- }
- if (!IsNoexcept)
- Sem.Diag(D->getBeginLoc(),
- diag::warn_perf_constraint_implies_noexcept)
- << Effect.name();
- break;
- }
- }
-
- // Build a PendingFunctionAnalysis on the stack. If it turns out to be
- // complete, we'll have avoided a heap allocation; if it's incomplete, it's
- // a fairly trivial move to a heap-allocated object.
- PendingFunctionAnalysis FAnalysis(Sem, CInfo, AllInferrableEffectsToVerify);
-
- if constexpr (DebugLogLevel > 0) {
- llvm::outs() << "\nVerifying " << CInfo.name(Sem) << " ";
- FAnalysis.dump(Sem, llvm::outs());
- }
-
- FunctionBodyASTVisitor Visitor(*this, FAnalysis, CInfo);
-
- Visitor.run();
- if (FAnalysis.isComplete()) {
- completeAnalysis(CInfo, FAnalysis);
- return nullptr;
- }
- // Move the pending analysis to the heap and save it in the map.
- PendingFunctionAnalysis *PendingPtr =
- new PendingFunctionAnalysis(std::move(FAnalysis));
- DeclAnalysis[D] = PendingPtr;
- if constexpr (DebugLogLevel > 0) {
- llvm::outs() << "inserted pending " << PendingPtr << "\n";
- DeclAnalysis.dump(Sem, llvm::outs());
- }
- return PendingPtr;
- }
-
- // Consume PendingFunctionAnalysis, create with it a CompleteFunctionAnalysis,
- // inserted in the container.
- void completeAnalysis(const CallableInfo &CInfo,
- PendingFunctionAnalysis &Pending) {
- if (SmallVector<Diagnostic, 0> &Diags =
- Pending.getDiagnosticsForExplicitFX();
- !Diags.empty())
- emitDiagnostics(Diags, CInfo, Sem);
-
- CompleteFunctionAnalysis *CompletePtr = new CompleteFunctionAnalysis(
- Sem.getASTContext(), Pending, CInfo.Effects,
- AllInferrableEffectsToVerify);
- DeclAnalysis[CInfo.CDecl] = CompletePtr;
- if constexpr (DebugLogLevel > 0) {
- llvm::outs() << "inserted complete " << CompletePtr << "\n";
- DeclAnalysis.dump(Sem, llvm::outs());
- }
- }
-
- // Called after all direct calls requiring inference have been found -- or
- // not. Repeats calls to FunctionBodyASTVisitor::followCall() but without
- // the possibility of inference. Deletes Pending.
- void finishPendingAnalysis(const Decl *D, PendingFunctionAnalysis *Pending) {
- CallableInfo Caller(Sem, *D);
- if constexpr (DebugLogLevel > 0) {
- llvm::outs() << "finishPendingAnalysis for " << Caller.name(Sem) << " : ";
- Pending->dump(Sem, llvm::outs());
- llvm::outs() << "\n";
- }
- for (const PendingFunctionAnalysis::DirectCall &Call :
- Pending->unverifiedCalls()) {
- if (Call.Recursed)
- continue;
-
- CallableInfo Callee(Sem, *Call.Callee);
- followCall(Caller, *Pending, Callee, Call.CallLoc,
- /*AssertNoFurtherInference=*/true);
- }
- completeAnalysis(Caller, *Pending);
- delete Pending;
- }
-
- // Here we have a call to a Decl, either explicitly via a CallExpr or some
- // other AST construct. PFA pertains to the caller.
- void followCall(const CallableInfo &Caller, PendingFunctionAnalysis &PFA,
- const CallableInfo &Callee, SourceLocation CallLoc,
- bool AssertNoFurtherInference) {
- const bool DirectCall = Callee.isDirectCall();
-
- // Initially, the declared effects; inferred effects will be added.
- EffectSet CalleeEffects = Callee.Effects;
-
- bool IsInferencePossible = DirectCall;
-
- if (DirectCall) {
- if (CompleteFunctionAnalysis *CFA =
- DeclAnalysis.completedAnalysisForDecl(Callee.CDecl)) {
- // Combine declared effects with those which may have been inferred.
- CalleeEffects.insert(CFA->VerifiedEffects);
- IsInferencePossible = false; // we've already traversed it
- }
- }
-
- if (AssertNoFurtherInference) {
- assert(!IsInferencePossible);
- }
-
- if (!Callee.isVerifiable())
- IsInferencePossible = false;
-
- if constexpr (DebugLogLevel > 0) {
- llvm::outs() << "followCall from " << Caller.name(Sem) << " to "
- << Callee.name(Sem)
- << "; verifiable: " << Callee.isVerifiable() << "; callee ";
- CalleeEffects.dump(llvm::outs());
- llvm::outs() << "\n";
- llvm::outs() << " callee " << Callee.CDecl << " canonical "
- << CanonicalFunctionDecl(Callee.CDecl) << " redecls";
- for (Decl *D : Callee.CDecl->redecls())
- llvm::outs() << " " << D;
-
- llvm::outs() << "\n";
- }
-
- auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
- FunctionEffect::Flags Flags = Effect.flags();
- bool Diagnose =
- Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects);
- if (Diagnose) {
- // If inference is not allowed, or the target is indirect (virtual
- // method/function ptr?), generate a diagnostic now.
- if (!IsInferencePossible ||
- !(Flags & FunctionEffect::FE_InferrableOnCallees)) {
- if (Callee.FuncType == SpecialFuncType::None)
- PFA.checkAddDiagnostic(
- Inferring, {Effect, DiagnosticID::CallsDeclWithoutEffect,
- CallLoc, Callee.CDecl});
- else
- PFA.checkAddDiagnostic(
- Inferring, {Effect, DiagnosticID::AllocatesMemory, CallLoc});
- } else {
- // Inference is allowed and necessary; defer it.
- PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc);
- }
- }
- };
-
- for (const FunctionEffect &Effect : PFA.DeclaredVerifiableEffects)
- check1Effect(Effect, false);
-
- for (const FunctionEffect &Effect : PFA.FXToInfer)
- check1Effect(Effect, true);
- }
-
- // Should only be called when determined to be complete.
- void emitDiagnostics(SmallVector<Diagnostic, 0> &Diags,
- const CallableInfo &CInfo, Sema &S) {
- if (Diags.empty())
- return;
- const SourceManager &SM = S.getSourceManager();
- std::sort(Diags.begin(), Diags.end(),
- [&SM](const Diagnostic &LHS, const Diagnostic &RHS) {
- return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
- });
-
- auto checkAddTemplateNote = [&](const Decl *D) {
- if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
- while (FD != nullptr && FD->isTemplateInstantiation()) {
- S.Diag(FD->getPointOfInstantiation(),
- diag::note_func_effect_from_template);
- FD = FD->getTemplateInstantiationPattern();
- }
- }
- };
-
- // Top-level diagnostics are warnings.
- for (const Diagnostic &Diag : Diags) {
- StringRef effectName = Diag.Effect.name();
- switch (Diag.ID) {
- case DiagnosticID::None:
- case DiagnosticID::DeclDisallowsInference: // shouldn't happen
- // here
- llvm_unreachable("Unexpected diagnostic kind");
- break;
- case DiagnosticID::AllocatesMemory:
- S.Diag(Diag.Loc, diag::warn_func_effect_allocates) << effectName;
- checkAddTemplateNote(CInfo.CDecl);
- break;
- case DiagnosticID::Throws:
- case DiagnosticID::Catches:
- S.Diag(Diag.Loc, diag::warn_func_effect_throws_or_catches)
- << effectName;
- checkAddTemplateNote(CInfo.CDecl);
- break;
- case DiagnosticID::HasStaticLocal:
- S.Diag(Diag.Loc, diag::warn_func_effect_has_static_local) << effectName;
- checkAddTemplateNote(CInfo.CDecl);
- break;
- case DiagnosticID::AccessesThreadLocal:
- S.Diag(Diag.Loc, diag::warn_func_effect_uses_thread_local)
- << effectName;
- checkAddTemplateNote(CInfo.CDecl);
- break;
- case DiagnosticID::CallsObjC:
- S.Diag(Diag.Loc, diag::warn_func_effect_calls_objc) << effectName;
- checkAddTemplateNote(CInfo.CDecl);
- break;
- case DiagnosticID::CallsExprWithoutEffect:
- S.Diag(Diag.Loc, diag::warn_func_effect_calls_expr_without_effect)
- << effectName;
- checkAddTemplateNote(CInfo.CDecl);
- break;
-
- case DiagnosticID::CallsDeclWithoutEffect: {
- CallableInfo CalleeInfo(S, *Diag.Callee);
- std::string CalleeName = CalleeInfo.name(S);
-
- S.Diag(Diag.Loc, diag::warn_func_effect_calls_func_without_effect)
- << effectName << CalleeName;
- checkAddTemplateNote(CInfo.CDecl);
-
- // Emit notes explaining the transitive chain of inferences: Why isn't
- // the callee safe?
- for (const Decl *Callee = Diag.Callee; Callee != nullptr;) {
- std::optional<CallableInfo> MaybeNextCallee;
- CompleteFunctionAnalysis *Completed =
- DeclAnalysis.completedAnalysisForDecl(CalleeInfo.CDecl);
- if (Completed == nullptr) {
- // No result - could be
- // - non-inline
- // - indirect (virtual or through function pointer)
- // - effect has been explicitly disclaimed (e.g. "blocking")
- if (CalleeInfo.CType == CallType::Virtual)
- S.Diag(Callee->getLocation(), diag::note_func_effect_call_virtual)
- << effectName;
- else if (CalleeInfo.CType == CallType::Unknown)
- S.Diag(Callee->getLocation(),
- diag::note_func_effect_call_func_ptr)
- << effectName;
- else if (CalleeInfo.Effects.contains(Diag.Effect.oppositeKind()))
- S.Diag(Callee->getLocation(),
- diag::note_func_effect_call_disallows_inference)
- << effectName;
- else
- S.Diag(Callee->getLocation(), diag::note_func_effect_call_extern)
- << effectName;
-
- break;
- }
- const Diagnostic *PtrDiag2 =
- Completed->firstDiagnosticForEffect(Diag.Effect);
- if (PtrDiag2 == nullptr)
- break;
-
- const Diagnostic &Diag2 = *PtrDiag2;
- switch (Diag2.ID) {
- case DiagnosticID::None:
- llvm_unreachable("Unexpected diagnostic kind");
- break;
- case DiagnosticID::DeclDisallowsInference:
- S.Diag(Diag2.Loc, diag::note_func_effect_call_disallows_inference)
- << effectName;
- break;
- case DiagnosticID::CallsExprWithoutEffect:
- S.Diag(Diag2.Loc, diag::note_func_effect_call_func_ptr)
- << effectName;
- break;
- case DiagnosticID::AllocatesMemory:
- S.Diag(Diag2.Loc, diag::note_func_effect_allocates) << effectName;
- break;
- case DiagnosticID::Throws:
- case DiagnosticID::Catches:
- S.Diag(Diag2.Loc, diag::note_func_effect_throws_or_catches)
- << effectName;
- break;
- case DiagnosticID::HasStaticLocal:
- S.Diag(Diag2.Loc, diag::note_func_effect_has_static_local)
- << effectName;
- break;
- case DiagnosticID::AccessesThreadLocal:
- S.Diag(Diag2.Loc, diag::note_func_effect_uses_thread_local)
- << effectName;
- break;
- case DiagnosticID::CallsObjC:
- S.Diag(Diag2.Loc, diag::note_func_effect_calls_objc) << effectName;
- break;
- case DiagnosticID::CallsDeclWithoutEffect:
- MaybeNextCallee.emplace(S, *Diag2.Callee);
- S.Diag(Diag2.Loc, diag::note_func_effect_calls_func_without_effect)
- << effectName << MaybeNextCallee->name(S);
- break;
- }
- checkAddTemplateNote(Callee);
- Callee = Diag2.Callee;
- if (MaybeNextCallee) {
- CalleeInfo = *MaybeNextCallee;
- CalleeName = CalleeInfo.name(S);
- }
- }
- } break;
- }
- }
- }
-
- // ----------
- // This AST visitor is used to traverse the body of a function during effect
- // verification. This happens in 2 situations:
- // [1] The function has declared effects which need to be validated.
- // [2] The function has not explicitly declared an effect in question, and is
- // being checked for implicit conformance.
- //
- // Diagnostics are always routed to a PendingFunctionAnalysis, which holds
- // all diagnostic output.
- //
- // Q: Currently we create a new RecursiveASTVisitor for every function
- // analysis. Is it so lightweight that this is OK? It would appear so.
- struct FunctionBodyASTVisitor
- : public RecursiveASTVisitor<FunctionBodyASTVisitor> {
- // The meanings of the boolean values returned by the Visit methods can be
- // difficult to remember.
- constexpr static bool Stop = false;
- constexpr static bool Proceed = true;
-
- Analyzer &Outer;
- PendingFunctionAnalysis &CurrentFunction;
- CallableInfo &CurrentCaller;
-
- FunctionBodyASTVisitor(Analyzer &outer,
- PendingFunctionAnalysis &CurrentFunction,
- CallableInfo &CurrentCaller)
- : Outer(outer), CurrentFunction(CurrentFunction),
- CurrentCaller(CurrentCaller) {}
-
- // -- Entry point --
- void run() {
- // The target function itself may have some implicit code paths beyond the
- // body: member and base constructors and destructors. Visit these first.
- if (const auto *FD = dyn_cast<const FunctionDecl>(CurrentCaller.CDecl)) {
- if (auto *Ctor = dyn_cast<CXXConstructorDecl>(FD)) {
- for (const CXXCtorInitializer *Initer : Ctor->inits())
- if (Expr *Init = Initer->getInit())
- VisitStmt(Init);
- } else if (auto *Dtor = dyn_cast<CXXDestructorDecl>(FD))
- followDestructor(dyn_cast<CXXRecordDecl>(Dtor->getParent()), Dtor);
- }
- // else could be BlockDecl
-
- // Do an AST traversal of the function/block body
- TraverseDecl(const_cast<Decl *>(CurrentCaller.CDecl));
- }
-
- // -- Methods implementing common logic --
-
- // Handle a language construct forbidden by some effects. Only effects whose
- // flags include the specified flag receive a diagnostic. \p Flag describes
- // the construct.
- void diagnoseLanguageConstruct(FunctionEffect::FlagBit Flag, DiagnosticID D,
- SourceLocation Loc,
- const Decl *Callee = nullptr) {
- // If there are any declared verifiable effects which forbid the construct
- // represented by the flag, store just one diagnostic.
- for (const FunctionEffect &Effect :
- CurrentFunction.DeclaredVerifiableEffects) {
- if (Effect.flags() & Flag) {
- addDiagnostic(/*inferring=*/false, Effect, D, Loc, Callee);
- break;
- }
- }
- // For each inferred effect which forbids the construct, store a
- // diagnostic, if we don't already have a diagnostic for that effect.
- for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
- if (Effect.flags() & Flag)
- addDiagnostic(/*inferring=*/true, Effect, D, Loc, Callee);
- }
-
- void addDiagnostic(bool Inferring, const FunctionEffect &Effect,
- DiagnosticID D, SourceLocation Loc,
- const Decl *Callee = nullptr) {
- CurrentFunction.checkAddDiagnostic(Inferring,
- Diagnostic(Effect, D, Loc, Callee));
- }
-
- // Here we have a call to a Decl, either explicitly via a CallExpr or some
- // other AST construct. CallableInfo pertains to the callee.
- void followCall(const CallableInfo &CI, SourceLocation CallLoc) {
- // Currently, built-in functions are always considered safe.
- // FIXME: Some are not.
- if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl);
- FD && FD->getBuiltinID() != 0)
- return;
-
- Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
- /*AssertNoFurtherInference=*/false);
- }
-
- void checkIndirectCall(CallExpr *Call, Expr *CalleeExpr) {
- const QualType CalleeType = CalleeExpr->getType();
- auto *FPT =
- CalleeType->getAs<FunctionProtoType>(); // null if FunctionType
- EffectSet CalleeFX;
- if (FPT)
- CalleeFX.insert(FPT->getFunctionEffects());
-
- auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
- if (FPT == nullptr || Effect.shouldDiagnoseFunctionCall(
- /*direct=*/false, CalleeFX))
- addDiagnostic(Inferring, Effect, DiagnosticID::CallsExprWithoutEffect,
- Call->getBeginLoc());
- };
-
- for (const FunctionEffect &Effect :
- CurrentFunction.DeclaredVerifiableEffects)
- check1Effect(Effect, false);
-
- for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
- check1Effect(Effect, true);
- }
-
- // This destructor's body should be followed by the caller, but here we
- // follow the field and base destructors.
- void followDestructor(const CXXRecordDecl *Rec,
- const CXXDestructorDecl *Dtor) {
- for (const FieldDecl *Field : Rec->fields())
- followTypeDtor(Field->getType());
-
- if (const auto *Class = dyn_cast<CXXRecordDecl>(Rec)) {
- for (const CXXBaseSpecifier &Base : Class->bases())
- followTypeDtor(Base.getType());
-
- for (const CXXBaseSpecifier &Base : Class->vbases())
- followTypeDtor(Base.getType());
- }
- }
-
- void followTypeDtor(QualType QT) {
- const Type *Ty = QT.getTypePtr();
- while (Ty->isArrayType()) {
- const ArrayType *Arr = Ty->getAsArrayTypeUnsafe();
- QT = Arr->getElementType();
- Ty = QT.getTypePtr();
- }
-
- if (Ty->isRecordType()) {
- if (const CXXRecordDecl *Class = Ty->getAsCXXRecordDecl()) {
- if (CXXDestructorDecl *Dtor = Class->getDestructor()) {
- CallableInfo CI(Outer.Sem, *Dtor);
- followCall(CI, Dtor->getLocation());
- }
- }
- }
- }
-
- // -- Methods for use of RecursiveASTVisitor --
-
- bool shouldVisitImplicitCode() const { return true; }
-
- bool shouldWalkTypesOfTypeLocs() const { return false; }
-
- bool VisitCXXThrowExpr(CXXThrowExpr *Throw) {
- diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
- DiagnosticID::Throws, Throw->getThrowLoc());
- return Proceed;
- }
-
- bool VisitCXXCatchStmt(CXXCatchStmt *Catch) {
- diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
- DiagnosticID::Catches, Catch->getCatchLoc());
- return Proceed;
- }
-
- bool VisitObjCAtThrowStmt(ObjCAtThrowStmt *Throw) {
- diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
- DiagnosticID::Throws, Throw->getThrowLoc());
- return Proceed;
- }
-
- bool VisitObjCAtCatchStmt(ObjCAtCatchStmt *Catch) {
- diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
- DiagnosticID::Catches, Catch->getAtCatchLoc());
- return Proceed;
- }
-
- bool VisitObjCMessageExpr(ObjCMessageExpr *Msg) {
- diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeObjCMessageSend,
- DiagnosticID::CallsObjC, Msg->getBeginLoc());
- return Proceed;
- }
-
- bool VisitCallExpr(CallExpr *Call) {
- if constexpr (DebugLogLevel > 2) {
- llvm::errs() << "VisitCallExpr : "
- << Call->getBeginLoc().printToString(Outer.Sem.SourceMgr)
- << "\n";
- }
-
- Expr *CalleeExpr = Call->getCallee();
- if (const Decl *Callee = CalleeExpr->getReferencedDeclOfCallee()) {
- CallableInfo CI(Outer.Sem, *Callee);
- followCall(CI, Call->getBeginLoc());
- return Proceed;
- }
-
- if (isa<CXXPseudoDestructorExpr>(CalleeExpr))
- // just destroying a scalar, fine.
- return Proceed;
-
- // No Decl, just an Expr. Just check based on its type.
- checkIndirectCall(Call, CalleeExpr);
-
- return Proceed;
- }
-
- bool VisitVarDecl(VarDecl *Var) {
- if constexpr (DebugLogLevel > 2) {
- llvm::errs() << "VisitVarDecl : "
- << Var->getBeginLoc().printToString(Outer.Sem.SourceMgr)
- << "\n";
- }
-
- if (Var->isStaticLocal())
- diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeStaticLocalVars,
- DiagnosticID::HasStaticLocal,
- Var->getLocation());
-
- const QualType::DestructionKind DK =
- Var->needsDestruction(Outer.Sem.getASTContext());
- if (DK == QualType::DK_cxx_destructor) {
- QualType QT = Var->getType();
- if (const auto *ClsType = QT.getTypePtr()->getAs<RecordType>()) {
- if (const auto *CxxRec =
- dyn_cast<CXXRecordDecl>(ClsType->getDecl())) {
- if (const CXXDestructorDecl *Dtor = CxxRec->getDestructor()) {
- CallableInfo CI(Outer.Sem, *Dtor);
- followCall(CI, Var->getLocation());
- }
- }
- }
- }
- return Proceed;
- }
-
- bool VisitCXXNewExpr(CXXNewExpr *New) {
- // BUG? It seems incorrect that RecursiveASTVisitor does not
- // visit the call to operator new.
- if (FunctionDecl *FD = New->getOperatorNew()) {
- CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorNew);
- followCall(CI, New->getBeginLoc());
- }
-
- // It's a bit excessive to check operator delete here, since it's
- // just a fallback for operator new followed by a failed constructor.
- // We could check it via New->getOperatorDelete().
-
- // It DOES however visit the called constructor
- return Proceed;
- }
-
- bool VisitCXXDeleteExpr(CXXDeleteExpr *Delete) {
- // BUG? It seems incorrect that RecursiveASTVisitor does not
- // visit the call to operator delete.
- if (FunctionDecl *FD = Delete->getOperatorDelete()) {
- CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorDelete);
- followCall(CI, Delete->getBeginLoc());
- }
-
- // It DOES however visit the called destructor
-
- return Proceed;
- }
-
- bool VisitCXXConstructExpr(CXXConstructExpr *Construct) {
- if constexpr (DebugLogLevel > 2) {
- llvm::errs() << "VisitCXXConstructExpr : "
- << Construct->getBeginLoc().printToString(
- Outer.Sem.SourceMgr)
- << "\n";
- }
-
- // BUG? It seems incorrect that RecursiveASTVisitor does not
- // visit the call to the constructor.
- const CXXConstructorDecl *Ctor = Construct->getConstructor();
- CallableInfo CI(Outer.Sem, *Ctor);
- followCall(CI, Construct->getLocation());
-
- return Proceed;
- }
-
- bool VisitCXXDefaultInitExpr(CXXDefaultInitExpr *DEI) {
- if (Expr *E = DEI->getExpr())
- TraverseStmt(E);
-
- return Proceed;
- }
-
- bool TraverseLambdaExpr(LambdaExpr *Lambda) {
- // We override this so as the be able to skip traversal of the lambda's
- // body. We have to explicitly traverse the captures.
- for (unsigned I = 0, N = Lambda->capture_size(); I < N; ++I)
- if (TraverseLambdaCapture(Lambda, Lambda->capture_begin() + I,
- Lambda->capture_init_begin()[I]) == Stop)
- return Stop;
-
- return Proceed;
- }
-
- bool TraverseBlockExpr(BlockExpr * /*unused*/) {
- // TODO: are the capture expressions (ctor call?) safe?
- return Proceed;
- }
-
- bool VisitDeclRefExpr(const DeclRefExpr *E) {
- const ValueDecl *Val = E->getDecl();
- if (isa<VarDecl>(Val)) {
- const VarDecl *Var = cast<VarDecl>(Val);
- VarDecl::TLSKind TLSK = Var->getTLSKind();
- if (TLSK != VarDecl::TLS_None) {
- // At least on macOS, thread-local variables are initialized on
- // first access, including a heap allocation.
- diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThreadLocalVars,
- DiagnosticID::AccessesThreadLocal,
- E->getLocation());
- }
- }
- return Proceed;
- }
-
- // Unevaluated contexts: need to skip
- // see https://reviews.llvm.org/rG777eb4bcfc3265359edb7c979d3e5ac699ad4641
-
- bool TraverseGenericSelectionExpr(GenericSelectionExpr *Node) {
- return TraverseStmt(Node->getResultExpr());
- }
- bool TraverseUnaryExprOrTypeTraitExpr(UnaryExprOrTypeTraitExpr *Node) {
- return Proceed;
- }
-
- bool TraverseTypeOfExprTypeLoc(TypeOfExprTypeLoc Node) { return Proceed; }
-
- bool TraverseDecltypeTypeLoc(DecltypeTypeLoc Node) { return Proceed; }
-
- bool TraverseCXXNoexceptExpr(CXXNoexceptExpr *Node) { return Proceed; }
-
- bool TraverseCXXTypeidExpr(CXXTypeidExpr *Node) { return Proceed; }
- };
-};
-
-Analyzer::AnalysisMap::~AnalysisMap() {
- for (const auto &Item : *this) {
- FuncAnalysisPtr AP = Item.second;
- if (isa<PendingFunctionAnalysis *>(AP))
- delete AP.get<PendingFunctionAnalysis *>();
- else
- delete AP.get<CompleteFunctionAnalysis *>();
- }
-}
-
-} // namespace FXAnalysis
-
-// =============================================================================
-
//===----------------------------------------------------------------------===//
// AnalysisBasedWarnings - Worker object used by Sema to execute analysis-based
// warnings on a function, method, or block.
@@ -3819,9 +2553,6 @@ void clang::sema::AnalysisBasedWarnings::IssueWarnings(
SourceLocation())) {
CallableVisitor(CallAnalyzers).TraverseTranslationUnitDecl(TU);
}
-
- if (S.Context.hasAnyFunctionEffects())
- FXAnalysis::Analyzer{S}.run(*TU);
}
void clang::sema::AnalysisBasedWarnings::IssueWarnings(
diff --git a/clang/lib/Sema/CMakeLists.txt b/clang/lib/Sema/CMakeLists.txt
index 2cee4f5ef6e99c..ea827323395d74 100644
--- a/clang/lib/Sema/CMakeLists.txt
+++ b/clang/lib/Sema/CMakeLists.txt
@@ -19,6 +19,7 @@ add_clang_library(clangSema
CodeCompleteConsumer.cpp
DeclSpec.cpp
DelayedDiagnostic.cpp
+ EffectAnalysis.cpp
HLSLExternalSemaSource.cpp
IdentifierResolver.cpp
JumpDiagnostics.cpp
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
new file mode 100644
index 00000000000000..ca1213658f4596
--- /dev/null
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -0,0 +1,1289 @@
+//=== EffectAnalysis.cpp - Sema warnings for function effects -------------===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
+//
+//===----------------------------------------------------------------------===//
+//
+// This file implements caller/callee analysis for function effects.
+//
+//===----------------------------------------------------------------------===//
+
+#include "clang/AST/Decl.h"
+#include "clang/AST/Type.h"
+#include "clang/AST/RecursiveASTVisitor.h"
+#include "clang/Basic/SourceManager.h"
+#include "clang/Sema/SemaInternal.h"
+
+#define DEBUG_TYPE "fxanalysis"
+
+using namespace clang;
+
+namespace {
+
+enum class DiagnosticID : uint8_t {
+ None = 0, // sentinel for an empty Diagnostic
+ Throws,
+ Catches,
+ CallsObjC,
+ AllocatesMemory,
+ HasStaticLocal,
+ AccessesThreadLocal,
+
+ // These only apply to callees, where the analysis stops at the Decl
+ DeclDisallowsInference,
+
+ CallsDeclWithoutEffect,
+ CallsExprWithoutEffect,
+};
+
+// Holds an effect diagnosis, potentially for the entire duration of the
+// analysis phase, in order to refer to it when explaining why a caller has been
+// made unsafe by a callee.
+struct Diagnostic {
+ FunctionEffect Effect;
+ DiagnosticID ID = DiagnosticID::None;
+ SourceLocation Loc;
+ const Decl *Callee = nullptr; // only valid for Calls*
+
+ Diagnostic() = default;
+
+ Diagnostic(const FunctionEffect &Effect, DiagnosticID ID, SourceLocation Loc,
+ const Decl *Callee = nullptr)
+ : Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {}
+};
+
+enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
+enum class CallType {
+ // unknown: probably function pointer
+ Unknown,
+ Function,
+ Virtual,
+ Block
+};
+
+// Return whether a function's effects CAN be verified.
+// The question of whether it SHOULD be verified is independent.
+static bool functionIsVerifiable(const FunctionDecl *FD) {
+ if (FD->isTrivial()) {
+ // Otherwise `struct x { int a; };` would have an unverifiable default
+ // constructor.
+ return true;
+ }
+ return FD->hasBody();
+}
+
+static bool isNoexcept(const FunctionDecl *FD) {
+ const auto *FPT = FD->getType()->castAs<FunctionProtoType>();
+ if (FPT->isNothrow() || FD->hasAttr<NoThrowAttr>())
+ return true;
+ return false;
+}
+
+/// A mutable set of FunctionEffect, for use in places where any conditions
+/// have been resolved or can be ignored.
+class EffectSet {
+ // This implementation optimizes footprint, since we hold one of these for
+ // every function visited, which, due to inference, can be many more functions
+ // than have declared effects.
+
+ template <typename T, typename SizeT, SizeT Capacity> struct FixedVector {
+ SizeT Count = 0;
+ T Items[Capacity] = {};
+
+ using value_type = T;
+
+ using iterator = T *;
+ using const_iterator = const T *;
+ iterator begin() { return &Items[0]; }
+ iterator end() { return &Items[Count]; }
+ const_iterator begin() const { return &Items[0]; }
+ const_iterator end() const { return &Items[Count]; }
+ const_iterator cbegin() const { return &Items[0]; }
+ const_iterator cend() const { return &Items[Count]; }
+
+ void insert(iterator I, const T &Value) {
+ assert(Count < Capacity);
+ iterator E = end();
+ if (I != E)
+ std::copy_backward(I, E, E + 1);
+ *I = Value;
+ ++Count;
+ }
+
+ void push_back(const T &Value) {
+ assert(Count < Capacity);
+ Items[Count++] = Value;
+ }
+ };
+
+ // As long as FunctionEffect is only 1 byte, and there are only 2 verifiable
+ // effects, this fixed-size vector with a capacity of 7 is more than
+ // sufficient and is only 8 bytes.
+ FixedVector<FunctionEffect, uint8_t, 7> Impl;
+
+public:
+ EffectSet() = default;
+ explicit EffectSet(FunctionEffectsRef FX) { insert(FX); }
+
+ operator ArrayRef<FunctionEffect>() const {
+ return ArrayRef(Impl.cbegin(), Impl.cend());
+ }
+
+ using iterator = const FunctionEffect *;
+ iterator begin() const { return Impl.cbegin(); }
+ iterator end() const { return Impl.cend(); }
+
+ void insert(const FunctionEffect &Effect) {
+ FunctionEffect *Iter = Impl.begin();
+ FunctionEffect *End = Impl.end();
+ // linear search; lower_bound is overkill for a tiny vector like this
+ for (; Iter != End; ++Iter) {
+ if (*Iter == Effect)
+ return;
+ if (Effect < *Iter)
+ break;
+ }
+ Impl.insert(Iter, Effect);
+ }
+ void insert(const EffectSet &Set) {
+ for (const FunctionEffect &Item : Set) {
+ // push_back because set is already sorted
+ Impl.push_back(Item);
+ }
+ }
+ void insert(FunctionEffectsRef FX) {
+ for (const FunctionEffectWithCondition &EC : FX) {
+ assert(EC.Cond.getCondition() ==
+ nullptr); // should be resolved by now, right?
+ // push_back because set is already sorted
+ Impl.push_back(EC.Effect);
+ }
+ }
+ bool contains(const FunctionEffect::Kind EK) const {
+ for (const FunctionEffect &E : Impl)
+ if (E.kind() == EK)
+ return true;
+ return false;
+ }
+
+ void dump(llvm::raw_ostream &OS) const;
+
+ static EffectSet difference(ArrayRef<FunctionEffect> LHS,
+ ArrayRef<FunctionEffect> RHS) {
+ EffectSet Result;
+ std::set_difference(LHS.begin(), LHS.end(), RHS.begin(), RHS.end(),
+ std::back_inserter(Result.Impl));
+ return Result;
+ }
+};
+
+LLVM_DUMP_METHOD void EffectSet::dump(llvm::raw_ostream &OS) const {
+ OS << "Effects{";
+ bool First = true;
+ for (const FunctionEffect &Effect : *this) {
+ if (!First)
+ OS << ", ";
+ else
+ First = false;
+ OS << Effect.name();
+ }
+ OS << "}";
+}
+
+// Transitory, more extended information about a callable, which can be a
+// function, block, function pointer, etc.
+struct CallableInfo {
+ // CDecl holds the function's definition, if any.
+ // FunctionDecl if CallType::Function or Virtual
+ // BlockDecl if CallType::Block
+ const Decl *CDecl;
+ mutable std::optional<std::string> MaybeName;
+ SpecialFuncType FuncType = SpecialFuncType::None;
+ EffectSet Effects;
+ CallType CType = CallType::Unknown;
+
+ CallableInfo(Sema &SemaRef, const Decl &CD,
+ SpecialFuncType FT = SpecialFuncType::None)
+ : CDecl(&CD), FuncType(FT) {
+ FunctionEffectsRef FXRef;
+
+ if (auto *FD = dyn_cast<FunctionDecl>(CDecl)) {
+ // Use the function's definition, if any.
+ if (const FunctionDecl *Def = FD->getDefinition())
+ CDecl = FD = Def;
+ CType = CallType::Function;
+ if (auto *Method = dyn_cast<CXXMethodDecl>(FD);
+ Method && Method->isVirtual())
+ CType = CallType::Virtual;
+ FXRef = FD->getFunctionEffects();
+ } else if (auto *BD = dyn_cast<BlockDecl>(CDecl)) {
+ CType = CallType::Block;
+ FXRef = BD->getFunctionEffects();
+ } else if (auto *VD = dyn_cast<ValueDecl>(CDecl)) {
+ // ValueDecl is function, enum, or variable, so just look at its type.
+ FXRef = FunctionEffectsRef::get(VD->getType());
+ }
+ Effects = EffectSet(FXRef);
+ }
+
+ bool isDirectCall() const {
+ return CType == CallType::Function || CType == CallType::Block;
+ }
+
+ bool isVerifiable() const {
+ switch (CType) {
+ case CallType::Unknown:
+ case CallType::Virtual:
+ return false;
+ case CallType::Block:
+ return true;
+ case CallType::Function:
+ return functionIsVerifiable(dyn_cast<FunctionDecl>(CDecl));
+ }
+ llvm_unreachable("undefined CallType");
+ }
+
+ /// Generate a name for logging and diagnostics.
+ std::string name(Sema &Sem) const {
+ if (!MaybeName) {
+ std::string Name;
+ llvm::raw_string_ostream OS(Name);
+
+ if (auto *FD = dyn_cast<FunctionDecl>(CDecl))
+ FD->getNameForDiagnostic(OS, Sem.getPrintingPolicy(),
+ /*Qualified=*/true);
+ else if (auto *BD = dyn_cast<BlockDecl>(CDecl))
+ OS << "(block " << BD->getBlockManglingNumber() << ")";
+ else if (auto *VD = dyn_cast<NamedDecl>(CDecl))
+ VD->printQualifiedName(OS);
+ MaybeName = Name;
+ }
+ return *MaybeName;
+ }
+};
+
+// ----------
+// Map effects to single diagnostics, to hold the first (of potentially many)
+// diagnostics pertaining to an effect, per function.
+class EffectToDiagnosticMap {
+ // Since we currently only have a tiny number of effects (typically no more
+ // than 1), use a sorted SmallVector with an inline capacity of 1. Since it
+ // is often empty, use a unique_ptr to the SmallVector.
+ // Note that Diagnostic itself contains a FunctionEffect which is the key.
+ using ImplVec = llvm::SmallVector<Diagnostic, 1>;
+ std::unique_ptr<ImplVec> Impl;
+
+public:
+ // Insert a new diagnostic if we do not already have one for its effect.
+ void maybeInsert(const Diagnostic &Diag) {
+ if (Impl == nullptr)
+ Impl = std::make_unique<ImplVec>();
+ auto *Iter = _find(Diag.Effect);
+ if (Iter != Impl->end() && Iter->Effect == Diag.Effect)
+ return;
+
+ Impl->insert(Iter, Diag);
+ }
+
+ const Diagnostic *lookup(FunctionEffect Key) {
+ if (Impl == nullptr)
+ return nullptr;
+
+ auto *Iter = _find(Key);
+ if (Iter != Impl->end() && Iter->Effect == Key)
+ return &*Iter;
+
+ return nullptr;
+ }
+
+ size_t size() const { return Impl ? Impl->size() : 0; }
+
+private:
+ ImplVec::iterator _find(const FunctionEffect &key) {
+ // A linear search suffices for a tiny number of possible effects.
+ auto *End = Impl->end();
+ for (auto *Iter = Impl->begin(); Iter != End; ++Iter)
+ if (!(Iter->Effect < key))
+ return Iter;
+ return End;
+ }
+};
+
+// ----------
+// State pertaining to a function whose AST is walked and whose effect analysis
+// is dependent on a subsequent analysis of other functions.
+class PendingFunctionAnalysis {
+ friend class CompleteFunctionAnalysis;
+
+public:
+ struct DirectCall {
+ const Decl *Callee;
+ SourceLocation CallLoc;
+ // Not all recursive calls are detected, just enough
+ // to break cycles.
+ bool Recursed = false;
+
+ DirectCall(const Decl *D, SourceLocation CallLoc)
+ : Callee(D), CallLoc(CallLoc) {}
+ };
+
+ // We always have two disjoint sets of effects to verify:
+ // 1. Effects declared explicitly by this function.
+ // 2. All other inferrable effects needing verification.
+ EffectSet DeclaredVerifiableEffects;
+ EffectSet FXToInfer;
+
+private:
+ // Diagnostics pertaining to the function's explicit effects.
+ SmallVector<Diagnostic, 0> DiagnosticsForExplicitFX;
+
+ // Diagnostics pertaining to other, non-explicit, inferrable effects.
+ EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
+
+ // These unverified direct calls are what keeps the analysis "pending",
+ // until the callees can be verified.
+ SmallVector<DirectCall, 0> UnverifiedDirectCalls;
+
+public:
+ PendingFunctionAnalysis(
+ Sema &Sem, const CallableInfo &CInfo,
+ ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
+ DeclaredVerifiableEffects = CInfo.Effects;
+
+ // Check for effects we are not allowed to infer
+ EffectSet InferrableFX;
+
+ for (const FunctionEffect &effect : AllInferrableEffectsToVerify) {
+ if (effect.canInferOnFunction(*CInfo.CDecl))
+ InferrableFX.insert(effect);
+ else {
+ // Add a diagnostic for this effect if a caller were to
+ // try to infer it.
+ InferrableEffectToFirstDiagnostic.maybeInsert(
+ Diagnostic(effect, DiagnosticID::DeclDisallowsInference,
+ CInfo.CDecl->getLocation()));
+ }
+ }
+ // InferrableFX is now the set of inferrable effects which are not
+ // prohibited
+ FXToInfer = EffectSet::difference(InferrableFX, DeclaredVerifiableEffects);
+ }
+
+ // Hide the way that diagnostics for explicitly required effects vs. inferred
+ // ones are handled differently.
+ void checkAddDiagnostic(bool Inferring, const Diagnostic &NewDiag) {
+ if (!Inferring)
+ DiagnosticsForExplicitFX.push_back(NewDiag);
+ else
+ InferrableEffectToFirstDiagnostic.maybeInsert(NewDiag);
+ }
+
+ void addUnverifiedDirectCall(const Decl *D, SourceLocation CallLoc) {
+ UnverifiedDirectCalls.emplace_back(D, CallLoc);
+ }
+
+ // Analysis is complete when there are no unverified direct calls.
+ bool isComplete() const { return UnverifiedDirectCalls.empty(); }
+
+ const Diagnostic *diagnosticForInferrableEffect(FunctionEffect effect) {
+ return InferrableEffectToFirstDiagnostic.lookup(effect);
+ }
+
+ SmallVector<DirectCall, 0> &unverifiedCalls() {
+ assert(!isComplete());
+ return UnverifiedDirectCalls;
+ }
+
+ SmallVector<Diagnostic, 0> &getDiagnosticsForExplicitFX() {
+ return DiagnosticsForExplicitFX;
+ }
+
+ void dump(Sema &SemaRef, llvm::raw_ostream &OS) const {
+ OS << "Pending: Declared ";
+ DeclaredVerifiableEffects.dump(OS);
+ OS << ", " << DiagnosticsForExplicitFX.size() << " diags; ";
+ OS << " Infer ";
+ FXToInfer.dump(OS);
+ OS << ", " << InferrableEffectToFirstDiagnostic.size() << " diags";
+ if (!UnverifiedDirectCalls.empty()) {
+ OS << "; Calls: ";
+ for (const DirectCall &Call : UnverifiedDirectCalls) {
+ CallableInfo CI(SemaRef, *Call.Callee);
+ OS << " " << CI.name(SemaRef);
+ }
+ }
+ OS << "\n";
+ }
+};
+
+// ----------
+class CompleteFunctionAnalysis {
+ // Current size: 2 pointers
+public:
+ // Has effects which are both the declared ones -- not to be inferred -- plus
+ // ones which have been successfully inferred. These are all considered
+ // "verified" for the purposes of callers; any issue with verifying declared
+ // effects has already been reported and is not the problem of any caller.
+ EffectSet VerifiedEffects;
+
+private:
+ // This is used to generate notes about failed inference.
+ EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
+
+public:
+ // The incoming Pending analysis is consumed (member(s) are moved-from).
+ CompleteFunctionAnalysis(
+ ASTContext &Ctx, PendingFunctionAnalysis &Pending,
+ const EffectSet &DeclaredEffects,
+ ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
+ VerifiedEffects.insert(DeclaredEffects);
+ for (const FunctionEffect &effect : AllInferrableEffectsToVerify)
+ if (Pending.diagnosticForInferrableEffect(effect) == nullptr)
+ VerifiedEffects.insert(effect);
+
+ InferrableEffectToFirstDiagnostic =
+ std::move(Pending.InferrableEffectToFirstDiagnostic);
+ }
+
+ const Diagnostic *firstDiagnosticForEffect(const FunctionEffect &Effect) {
+ return InferrableEffectToFirstDiagnostic.lookup(Effect);
+ }
+
+ void dump(llvm::raw_ostream &OS) const {
+ OS << "Complete: Verified ";
+ VerifiedEffects.dump(OS);
+ OS << "; Infer ";
+ OS << InferrableEffectToFirstDiagnostic.size() << " diags\n";
+ }
+};
+
+const Decl *CanonicalFunctionDecl(const Decl *D) {
+ if (auto *FD = dyn_cast<FunctionDecl>(D)) {
+ FD = FD->getCanonicalDecl();
+ assert(FD != nullptr);
+ return FD;
+ }
+ return D;
+}
+
+// ==========
+class Analyzer {
+ Sema &Sem;
+
+ // Subset of Sema.AllEffectsToVerify
+ EffectSet AllInferrableEffectsToVerify;
+
+ using FuncAnalysisPtr =
+ llvm::PointerUnion<PendingFunctionAnalysis *, CompleteFunctionAnalysis *>;
+
+ // Map all Decls analyzed to FuncAnalysisPtr. Pending state is larger
+ // than complete state, so use different objects to represent them.
+ // The state pointers are owned by the container.
+ class AnalysisMap : protected llvm::DenseMap<const Decl *, FuncAnalysisPtr> {
+ using Base = llvm::DenseMap<const Decl *, FuncAnalysisPtr>;
+
+ public:
+ ~AnalysisMap();
+
+ // Use non-public inheritance in order to maintain the invariant
+ // that lookups and insertions are via the canonical Decls.
+
+ FuncAnalysisPtr lookup(const Decl *Key) const {
+ return Base::lookup(CanonicalFunctionDecl(Key));
+ }
+
+ FuncAnalysisPtr &operator[](const Decl *Key) {
+ return Base::operator[](CanonicalFunctionDecl(Key));
+ }
+
+ /// Shortcut for the case where we only care about completed analysis.
+ CompleteFunctionAnalysis *completedAnalysisForDecl(const Decl *D) const {
+ if (FuncAnalysisPtr AP = lookup(D);
+ isa_and_nonnull<CompleteFunctionAnalysis *>(AP))
+ return AP.get<CompleteFunctionAnalysis *>();
+ return nullptr;
+ }
+
+ void dump(Sema &SemaRef, llvm::raw_ostream &OS) {
+ OS << "\nAnalysisMap:\n";
+ for (const auto &item : *this) {
+ CallableInfo CI(SemaRef, *item.first);
+ const auto AP = item.second;
+ OS << item.first << " " << CI.name(SemaRef) << " : ";
+ if (AP.isNull())
+ OS << "null\n";
+ else if (isa<CompleteFunctionAnalysis *>(AP)) {
+ auto *CFA = AP.get<CompleteFunctionAnalysis *>();
+ OS << CFA << " ";
+ CFA->dump(OS);
+ } else if (isa<PendingFunctionAnalysis *>(AP)) {
+ auto *PFA = AP.get<PendingFunctionAnalysis *>();
+ OS << PFA << " ";
+ PFA->dump(SemaRef, OS);
+ } else
+ llvm_unreachable("never");
+ }
+ OS << "---\n";
+ }
+ };
+ AnalysisMap DeclAnalysis;
+
+public:
+ Analyzer(Sema &S) : Sem(S) {}
+
+ void run(const TranslationUnitDecl &TU) {
+ // Gather all of the effects to be verified to see what operations need to
+ // be checked, and to see which ones are inferrable.
+ for (const FunctionEffectWithCondition &CFE : Sem.AllEffectsToVerify) {
+ const FunctionEffect &Effect = CFE.Effect;
+ const FunctionEffect::Flags Flags = Effect.flags();
+ if (Flags & FunctionEffect::FE_InferrableOnCallees)
+ AllInferrableEffectsToVerify.insert(Effect);
+ }
+ LLVM_DEBUG(
+ llvm::dbgs() << "AllInferrableEffectsToVerify: ";
+ AllInferrableEffectsToVerify.dump(llvm::dbgs());
+ llvm::dbgs() << "\n";
+ );
+
+ // We can use DeclsWithEffectsToVerify as a stack for a
+ // depth-first traversal; there's no need for a second container. But first,
+ // reverse it, so when working from the end, Decls are verified in the order
+ // they are declared.
+ SmallVector<const Decl *> &VerificationQueue = Sem.DeclsWithEffectsToVerify;
+ std::reverse(VerificationQueue.begin(), VerificationQueue.end());
+
+ while (!VerificationQueue.empty()) {
+ const Decl *D = VerificationQueue.back();
+ if (FuncAnalysisPtr AP = DeclAnalysis.lookup(D)) {
+ if (isa<CompleteFunctionAnalysis *>(AP)) {
+ // already done
+ VerificationQueue.pop_back();
+ continue;
+ }
+ if (isa<PendingFunctionAnalysis *>(AP)) {
+ // All children have been traversed; finish analysis.
+ auto *Pending = AP.get<PendingFunctionAnalysis *>();
+ finishPendingAnalysis(D, Pending);
+ VerificationQueue.pop_back();
+ continue;
+ }
+ llvm_unreachable("unexpected DeclAnalysis item");
+ }
+
+ // Not previously visited; begin a new analysis for this Decl.
+ PendingFunctionAnalysis *Pending = verifyDecl(D);
+ if (Pending == nullptr) {
+ // completed now
+ VerificationQueue.pop_back();
+ continue;
+ }
+
+ // Analysis remains pending because there are direct callees to be
+ // verified first. Push them onto the queue.
+ for (PendingFunctionAnalysis::DirectCall &Call :
+ Pending->unverifiedCalls()) {
+ FuncAnalysisPtr AP = DeclAnalysis.lookup(Call.Callee);
+ if (AP.isNull()) {
+ VerificationQueue.push_back(Call.Callee);
+ continue;
+ }
+ if (isa<PendingFunctionAnalysis *>(AP)) {
+ // This indicates recursion (not necessarily direct). For the
+ // purposes of effect analysis, we can just ignore it since
+ // no effects forbid recursion.
+ Call.Recursed = true;
+ continue;
+ }
+ llvm_unreachable("unexpected DeclAnalysis item");
+ }
+ }
+ }
+
+private:
+ // Verify a single Decl. Return the pending structure if that was the result,
+ // else null. This method must not recurse.
+ PendingFunctionAnalysis *verifyDecl(const Decl *D) {
+ CallableInfo CInfo(Sem, *D);
+ bool isExternC = false;
+
+ if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
+ assert(FD->getBuiltinID() == 0);
+ isExternC = FD->getCanonicalDecl()->isExternCContext();
+ }
+
+ // For C++, with non-extern "C" linkage only - if any of the Decl's declared
+ // effects forbid throwing (e.g. nonblocking) then the function should also
+ // be declared noexcept.
+ if (Sem.getLangOpts().CPlusPlus && !isExternC) {
+ for (const FunctionEffect &Effect : CInfo.Effects) {
+ if (!(Effect.flags() & FunctionEffect::FE_ExcludeThrow))
+ continue;
+
+ bool IsNoexcept = false;
+ if (auto *FD = D->getAsFunction()) {
+ IsNoexcept = isNoexcept(FD);
+ } else if (auto *BD = dyn_cast<BlockDecl>(D)) {
+ if (auto *TSI = BD->getSignatureAsWritten()) {
+ auto *FPT = TSI->getType()->getAs<FunctionProtoType>();
+ IsNoexcept = FPT->isNothrow() || BD->hasAttr<NoThrowAttr>();
+ }
+ }
+ if (!IsNoexcept)
+ Sem.Diag(D->getBeginLoc(),
+ diag::warn_perf_constraint_implies_noexcept)
+ << Effect.name();
+ break;
+ }
+ }
+
+ // Build a PendingFunctionAnalysis on the stack. If it turns out to be
+ // complete, we'll have avoided a heap allocation; if it's incomplete, it's
+ // a fairly trivial move to a heap-allocated object.
+ PendingFunctionAnalysis FAnalysis(Sem, CInfo, AllInferrableEffectsToVerify);
+
+ LLVM_DEBUG(
+ llvm::dbgs() << "\nVerifying " << CInfo.name(Sem) << " ";
+ FAnalysis.dump(Sem, llvm::dbgs());
+ );
+
+ FunctionBodyASTVisitor Visitor(*this, FAnalysis, CInfo);
+
+ Visitor.run();
+ if (FAnalysis.isComplete()) {
+ completeAnalysis(CInfo, FAnalysis);
+ return nullptr;
+ }
+ // Move the pending analysis to the heap and save it in the map.
+ PendingFunctionAnalysis *PendingPtr =
+ new PendingFunctionAnalysis(std::move(FAnalysis));
+ DeclAnalysis[D] = PendingPtr;
+ LLVM_DEBUG(
+ llvm::dbgs() << "inserted pending " << PendingPtr << "\n";
+ DeclAnalysis.dump(Sem, llvm::dbgs());
+ );
+ return PendingPtr;
+ }
+
+ // Consume PendingFunctionAnalysis, create with it a CompleteFunctionAnalysis,
+ // inserted in the container.
+ void completeAnalysis(const CallableInfo &CInfo,
+ PendingFunctionAnalysis &Pending) {
+ if (SmallVector<Diagnostic, 0> &Diags =
+ Pending.getDiagnosticsForExplicitFX();
+ !Diags.empty())
+ emitDiagnostics(Diags, CInfo, Sem);
+
+ CompleteFunctionAnalysis *CompletePtr = new CompleteFunctionAnalysis(
+ Sem.getASTContext(), Pending, CInfo.Effects,
+ AllInferrableEffectsToVerify);
+ DeclAnalysis[CInfo.CDecl] = CompletePtr;
+ LLVM_DEBUG(
+ llvm::dbgs() << "inserted complete " << CompletePtr << "\n";
+ DeclAnalysis.dump(Sem, llvm::dbgs());
+ );
+ }
+
+ // Called after all direct calls requiring inference have been found -- or
+ // not. Repeats calls to FunctionBodyASTVisitor::followCall() but without
+ // the possibility of inference. Deletes Pending.
+ void finishPendingAnalysis(const Decl *D, PendingFunctionAnalysis *Pending) {
+ CallableInfo Caller(Sem, *D);
+ LLVM_DEBUG(
+ llvm::dbgs() << "finishPendingAnalysis for " << Caller.name(Sem) << " : ";
+ Pending->dump(Sem, llvm::dbgs());
+ llvm::dbgs() << "\n";
+ );
+ for (const PendingFunctionAnalysis::DirectCall &Call :
+ Pending->unverifiedCalls()) {
+ if (Call.Recursed)
+ continue;
+
+ CallableInfo Callee(Sem, *Call.Callee);
+ followCall(Caller, *Pending, Callee, Call.CallLoc,
+ /*AssertNoFurtherInference=*/true);
+ }
+ completeAnalysis(Caller, *Pending);
+ delete Pending;
+ }
+
+ // Here we have a call to a Decl, either explicitly via a CallExpr or some
+ // other AST construct. PFA pertains to the caller.
+ void followCall(const CallableInfo &Caller, PendingFunctionAnalysis &PFA,
+ const CallableInfo &Callee, SourceLocation CallLoc,
+ bool AssertNoFurtherInference) {
+ const bool DirectCall = Callee.isDirectCall();
+
+ // Initially, the declared effects; inferred effects will be added.
+ EffectSet CalleeEffects = Callee.Effects;
+
+ bool IsInferencePossible = DirectCall;
+
+ if (DirectCall) {
+ if (CompleteFunctionAnalysis *CFA =
+ DeclAnalysis.completedAnalysisForDecl(Callee.CDecl)) {
+ // Combine declared effects with those which may have been inferred.
+ CalleeEffects.insert(CFA->VerifiedEffects);
+ IsInferencePossible = false; // we've already traversed it
+ }
+ }
+
+ if (AssertNoFurtherInference) {
+ assert(!IsInferencePossible);
+ }
+
+ if (!Callee.isVerifiable())
+ IsInferencePossible = false;
+
+ LLVM_DEBUG(
+ llvm::dbgs() << "followCall from " << Caller.name(Sem) << " to "
+ << Callee.name(Sem)
+ << "; verifiable: " << Callee.isVerifiable() << "; callee ";
+ CalleeEffects.dump(llvm::dbgs());
+ llvm::dbgs() << "\n";
+ llvm::dbgs() << " callee " << Callee.CDecl << " canonical "
+ << CanonicalFunctionDecl(Callee.CDecl) << " redecls";
+ for (Decl *D : Callee.CDecl->redecls())
+ llvm::dbgs() << " " << D;
+
+ llvm::dbgs() << "\n";
+ );
+
+ auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ FunctionEffect::Flags Flags = Effect.flags();
+ bool Diagnose =
+ Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects);
+ if (Diagnose) {
+ // If inference is not allowed, or the target is indirect (virtual
+ // method/function ptr?), generate a diagnostic now.
+ if (!IsInferencePossible ||
+ !(Flags & FunctionEffect::FE_InferrableOnCallees)) {
+ if (Callee.FuncType == SpecialFuncType::None)
+ PFA.checkAddDiagnostic(
+ Inferring, {Effect, DiagnosticID::CallsDeclWithoutEffect,
+ CallLoc, Callee.CDecl});
+ else
+ PFA.checkAddDiagnostic(
+ Inferring, {Effect, DiagnosticID::AllocatesMemory, CallLoc});
+ } else {
+ // Inference is allowed and necessary; defer it.
+ PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc);
+ }
+ }
+ };
+
+ for (const FunctionEffect &Effect : PFA.DeclaredVerifiableEffects)
+ check1Effect(Effect, false);
+
+ for (const FunctionEffect &Effect : PFA.FXToInfer)
+ check1Effect(Effect, true);
+ }
+
+ // Should only be called when determined to be complete.
+ void emitDiagnostics(SmallVector<Diagnostic, 0> &Diags,
+ const CallableInfo &CInfo, Sema &S) {
+ if (Diags.empty())
+ return;
+ const SourceManager &SM = S.getSourceManager();
+ std::sort(Diags.begin(), Diags.end(),
+ [&SM](const Diagnostic &LHS, const Diagnostic &RHS) {
+ return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
+ });
+
+ auto checkAddTemplateNote = [&](const Decl *D) {
+ if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
+ while (FD != nullptr && FD->isTemplateInstantiation()) {
+ S.Diag(FD->getPointOfInstantiation(),
+ diag::note_func_effect_from_template);
+ FD = FD->getTemplateInstantiationPattern();
+ }
+ }
+ };
+
+ // Top-level diagnostics are warnings.
+ for (const Diagnostic &Diag : Diags) {
+ StringRef effectName = Diag.Effect.name();
+ switch (Diag.ID) {
+ case DiagnosticID::None:
+ case DiagnosticID::DeclDisallowsInference: // shouldn't happen
+ // here
+ llvm_unreachable("Unexpected diagnostic kind");
+ break;
+ case DiagnosticID::AllocatesMemory:
+ S.Diag(Diag.Loc, diag::warn_func_effect_allocates) << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::Throws:
+ case DiagnosticID::Catches:
+ S.Diag(Diag.Loc, diag::warn_func_effect_throws_or_catches)
+ << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::HasStaticLocal:
+ S.Diag(Diag.Loc, diag::warn_func_effect_has_static_local) << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::AccessesThreadLocal:
+ S.Diag(Diag.Loc, diag::warn_func_effect_uses_thread_local)
+ << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::CallsObjC:
+ S.Diag(Diag.Loc, diag::warn_func_effect_calls_objc) << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+ case DiagnosticID::CallsExprWithoutEffect:
+ S.Diag(Diag.Loc, diag::warn_func_effect_calls_expr_without_effect)
+ << effectName;
+ checkAddTemplateNote(CInfo.CDecl);
+ break;
+
+ case DiagnosticID::CallsDeclWithoutEffect: {
+ CallableInfo CalleeInfo(S, *Diag.Callee);
+ std::string CalleeName = CalleeInfo.name(S);
+
+ S.Diag(Diag.Loc, diag::warn_func_effect_calls_func_without_effect)
+ << effectName << CalleeName;
+ checkAddTemplateNote(CInfo.CDecl);
+
+ // Emit notes explaining the transitive chain of inferences: Why isn't
+ // the callee safe?
+ for (const Decl *Callee = Diag.Callee; Callee != nullptr;) {
+ std::optional<CallableInfo> MaybeNextCallee;
+ CompleteFunctionAnalysis *Completed =
+ DeclAnalysis.completedAnalysisForDecl(CalleeInfo.CDecl);
+ if (Completed == nullptr) {
+ // No result - could be
+ // - non-inline
+ // - indirect (virtual or through function pointer)
+ // - effect has been explicitly disclaimed (e.g. "blocking")
+ if (CalleeInfo.CType == CallType::Virtual)
+ S.Diag(Callee->getLocation(), diag::note_func_effect_call_virtual)
+ << effectName;
+ else if (CalleeInfo.CType == CallType::Unknown)
+ S.Diag(Callee->getLocation(),
+ diag::note_func_effect_call_func_ptr)
+ << effectName;
+ else if (CalleeInfo.Effects.contains(Diag.Effect.oppositeKind()))
+ S.Diag(Callee->getLocation(),
+ diag::note_func_effect_call_disallows_inference)
+ << effectName;
+ else
+ S.Diag(Callee->getLocation(), diag::note_func_effect_call_extern)
+ << effectName;
+
+ break;
+ }
+ const Diagnostic *PtrDiag2 =
+ Completed->firstDiagnosticForEffect(Diag.Effect);
+ if (PtrDiag2 == nullptr)
+ break;
+
+ const Diagnostic &Diag2 = *PtrDiag2;
+ switch (Diag2.ID) {
+ case DiagnosticID::None:
+ llvm_unreachable("Unexpected diagnostic kind");
+ break;
+ case DiagnosticID::DeclDisallowsInference:
+ S.Diag(Diag2.Loc, diag::note_func_effect_call_disallows_inference)
+ << effectName;
+ break;
+ case DiagnosticID::CallsExprWithoutEffect:
+ S.Diag(Diag2.Loc, diag::note_func_effect_call_func_ptr)
+ << effectName;
+ break;
+ case DiagnosticID::AllocatesMemory:
+ S.Diag(Diag2.Loc, diag::note_func_effect_allocates) << effectName;
+ break;
+ case DiagnosticID::Throws:
+ case DiagnosticID::Catches:
+ S.Diag(Diag2.Loc, diag::note_func_effect_throws_or_catches)
+ << effectName;
+ break;
+ case DiagnosticID::HasStaticLocal:
+ S.Diag(Diag2.Loc, diag::note_func_effect_has_static_local)
+ << effectName;
+ break;
+ case DiagnosticID::AccessesThreadLocal:
+ S.Diag(Diag2.Loc, diag::note_func_effect_uses_thread_local)
+ << effectName;
+ break;
+ case DiagnosticID::CallsObjC:
+ S.Diag(Diag2.Loc, diag::note_func_effect_calls_objc) << effectName;
+ break;
+ case DiagnosticID::CallsDeclWithoutEffect:
+ MaybeNextCallee.emplace(S, *Diag2.Callee);
+ S.Diag(Diag2.Loc, diag::note_func_effect_calls_func_without_effect)
+ << effectName << MaybeNextCallee->name(S);
+ break;
+ }
+ checkAddTemplateNote(Callee);
+ Callee = Diag2.Callee;
+ if (MaybeNextCallee) {
+ CalleeInfo = *MaybeNextCallee;
+ CalleeName = CalleeInfo.name(S);
+ }
+ }
+ } break;
+ }
+ }
+ }
+
+ // ----------
+ // This AST visitor is used to traverse the body of a function during effect
+ // verification. This happens in 2 situations:
+ // [1] The function has declared effects which need to be validated.
+ // [2] The function has not explicitly declared an effect in question, and is
+ // being checked for implicit conformance.
+ //
+ // Diagnostics are always routed to a PendingFunctionAnalysis, which holds
+ // all diagnostic output.
+ struct FunctionBodyASTVisitor
+ : public RecursiveASTVisitor<FunctionBodyASTVisitor> {
+
+ Analyzer &Outer;
+ PendingFunctionAnalysis &CurrentFunction;
+ CallableInfo &CurrentCaller;
+
+ FunctionBodyASTVisitor(Analyzer &outer,
+ PendingFunctionAnalysis &CurrentFunction,
+ CallableInfo &CurrentCaller)
+ : Outer(outer), CurrentFunction(CurrentFunction),
+ CurrentCaller(CurrentCaller) {}
+
+ // -- Entry point --
+ void run() {
+ // The target function itself may have some implicit code paths beyond the
+ // body: member and base constructors and destructors. Visit these first.
+ if (const auto *FD = dyn_cast<const FunctionDecl>(CurrentCaller.CDecl)) {
+ if (auto *Ctor = dyn_cast<CXXConstructorDecl>(FD)) {
+ for (const CXXCtorInitializer *Initer : Ctor->inits())
+ if (Expr *Init = Initer->getInit())
+ VisitStmt(Init);
+ } else if (auto *Dtor = dyn_cast<CXXDestructorDecl>(FD))
+ followDestructor(dyn_cast<CXXRecordDecl>(Dtor->getParent()), Dtor);
+ }
+ // else could be BlockDecl
+
+ // Do an AST traversal of the function/block body
+ TraverseDecl(const_cast<Decl *>(CurrentCaller.CDecl));
+ }
+
+ // -- Methods implementing common logic --
+
+ // Handle a language construct forbidden by some effects. Only effects whose
+ // flags include the specified flag receive a diagnostic. \p Flag describes
+ // the construct.
+ void diagnoseLanguageConstruct(FunctionEffect::FlagBit Flag, DiagnosticID D,
+ SourceLocation Loc,
+ const Decl *Callee = nullptr) {
+ // If there are any declared verifiable effects which forbid the construct
+ // represented by the flag, store just one diagnostic.
+ for (const FunctionEffect &Effect :
+ CurrentFunction.DeclaredVerifiableEffects) {
+ if (Effect.flags() & Flag) {
+ addDiagnostic(/*inferring=*/false, Effect, D, Loc, Callee);
+ break;
+ }
+ }
+ // For each inferred effect which forbids the construct, store a
+ // diagnostic, if we don't already have a diagnostic for that effect.
+ for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
+ if (Effect.flags() & Flag)
+ addDiagnostic(/*inferring=*/true, Effect, D, Loc, Callee);
+ }
+
+ void addDiagnostic(bool Inferring, const FunctionEffect &Effect,
+ DiagnosticID D, SourceLocation Loc,
+ const Decl *Callee = nullptr) {
+ CurrentFunction.checkAddDiagnostic(Inferring,
+ Diagnostic(Effect, D, Loc, Callee));
+ }
+
+ // Here we have a call to a Decl, either explicitly via a CallExpr or some
+ // other AST construct. CallableInfo pertains to the callee.
+ void followCall(const CallableInfo &CI, SourceLocation CallLoc) {
+ // Currently, built-in functions are always considered safe.
+ // FIXME: Some are not.
+ if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl);
+ FD && FD->getBuiltinID() != 0)
+ return;
+
+ Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
+ /*AssertNoFurtherInference=*/false);
+ }
+
+ void checkIndirectCall(CallExpr *Call, Expr *CalleeExpr) {
+ const QualType CalleeType = CalleeExpr->getType();
+ auto *FPT =
+ CalleeType->getAs<FunctionProtoType>(); // null if FunctionType
+ EffectSet CalleeFX;
+ if (FPT)
+ CalleeFX.insert(FPT->getFunctionEffects());
+
+ auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ if (FPT == nullptr || Effect.shouldDiagnoseFunctionCall(
+ /*direct=*/false, CalleeFX))
+ addDiagnostic(Inferring, Effect, DiagnosticID::CallsExprWithoutEffect,
+ Call->getBeginLoc());
+ };
+
+ for (const FunctionEffect &Effect :
+ CurrentFunction.DeclaredVerifiableEffects)
+ check1Effect(Effect, false);
+
+ for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
+ check1Effect(Effect, true);
+ }
+
+ // This destructor's body should be followed by the caller, but here we
+ // follow the field and base destructors.
+ void followDestructor(const CXXRecordDecl *Rec,
+ const CXXDestructorDecl *Dtor) {
+ for (const FieldDecl *Field : Rec->fields())
+ followTypeDtor(Field->getType());
+
+ if (const auto *Class = dyn_cast<CXXRecordDecl>(Rec)) {
+ for (const CXXBaseSpecifier &Base : Class->bases())
+ followTypeDtor(Base.getType());
+
+ for (const CXXBaseSpecifier &Base : Class->vbases())
+ followTypeDtor(Base.getType());
+ }
+ }
+
+ void followTypeDtor(QualType QT) {
+ const Type *Ty = QT.getTypePtr();
+ while (Ty->isArrayType()) {
+ const ArrayType *Arr = Ty->getAsArrayTypeUnsafe();
+ QT = Arr->getElementType();
+ Ty = QT.getTypePtr();
+ }
+
+ if (Ty->isRecordType()) {
+ if (const CXXRecordDecl *Class = Ty->getAsCXXRecordDecl()) {
+ if (CXXDestructorDecl *Dtor = Class->getDestructor()) {
+ CallableInfo CI(Outer.Sem, *Dtor);
+ followCall(CI, Dtor->getLocation());
+ }
+ }
+ }
+ }
+
+ // -- Methods for use of RecursiveASTVisitor --
+
+ bool shouldVisitImplicitCode() const { return true; }
+
+ bool shouldWalkTypesOfTypeLocs() const { return false; }
+
+ bool VisitCXXThrowExpr(CXXThrowExpr *Throw) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
+ DiagnosticID::Throws, Throw->getThrowLoc());
+ return true;
+ }
+
+ bool VisitCXXCatchStmt(CXXCatchStmt *Catch) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
+ DiagnosticID::Catches, Catch->getCatchLoc());
+ return true;
+ }
+
+ bool VisitObjCAtThrowStmt(ObjCAtThrowStmt *Throw) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
+ DiagnosticID::Throws, Throw->getThrowLoc());
+ return true;
+ }
+
+ bool VisitObjCAtCatchStmt(ObjCAtCatchStmt *Catch) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
+ DiagnosticID::Catches, Catch->getAtCatchLoc());
+ return true;
+ }
+
+ bool VisitObjCMessageExpr(ObjCMessageExpr *Msg) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeObjCMessageSend,
+ DiagnosticID::CallsObjC, Msg->getBeginLoc());
+ return true;
+ }
+
+ bool VisitCallExpr(CallExpr *Call) {
+ LLVM_DEBUG(
+ llvm::dbgs() << "VisitCallExpr : "
+ << Call->getBeginLoc().printToString(Outer.Sem.SourceMgr)
+ << "\n";
+ );
+
+ Expr *CalleeExpr = Call->getCallee();
+ if (const Decl *Callee = CalleeExpr->getReferencedDeclOfCallee()) {
+ CallableInfo CI(Outer.Sem, *Callee);
+ followCall(CI, Call->getBeginLoc());
+ return true;
+ }
+
+ if (isa<CXXPseudoDestructorExpr>(CalleeExpr))
+ // just destroying a scalar, fine.
+ return true;
+
+ // No Decl, just an Expr. Just check based on its type.
+ checkIndirectCall(Call, CalleeExpr);
+
+ return true;
+ }
+
+ bool VisitVarDecl(VarDecl *Var) {
+ LLVM_DEBUG(
+ llvm::dbgs() << "VisitVarDecl : "
+ << Var->getBeginLoc().printToString(Outer.Sem.SourceMgr)
+ << "\n";
+ );
+
+ if (Var->isStaticLocal())
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeStaticLocalVars,
+ DiagnosticID::HasStaticLocal,
+ Var->getLocation());
+
+ const QualType::DestructionKind DK =
+ Var->needsDestruction(Outer.Sem.getASTContext());
+ if (DK == QualType::DK_cxx_destructor) {
+ QualType QT = Var->getType();
+ if (const auto *ClsType = QT.getTypePtr()->getAs<RecordType>()) {
+ if (const auto *CxxRec =
+ dyn_cast<CXXRecordDecl>(ClsType->getDecl())) {
+ if (const CXXDestructorDecl *Dtor = CxxRec->getDestructor()) {
+ CallableInfo CI(Outer.Sem, *Dtor);
+ followCall(CI, Var->getLocation());
+ }
+ }
+ }
+ }
+ return true;
+ }
+
+ bool VisitCXXNewExpr(CXXNewExpr *New) {
+ // BUG? It seems incorrect that RecursiveASTVisitor does not
+ // visit the call to operator new.
+ if (FunctionDecl *FD = New->getOperatorNew()) {
+ CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorNew);
+ followCall(CI, New->getBeginLoc());
+ }
+
+ // It's a bit excessive to check operator delete here, since it's
+ // just a fallback for operator new followed by a failed constructor.
+ // We could check it via New->getOperatorDelete().
+
+ // It DOES however visit the called constructor
+ return true;
+ }
+
+ bool VisitCXXDeleteExpr(CXXDeleteExpr *Delete) {
+ // BUG? It seems incorrect that RecursiveASTVisitor does not
+ // visit the call to operator delete.
+ if (FunctionDecl *FD = Delete->getOperatorDelete()) {
+ CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorDelete);
+ followCall(CI, Delete->getBeginLoc());
+ }
+
+ // It DOES however visit the called destructor
+
+ return true;
+ }
+
+ bool VisitCXXConstructExpr(CXXConstructExpr *Construct) {
+ LLVM_DEBUG(
+ llvm::dbgs() << "VisitCXXConstructExpr : "
+ << Construct->getBeginLoc().printToString(
+ Outer.Sem.SourceMgr)
+ << "\n";
+ );
+
+ // BUG? It seems incorrect that RecursiveASTVisitor does not
+ // visit the call to the constructor.
+ const CXXConstructorDecl *Ctor = Construct->getConstructor();
+ CallableInfo CI(Outer.Sem, *Ctor);
+ followCall(CI, Construct->getLocation());
+
+ return true;
+ }
+
+ bool VisitCXXDefaultInitExpr(CXXDefaultInitExpr *DEI) {
+ if (Expr *E = DEI->getExpr())
+ TraverseStmt(E);
+
+ return true;
+ }
+
+ bool TraverseLambdaExpr(LambdaExpr *Lambda) {
+ // We override this so as the be able to skip traversal of the lambda's
+ // body. We have to explicitly traverse the captures.
+ for (unsigned I = 0, N = Lambda->capture_size(); I < N; ++I)
+ TraverseLambdaCapture(Lambda, Lambda->capture_begin() + I,
+ Lambda->capture_init_begin()[I]);
+
+ return true;
+ }
+
+ bool TraverseBlockExpr(BlockExpr * /*unused*/) {
+ // TODO: are the capture expressions (ctor call?) safe?
+ return true;
+ }
+
+ bool VisitDeclRefExpr(const DeclRefExpr *E) {
+ const ValueDecl *Val = E->getDecl();
+ if (isa<VarDecl>(Val)) {
+ const VarDecl *Var = cast<VarDecl>(Val);
+ VarDecl::TLSKind TLSK = Var->getTLSKind();
+ if (TLSK != VarDecl::TLS_None) {
+ // At least on macOS, thread-local variables are initialized on
+ // first access, including a heap allocation.
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThreadLocalVars,
+ DiagnosticID::AccessesThreadLocal,
+ E->getLocation());
+ }
+ }
+ return true;
+ }
+
+ bool TraverseGenericSelectionExpr(GenericSelectionExpr *Node) {
+ return TraverseStmt(Node->getResultExpr());
+ }
+ bool TraverseUnaryExprOrTypeTraitExpr(UnaryExprOrTypeTraitExpr *Node) {
+ return true;
+ }
+
+ bool TraverseTypeOfExprTypeLoc(TypeOfExprTypeLoc Node) { return true; }
+
+ bool TraverseDecltypeTypeLoc(DecltypeTypeLoc Node) { return true; }
+
+ bool TraverseCXXNoexceptExpr(CXXNoexceptExpr *Node) { return true; }
+
+ bool TraverseCXXTypeidExpr(CXXTypeidExpr *Node) { return true; }
+ };
+};
+
+Analyzer::AnalysisMap::~AnalysisMap() {
+ for (const auto &Item : *this) {
+ FuncAnalysisPtr AP = Item.second;
+ if (isa<PendingFunctionAnalysis *>(AP))
+ delete AP.get<PendingFunctionAnalysis *>();
+ else
+ delete AP.get<CompleteFunctionAnalysis *>();
+ }
+}
+
+} // anonymous namespace
+
+namespace clang {
+
+void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU)
+{
+ if (S.hasUncompilableErrorOccurred() || S.Diags.getIgnoreAllWarnings())
+ // exit if having uncompilable errors or ignoring all warnings:
+ return;
+ if (TU == nullptr)
+ return;
+ Analyzer{S}.run(*TU);
+}
+
+} // namespace clang
diff --git a/clang/lib/Sema/Sema.cpp b/clang/lib/Sema/Sema.cpp
index 2e989f0ba6fe45..35ba1da9770c4e 100644
--- a/clang/lib/Sema/Sema.cpp
+++ b/clang/lib/Sema/Sema.cpp
@@ -1509,6 +1509,9 @@ void Sema::ActOnEndOfTranslationUnit() {
AnalysisWarnings.IssueWarnings(Context.getTranslationUnitDecl());
+ if (Context.hasAnyFunctionEffects())
+ performEffectAnalysis(*this, Context.getTranslationUnitDecl());
+
// Check we've noticed that we're no longer parsing the initializer for every
// variable. If we miss cases, then at best we have a performance issue and
// at worst a rejects-valid bug.
>From efe1b93804ed91634bd89d1ea9b64947c5af79d4 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 26 Jul 2024 14:29:42 -0700
Subject: [PATCH 07/59] CallableInfo doesn't need to cache the name. Clean up
traversal of constructor initializers and implicit destructors (with test).
---
clang/lib/Sema/EffectAnalysis.cpp | 51 ++++++-------
.../Sema/attr-nonblocking-constraints.cpp | 71 +++++++++++--------
2 files changed, 62 insertions(+), 60 deletions(-)
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index ca1213658f4596..862cb17b8bd783 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -199,7 +199,6 @@ struct CallableInfo {
// FunctionDecl if CallType::Function or Virtual
// BlockDecl if CallType::Block
const Decl *CDecl;
- mutable std::optional<std::string> MaybeName;
SpecialFuncType FuncType = SpecialFuncType::None;
EffectSet Effects;
CallType CType = CallType::Unknown;
@@ -247,20 +246,17 @@ struct CallableInfo {
/// Generate a name for logging and diagnostics.
std::string name(Sema &Sem) const {
- if (!MaybeName) {
- std::string Name;
- llvm::raw_string_ostream OS(Name);
-
- if (auto *FD = dyn_cast<FunctionDecl>(CDecl))
- FD->getNameForDiagnostic(OS, Sem.getPrintingPolicy(),
- /*Qualified=*/true);
- else if (auto *BD = dyn_cast<BlockDecl>(CDecl))
- OS << "(block " << BD->getBlockManglingNumber() << ")";
- else if (auto *VD = dyn_cast<NamedDecl>(CDecl))
- VD->printQualifiedName(OS);
- MaybeName = Name;
- }
- return *MaybeName;
+ std::string Name;
+ llvm::raw_string_ostream OS(Name);
+
+ if (auto *FD = dyn_cast<FunctionDecl>(CDecl))
+ FD->getNameForDiagnostic(OS, Sem.getPrintingPolicy(),
+ /*Qualified=*/true);
+ else if (auto *BD = dyn_cast<BlockDecl>(CDecl))
+ OS << "(block " << BD->getBlockManglingNumber() << ")";
+ else if (auto *VD = dyn_cast<NamedDecl>(CDecl))
+ VD->printQualifiedName(OS);
+ return Name;
}
};
@@ -955,17 +951,10 @@ class Analyzer {
// -- Entry point --
void run() {
- // The target function itself may have some implicit code paths beyond the
- // body: member and base constructors and destructors. Visit these first.
- if (const auto *FD = dyn_cast<const FunctionDecl>(CurrentCaller.CDecl)) {
- if (auto *Ctor = dyn_cast<CXXConstructorDecl>(FD)) {
- for (const CXXCtorInitializer *Initer : Ctor->inits())
- if (Expr *Init = Initer->getInit())
- VisitStmt(Init);
- } else if (auto *Dtor = dyn_cast<CXXDestructorDecl>(FD))
- followDestructor(dyn_cast<CXXRecordDecl>(Dtor->getParent()), Dtor);
- }
- // else could be BlockDecl
+ // The target function may have implicit code paths beyond the
+ // body: member and base destructors. Visit these first.
+ if (auto *Dtor = dyn_cast<CXXDestructorDecl>(CurrentCaller.CDecl))
+ followDestructor(dyn_cast<CXXRecordDecl>(Dtor->getParent()), Dtor);
// Do an AST traversal of the function/block body
TraverseDecl(const_cast<Decl *>(CurrentCaller.CDecl));
@@ -1043,18 +1032,18 @@ class Analyzer {
void followDestructor(const CXXRecordDecl *Rec,
const CXXDestructorDecl *Dtor) {
for (const FieldDecl *Field : Rec->fields())
- followTypeDtor(Field->getType());
+ followTypeDtor(Field->getType(), Dtor);
if (const auto *Class = dyn_cast<CXXRecordDecl>(Rec)) {
for (const CXXBaseSpecifier &Base : Class->bases())
- followTypeDtor(Base.getType());
+ followTypeDtor(Base.getType(), Dtor);
for (const CXXBaseSpecifier &Base : Class->vbases())
- followTypeDtor(Base.getType());
+ followTypeDtor(Base.getType(), Dtor);
}
}
- void followTypeDtor(QualType QT) {
+ void followTypeDtor(QualType QT, const CXXDestructorDecl *OuterDtor) {
const Type *Ty = QT.getTypePtr();
while (Ty->isArrayType()) {
const ArrayType *Arr = Ty->getAsArrayTypeUnsafe();
@@ -1066,7 +1055,7 @@ class Analyzer {
if (const CXXRecordDecl *Class = Ty->getAsCXXRecordDecl()) {
if (CXXDestructorDecl *Dtor = Class->getDestructor()) {
CallableInfo CI(Outer.Sem, *Dtor);
- followCall(CI, Dtor->getLocation());
+ followCall(CI, OuterDtor->getLocation());
}
}
}
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index e50c5b436daafc..7c7e322df80964 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -7,18 +7,18 @@
// --- CONSTRAINTS ---
-void nl1() [[clang::nonblocking]]
+void nb1() [[clang::nonblocking]]
{
int *pInt = new int; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
delete pInt; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
}
-void nl2() [[clang::nonblocking]]
+void nb2() [[clang::nonblocking]]
{
static int global; // expected-warning {{'nonblocking' function must not have static locals}}
}
-void nl3() [[clang::nonblocking]]
+void nb3() [[clang::nonblocking]]
{
try {
throw 42; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
@@ -27,13 +27,13 @@ void nl3() [[clang::nonblocking]]
}
}
-void nl4_inline() {}
-void nl4_not_inline(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+void nb4_inline() {}
+void nb4_not_inline(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
-void nl4() [[clang::nonblocking]]
+void nb4() [[clang::nonblocking]]
{
- nl4_inline(); // OK
- nl4_not_inline(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nb4_inline(); // OK
+ nb4_not_inline(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
}
@@ -41,21 +41,21 @@ struct HasVirtual {
virtual void unsafe(); // expected-note {{virtual method cannot be inferred 'nonblocking'}}
};
-void nl5() [[clang::nonblocking]]
+void nb5() [[clang::nonblocking]]
{
HasVirtual hv;
hv.unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
}
-void nl6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
-void nl6_transitively_unsafe()
+void nb6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+void nb6_transitively_unsafe()
{
- nl6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function}}
+ nb6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function}}
}
-void nl6() [[clang::nonblocking]]
+void nb6() [[clang::nonblocking]]
{
- nl6_transitively_unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nb6_transitively_unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
}
thread_local int tl_var{ 42 };
@@ -65,7 +65,7 @@ bool tl_test() [[clang::nonblocking]]
return tl_var > 0; // expected-warning {{'nonblocking' function must not use thread-local variables}}
}
-void nl7()
+void nb7()
{
// Make sure we verify blocks
auto blk = ^() [[clang::nonblocking]] {
@@ -73,7 +73,7 @@ void nl7()
};
}
-void nl8()
+void nb8()
{
// Make sure we verify lambdas
auto lambda = []() [[clang::nonblocking]] {
@@ -111,7 +111,7 @@ void nl8()
}
};
-void nl9() [[clang::nonblocking]]
+void nb9() [[clang::nonblocking]]
{
Adder<int>::add_explicit(1, 2);
Adder<int>::add_implicit(1, 2);
@@ -121,7 +121,7 @@ void nl9() [[clang::nonblocking]]
expected-note {{in template expansion here}}
}
-void nl10(
+void nb10(
void (*fp1)(), // expected-note {{function pointer cannot be inferred 'nonblocking'}}
void (*fp2)() [[clang::nonblocking]]
) [[clang::nonblocking]]
@@ -131,20 +131,20 @@ void nl10(
}
// Interactions with nonblocking(false)
-void nl11_no_inference_1() [[clang::nonblocking(false)]] // expected-note {{function does not permit inference of 'nonblocking'}}
+void nb11_no_inference_1() [[clang::nonblocking(false)]] // expected-note {{function does not permit inference of 'nonblocking'}}
{
}
-void nl11_no_inference_2() [[clang::nonblocking(false)]]; // expected-note {{function does not permit inference of 'nonblocking'}}
+void nb11_no_inference_2() [[clang::nonblocking(false)]]; // expected-note {{function does not permit inference of 'nonblocking'}}
template <bool V>
struct ComputedNB {
void method() [[clang::nonblocking(V)]]; // expected-note {{function does not permit inference of 'nonblocking'}}
};
-void nl11() [[clang::nonblocking]]
+void nb11() [[clang::nonblocking]]
{
- nl11_no_inference_1(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
- nl11_no_inference_2(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nb11_no_inference_1(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nb11_no_inference_2(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
ComputedNB<true> CNB_true;
CNB_true.method();
@@ -154,11 +154,11 @@ void nl11() [[clang::nonblocking]]
}
// Verify that when attached to a redeclaration, the attribute successfully attaches.
-void nl12() {
+void nb12() {
static int x; // expected-warning {{'nonblocking' function must not have static locals}}
}
-void nl12() [[clang::nonblocking]];
-void nl13() [[clang::nonblocking]] { nl12(); }
+void nb12() [[clang::nonblocking]];
+void nb13() [[clang::nonblocking]] { nb12(); }
// C++ member function pointers
struct PTMFTester {
@@ -175,21 +175,34 @@ void PTMFTester::convert() [[clang::nonblocking]]
}
// Block variables
-void nl17(void (^blk)() [[clang::nonblocking]]) [[clang::nonblocking]] {
+void nb17(void (^blk)() [[clang::nonblocking]]) [[clang::nonblocking]] {
blk();
}
// References to blocks
-void nl18(void (^block)() [[clang::nonblocking]]) [[clang::nonblocking]]
+void nb18(void (^block)() [[clang::nonblocking]]) [[clang::nonblocking]]
{
auto &ref = block;
ref();
}
+// Verify traversal of implicit code paths - constructors and destructors.
+struct Unsafe {
+ static void problem1(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+ static void problem2(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+
+ Unsafe() { problem1(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem1'}}
+ ~Unsafe() { problem2(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem2'}}
+};
+
+struct DerivedFromUnsafe : public Unsafe {
+ DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::Unsafe'}}
+ ~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::~Unsafe'}}
+};
// --- nonblocking implies noexcept ---
#pragma clang diagnostic warning "-Wperf-constraint-implies-noexcept"
-void nl19() [[clang::nonblocking]] // expected-warning {{'nonblocking' function should be declared noexcept}}
+void nb19() [[clang::nonblocking]] // expected-warning {{'nonblocking' function should be declared noexcept}}
{
}
>From 7ffdbefa56e25f8398b32104c4616690ab076afe Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 1 Aug 2024 18:09:59 -0700
Subject: [PATCH 08/59] Simpler bitmap implementation of FunctionEffectKindSet
---
clang/include/clang/AST/Type.h | 75 +++++++++++++++-
clang/include/clang/Sema/Sema.h | 6 +-
clang/lib/AST/Type.cpp | 17 +++-
clang/lib/Sema/EffectAnalysis.cpp | 137 +++++++++++++-----------------
clang/lib/Sema/SemaDecl.cpp | 6 +-
5 files changed, 153 insertions(+), 88 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index 89a74ff1fb285d..f4e6c8f04b8be8 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -119,6 +119,7 @@ class Expr;
class ExtQualsTypeCommonBase;
class FunctionDecl;
class FunctionEffectSet;
+class FunctionEffectKindSet;
class IdentifierInfo;
class NamedDecl;
class ObjCInterfaceDecl;
@@ -4755,7 +4756,7 @@ class FunctionEffect {
// diagnostic. Caller should be assumed to have the effect (it may not have it
// explicitly when inferring).
bool shouldDiagnoseFunctionCall(bool Direct,
- ArrayRef<FunctionEffect> CalleeFX) const;
+ const FunctionEffectKindSet &CalleeFX) const;
friend bool operator==(const FunctionEffect &LHS, const FunctionEffect &RHS) {
return LHS.FKind == RHS.FKind;
@@ -4902,6 +4903,78 @@ class FunctionEffectsRef {
void dump(llvm::raw_ostream &OS) const;
};
+/// A mutable set of FunctionEffect::Kind.
+class FunctionEffectKindSet {
+ // For now this only needs to be a bitmap.
+ using KindBitsT = uint8_t;
+ constexpr static size_t EndBitPos = 8;
+
+ KindBitsT KindBits = 0;
+
+ static KindBitsT kindToBit(FunctionEffect::Kind K) {
+ return 1u << KindBitsT(K);
+ }
+
+ explicit FunctionEffectKindSet(KindBitsT KB) : KindBits(KB) {}
+
+public:
+ FunctionEffectKindSet() = default;
+ explicit FunctionEffectKindSet(FunctionEffectsRef FX) { insert(FX); }
+
+ class iterator {
+ const FunctionEffectKindSet *Outer = nullptr;
+ size_t Idx = 0;
+
+ // If Idx does not reference a set bit, advance it until it does,
+ // or until it reaches EndBitPos.
+ void advanceIdx() {
+ while (Idx < EndBitPos && !(Outer->KindBits & (1u << Idx)))
+ ++Idx;
+ }
+
+ public:
+ iterator();
+ iterator(const FunctionEffectKindSet &O, size_t I) : Outer(&O), Idx(I) {
+ advanceIdx();
+ }
+ bool operator==(const iterator &Other) const { return Idx == Other.Idx; }
+ bool operator!=(const iterator &Other) const { return Idx != Other.Idx; }
+
+ iterator operator++() {
+ ++Idx;
+ advanceIdx();
+ return *this;
+ }
+
+ FunctionEffect operator*() const {
+ assert(Idx < EndBitPos);
+ return FunctionEffect(FunctionEffect::Kind(Idx));
+ }
+ };
+
+ iterator begin() const { return iterator(*this, 0); }
+ iterator end() const { return iterator(*this, EndBitPos); }
+
+ void insert(const FunctionEffect &Effect) {
+ KindBits |= kindToBit(Effect.kind());
+ }
+ void insert(FunctionEffectsRef FX) {
+ for (const FunctionEffect &Item : FX.effects())
+ insert(Item);
+ }
+ void insert(const FunctionEffectKindSet &Set) { KindBits |= Set.KindBits; }
+
+ bool contains(const FunctionEffect::Kind EK) const {
+ return (KindBits & kindToBit(EK)) != 0;
+ }
+ void dump(llvm::raw_ostream &OS) const;
+
+ static FunctionEffectKindSet difference(const FunctionEffectKindSet &LHS,
+ const FunctionEffectKindSet &RHS) {
+ return FunctionEffectKindSet(LHS.KindBits & ~RHS.KindBits);
+ }
+};
+
/// A mutable set of FunctionEffects and possibly conditions attached to them.
/// Used to compare and merge effects on declarations.
///
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index 49315edcca7464..b166825bef4a5f 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -530,8 +530,8 @@ struct FunctionEffectDifferences : public SmallVector<FunctionEffectDiff> {
const FunctionEffectsRef &New);
};
-// Defined in EffectAnalysis.cpp. TODO: Maybe make this a method of Sema and move
-// more of the effects implementation into that file?
+// Defined in EffectAnalysis.cpp. TODO: Maybe make this a method of Sema and
+// move more of the effects implementation into that file?
void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU);
/// Sema - This implements semantic analysis and AST building for C.
@@ -882,7 +882,7 @@ class Sema final : public SemaBase {
SmallVector<const Decl *> DeclsWithEffectsToVerify;
/// The union of all effects present on DeclsWithEffectsToVerify. Conditions
/// are all null.
- FunctionEffectSet AllEffectsToVerify;
+ FunctionEffectKindSet AllEffectsToVerify;
/// Warn when implicitly changing function effects.
void diagnoseFunctionEffectConversion(QualType DstType, QualType SrcType,
diff --git a/clang/lib/AST/Type.cpp b/clang/lib/AST/Type.cpp
index fdaab8e4345936..6152375eb091aa 100644
--- a/clang/lib/AST/Type.cpp
+++ b/clang/lib/AST/Type.cpp
@@ -5163,12 +5163,12 @@ bool FunctionEffect::canInferOnFunction(const Decl &Callee) const {
}
bool FunctionEffect::shouldDiagnoseFunctionCall(
- bool Direct, ArrayRef<FunctionEffect> CalleeFX) const {
+ bool Direct, const FunctionEffectKindSet &CalleeFX) const {
switch (kind()) {
case Kind::NonAllocating:
case Kind::NonBlocking: {
const Kind CallerKind = kind();
- for (const auto &Effect : CalleeFX) {
+ for (const FunctionEffect &Effect : CalleeFX) {
const Kind EK = Effect.kind();
// Does callee have same or stronger constraint?
if (EK == CallerKind ||
@@ -5311,6 +5311,19 @@ LLVM_DUMP_METHOD void FunctionEffectSet::dump(llvm::raw_ostream &OS) const {
FunctionEffectsRef(*this).dump(OS);
}
+LLVM_DUMP_METHOD void FunctionEffectKindSet::dump(llvm::raw_ostream &OS) const {
+ OS << "Effects{";
+ bool First = true;
+ for (const auto &Effect : *this) {
+ if (!First)
+ OS << ", ";
+ else
+ First = false;
+ OS << Effect.name();
+ }
+ OS << "}";
+}
+
FunctionEffectsRef
FunctionEffectsRef::create(ArrayRef<FunctionEffect> FX,
ArrayRef<EffectConditionExpr> Conds) {
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index 862cb17b8bd783..83c3a07b2c66c9 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -11,8 +11,8 @@
//===----------------------------------------------------------------------===//
#include "clang/AST/Decl.h"
-#include "clang/AST/Type.h"
#include "clang/AST/RecursiveASTVisitor.h"
+#include "clang/AST/Type.h"
#include "clang/Basic/SourceManager.h"
#include "clang/Sema/SemaInternal.h"
@@ -81,6 +81,7 @@ static bool isNoexcept(const FunctionDecl *FD) {
return false;
}
+#if 0
/// A mutable set of FunctionEffect, for use in places where any conditions
/// have been resolved or can be ignored.
class EffectSet {
@@ -191,6 +192,7 @@ LLVM_DUMP_METHOD void EffectSet::dump(llvm::raw_ostream &OS) const {
}
OS << "}";
}
+#endif
// Transitory, more extended information about a callable, which can be a
// function, block, function pointer, etc.
@@ -200,7 +202,7 @@ struct CallableInfo {
// BlockDecl if CallType::Block
const Decl *CDecl;
SpecialFuncType FuncType = SpecialFuncType::None;
- EffectSet Effects;
+ FunctionEffectKindSet Effects;
CallType CType = CallType::Unknown;
CallableInfo(Sema &SemaRef, const Decl &CD,
@@ -224,7 +226,7 @@ struct CallableInfo {
// ValueDecl is function, enum, or variable, so just look at its type.
FXRef = FunctionEffectsRef::get(VD->getType());
}
- Effects = EffectSet(FXRef);
+ Effects = FunctionEffectKindSet(FXRef);
}
bool isDirectCall() const {
@@ -251,7 +253,7 @@ struct CallableInfo {
if (auto *FD = dyn_cast<FunctionDecl>(CDecl))
FD->getNameForDiagnostic(OS, Sem.getPrintingPolicy(),
- /*Qualified=*/true);
+ /*Qualified=*/true);
else if (auto *BD = dyn_cast<BlockDecl>(CDecl))
OS << "(block " << BD->getBlockManglingNumber() << ")";
else if (auto *VD = dyn_cast<NamedDecl>(CDecl))
@@ -328,8 +330,8 @@ class PendingFunctionAnalysis {
// We always have two disjoint sets of effects to verify:
// 1. Effects declared explicitly by this function.
// 2. All other inferrable effects needing verification.
- EffectSet DeclaredVerifiableEffects;
- EffectSet FXToInfer;
+ FunctionEffectKindSet DeclaredVerifiableEffects;
+ FunctionEffectKindSet FXToInfer;
private:
// Diagnostics pertaining to the function's explicit effects.
@@ -345,11 +347,10 @@ class PendingFunctionAnalysis {
public:
PendingFunctionAnalysis(
Sema &Sem, const CallableInfo &CInfo,
- ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
- DeclaredVerifiableEffects = CInfo.Effects;
-
+ const FunctionEffectKindSet &AllInferrableEffectsToVerify)
+ : DeclaredVerifiableEffects(CInfo.Effects) {
// Check for effects we are not allowed to infer
- EffectSet InferrableFX;
+ FunctionEffectKindSet InferrableFX;
for (const FunctionEffect &effect : AllInferrableEffectsToVerify) {
if (effect.canInferOnFunction(*CInfo.CDecl))
@@ -364,7 +365,8 @@ class PendingFunctionAnalysis {
}
// InferrableFX is now the set of inferrable effects which are not
// prohibited
- FXToInfer = EffectSet::difference(InferrableFX, DeclaredVerifiableEffects);
+ FXToInfer = FunctionEffectKindSet::difference(InferrableFX,
+ DeclaredVerifiableEffects);
}
// Hide the way that diagnostics for explicitly required effects vs. inferred
@@ -422,7 +424,7 @@ class CompleteFunctionAnalysis {
// ones which have been successfully inferred. These are all considered
// "verified" for the purposes of callers; any issue with verifying declared
// effects has already been reported and is not the problem of any caller.
- EffectSet VerifiedEffects;
+ FunctionEffectKindSet VerifiedEffects;
private:
// This is used to generate notes about failed inference.
@@ -432,9 +434,9 @@ class CompleteFunctionAnalysis {
// The incoming Pending analysis is consumed (member(s) are moved-from).
CompleteFunctionAnalysis(
ASTContext &Ctx, PendingFunctionAnalysis &Pending,
- const EffectSet &DeclaredEffects,
- ArrayRef<FunctionEffect> AllInferrableEffectsToVerify) {
- VerifiedEffects.insert(DeclaredEffects);
+ const FunctionEffectKindSet &DeclaredEffects,
+ const FunctionEffectKindSet &AllInferrableEffectsToVerify)
+ : VerifiedEffects(DeclaredEffects) {
for (const FunctionEffect &effect : AllInferrableEffectsToVerify)
if (Pending.diagnosticForInferrableEffect(effect) == nullptr)
VerifiedEffects.insert(effect);
@@ -469,7 +471,7 @@ class Analyzer {
Sema &Sem;
// Subset of Sema.AllEffectsToVerify
- EffectSet AllInferrableEffectsToVerify;
+ FunctionEffectKindSet AllInferrableEffectsToVerify;
using FuncAnalysisPtr =
llvm::PointerUnion<PendingFunctionAnalysis *, CompleteFunctionAnalysis *>;
@@ -532,17 +534,14 @@ class Analyzer {
void run(const TranslationUnitDecl &TU) {
// Gather all of the effects to be verified to see what operations need to
// be checked, and to see which ones are inferrable.
- for (const FunctionEffectWithCondition &CFE : Sem.AllEffectsToVerify) {
- const FunctionEffect &Effect = CFE.Effect;
+ for (const FunctionEffect &Effect : Sem.AllEffectsToVerify) {
const FunctionEffect::Flags Flags = Effect.flags();
if (Flags & FunctionEffect::FE_InferrableOnCallees)
AllInferrableEffectsToVerify.insert(Effect);
}
- LLVM_DEBUG(
- llvm::dbgs() << "AllInferrableEffectsToVerify: ";
- AllInferrableEffectsToVerify.dump(llvm::dbgs());
- llvm::dbgs() << "\n";
- );
+ LLVM_DEBUG(llvm::dbgs() << "AllInferrableEffectsToVerify: ";
+ AllInferrableEffectsToVerify.dump(llvm::dbgs());
+ llvm::dbgs() << "\n";);
// We can use DeclsWithEffectsToVerify as a stack for a
// depth-first traversal; there's no need for a second container. But first,
@@ -640,10 +639,8 @@ class Analyzer {
// a fairly trivial move to a heap-allocated object.
PendingFunctionAnalysis FAnalysis(Sem, CInfo, AllInferrableEffectsToVerify);
- LLVM_DEBUG(
- llvm::dbgs() << "\nVerifying " << CInfo.name(Sem) << " ";
- FAnalysis.dump(Sem, llvm::dbgs());
- );
+ LLVM_DEBUG(llvm::dbgs() << "\nVerifying " << CInfo.name(Sem) << " ";
+ FAnalysis.dump(Sem, llvm::dbgs()););
FunctionBodyASTVisitor Visitor(*this, FAnalysis, CInfo);
@@ -656,10 +653,8 @@ class Analyzer {
PendingFunctionAnalysis *PendingPtr =
new PendingFunctionAnalysis(std::move(FAnalysis));
DeclAnalysis[D] = PendingPtr;
- LLVM_DEBUG(
- llvm::dbgs() << "inserted pending " << PendingPtr << "\n";
- DeclAnalysis.dump(Sem, llvm::dbgs());
- );
+ LLVM_DEBUG(llvm::dbgs() << "inserted pending " << PendingPtr << "\n";
+ DeclAnalysis.dump(Sem, llvm::dbgs()););
return PendingPtr;
}
@@ -676,10 +671,8 @@ class Analyzer {
Sem.getASTContext(), Pending, CInfo.Effects,
AllInferrableEffectsToVerify);
DeclAnalysis[CInfo.CDecl] = CompletePtr;
- LLVM_DEBUG(
- llvm::dbgs() << "inserted complete " << CompletePtr << "\n";
- DeclAnalysis.dump(Sem, llvm::dbgs());
- );
+ LLVM_DEBUG(llvm::dbgs() << "inserted complete " << CompletePtr << "\n";
+ DeclAnalysis.dump(Sem, llvm::dbgs()););
}
// Called after all direct calls requiring inference have been found -- or
@@ -687,11 +680,9 @@ class Analyzer {
// the possibility of inference. Deletes Pending.
void finishPendingAnalysis(const Decl *D, PendingFunctionAnalysis *Pending) {
CallableInfo Caller(Sem, *D);
- LLVM_DEBUG(
- llvm::dbgs() << "finishPendingAnalysis for " << Caller.name(Sem) << " : ";
- Pending->dump(Sem, llvm::dbgs());
- llvm::dbgs() << "\n";
- );
+ LLVM_DEBUG(llvm::dbgs()
+ << "finishPendingAnalysis for " << Caller.name(Sem) << " : ";
+ Pending->dump(Sem, llvm::dbgs()); llvm::dbgs() << "\n";);
for (const PendingFunctionAnalysis::DirectCall &Call :
Pending->unverifiedCalls()) {
if (Call.Recursed)
@@ -713,7 +704,7 @@ class Analyzer {
const bool DirectCall = Callee.isDirectCall();
// Initially, the declared effects; inferred effects will be added.
- EffectSet CalleeEffects = Callee.Effects;
+ FunctionEffectKindSet CalleeEffects = Callee.Effects;
bool IsInferencePossible = DirectCall;
@@ -733,19 +724,16 @@ class Analyzer {
if (!Callee.isVerifiable())
IsInferencePossible = false;
- LLVM_DEBUG(
- llvm::dbgs() << "followCall from " << Caller.name(Sem) << " to "
- << Callee.name(Sem)
- << "; verifiable: " << Callee.isVerifiable() << "; callee ";
- CalleeEffects.dump(llvm::dbgs());
- llvm::dbgs() << "\n";
- llvm::dbgs() << " callee " << Callee.CDecl << " canonical "
- << CanonicalFunctionDecl(Callee.CDecl) << " redecls";
- for (Decl *D : Callee.CDecl->redecls())
- llvm::dbgs() << " " << D;
+ LLVM_DEBUG(llvm::dbgs() << "followCall from " << Caller.name(Sem) << " to "
+ << Callee.name(Sem) << "; verifiable: "
+ << Callee.isVerifiable() << "; callee ";
+ CalleeEffects.dump(llvm::dbgs()); llvm::dbgs() << "\n";
+ llvm::dbgs()
+ << " callee " << Callee.CDecl << " canonical "
+ << CanonicalFunctionDecl(Callee.CDecl) << " redecls";
+ for (Decl *D : Callee.CDecl->redecls()) llvm::dbgs() << " " << D;
- llvm::dbgs() << "\n";
- );
+ llvm::dbgs() << "\n";);
auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
FunctionEffect::Flags Flags = Effect.flags();
@@ -1008,7 +996,7 @@ class Analyzer {
const QualType CalleeType = CalleeExpr->getType();
auto *FPT =
CalleeType->getAs<FunctionProtoType>(); // null if FunctionType
- EffectSet CalleeFX;
+ FunctionEffectKindSet CalleeFX;
if (FPT)
CalleeFX.insert(FPT->getFunctionEffects());
@@ -1098,11 +1086,10 @@ class Analyzer {
}
bool VisitCallExpr(CallExpr *Call) {
- LLVM_DEBUG(
- llvm::dbgs() << "VisitCallExpr : "
+ LLVM_DEBUG(llvm::dbgs()
+ << "VisitCallExpr : "
<< Call->getBeginLoc().printToString(Outer.Sem.SourceMgr)
- << "\n";
- );
+ << "\n";);
Expr *CalleeExpr = Call->getCallee();
if (const Decl *Callee = CalleeExpr->getReferencedDeclOfCallee()) {
@@ -1122,11 +1109,10 @@ class Analyzer {
}
bool VisitVarDecl(VarDecl *Var) {
- LLVM_DEBUG(
- llvm::dbgs() << "VisitVarDecl : "
+ LLVM_DEBUG(llvm::dbgs()
+ << "VisitVarDecl : "
<< Var->getBeginLoc().printToString(Outer.Sem.SourceMgr)
- << "\n";
- );
+ << "\n";);
if (Var->isStaticLocal())
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeStaticLocalVars,
@@ -1180,12 +1166,10 @@ class Analyzer {
}
bool VisitCXXConstructExpr(CXXConstructExpr *Construct) {
- LLVM_DEBUG(
- llvm::dbgs() << "VisitCXXConstructExpr : "
- << Construct->getBeginLoc().printToString(
- Outer.Sem.SourceMgr)
- << "\n";
- );
+ LLVM_DEBUG(llvm::dbgs() << "VisitCXXConstructExpr : "
+ << Construct->getBeginLoc().printToString(
+ Outer.Sem.SourceMgr)
+ << "\n";);
// BUG? It seems incorrect that RecursiveASTVisitor does not
// visit the call to the constructor.
@@ -1208,7 +1192,7 @@ class Analyzer {
// body. We have to explicitly traverse the captures.
for (unsigned I = 0, N = Lambda->capture_size(); I < N; ++I)
TraverseLambdaCapture(Lambda, Lambda->capture_begin() + I,
- Lambda->capture_init_begin()[I]);
+ Lambda->capture_init_begin()[I]);
return true;
}
@@ -1265,14 +1249,13 @@ Analyzer::AnalysisMap::~AnalysisMap() {
namespace clang {
-void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU)
-{
- if (S.hasUncompilableErrorOccurred() || S.Diags.getIgnoreAllWarnings())
- // exit if having uncompilable errors or ignoring all warnings:
- return;
- if (TU == nullptr)
- return;
- Analyzer{S}.run(*TU);
+void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU) {
+ if (S.hasUncompilableErrorOccurred() || S.Diags.getIgnoreAllWarnings())
+ // exit if having uncompilable errors or ignoring all warnings:
+ return;
+ if (TU == nullptr)
+ return;
+ Analyzer{S}.run(*TU);
}
} // namespace clang
diff --git a/clang/lib/Sema/SemaDecl.cpp b/clang/lib/Sema/SemaDecl.cpp
index b54da058c43c5e..ef27d42b92ce69 100644
--- a/clang/lib/Sema/SemaDecl.cpp
+++ b/clang/lib/Sema/SemaDecl.cpp
@@ -10929,8 +10929,6 @@ void Sema::maybeAddDeclWithEffects(const Decl *D,
}
void Sema::addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX) {
- FunctionEffectSet::Conflicts Errs;
-
// To avoid the possibility of conflict, don't add effects which are
// not FE_InferrableOnCallees and therefore not verified; this removes
// blocking/allocating but keeps nonblocking/nonallocating.
@@ -10938,11 +10936,9 @@ void Sema::addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX) {
bool AnyVerifiable = false;
for (const FunctionEffectWithCondition &EC : FX)
if (EC.Effect.flags() & FunctionEffect::FE_InferrableOnCallees) {
- AllEffectsToVerify.insert(FunctionEffectWithCondition(EC.Effect, nullptr),
- Errs);
+ AllEffectsToVerify.insert(EC.Effect);
AnyVerifiable = true;
}
- assert(Errs.empty() && "effects conflicts should not be possible here");
// Record the declaration for later analysis.
if (AnyVerifiable)
>From c39e28e78f882a148914e7c17c60c01e461bea07 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 1 Aug 2024 21:36:11 -0700
Subject: [PATCH 09/59] - function does not permit inference of '%0': include
the name of the effect preventing inference. - EffectAnalysis: Rename
Diagnostic to Violation to clarify that it is an abstraction which can be
reported as either a warning or a note depending on context.
---
clang/include/clang/AST/Type.h | 13 +-
.../clang/Basic/DiagnosticSemaKinds.td | 2 +-
clang/lib/AST/Type.cpp | 21 +-
clang/lib/Sema/EffectAnalysis.cpp | 296 +++++++++---------
.../Sema/attr-nonblocking-constraints.cpp | 2 +-
5 files changed, 172 insertions(+), 162 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index f4e6c8f04b8be8..b13ba7d784b3a9 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -118,8 +118,9 @@ class EnumDecl;
class Expr;
class ExtQualsTypeCommonBase;
class FunctionDecl;
-class FunctionEffectSet;
+class FunctionEffectsRef;
class FunctionEffectKindSet;
+class FunctionEffectSet;
class IdentifierInfo;
class NamedDecl;
class ObjCInterfaceDecl;
@@ -4745,11 +4746,15 @@ class FunctionEffect {
/// The description printed in diagnostics, e.g. 'nonblocking'.
StringRef name() const;
- /// Return true if the effect is allowed to be inferred on the callee,
- /// which is either a FunctionDecl or BlockDecl.
+ /// Determine whether the effect is allowed to be inferred on the callee,
+ /// which is either a FunctionDecl or BlockDecl. If the returned optional
+ /// is empty, inference is permitted; otherwise it holds the effect which
+ /// blocked inference.
/// Example: This allows nonblocking(false) to prevent inference for the
/// function.
- bool canInferOnFunction(const Decl &Callee) const;
+ std::optional<FunctionEffect>
+ effectProhibitingInference(const Decl &Callee,
+ const FunctionEffectsRef &CalleeFX) const;
// Return false for success. When true is returned for a direct call, then the
// FE_InferrableOnCallees flag may trigger inference rather than an immediate
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index 709535dace2cf8..eedc2722a47993 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10969,7 +10969,7 @@ def note_func_effect_calls_func_without_effect : Note<
def note_func_effect_call_extern : Note<
"function cannot be inferred '%0' because it has no definition in this translation unit">;
def note_func_effect_call_disallows_inference : Note<
- "function does not permit inference of '%0'">;
+ "function does not permit inference of '%0' because it is declared '%1'">;
def note_func_effect_call_virtual : Note<
"virtual method cannot be inferred '%0'">;
def note_func_effect_call_func_ptr : Note<
diff --git a/clang/lib/AST/Type.cpp b/clang/lib/AST/Type.cpp
index 6152375eb091aa..06f6bb03d1d9f1 100644
--- a/clang/lib/AST/Type.cpp
+++ b/clang/lib/AST/Type.cpp
@@ -5128,35 +5128,30 @@ StringRef FunctionEffect::name() const {
llvm_unreachable("unknown effect kind");
}
-bool FunctionEffect::canInferOnFunction(const Decl &Callee) const {
+std::optional<FunctionEffect> FunctionEffect::effectProhibitingInference(
+ const Decl &Callee, const FunctionEffectsRef &CalleeFX) const {
switch (kind()) {
case Kind::NonAllocating:
case Kind::NonBlocking: {
- FunctionEffectsRef CalleeFX;
- if (auto *FD = Callee.getAsFunction())
- CalleeFX = FD->getFunctionEffects();
- else if (auto *BD = dyn_cast<BlockDecl>(&Callee))
- CalleeFX = BD->getFunctionEffects();
- else
- return false;
for (const FunctionEffectWithCondition &CalleeEC : CalleeFX) {
// nonblocking/nonallocating cannot call allocating.
if (CalleeEC.Effect.kind() == Kind::Allocating)
- return false;
+ return CalleeEC.Effect;
// nonblocking cannot call blocking.
if (kind() == Kind::NonBlocking &&
CalleeEC.Effect.kind() == Kind::Blocking)
- return false;
+ return CalleeEC.Effect;
}
- return true;
+ return std::nullopt;
}
case Kind::Allocating:
case Kind::Blocking:
- return false;
+ assert(0 && "effectProhibitingInference with non-inferable effect kind");
+ break;
case Kind::None:
- assert(0 && "canInferOnFunction with None");
+ assert(0 && "effectProhibitingInference with None");
break;
}
llvm_unreachable("unknown effect kind");
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index 83c3a07b2c66c9..a8bbb73faf9fd8 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -22,8 +22,8 @@ using namespace clang;
namespace {
-enum class DiagnosticID : uint8_t {
- None = 0, // sentinel for an empty Diagnostic
+enum class ViolationID : uint8_t {
+ None = 0, // sentinel for an empty Violation
Throws,
Catches,
CallsObjC,
@@ -38,20 +38,28 @@ enum class DiagnosticID : uint8_t {
CallsExprWithoutEffect,
};
-// Holds an effect diagnosis, potentially for the entire duration of the
-// analysis phase, in order to refer to it when explaining why a caller has been
-// made unsafe by a callee.
-struct Diagnostic {
+// Represents a violation of the rules, potentially for the entire duration of
+// the analysis phase, in order to refer to it when explaining why a caller has
+// been made unsafe by a callee. Can be transformed into either a Diagnostic
+// (warning or a note), depending on whether the violation pertains to a
+// function failing to be verifed as holding an effect vs. a function failing to
+// be inferred as holding that effect.
+struct Violation {
FunctionEffect Effect;
- DiagnosticID ID = DiagnosticID::None;
+ FunctionEffect CalleeEffectPreventingInference; // only for certain IDs
+ ViolationID ID = ViolationID::None;
SourceLocation Loc;
const Decl *Callee = nullptr; // only valid for Calls*
- Diagnostic() = default;
+ Violation() = default;
- Diagnostic(const FunctionEffect &Effect, DiagnosticID ID, SourceLocation Loc,
- const Decl *Callee = nullptr)
- : Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {}
+ Violation(const FunctionEffect &Effect, ViolationID ID, SourceLocation Loc,
+ const Decl *Callee = nullptr,
+ const FunctionEffect *CalleeEffect = nullptr)
+ : Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {
+ if (CalleeEffect != nullptr)
+ CalleeEffectPreventingInference = *CalleeEffect;
+ }
};
enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
@@ -202,13 +210,13 @@ struct CallableInfo {
// BlockDecl if CallType::Block
const Decl *CDecl;
SpecialFuncType FuncType = SpecialFuncType::None;
+ FunctionEffectsRef DeclEffects;
FunctionEffectKindSet Effects;
CallType CType = CallType::Unknown;
CallableInfo(Sema &SemaRef, const Decl &CD,
SpecialFuncType FT = SpecialFuncType::None)
: CDecl(&CD), FuncType(FT) {
- FunctionEffectsRef FXRef;
if (auto *FD = dyn_cast<FunctionDecl>(CDecl)) {
// Use the function's definition, if any.
@@ -218,15 +226,15 @@ struct CallableInfo {
if (auto *Method = dyn_cast<CXXMethodDecl>(FD);
Method && Method->isVirtual())
CType = CallType::Virtual;
- FXRef = FD->getFunctionEffects();
+ DeclEffects = FD->getFunctionEffects();
} else if (auto *BD = dyn_cast<BlockDecl>(CDecl)) {
CType = CallType::Block;
- FXRef = BD->getFunctionEffects();
+ DeclEffects = BD->getFunctionEffects();
} else if (auto *VD = dyn_cast<ValueDecl>(CDecl)) {
// ValueDecl is function, enum, or variable, so just look at its type.
- FXRef = FunctionEffectsRef::get(VD->getType());
+ DeclEffects = FunctionEffectsRef::get(VD->getType());
}
- Effects = FunctionEffectKindSet(FXRef);
+ Effects = FunctionEffectKindSet(DeclEffects);
}
bool isDirectCall() const {
@@ -263,29 +271,29 @@ struct CallableInfo {
};
// ----------
-// Map effects to single diagnostics, to hold the first (of potentially many)
-// diagnostics pertaining to an effect, per function.
-class EffectToDiagnosticMap {
+// Map effects to single Violations, to hold the first (of potentially many)
+// violations pertaining to an effect, per function.
+class EffectToViolationMap {
// Since we currently only have a tiny number of effects (typically no more
// than 1), use a sorted SmallVector with an inline capacity of 1. Since it
// is often empty, use a unique_ptr to the SmallVector.
- // Note that Diagnostic itself contains a FunctionEffect which is the key.
- using ImplVec = llvm::SmallVector<Diagnostic, 1>;
+ // Note that Violation itself contains a FunctionEffect which is the key.
+ using ImplVec = llvm::SmallVector<Violation, 1>;
std::unique_ptr<ImplVec> Impl;
public:
- // Insert a new diagnostic if we do not already have one for its effect.
- void maybeInsert(const Diagnostic &Diag) {
+ // Insert a new Violation if we do not already have one for its effect.
+ void maybeInsert(const Violation &Viol) {
if (Impl == nullptr)
Impl = std::make_unique<ImplVec>();
- auto *Iter = _find(Diag.Effect);
- if (Iter != Impl->end() && Iter->Effect == Diag.Effect)
+ auto *Iter = _find(Viol.Effect);
+ if (Iter != Impl->end() && Iter->Effect == Viol.Effect)
return;
- Impl->insert(Iter, Diag);
+ Impl->insert(Iter, Viol);
}
- const Diagnostic *lookup(FunctionEffect Key) {
+ const Violation *lookup(FunctionEffect Key) {
if (Impl == nullptr)
return nullptr;
@@ -334,11 +342,11 @@ class PendingFunctionAnalysis {
FunctionEffectKindSet FXToInfer;
private:
- // Diagnostics pertaining to the function's explicit effects.
- SmallVector<Diagnostic, 0> DiagnosticsForExplicitFX;
+ // Violations pertaining to the function's explicit effects.
+ SmallVector<Violation, 0> ViolationsForExplicitFX;
- // Diagnostics pertaining to other, non-explicit, inferrable effects.
- EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
+ // Violations pertaining to other, non-explicit, inferrable effects.
+ EffectToViolationMap InferrableEffectToFirstViolation;
// These unverified direct calls are what keeps the analysis "pending",
// until the callees can be verified.
@@ -353,14 +361,16 @@ class PendingFunctionAnalysis {
FunctionEffectKindSet InferrableFX;
for (const FunctionEffect &effect : AllInferrableEffectsToVerify) {
- if (effect.canInferOnFunction(*CInfo.CDecl))
+ std::optional<FunctionEffect> ProblemCalleeEffect =
+ effect.effectProhibitingInference(*CInfo.CDecl, CInfo.DeclEffects);
+ if (!ProblemCalleeEffect)
InferrableFX.insert(effect);
else {
- // Add a diagnostic for this effect if a caller were to
+ // Add a Violation for this effect if a caller were to
// try to infer it.
- InferrableEffectToFirstDiagnostic.maybeInsert(
- Diagnostic(effect, DiagnosticID::DeclDisallowsInference,
- CInfo.CDecl->getLocation()));
+ InferrableEffectToFirstViolation.maybeInsert(Violation(
+ effect, ViolationID::DeclDisallowsInference,
+ CInfo.CDecl->getLocation(), nullptr, &*ProblemCalleeEffect));
}
}
// InferrableFX is now the set of inferrable effects which are not
@@ -369,13 +379,13 @@ class PendingFunctionAnalysis {
DeclaredVerifiableEffects);
}
- // Hide the way that diagnostics for explicitly required effects vs. inferred
+ // Hide the way that Violations for explicitly required effects vs. inferred
// ones are handled differently.
- void checkAddDiagnostic(bool Inferring, const Diagnostic &NewDiag) {
+ void checkAddViolation(bool Inferring, const Violation &NewViol) {
if (!Inferring)
- DiagnosticsForExplicitFX.push_back(NewDiag);
+ ViolationsForExplicitFX.push_back(NewViol);
else
- InferrableEffectToFirstDiagnostic.maybeInsert(NewDiag);
+ InferrableEffectToFirstViolation.maybeInsert(NewViol);
}
void addUnverifiedDirectCall(const Decl *D, SourceLocation CallLoc) {
@@ -385,8 +395,8 @@ class PendingFunctionAnalysis {
// Analysis is complete when there are no unverified direct calls.
bool isComplete() const { return UnverifiedDirectCalls.empty(); }
- const Diagnostic *diagnosticForInferrableEffect(FunctionEffect effect) {
- return InferrableEffectToFirstDiagnostic.lookup(effect);
+ const Violation *violationForInferrableEffect(FunctionEffect effect) {
+ return InferrableEffectToFirstViolation.lookup(effect);
}
SmallVector<DirectCall, 0> &unverifiedCalls() {
@@ -394,17 +404,17 @@ class PendingFunctionAnalysis {
return UnverifiedDirectCalls;
}
- SmallVector<Diagnostic, 0> &getDiagnosticsForExplicitFX() {
- return DiagnosticsForExplicitFX;
+ SmallVector<Violation, 0> &getViolationsForExplicitFX() {
+ return ViolationsForExplicitFX;
}
void dump(Sema &SemaRef, llvm::raw_ostream &OS) const {
OS << "Pending: Declared ";
DeclaredVerifiableEffects.dump(OS);
- OS << ", " << DiagnosticsForExplicitFX.size() << " diags; ";
+ OS << ", " << ViolationsForExplicitFX.size() << " violations; ";
OS << " Infer ";
FXToInfer.dump(OS);
- OS << ", " << InferrableEffectToFirstDiagnostic.size() << " diags";
+ OS << ", " << InferrableEffectToFirstViolation.size() << " violations";
if (!UnverifiedDirectCalls.empty()) {
OS << "; Calls: ";
for (const DirectCall &Call : UnverifiedDirectCalls) {
@@ -428,7 +438,7 @@ class CompleteFunctionAnalysis {
private:
// This is used to generate notes about failed inference.
- EffectToDiagnosticMap InferrableEffectToFirstDiagnostic;
+ EffectToViolationMap InferrableEffectToFirstViolation;
public:
// The incoming Pending analysis is consumed (member(s) are moved-from).
@@ -438,22 +448,22 @@ class CompleteFunctionAnalysis {
const FunctionEffectKindSet &AllInferrableEffectsToVerify)
: VerifiedEffects(DeclaredEffects) {
for (const FunctionEffect &effect : AllInferrableEffectsToVerify)
- if (Pending.diagnosticForInferrableEffect(effect) == nullptr)
+ if (Pending.violationForInferrableEffect(effect) == nullptr)
VerifiedEffects.insert(effect);
- InferrableEffectToFirstDiagnostic =
- std::move(Pending.InferrableEffectToFirstDiagnostic);
+ InferrableEffectToFirstViolation =
+ std::move(Pending.InferrableEffectToFirstViolation);
}
- const Diagnostic *firstDiagnosticForEffect(const FunctionEffect &Effect) {
- return InferrableEffectToFirstDiagnostic.lookup(Effect);
+ const Violation *firstViolationForEffect(const FunctionEffect &Effect) {
+ return InferrableEffectToFirstViolation.lookup(Effect);
}
void dump(llvm::raw_ostream &OS) const {
OS << "Complete: Verified ";
VerifiedEffects.dump(OS);
OS << "; Infer ";
- OS << InferrableEffectToFirstDiagnostic.size() << " diags\n";
+ OS << InferrableEffectToFirstViolation.size() << " violations\n";
}
};
@@ -662,10 +672,9 @@ class Analyzer {
// inserted in the container.
void completeAnalysis(const CallableInfo &CInfo,
PendingFunctionAnalysis &Pending) {
- if (SmallVector<Diagnostic, 0> &Diags =
- Pending.getDiagnosticsForExplicitFX();
- !Diags.empty())
- emitDiagnostics(Diags, CInfo, Sem);
+ if (SmallVector<Violation, 0> &Viols = Pending.getViolationsForExplicitFX();
+ !Viols.empty())
+ emitDiagnostics(Viols, CInfo, Sem);
CompleteFunctionAnalysis *CompletePtr = new CompleteFunctionAnalysis(
Sem.getASTContext(), Pending, CInfo.Effects,
@@ -741,16 +750,16 @@ class Analyzer {
Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects);
if (Diagnose) {
// If inference is not allowed, or the target is indirect (virtual
- // method/function ptr?), generate a diagnostic now.
+ // method/function ptr?), generate a Violation now.
if (!IsInferencePossible ||
!(Flags & FunctionEffect::FE_InferrableOnCallees)) {
if (Callee.FuncType == SpecialFuncType::None)
- PFA.checkAddDiagnostic(
- Inferring, {Effect, DiagnosticID::CallsDeclWithoutEffect,
- CallLoc, Callee.CDecl});
+ PFA.checkAddViolation(Inferring,
+ {Effect, ViolationID::CallsDeclWithoutEffect,
+ CallLoc, Callee.CDecl});
else
- PFA.checkAddDiagnostic(
- Inferring, {Effect, DiagnosticID::AllocatesMemory, CallLoc});
+ PFA.checkAddViolation(
+ Inferring, {Effect, ViolationID::AllocatesMemory, CallLoc});
} else {
// Inference is allowed and necessary; defer it.
PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc);
@@ -766,13 +775,13 @@ class Analyzer {
}
// Should only be called when determined to be complete.
- void emitDiagnostics(SmallVector<Diagnostic, 0> &Diags,
+ void emitDiagnostics(SmallVector<Violation, 0> &Viols,
const CallableInfo &CInfo, Sema &S) {
- if (Diags.empty())
+ if (Viols.empty())
return;
const SourceManager &SM = S.getSourceManager();
- std::sort(Diags.begin(), Diags.end(),
- [&SM](const Diagnostic &LHS, const Diagnostic &RHS) {
+ std::sort(Viols.begin(), Viols.end(),
+ [&SM](const Violation &LHS, const Violation &RHS) {
return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
});
@@ -786,55 +795,56 @@ class Analyzer {
}
};
- // Top-level diagnostics are warnings.
- for (const Diagnostic &Diag : Diags) {
- StringRef effectName = Diag.Effect.name();
- switch (Diag.ID) {
- case DiagnosticID::None:
- case DiagnosticID::DeclDisallowsInference: // shouldn't happen
- // here
- llvm_unreachable("Unexpected diagnostic kind");
+ // Top-level violations are warnings.
+ for (const Violation &Viol1 : Viols) {
+ StringRef effectName = Viol1.Effect.name();
+ switch (Viol1.ID) {
+ case ViolationID::None:
+ case ViolationID::DeclDisallowsInference: // shouldn't happen
+ // here
+ llvm_unreachable("Unexpected violation kind");
break;
- case DiagnosticID::AllocatesMemory:
- S.Diag(Diag.Loc, diag::warn_func_effect_allocates) << effectName;
+ case ViolationID::AllocatesMemory:
+ S.Diag(Viol1.Loc, diag::warn_func_effect_allocates) << effectName;
checkAddTemplateNote(CInfo.CDecl);
break;
- case DiagnosticID::Throws:
- case DiagnosticID::Catches:
- S.Diag(Diag.Loc, diag::warn_func_effect_throws_or_catches)
+ case ViolationID::Throws:
+ case ViolationID::Catches:
+ S.Diag(Viol1.Loc, diag::warn_func_effect_throws_or_catches)
<< effectName;
checkAddTemplateNote(CInfo.CDecl);
break;
- case DiagnosticID::HasStaticLocal:
- S.Diag(Diag.Loc, diag::warn_func_effect_has_static_local) << effectName;
+ case ViolationID::HasStaticLocal:
+ S.Diag(Viol1.Loc, diag::warn_func_effect_has_static_local)
+ << effectName;
checkAddTemplateNote(CInfo.CDecl);
break;
- case DiagnosticID::AccessesThreadLocal:
- S.Diag(Diag.Loc, diag::warn_func_effect_uses_thread_local)
+ case ViolationID::AccessesThreadLocal:
+ S.Diag(Viol1.Loc, diag::warn_func_effect_uses_thread_local)
<< effectName;
checkAddTemplateNote(CInfo.CDecl);
break;
- case DiagnosticID::CallsObjC:
- S.Diag(Diag.Loc, diag::warn_func_effect_calls_objc) << effectName;
+ case ViolationID::CallsObjC:
+ S.Diag(Viol1.Loc, diag::warn_func_effect_calls_objc) << effectName;
checkAddTemplateNote(CInfo.CDecl);
break;
- case DiagnosticID::CallsExprWithoutEffect:
- S.Diag(Diag.Loc, diag::warn_func_effect_calls_expr_without_effect)
+ case ViolationID::CallsExprWithoutEffect:
+ S.Diag(Viol1.Loc, diag::warn_func_effect_calls_expr_without_effect)
<< effectName;
checkAddTemplateNote(CInfo.CDecl);
break;
- case DiagnosticID::CallsDeclWithoutEffect: {
- CallableInfo CalleeInfo(S, *Diag.Callee);
+ case ViolationID::CallsDeclWithoutEffect: {
+ CallableInfo CalleeInfo(S, *Viol1.Callee);
std::string CalleeName = CalleeInfo.name(S);
- S.Diag(Diag.Loc, diag::warn_func_effect_calls_func_without_effect)
+ S.Diag(Viol1.Loc, diag::warn_func_effect_calls_func_without_effect)
<< effectName << CalleeName;
checkAddTemplateNote(CInfo.CDecl);
// Emit notes explaining the transitive chain of inferences: Why isn't
// the callee safe?
- for (const Decl *Callee = Diag.Callee; Callee != nullptr;) {
+ for (const Decl *Callee = Viol1.Callee; Callee != nullptr;) {
std::optional<CallableInfo> MaybeNextCallee;
CompleteFunctionAnalysis *Completed =
DeclAnalysis.completedAnalysisForDecl(CalleeInfo.CDecl);
@@ -850,61 +860,62 @@ class Analyzer {
S.Diag(Callee->getLocation(),
diag::note_func_effect_call_func_ptr)
<< effectName;
- else if (CalleeInfo.Effects.contains(Diag.Effect.oppositeKind()))
+ else if (CalleeInfo.Effects.contains(Viol1.Effect.oppositeKind()))
S.Diag(Callee->getLocation(),
diag::note_func_effect_call_disallows_inference)
- << effectName;
+ << effectName
+ << FunctionEffect(Viol1.Effect.oppositeKind()).name();
else
S.Diag(Callee->getLocation(), diag::note_func_effect_call_extern)
<< effectName;
break;
}
- const Diagnostic *PtrDiag2 =
- Completed->firstDiagnosticForEffect(Diag.Effect);
- if (PtrDiag2 == nullptr)
+ const Violation *PtrViol2 =
+ Completed->firstViolationForEffect(Viol1.Effect);
+ if (PtrViol2 == nullptr)
break;
- const Diagnostic &Diag2 = *PtrDiag2;
- switch (Diag2.ID) {
- case DiagnosticID::None:
- llvm_unreachable("Unexpected diagnostic kind");
+ const Violation &Viol2 = *PtrViol2;
+ switch (Viol2.ID) {
+ case ViolationID::None:
+ llvm_unreachable("Unexpected violation kind");
break;
- case DiagnosticID::DeclDisallowsInference:
- S.Diag(Diag2.Loc, diag::note_func_effect_call_disallows_inference)
- << effectName;
+ case ViolationID::DeclDisallowsInference:
+ S.Diag(Viol2.Loc, diag::note_func_effect_call_disallows_inference)
+ << effectName << Viol2.CalleeEffectPreventingInference.name();
break;
- case DiagnosticID::CallsExprWithoutEffect:
- S.Diag(Diag2.Loc, diag::note_func_effect_call_func_ptr)
+ case ViolationID::CallsExprWithoutEffect:
+ S.Diag(Viol2.Loc, diag::note_func_effect_call_func_ptr)
<< effectName;
break;
- case DiagnosticID::AllocatesMemory:
- S.Diag(Diag2.Loc, diag::note_func_effect_allocates) << effectName;
+ case ViolationID::AllocatesMemory:
+ S.Diag(Viol2.Loc, diag::note_func_effect_allocates) << effectName;
break;
- case DiagnosticID::Throws:
- case DiagnosticID::Catches:
- S.Diag(Diag2.Loc, diag::note_func_effect_throws_or_catches)
+ case ViolationID::Throws:
+ case ViolationID::Catches:
+ S.Diag(Viol2.Loc, diag::note_func_effect_throws_or_catches)
<< effectName;
break;
- case DiagnosticID::HasStaticLocal:
- S.Diag(Diag2.Loc, diag::note_func_effect_has_static_local)
+ case ViolationID::HasStaticLocal:
+ S.Diag(Viol2.Loc, diag::note_func_effect_has_static_local)
<< effectName;
break;
- case DiagnosticID::AccessesThreadLocal:
- S.Diag(Diag2.Loc, diag::note_func_effect_uses_thread_local)
+ case ViolationID::AccessesThreadLocal:
+ S.Diag(Viol2.Loc, diag::note_func_effect_uses_thread_local)
<< effectName;
break;
- case DiagnosticID::CallsObjC:
- S.Diag(Diag2.Loc, diag::note_func_effect_calls_objc) << effectName;
+ case ViolationID::CallsObjC:
+ S.Diag(Viol2.Loc, diag::note_func_effect_calls_objc) << effectName;
break;
- case DiagnosticID::CallsDeclWithoutEffect:
- MaybeNextCallee.emplace(S, *Diag2.Callee);
- S.Diag(Diag2.Loc, diag::note_func_effect_calls_func_without_effect)
+ case ViolationID::CallsDeclWithoutEffect:
+ MaybeNextCallee.emplace(S, *Viol2.Callee);
+ S.Diag(Viol2.Loc, diag::note_func_effect_calls_func_without_effect)
<< effectName << MaybeNextCallee->name(S);
break;
}
checkAddTemplateNote(Callee);
- Callee = Diag2.Callee;
+ Callee = Viol2.Callee;
if (MaybeNextCallee) {
CalleeInfo = *MaybeNextCallee;
CalleeName = CalleeInfo.name(S);
@@ -922,8 +933,7 @@ class Analyzer {
// [2] The function has not explicitly declared an effect in question, and is
// being checked for implicit conformance.
//
- // Diagnostics are always routed to a PendingFunctionAnalysis, which holds
- // all diagnostic output.
+ // Violations are always routed to a PendingFunctionAnalysis.
struct FunctionBodyASTVisitor
: public RecursiveASTVisitor<FunctionBodyASTVisitor> {
@@ -951,32 +961,32 @@ class Analyzer {
// -- Methods implementing common logic --
// Handle a language construct forbidden by some effects. Only effects whose
- // flags include the specified flag receive a diagnostic. \p Flag describes
+ // flags include the specified flag receive a violation. \p Flag describes
// the construct.
- void diagnoseLanguageConstruct(FunctionEffect::FlagBit Flag, DiagnosticID D,
+ void diagnoseLanguageConstruct(FunctionEffect::FlagBit Flag, ViolationID D,
SourceLocation Loc,
const Decl *Callee = nullptr) {
// If there are any declared verifiable effects which forbid the construct
- // represented by the flag, store just one diagnostic.
+ // represented by the flag, store just one violation..
for (const FunctionEffect &Effect :
CurrentFunction.DeclaredVerifiableEffects) {
if (Effect.flags() & Flag) {
- addDiagnostic(/*inferring=*/false, Effect, D, Loc, Callee);
+ addViolation(/*inferring=*/false, Effect, D, Loc, Callee);
break;
}
}
// For each inferred effect which forbids the construct, store a
- // diagnostic, if we don't already have a diagnostic for that effect.
+ // violation, if we don't already have a violation for that effect.
for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
if (Effect.flags() & Flag)
- addDiagnostic(/*inferring=*/true, Effect, D, Loc, Callee);
+ addViolation(/*inferring=*/true, Effect, D, Loc, Callee);
}
- void addDiagnostic(bool Inferring, const FunctionEffect &Effect,
- DiagnosticID D, SourceLocation Loc,
- const Decl *Callee = nullptr) {
- CurrentFunction.checkAddDiagnostic(Inferring,
- Diagnostic(Effect, D, Loc, Callee));
+ void addViolation(bool Inferring, const FunctionEffect &Effect,
+ ViolationID D, SourceLocation Loc,
+ const Decl *Callee = nullptr) {
+ CurrentFunction.checkAddViolation(Inferring,
+ Violation(Effect, D, Loc, Callee));
}
// Here we have a call to a Decl, either explicitly via a CallExpr or some
@@ -1003,8 +1013,8 @@ class Analyzer {
auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
if (FPT == nullptr || Effect.shouldDiagnoseFunctionCall(
/*direct=*/false, CalleeFX))
- addDiagnostic(Inferring, Effect, DiagnosticID::CallsExprWithoutEffect,
- Call->getBeginLoc());
+ addViolation(Inferring, Effect, ViolationID::CallsExprWithoutEffect,
+ Call->getBeginLoc());
};
for (const FunctionEffect &Effect :
@@ -1057,31 +1067,31 @@ class Analyzer {
bool VisitCXXThrowExpr(CXXThrowExpr *Throw) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
- DiagnosticID::Throws, Throw->getThrowLoc());
+ ViolationID::Throws, Throw->getThrowLoc());
return true;
}
bool VisitCXXCatchStmt(CXXCatchStmt *Catch) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
- DiagnosticID::Catches, Catch->getCatchLoc());
+ ViolationID::Catches, Catch->getCatchLoc());
return true;
}
bool VisitObjCAtThrowStmt(ObjCAtThrowStmt *Throw) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
- DiagnosticID::Throws, Throw->getThrowLoc());
+ ViolationID::Throws, Throw->getThrowLoc());
return true;
}
bool VisitObjCAtCatchStmt(ObjCAtCatchStmt *Catch) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
- DiagnosticID::Catches, Catch->getAtCatchLoc());
+ ViolationID::Catches, Catch->getAtCatchLoc());
return true;
}
bool VisitObjCMessageExpr(ObjCMessageExpr *Msg) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeObjCMessageSend,
- DiagnosticID::CallsObjC, Msg->getBeginLoc());
+ ViolationID::CallsObjC, Msg->getBeginLoc());
return true;
}
@@ -1116,7 +1126,7 @@ class Analyzer {
if (Var->isStaticLocal())
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeStaticLocalVars,
- DiagnosticID::HasStaticLocal,
+ ViolationID::HasStaticLocal,
Var->getLocation());
const QualType::DestructionKind DK =
@@ -1211,7 +1221,7 @@ class Analyzer {
// At least on macOS, thread-local variables are initialized on
// first access, including a heap allocation.
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThreadLocalVars,
- DiagnosticID::AccessesThreadLocal,
+ ViolationID::AccessesThreadLocal,
E->getLocation());
}
}
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 7c7e322df80964..00fcc1714e22cf 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -138,7 +138,7 @@ void nb11_no_inference_2() [[clang::nonblocking(false)]]; // expected-note {{fun
template <bool V>
struct ComputedNB {
- void method() [[clang::nonblocking(V)]]; // expected-note {{function does not permit inference of 'nonblocking'}}
+ void method() [[clang::nonblocking(V)]]; // expected-note {{function does not permit inference of 'nonblocking' because it is declared 'blocking'}}
};
void nb11() [[clang::nonblocking]]
>From 06ca4c53d6de8575abd3b8c9981feb7d2e1cea0e Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 7 Aug 2024 07:26:41 -0700
Subject: [PATCH 10/59] Add tests around lambda traversal and contexts like
decltype, sizeof, etc.
---
.../Sema/attr-nonblocking-constraints.cpp | 43 ++++++++++++++++++-
1 file changed, 42 insertions(+), 1 deletion(-)
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 00fcc1714e22cf..bad5309dbb543c 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -1,4 +1,4 @@
-// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
+// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -std=c++20 -verify %s
// These are in a separate file because errors (e.g. incompatible attributes) currently prevent
// the FXAnalysis pass from running at all.
@@ -81,6 +81,29 @@ void nb8()
};
}
+void nb8a() [[clang::nonblocking]]
+{
+ // A blocking lambda shouldn't make the outer function unsafe.
+ auto unsafeLambda = []() {
+ throw 42;
+ };
+}
+
+void nb8b() [[clang::nonblocking]]
+{
+ // An unsafe lambda capture makes the outer function unsafe.
+ auto unsafeCapture = [foo = new int]() { // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
+ delete foo;
+ };
+}
+
+void nb8c()
+{
+ // An unsafe lambda capture does not make the lambda unsafe.
+ auto unsafeCapture = [foo = new int]() [[clang::nonblocking]] {
+ };
+}
+
// Make sure template expansions are found and verified.
template <typename T>
struct Adder {
@@ -200,6 +223,24 @@ struct DerivedFromUnsafe : public Unsafe {
~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::~Unsafe'}}
};
+// Contexts where there is no function call, no diagnostic.
+bool bad();
+
+template <bool>
+requires requires { bad(); }
+void g() [[clang::nonblocking]] {}
+
+void g() [[clang::nonblocking]] {
+ decltype(bad()) a; // doesn't generate a call so, OK
+ [[maybe_unused]] auto b = noexcept(bad());
+ [[maybe_unused]] auto c = sizeof(bad());
+#pragma clang diagnostic push
+#pragma clang diagnostic ignored "-Wassume"
+ [[assume(bad())]]; // never evaluated, but maybe still semantically questionable?
+#pragma clang diagnostic pop
+}
+
+
// --- nonblocking implies noexcept ---
#pragma clang diagnostic warning "-Wperf-constraint-implies-noexcept"
>From 9e45e6f59d6f6fc501181bc535741c415c1b8ead Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 7 Aug 2024 08:06:30 -0700
Subject: [PATCH 11/59] Inline checks preceding maybeAddDeclWithEffects
---
clang/include/clang/Sema/Sema.h | 9 +++++++++
clang/lib/Sema/SemaDecl.cpp | 4 +---
clang/lib/Sema/SemaExpr.cpp | 4 +---
clang/lib/Sema/SemaLambda.cpp | 4 +---
4 files changed, 12 insertions(+), 9 deletions(-)
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index b166825bef4a5f..e27517f2ac541a 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -4337,6 +4337,15 @@ class Sema final : public SemaBase {
SourceLocation NewLoc,
SourceLocation OldLoc);
+ /// Inline checks from the start of maybeAddDeclWithEffects, to
+ /// minimize performance impact on code not using effects.
+ template <class FuncOrBlockDecl>
+ void maybeAddDeclWithEffects(FuncOrBlockDecl *D) {
+ if (Context.hasAnyFunctionEffects())
+ if (FunctionEffectsRef FX = D->getFunctionEffects(); !FX.empty())
+ maybeAddDeclWithEffects(D, FX);
+ }
+
/// Potentially add a FunctionDecl or BlockDecl to DeclsWithEffectsToVerify.
void maybeAddDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
diff --git a/clang/lib/Sema/SemaDecl.cpp b/clang/lib/Sema/SemaDecl.cpp
index b21617a5db39ec..4d81594673678d 100644
--- a/clang/lib/Sema/SemaDecl.cpp
+++ b/clang/lib/Sema/SemaDecl.cpp
@@ -15679,9 +15679,7 @@ Decl *Sema::ActOnStartOfFunctionDef(Scope *FnBodyScope, Decl *D,
getCurLexicalContext()->getDeclKind() != Decl::ObjCImplementation)
Diag(FD->getLocation(), diag::warn_function_def_in_objc_container);
- if (Context.hasAnyFunctionEffects())
- if (const auto FX = FD->getFunctionEffects(); !FX.empty())
- maybeAddDeclWithEffects(FD, FX);
+ maybeAddDeclWithEffects(FD);
return D;
}
diff --git a/clang/lib/Sema/SemaExpr.cpp b/clang/lib/Sema/SemaExpr.cpp
index 126e924666356d..2412e84588b763 100644
--- a/clang/lib/Sema/SemaExpr.cpp
+++ b/clang/lib/Sema/SemaExpr.cpp
@@ -16091,9 +16091,7 @@ ExprResult Sema::ActOnBlockStmtExpr(SourceLocation CaretLoc,
BlockScopeInfo *BSI = cast<BlockScopeInfo>(FunctionScopes.back());
BlockDecl *BD = BSI->TheDecl;
- if (Context.hasAnyFunctionEffects())
- if (const auto FX = BD->getFunctionEffects(); !FX.empty())
- maybeAddDeclWithEffects(BD, FX);
+ maybeAddDeclWithEffects(BD);
if (BSI->HasImplicitReturnType)
deduceClosureReturnType(*BSI);
diff --git a/clang/lib/Sema/SemaLambda.cpp b/clang/lib/Sema/SemaLambda.cpp
index e3bf582db30279..bb797df28d09ad 100644
--- a/clang/lib/Sema/SemaLambda.cpp
+++ b/clang/lib/Sema/SemaLambda.cpp
@@ -1948,9 +1948,7 @@ ExprResult Sema::ActOnLambdaExpr(SourceLocation StartLoc, Stmt *Body) {
LambdaScopeInfo LSI = *cast<LambdaScopeInfo>(FunctionScopes.back());
ActOnFinishFunctionBody(LSI.CallOperator, Body);
- if (Context.hasAnyFunctionEffects())
- if (const auto FX = LSI.CallOperator->getFunctionEffects(); !FX.empty())
- maybeAddDeclWithEffects(LSI.CallOperator, FX);
+ maybeAddDeclWithEffects(LSI.CallOperator);
return BuildLambdaExpr(StartLoc, Body->getEndLoc(), &LSI);
}
>From b99f7841ada916df8ed177006856ecfa38402067 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 7 Aug 2024 08:41:49 -0700
Subject: [PATCH 12/59] Remove dead code in EffectAnalysis.cpp. Add comment
about AST traversal and lambdas.
add tests involving ms-extensions
---
clang/lib/Sema/EffectAnalysis.cpp | 125 ++----------------
.../Sema/attr-nonblocking-constraints-ms.cpp | 26 ++++
2 files changed, 37 insertions(+), 114 deletions(-)
create mode 100644 clang/test/Sema/attr-nonblocking-constraints-ms.cpp
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index a8bbb73faf9fd8..d9ec4197b9d428 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -12,6 +12,7 @@
#include "clang/AST/Decl.h"
#include "clang/AST/RecursiveASTVisitor.h"
+#include "clang/AST/Stmt.h"
#include "clang/AST/Type.h"
#include "clang/Basic/SourceManager.h"
#include "clang/Sema/SemaInternal.h"
@@ -89,119 +90,6 @@ static bool isNoexcept(const FunctionDecl *FD) {
return false;
}
-#if 0
-/// A mutable set of FunctionEffect, for use in places where any conditions
-/// have been resolved or can be ignored.
-class EffectSet {
- // This implementation optimizes footprint, since we hold one of these for
- // every function visited, which, due to inference, can be many more functions
- // than have declared effects.
-
- template <typename T, typename SizeT, SizeT Capacity> struct FixedVector {
- SizeT Count = 0;
- T Items[Capacity] = {};
-
- using value_type = T;
-
- using iterator = T *;
- using const_iterator = const T *;
- iterator begin() { return &Items[0]; }
- iterator end() { return &Items[Count]; }
- const_iterator begin() const { return &Items[0]; }
- const_iterator end() const { return &Items[Count]; }
- const_iterator cbegin() const { return &Items[0]; }
- const_iterator cend() const { return &Items[Count]; }
-
- void insert(iterator I, const T &Value) {
- assert(Count < Capacity);
- iterator E = end();
- if (I != E)
- std::copy_backward(I, E, E + 1);
- *I = Value;
- ++Count;
- }
-
- void push_back(const T &Value) {
- assert(Count < Capacity);
- Items[Count++] = Value;
- }
- };
-
- // As long as FunctionEffect is only 1 byte, and there are only 2 verifiable
- // effects, this fixed-size vector with a capacity of 7 is more than
- // sufficient and is only 8 bytes.
- FixedVector<FunctionEffect, uint8_t, 7> Impl;
-
-public:
- EffectSet() = default;
- explicit EffectSet(FunctionEffectsRef FX) { insert(FX); }
-
- operator ArrayRef<FunctionEffect>() const {
- return ArrayRef(Impl.cbegin(), Impl.cend());
- }
-
- using iterator = const FunctionEffect *;
- iterator begin() const { return Impl.cbegin(); }
- iterator end() const { return Impl.cend(); }
-
- void insert(const FunctionEffect &Effect) {
- FunctionEffect *Iter = Impl.begin();
- FunctionEffect *End = Impl.end();
- // linear search; lower_bound is overkill for a tiny vector like this
- for (; Iter != End; ++Iter) {
- if (*Iter == Effect)
- return;
- if (Effect < *Iter)
- break;
- }
- Impl.insert(Iter, Effect);
- }
- void insert(const EffectSet &Set) {
- for (const FunctionEffect &Item : Set) {
- // push_back because set is already sorted
- Impl.push_back(Item);
- }
- }
- void insert(FunctionEffectsRef FX) {
- for (const FunctionEffectWithCondition &EC : FX) {
- assert(EC.Cond.getCondition() ==
- nullptr); // should be resolved by now, right?
- // push_back because set is already sorted
- Impl.push_back(EC.Effect);
- }
- }
- bool contains(const FunctionEffect::Kind EK) const {
- for (const FunctionEffect &E : Impl)
- if (E.kind() == EK)
- return true;
- return false;
- }
-
- void dump(llvm::raw_ostream &OS) const;
-
- static EffectSet difference(ArrayRef<FunctionEffect> LHS,
- ArrayRef<FunctionEffect> RHS) {
- EffectSet Result;
- std::set_difference(LHS.begin(), LHS.end(), RHS.begin(), RHS.end(),
- std::back_inserter(Result.Impl));
- return Result;
- }
-};
-
-LLVM_DUMP_METHOD void EffectSet::dump(llvm::raw_ostream &OS) const {
- OS << "Effects{";
- bool First = true;
- for (const FunctionEffect &Effect : *this) {
- if (!First)
- OS << ", ";
- else
- First = false;
- OS << Effect.name();
- }
- OS << "}";
-}
-#endif
-
// Transitory, more extended information about a callable, which can be a
// function, block, function pointer, etc.
struct CallableInfo {
@@ -1095,6 +983,12 @@ class Analyzer {
return true;
}
+ bool VisitSEHExceptStmt(SEHExceptStmt *Exc) {
+ diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
+ ViolationID::Catches, Exc->getExceptLoc());
+ return true;
+ }
+
bool VisitCallExpr(CallExpr *Call) {
LLVM_DEBUG(llvm::dbgs()
<< "VisitCallExpr : "
@@ -1199,7 +1093,10 @@ class Analyzer {
bool TraverseLambdaExpr(LambdaExpr *Lambda) {
// We override this so as the be able to skip traversal of the lambda's
- // body. We have to explicitly traverse the captures.
+ // body. We have to explicitly traverse the captures. Why not return
+ // false from shouldVisitLambdaBody()? Because we need to visit a lambda's
+ // body when we are verifying the lambda itself; we only want to skip it
+ // in the context of the outer function.
for (unsigned I = 0, N = Lambda->capture_size(); I < N; ++I)
TraverseLambdaCapture(Lambda, Lambda->capture_begin() + I,
Lambda->capture_init_begin()[I]);
diff --git a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
new file mode 100644
index 00000000000000..dbdc39a304ba1b
--- /dev/null
+++ b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
@@ -0,0 +1,26 @@
+// RUN: %clang_cc1 -triple=x86_64-pc-win32 -fsyntax-only -fblocks -fcxx-exceptions -fms-extensions -verify %s
+
+#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
+
+// These need '-fms-extensions' (and maybe '-fdeclspec')
+void f1() [[clang::nonblocking]] {
+ __try {} __except (1) {} // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+}
+
+struct S {
+ int get_x(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+ __declspec(property(get = get_x)) int x;
+
+ int get_nb() { return 42; }
+ __declspec(property(get = get_nb)) int nb;
+
+ int get_nb2() [[clang::nonblocking]];
+ __declspec(property(get = get_nb2)) int nb2;
+};
+
+void f2() [[clang::nonblocking]] {
+ S a;
+ a.x; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'S::get_x'}}
+ a.nb;
+ a.nb2;
+}
>From 1b9874f8731ab5227b9698200015a38d9df77f78 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 7 Aug 2024 09:10:40 -0700
Subject: [PATCH 13/59] patch what the bot's clang-format wishes clang-format
on my system would do
---
clang/lib/Sema/EffectAnalysis.cpp | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index d9ec4197b9d428..80dbb0f4adeb4f 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -628,7 +628,9 @@ class Analyzer {
llvm::dbgs()
<< " callee " << Callee.CDecl << " canonical "
<< CanonicalFunctionDecl(Callee.CDecl) << " redecls";
- for (Decl *D : Callee.CDecl->redecls()) llvm::dbgs() << " " << D;
+ for (Decl *D
+ : Callee.CDecl->redecls()) llvm::dbgs()
+ << " " << D;
llvm::dbgs() << "\n";);
>From 8390e691ed71f4a35e4f9bd2e9eeb83ea0f64c31 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 8 Aug 2024 06:23:29 -0700
Subject: [PATCH 14/59] "function cannot be inferred" -> "declaration cannot be
inferred"
---
clang/include/clang/Basic/DiagnosticSemaKinds.td | 2 +-
clang/test/Sema/attr-nonblocking-constraints-ms.cpp | 2 +-
clang/test/Sema/attr-nonblocking-constraints.cpp | 8 ++++----
3 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index f1ffe4689daeff..ccec94c353d953 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10975,7 +10975,7 @@ def warn_func_effect_calls_expr_without_effect : Warning<
def note_func_effect_calls_func_without_effect : Note<
"function cannot be inferred '%0' because it calls non-'%0' function '%1'">;
def note_func_effect_call_extern : Note<
- "function cannot be inferred '%0' because it has no definition in this translation unit">;
+ "declaration cannot be inferred '%0' because it has no definition in this translation unit">;
def note_func_effect_call_disallows_inference : Note<
"function does not permit inference of '%0' because it is declared '%1'">;
def note_func_effect_call_virtual : Note<
diff --git a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
index dbdc39a304ba1b..d2c25da462c404 100644
--- a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
@@ -8,7 +8,7 @@ void f1() [[clang::nonblocking]] {
}
struct S {
- int get_x(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+ int get_x(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
__declspec(property(get = get_x)) int x;
int get_nb() { return 42; }
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index bad5309dbb543c..869e56374fe2c3 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -28,7 +28,7 @@ void nb3() [[clang::nonblocking]]
}
void nb4_inline() {}
-void nb4_not_inline(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+void nb4_not_inline(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
void nb4() [[clang::nonblocking]]
{
@@ -47,7 +47,7 @@ void nb5() [[clang::nonblocking]]
hv.unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
}
-void nb6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+void nb6_unsafe(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
void nb6_transitively_unsafe()
{
nb6_unsafe(); // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function}}
@@ -211,8 +211,8 @@ void nb18(void (^block)() [[clang::nonblocking]]) [[clang::nonblocking]]
// Verify traversal of implicit code paths - constructors and destructors.
struct Unsafe {
- static void problem1(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
- static void problem2(); // expected-note {{function cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+ static void problem1(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+ static void problem2(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
Unsafe() { problem1(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem1'}}
~Unsafe() { problem2(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem2'}}
>From 7acda8c8891bdb19edd429863fcb8a1fc80ea2fc Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 8 Aug 2024 09:42:03 -0700
Subject: [PATCH 15/59] No need to override VisitCXXDefaultInitExpr. Minor
terseness improvements.
CallableInfo ctor doesn't need a Sema.
FunctionEffect::effectProhibitingInference can receive a FunctionEffectKindSet and eliminate the need for CallableInfo to cache a FunctionEffectsRef.
CallType -> CallableType; isDirectCall() -> isCalledDirectly().
---
clang/include/clang/AST/Type.h | 2 +-
clang/lib/AST/Type.cpp | 13 ++-
clang/lib/Sema/EffectAnalysis.cpp | 141 +++++++++++++++---------------
3 files changed, 76 insertions(+), 80 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index 5d730ce98c1b13..cff10ffdc3a469 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4766,7 +4766,7 @@ class FunctionEffect {
/// function.
std::optional<FunctionEffect>
effectProhibitingInference(const Decl &Callee,
- const FunctionEffectsRef &CalleeFX) const;
+ const FunctionEffectKindSet &CalleeFX) const;
// Return false for success. When true is returned for a direct call, then the
// FE_InferrableOnCallees flag may trigger inference rather than an immediate
diff --git a/clang/lib/AST/Type.cpp b/clang/lib/AST/Type.cpp
index cfc961647d04d5..4fd4032725f1a9 100644
--- a/clang/lib/AST/Type.cpp
+++ b/clang/lib/AST/Type.cpp
@@ -5138,18 +5138,17 @@ StringRef FunctionEffect::name() const {
}
std::optional<FunctionEffect> FunctionEffect::effectProhibitingInference(
- const Decl &Callee, const FunctionEffectsRef &CalleeFX) const {
+ const Decl &Callee, const FunctionEffectKindSet &CalleeFX) const {
switch (kind()) {
case Kind::NonAllocating:
case Kind::NonBlocking: {
- for (const FunctionEffectWithCondition &CalleeEC : CalleeFX) {
+ for (const FunctionEffect &Effect : CalleeFX) {
// nonblocking/nonallocating cannot call allocating.
- if (CalleeEC.Effect.kind() == Kind::Allocating)
- return CalleeEC.Effect;
+ if (Effect.kind() == Kind::Allocating)
+ return Effect;
// nonblocking cannot call blocking.
- if (kind() == Kind::NonBlocking &&
- CalleeEC.Effect.kind() == Kind::Blocking)
- return CalleeEC.Effect;
+ if (kind() == Kind::NonBlocking && Effect.kind() == Kind::Blocking)
+ return Effect;
}
return std::nullopt;
}
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index 80dbb0f4adeb4f..799500aa8caff7 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -64,7 +64,7 @@ struct Violation {
};
enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
-enum class CallType {
+enum class CallableType {
// unknown: probably function pointer
Unknown,
Function,
@@ -91,32 +91,39 @@ static bool isNoexcept(const FunctionDecl *FD) {
}
// Transitory, more extended information about a callable, which can be a
-// function, block, function pointer, etc.
+// function, block, or function pointer.
struct CallableInfo {
// CDecl holds the function's definition, if any.
- // FunctionDecl if CallType::Function or Virtual
- // BlockDecl if CallType::Block
+ // FunctionDecl if CallableType::Function or Virtual
+ // BlockDecl if CallableType::Block
const Decl *CDecl;
+
+ // Remember whether the callable is a function, block, virtual method,
+ // or (presumed) function pointer.
+ CallableType CType = CallableType::Unknown;
+
+ // Remember whether the callable is an operator new or delete function,
+ // so that calls to them are reported more meaningfully, as memory
+ // allocations.
SpecialFuncType FuncType = SpecialFuncType::None;
- FunctionEffectsRef DeclEffects;
+
+ // We inevitably want to know the callable's declared effects, so cache them.
FunctionEffectKindSet Effects;
- CallType CType = CallType::Unknown;
- CallableInfo(Sema &SemaRef, const Decl &CD,
- SpecialFuncType FT = SpecialFuncType::None)
+ CallableInfo(const Decl &CD, SpecialFuncType FT = SpecialFuncType::None)
: CDecl(&CD), FuncType(FT) {
-
+ FunctionEffectsRef DeclEffects;
if (auto *FD = dyn_cast<FunctionDecl>(CDecl)) {
// Use the function's definition, if any.
if (const FunctionDecl *Def = FD->getDefinition())
CDecl = FD = Def;
- CType = CallType::Function;
+ CType = CallableType::Function;
if (auto *Method = dyn_cast<CXXMethodDecl>(FD);
Method && Method->isVirtual())
- CType = CallType::Virtual;
+ CType = CallableType::Virtual;
DeclEffects = FD->getFunctionEffects();
} else if (auto *BD = dyn_cast<BlockDecl>(CDecl)) {
- CType = CallType::Block;
+ CType = CallableType::Block;
DeclEffects = BD->getFunctionEffects();
} else if (auto *VD = dyn_cast<ValueDecl>(CDecl)) {
// ValueDecl is function, enum, or variable, so just look at its type.
@@ -125,21 +132,21 @@ struct CallableInfo {
Effects = FunctionEffectKindSet(DeclEffects);
}
- bool isDirectCall() const {
- return CType == CallType::Function || CType == CallType::Block;
+ bool isCalledDirectly() const {
+ return CType == CallableType::Function || CType == CallableType::Block;
}
bool isVerifiable() const {
switch (CType) {
- case CallType::Unknown:
- case CallType::Virtual:
+ case CallableType::Unknown:
+ case CallableType::Virtual:
return false;
- case CallType::Block:
+ case CallableType::Block:
return true;
- case CallType::Function:
+ case CallableType::Function:
return functionIsVerifiable(dyn_cast<FunctionDecl>(CDecl));
}
- llvm_unreachable("undefined CallType");
+ llvm_unreachable("undefined CallableType");
}
/// Generate a name for logging and diagnostics.
@@ -250,7 +257,7 @@ class PendingFunctionAnalysis {
for (const FunctionEffect &effect : AllInferrableEffectsToVerify) {
std::optional<FunctionEffect> ProblemCalleeEffect =
- effect.effectProhibitingInference(*CInfo.CDecl, CInfo.DeclEffects);
+ effect.effectProhibitingInference(*CInfo.CDecl, CInfo.Effects);
if (!ProblemCalleeEffect)
InferrableFX.insert(effect);
else {
@@ -306,7 +313,7 @@ class PendingFunctionAnalysis {
if (!UnverifiedDirectCalls.empty()) {
OS << "; Calls: ";
for (const DirectCall &Call : UnverifiedDirectCalls) {
- CallableInfo CI(SemaRef, *Call.Callee);
+ CallableInfo CI(*Call.Callee);
OS << " " << CI.name(SemaRef);
}
}
@@ -405,7 +412,7 @@ class Analyzer {
void dump(Sema &SemaRef, llvm::raw_ostream &OS) {
OS << "\nAnalysisMap:\n";
for (const auto &item : *this) {
- CallableInfo CI(SemaRef, *item.first);
+ CallableInfo CI(*item.first);
const auto AP = item.second;
OS << item.first << " " << CI.name(SemaRef) << " : ";
if (AP.isNull())
@@ -499,7 +506,7 @@ class Analyzer {
// Verify a single Decl. Return the pending structure if that was the result,
// else null. This method must not recurse.
PendingFunctionAnalysis *verifyDecl(const Decl *D) {
- CallableInfo CInfo(Sem, *D);
+ CallableInfo CInfo(*D);
bool isExternC = false;
if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
@@ -576,7 +583,7 @@ class Analyzer {
// not. Repeats calls to FunctionBodyASTVisitor::followCall() but without
// the possibility of inference. Deletes Pending.
void finishPendingAnalysis(const Decl *D, PendingFunctionAnalysis *Pending) {
- CallableInfo Caller(Sem, *D);
+ CallableInfo Caller(*D);
LLVM_DEBUG(llvm::dbgs()
<< "finishPendingAnalysis for " << Caller.name(Sem) << " : ";
Pending->dump(Sem, llvm::dbgs()); llvm::dbgs() << "\n";);
@@ -585,7 +592,7 @@ class Analyzer {
if (Call.Recursed)
continue;
- CallableInfo Callee(Sem, *Call.Callee);
+ CallableInfo Callee(*Call.Callee);
followCall(Caller, *Pending, Callee, Call.CallLoc,
/*AssertNoFurtherInference=*/true);
}
@@ -598,21 +605,20 @@ class Analyzer {
void followCall(const CallableInfo &Caller, PendingFunctionAnalysis &PFA,
const CallableInfo &Callee, SourceLocation CallLoc,
bool AssertNoFurtherInference) {
- const bool DirectCall = Callee.isDirectCall();
+ const bool DirectCall = Callee.isCalledDirectly();
// Initially, the declared effects; inferred effects will be added.
FunctionEffectKindSet CalleeEffects = Callee.Effects;
bool IsInferencePossible = DirectCall;
- if (DirectCall) {
+ if (DirectCall)
if (CompleteFunctionAnalysis *CFA =
DeclAnalysis.completedAnalysisForDecl(Callee.CDecl)) {
// Combine declared effects with those which may have been inferred.
CalleeEffects.insert(CFA->VerifiedEffects);
IsInferencePossible = false; // we've already traversed it
}
- }
if (AssertNoFurtherInference) {
assert(!IsInferencePossible);
@@ -635,25 +641,23 @@ class Analyzer {
llvm::dbgs() << "\n";);
auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
- FunctionEffect::Flags Flags = Effect.flags();
- bool Diagnose =
- Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects);
- if (Diagnose) {
- // If inference is not allowed, or the target is indirect (virtual
- // method/function ptr?), generate a Violation now.
- if (!IsInferencePossible ||
- !(Flags & FunctionEffect::FE_InferrableOnCallees)) {
- if (Callee.FuncType == SpecialFuncType::None)
- PFA.checkAddViolation(Inferring,
- {Effect, ViolationID::CallsDeclWithoutEffect,
- CallLoc, Callee.CDecl});
- else
- PFA.checkAddViolation(
- Inferring, {Effect, ViolationID::AllocatesMemory, CallLoc});
- } else {
- // Inference is allowed and necessary; defer it.
- PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc);
- }
+ if (!Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects))
+ return;
+
+ // If inference is not allowed, or the target is indirect (virtual
+ // method/function ptr?), generate a Violation now.
+ if (!IsInferencePossible ||
+ !(Effect.flags() & FunctionEffect::FE_InferrableOnCallees)) {
+ if (Callee.FuncType == SpecialFuncType::None)
+ PFA.checkAddViolation(Inferring,
+ {Effect, ViolationID::CallsDeclWithoutEffect,
+ CallLoc, Callee.CDecl});
+ else
+ PFA.checkAddViolation(
+ Inferring, {Effect, ViolationID::AllocatesMemory, CallLoc});
+ } else {
+ // Inference is allowed and necessary; defer it.
+ PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc);
}
};
@@ -664,7 +668,8 @@ class Analyzer {
check1Effect(Effect, true);
}
- // Should only be called when determined to be complete.
+ // Should only be called when function's analysis is determined to be
+ // complete.
void emitDiagnostics(SmallVector<Violation, 0> &Viols,
const CallableInfo &CInfo, Sema &S) {
if (Viols.empty())
@@ -725,7 +730,7 @@ class Analyzer {
break;
case ViolationID::CallsDeclWithoutEffect: {
- CallableInfo CalleeInfo(S, *Viol1.Callee);
+ CallableInfo CalleeInfo(*Viol1.Callee);
std::string CalleeName = CalleeInfo.name(S);
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_func_without_effect)
@@ -743,10 +748,10 @@ class Analyzer {
// - non-inline
// - indirect (virtual or through function pointer)
// - effect has been explicitly disclaimed (e.g. "blocking")
- if (CalleeInfo.CType == CallType::Virtual)
+ if (CalleeInfo.CType == CallableType::Virtual)
S.Diag(Callee->getLocation(), diag::note_func_effect_call_virtual)
<< effectName;
- else if (CalleeInfo.CType == CallType::Unknown)
+ else if (CalleeInfo.CType == CallableType::Unknown)
S.Diag(Callee->getLocation(),
diag::note_func_effect_call_func_ptr)
<< effectName;
@@ -799,7 +804,7 @@ class Analyzer {
S.Diag(Viol2.Loc, diag::note_func_effect_calls_objc) << effectName;
break;
case ViolationID::CallsDeclWithoutEffect:
- MaybeNextCallee.emplace(S, *Viol2.Callee);
+ MaybeNextCallee.emplace(*Viol2.Callee);
S.Diag(Viol2.Loc, diag::note_func_effect_calls_func_without_effect)
<< effectName << MaybeNextCallee->name(S);
break;
@@ -853,15 +858,15 @@ class Analyzer {
// Handle a language construct forbidden by some effects. Only effects whose
// flags include the specified flag receive a violation. \p Flag describes
// the construct.
- void diagnoseLanguageConstruct(FunctionEffect::FlagBit Flag, ViolationID D,
- SourceLocation Loc,
+ void diagnoseLanguageConstruct(FunctionEffect::FlagBit Flag,
+ ViolationID VID, SourceLocation Loc,
const Decl *Callee = nullptr) {
// If there are any declared verifiable effects which forbid the construct
// represented by the flag, store just one violation..
for (const FunctionEffect &Effect :
CurrentFunction.DeclaredVerifiableEffects) {
if (Effect.flags() & Flag) {
- addViolation(/*inferring=*/false, Effect, D, Loc, Callee);
+ addViolation(/*inferring=*/false, Effect, VID, Loc, Callee);
break;
}
}
@@ -869,7 +874,7 @@ class Analyzer {
// violation, if we don't already have a violation for that effect.
for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
if (Effect.flags() & Flag)
- addViolation(/*inferring=*/true, Effect, D, Loc, Callee);
+ addViolation(/*inferring=*/true, Effect, VID, Loc, Callee);
}
void addViolation(bool Inferring, const FunctionEffect &Effect,
@@ -892,8 +897,7 @@ class Analyzer {
/*AssertNoFurtherInference=*/false);
}
- void checkIndirectCall(CallExpr *Call, Expr *CalleeExpr) {
- const QualType CalleeType = CalleeExpr->getType();
+ void checkIndirectCall(CallExpr *Call, QualType CalleeType) {
auto *FPT =
CalleeType->getAs<FunctionProtoType>(); // null if FunctionType
FunctionEffectKindSet CalleeFX;
@@ -942,7 +946,7 @@ class Analyzer {
if (Ty->isRecordType()) {
if (const CXXRecordDecl *Class = Ty->getAsCXXRecordDecl()) {
if (CXXDestructorDecl *Dtor = Class->getDestructor()) {
- CallableInfo CI(Outer.Sem, *Dtor);
+ CallableInfo CI(*Dtor);
followCall(CI, OuterDtor->getLocation());
}
}
@@ -999,7 +1003,7 @@ class Analyzer {
Expr *CalleeExpr = Call->getCallee();
if (const Decl *Callee = CalleeExpr->getReferencedDeclOfCallee()) {
- CallableInfo CI(Outer.Sem, *Callee);
+ CallableInfo CI(*Callee);
followCall(CI, Call->getBeginLoc());
return true;
}
@@ -1009,7 +1013,7 @@ class Analyzer {
return true;
// No Decl, just an Expr. Just check based on its type.
- checkIndirectCall(Call, CalleeExpr);
+ checkIndirectCall(Call, CalleeExpr->getType());
return true;
}
@@ -1033,7 +1037,7 @@ class Analyzer {
if (const auto *CxxRec =
dyn_cast<CXXRecordDecl>(ClsType->getDecl())) {
if (const CXXDestructorDecl *Dtor = CxxRec->getDestructor()) {
- CallableInfo CI(Outer.Sem, *Dtor);
+ CallableInfo CI(*Dtor);
followCall(CI, Var->getLocation());
}
}
@@ -1046,7 +1050,7 @@ class Analyzer {
// BUG? It seems incorrect that RecursiveASTVisitor does not
// visit the call to operator new.
if (FunctionDecl *FD = New->getOperatorNew()) {
- CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorNew);
+ CallableInfo CI(*FD, SpecialFuncType::OperatorNew);
followCall(CI, New->getBeginLoc());
}
@@ -1062,7 +1066,7 @@ class Analyzer {
// BUG? It seems incorrect that RecursiveASTVisitor does not
// visit the call to operator delete.
if (FunctionDecl *FD = Delete->getOperatorDelete()) {
- CallableInfo CI(Outer.Sem, *FD, SpecialFuncType::OperatorDelete);
+ CallableInfo CI(*FD, SpecialFuncType::OperatorDelete);
followCall(CI, Delete->getBeginLoc());
}
@@ -1080,19 +1084,12 @@ class Analyzer {
// BUG? It seems incorrect that RecursiveASTVisitor does not
// visit the call to the constructor.
const CXXConstructorDecl *Ctor = Construct->getConstructor();
- CallableInfo CI(Outer.Sem, *Ctor);
+ CallableInfo CI(*Ctor);
followCall(CI, Construct->getLocation());
return true;
}
- bool VisitCXXDefaultInitExpr(CXXDefaultInitExpr *DEI) {
- if (Expr *E = DEI->getExpr())
- TraverseStmt(E);
-
- return true;
- }
-
bool TraverseLambdaExpr(LambdaExpr *Lambda) {
// We override this so as the be able to skip traversal of the lambda's
// body. We have to explicitly traverse the captures. Why not return
>From bffacc582a8c139feddfed26cc0b43dac488bc5c Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Tue, 13 Aug 2024 13:32:45 -0700
Subject: [PATCH 16/59] Begin a list of unsafe builtin functions, starting with
malloc and friends.
---
clang/lib/Sema/EffectAnalysis.cpp | 48 +++++++++++++++----
.../Sema/attr-nonblocking-constraints.cpp | 7 +++
2 files changed, 47 insertions(+), 8 deletions(-)
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index 799500aa8caff7..b59d0786c57dc1 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -132,6 +132,8 @@ struct CallableInfo {
Effects = FunctionEffectKindSet(DeclEffects);
}
+ CallableType type() const { return CType; }
+
bool isCalledDirectly() const {
return CType == CallableType::Function || CType == CallableType::Block;
}
@@ -745,13 +747,15 @@ class Analyzer {
DeclAnalysis.completedAnalysisForDecl(CalleeInfo.CDecl);
if (Completed == nullptr) {
// No result - could be
- // - non-inline
+ // - non-inline and extern
// - indirect (virtual or through function pointer)
// - effect has been explicitly disclaimed (e.g. "blocking")
- if (CalleeInfo.CType == CallableType::Virtual)
+
+ CallableType CType = CalleeInfo.type();
+ if (CType == CallableType::Virtual)
S.Diag(Callee->getLocation(), diag::note_func_effect_call_virtual)
<< effectName;
- else if (CalleeInfo.CType == CallableType::Unknown)
+ else if (CType == CallableType::Unknown)
S.Diag(Callee->getLocation(),
diag::note_func_effect_call_func_ptr)
<< effectName;
@@ -760,10 +764,13 @@ class Analyzer {
diag::note_func_effect_call_disallows_inference)
<< effectName
<< FunctionEffect(Viol1.Effect.oppositeKind()).name();
- else
+ else if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(Callee);
+ FD == nullptr || FD->getBuiltinID() == 0) {
+ // A builtin callee generally doesn't have a useful source
+ // location at which to insert a note.
S.Diag(Callee->getLocation(), diag::note_func_effect_call_extern)
<< effectName;
-
+ }
break;
}
const Violation *PtrViol2 =
@@ -887,16 +894,41 @@ class Analyzer {
// Here we have a call to a Decl, either explicitly via a CallExpr or some
// other AST construct. CallableInfo pertains to the callee.
void followCall(const CallableInfo &CI, SourceLocation CallLoc) {
- // Currently, built-in functions are always considered safe.
- // FIXME: Some are not.
if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl);
- FD && FD->getBuiltinID() != 0)
+ FD && isSafeBuiltinFunction(FD))
return;
Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
/*AssertNoFurtherInference=*/false);
}
+ // FIXME: This is currently specific to the `nonblocking` and
+ // `nonallocating` effects. More ideally, the builtin functions themselves
+ // would have the `allocating` attribute.
+ static bool isSafeBuiltinFunction(const FunctionDecl *FD) {
+ unsigned BuiltinID = FD->getBuiltinID();
+ switch (BuiltinID) {
+ case 0: // not builtin
+ return false;
+ default: // not disallowed via cases below
+ return true;
+
+ // Disallow list
+ case Builtin::ID::BIaligned_alloc:
+ case Builtin::ID::BI__builtin_calloc:
+ case Builtin::ID::BI__builtin_malloc:
+ case Builtin::ID::BI__builtin_realloc:
+ case Builtin::ID::BI__builtin_free:
+ case Builtin::ID::BIcalloc:
+ case Builtin::ID::BImalloc:
+ case Builtin::ID::BImemalign:
+ case Builtin::ID::BIrealloc:
+ case Builtin::ID::BIfree:
+ return false;
+ }
+ llvm_unreachable("above switch is exhaustive");
+ }
+
void checkIndirectCall(CallExpr *Call, QualType CalleeType) {
auto *FPT =
CalleeType->getAs<FunctionProtoType>(); // null if FunctionType
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 869e56374fe2c3..540267d2efae4b 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -209,6 +209,13 @@ void nb18(void (^block)() [[clang::nonblocking]]) [[clang::nonblocking]]
ref();
}
+// Builtin functions
+void nb18a() [[clang::nonblocking]] {
+ __builtin_assume(1);
+ void *ptr = __builtin_malloc(1); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_malloc'}}
+ __builtin_free(ptr); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_free'}}
+}
+
// Verify traversal of implicit code paths - constructors and destructors.
struct Unsafe {
static void problem1(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
>From c718b5ab2de778ab4372615514f994ef43c85d34 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <doug at sonosphere.com>
Date: Wed, 14 Aug 2024 08:03:00 -0700
Subject: [PATCH 17/59] Apply suggestions from code review
Co-authored-by: Sirraide <aeternalmail at gmail.com>
---
clang/lib/Sema/EffectAnalysis.cpp | 61 ++++++++++++-------------------
1 file changed, 24 insertions(+), 37 deletions(-)
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index b59d0786c57dc1..ef5a8de628abcc 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -64,7 +64,7 @@ struct Violation {
};
enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
-enum class CallableType {
+enum class CallableType : uint8_t {
// unknown: probably function pointer
Unknown,
Function,
@@ -296,12 +296,12 @@ class PendingFunctionAnalysis {
return InferrableEffectToFirstViolation.lookup(effect);
}
- SmallVector<DirectCall, 0> &unverifiedCalls() {
+ ArrayRef<DirectCall> unverifiedCalls() {
assert(!isComplete());
return UnverifiedDirectCalls;
}
- SmallVector<Violation, 0> &getViolationsForExplicitFX() {
+ ArrayRef<Violation> getViolationsForExplicitFX() {
return ViolationsForExplicitFX;
}
@@ -386,7 +386,7 @@ class Analyzer {
// Map all Decls analyzed to FuncAnalysisPtr. Pending state is larger
// than complete state, so use different objects to represent them.
// The state pointers are owned by the container.
- class AnalysisMap : protected llvm::DenseMap<const Decl *, FuncAnalysisPtr> {
+ class AnalysisMap : llvm::DenseMap<const Decl *, FuncAnalysisPtr> {
using Base = llvm::DenseMap<const Decl *, FuncAnalysisPtr>;
public:
@@ -460,19 +460,11 @@ class Analyzer {
while (!VerificationQueue.empty()) {
const Decl *D = VerificationQueue.back();
if (FuncAnalysisPtr AP = DeclAnalysis.lookup(D)) {
- if (isa<CompleteFunctionAnalysis *>(AP)) {
- // already done
- VerificationQueue.pop_back();
- continue;
- }
- if (isa<PendingFunctionAnalysis *>(AP)) {
- // All children have been traversed; finish analysis.
- auto *Pending = AP.get<PendingFunctionAnalysis *>();
+ // All children have been traversed; finish analysis.
+ if (auto *Pending = AP.dyn_cast<PendingFunctionAnalysis *>())
finishPendingAnalysis(D, Pending);
- VerificationQueue.pop_back();
- continue;
- }
- llvm_unreachable("unexpected DeclAnalysis item");
+ VerificationQueue.pop_back();
+ continue;
}
// Not previously visited; begin a new analysis for this Decl.
@@ -492,14 +484,12 @@ class Analyzer {
VerificationQueue.push_back(Call.Callee);
continue;
}
- if (isa<PendingFunctionAnalysis *>(AP)) {
- // This indicates recursion (not necessarily direct). For the
- // purposes of effect analysis, we can just ignore it since
- // no effects forbid recursion.
- Call.Recursed = true;
- continue;
- }
- llvm_unreachable("unexpected DeclAnalysis item");
+
+ // This indicates recursion (not necessarily direct). For the
+ // purposes of effect analysis, we can just ignore it since
+ // no effects forbid recursion.
+ assert(isa<PendingFunctionAnalysis *>(AP));
+ Call.Recursed = true;
}
}
}
@@ -569,7 +559,7 @@ class Analyzer {
// inserted in the container.
void completeAnalysis(const CallableInfo &CInfo,
PendingFunctionAnalysis &Pending) {
- if (SmallVector<Violation, 0> &Viols = Pending.getViolationsForExplicitFX();
+ if (ArrayRef<Violation> Viols = Pending.getViolationsForExplicitFX();
!Viols.empty())
emitDiagnostics(Viols, CInfo, Sem);
@@ -642,7 +632,7 @@ class Analyzer {
llvm::dbgs() << "\n";);
- auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ auto Check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
if (!Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects))
return;
@@ -672,7 +662,7 @@ class Analyzer {
// Should only be called when function's analysis is determined to be
// complete.
- void emitDiagnostics(SmallVector<Violation, 0> &Viols,
+ void emitDiagnostics(ArrayRef<Violation> Viols,
const CallableInfo &CInfo, Sema &S) {
if (Viols.empty())
return;
@@ -682,7 +672,7 @@ class Analyzer {
return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
});
- auto checkAddTemplateNote = [&](const Decl *D) {
+ auto CheckAddTemplateNote = [&](const Decl *D) {
if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
while (FD != nullptr && FD->isTemplateInstantiation()) {
S.Diag(FD->getPointOfInstantiation(),
@@ -837,13 +827,13 @@ class Analyzer {
//
// Violations are always routed to a PendingFunctionAnalysis.
struct FunctionBodyASTVisitor
- : public RecursiveASTVisitor<FunctionBodyASTVisitor> {
+ : RecursiveASTVisitor<FunctionBodyASTVisitor> {
Analyzer &Outer;
PendingFunctionAnalysis &CurrentFunction;
CallableInfo &CurrentCaller;
- FunctionBodyASTVisitor(Analyzer &outer,
+ FunctionBodyASTVisitor(Analyzer &Outer,
PendingFunctionAnalysis &CurrentFunction,
CallableInfo &CurrentCaller)
: Outer(outer), CurrentFunction(CurrentFunction),
@@ -869,7 +859,7 @@ class Analyzer {
ViolationID VID, SourceLocation Loc,
const Decl *Callee = nullptr) {
// If there are any declared verifiable effects which forbid the construct
- // represented by the flag, store just one violation..
+ // represented by the flag, store just one violation.
for (const FunctionEffect &Effect :
CurrentFunction.DeclaredVerifiableEffects) {
if (Effect.flags() & Flag) {
@@ -926,7 +916,6 @@ class Analyzer {
case Builtin::ID::BIfree:
return false;
}
- llvm_unreachable("above switch is exhaustive");
}
void checkIndirectCall(CallExpr *Call, QualType CalleeType) {
@@ -936,7 +925,7 @@ class Analyzer {
if (FPT)
CalleeFX.insert(FPT->getFunctionEffects());
- auto check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ auto Check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
if (FPT == nullptr || Effect.shouldDiagnoseFunctionCall(
/*direct=*/false, CalleeFX))
addViolation(Inferring, Effect, ViolationID::CallsExprWithoutEffect,
@@ -1142,10 +1131,8 @@ class Analyzer {
bool VisitDeclRefExpr(const DeclRefExpr *E) {
const ValueDecl *Val = E->getDecl();
- if (isa<VarDecl>(Val)) {
- const VarDecl *Var = cast<VarDecl>(Val);
- VarDecl::TLSKind TLSK = Var->getTLSKind();
- if (TLSK != VarDecl::TLS_None) {
+ if (const auto *Var = dyn_cast<VarDecl>(Val)) {
+ if (Var->getTLSKind() != VarDecl::TLS_None) {
// At least on macOS, thread-local variables are initialized on
// first access, including a heap allocation.
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThreadLocalVars,
>From 8b225f43a7a7ac3fbdcdce7b0f078d4725310928 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 14 Aug 2024 08:05:04 -0700
Subject: [PATCH 18/59] - FunctionEffect and FunctionEffectKindSet are tiny,
pass by value wherever possible and obtain values from iterators. -
Diagnostics: "local" -> "local variable" - No change needed to
AnalysisBasedWarnings - Fixes following review suggestions.
---
clang/include/clang/AST/Type.h | 25 ++---
.../clang/Basic/DiagnosticSemaKinds.td | 4 +-
clang/lib/AST/Type.cpp | 8 +-
clang/lib/Sema/AnalysisBasedWarnings.cpp | 2 -
clang/lib/Sema/EffectAnalysis.cpp | 104 +++++++++---------
.../Sema/attr-nonblocking-constraints.cpp | 4 +-
6 files changed, 69 insertions(+), 78 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index cff10ffdc3a469..e7a0d79447dc4e 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4766,22 +4766,22 @@ class FunctionEffect {
/// function.
std::optional<FunctionEffect>
effectProhibitingInference(const Decl &Callee,
- const FunctionEffectKindSet &CalleeFX) const;
+ FunctionEffectKindSet CalleeFX) const;
// Return false for success. When true is returned for a direct call, then the
// FE_InferrableOnCallees flag may trigger inference rather than an immediate
// diagnostic. Caller should be assumed to have the effect (it may not have it
// explicitly when inferring).
bool shouldDiagnoseFunctionCall(bool Direct,
- const FunctionEffectKindSet &CalleeFX) const;
+ FunctionEffectKindSet CalleeFX) const;
- friend bool operator==(const FunctionEffect &LHS, const FunctionEffect &RHS) {
+ friend bool operator==(FunctionEffect LHS, FunctionEffect RHS) {
return LHS.FKind == RHS.FKind;
}
- friend bool operator!=(const FunctionEffect &LHS, const FunctionEffect &RHS) {
+ friend bool operator!=(FunctionEffect LHS, FunctionEffect RHS) {
return !(LHS == RHS);
}
- friend bool operator<(const FunctionEffect &LHS, const FunctionEffect &RHS) {
+ friend bool operator<(FunctionEffect LHS, FunctionEffect RHS) {
return LHS.FKind < RHS.FKind;
}
};
@@ -4810,8 +4810,7 @@ struct FunctionEffectWithCondition {
EffectConditionExpr Cond;
FunctionEffectWithCondition() = default;
- FunctionEffectWithCondition(const FunctionEffect &E,
- const EffectConditionExpr &C)
+ FunctionEffectWithCondition(FunctionEffect E, const EffectConditionExpr &C)
: Effect(E), Cond(C) {}
/// Return a textual description of the effect, and its condition, if any.
@@ -4972,22 +4971,20 @@ class FunctionEffectKindSet {
iterator begin() const { return iterator(*this, 0); }
iterator end() const { return iterator(*this, EndBitPos); }
- void insert(const FunctionEffect &Effect) {
- KindBits |= kindToBit(Effect.kind());
- }
+ void insert(FunctionEffect Effect) { KindBits |= kindToBit(Effect.kind()); }
void insert(FunctionEffectsRef FX) {
- for (const FunctionEffect &Item : FX.effects())
+ for (FunctionEffect Item : FX.effects())
insert(Item);
}
- void insert(const FunctionEffectKindSet &Set) { KindBits |= Set.KindBits; }
+ void insert(FunctionEffectKindSet Set) { KindBits |= Set.KindBits; }
bool contains(const FunctionEffect::Kind EK) const {
return (KindBits & kindToBit(EK)) != 0;
}
void dump(llvm::raw_ostream &OS) const;
- static FunctionEffectKindSet difference(const FunctionEffectKindSet &LHS,
- const FunctionEffectKindSet &RHS) {
+ static FunctionEffectKindSet difference(FunctionEffectKindSet LHS,
+ FunctionEffectKindSet RHS) {
return FunctionEffectKindSet(LHS.KindBits & ~RHS.KindBits);
}
};
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index ccec94c353d953..7e25afb98d95ff 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10952,10 +10952,10 @@ def warn_func_effect_throws_or_catches : Warning<
def note_func_effect_throws_or_catches : Note<
"function cannot be inferred '%0' because it throws or catches exceptions">;
def warn_func_effect_has_static_local : Warning<
- "'%0' function must not have static locals">,
+ "'%0' function must not have static local variables">,
InGroup<FunctionEffects>;
def note_func_effect_has_static_local : Note<
- "function cannot be inferred '%0' because it has a static local">;
+ "function cannot be inferred '%0' because it has a static local variable">;
def warn_func_effect_uses_thread_local : Warning<
"'%0' function must not use thread-local variables">,
InGroup<FunctionEffects>;
diff --git a/clang/lib/AST/Type.cpp b/clang/lib/AST/Type.cpp
index 4fd4032725f1a9..8d36aa15c59572 100644
--- a/clang/lib/AST/Type.cpp
+++ b/clang/lib/AST/Type.cpp
@@ -5138,11 +5138,11 @@ StringRef FunctionEffect::name() const {
}
std::optional<FunctionEffect> FunctionEffect::effectProhibitingInference(
- const Decl &Callee, const FunctionEffectKindSet &CalleeFX) const {
+ const Decl &Callee, FunctionEffectKindSet CalleeFX) const {
switch (kind()) {
case Kind::NonAllocating:
case Kind::NonBlocking: {
- for (const FunctionEffect &Effect : CalleeFX) {
+ for (FunctionEffect Effect : CalleeFX) {
// nonblocking/nonallocating cannot call allocating.
if (Effect.kind() == Kind::Allocating)
return Effect;
@@ -5166,12 +5166,12 @@ std::optional<FunctionEffect> FunctionEffect::effectProhibitingInference(
}
bool FunctionEffect::shouldDiagnoseFunctionCall(
- bool Direct, const FunctionEffectKindSet &CalleeFX) const {
+ bool Direct, FunctionEffectKindSet CalleeFX) const {
switch (kind()) {
case Kind::NonAllocating:
case Kind::NonBlocking: {
const Kind CallerKind = kind();
- for (const FunctionEffect &Effect : CalleeFX) {
+ for (FunctionEffect Effect : CalleeFX) {
const Kind EK = Effect.kind();
// Does callee have same or stronger constraint?
if (EK == CallerKind ||
diff --git a/clang/lib/Sema/AnalysisBasedWarnings.cpp b/clang/lib/Sema/AnalysisBasedWarnings.cpp
index 8268117a0addab..0f604c61fa3af9 100644
--- a/clang/lib/Sema/AnalysisBasedWarnings.cpp
+++ b/clang/lib/Sema/AnalysisBasedWarnings.cpp
@@ -2397,8 +2397,6 @@ class UnsafeBufferUsageReporter : public UnsafeBufferUsageHandler {
};
} // namespace
-// =============================================================================
-
//===----------------------------------------------------------------------===//
// AnalysisBasedWarnings - Worker object used by Sema to execute analysis-based
// warnings on a function, method, or block.
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index ef5a8de628abcc..a074aece910c33 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -54,7 +54,7 @@ struct Violation {
Violation() = default;
- Violation(const FunctionEffect &Effect, ViolationID ID, SourceLocation Loc,
+ Violation(FunctionEffect Effect, ViolationID ID, SourceLocation Loc,
const Decl *Callee = nullptr,
const FunctionEffect *CalleeEffect = nullptr)
: Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {
@@ -204,7 +204,7 @@ class EffectToViolationMap {
size_t size() const { return Impl ? Impl->size() : 0; }
private:
- ImplVec::iterator _find(const FunctionEffect &key) {
+ ImplVec::iterator _find(FunctionEffect key) {
// A linear search suffices for a tiny number of possible effects.
auto *End = Impl->end();
for (auto *Iter = Impl->begin(); Iter != End; ++Iter)
@@ -250,14 +250,13 @@ class PendingFunctionAnalysis {
SmallVector<DirectCall, 0> UnverifiedDirectCalls;
public:
- PendingFunctionAnalysis(
- Sema &Sem, const CallableInfo &CInfo,
- const FunctionEffectKindSet &AllInferrableEffectsToVerify)
+ PendingFunctionAnalysis(Sema &Sem, const CallableInfo &CInfo,
+ FunctionEffectKindSet AllInferrableEffectsToVerify)
: DeclaredVerifiableEffects(CInfo.Effects) {
// Check for effects we are not allowed to infer
FunctionEffectKindSet InferrableFX;
- for (const FunctionEffect &effect : AllInferrableEffectsToVerify) {
+ for (FunctionEffect effect : AllInferrableEffectsToVerify) {
std::optional<FunctionEffect> ProblemCalleeEffect =
effect.effectProhibitingInference(*CInfo.CDecl, CInfo.Effects);
if (!ProblemCalleeEffect)
@@ -296,12 +295,18 @@ class PendingFunctionAnalysis {
return InferrableEffectToFirstViolation.lookup(effect);
}
- ArrayRef<DirectCall> unverifiedCalls() {
+ // Mutable because caller may need to set a DirectCall's Recursing flag.
+ MutableArrayRef<DirectCall> unverifiedCalls() {
assert(!isComplete());
return UnverifiedDirectCalls;
}
- ArrayRef<Violation> getViolationsForExplicitFX() {
+ ArrayRef<Violation> getSortedViolationsForExplicitFX(SourceManager &SM) {
+ if (!ViolationsForExplicitFX.empty())
+ std::sort(ViolationsForExplicitFX.begin(), ViolationsForExplicitFX.end(),
+ [&SM](const Violation &LHS, const Violation &RHS) {
+ return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
+ });
return ViolationsForExplicitFX;
}
@@ -339,12 +344,11 @@ class CompleteFunctionAnalysis {
public:
// The incoming Pending analysis is consumed (member(s) are moved-from).
- CompleteFunctionAnalysis(
- ASTContext &Ctx, PendingFunctionAnalysis &Pending,
- const FunctionEffectKindSet &DeclaredEffects,
- const FunctionEffectKindSet &AllInferrableEffectsToVerify)
+ CompleteFunctionAnalysis(ASTContext &Ctx, PendingFunctionAnalysis &Pending,
+ FunctionEffectKindSet DeclaredEffects,
+ FunctionEffectKindSet AllInferrableEffectsToVerify)
: VerifiedEffects(DeclaredEffects) {
- for (const FunctionEffect &effect : AllInferrableEffectsToVerify)
+ for (FunctionEffect effect : AllInferrableEffectsToVerify)
if (Pending.violationForInferrableEffect(effect) == nullptr)
VerifiedEffects.insert(effect);
@@ -352,7 +356,7 @@ class CompleteFunctionAnalysis {
std::move(Pending.InferrableEffectToFirstViolation);
}
- const Violation *firstViolationForEffect(const FunctionEffect &Effect) {
+ const Violation *firstViolationForEffect(FunctionEffect Effect) {
return InferrableEffectToFirstViolation.lookup(Effect);
}
@@ -441,7 +445,7 @@ class Analyzer {
void run(const TranslationUnitDecl &TU) {
// Gather all of the effects to be verified to see what operations need to
// be checked, and to see which ones are inferrable.
- for (const FunctionEffect &Effect : Sem.AllEffectsToVerify) {
+ for (FunctionEffect Effect : Sem.AllEffectsToVerify) {
const FunctionEffect::Flags Flags = Effect.flags();
if (Flags & FunctionEffect::FE_InferrableOnCallees)
AllInferrableEffectsToVerify.insert(Effect);
@@ -487,7 +491,7 @@ class Analyzer {
// This indicates recursion (not necessarily direct). For the
// purposes of effect analysis, we can just ignore it since
- // no effects forbid recursion.
+ // no effects forbid recursion.
assert(isa<PendingFunctionAnalysis *>(AP));
Call.Recursed = true;
}
@@ -510,7 +514,7 @@ class Analyzer {
// effects forbid throwing (e.g. nonblocking) then the function should also
// be declared noexcept.
if (Sem.getLangOpts().CPlusPlus && !isExternC) {
- for (const FunctionEffect &Effect : CInfo.Effects) {
+ for (FunctionEffect Effect : CInfo.Effects) {
if (!(Effect.flags() & FunctionEffect::FE_ExcludeThrow))
continue;
@@ -559,7 +563,8 @@ class Analyzer {
// inserted in the container.
void completeAnalysis(const CallableInfo &CInfo,
PendingFunctionAnalysis &Pending) {
- if (ArrayRef<Violation> Viols = Pending.getViolationsForExplicitFX();
+ if (ArrayRef<Violation> Viols =
+ Pending.getSortedViolationsForExplicitFX(Sem.getSourceManager());
!Viols.empty())
emitDiagnostics(Viols, CInfo, Sem);
@@ -632,7 +637,7 @@ class Analyzer {
llvm::dbgs() << "\n";);
- auto Check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ auto Check1Effect = [&](FunctionEffect Effect, bool Inferring) {
if (!Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects))
return;
@@ -653,26 +658,21 @@ class Analyzer {
}
};
- for (const FunctionEffect &Effect : PFA.DeclaredVerifiableEffects)
- check1Effect(Effect, false);
+ for (FunctionEffect Effect : PFA.DeclaredVerifiableEffects)
+ Check1Effect(Effect, false);
- for (const FunctionEffect &Effect : PFA.FXToInfer)
- check1Effect(Effect, true);
+ for (FunctionEffect Effect : PFA.FXToInfer)
+ Check1Effect(Effect, true);
}
// Should only be called when function's analysis is determined to be
// complete.
- void emitDiagnostics(ArrayRef<Violation> Viols,
- const CallableInfo &CInfo, Sema &S) {
+ void emitDiagnostics(ArrayRef<Violation> Viols, const CallableInfo &CInfo,
+ Sema &S) {
if (Viols.empty())
return;
- const SourceManager &SM = S.getSourceManager();
- std::sort(Viols.begin(), Viols.end(),
- [&SM](const Violation &LHS, const Violation &RHS) {
- return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
- });
- auto CheckAddTemplateNote = [&](const Decl *D) {
+ auto MaybeAddTemplateNote = [&](const Decl *D) {
if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
while (FD != nullptr && FD->isTemplateInstantiation()) {
S.Diag(FD->getPointOfInstantiation(),
@@ -693,32 +693,32 @@ class Analyzer {
break;
case ViolationID::AllocatesMemory:
S.Diag(Viol1.Loc, diag::warn_func_effect_allocates) << effectName;
- checkAddTemplateNote(CInfo.CDecl);
+ MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::Throws:
case ViolationID::Catches:
S.Diag(Viol1.Loc, diag::warn_func_effect_throws_or_catches)
<< effectName;
- checkAddTemplateNote(CInfo.CDecl);
+ MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::HasStaticLocal:
S.Diag(Viol1.Loc, diag::warn_func_effect_has_static_local)
<< effectName;
- checkAddTemplateNote(CInfo.CDecl);
+ MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::AccessesThreadLocal:
S.Diag(Viol1.Loc, diag::warn_func_effect_uses_thread_local)
<< effectName;
- checkAddTemplateNote(CInfo.CDecl);
+ MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::CallsObjC:
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_objc) << effectName;
- checkAddTemplateNote(CInfo.CDecl);
+ MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::CallsExprWithoutEffect:
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_expr_without_effect)
<< effectName;
- checkAddTemplateNote(CInfo.CDecl);
+ MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::CallsDeclWithoutEffect: {
@@ -727,7 +727,7 @@ class Analyzer {
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_func_without_effect)
<< effectName << CalleeName;
- checkAddTemplateNote(CInfo.CDecl);
+ MaybeAddTemplateNote(CInfo.CDecl);
// Emit notes explaining the transitive chain of inferences: Why isn't
// the callee safe?
@@ -806,7 +806,7 @@ class Analyzer {
<< effectName << MaybeNextCallee->name(S);
break;
}
- checkAddTemplateNote(Callee);
+ MaybeAddTemplateNote(Callee);
Callee = Viol2.Callee;
if (MaybeNextCallee) {
CalleeInfo = *MaybeNextCallee;
@@ -826,8 +826,7 @@ class Analyzer {
// being checked for implicit conformance.
//
// Violations are always routed to a PendingFunctionAnalysis.
- struct FunctionBodyASTVisitor
- : RecursiveASTVisitor<FunctionBodyASTVisitor> {
+ struct FunctionBodyASTVisitor : RecursiveASTVisitor<FunctionBodyASTVisitor> {
Analyzer &Outer;
PendingFunctionAnalysis &CurrentFunction;
@@ -836,7 +835,7 @@ class Analyzer {
FunctionBodyASTVisitor(Analyzer &Outer,
PendingFunctionAnalysis &CurrentFunction,
CallableInfo &CurrentCaller)
- : Outer(outer), CurrentFunction(CurrentFunction),
+ : Outer(Outer), CurrentFunction(CurrentFunction),
CurrentCaller(CurrentCaller) {}
// -- Entry point --
@@ -860,8 +859,7 @@ class Analyzer {
const Decl *Callee = nullptr) {
// If there are any declared verifiable effects which forbid the construct
// represented by the flag, store just one violation.
- for (const FunctionEffect &Effect :
- CurrentFunction.DeclaredVerifiableEffects) {
+ for (FunctionEffect Effect : CurrentFunction.DeclaredVerifiableEffects) {
if (Effect.flags() & Flag) {
addViolation(/*inferring=*/false, Effect, VID, Loc, Callee);
break;
@@ -869,14 +867,13 @@ class Analyzer {
}
// For each inferred effect which forbids the construct, store a
// violation, if we don't already have a violation for that effect.
- for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
+ for (FunctionEffect Effect : CurrentFunction.FXToInfer)
if (Effect.flags() & Flag)
addViolation(/*inferring=*/true, Effect, VID, Loc, Callee);
}
- void addViolation(bool Inferring, const FunctionEffect &Effect,
- ViolationID D, SourceLocation Loc,
- const Decl *Callee = nullptr) {
+ void addViolation(bool Inferring, FunctionEffect Effect, ViolationID D,
+ SourceLocation Loc, const Decl *Callee = nullptr) {
CurrentFunction.checkAddViolation(Inferring,
Violation(Effect, D, Loc, Callee));
}
@@ -925,19 +922,18 @@ class Analyzer {
if (FPT)
CalleeFX.insert(FPT->getFunctionEffects());
- auto Check1Effect = [&](const FunctionEffect &Effect, bool Inferring) {
+ auto Check1Effect = [&](FunctionEffect Effect, bool Inferring) {
if (FPT == nullptr || Effect.shouldDiagnoseFunctionCall(
/*direct=*/false, CalleeFX))
addViolation(Inferring, Effect, ViolationID::CallsExprWithoutEffect,
Call->getBeginLoc());
};
- for (const FunctionEffect &Effect :
- CurrentFunction.DeclaredVerifiableEffects)
- check1Effect(Effect, false);
+ for (FunctionEffect Effect : CurrentFunction.DeclaredVerifiableEffects)
+ Check1Effect(Effect, false);
- for (const FunctionEffect &Effect : CurrentFunction.FXToInfer)
- check1Effect(Effect, true);
+ for (FunctionEffect Effect : CurrentFunction.FXToInfer)
+ Check1Effect(Effect, true);
}
// This destructor's body should be followed by the caller, but here we
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 540267d2efae4b..02247cb71975cf 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -15,7 +15,7 @@ void nb1() [[clang::nonblocking]]
void nb2() [[clang::nonblocking]]
{
- static int global; // expected-warning {{'nonblocking' function must not have static locals}}
+ static int global; // expected-warning {{'nonblocking' function must not have static local variables}}
}
void nb3() [[clang::nonblocking]]
@@ -178,7 +178,7 @@ void nb11() [[clang::nonblocking]]
// Verify that when attached to a redeclaration, the attribute successfully attaches.
void nb12() {
- static int x; // expected-warning {{'nonblocking' function must not have static locals}}
+ static int x; // expected-warning {{'nonblocking' function must not have static local variables}}
}
void nb12() [[clang::nonblocking]];
void nb13() [[clang::nonblocking]] { nb12(); }
>From 2cb4539d5cf5abf7091dd9d6f735b039f86d3a9c Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 14 Aug 2024 08:59:53 -0700
Subject: [PATCH 19/59] - Comments begin with capital letters and end with full
stops. - Simplify EffectToViolationMap. - FX -> Effects. - getCanonicalDecl()
is a method of Decl, no need to wrap it for functions. - Sem -> S. - Clean up
comments around RecursiveASTVisitor and implicit calls.
---
clang/lib/Sema/EffectAnalysis.cpp | 196 +++++++++++++-----------------
1 file changed, 85 insertions(+), 111 deletions(-)
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index a074aece910c33..dbc429f22c2367 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -17,14 +17,14 @@
#include "clang/Basic/SourceManager.h"
#include "clang/Sema/SemaInternal.h"
-#define DEBUG_TYPE "fxanalysis"
+#define DEBUG_TYPE "effectanalysis"
using namespace clang;
namespace {
enum class ViolationID : uint8_t {
- None = 0, // sentinel for an empty Violation
+ None = 0, // Sentinel for an empty Violation.
Throws,
Catches,
CallsObjC,
@@ -32,7 +32,7 @@ enum class ViolationID : uint8_t {
HasStaticLocal,
AccessesThreadLocal,
- // These only apply to callees, where the analysis stops at the Decl
+ // These only apply to callees, where the analysis stops at the Decl.
DeclDisallowsInference,
CallsDeclWithoutEffect,
@@ -47,10 +47,10 @@ enum class ViolationID : uint8_t {
// be inferred as holding that effect.
struct Violation {
FunctionEffect Effect;
- FunctionEffect CalleeEffectPreventingInference; // only for certain IDs
+ FunctionEffect CalleeEffectPreventingInference; // Only for certain IDs.
ViolationID ID = ViolationID::None;
SourceLocation Loc;
- const Decl *Callee = nullptr; // only valid for Calls*
+ const Decl *Callee = nullptr; // Only valid for Calls*.
Violation() = default;
@@ -65,7 +65,7 @@ struct Violation {
enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
enum class CallableType : uint8_t {
- // unknown: probably function pointer
+ // Unknown: probably function pointer
Unknown,
Function,
Virtual,
@@ -152,12 +152,12 @@ struct CallableInfo {
}
/// Generate a name for logging and diagnostics.
- std::string name(Sema &Sem) const {
+ std::string name(Sema &S) const {
std::string Name;
llvm::raw_string_ostream OS(Name);
if (auto *FD = dyn_cast<FunctionDecl>(CDecl))
- FD->getNameForDiagnostic(OS, Sem.getPrintingPolicy(),
+ FD->getNameForDiagnostic(OS, S.getPrintingPolicy(),
/*Qualified=*/true);
else if (auto *BD = dyn_cast<BlockDecl>(CDecl))
OS << "(block " << BD->getBlockManglingNumber() << ")";
@@ -172,7 +172,7 @@ struct CallableInfo {
// violations pertaining to an effect, per function.
class EffectToViolationMap {
// Since we currently only have a tiny number of effects (typically no more
- // than 1), use a sorted SmallVector with an inline capacity of 1. Since it
+ // than 1), use a SmallVector with an inline capacity of 1. Since it
// is often empty, use a unique_ptr to the SmallVector.
// Note that Violation itself contains a FunctionEffect which is the key.
using ImplVec = llvm::SmallVector<Violation, 1>;
@@ -183,35 +183,23 @@ class EffectToViolationMap {
void maybeInsert(const Violation &Viol) {
if (Impl == nullptr)
Impl = std::make_unique<ImplVec>();
- auto *Iter = _find(Viol.Effect);
- if (Iter != Impl->end() && Iter->Effect == Viol.Effect)
+ else if (lookup(Viol.Effect) != nullptr)
return;
- Impl->insert(Iter, Viol);
+ Impl->push_back(Viol);
}
const Violation *lookup(FunctionEffect Key) {
if (Impl == nullptr)
return nullptr;
- auto *Iter = _find(Key);
- if (Iter != Impl->end() && Iter->Effect == Key)
- return &*Iter;
-
- return nullptr;
+ auto *Iter =
+ std::find_if(Impl->begin(), Impl->end(),
+ [&](const auto &Item) { return Item.Effect == Key; });
+ return Iter != Impl->end() ? &*Iter : nullptr;
}
size_t size() const { return Impl ? Impl->size() : 0; }
-
-private:
- ImplVec::iterator _find(FunctionEffect key) {
- // A linear search suffices for a tiny number of possible effects.
- auto *End = Impl->end();
- for (auto *Iter = Impl->begin(); Iter != End; ++Iter)
- if (!(Iter->Effect < key))
- return Iter;
- return End;
- }
};
// ----------
@@ -236,11 +224,11 @@ class PendingFunctionAnalysis {
// 1. Effects declared explicitly by this function.
// 2. All other inferrable effects needing verification.
FunctionEffectKindSet DeclaredVerifiableEffects;
- FunctionEffectKindSet FXToInfer;
+ FunctionEffectKindSet EffectsToInfer;
private:
// Violations pertaining to the function's explicit effects.
- SmallVector<Violation, 0> ViolationsForExplicitFX;
+ SmallVector<Violation, 0> ViolationsForExplicitEffects;
// Violations pertaining to other, non-explicit, inferrable effects.
EffectToViolationMap InferrableEffectToFirstViolation;
@@ -250,17 +238,17 @@ class PendingFunctionAnalysis {
SmallVector<DirectCall, 0> UnverifiedDirectCalls;
public:
- PendingFunctionAnalysis(Sema &Sem, const CallableInfo &CInfo,
+ PendingFunctionAnalysis(Sema &S, const CallableInfo &CInfo,
FunctionEffectKindSet AllInferrableEffectsToVerify)
: DeclaredVerifiableEffects(CInfo.Effects) {
// Check for effects we are not allowed to infer
- FunctionEffectKindSet InferrableFX;
+ FunctionEffectKindSet InferrableEffects;
for (FunctionEffect effect : AllInferrableEffectsToVerify) {
std::optional<FunctionEffect> ProblemCalleeEffect =
effect.effectProhibitingInference(*CInfo.CDecl, CInfo.Effects);
if (!ProblemCalleeEffect)
- InferrableFX.insert(effect);
+ InferrableEffects.insert(effect);
else {
// Add a Violation for this effect if a caller were to
// try to infer it.
@@ -269,17 +257,17 @@ class PendingFunctionAnalysis {
CInfo.CDecl->getLocation(), nullptr, &*ProblemCalleeEffect));
}
}
- // InferrableFX is now the set of inferrable effects which are not
+ // InferrableEffects is now the set of inferrable effects which are not
// prohibited
- FXToInfer = FunctionEffectKindSet::difference(InferrableFX,
- DeclaredVerifiableEffects);
+ EffectsToInfer = FunctionEffectKindSet::difference(
+ InferrableEffects, DeclaredVerifiableEffects);
}
// Hide the way that Violations for explicitly required effects vs. inferred
// ones are handled differently.
void checkAddViolation(bool Inferring, const Violation &NewViol) {
if (!Inferring)
- ViolationsForExplicitFX.push_back(NewViol);
+ ViolationsForExplicitEffects.push_back(NewViol);
else
InferrableEffectToFirstViolation.maybeInsert(NewViol);
}
@@ -301,21 +289,22 @@ class PendingFunctionAnalysis {
return UnverifiedDirectCalls;
}
- ArrayRef<Violation> getSortedViolationsForExplicitFX(SourceManager &SM) {
- if (!ViolationsForExplicitFX.empty())
- std::sort(ViolationsForExplicitFX.begin(), ViolationsForExplicitFX.end(),
+ ArrayRef<Violation> getSortedViolationsForExplicitEffects(SourceManager &SM) {
+ if (!ViolationsForExplicitEffects.empty())
+ std::sort(ViolationsForExplicitEffects.begin(),
+ ViolationsForExplicitEffects.end(),
[&SM](const Violation &LHS, const Violation &RHS) {
return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
});
- return ViolationsForExplicitFX;
+ return ViolationsForExplicitEffects;
}
void dump(Sema &SemaRef, llvm::raw_ostream &OS) const {
OS << "Pending: Declared ";
DeclaredVerifiableEffects.dump(OS);
- OS << ", " << ViolationsForExplicitFX.size() << " violations; ";
+ OS << ", " << ViolationsForExplicitEffects.size() << " violations; ";
OS << " Infer ";
- FXToInfer.dump(OS);
+ EffectsToInfer.dump(OS);
OS << ", " << InferrableEffectToFirstViolation.size() << " violations";
if (!UnverifiedDirectCalls.empty()) {
OS << "; Calls: ";
@@ -368,18 +357,9 @@ class CompleteFunctionAnalysis {
}
};
-const Decl *CanonicalFunctionDecl(const Decl *D) {
- if (auto *FD = dyn_cast<FunctionDecl>(D)) {
- FD = FD->getCanonicalDecl();
- assert(FD != nullptr);
- return FD;
- }
- return D;
-}
-
// ==========
class Analyzer {
- Sema &Sem;
+ Sema &S;
// Subset of Sema.AllEffectsToVerify
FunctionEffectKindSet AllInferrableEffectsToVerify;
@@ -400,11 +380,11 @@ class Analyzer {
// that lookups and insertions are via the canonical Decls.
FuncAnalysisPtr lookup(const Decl *Key) const {
- return Base::lookup(CanonicalFunctionDecl(Key));
+ return Base::lookup(Key->getCanonicalDecl());
}
FuncAnalysisPtr &operator[](const Decl *Key) {
- return Base::operator[](CanonicalFunctionDecl(Key));
+ return Base::operator[](Key->getCanonicalDecl());
}
/// Shortcut for the case where we only care about completed analysis.
@@ -440,12 +420,12 @@ class Analyzer {
AnalysisMap DeclAnalysis;
public:
- Analyzer(Sema &S) : Sem(S) {}
+ Analyzer(Sema &S) : S(S) {}
void run(const TranslationUnitDecl &TU) {
// Gather all of the effects to be verified to see what operations need to
// be checked, and to see which ones are inferrable.
- for (FunctionEffect Effect : Sem.AllEffectsToVerify) {
+ for (FunctionEffect Effect : S.AllEffectsToVerify) {
const FunctionEffect::Flags Flags = Effect.flags();
if (Flags & FunctionEffect::FE_InferrableOnCallees)
AllInferrableEffectsToVerify.insert(Effect);
@@ -458,15 +438,16 @@ class Analyzer {
// depth-first traversal; there's no need for a second container. But first,
// reverse it, so when working from the end, Decls are verified in the order
// they are declared.
- SmallVector<const Decl *> &VerificationQueue = Sem.DeclsWithEffectsToVerify;
+ SmallVector<const Decl *> &VerificationQueue = S.DeclsWithEffectsToVerify;
std::reverse(VerificationQueue.begin(), VerificationQueue.end());
while (!VerificationQueue.empty()) {
const Decl *D = VerificationQueue.back();
if (FuncAnalysisPtr AP = DeclAnalysis.lookup(D)) {
- // All children have been traversed; finish analysis.
- if (auto *Pending = AP.dyn_cast<PendingFunctionAnalysis *>())
+ if (auto *Pending = AP.dyn_cast<PendingFunctionAnalysis *>()) {
+ // All children have been traversed; finish analysis.
finishPendingAnalysis(D, Pending);
+ }
VerificationQueue.pop_back();
continue;
}
@@ -474,7 +455,7 @@ class Analyzer {
// Not previously visited; begin a new analysis for this Decl.
PendingFunctionAnalysis *Pending = verifyDecl(D);
if (Pending == nullptr) {
- // completed now
+ // Completed now.
VerificationQueue.pop_back();
continue;
}
@@ -505,15 +486,13 @@ class Analyzer {
CallableInfo CInfo(*D);
bool isExternC = false;
- if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D)) {
- assert(FD->getBuiltinID() == 0);
+ if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(D))
isExternC = FD->getCanonicalDecl()->isExternCContext();
- }
// For C++, with non-extern "C" linkage only - if any of the Decl's declared
// effects forbid throwing (e.g. nonblocking) then the function should also
// be declared noexcept.
- if (Sem.getLangOpts().CPlusPlus && !isExternC) {
+ if (S.getLangOpts().CPlusPlus && !isExternC) {
for (FunctionEffect Effect : CInfo.Effects) {
if (!(Effect.flags() & FunctionEffect::FE_ExcludeThrow))
continue;
@@ -528,8 +507,7 @@ class Analyzer {
}
}
if (!IsNoexcept)
- Sem.Diag(D->getBeginLoc(),
- diag::warn_perf_constraint_implies_noexcept)
+ S.Diag(D->getBeginLoc(), diag::warn_perf_constraint_implies_noexcept)
<< Effect.name();
break;
}
@@ -538,10 +516,10 @@ class Analyzer {
// Build a PendingFunctionAnalysis on the stack. If it turns out to be
// complete, we'll have avoided a heap allocation; if it's incomplete, it's
// a fairly trivial move to a heap-allocated object.
- PendingFunctionAnalysis FAnalysis(Sem, CInfo, AllInferrableEffectsToVerify);
+ PendingFunctionAnalysis FAnalysis(S, CInfo, AllInferrableEffectsToVerify);
- LLVM_DEBUG(llvm::dbgs() << "\nVerifying " << CInfo.name(Sem) << " ";
- FAnalysis.dump(Sem, llvm::dbgs()););
+ LLVM_DEBUG(llvm::dbgs() << "\nVerifying " << CInfo.name(S) << " ";
+ FAnalysis.dump(S, llvm::dbgs()););
FunctionBodyASTVisitor Visitor(*this, FAnalysis, CInfo);
@@ -555,7 +533,7 @@ class Analyzer {
new PendingFunctionAnalysis(std::move(FAnalysis));
DeclAnalysis[D] = PendingPtr;
LLVM_DEBUG(llvm::dbgs() << "inserted pending " << PendingPtr << "\n";
- DeclAnalysis.dump(Sem, llvm::dbgs()););
+ DeclAnalysis.dump(S, llvm::dbgs()););
return PendingPtr;
}
@@ -564,16 +542,16 @@ class Analyzer {
void completeAnalysis(const CallableInfo &CInfo,
PendingFunctionAnalysis &Pending) {
if (ArrayRef<Violation> Viols =
- Pending.getSortedViolationsForExplicitFX(Sem.getSourceManager());
+ Pending.getSortedViolationsForExplicitEffects(S.getSourceManager());
!Viols.empty())
- emitDiagnostics(Viols, CInfo, Sem);
+ emitDiagnostics(Viols, CInfo, S);
- CompleteFunctionAnalysis *CompletePtr = new CompleteFunctionAnalysis(
- Sem.getASTContext(), Pending, CInfo.Effects,
- AllInferrableEffectsToVerify);
+ CompleteFunctionAnalysis *CompletePtr =
+ new CompleteFunctionAnalysis(S.getASTContext(), Pending, CInfo.Effects,
+ AllInferrableEffectsToVerify);
DeclAnalysis[CInfo.CDecl] = CompletePtr;
LLVM_DEBUG(llvm::dbgs() << "inserted complete " << CompletePtr << "\n";
- DeclAnalysis.dump(Sem, llvm::dbgs()););
+ DeclAnalysis.dump(S, llvm::dbgs()););
}
// Called after all direct calls requiring inference have been found -- or
@@ -582,8 +560,8 @@ class Analyzer {
void finishPendingAnalysis(const Decl *D, PendingFunctionAnalysis *Pending) {
CallableInfo Caller(*D);
LLVM_DEBUG(llvm::dbgs()
- << "finishPendingAnalysis for " << Caller.name(Sem) << " : ";
- Pending->dump(Sem, llvm::dbgs()); llvm::dbgs() << "\n";);
+ << "finishPendingAnalysis for " << Caller.name(S) << " : ";
+ Pending->dump(S, llvm::dbgs()); llvm::dbgs() << "\n";);
for (const PendingFunctionAnalysis::DirectCall &Call :
Pending->unverifiedCalls()) {
if (Call.Recursed)
@@ -614,7 +592,7 @@ class Analyzer {
DeclAnalysis.completedAnalysisForDecl(Callee.CDecl)) {
// Combine declared effects with those which may have been inferred.
CalleeEffects.insert(CFA->VerifiedEffects);
- IsInferencePossible = false; // we've already traversed it
+ IsInferencePossible = false; // We've already traversed it.
}
if (AssertNoFurtherInference) {
@@ -624,16 +602,13 @@ class Analyzer {
if (!Callee.isVerifiable())
IsInferencePossible = false;
- LLVM_DEBUG(llvm::dbgs() << "followCall from " << Caller.name(Sem) << " to "
- << Callee.name(Sem) << "; verifiable: "
+ LLVM_DEBUG(llvm::dbgs() << "followCall from " << Caller.name(S) << " to "
+ << Callee.name(S) << "; verifiable: "
<< Callee.isVerifiable() << "; callee ";
CalleeEffects.dump(llvm::dbgs()); llvm::dbgs() << "\n";
- llvm::dbgs()
- << " callee " << Callee.CDecl << " canonical "
- << CanonicalFunctionDecl(Callee.CDecl) << " redecls";
- for (Decl *D
- : Callee.CDecl->redecls()) llvm::dbgs()
- << " " << D;
+ llvm::dbgs() << " callee " << Callee.CDecl << " canonical "
+ << Callee.CDecl->getCanonicalDecl() << " redecls";
+ for (Decl *D : Callee.CDecl->redecls()) llvm::dbgs() << " " << D;
llvm::dbgs() << "\n";);
@@ -661,7 +636,7 @@ class Analyzer {
for (FunctionEffect Effect : PFA.DeclaredVerifiableEffects)
Check1Effect(Effect, false);
- for (FunctionEffect Effect : PFA.FXToInfer)
+ for (FunctionEffect Effect : PFA.EffectsToInfer)
Check1Effect(Effect, true);
}
@@ -687,8 +662,8 @@ class Analyzer {
StringRef effectName = Viol1.Effect.name();
switch (Viol1.ID) {
case ViolationID::None:
- case ViolationID::DeclDisallowsInference: // shouldn't happen
- // here
+ case ViolationID::DeclDisallowsInference: // Shouldn't happen
+ // here.
llvm_unreachable("Unexpected violation kind");
break;
case ViolationID::AllocatesMemory:
@@ -867,7 +842,7 @@ class Analyzer {
}
// For each inferred effect which forbids the construct, store a
// violation, if we don't already have a violation for that effect.
- for (FunctionEffect Effect : CurrentFunction.FXToInfer)
+ for (FunctionEffect Effect : CurrentFunction.EffectsToInfer)
if (Effect.flags() & Flag)
addViolation(/*inferring=*/true, Effect, VID, Loc, Callee);
}
@@ -895,9 +870,9 @@ class Analyzer {
static bool isSafeBuiltinFunction(const FunctionDecl *FD) {
unsigned BuiltinID = FD->getBuiltinID();
switch (BuiltinID) {
- case 0: // not builtin
+ case 0: // Not builtin.
return false;
- default: // not disallowed via cases below
+ default: // Not disallowed via cases below.
return true;
// Disallow list
@@ -917,14 +892,14 @@ class Analyzer {
void checkIndirectCall(CallExpr *Call, QualType CalleeType) {
auto *FPT =
- CalleeType->getAs<FunctionProtoType>(); // null if FunctionType
- FunctionEffectKindSet CalleeFX;
+ CalleeType->getAs<FunctionProtoType>(); // Null if FunctionType.
+ FunctionEffectKindSet CalleeEffects;
if (FPT)
- CalleeFX.insert(FPT->getFunctionEffects());
+ CalleeEffects.insert(FPT->getFunctionEffects());
auto Check1Effect = [&](FunctionEffect Effect, bool Inferring) {
if (FPT == nullptr || Effect.shouldDiagnoseFunctionCall(
- /*direct=*/false, CalleeFX))
+ /*direct=*/false, CalleeEffects))
addViolation(Inferring, Effect, ViolationID::CallsExprWithoutEffect,
Call->getBeginLoc());
};
@@ -932,7 +907,7 @@ class Analyzer {
for (FunctionEffect Effect : CurrentFunction.DeclaredVerifiableEffects)
Check1Effect(Effect, false);
- for (FunctionEffect Effect : CurrentFunction.FXToInfer)
+ for (FunctionEffect Effect : CurrentFunction.EffectsToInfer)
Check1Effect(Effect, true);
}
@@ -1015,7 +990,7 @@ class Analyzer {
bool VisitCallExpr(CallExpr *Call) {
LLVM_DEBUG(llvm::dbgs()
<< "VisitCallExpr : "
- << Call->getBeginLoc().printToString(Outer.Sem.SourceMgr)
+ << Call->getBeginLoc().printToString(Outer.S.SourceMgr)
<< "\n";);
Expr *CalleeExpr = Call->getCallee();
@@ -1025,9 +1000,10 @@ class Analyzer {
return true;
}
- if (isa<CXXPseudoDestructorExpr>(CalleeExpr))
- // just destroying a scalar, fine.
+ if (isa<CXXPseudoDestructorExpr>(CalleeExpr)) {
+ // Just destroying a scalar, fine.
return true;
+ }
// No Decl, just an Expr. Just check based on its type.
checkIndirectCall(Call, CalleeExpr->getType());
@@ -1038,7 +1014,7 @@ class Analyzer {
bool VisitVarDecl(VarDecl *Var) {
LLVM_DEBUG(llvm::dbgs()
<< "VisitVarDecl : "
- << Var->getBeginLoc().printToString(Outer.Sem.SourceMgr)
+ << Var->getBeginLoc().printToString(Outer.S.SourceMgr)
<< "\n";);
if (Var->isStaticLocal())
@@ -1047,7 +1023,7 @@ class Analyzer {
Var->getLocation());
const QualType::DestructionKind DK =
- Var->needsDestruction(Outer.Sem.getASTContext());
+ Var->needsDestruction(Outer.S.getASTContext());
if (DK == QualType::DK_cxx_destructor) {
QualType QT = Var->getType();
if (const auto *ClsType = QT.getTypePtr()->getAs<RecordType>()) {
@@ -1064,8 +1040,7 @@ class Analyzer {
}
bool VisitCXXNewExpr(CXXNewExpr *New) {
- // BUG? It seems incorrect that RecursiveASTVisitor does not
- // visit the call to operator new.
+ // RecursiveASTVisitor does not visit the implicit call to operator new.
if (FunctionDecl *FD = New->getOperatorNew()) {
CallableInfo CI(*FD, SpecialFuncType::OperatorNew);
followCall(CI, New->getBeginLoc());
@@ -1080,8 +1055,8 @@ class Analyzer {
}
bool VisitCXXDeleteExpr(CXXDeleteExpr *Delete) {
- // BUG? It seems incorrect that RecursiveASTVisitor does not
- // visit the call to operator delete.
+ // RecursiveASTVisitor does not visit the implicit call to operator
+ // delete.
if (FunctionDecl *FD = Delete->getOperatorDelete()) {
CallableInfo CI(*FD, SpecialFuncType::OperatorDelete);
followCall(CI, Delete->getBeginLoc());
@@ -1095,11 +1070,11 @@ class Analyzer {
bool VisitCXXConstructExpr(CXXConstructExpr *Construct) {
LLVM_DEBUG(llvm::dbgs() << "VisitCXXConstructExpr : "
<< Construct->getBeginLoc().printToString(
- Outer.Sem.SourceMgr)
+ Outer.S.SourceMgr)
<< "\n";);
- // BUG? It seems incorrect that RecursiveASTVisitor does not
- // visit the call to the constructor.
+ // RecursiveASTVisitor does not visit the implicit call to the
+ // constructor.
const CXXConstructorDecl *Ctor = Construct->getConstructor();
CallableInfo CI(*Ctor);
followCall(CI, Construct->getLocation());
@@ -1172,7 +1147,6 @@ namespace clang {
void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU) {
if (S.hasUncompilableErrorOccurred() || S.Diags.getIgnoreAllWarnings())
- // exit if having uncompilable errors or ignoring all warnings:
return;
if (TU == nullptr)
return;
>From 0e07315aa4b880762f469bed476f55a507a1b793 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 14 Aug 2024 09:55:10 -0700
Subject: [PATCH 20/59] Implement FunctionEffectKindSet with std::bitset.
---
clang/include/clang/AST/Type.h | 26 ++++++++++++++------------
1 file changed, 14 insertions(+), 12 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index e7a0d79447dc4e..5579db711b59e7 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -48,6 +48,7 @@
#include "llvm/Support/PointerLikeTypeTraits.h"
#include "llvm/Support/TrailingObjects.h"
#include "llvm/Support/type_traits.h"
+#include <bitset>
#include <cassert>
#include <cstddef>
#include <cstdint>
@@ -4922,43 +4923,44 @@ class FunctionEffectsRef {
/// A mutable set of FunctionEffect::Kind.
class FunctionEffectKindSet {
// For now this only needs to be a bitmap.
- using KindBitsT = uint8_t;
constexpr static size_t EndBitPos = 8;
+ using KindBitsT = std::bitset<EndBitPos>;
- KindBitsT KindBits = 0;
-
- static KindBitsT kindToBit(FunctionEffect::Kind K) {
- return 1u << KindBitsT(K);
- }
+ KindBitsT KindBits{};
explicit FunctionEffectKindSet(KindBitsT KB) : KindBits(KB) {}
+ constexpr static size_t kindToPos(FunctionEffect::Kind K) {
+ return size_t(K);
+ }
+
public:
FunctionEffectKindSet() = default;
explicit FunctionEffectKindSet(FunctionEffectsRef FX) { insert(FX); }
+ // Iterates through the bits which are set.
class iterator {
const FunctionEffectKindSet *Outer = nullptr;
size_t Idx = 0;
// If Idx does not reference a set bit, advance it until it does,
// or until it reaches EndBitPos.
- void advanceIdx() {
- while (Idx < EndBitPos && !(Outer->KindBits & (1u << Idx)))
+ void advanceToNextSetBit() {
+ while (Idx < EndBitPos && !Outer->KindBits.test(Idx))
++Idx;
}
public:
iterator();
iterator(const FunctionEffectKindSet &O, size_t I) : Outer(&O), Idx(I) {
- advanceIdx();
+ advanceToNextSetBit();
}
bool operator==(const iterator &Other) const { return Idx == Other.Idx; }
bool operator!=(const iterator &Other) const { return Idx != Other.Idx; }
iterator operator++() {
++Idx;
- advanceIdx();
+ advanceToNextSetBit();
return *this;
}
@@ -4971,7 +4973,7 @@ class FunctionEffectKindSet {
iterator begin() const { return iterator(*this, 0); }
iterator end() const { return iterator(*this, EndBitPos); }
- void insert(FunctionEffect Effect) { KindBits |= kindToBit(Effect.kind()); }
+ void insert(FunctionEffect Effect) { KindBits.set(kindToPos(Effect.kind())); }
void insert(FunctionEffectsRef FX) {
for (FunctionEffect Item : FX.effects())
insert(Item);
@@ -4979,7 +4981,7 @@ class FunctionEffectKindSet {
void insert(FunctionEffectKindSet Set) { KindBits |= Set.KindBits; }
bool contains(const FunctionEffect::Kind EK) const {
- return (KindBits & kindToBit(EK)) != 0;
+ return KindBits.test(kindToPos(EK));
}
void dump(llvm::raw_ostream &OS) const;
>From fddd9d2775e7ee5fa88c9a12888872cafc411ead Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 14 Aug 2024 14:26:02 -0700
Subject: [PATCH 21/59] - Diagnose __builtin_operator_new and delete - More
test cases involving function try-block and member initializers. - remove
construct which is blowing clang-format's mind
---
clang/lib/Sema/EffectAnalysis.cpp | 7 ++-
.../Sema/attr-nonblocking-constraints.cpp | 46 ++++++++++++++++++-
2 files changed, 47 insertions(+), 6 deletions(-)
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/EffectAnalysis.cpp
index dbc429f22c2367..c0f679d9ece206 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/EffectAnalysis.cpp
@@ -607,10 +607,7 @@ class Analyzer {
<< Callee.isVerifiable() << "; callee ";
CalleeEffects.dump(llvm::dbgs()); llvm::dbgs() << "\n";
llvm::dbgs() << " callee " << Callee.CDecl << " canonical "
- << Callee.CDecl->getCanonicalDecl() << " redecls";
- for (Decl *D : Callee.CDecl->redecls()) llvm::dbgs() << " " << D;
-
- llvm::dbgs() << "\n";);
+ << Callee.CDecl->getCanonicalDecl() << "\n";);
auto Check1Effect = [&](FunctionEffect Effect, bool Inferring) {
if (!Effect.shouldDiagnoseFunctionCall(DirectCall, CalleeEffects))
@@ -881,6 +878,8 @@ class Analyzer {
case Builtin::ID::BI__builtin_malloc:
case Builtin::ID::BI__builtin_realloc:
case Builtin::ID::BI__builtin_free:
+ case Builtin::ID::BI__builtin_operator_delete:
+ case Builtin::ID::BI__builtin_operator_new:
case Builtin::ID::BIcalloc:
case Builtin::ID::BImalloc:
case Builtin::ID::BImemalign:
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 02247cb71975cf..3515f7f4b7d6cc 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -210,12 +210,54 @@ void nb18(void (^block)() [[clang::nonblocking]]) [[clang::nonblocking]]
}
// Builtin functions
-void nb18a() [[clang::nonblocking]] {
+void nb19() [[clang::nonblocking]] {
__builtin_assume(1);
void *ptr = __builtin_malloc(1); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_malloc'}}
__builtin_free(ptr); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_free'}}
+
+ void *p2 = __builtin_operator_new(1); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_operator_new'}}
+ __builtin_operator_delete(p2); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_operator_delete'}}
+}
+
+// Function try-block
+void catches() try {} catch (...) {} // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+
+void nb20() [[clang::nonblocking]] {
+ catches(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'catches'}}
}
+struct S {
+ int x;
+ S(int x) try : x(x) {} catch (...) {} // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+ S(double) : x((throw 3, 3)) {} // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+};
+
+int badi(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+
+struct A {
+ int x = (throw 3, 3); // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+};
+
+struct B {
+ int y = badi(); // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'badi'}}
+};
+
+void f() [[clang::nonblocking]] {
+ S s1(3); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'S::S'}}
+ S s2(3.0); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'S::S'}}
+ A a; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'A::A'}}
+ B b; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'B::B'}}
+}
+
+#if 0
+// FIXME: can we do better with default member initializers?
+struct T {
+ int x = badi();
+ T() [[clang::nonblocking]] {} // Warning: this calls bad().
+ T(int x) [[clang::nonblocking]] : x(x) {} // This does not.
+};
+#endif
+
// Verify traversal of implicit code paths - constructors and destructors.
struct Unsafe {
static void problem1(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
@@ -251,6 +293,6 @@ void g() [[clang::nonblocking]] {
// --- nonblocking implies noexcept ---
#pragma clang diagnostic warning "-Wperf-constraint-implies-noexcept"
-void nb19() [[clang::nonblocking]] // expected-warning {{'nonblocking' function should be declared noexcept}}
+void needs_noexcept() [[clang::nonblocking]] // expected-warning {{'nonblocking' function should be declared noexcept}}
{
}
>From eb536aba9985c4087d3cd68bd75f4013a8530ff6 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 15 Aug 2024 11:01:13 -0700
Subject: [PATCH 22/59] EffectAnalysis.cpp => SemaFunctionEffects.cpp (minimal
first step; more reorg to follow)
---
clang/include/clang/Sema/Sema.h | 2 +-
clang/lib/Sema/CMakeLists.txt | 2 +-
clang/lib/Sema/{EffectAnalysis.cpp => SemaFunctionEffects.cpp} | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
rename clang/lib/Sema/{EffectAnalysis.cpp => SemaFunctionEffects.cpp} (99%)
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index c17cc9ce8bc443..f23d1aa9c95dfe 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -530,7 +530,7 @@ struct FunctionEffectDifferences : public SmallVector<FunctionEffectDiff> {
const FunctionEffectsRef &New);
};
-// Defined in EffectAnalysis.cpp. TODO: Maybe make this a method of Sema and
+// Defined in SemaFunctionEffects.cpp. TODO: Maybe make this a method of Sema and
// move more of the effects implementation into that file?
void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU);
diff --git a/clang/lib/Sema/CMakeLists.txt b/clang/lib/Sema/CMakeLists.txt
index ea827323395d74..719c3a9312ec15 100644
--- a/clang/lib/Sema/CMakeLists.txt
+++ b/clang/lib/Sema/CMakeLists.txt
@@ -19,7 +19,6 @@ add_clang_library(clangSema
CodeCompleteConsumer.cpp
DeclSpec.cpp
DelayedDiagnostic.cpp
- EffectAnalysis.cpp
HLSLExternalSemaSource.cpp
IdentifierResolver.cpp
JumpDiagnostics.cpp
@@ -56,6 +55,7 @@ add_clang_library(clangSema
SemaExprMember.cpp
SemaExprObjC.cpp
SemaFixItUtils.cpp
+ SemaFunctionEffects.cpp
SemaHLSL.cpp
SemaHexagon.cpp
SemaInit.cpp
diff --git a/clang/lib/Sema/EffectAnalysis.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
similarity index 99%
rename from clang/lib/Sema/EffectAnalysis.cpp
rename to clang/lib/Sema/SemaFunctionEffects.cpp
index c0f679d9ece206..2144cbf3a72bc6 100644
--- a/clang/lib/Sema/EffectAnalysis.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1,4 +1,4 @@
-//=== EffectAnalysis.cpp - Sema warnings for function effects -------------===//
+//=== SemaFunctionEffects.cpp - Sema warnings for function effects --------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
>From 15b399fd8b6a8bb9f59ac3367467bb84e20efd0c Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 15 Aug 2024 11:28:59 -0700
Subject: [PATCH 23/59] Move most Sema methods involving effects into
SemaFunctionEffects.cpp. Two remain elsewhere: -
diagnoseFunctionEffectConversion (still in Sema.cpp next to
diagnoseNullableToNonnullConversion) - ActOnEffectExpression (still in
SemaType.cpp near handleNonBlockingNonAllocatingTypeAttr)
---
clang/include/clang/Sema/Sema.h | 90 +++++++++++---------
clang/lib/Sema/Sema.cpp | 2 +-
clang/lib/Sema/SemaDecl.cpp | 99 ----------------------
clang/lib/Sema/SemaFunctionEffects.cpp | 109 +++++++++++++++++++++++--
4 files changed, 156 insertions(+), 144 deletions(-)
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index f23d1aa9c95dfe..c46b2f6e7e5fa5 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -530,10 +530,6 @@ struct FunctionEffectDifferences : public SmallVector<FunctionEffectDiff> {
const FunctionEffectsRef &New);
};
-// Defined in SemaFunctionEffects.cpp. TODO: Maybe make this a method of Sema and
-// move more of the effects implementation into that file?
-void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU);
-
/// Sema - This implements semantic analysis and AST building for C.
/// \nosubgrouping
class Sema final : public SemaBase {
@@ -877,13 +873,6 @@ class Sema final : public SemaBase {
/// Warn when implicitly casting 0 to nullptr.
void diagnoseZeroToNullptrConversion(CastKind Kind, const Expr *E);
- /// All functions/lambdas/blocks which have bodies and which have a non-empty
- /// FunctionEffectsRef to be verified.
- SmallVector<const Decl *> DeclsWithEffectsToVerify;
- /// The union of all effects present on DeclsWithEffectsToVerify. Conditions
- /// are all null.
- FunctionEffectKindSet AllEffectsToVerify;
-
/// Warn when implicitly changing function effects.
void diagnoseFunctionEffectConversion(QualType DstType, QualType SrcType,
SourceLocation Loc);
@@ -4324,34 +4313,6 @@ class Sema final : public SemaBase {
// Whether the callee should be ignored in CUDA/HIP/OpenMP host/device check.
bool shouldIgnoreInHostDeviceCheck(FunctionDecl *Callee);
- /// Warn and return true if adding a function effect to a set would create a
- /// conflict.
- bool diagnoseConflictingFunctionEffect(const FunctionEffectsRef &FX,
- const FunctionEffectWithCondition &EC,
- SourceLocation NewAttrLoc);
-
- // Report a failure to merge function effects between declarations due to a
- // conflict.
- void
- diagnoseFunctionEffectMergeConflicts(const FunctionEffectSet::Conflicts &Errs,
- SourceLocation NewLoc,
- SourceLocation OldLoc);
-
- /// Inline checks from the start of maybeAddDeclWithEffects, to
- /// minimize performance impact on code not using effects.
- template <class FuncOrBlockDecl>
- void maybeAddDeclWithEffects(FuncOrBlockDecl *D) {
- if (Context.hasAnyFunctionEffects())
- if (FunctionEffectsRef FX = D->getFunctionEffects(); !FX.empty())
- maybeAddDeclWithEffects(D, FX);
- }
-
- /// Potentially add a FunctionDecl or BlockDecl to DeclsWithEffectsToVerify.
- void maybeAddDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
-
- /// Unconditionally add a Decl to DeclsWithEfffectsToVerify.
- void addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
-
private:
/// Function or variable declarations to be checked for whether the deferred
/// diagnostics should be emitted.
@@ -15119,6 +15080,57 @@ class Sema final : public SemaBase {
bool OrNull);
///@}
+
+ //
+ //
+ // -------------------------------------------------------------------------
+ //
+ //
+
+ /// \name Function Effects
+ /// Implementations are in SemaFunctionEffects.cpp
+ ///@{
+public:
+ /// All functions/lambdas/blocks which have bodies and which have a non-empty
+ /// FunctionEffectsRef to be verified.
+ SmallVector<const Decl *> DeclsWithEffectsToVerify;
+
+ /// The union of all effects present on DeclsWithEffectsToVerify. Conditions
+ /// are all null.
+ FunctionEffectKindSet AllEffectsToVerify;
+
+public:
+ /// Warn and return true if adding a function effect to a set would create a
+ /// conflict.
+ bool diagnoseConflictingFunctionEffect(const FunctionEffectsRef &FX,
+ const FunctionEffectWithCondition &EC,
+ SourceLocation NewAttrLoc);
+
+ // Report a failure to merge function effects between declarations due to a
+ // conflict.
+ void
+ diagnoseFunctionEffectMergeConflicts(const FunctionEffectSet::Conflicts &Errs,
+ SourceLocation NewLoc,
+ SourceLocation OldLoc);
+
+ /// Inline checks from the start of maybeAddDeclWithEffects, to
+ /// minimize performance impact on code not using effects.
+ template <class FuncOrBlockDecl>
+ void maybeAddDeclWithEffects(FuncOrBlockDecl *D) {
+ if (Context.hasAnyFunctionEffects())
+ if (FunctionEffectsRef FX = D->getFunctionEffects(); !FX.empty())
+ maybeAddDeclWithEffects(D, FX);
+ }
+
+ /// Potentially add a FunctionDecl or BlockDecl to DeclsWithEffectsToVerify.
+ void maybeAddDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
+
+ /// Unconditionally add a Decl to DeclsWithEfffectsToVerify.
+ void addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX);
+
+ void performFunctionEffectAnalysis(TranslationUnitDecl *TU);
+
+ ///@}
};
DeductionFailureInfo
diff --git a/clang/lib/Sema/Sema.cpp b/clang/lib/Sema/Sema.cpp
index 7afc2b5b35d4ba..12f0a0e7bfd753 100644
--- a/clang/lib/Sema/Sema.cpp
+++ b/clang/lib/Sema/Sema.cpp
@@ -1529,7 +1529,7 @@ void Sema::ActOnEndOfTranslationUnit() {
AnalysisWarnings.IssueWarnings(Context.getTranslationUnitDecl());
if (Context.hasAnyFunctionEffects())
- performEffectAnalysis(*this, Context.getTranslationUnitDecl());
+ performFunctionEffectAnalysis(Context.getTranslationUnitDecl());
// Check we've noticed that we're no longer parsing the initializer for every
// variable. If we miss cases, then at best we have a performance issue and
diff --git a/clang/lib/Sema/SemaDecl.cpp b/clang/lib/Sema/SemaDecl.cpp
index 8b464ab29498fb..554b35527b2201 100644
--- a/clang/lib/Sema/SemaDecl.cpp
+++ b/clang/lib/Sema/SemaDecl.cpp
@@ -10919,49 +10919,6 @@ Attr *Sema::getImplicitCodeSegOrSectionAttrForFunction(const FunctionDecl *FD,
return nullptr;
}
-// Should only be called when getFunctionEffects() returns a non-empty set.
-// Decl should be a FunctionDecl or BlockDecl.
-void Sema::maybeAddDeclWithEffects(const Decl *D,
- const FunctionEffectsRef &FX) {
- if (!D->hasBody()) {
- if (const auto *FD = D->getAsFunction(); FD && !FD->willHaveBody())
- return;
- }
-
- if (Diags.getIgnoreAllWarnings() ||
- (Diags.getSuppressSystemWarnings() &&
- SourceMgr.isInSystemHeader(D->getLocation())))
- return;
-
- if (hasUncompilableErrorOccurred())
- return;
-
- // For code in dependent contexts, we'll do this at instantiation time.
- // Without this check, we would analyze the function based on placeholder
- // template parameters, and potentially generate spurious diagnostics.
- if (cast<DeclContext>(D)->isDependentContext())
- return;
-
- addDeclWithEffects(D, FX);
-}
-
-void Sema::addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX) {
- // To avoid the possibility of conflict, don't add effects which are
- // not FE_InferrableOnCallees and therefore not verified; this removes
- // blocking/allocating but keeps nonblocking/nonallocating.
- // Also, ignore any conditions when building the list of effects.
- bool AnyVerifiable = false;
- for (const FunctionEffectWithCondition &EC : FX)
- if (EC.Effect.flags() & FunctionEffect::FE_InferrableOnCallees) {
- AllEffectsToVerify.insert(EC.Effect);
- AnyVerifiable = true;
- }
-
- // Record the declaration for later analysis.
- if (AnyVerifiable)
- DeclsWithEffectsToVerify.push_back(D);
-}
-
bool Sema::canFullyTypeCheckRedeclaration(ValueDecl *NewD, ValueDecl *OldD,
QualType NewT, QualType OldT) {
if (!NewD->getLexicalDeclContext()->isDependentContext())
@@ -20331,59 +20288,3 @@ bool Sema::shouldIgnoreInHostDeviceCheck(FunctionDecl *Callee) {
return LangOpts.CUDA && !LangOpts.CUDAIsDevice &&
CUDA().IdentifyTarget(Callee) == CUDAFunctionTarget::Global;
}
-
-void Sema::diagnoseFunctionEffectMergeConflicts(
- const FunctionEffectSet::Conflicts &Errs, SourceLocation NewLoc,
- SourceLocation OldLoc) {
- for (const FunctionEffectSet::Conflict &Conflict : Errs) {
- Diag(NewLoc, diag::warn_conflicting_func_effects)
- << Conflict.Kept.description() << Conflict.Rejected.description();
- Diag(OldLoc, diag::note_previous_declaration);
- }
-}
-
-bool Sema::diagnoseConflictingFunctionEffect(
- const FunctionEffectsRef &FX, const FunctionEffectWithCondition &NewEC,
- SourceLocation NewAttrLoc) {
- // If the new effect has a condition, we can't detect conflicts until the
- // condition is resolved.
- if (NewEC.Cond.getCondition() != nullptr)
- return false;
-
- // Diagnose the new attribute as incompatible with a previous one.
- auto Incompatible = [&](const FunctionEffectWithCondition &PrevEC) {
- Diag(NewAttrLoc, diag::err_attributes_are_not_compatible)
- << ("'" + NewEC.description() + "'")
- << ("'" + PrevEC.description() + "'") << false;
- // We don't necessarily have the location of the previous attribute,
- // so no note.
- return true;
- };
-
- // Compare against previous attributes.
- FunctionEffect::Kind NewKind = NewEC.Effect.kind();
-
- for (const FunctionEffectWithCondition &PrevEC : FX) {
- // Again, can't check yet when the effect is conditional.
- if (PrevEC.Cond.getCondition() != nullptr)
- continue;
-
- FunctionEffect::Kind PrevKind = PrevEC.Effect.kind();
- // Note that we allow PrevKind == NewKind; it's redundant and ignored.
-
- if (PrevEC.Effect.oppositeKind() == NewKind)
- return Incompatible(PrevEC);
-
- // A new allocating is incompatible with a previous nonblocking.
- if (PrevKind == FunctionEffect::Kind::NonBlocking &&
- NewKind == FunctionEffect::Kind::Allocating)
- return Incompatible(PrevEC);
-
- // A new nonblocking is incompatible with a previous allocating.
- if (PrevKind == FunctionEffect::Kind::Allocating &&
- NewKind == FunctionEffect::Kind::NonBlocking)
- return Incompatible(PrevEC);
- }
-
- return false;
-}
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 2144cbf3a72bc6..7624a072d2fca8 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1,4 +1,4 @@
-//=== SemaFunctionEffects.cpp - Sema warnings for function effects --------===//
+//=== SemaFunctionEffects.cpp - Sema handling of function effects ---------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
@@ -6,7 +6,7 @@
//
//===----------------------------------------------------------------------===//
//
-// This file implements caller/callee analysis for function effects.
+// This file implements Sema handling of function effects.
//
//===----------------------------------------------------------------------===//
@@ -1144,12 +1144,111 @@ Analyzer::AnalysisMap::~AnalysisMap() {
namespace clang {
-void performEffectAnalysis(Sema &S, TranslationUnitDecl *TU) {
- if (S.hasUncompilableErrorOccurred() || S.Diags.getIgnoreAllWarnings())
+bool Sema::diagnoseConflictingFunctionEffect(
+ const FunctionEffectsRef &FX, const FunctionEffectWithCondition &NewEC,
+ SourceLocation NewAttrLoc) {
+ // If the new effect has a condition, we can't detect conflicts until the
+ // condition is resolved.
+ if (NewEC.Cond.getCondition() != nullptr)
+ return false;
+
+ // Diagnose the new attribute as incompatible with a previous one.
+ auto Incompatible = [&](const FunctionEffectWithCondition &PrevEC) {
+ Diag(NewAttrLoc, diag::err_attributes_are_not_compatible)
+ << ("'" + NewEC.description() + "'")
+ << ("'" + PrevEC.description() + "'") << false;
+ // We don't necessarily have the location of the previous attribute,
+ // so no note.
+ return true;
+ };
+
+ // Compare against previous attributes.
+ FunctionEffect::Kind NewKind = NewEC.Effect.kind();
+
+ for (const FunctionEffectWithCondition &PrevEC : FX) {
+ // Again, can't check yet when the effect is conditional.
+ if (PrevEC.Cond.getCondition() != nullptr)
+ continue;
+
+ FunctionEffect::Kind PrevKind = PrevEC.Effect.kind();
+ // Note that we allow PrevKind == NewKind; it's redundant and ignored.
+
+ if (PrevEC.Effect.oppositeKind() == NewKind)
+ return Incompatible(PrevEC);
+
+ // A new allocating is incompatible with a previous nonblocking.
+ if (PrevKind == FunctionEffect::Kind::NonBlocking &&
+ NewKind == FunctionEffect::Kind::Allocating)
+ return Incompatible(PrevEC);
+
+ // A new nonblocking is incompatible with a previous allocating.
+ if (PrevKind == FunctionEffect::Kind::Allocating &&
+ NewKind == FunctionEffect::Kind::NonBlocking)
+ return Incompatible(PrevEC);
+ }
+
+ return false;
+}
+
+void Sema::diagnoseFunctionEffectMergeConflicts(
+ const FunctionEffectSet::Conflicts &Errs, SourceLocation NewLoc,
+ SourceLocation OldLoc) {
+ for (const FunctionEffectSet::Conflict &Conflict : Errs) {
+ Diag(NewLoc, diag::warn_conflicting_func_effects)
+ << Conflict.Kept.description() << Conflict.Rejected.description();
+ Diag(OldLoc, diag::note_previous_declaration);
+ }
+}
+
+// Should only be called when getFunctionEffects() returns a non-empty set.
+// Decl should be a FunctionDecl or BlockDecl.
+void Sema::maybeAddDeclWithEffects(const Decl *D,
+ const FunctionEffectsRef &FX) {
+ if (!D->hasBody()) {
+ if (const auto *FD = D->getAsFunction(); FD && !FD->willHaveBody())
+ return;
+ }
+
+ if (Diags.getIgnoreAllWarnings() ||
+ (Diags.getSuppressSystemWarnings() &&
+ SourceMgr.isInSystemHeader(D->getLocation())))
+ return;
+
+ if (hasUncompilableErrorOccurred())
+ return;
+
+ // For code in dependent contexts, we'll do this at instantiation time.
+ // Without this check, we would analyze the function based on placeholder
+ // template parameters, and potentially generate spurious diagnostics.
+ if (cast<DeclContext>(D)->isDependentContext())
+ return;
+
+ addDeclWithEffects(D, FX);
+}
+
+void Sema::addDeclWithEffects(const Decl *D, const FunctionEffectsRef &FX) {
+ // To avoid the possibility of conflict, don't add effects which are
+ // not FE_InferrableOnCallees and therefore not verified; this removes
+ // blocking/allocating but keeps nonblocking/nonallocating.
+ // Also, ignore any conditions when building the list of effects.
+ bool AnyVerifiable = false;
+ for (const FunctionEffectWithCondition &EC : FX)
+ if (EC.Effect.flags() & FunctionEffect::FE_InferrableOnCallees) {
+ AllEffectsToVerify.insert(EC.Effect);
+ AnyVerifiable = true;
+ }
+
+ // Record the declaration for later analysis.
+ if (AnyVerifiable)
+ DeclsWithEffectsToVerify.push_back(D);
+}
+
+void Sema::performFunctionEffectAnalysis(TranslationUnitDecl *TU) {
+ if (hasUncompilableErrorOccurred() || Diags.getIgnoreAllWarnings())
return;
if (TU == nullptr)
return;
- Analyzer{S}.run(*TU);
+ Analyzer{*this}.run(*TU);
}
} // namespace clang
>From dfebc1aa962a524e8767d8ca77b73c7b3840a069 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 07:34:07 -0700
Subject: [PATCH 24/59] Move FunctionEffectDiff/Differences into
SemaFunctionEffects.cpp.
---
clang/include/clang/Sema/Sema.h | 99 ++++++++--------
clang/lib/Sema/Sema.cpp | 150 -------------------------
clang/lib/Sema/SemaFunctionEffects.cpp | 150 +++++++++++++++++++++++++
3 files changed, 200 insertions(+), 199 deletions(-)
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index c46b2f6e7e5fa5..43f4d72a8fbefc 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -481,55 +481,6 @@ enum class FunctionEffectMode : uint8_t {
Dependent // effect(expr) where expr is dependent.
};
-struct FunctionEffectDiff {
- enum class Kind { Added, Removed, ConditionMismatch };
-
- FunctionEffect::Kind EffectKind;
- Kind DiffKind;
- FunctionEffectWithCondition Old; // invalid when Added.
- FunctionEffectWithCondition New; // invalid when Removed.
-
- StringRef effectName() const {
- if (Old.Effect.kind() != FunctionEffect::Kind::None)
- return Old.Effect.name();
- return New.Effect.name();
- }
-
- /// Describes the result of effects differing between a base class's virtual
- /// method and an overriding method in a subclass.
- enum class OverrideResult {
- NoAction,
- Warn,
- Merge // Merge missing effect from base to derived.
- };
-
- /// Return true if adding or removing the effect as part of a type conversion
- /// should generate a diagnostic.
- bool shouldDiagnoseConversion(QualType SrcType,
- const FunctionEffectsRef &SrcFX,
- QualType DstType,
- const FunctionEffectsRef &DstFX) const;
-
- /// Return true if adding or removing the effect in a redeclaration should
- /// generate a diagnostic.
- bool shouldDiagnoseRedeclaration(const FunctionDecl &OldFunction,
- const FunctionEffectsRef &OldFX,
- const FunctionDecl &NewFunction,
- const FunctionEffectsRef &NewFX) const;
-
- /// Return true if adding or removing the effect in a C++ virtual method
- /// override should generate a diagnostic.
- OverrideResult shouldDiagnoseMethodOverride(
- const CXXMethodDecl &OldMethod, const FunctionEffectsRef &OldFX,
- const CXXMethodDecl &NewMethod, const FunctionEffectsRef &NewFX) const;
-};
-
-struct FunctionEffectDifferences : public SmallVector<FunctionEffectDiff> {
- /// Caller should short-circuit by checking for equality first.
- FunctionEffectDifferences(const FunctionEffectsRef &Old,
- const FunctionEffectsRef &New);
-};
-
/// Sema - This implements semantic analysis and AST building for C.
/// \nosubgrouping
class Sema final : public SemaBase {
@@ -568,6 +519,7 @@ class Sema final : public SemaBase {
// 30. Constraints and Concepts (SemaConcept.cpp)
// 31. Types (SemaType.cpp)
// 32. FixIt Helpers (SemaFixItUtils.cpp)
+ // 33. Function Effects (SemaFunctionEffects.cpp)
/// \name Semantic Analysis
/// Implementations are in Sema.cpp
@@ -15091,6 +15043,55 @@ class Sema final : public SemaBase {
/// Implementations are in SemaFunctionEffects.cpp
///@{
public:
+ struct FunctionEffectDiff {
+ enum class Kind { Added, Removed, ConditionMismatch };
+
+ FunctionEffect::Kind EffectKind;
+ Kind DiffKind;
+ FunctionEffectWithCondition Old; // invalid when Added.
+ FunctionEffectWithCondition New; // invalid when Removed.
+
+ StringRef effectName() const {
+ if (Old.Effect.kind() != FunctionEffect::Kind::None)
+ return Old.Effect.name();
+ return New.Effect.name();
+ }
+
+ /// Describes the result of effects differing between a base class's virtual
+ /// method and an overriding method in a subclass.
+ enum class OverrideResult {
+ NoAction,
+ Warn,
+ Merge // Merge missing effect from base to derived.
+ };
+
+ /// Return true if adding or removing the effect as part of a type
+ /// conversion should generate a diagnostic.
+ bool shouldDiagnoseConversion(QualType SrcType,
+ const FunctionEffectsRef &SrcFX,
+ QualType DstType,
+ const FunctionEffectsRef &DstFX) const;
+
+ /// Return true if adding or removing the effect in a redeclaration should
+ /// generate a diagnostic.
+ bool shouldDiagnoseRedeclaration(const FunctionDecl &OldFunction,
+ const FunctionEffectsRef &OldFX,
+ const FunctionDecl &NewFunction,
+ const FunctionEffectsRef &NewFX) const;
+
+ /// Return true if adding or removing the effect in a C++ virtual method
+ /// override should generate a diagnostic.
+ OverrideResult shouldDiagnoseMethodOverride(
+ const CXXMethodDecl &OldMethod, const FunctionEffectsRef &OldFX,
+ const CXXMethodDecl &NewMethod, const FunctionEffectsRef &NewFX) const;
+ };
+
+ struct FunctionEffectDifferences : public SmallVector<FunctionEffectDiff> {
+ /// Caller should short-circuit by checking for equality first.
+ FunctionEffectDifferences(const FunctionEffectsRef &Old,
+ const FunctionEffectsRef &New);
+ };
+
/// All functions/lambdas/blocks which have bodies and which have a non-empty
/// FunctionEffectsRef to be verified.
SmallVector<const Decl *> DeclsWithEffectsToVerify;
diff --git a/clang/lib/Sema/Sema.cpp b/clang/lib/Sema/Sema.cpp
index 12f0a0e7bfd753..5c7460d480db07 100644
--- a/clang/lib/Sema/Sema.cpp
+++ b/clang/lib/Sema/Sema.cpp
@@ -2783,153 +2783,3 @@ bool Sema::isDeclaratorFunctionLike(Declarator &D) {
});
return Result;
}
-
-FunctionEffectDifferences::FunctionEffectDifferences(
- const FunctionEffectsRef &Old, const FunctionEffectsRef &New) {
-
- FunctionEffectsRef::iterator POld = Old.begin();
- FunctionEffectsRef::iterator OldEnd = Old.end();
- FunctionEffectsRef::iterator PNew = New.begin();
- FunctionEffectsRef::iterator NewEnd = New.end();
-
- while (true) {
- int cmp = 0;
- if (POld == OldEnd) {
- if (PNew == NewEnd)
- break;
- cmp = 1;
- } else if (PNew == NewEnd)
- cmp = -1;
- else {
- FunctionEffectWithCondition Old = *POld;
- FunctionEffectWithCondition New = *PNew;
- if (Old.Effect.kind() < New.Effect.kind())
- cmp = -1;
- else if (New.Effect.kind() < Old.Effect.kind())
- cmp = 1;
- else {
- cmp = 0;
- if (Old.Cond.getCondition() != New.Cond.getCondition()) {
- // FIXME: Cases where the expressions are equivalent but
- // don't have the same identity.
- push_back(FunctionEffectDiff{
- Old.Effect.kind(), FunctionEffectDiff::Kind::ConditionMismatch,
- Old, New});
- }
- }
- }
-
- if (cmp < 0) {
- // removal
- FunctionEffectWithCondition Old = *POld;
- push_back(FunctionEffectDiff{
- Old.Effect.kind(), FunctionEffectDiff::Kind::Removed, Old, {}});
- ++POld;
- } else if (cmp > 0) {
- // addition
- FunctionEffectWithCondition New = *PNew;
- push_back(FunctionEffectDiff{
- New.Effect.kind(), FunctionEffectDiff::Kind::Added, {}, New});
- ++PNew;
- } else {
- ++POld;
- ++PNew;
- }
- }
-}
-
-bool FunctionEffectDiff::shouldDiagnoseConversion(
- QualType SrcType, const FunctionEffectsRef &SrcFX, QualType DstType,
- const FunctionEffectsRef &DstFX) const {
-
- switch (EffectKind) {
- case FunctionEffect::Kind::NonAllocating:
- // nonallocating can't be added (spoofed) during a conversion, unless we
- // have nonblocking.
- if (DiffKind == Kind::Added) {
- for (const auto &CFE : SrcFX) {
- if (CFE.Effect.kind() == FunctionEffect::Kind::NonBlocking)
- return false;
- }
- }
- [[fallthrough]];
- case FunctionEffect::Kind::NonBlocking:
- // nonblocking can't be added (spoofed) during a conversion.
- switch (DiffKind) {
- case Kind::Added:
- return true;
- case Kind::Removed:
- return false;
- case Kind::ConditionMismatch:
- // FIXME: Condition mismatches are too coarse right now -- expressions
- // which are equivalent but don't have the same identity are detected as
- // mismatches. We're going to diagnose those anyhow until expression
- // matching is better.
- return true;
- }
- case FunctionEffect::Kind::Blocking:
- case FunctionEffect::Kind::Allocating:
- return false;
- case FunctionEffect::Kind::None:
- break;
- }
- llvm_unreachable("unknown effect kind");
-}
-
-bool FunctionEffectDiff::shouldDiagnoseRedeclaration(
- const FunctionDecl &OldFunction, const FunctionEffectsRef &OldFX,
- const FunctionDecl &NewFunction, const FunctionEffectsRef &NewFX) const {
- switch (EffectKind) {
- case FunctionEffect::Kind::NonAllocating:
- case FunctionEffect::Kind::NonBlocking:
- // nonblocking/nonallocating can't be removed in a redeclaration.
- switch (DiffKind) {
- case Kind::Added:
- return false; // No diagnostic.
- case Kind::Removed:
- return true; // Issue diagnostic.
- case Kind::ConditionMismatch:
- // All these forms of mismatches are diagnosed.
- return true;
- }
- case FunctionEffect::Kind::Blocking:
- case FunctionEffect::Kind::Allocating:
- return false;
- case FunctionEffect::Kind::None:
- break;
- }
- llvm_unreachable("unknown effect kind");
-}
-
-FunctionEffectDiff::OverrideResult
-FunctionEffectDiff::shouldDiagnoseMethodOverride(
- const CXXMethodDecl &OldMethod, const FunctionEffectsRef &OldFX,
- const CXXMethodDecl &NewMethod, const FunctionEffectsRef &NewFX) const {
- switch (EffectKind) {
- case FunctionEffect::Kind::NonAllocating:
- case FunctionEffect::Kind::NonBlocking:
- switch (DiffKind) {
-
- // If added on an override, that's fine and not diagnosed.
- case Kind::Added:
- return OverrideResult::NoAction;
-
- // If missing from an override (removed), propagate from base to derived.
- case Kind::Removed:
- return OverrideResult::Merge;
-
- // If there's a mismatch involving the effect's polarity or condition,
- // issue a warning.
- case Kind::ConditionMismatch:
- return OverrideResult::Warn;
- }
-
- case FunctionEffect::Kind::Blocking:
- case FunctionEffect::Kind::Allocating:
- return OverrideResult::NoAction;
-
- case FunctionEffect::Kind::None:
- break;
- }
- llvm_unreachable("unknown effect kind");
-}
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 7624a072d2fca8..526c0bb8d114e6 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1251,4 +1251,154 @@ void Sema::performFunctionEffectAnalysis(TranslationUnitDecl *TU) {
Analyzer{*this}.run(*TU);
}
+Sema::FunctionEffectDifferences::FunctionEffectDifferences(
+ const FunctionEffectsRef &Old, const FunctionEffectsRef &New) {
+
+ FunctionEffectsRef::iterator POld = Old.begin();
+ FunctionEffectsRef::iterator OldEnd = Old.end();
+ FunctionEffectsRef::iterator PNew = New.begin();
+ FunctionEffectsRef::iterator NewEnd = New.end();
+
+ while (true) {
+ int cmp = 0;
+ if (POld == OldEnd) {
+ if (PNew == NewEnd)
+ break;
+ cmp = 1;
+ } else if (PNew == NewEnd)
+ cmp = -1;
+ else {
+ FunctionEffectWithCondition Old = *POld;
+ FunctionEffectWithCondition New = *PNew;
+ if (Old.Effect.kind() < New.Effect.kind())
+ cmp = -1;
+ else if (New.Effect.kind() < Old.Effect.kind())
+ cmp = 1;
+ else {
+ cmp = 0;
+ if (Old.Cond.getCondition() != New.Cond.getCondition()) {
+ // FIXME: Cases where the expressions are equivalent but
+ // don't have the same identity.
+ push_back(FunctionEffectDiff{
+ Old.Effect.kind(), FunctionEffectDiff::Kind::ConditionMismatch,
+ Old, New});
+ }
+ }
+ }
+
+ if (cmp < 0) {
+ // removal
+ FunctionEffectWithCondition Old = *POld;
+ push_back(FunctionEffectDiff{
+ Old.Effect.kind(), FunctionEffectDiff::Kind::Removed, Old, {}});
+ ++POld;
+ } else if (cmp > 0) {
+ // addition
+ FunctionEffectWithCondition New = *PNew;
+ push_back(FunctionEffectDiff{
+ New.Effect.kind(), FunctionEffectDiff::Kind::Added, {}, New});
+ ++PNew;
+ } else {
+ ++POld;
+ ++PNew;
+ }
+ }
+}
+
+bool Sema::FunctionEffectDiff::shouldDiagnoseConversion(
+ QualType SrcType, const FunctionEffectsRef &SrcFX, QualType DstType,
+ const FunctionEffectsRef &DstFX) const {
+
+ switch (EffectKind) {
+ case FunctionEffect::Kind::NonAllocating:
+ // nonallocating can't be added (spoofed) during a conversion, unless we
+ // have nonblocking.
+ if (DiffKind == Kind::Added) {
+ for (const auto &CFE : SrcFX) {
+ if (CFE.Effect.kind() == FunctionEffect::Kind::NonBlocking)
+ return false;
+ }
+ }
+ [[fallthrough]];
+ case FunctionEffect::Kind::NonBlocking:
+ // nonblocking can't be added (spoofed) during a conversion.
+ switch (DiffKind) {
+ case Kind::Added:
+ return true;
+ case Kind::Removed:
+ return false;
+ case Kind::ConditionMismatch:
+ // FIXME: Condition mismatches are too coarse right now -- expressions
+ // which are equivalent but don't have the same identity are detected as
+ // mismatches. We're going to diagnose those anyhow until expression
+ // matching is better.
+ return true;
+ }
+ case FunctionEffect::Kind::Blocking:
+ case FunctionEffect::Kind::Allocating:
+ return false;
+ case FunctionEffect::Kind::None:
+ break;
+ }
+ llvm_unreachable("unknown effect kind");
+}
+
+bool Sema::FunctionEffectDiff::shouldDiagnoseRedeclaration(
+ const FunctionDecl &OldFunction, const FunctionEffectsRef &OldFX,
+ const FunctionDecl &NewFunction, const FunctionEffectsRef &NewFX) const {
+ switch (EffectKind) {
+ case FunctionEffect::Kind::NonAllocating:
+ case FunctionEffect::Kind::NonBlocking:
+ // nonblocking/nonallocating can't be removed in a redeclaration.
+ switch (DiffKind) {
+ case Kind::Added:
+ return false; // No diagnostic.
+ case Kind::Removed:
+ return true; // Issue diagnostic.
+ case Kind::ConditionMismatch:
+ // All these forms of mismatches are diagnosed.
+ return true;
+ }
+ case FunctionEffect::Kind::Blocking:
+ case FunctionEffect::Kind::Allocating:
+ return false;
+ case FunctionEffect::Kind::None:
+ break;
+ }
+ llvm_unreachable("unknown effect kind");
+}
+
+Sema::FunctionEffectDiff::OverrideResult
+Sema::FunctionEffectDiff::shouldDiagnoseMethodOverride(
+ const CXXMethodDecl &OldMethod, const FunctionEffectsRef &OldFX,
+ const CXXMethodDecl &NewMethod, const FunctionEffectsRef &NewFX) const {
+ switch (EffectKind) {
+ case FunctionEffect::Kind::NonAllocating:
+ case FunctionEffect::Kind::NonBlocking:
+ switch (DiffKind) {
+
+ // If added on an override, that's fine and not diagnosed.
+ case Kind::Added:
+ return OverrideResult::NoAction;
+
+ // If missing from an override (removed), propagate from base to derived.
+ case Kind::Removed:
+ return OverrideResult::Merge;
+
+ // If there's a mismatch involving the effect's polarity or condition,
+ // issue a warning.
+ case Kind::ConditionMismatch:
+ return OverrideResult::Warn;
+ }
+
+ case FunctionEffect::Kind::Blocking:
+ case FunctionEffect::Kind::Allocating:
+ return OverrideResult::NoAction;
+
+ case FunctionEffect::Kind::None:
+ break;
+ }
+ llvm_unreachable("unknown effect kind");
+}
+
} // namespace clang
>From 82cb07d0dbd6a0a6bc21bd6d6406c05e05507d09 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 08:09:45 -0700
Subject: [PATCH 25/59] Combine the diagnostics for 5 violations into one using
%select{}
---
.../clang/Basic/DiagnosticSemaKinds.td | 35 ++------
clang/lib/Sema/SemaFunctionEffects.cpp | 89 ++++++++-----------
.../Sema/attr-nonblocking-constraints.cpp | 2 +-
3 files changed, 47 insertions(+), 79 deletions(-)
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index be8aa4edb02c1b..b231207690f6c8 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10945,39 +10945,22 @@ def warn_imp_cast_drops_unaligned : Warning<
InGroup<DiagGroup<"unaligned-qualifier-implicit-cast">>;
// Function effects
-def warn_func_effect_allocates : Warning<
- "'%0' function must not allocate or deallocate memory">,
+def warn_func_effect_violation : Warning<
+ "'%0' function must not %select{allocate or deallocate memory|throw or catch exceptions|"
+ "have static local variables|use thread-local variables|access ObjC methods or properties}1">,
InGroup<FunctionEffects>;
-def note_func_effect_allocates : Note<
- "function cannot be inferred '%0' because it allocates/deallocates memory">;
-def warn_func_effect_throws_or_catches : Warning<
- "'%0' function must not throw or catch exceptions">,
- InGroup<FunctionEffects>;
-def note_func_effect_throws_or_catches : Note<
- "function cannot be inferred '%0' because it throws or catches exceptions">;
-def warn_func_effect_has_static_local : Warning<
- "'%0' function must not have static local variables">,
- InGroup<FunctionEffects>;
-def note_func_effect_has_static_local : Note<
- "function cannot be inferred '%0' because it has a static local variable">;
-def warn_func_effect_uses_thread_local : Warning<
- "'%0' function must not use thread-local variables">,
- InGroup<FunctionEffects>;
-def note_func_effect_uses_thread_local : Note<
- "function cannot be inferred '%0' because it uses a thread-local variable">;
-def warn_func_effect_calls_objc : Warning<
- "'%0' function must not access an ObjC method or property">,
- InGroup<FunctionEffects>;
-def note_func_effect_calls_objc : Note<
- "function cannot be inferred '%0' because it accesses an ObjC method or property">;
+def note_func_effect_violation : Note<
+ "function cannot be inferred '%0' because it %select{allocates or deallocates memory|"
+ "throws or catches exceptions|has a static local variable|uses a thread-local variable|"
+ "accesses an ObjC method or property}1">;
def warn_func_effect_calls_func_without_effect : Warning<
"'%0' function must not call non-'%0' function '%1'">,
InGroup<FunctionEffects>;
+def note_func_effect_calls_func_without_effect : Note<
+ "function cannot be inferred '%0' because it calls non-'%0' function '%1'">;
def warn_func_effect_calls_expr_without_effect : Warning<
"'%0' function must not call non-'%0' expression">,
InGroup<FunctionEffects>;
-def note_func_effect_calls_func_without_effect : Note<
- "function cannot be inferred '%0' because it calls non-'%0' function '%1'">;
def note_func_effect_call_extern : Note<
"declaration cannot be inferred '%0' because it has no definition in this translation unit">;
def note_func_effect_call_disallows_inference : Note<
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 526c0bb8d114e6..de1abf773082f1 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -25,12 +25,13 @@ namespace {
enum class ViolationID : uint8_t {
None = 0, // Sentinel for an empty Violation.
- Throws,
- Catches,
- CallsObjC,
- AllocatesMemory,
- HasStaticLocal,
- AccessesThreadLocal,
+ // These first few map to a %select{} in a diagnostic.
+ BaseDiagnosticIndex,
+ AllocatesMemory = BaseDiagnosticIndex,
+ ThrowsOrCatchesExceptions,
+ HasStaticLocalVariable,
+ AccessesThreadLocalVariable,
+ AccessesObjCMethodOrProperty,
// These only apply to callees, where the analysis stops at the Decl.
DeclDisallowsInference,
@@ -61,6 +62,10 @@ struct Violation {
if (CalleeEffect != nullptr)
CalleeEffectPreventingInference = *CalleeEffect;
}
+
+ unsigned diagnosticSelectIndex() const {
+ return unsigned(ID) - unsigned(ViolationID::BaseDiagnosticIndex);
+ }
};
enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
@@ -664,27 +669,12 @@ class Analyzer {
llvm_unreachable("Unexpected violation kind");
break;
case ViolationID::AllocatesMemory:
- S.Diag(Viol1.Loc, diag::warn_func_effect_allocates) << effectName;
- MaybeAddTemplateNote(CInfo.CDecl);
- break;
- case ViolationID::Throws:
- case ViolationID::Catches:
- S.Diag(Viol1.Loc, diag::warn_func_effect_throws_or_catches)
- << effectName;
- MaybeAddTemplateNote(CInfo.CDecl);
- break;
- case ViolationID::HasStaticLocal:
- S.Diag(Viol1.Loc, diag::warn_func_effect_has_static_local)
- << effectName;
- MaybeAddTemplateNote(CInfo.CDecl);
- break;
- case ViolationID::AccessesThreadLocal:
- S.Diag(Viol1.Loc, diag::warn_func_effect_uses_thread_local)
- << effectName;
- MaybeAddTemplateNote(CInfo.CDecl);
- break;
- case ViolationID::CallsObjC:
- S.Diag(Viol1.Loc, diag::warn_func_effect_calls_objc) << effectName;
+ case ViolationID::ThrowsOrCatchesExceptions:
+ case ViolationID::HasStaticLocalVariable:
+ case ViolationID::AccessesThreadLocalVariable:
+ case ViolationID::AccessesObjCMethodOrProperty:
+ S.Diag(Viol1.Loc, diag::warn_func_effect_violation)
+ << effectName << Viol1.diagnosticSelectIndex();
MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::CallsExprWithoutEffect:
@@ -754,23 +744,12 @@ class Analyzer {
<< effectName;
break;
case ViolationID::AllocatesMemory:
- S.Diag(Viol2.Loc, diag::note_func_effect_allocates) << effectName;
- break;
- case ViolationID::Throws:
- case ViolationID::Catches:
- S.Diag(Viol2.Loc, diag::note_func_effect_throws_or_catches)
- << effectName;
- break;
- case ViolationID::HasStaticLocal:
- S.Diag(Viol2.Loc, diag::note_func_effect_has_static_local)
- << effectName;
- break;
- case ViolationID::AccessesThreadLocal:
- S.Diag(Viol2.Loc, diag::note_func_effect_uses_thread_local)
- << effectName;
- break;
- case ViolationID::CallsObjC:
- S.Diag(Viol2.Loc, diag::note_func_effect_calls_objc) << effectName;
+ case ViolationID::ThrowsOrCatchesExceptions:
+ case ViolationID::HasStaticLocalVariable:
+ case ViolationID::AccessesThreadLocalVariable:
+ case ViolationID::AccessesObjCMethodOrProperty:
+ S.Diag(Viol2.Loc, diag::note_func_effect_violation)
+ << effectName << Viol2.diagnosticSelectIndex();
break;
case ViolationID::CallsDeclWithoutEffect:
MaybeNextCallee.emplace(*Viol2.Callee);
@@ -952,37 +931,43 @@ class Analyzer {
bool VisitCXXThrowExpr(CXXThrowExpr *Throw) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
- ViolationID::Throws, Throw->getThrowLoc());
+ ViolationID::ThrowsOrCatchesExceptions,
+ Throw->getThrowLoc());
return true;
}
bool VisitCXXCatchStmt(CXXCatchStmt *Catch) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
- ViolationID::Catches, Catch->getCatchLoc());
+ ViolationID::ThrowsOrCatchesExceptions,
+ Catch->getCatchLoc());
return true;
}
bool VisitObjCAtThrowStmt(ObjCAtThrowStmt *Throw) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThrow,
- ViolationID::Throws, Throw->getThrowLoc());
+ ViolationID::ThrowsOrCatchesExceptions,
+ Throw->getThrowLoc());
return true;
}
bool VisitObjCAtCatchStmt(ObjCAtCatchStmt *Catch) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
- ViolationID::Catches, Catch->getAtCatchLoc());
+ ViolationID::ThrowsOrCatchesExceptions,
+ Catch->getAtCatchLoc());
return true;
}
bool VisitObjCMessageExpr(ObjCMessageExpr *Msg) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeObjCMessageSend,
- ViolationID::CallsObjC, Msg->getBeginLoc());
+ ViolationID::AccessesObjCMethodOrProperty,
+ Msg->getBeginLoc());
return true;
}
bool VisitSEHExceptStmt(SEHExceptStmt *Exc) {
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeCatch,
- ViolationID::Catches, Exc->getExceptLoc());
+ ViolationID::ThrowsOrCatchesExceptions,
+ Exc->getExceptLoc());
return true;
}
@@ -1018,7 +1003,7 @@ class Analyzer {
if (Var->isStaticLocal())
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeStaticLocalVars,
- ViolationID::HasStaticLocal,
+ ViolationID::HasStaticLocalVariable,
Var->getLocation());
const QualType::DestructionKind DK =
@@ -1106,7 +1091,7 @@ class Analyzer {
// At least on macOS, thread-local variables are initialized on
// first access, including a heap allocation.
diagnoseLanguageConstruct(FunctionEffect::FE_ExcludeThreadLocalVars,
- ViolationID::AccessesThreadLocal,
+ ViolationID::AccessesThreadLocalVariable,
E->getLocation());
}
}
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 3515f7f4b7d6cc..0ff43608ac5a23 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -121,7 +121,7 @@ void nb8c()
friend Stringy operator+(const Stringy& x, const Stringy& y)
{
// Do something inferably unsafe
- auto* z = new char[42]; // expected-note {{function cannot be inferred 'nonblocking' because it allocates/deallocates memory}}
+ auto* z = new char[42]; // expected-note {{function cannot be inferred 'nonblocking' because it allocates or deallocates memory}}
return {};
}
};
>From f93ee015a672ba2e3a221bc3d47f464be7f885bb Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 10:35:19 -0700
Subject: [PATCH 26/59] Violation constructor: use optional instead of pointer.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index de1abf773082f1..58615a45e7a204 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -57,9 +57,9 @@ struct Violation {
Violation(FunctionEffect Effect, ViolationID ID, SourceLocation Loc,
const Decl *Callee = nullptr,
- const FunctionEffect *CalleeEffect = nullptr)
+ std::optional<FunctionEffect> CalleeEffect = std::nullopt)
: Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {
- if (CalleeEffect != nullptr)
+ if (CalleeEffect)
CalleeEffectPreventingInference = *CalleeEffect;
}
@@ -259,7 +259,7 @@ class PendingFunctionAnalysis {
// try to infer it.
InferrableEffectToFirstViolation.maybeInsert(Violation(
effect, ViolationID::DeclDisallowsInference,
- CInfo.CDecl->getLocation(), nullptr, &*ProblemCalleeEffect));
+ CInfo.CDecl->getLocation(), nullptr, ProblemCalleeEffect));
}
}
// InferrableEffects is now the set of inferrable effects which are not
@@ -338,7 +338,7 @@ class CompleteFunctionAnalysis {
public:
// The incoming Pending analysis is consumed (member(s) are moved-from).
- CompleteFunctionAnalysis(ASTContext &Ctx, PendingFunctionAnalysis &Pending,
+ CompleteFunctionAnalysis(ASTContext &Ctx, PendingFunctionAnalysis &&Pending,
FunctionEffectKindSet DeclaredEffects,
FunctionEffectKindSet AllInferrableEffectsToVerify)
: VerifiedEffects(DeclaredEffects) {
@@ -530,7 +530,7 @@ class Analyzer {
Visitor.run();
if (FAnalysis.isComplete()) {
- completeAnalysis(CInfo, FAnalysis);
+ completeAnalysis(CInfo, std::move(FAnalysis));
return nullptr;
}
// Move the pending analysis to the heap and save it in the map.
@@ -545,14 +545,14 @@ class Analyzer {
// Consume PendingFunctionAnalysis, create with it a CompleteFunctionAnalysis,
// inserted in the container.
void completeAnalysis(const CallableInfo &CInfo,
- PendingFunctionAnalysis &Pending) {
+ PendingFunctionAnalysis &&Pending) {
if (ArrayRef<Violation> Viols =
Pending.getSortedViolationsForExplicitEffects(S.getSourceManager());
!Viols.empty())
emitDiagnostics(Viols, CInfo, S);
CompleteFunctionAnalysis *CompletePtr =
- new CompleteFunctionAnalysis(S.getASTContext(), Pending, CInfo.Effects,
+ new CompleteFunctionAnalysis(S.getASTContext(), std::move(Pending), CInfo.Effects,
AllInferrableEffectsToVerify);
DeclAnalysis[CInfo.CDecl] = CompletePtr;
LLVM_DEBUG(llvm::dbgs() << "inserted complete " << CompletePtr << "\n";
@@ -576,7 +576,7 @@ class Analyzer {
followCall(Caller, *Pending, Callee, Call.CallLoc,
/*AssertNoFurtherInference=*/true);
}
- completeAnalysis(Caller, *Pending);
+ completeAnalysis(Caller, std::move(*Pending));
delete Pending;
}
>From 6cc0a6275ad3ce1065b28eaaee2aa68d4a634e74 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 10:36:27 -0700
Subject: [PATCH 27/59] clang-format
---
clang/lib/Sema/SemaFunctionEffects.cpp | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 58615a45e7a204..f357593668bee1 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -551,9 +551,9 @@ class Analyzer {
!Viols.empty())
emitDiagnostics(Viols, CInfo, S);
- CompleteFunctionAnalysis *CompletePtr =
- new CompleteFunctionAnalysis(S.getASTContext(), std::move(Pending), CInfo.Effects,
- AllInferrableEffectsToVerify);
+ CompleteFunctionAnalysis *CompletePtr = new CompleteFunctionAnalysis(
+ S.getASTContext(), std::move(Pending), CInfo.Effects,
+ AllInferrableEffectsToVerify);
DeclAnalysis[CInfo.CDecl] = CompletePtr;
LLVM_DEBUG(llvm::dbgs() << "inserted complete " << CompletePtr << "\n";
DeclAnalysis.dump(S, llvm::dbgs()););
>From 69e1ae67a43e36c1cc0b8fb2dd209ba2e364aded Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 11:19:16 -0700
Subject: [PATCH 28/59] emitDiagnostics doesn't need to receive another S
---
clang/lib/Sema/SemaFunctionEffects.cpp | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index f357593668bee1..2b4d321153d1b9 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -549,7 +549,7 @@ class Analyzer {
if (ArrayRef<Violation> Viols =
Pending.getSortedViolationsForExplicitEffects(S.getSourceManager());
!Viols.empty())
- emitDiagnostics(Viols, CInfo, S);
+ emitDiagnostics(Viols, CInfo);
CompleteFunctionAnalysis *CompletePtr = new CompleteFunctionAnalysis(
S.getASTContext(), std::move(Pending), CInfo.Effects,
@@ -644,8 +644,7 @@ class Analyzer {
// Should only be called when function's analysis is determined to be
// complete.
- void emitDiagnostics(ArrayRef<Violation> Viols, const CallableInfo &CInfo,
- Sema &S) {
+ void emitDiagnostics(ArrayRef<Violation> Viols, const CallableInfo &CInfo) {
if (Viols.empty())
return;
>From 076302ec7091cd46445df014ced97862e0f47e0c Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 11:31:10 -0700
Subject: [PATCH 29/59] VisitVarDecl can reuse followTypeDtor().
---
clang/lib/Sema/SemaFunctionEffects.cpp | 25 ++++++++-----------------
1 file changed, 8 insertions(+), 17 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 2b4d321153d1b9..f36bd2c0ec1d9b 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -892,19 +892,20 @@ class Analyzer {
// follow the field and base destructors.
void followDestructor(const CXXRecordDecl *Rec,
const CXXDestructorDecl *Dtor) {
+ SourceLocation DtorLoc = Dtor->getLocation();
for (const FieldDecl *Field : Rec->fields())
- followTypeDtor(Field->getType(), Dtor);
+ followTypeDtor(Field->getType(), DtorLoc);
if (const auto *Class = dyn_cast<CXXRecordDecl>(Rec)) {
for (const CXXBaseSpecifier &Base : Class->bases())
- followTypeDtor(Base.getType(), Dtor);
+ followTypeDtor(Base.getType(), DtorLoc);
for (const CXXBaseSpecifier &Base : Class->vbases())
- followTypeDtor(Base.getType(), Dtor);
+ followTypeDtor(Base.getType(), DtorLoc);
}
}
- void followTypeDtor(QualType QT, const CXXDestructorDecl *OuterDtor) {
+ void followTypeDtor(QualType QT, SourceLocation CallSite) {
const Type *Ty = QT.getTypePtr();
while (Ty->isArrayType()) {
const ArrayType *Arr = Ty->getAsArrayTypeUnsafe();
@@ -916,7 +917,7 @@ class Analyzer {
if (const CXXRecordDecl *Class = Ty->getAsCXXRecordDecl()) {
if (CXXDestructorDecl *Dtor = Class->getDestructor()) {
CallableInfo CI(*Dtor);
- followCall(CI, OuterDtor->getLocation());
+ followCall(CI, CallSite);
}
}
}
@@ -1007,18 +1008,8 @@ class Analyzer {
const QualType::DestructionKind DK =
Var->needsDestruction(Outer.S.getASTContext());
- if (DK == QualType::DK_cxx_destructor) {
- QualType QT = Var->getType();
- if (const auto *ClsType = QT.getTypePtr()->getAs<RecordType>()) {
- if (const auto *CxxRec =
- dyn_cast<CXXRecordDecl>(ClsType->getDecl())) {
- if (const CXXDestructorDecl *Dtor = CxxRec->getDestructor()) {
- CallableInfo CI(*Dtor);
- followCall(CI, Var->getLocation());
- }
- }
- }
- }
+ if (DK == QualType::DK_cxx_destructor)
+ followTypeDtor(Var->getType(), Var->getLocation());
return true;
}
>From 7b891c630e0e7eb55e27c3eca374f7af83e4ecca Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 15:35:12 -0700
Subject: [PATCH 30/59] Add a test for a delegating initializer.
---
clang/test/Sema/attr-nonblocking-constraints.cpp | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 0ff43608ac5a23..f51ca1a855880e 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -265,10 +265,16 @@ struct Unsafe {
Unsafe() { problem1(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem1'}}
~Unsafe() { problem2(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem2'}}
+
+ Unsafe(int x); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}} expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+
+ // Delegating initializer.
+ Unsafe(float y) [[clang::nonblocking]] : Unsafe(int(y)) {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::Unsafe'}}
};
struct DerivedFromUnsafe : public Unsafe {
DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::Unsafe'}}
+ DerivedFromUnsafe(int x) [[clang::nonblocking]] : Unsafe(x) {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::Unsafe'}}
~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::~Unsafe'}}
};
>From d1fcceb9b2d54674673f1162b0621d12017ab7e6 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 15:35:40 -0700
Subject: [PATCH 31/59] Fix typo in comment for TraverseLambdaExpr.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index f36bd2c0ec1d9b..f93193a2f93bdb 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1057,7 +1057,7 @@ class Analyzer {
}
bool TraverseLambdaExpr(LambdaExpr *Lambda) {
- // We override this so as the be able to skip traversal of the lambda's
+ // We override this so as to be able to skip traversal of the lambda's
// body. We have to explicitly traverse the captures. Why not return
// false from shouldVisitLambdaBody()? Because we need to visit a lambda's
// body when we are verifying the lambda itself; we only want to skip it
>From abcf022fc5a1b27a46d9d4a6ab50d897cbdbf489 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 21:37:53 -0700
Subject: [PATCH 32/59] Fix test broken by rewording of diagnostics.
---
clang/test/SemaObjCXX/attr-nonblocking-constraints.mm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
index ff5873c11c4fe7..262d647142d548 100644
--- a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
+++ b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
@@ -8,7 +8,7 @@ - (void)method;
@end
void nb1(OCClass *oc) [[clang::nonblocking]] {
- [oc method]; // expected-warning {{'nonblocking' function must not access an ObjC method or property}}
+ [oc method]; // expected-warning {{'nonblocking' function must not access ObjC methods or properties}}
}
void nb2(OCClass *oc) {
[oc method]; // expected-note {{function cannot be inferred 'nonblocking' because it accesses an ObjC method or property}}
>From 47ebf2767f59dd9a62b63c32b47aef0343a83c7c Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Fri, 16 Aug 2024 21:38:32 -0700
Subject: [PATCH 33/59] Diagnostics are now more specific about where a
construct was found, specially handling member initializers, and more
specifically describing Decls which are constructors, destructors, lambdas
and blocks.
---
.../clang/Basic/DiagnosticSemaKinds.td | 37 +++--
clang/lib/Sema/SemaFunctionEffects.cpp | 145 ++++++++++++++----
.../Sema/attr-nonblocking-constraints.cpp | 51 +++---
3 files changed, 161 insertions(+), 72 deletions(-)
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index 3ebc7089a93d7b..e60088f0703ca3 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10951,29 +10951,38 @@ def warn_imp_cast_drops_unaligned : Warning<
// Function effects
def warn_func_effect_violation : Warning<
- "'%0' function must not %select{allocate or deallocate memory|throw or catch exceptions|"
- "have static local variables|use thread-local variables|access ObjC methods or properties}1">,
+ "'%0' %select{function|constructor|destructor|lambda|block|constructor's member initializer}1 "
+ "must not %select{allocate or deallocate memory|throw or catch exceptions|"
+ "have static local variables|use thread-local variables|access ObjC methods or properties}2">,
InGroup<FunctionEffects>;
def note_func_effect_violation : Note<
- "function cannot be inferred '%0' because it %select{allocates or deallocates memory|"
- "throws or catches exceptions|has a static local variable|uses a thread-local variable|"
- "accesses an ObjC method or property}1">;
+ "%select{function|constructor|destructor|lambda|block|member initializer}0 "
+ "cannot be inferred '%1' because it "
+ "%select{allocates or deallocates memory|throws or catches exceptions|"
+ "has a static local variable|uses a thread-local variable|"
+ "accesses an ObjC method or property}2">;
def warn_func_effect_calls_func_without_effect : Warning<
- "'%0' function must not call non-'%0' function '%1'">,
+ "'%0' %select{function|constructor|destructor|lambda|block|constructor's member initializer}1 "
+ "must not call non-'%0' "
+ "%select{function|constructor|destructor|lambda|block}2 "
+ "'%3'">,
InGroup<FunctionEffects>;
def note_func_effect_calls_func_without_effect : Note<
- "function cannot be inferred '%0' because it calls non-'%0' function '%1'">;
+ "%select{function|constructor|destructor|lambda|block|member initializer}0 "
+ "cannot be inferred '%1' because it calls non-'%1' "
+ "%select{function|constructor|destructor|lambda|block}2 "
+ "'%3'">;
def warn_func_effect_calls_expr_without_effect : Warning<
- "'%0' function must not call non-'%0' expression">,
+ "'%0' %select{function|constructor|destructor|lambda|block|constructor's member initializer}1 "
+ "must not call non-'%0' expression">,
InGroup<FunctionEffects>;
def note_func_effect_call_extern : Note<
"declaration cannot be inferred '%0' because it has no definition in this translation unit">;
def note_func_effect_call_disallows_inference : Note<
- "function does not permit inference of '%0' because it is declared '%1'">;
-def note_func_effect_call_virtual : Note<
- "virtual method cannot be inferred '%0'">;
-def note_func_effect_call_func_ptr : Note<
- "function pointer cannot be inferred '%0'">;
+ "%select{function|constructor|destructor|lambda|block}0 "
+ "does not permit inference of '%1' because it is declared '%2'">;
+def note_func_effect_call_indirect : Note<
+ "%select{virtual method|function pointer}0 cannot be inferred '%1'">;
def warn_perf_constraint_implies_noexcept : Warning<
"'%0' function should be declared noexcept">,
InGroup<PerfConstraintImpliesNoexcept>;
@@ -10981,6 +10990,8 @@ def warn_perf_constraint_implies_noexcept : Warning<
// FIXME: It would be nice if we could provide fuller template expansion notes.
def note_func_effect_from_template : Note<
"in template expansion here">;
+def note_func_effect_in_constructor : Note<
+ "in%select{| implicit}0 constructor here">;
// spoofing nonblocking/nonallocating
def warn_invalid_add_func_effects : Warning<
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index f93193a2f93bdb..acf459ec9555c1 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -11,6 +11,7 @@
//===----------------------------------------------------------------------===//
#include "clang/AST/Decl.h"
+#include "clang/AST/DeclCXX.h"
#include "clang/AST/RecursiveASTVisitor.h"
#include "clang/AST/Stmt.h"
#include "clang/AST/Type.h"
@@ -40,6 +41,13 @@ enum class ViolationID : uint8_t {
CallsExprWithoutEffect,
};
+// Bits, describing the AST context in which a violation was found.
+// If none present, the context was the function body.
+using ViolationSite = unsigned;
+enum {
+ VSite_MemberInitializer = 1,
+};
+
// Represents a violation of the rules, potentially for the entire duration of
// the analysis phase, in order to refer to it when explaining why a caller has
// been made unsafe by a callee. Can be transformed into either a Diagnostic
@@ -48,17 +56,19 @@ enum class ViolationID : uint8_t {
// be inferred as holding that effect.
struct Violation {
FunctionEffect Effect;
- FunctionEffect CalleeEffectPreventingInference; // Only for certain IDs.
+ FunctionEffect
+ CalleeEffectPreventingInference; // Only for certain IDs; can be None.
ViolationID ID = ViolationID::None;
+ ViolationSite Site;
SourceLocation Loc;
const Decl *Callee = nullptr; // Only valid for Calls*.
Violation() = default;
- Violation(FunctionEffect Effect, ViolationID ID, SourceLocation Loc,
- const Decl *Callee = nullptr,
+ Violation(FunctionEffect Effect, ViolationID ID, ViolationSite VS,
+ SourceLocation Loc, const Decl *Callee = nullptr,
std::optional<FunctionEffect> CalleeEffect = std::nullopt)
- : Effect(Effect), ID(ID), Loc(Loc), Callee(Callee) {
+ : Effect(Effect), ID(ID), Site(VS), Loc(Loc), Callee(Callee) {
if (CalleeEffect)
CalleeEffectPreventingInference = *CalleeEffect;
}
@@ -220,9 +230,10 @@ class PendingFunctionAnalysis {
// Not all recursive calls are detected, just enough
// to break cycles.
bool Recursed = false;
+ ViolationSite VSite;
- DirectCall(const Decl *D, SourceLocation CallLoc)
- : Callee(D), CallLoc(CallLoc) {}
+ DirectCall(const Decl *D, SourceLocation CallLoc, ViolationSite VSite)
+ : Callee(D), CallLoc(CallLoc), VSite(VSite) {}
};
// We always have two disjoint sets of effects to verify:
@@ -246,7 +257,7 @@ class PendingFunctionAnalysis {
PendingFunctionAnalysis(Sema &S, const CallableInfo &CInfo,
FunctionEffectKindSet AllInferrableEffectsToVerify)
: DeclaredVerifiableEffects(CInfo.Effects) {
- // Check for effects we are not allowed to infer
+ // Check for effects we are not allowed to infer.
FunctionEffectKindSet InferrableEffects;
for (FunctionEffect effect : AllInferrableEffectsToVerify) {
@@ -258,12 +269,12 @@ class PendingFunctionAnalysis {
// Add a Violation for this effect if a caller were to
// try to infer it.
InferrableEffectToFirstViolation.maybeInsert(Violation(
- effect, ViolationID::DeclDisallowsInference,
+ effect, ViolationID::DeclDisallowsInference, 0,
CInfo.CDecl->getLocation(), nullptr, ProblemCalleeEffect));
}
}
// InferrableEffects is now the set of inferrable effects which are not
- // prohibited
+ // prohibited.
EffectsToInfer = FunctionEffectKindSet::difference(
InferrableEffects, DeclaredVerifiableEffects);
}
@@ -277,8 +288,9 @@ class PendingFunctionAnalysis {
InferrableEffectToFirstViolation.maybeInsert(NewViol);
}
- void addUnverifiedDirectCall(const Decl *D, SourceLocation CallLoc) {
- UnverifiedDirectCalls.emplace_back(D, CallLoc);
+ void addUnverifiedDirectCall(const Decl *D, SourceLocation CallLoc,
+ ViolationSite VSite) {
+ UnverifiedDirectCalls.emplace_back(D, CallLoc, VSite);
}
// Analysis is complete when there are no unverified direct calls.
@@ -574,7 +586,7 @@ class Analyzer {
CallableInfo Callee(*Call.Callee);
followCall(Caller, *Pending, Callee, Call.CallLoc,
- /*AssertNoFurtherInference=*/true);
+ /*AssertNoFurtherInference=*/true, Call.VSite);
}
completeAnalysis(Caller, std::move(*Pending));
delete Pending;
@@ -584,7 +596,7 @@ class Analyzer {
// other AST construct. PFA pertains to the caller.
void followCall(const CallableInfo &Caller, PendingFunctionAnalysis &PFA,
const CallableInfo &Callee, SourceLocation CallLoc,
- bool AssertNoFurtherInference) {
+ bool AssertNoFurtherInference, ViolationSite VSite) {
const bool DirectCall = Callee.isCalledDirectly();
// Initially, the declared effects; inferred effects will be added.
@@ -625,13 +637,14 @@ class Analyzer {
if (Callee.FuncType == SpecialFuncType::None)
PFA.checkAddViolation(Inferring,
{Effect, ViolationID::CallsDeclWithoutEffect,
- CallLoc, Callee.CDecl});
+ VSite, CallLoc, Callee.CDecl});
else
PFA.checkAddViolation(
- Inferring, {Effect, ViolationID::AllocatesMemory, CallLoc});
+ Inferring,
+ {Effect, ViolationID::AllocatesMemory, VSite, CallLoc});
} else {
// Inference is allowed and necessary; defer it.
- PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc);
+ PFA.addUnverifiedDirectCall(Callee.CDecl, CallLoc, VSite);
}
};
@@ -658,6 +671,50 @@ class Analyzer {
}
};
+ // For note_func_effect_call_indirect.
+ enum { Indirect_VirtualMethod, Indirect_FunctionPtr };
+
+ // Describe a call site or target using an enum mapping to a %select{}
+ // in a diagnostic.
+ auto SiteDescIndex = [](const Decl *D, const Violation *V) {
+ enum {
+ VS_Function,
+ VS_Constructor,
+ VS_Destructor,
+ VS_Lambda,
+ VS_Block,
+ VS_MemberInitializer,
+ };
+
+ if (V != nullptr && V->Site == VSite_MemberInitializer)
+ return VS_MemberInitializer;
+ if (isa<BlockDecl>(D))
+ return VS_Block;
+ if (auto *Method = dyn_cast<CXXMethodDecl>(D)) {
+ if (isa<CXXConstructorDecl>(D))
+ return VS_Constructor;
+ if (isa<CXXDestructorDecl>(D))
+ return VS_Destructor;
+ const CXXRecordDecl *Rec = Method->getParent();
+ if (Rec->isLambda())
+ return VS_Lambda;
+ }
+ return VS_Function;
+ };
+
+ // If a Violation's site is a member initializer, adds a note referring to
+ // the constructor which invoked it.
+ auto MaybeAddCtorContext = [&](const Decl *D, const Violation &V) {
+ if (V.Site == VSite_MemberInitializer) {
+ unsigned ImplicitCtor = 0;
+ if (auto *Ctor = dyn_cast<CXXConstructorDecl>(D);
+ Ctor && Ctor->isImplicit())
+ ImplicitCtor = 1;
+ S.Diag(D->getLocation(), diag::note_func_effect_in_constructor)
+ << ImplicitCtor;
+ }
+ };
+
// Top-level violations are warnings.
for (const Violation &Viol1 : Viols) {
StringRef effectName = Viol1.Effect.name();
@@ -673,12 +730,15 @@ class Analyzer {
case ViolationID::AccessesThreadLocalVariable:
case ViolationID::AccessesObjCMethodOrProperty:
S.Diag(Viol1.Loc, diag::warn_func_effect_violation)
- << effectName << Viol1.diagnosticSelectIndex();
+ << effectName << SiteDescIndex(CInfo.CDecl, &Viol1)
+ << Viol1.diagnosticSelectIndex();
+ MaybeAddCtorContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::CallsExprWithoutEffect:
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_expr_without_effect)
- << effectName;
+ << effectName << SiteDescIndex(CInfo.CDecl, &Viol1);
+ MaybeAddCtorContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
break;
@@ -687,7 +747,9 @@ class Analyzer {
std::string CalleeName = CalleeInfo.name(S);
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_func_without_effect)
- << effectName << CalleeName;
+ << effectName << SiteDescIndex(CInfo.CDecl, &Viol1)
+ << SiteDescIndex(CalleeInfo.CDecl, nullptr) << CalleeName;
+ MaybeAddCtorContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
// Emit notes explaining the transitive chain of inferences: Why isn't
@@ -704,16 +766,17 @@ class Analyzer {
CallableType CType = CalleeInfo.type();
if (CType == CallableType::Virtual)
- S.Diag(Callee->getLocation(), diag::note_func_effect_call_virtual)
- << effectName;
+ S.Diag(Callee->getLocation(),
+ diag::note_func_effect_call_indirect)
+ << Indirect_VirtualMethod << effectName;
else if (CType == CallableType::Unknown)
S.Diag(Callee->getLocation(),
- diag::note_func_effect_call_func_ptr)
- << effectName;
+ diag::note_func_effect_call_indirect)
+ << Indirect_FunctionPtr << effectName;
else if (CalleeInfo.Effects.contains(Viol1.Effect.oppositeKind()))
S.Diag(Callee->getLocation(),
diag::note_func_effect_call_disallows_inference)
- << effectName
+ << SiteDescIndex(CInfo.CDecl, nullptr) << effectName
<< FunctionEffect(Viol1.Effect.oppositeKind()).name();
else if (const FunctionDecl *FD = dyn_cast<FunctionDecl>(Callee);
FD == nullptr || FD->getBuiltinID() == 0) {
@@ -736,11 +799,12 @@ class Analyzer {
break;
case ViolationID::DeclDisallowsInference:
S.Diag(Viol2.Loc, diag::note_func_effect_call_disallows_inference)
- << effectName << Viol2.CalleeEffectPreventingInference.name();
+ << SiteDescIndex(CalleeInfo.CDecl, nullptr) << effectName
+ << Viol2.CalleeEffectPreventingInference.name();
break;
case ViolationID::CallsExprWithoutEffect:
- S.Diag(Viol2.Loc, diag::note_func_effect_call_func_ptr)
- << effectName;
+ S.Diag(Viol2.Loc, diag::note_func_effect_call_indirect)
+ << Indirect_FunctionPtr << effectName;
break;
case ViolationID::AllocatesMemory:
case ViolationID::ThrowsOrCatchesExceptions:
@@ -748,12 +812,16 @@ class Analyzer {
case ViolationID::AccessesThreadLocalVariable:
case ViolationID::AccessesObjCMethodOrProperty:
S.Diag(Viol2.Loc, diag::note_func_effect_violation)
- << effectName << Viol2.diagnosticSelectIndex();
+ << SiteDescIndex(CalleeInfo.CDecl, &Viol2) << effectName
+ << Viol2.diagnosticSelectIndex();
+ MaybeAddCtorContext(CalleeInfo.CDecl, Viol2);
break;
case ViolationID::CallsDeclWithoutEffect:
MaybeNextCallee.emplace(*Viol2.Callee);
S.Diag(Viol2.Loc, diag::note_func_effect_calls_func_without_effect)
- << effectName << MaybeNextCallee->name(S);
+ << SiteDescIndex(CalleeInfo.CDecl, &Viol2) << effectName
+ << SiteDescIndex(Viol2.Callee, nullptr)
+ << MaybeNextCallee->name(S);
break;
}
MaybeAddTemplateNote(Callee);
@@ -777,10 +845,12 @@ class Analyzer {
//
// Violations are always routed to a PendingFunctionAnalysis.
struct FunctionBodyASTVisitor : RecursiveASTVisitor<FunctionBodyASTVisitor> {
+ using Base = RecursiveASTVisitor<FunctionBodyASTVisitor>;
Analyzer &Outer;
PendingFunctionAnalysis &CurrentFunction;
CallableInfo &CurrentCaller;
+ ViolationSite VSite = 0;
FunctionBodyASTVisitor(Analyzer &Outer,
PendingFunctionAnalysis &CurrentFunction,
@@ -822,10 +892,10 @@ class Analyzer {
addViolation(/*inferring=*/true, Effect, VID, Loc, Callee);
}
- void addViolation(bool Inferring, FunctionEffect Effect, ViolationID D,
+ void addViolation(bool Inferring, FunctionEffect Effect, ViolationID VID,
SourceLocation Loc, const Decl *Callee = nullptr) {
- CurrentFunction.checkAddViolation(Inferring,
- Violation(Effect, D, Loc, Callee));
+ CurrentFunction.checkAddViolation(
+ Inferring, Violation(Effect, VID, VSite, Loc, Callee));
}
// Here we have a call to a Decl, either explicitly via a CallExpr or some
@@ -836,7 +906,7 @@ class Analyzer {
return;
Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
- /*AssertNoFurtherInference=*/false);
+ /*AssertNoFurtherInference=*/false, VSite);
}
// FIXME: This is currently specific to the `nonblocking` and
@@ -1056,6 +1126,15 @@ class Analyzer {
return true;
}
+ bool TraverseConstructorInitializer(CXXCtorInitializer *Init) {
+ ViolationSite PrevVS = VSite;
+ if (Init->isAnyMemberInitializer())
+ VSite = VSite_MemberInitializer;
+ bool Result = Base::TraverseConstructorInitializer(Init);
+ VSite = PrevVS;
+ return Result;
+ }
+
bool TraverseLambdaExpr(LambdaExpr *Lambda) {
// We override this so as to be able to skip traversal of the lambda's
// body. We have to explicitly traverse the captures. Why not return
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index f51ca1a855880e..6caa3d1ad6b226 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -69,7 +69,7 @@ void nb7()
{
// Make sure we verify blocks
auto blk = ^() [[clang::nonblocking]] {
- throw 42; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ throw 42; // expected-warning {{'nonblocking' block must not throw or catch exceptions}}
};
}
@@ -77,7 +77,7 @@ void nb8()
{
// Make sure we verify lambdas
auto lambda = []() [[clang::nonblocking]] {
- throw 42; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ throw 42; // expected-warning {{'nonblocking' lambda must not throw or catch exceptions}}
};
}
@@ -228,54 +228,53 @@ void nb20() [[clang::nonblocking]] {
struct S {
int x;
- S(int x) try : x(x) {} catch (...) {} // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
- S(double) : x((throw 3, 3)) {} // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+ S(int x) try : x(x) {} catch (...) {} // expected-note {{constructor cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+ S(double) : x((throw 3, 3)) {} // expected-note {{member initializer cannot be inferred 'nonblocking' because it throws or catches exceptions}} \
+ expected-note {{in constructor here}}
};
-int badi(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+int badi(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}} \
+ // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
-struct A {
- int x = (throw 3, 3); // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
+struct A { // expected-note {{in implicit constructor here}}
+ int x = (throw 3, 3); // expected-note {{member initializer cannot be inferred 'nonblocking' because it throws or catches exceptions}}
};
struct B {
- int y = badi(); // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'badi'}}
+ int y = badi(); // expected-note {{member initializer cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'badi'}}
};
void f() [[clang::nonblocking]] {
- S s1(3); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'S::S'}}
- S s2(3.0); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'S::S'}}
- A a; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'A::A'}}
- B b; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'B::B'}}
+ S s1(3); // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'S::S'}}
+ S s2(3.0); // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'S::S'}}
+ A a; // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'A::A'}}
+ B b; // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'B::B'}}
}
-#if 0
-// FIXME: can we do better with default member initializers?
struct T {
- int x = badi();
- T() [[clang::nonblocking]] {} // Warning: this calls bad().
- T(int x) [[clang::nonblocking]] : x(x) {} // This does not.
+ int x = badi(); // expected-warning {{'nonblocking' constructor's member initializer must not call non-'nonblocking' function 'badi'}}
+ T() [[clang::nonblocking]] {} // expected-note {{in constructor here}}
+ T(int x) [[clang::nonblocking]] : x(x) {} // OK
};
-#endif
// Verify traversal of implicit code paths - constructors and destructors.
struct Unsafe {
- static void problem1(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
- static void problem2(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+ static void problem1(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+ static void problem2(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
- Unsafe() { problem1(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem1'}}
- ~Unsafe() { problem2(); } // expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem2'}}
+ Unsafe() { problem1(); } // expected-note {{constructor cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem1'}}
+ ~Unsafe() { problem2(); } // expected-note {{destructor cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'Unsafe::problem2'}}
Unsafe(int x); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}} expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
// Delegating initializer.
- Unsafe(float y) [[clang::nonblocking]] : Unsafe(int(y)) {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::Unsafe'}}
+ Unsafe(float y) [[clang::nonblocking]] : Unsafe(int(y)) {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
};
struct DerivedFromUnsafe : public Unsafe {
- DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::Unsafe'}}
- DerivedFromUnsafe(int x) [[clang::nonblocking]] : Unsafe(x) {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::Unsafe'}}
- ~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'Unsafe::~Unsafe'}}
+ DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
+ DerivedFromUnsafe(int x) [[clang::nonblocking]] : Unsafe(x) {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
+ ~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' destructor must not call non-'nonblocking' destructor 'Unsafe::~Unsafe'}}
};
// Contexts where there is no function call, no diagnostic.
>From 6650c1fae8d1023dffb8debf42ea7f4b2b6753d9 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Tue, 20 Aug 2024 08:39:01 -0700
Subject: [PATCH 34/59] Two fixes for default arguments: - they are never
attributed to the function, only its callers. - while the warning points to
the expression in the declaration, add a note pointing to the caller.
---
.../clang/Basic/DiagnosticSemaKinds.td | 2 +
clang/lib/Sema/SemaFunctionEffects.cpp | 70 ++++++++++++++-----
.../Sema/attr-nonblocking-constraints.cpp | 10 +++
3 files changed, 65 insertions(+), 17 deletions(-)
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index e60088f0703ca3..ee6072fbb38ca4 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10992,6 +10992,8 @@ def note_func_effect_from_template : Note<
"in template expansion here">;
def note_func_effect_in_constructor : Note<
"in%select{| implicit}0 constructor here">;
+def note_in_evaluating_default_argument : Note<
+ "in evaluating default argument here">;
// spoofing nonblocking/nonallocating
def warn_invalid_add_func_effects : Warning<
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index acf459ec9555c1..9166aaa3d1ab7b 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -41,11 +41,17 @@ enum class ViolationID : uint8_t {
CallsExprWithoutEffect,
};
-// Bits, describing the AST context in which a violation was found.
-// If none present, the context was the function body.
-using ViolationSite = unsigned;
-enum {
- VSite_MemberInitializer = 1,
+// Information about the AST context in which a violation was found, so
+// that diagnostics can point to the correct source.
+struct ViolationSite {
+ enum class Kind : uint8_t {
+ Default = 0, // Function body.
+ MemberInitializer = 1,
+ DefaultArgExpr = 2
+ };
+
+ Kind VKind = Kind::Default;
+ CXXDefaultArgExpr *DefaultArgExpr = nullptr;
};
// Represents a violation of the rules, potentially for the entire duration of
@@ -269,7 +275,7 @@ class PendingFunctionAnalysis {
// Add a Violation for this effect if a caller were to
// try to infer it.
InferrableEffectToFirstViolation.maybeInsert(Violation(
- effect, ViolationID::DeclDisallowsInference, 0,
+ effect, ViolationID::DeclDisallowsInference, ViolationSite{},
CInfo.CDecl->getLocation(), nullptr, ProblemCalleeEffect));
}
}
@@ -686,7 +692,8 @@ class Analyzer {
VS_MemberInitializer,
};
- if (V != nullptr && V->Site == VSite_MemberInitializer)
+ if (V != nullptr &&
+ V->Site.VKind == ViolationSite::Kind::MemberInitializer)
return VS_MemberInitializer;
if (isa<BlockDecl>(D))
return VS_Block;
@@ -702,10 +709,10 @@ class Analyzer {
return VS_Function;
};
- // If a Violation's site is a member initializer, adds a note referring to
- // the constructor which invoked it.
- auto MaybeAddCtorContext = [&](const Decl *D, const Violation &V) {
- if (V.Site == VSite_MemberInitializer) {
+ auto MaybeAddSiteContext = [&](const Decl *D, const Violation &V) {
+ // If a violation site is a member initializer, add a note pointing to
+ // the constructor which invoked it.
+ if (V.Site.VKind == ViolationSite::Kind::MemberInitializer) {
unsigned ImplicitCtor = 0;
if (auto *Ctor = dyn_cast<CXXConstructorDecl>(D);
Ctor && Ctor->isImplicit())
@@ -713,6 +720,12 @@ class Analyzer {
S.Diag(D->getLocation(), diag::note_func_effect_in_constructor)
<< ImplicitCtor;
}
+
+ // If a violation site is a default argument expression, add a note
+ // pointing to the call site using the default argument.
+ else if (V.Site.VKind == ViolationSite::Kind::DefaultArgExpr)
+ S.Diag(V.Site.DefaultArgExpr->getUsedLocation(),
+ diag::note_in_evaluating_default_argument);
};
// Top-level violations are warnings.
@@ -732,13 +745,13 @@ class Analyzer {
S.Diag(Viol1.Loc, diag::warn_func_effect_violation)
<< effectName << SiteDescIndex(CInfo.CDecl, &Viol1)
<< Viol1.diagnosticSelectIndex();
- MaybeAddCtorContext(CInfo.CDecl, Viol1);
+ MaybeAddSiteContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::CallsExprWithoutEffect:
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_expr_without_effect)
<< effectName << SiteDescIndex(CInfo.CDecl, &Viol1);
- MaybeAddCtorContext(CInfo.CDecl, Viol1);
+ MaybeAddSiteContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
break;
@@ -749,7 +762,7 @@ class Analyzer {
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_func_without_effect)
<< effectName << SiteDescIndex(CInfo.CDecl, &Viol1)
<< SiteDescIndex(CalleeInfo.CDecl, nullptr) << CalleeName;
- MaybeAddCtorContext(CInfo.CDecl, Viol1);
+ MaybeAddSiteContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
// Emit notes explaining the transitive chain of inferences: Why isn't
@@ -814,7 +827,7 @@ class Analyzer {
S.Diag(Viol2.Loc, diag::note_func_effect_violation)
<< SiteDescIndex(CalleeInfo.CDecl, &Viol2) << effectName
<< Viol2.diagnosticSelectIndex();
- MaybeAddCtorContext(CalleeInfo.CDecl, Viol2);
+ MaybeAddSiteContext(CalleeInfo.CDecl, Viol2);
break;
case ViolationID::CallsDeclWithoutEffect:
MaybeNextCallee.emplace(*Viol2.Callee);
@@ -850,7 +863,7 @@ class Analyzer {
Analyzer &Outer;
PendingFunctionAnalysis &CurrentFunction;
CallableInfo &CurrentCaller;
- ViolationSite VSite = 0;
+ ViolationSite VSite;
FunctionBodyASTVisitor(Analyzer &Outer,
PendingFunctionAnalysis &CurrentFunction,
@@ -1129,12 +1142,35 @@ class Analyzer {
bool TraverseConstructorInitializer(CXXCtorInitializer *Init) {
ViolationSite PrevVS = VSite;
if (Init->isAnyMemberInitializer())
- VSite = VSite_MemberInitializer;
+ VSite.VKind = ViolationSite::Kind::MemberInitializer;
bool Result = Base::TraverseConstructorInitializer(Init);
VSite = PrevVS;
return Result;
}
+ bool TraverseCXXDefaultArgExpr(CXXDefaultArgExpr *E) {
+ LLVM_DEBUG(llvm::dbgs()
+ << "TraverseCXXDefaultArgExpr : "
+ << E->getUsedLocation().printToString(Outer.S.SourceMgr)
+ << "\n";);
+
+ ViolationSite PrevVS = VSite;
+ if (VSite.VKind == ViolationSite::Kind::Default)
+ VSite = ViolationSite{.VKind = ViolationSite::Kind::DefaultArgExpr,
+ .DefaultArgExpr = E};
+
+ bool Result = Base::TraverseCXXDefaultArgExpr(E);
+ VSite = PrevVS;
+ return Result;
+ }
+
+ bool TraverseParmVarDecl(ParmVarDecl *PV) {
+ // By traversing a ParmVarDecl as if it were a simple VarDecl, we avoid
+ // incorrectly attributing default argument expressions to this function;
+ // they are properly attributed to callers, via a CXXDefaultArgExpr.
+ return Base::TraverseVarDecl(PV);
+ }
+
bool TraverseLambdaExpr(LambdaExpr *Lambda) {
// We override this so as to be able to skip traversal of the lambda's
// body. We have to explicitly traverse the captures. Why not return
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 6caa3d1ad6b226..1e90696f00e0be 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -257,6 +257,16 @@ struct T {
T(int x) [[clang::nonblocking]] : x(x) {} // OK
};
+// Default arguments
+int badForDefaultArg(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+
+void hasDefaultArg(int param = badForDefaultArg()) { // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'badForDefaultArg'}}
+}
+
+void nb21() [[clang::nonblocking]] {
+ hasDefaultArg(); // expected-note {{in evaluating default argument here}}
+}
+
// Verify traversal of implicit code paths - constructors and destructors.
struct Unsafe {
static void problem1(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
>From 250b80becb3769f09d2af32434e0322bfa08b83f Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Tue, 20 Aug 2024 08:39:28 -0700
Subject: [PATCH 35/59] Type.cpp: remove asserts preceding llvm_unreachable().
---
clang/lib/AST/Type.cpp | 6 ++----
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/clang/lib/AST/Type.cpp b/clang/lib/AST/Type.cpp
index 8d36aa15c59572..9c50b6b6087fa4 100644
--- a/clang/lib/AST/Type.cpp
+++ b/clang/lib/AST/Type.cpp
@@ -5159,10 +5159,9 @@ std::optional<FunctionEffect> FunctionEffect::effectProhibitingInference(
break;
case Kind::None:
- assert(0 && "effectProhibitingInference with None");
break;
}
- llvm_unreachable("unknown effect kind");
+ llvm_unreachable("unknown effect kind or None");
}
bool FunctionEffect::shouldDiagnoseFunctionCall(
@@ -5185,10 +5184,9 @@ bool FunctionEffect::shouldDiagnoseFunctionCall(
case Kind::Blocking:
return false;
case Kind::None:
- assert(0 && "shouldDiagnoseFunctionCall with None");
break;
}
- llvm_unreachable("unknown effect kind");
+ llvm_unreachable("unknown effect kind or None");
}
// =====
>From e8bcd9f6962a2b5c2286fccfcd1716b5b180bf47 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 22 Aug 2024 09:28:27 -0700
Subject: [PATCH 36/59] Fix pre-C++20 compile error. Test an unsafe default
argument.
---
clang/include/clang/AST/Type.h | 1 +
clang/lib/Sema/SemaFunctionEffects.cpp | 18 +++++++++---------
.../test/Sema/attr-nonblocking-constraints.cpp | 13 ++++++++++---
3 files changed, 20 insertions(+), 12 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index 59221dcb85eeba..49077750744fff 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4998,6 +4998,7 @@ class FunctionEffectKindSet {
}
void insert(FunctionEffectKindSet Set) { KindBits |= Set.KindBits; }
+ bool empty() const { return KindBits.none(); }
bool contains(const FunctionEffect::Kind EK) const {
return KindBits.test(kindToPos(EK));
}
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 9166aaa3d1ab7b..9310171a401b0d 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -37,6 +37,10 @@ enum class ViolationID : uint8_t {
// These only apply to callees, where the analysis stops at the Decl.
DeclDisallowsInference,
+ // These both apply to indirect calls. The difference is that sometimes
+ // we have an actual Decl (generally a variable) which is the function
+ // pointer being called, and sometimes, typically due to a cast, we only
+ // have an expression.
CallsDeclWithoutEffect,
CallsExprWithoutEffect,
};
@@ -52,6 +56,10 @@ struct ViolationSite {
Kind VKind = Kind::Default;
CXXDefaultArgExpr *DefaultArgExpr = nullptr;
+
+ ViolationSite() = default;
+ explicit ViolationSite(CXXDefaultArgExpr *E)
+ : VKind(Kind::DefaultArgExpr), DefaultArgExpr(E) {}
};
// Represents a violation of the rules, potentially for the entire duration of
@@ -1156,21 +1164,13 @@ class Analyzer {
ViolationSite PrevVS = VSite;
if (VSite.VKind == ViolationSite::Kind::Default)
- VSite = ViolationSite{.VKind = ViolationSite::Kind::DefaultArgExpr,
- .DefaultArgExpr = E};
+ VSite = ViolationSite{E};
bool Result = Base::TraverseCXXDefaultArgExpr(E);
VSite = PrevVS;
return Result;
}
- bool TraverseParmVarDecl(ParmVarDecl *PV) {
- // By traversing a ParmVarDecl as if it were a simple VarDecl, we avoid
- // incorrectly attributing default argument expressions to this function;
- // they are properly attributed to callers, via a CXXDefaultArgExpr.
- return Base::TraverseVarDecl(PV);
- }
-
bool TraverseLambdaExpr(LambdaExpr *Lambda) {
// We override this so as to be able to skip traversal of the lambda's
// body. We have to explicitly traverse the captures. Why not return
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 1e90696f00e0be..ca9fe199f5f668 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -258,13 +258,20 @@ struct T {
};
// Default arguments
-int badForDefaultArg(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
+int badForDefaultArg(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}} \
+ expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}} \
+ expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
-void hasDefaultArg(int param = badForDefaultArg()) { // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'badForDefaultArg'}}
+void hasDefaultArg(int param = badForDefaultArg()) { // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'badForDefaultArg'}} \
+ expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'badForDefaultArg'}}
}
void nb21() [[clang::nonblocking]] {
- hasDefaultArg(); // expected-note {{in evaluating default argument here}}
+ hasDefaultArg(); // expected-note {{in evaluating default argument here}} \
+ expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'hasDefaultArg'}}
+}
+
+void nb22(int param = badForDefaultArg()) [[clang::nonblocking]] { // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'badForDefaultArg'}}
}
// Verify traversal of implicit code paths - constructors and destructors.
>From ea7f3fc8c0b5269e430916c3f8955c694dbc9af5 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 29 Aug 2024 09:43:54 -0500
Subject: [PATCH 37/59] Review feedback: ViolationSite can use a
PointerIntPair. Expand list of known builtins and make the implementation
slightly less specific to nonblocking/nonallocating.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 140 +++++++++++++++++--------
1 file changed, 98 insertions(+), 42 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 9310171a401b0d..186be26f767d91 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -47,19 +47,27 @@ enum class ViolationID : uint8_t {
// Information about the AST context in which a violation was found, so
// that diagnostics can point to the correct source.
-struct ViolationSite {
+class ViolationSite {
+public:
enum class Kind : uint8_t {
Default = 0, // Function body.
MemberInitializer = 1,
DefaultArgExpr = 2
};
- Kind VKind = Kind::Default;
- CXXDefaultArgExpr *DefaultArgExpr = nullptr;
+private:
+ llvm::PointerIntPair<CXXDefaultArgExpr *, 2, Kind> Impl;
+public:
ViolationSite() = default;
+
explicit ViolationSite(CXXDefaultArgExpr *E)
- : VKind(Kind::DefaultArgExpr), DefaultArgExpr(E) {}
+ : Impl(E, Kind::DefaultArgExpr) {}
+
+ Kind kind() const { return static_cast<Kind>(Impl.getInt()); }
+ CXXDefaultArgExpr *defaultArgExpr() const { return Impl.getPointer(); }
+
+ void setKind(Kind K) { Impl.setPointerAndInt(nullptr, K); }
};
// Represents a violation of the rules, potentially for the entire duration of
@@ -119,6 +127,74 @@ static bool isNoexcept(const FunctionDecl *FD) {
return false;
}
+static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
+ FunctionEffectKindSet Result;
+
+ switch (BuiltinID) {
+ case 0: // Not builtin.
+ default: // By default, builtins have no known effects.
+ break;
+
+ // These allocate/deallocate heap memory.
+ case Builtin::ID::BI__builtin_calloc:
+ case Builtin::ID::BI__builtin_malloc:
+ case Builtin::ID::BI__builtin_realloc:
+ case Builtin::ID::BI__builtin_free:
+ case Builtin::ID::BI__builtin_operator_delete:
+ case Builtin::ID::BI__builtin_operator_new:
+ case Builtin::ID::BIaligned_alloc:
+ case Builtin::ID::BIcalloc:
+ case Builtin::ID::BImalloc:
+ case Builtin::ID::BImemalign:
+ case Builtin::ID::BIrealloc:
+ case Builtin::ID::BIfree:
+
+ case Builtin::ID::BI__builtin_unwind_init: // ????
+ // __builtin_eh_return?
+ // __builtin_allow_runtime_check
+ // va_copy
+ // printf, fprintf, snprintf, sprintf, vprintf, vfprintf, vsnprintf
+ // scanf family
+ // coroutine intrinsics?
+
+ case Builtin::ID::BIfopen:
+ case Builtin::ID::BIpthread_create:
+ case Builtin::ID::BI_Block_object_dispose:
+ Result.insert(FunctionEffect(FunctionEffect::Kind::Allocating));
+ break;
+
+ // These block in some other way than allocating memory.
+ case Builtin::ID::BIlongjmp:
+ case Builtin::ID::BI_longjmp:
+ case Builtin::ID::BIsiglongjmp:
+ case Builtin::ID::BI__builtin_longjmp:
+ case Builtin::ID::BIobjc_exception_throw:
+
+ case Builtin::ID::BIobjc_msgSend:
+ case Builtin::ID::BIobjc_msgSend_fpret:
+ case Builtin::ID::BIobjc_msgSend_fp2ret:
+ case Builtin::ID::BIobjc_msgSend_stret:
+ case Builtin::ID::BIobjc_msgSendSuper:
+ case Builtin::ID::BIobjc_getClass:
+ case Builtin::ID::BIobjc_getMetaClass:
+ case Builtin::ID::BIobjc_enumerationMutation:
+ case Builtin::ID::BIobjc_assign_ivar:
+ case Builtin::ID::BIobjc_assign_global:
+ case Builtin::ID::BIobjc_sync_enter:
+ case Builtin::ID::BIobjc_sync_exit:
+ case Builtin::ID::BINSLog:
+ case Builtin::ID::BINSLogv:
+
+ case Builtin::ID::BIfread:
+ case Builtin::ID::BIfwrite:
+ Result.insert(FunctionEffect(FunctionEffect::Kind::Blocking));
+ break;
+ }
+
+ return Result;
+}
+
+
// Transitory, more extended information about a callable, which can be a
// function, block, or function pointer.
struct CallableInfo {
@@ -701,7 +777,7 @@ class Analyzer {
};
if (V != nullptr &&
- V->Site.VKind == ViolationSite::Kind::MemberInitializer)
+ V->Site.kind() == ViolationSite::Kind::MemberInitializer)
return VS_MemberInitializer;
if (isa<BlockDecl>(D))
return VS_Block;
@@ -720,7 +796,7 @@ class Analyzer {
auto MaybeAddSiteContext = [&](const Decl *D, const Violation &V) {
// If a violation site is a member initializer, add a note pointing to
// the constructor which invoked it.
- if (V.Site.VKind == ViolationSite::Kind::MemberInitializer) {
+ if (V.Site.kind() == ViolationSite::Kind::MemberInitializer) {
unsigned ImplicitCtor = 0;
if (auto *Ctor = dyn_cast<CXXConstructorDecl>(D);
Ctor && Ctor->isImplicit())
@@ -731,8 +807,8 @@ class Analyzer {
// If a violation site is a default argument expression, add a note
// pointing to the call site using the default argument.
- else if (V.Site.VKind == ViolationSite::Kind::DefaultArgExpr)
- S.Diag(V.Site.DefaultArgExpr->getUsedLocation(),
+ else if (V.Site.kind() == ViolationSite::Kind::DefaultArgExpr)
+ S.Diag(V.Site.defaultArgExpr()->getUsedLocation(),
diag::note_in_evaluating_default_argument);
};
@@ -921,43 +997,23 @@ class Analyzer {
// Here we have a call to a Decl, either explicitly via a CallExpr or some
// other AST construct. CallableInfo pertains to the callee.
- void followCall(const CallableInfo &CI, SourceLocation CallLoc) {
- if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl);
- FD && isSafeBuiltinFunction(FD))
- return;
+ void followCall(CallableInfo &CI, SourceLocation CallLoc) {
+ // Check for a call to a builtin function, whose effects are
+ // handled specially.
+ if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl)) {
+ if (unsigned BuiltinID = FD->getBuiltinID()) {
+ CI.Effects = getBuiltinFunctionEffects(BuiltinID);
+ if (CI.Effects.empty()) {
+ // A builtin with no known effects is assumed safe.
+ return;
+ }
+ }
+ }
Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
/*AssertNoFurtherInference=*/false, VSite);
}
- // FIXME: This is currently specific to the `nonblocking` and
- // `nonallocating` effects. More ideally, the builtin functions themselves
- // would have the `allocating` attribute.
- static bool isSafeBuiltinFunction(const FunctionDecl *FD) {
- unsigned BuiltinID = FD->getBuiltinID();
- switch (BuiltinID) {
- case 0: // Not builtin.
- return false;
- default: // Not disallowed via cases below.
- return true;
-
- // Disallow list
- case Builtin::ID::BIaligned_alloc:
- case Builtin::ID::BI__builtin_calloc:
- case Builtin::ID::BI__builtin_malloc:
- case Builtin::ID::BI__builtin_realloc:
- case Builtin::ID::BI__builtin_free:
- case Builtin::ID::BI__builtin_operator_delete:
- case Builtin::ID::BI__builtin_operator_new:
- case Builtin::ID::BIcalloc:
- case Builtin::ID::BImalloc:
- case Builtin::ID::BImemalign:
- case Builtin::ID::BIrealloc:
- case Builtin::ID::BIfree:
- return false;
- }
- }
-
void checkIndirectCall(CallExpr *Call, QualType CalleeType) {
auto *FPT =
CalleeType->getAs<FunctionProtoType>(); // Null if FunctionType.
@@ -1150,7 +1206,7 @@ class Analyzer {
bool TraverseConstructorInitializer(CXXCtorInitializer *Init) {
ViolationSite PrevVS = VSite;
if (Init->isAnyMemberInitializer())
- VSite.VKind = ViolationSite::Kind::MemberInitializer;
+ VSite.setKind(ViolationSite::Kind::MemberInitializer);
bool Result = Base::TraverseConstructorInitializer(Init);
VSite = PrevVS;
return Result;
@@ -1163,7 +1219,7 @@ class Analyzer {
<< "\n";);
ViolationSite PrevVS = VSite;
- if (VSite.VKind == ViolationSite::Kind::Default)
+ if (VSite.kind() == ViolationSite::Kind::Default)
VSite = ViolationSite{E};
bool Result = Base::TraverseCXXDefaultArgExpr(E);
>From d1a39e2792c200fa7647451bd7d4a30fc9fdb815 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 29 Aug 2024 10:47:17 -0700
Subject: [PATCH 38/59] Fix: was traversing virtual base class destructors
twice, exposed by new test.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 6 +-----
clang/test/Sema/attr-nonblocking-constraints.cpp | 14 ++++++++++++++
2 files changed, 15 insertions(+), 5 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 186be26f767d91..d2e3f1b44ba0cb 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1043,13 +1043,9 @@ class Analyzer {
for (const FieldDecl *Field : Rec->fields())
followTypeDtor(Field->getType(), DtorLoc);
- if (const auto *Class = dyn_cast<CXXRecordDecl>(Rec)) {
+ if (const auto *Class = dyn_cast<CXXRecordDecl>(Rec))
for (const CXXBaseSpecifier &Base : Class->bases())
followTypeDtor(Base.getType(), DtorLoc);
-
- for (const CXXBaseSpecifier &Base : Class->vbases())
- followTypeDtor(Base.getType(), DtorLoc);
- }
}
void followTypeDtor(QualType QT, SourceLocation CallSite) {
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index ca9fe199f5f668..2890199c609106 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -294,6 +294,20 @@ struct DerivedFromUnsafe : public Unsafe {
~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' destructor must not call non-'nonblocking' destructor 'Unsafe::~Unsafe'}}
};
+// Virtual inheritance
+struct VBase {
+ int *Ptr;
+
+ VBase() { Ptr = new int; } // expected-note {{constructor cannot be inferred 'nonblocking' because it allocates or deallocates memory}}
+ virtual ~VBase() { delete Ptr; } // expected-note {{virtual method cannot be inferred 'nonblocking'}}
+};
+
+struct VDerived : virtual VBase {
+ VDerived() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'VBase::VBase'}}
+
+ ~VDerived() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' destructor must not call non-'nonblocking' destructor 'VBase::~VBase'}}
+};
+
// Contexts where there is no function call, no diagnostic.
bool bad();
>From 75365efc34f8d4255f965940b7a5e3f3aa3fd122 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 29 Aug 2024 11:03:09 -0700
Subject: [PATCH 39/59] More builtin functions.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 40 +++++++++++++++++++-------
1 file changed, 30 insertions(+), 10 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index d2e3f1b44ba0cb..423ea54ec56313 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -63,7 +63,7 @@ class ViolationSite {
explicit ViolationSite(CXXDefaultArgExpr *E)
: Impl(E, Kind::DefaultArgExpr) {}
-
+
Kind kind() const { return static_cast<Kind>(Impl.getInt()); }
CXXDefaultArgExpr *defaultArgExpr() const { return Impl.getPointer(); }
@@ -127,6 +127,13 @@ static bool isNoexcept(const FunctionDecl *FD) {
return false;
}
+// This list is probably incomplete.
+// FIXME: Investigate:
+// __builtin_eh_return?
+// __builtin_allow_runtime_check?
+// __builtin_unwind_init and other similar things that sound exception-related.
+// va_copy?
+// coroutines?
static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
FunctionEffectKindSet Result;
@@ -149,14 +156,6 @@ static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
case Builtin::ID::BIrealloc:
case Builtin::ID::BIfree:
- case Builtin::ID::BI__builtin_unwind_init: // ????
- // __builtin_eh_return?
- // __builtin_allow_runtime_check
- // va_copy
- // printf, fprintf, snprintf, sprintf, vprintf, vfprintf, vsnprintf
- // scanf family
- // coroutine intrinsics?
-
case Builtin::ID::BIfopen:
case Builtin::ID::BIpthread_create:
case Builtin::ID::BI_Block_object_dispose:
@@ -170,6 +169,7 @@ static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
case Builtin::ID::BI__builtin_longjmp:
case Builtin::ID::BIobjc_exception_throw:
+ // Objective-C runtime.
case Builtin::ID::BIobjc_msgSend:
case Builtin::ID::BIobjc_msgSend_fpret:
case Builtin::ID::BIobjc_msgSend_fp2ret:
@@ -185,8 +185,29 @@ static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
case Builtin::ID::BINSLog:
case Builtin::ID::BINSLogv:
+ // stdio.h
case Builtin::ID::BIfread:
case Builtin::ID::BIfwrite:
+
+ // stdio.h: printf family.
+ case Builtin::ID::BIprintf:
+ case Builtin::ID::BI__builtin_printf:
+ case Builtin::ID::BIfprintf:
+ case Builtin::ID::BIsnprintf:
+ case Builtin::ID::BIsprintf:
+ case Builtin::ID::BIvprintf:
+ case Builtin::ID::BIvfprintf:
+ case Builtin::ID::BIvsnprintf:
+ case Builtin::ID::BIvsprintf:
+
+ // stdio.h: scanf family.
+ case Builtin::ID::BIscanf:
+ case Builtin::ID::BIfscanf:
+ case Builtin::ID::BIsscanf:
+ case Builtin::ID::BIvscanf:
+ case Builtin::ID::BIvfscanf:
+ case Builtin::ID::BIvsscanf:
+
Result.insert(FunctionEffect(FunctionEffect::Kind::Blocking));
break;
}
@@ -194,7 +215,6 @@ static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
return Result;
}
-
// Transitory, more extended information about a callable, which can be a
// function, block, or function pointer.
struct CallableInfo {
>From 6aadec09c3e1d2fd6b22b1e3f475433eaf81a31e Mon Sep 17 00:00:00 2001
From: Doug Wyatt <doug at sonosphere.com>
Date: Wed, 4 Sep 2024 11:10:21 -0700
Subject: [PATCH 40/59] Apply suggestions from code review
Co-authored-by: Erich Keane <ekeane at nvidia.com>
---
clang/include/clang/AST/Type.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index 49077750744fff..ad3fdf425b4316 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4949,7 +4949,7 @@ class FunctionEffectKindSet {
explicit FunctionEffectKindSet(KindBitsT KB) : KindBits(KB) {}
constexpr static size_t kindToPos(FunctionEffect::Kind K) {
- return size_t(K);
+ return static_assert<size_t>(K);
}
public:
@@ -4983,7 +4983,7 @@ class FunctionEffectKindSet {
}
FunctionEffect operator*() const {
- assert(Idx < EndBitPos);
+ assert(Idx < EndBitPos && "Dereference of end iterator");
return FunctionEffect(FunctionEffect::Kind(Idx));
}
};
>From 9b123a64f1da2ad903defcbe2395ad67779ba628 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 4 Sep 2024 13:26:36 -0700
Subject: [PATCH 41/59] Review feedback: - Add operator<< for FunctionEffect
and FunctionEffectWithCondition. - Simplified dump methods for
FunctionEffectsRef and FunctionEffectKindSet. - Diagnostics now say "function
with 'nonblocking' attribute" (where appropriate). - Other more minor tweaks.
---
clang/include/clang/AST/Type.h | 11 ++-
.../clang/Basic/DiagnosticSemaKinds.td | 13 ++--
clang/include/clang/Sema/Sema.h | 4 +-
clang/include/clang/Serialization/ASTReader.h | 2 +-
clang/lib/AST/Type.cpp | 38 ++++-----
clang/lib/Sema/SemaFunctionEffects.cpp | 16 ++--
clang/lib/Serialization/ASTReader.cpp | 21 ++---
.../Sema/attr-nonblocking-constraints-ms.cpp | 4 +-
.../Sema/attr-nonblocking-constraints.cpp | 78 +++++++++----------
9 files changed, 94 insertions(+), 93 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index ad3fdf425b4316..e86a628cbc9e7e 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4777,6 +4777,12 @@ class FunctionEffect {
/// The description printed in diagnostics, e.g. 'nonblocking'.
StringRef name() const;
+ friend raw_ostream &operator<<(raw_ostream &OS,
+ const FunctionEffect &Effect) {
+ OS << Effect.name();
+ return OS;
+ }
+
/// Determine whether the effect is allowed to be inferred on the callee,
/// which is either a FunctionDecl or BlockDecl. If the returned optional
/// is empty, inference is permitted; otherwise it holds the effect which
@@ -4834,6 +4840,9 @@ struct FunctionEffectWithCondition {
/// Return a textual description of the effect, and its condition, if any.
std::string description() const;
+
+ friend raw_ostream &operator<<(raw_ostream &OS,
+ const FunctionEffectWithCondition &CFE);
};
/// Support iteration in parallel through a pair of FunctionEffect and
@@ -4949,7 +4958,7 @@ class FunctionEffectKindSet {
explicit FunctionEffectKindSet(KindBitsT KB) : KindBits(KB) {}
constexpr static size_t kindToPos(FunctionEffect::Kind K) {
- return static_assert<size_t>(K);
+ return static_cast<size_t>(K);
}
public:
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index ee6072fbb38ca4..efdfd53616cc9d 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10951,7 +10951,8 @@ def warn_imp_cast_drops_unaligned : Warning<
// Function effects
def warn_func_effect_violation : Warning<
- "'%0' %select{function|constructor|destructor|lambda|block|constructor's member initializer}1 "
+ "%select{function|constructor|destructor|lambda|block|member initializer of constructor}0 "
+ "with '%1' attribute "
"must not %select{allocate or deallocate memory|throw or catch exceptions|"
"have static local variables|use thread-local variables|access ObjC methods or properties}2">,
InGroup<FunctionEffects>;
@@ -10962,8 +10963,9 @@ def note_func_effect_violation : Note<
"has a static local variable|uses a thread-local variable|"
"accesses an ObjC method or property}2">;
def warn_func_effect_calls_func_without_effect : Warning<
- "'%0' %select{function|constructor|destructor|lambda|block|constructor's member initializer}1 "
- "must not call non-'%0' "
+ "%select{function|constructor|destructor|lambda|block|member initializer of constructor}0 "
+ "with '%1' attribute "
+ "must not call non-'%1' "
"%select{function|constructor|destructor|lambda|block}2 "
"'%3'">,
InGroup<FunctionEffects>;
@@ -10973,7 +10975,8 @@ def note_func_effect_calls_func_without_effect : Note<
"%select{function|constructor|destructor|lambda|block}2 "
"'%3'">;
def warn_func_effect_calls_expr_without_effect : Warning<
- "'%0' %select{function|constructor|destructor|lambda|block|constructor's member initializer}1 "
+ "%select{function|constructor|destructor|lambda|block|member initializer of constructor}0 "
+ "with '%1' attribute "
"must not call non-'%0' expression">,
InGroup<FunctionEffects>;
def note_func_effect_call_extern : Note<
@@ -10984,7 +10987,7 @@ def note_func_effect_call_disallows_inference : Note<
def note_func_effect_call_indirect : Note<
"%select{virtual method|function pointer}0 cannot be inferred '%1'">;
def warn_perf_constraint_implies_noexcept : Warning<
- "'%0' function should be declared noexcept">,
+ "function with '%0' attribute should be declared noexcept">,
InGroup<PerfConstraintImpliesNoexcept>;
// FIXME: It would be nice if we could provide fuller template expansion notes.
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index e5f9c3c7dbb09b..370985f7ce4bba 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -15053,8 +15053,8 @@ class Sema final : public SemaBase {
FunctionEffect::Kind EffectKind;
Kind DiffKind;
- FunctionEffectWithCondition Old; // invalid when Added.
- FunctionEffectWithCondition New; // invalid when Removed.
+ FunctionEffectWithCondition Old; // invalid when Kind is Added.
+ FunctionEffectWithCondition New; // invalid when Kind is Removed.
StringRef effectName() const {
if (Old.Effect.kind() != FunctionEffect::Kind::None)
diff --git a/clang/include/clang/Serialization/ASTReader.h b/clang/include/clang/Serialization/ASTReader.h
index 67032b684f4df0..46369b39cc4559 100644
--- a/clang/include/clang/Serialization/ASTReader.h
+++ b/clang/include/clang/Serialization/ASTReader.h
@@ -967,7 +967,7 @@ class ASTReader
llvm::SmallSetVector<GlobalDeclID, 4> DeclsToCheckForDeferredDiags;
/// The IDs of all decls with function effects to be checked.
- SmallVector<GlobalDeclID, 0> DeclsWithEffectsToVerify;
+ SmallVector<GlobalDeclID> DeclsWithEffectsToVerify;
private:
struct ImportedSubmodule {
diff --git a/clang/lib/AST/Type.cpp b/clang/lib/AST/Type.cpp
index 9c50b6b6087fa4..05b5e2c9b494c9 100644
--- a/clang/lib/AST/Type.cpp
+++ b/clang/lib/AST/Type.cpp
@@ -5290,21 +5290,24 @@ FunctionEffectSet FunctionEffectSet::getUnion(FunctionEffectsRef LHS,
return Combined;
}
+namespace clang {
+
+raw_ostream &operator<<(raw_ostream &OS,
+ const FunctionEffectWithCondition &CFE) {
+ OS << CFE.Effect.name();
+ if (Expr *E = CFE.Cond.getCondition()) {
+ OS << '(';
+ E->dump();
+ OS << ')';
+ }
+ return OS;
+}
+
+} // namespace clang
+
LLVM_DUMP_METHOD void FunctionEffectsRef::dump(llvm::raw_ostream &OS) const {
OS << "Effects{";
- bool First = true;
- for (const auto &CFE : *this) {
- if (!First)
- OS << ", ";
- else
- First = false;
- OS << CFE.Effect.name();
- if (Expr *E = CFE.Cond.getCondition()) {
- OS << '(';
- E->dump();
- OS << ')';
- }
- }
+ llvm::interleaveComma(*this, OS);
OS << "}";
}
@@ -5314,14 +5317,7 @@ LLVM_DUMP_METHOD void FunctionEffectSet::dump(llvm::raw_ostream &OS) const {
LLVM_DUMP_METHOD void FunctionEffectKindSet::dump(llvm::raw_ostream &OS) const {
OS << "Effects{";
- bool First = true;
- for (const auto &Effect : *this) {
- if (!First)
- OS << ", ";
- else
- First = false;
- OS << Effect.name();
- }
+ llvm::interleaveComma(*this, OS);
OS << "}";
}
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 423ea54ec56313..c1df87bcacea01 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -90,10 +90,9 @@ struct Violation {
Violation(FunctionEffect Effect, ViolationID ID, ViolationSite VS,
SourceLocation Loc, const Decl *Callee = nullptr,
std::optional<FunctionEffect> CalleeEffect = std::nullopt)
- : Effect(Effect), ID(ID), Site(VS), Loc(Loc), Callee(Callee) {
- if (CalleeEffect)
- CalleeEffectPreventingInference = *CalleeEffect;
- }
+ : Effect(Effect), CalleeEffectPreventingInference(
+ CalleeEffect.value_or(FunctionEffect())),
+ ID(ID), Site(VS), Loc(Loc), Callee(Callee) {}
unsigned diagnosticSelectIndex() const {
return unsigned(ID) - unsigned(ViolationID::BaseDiagnosticIndex);
@@ -102,7 +101,7 @@ struct Violation {
enum class SpecialFuncType : uint8_t { None, OperatorNew, OperatorDelete };
enum class CallableType : uint8_t {
- // Unknown: probably function pointer
+ // Unknown: probably function pointer.
Unknown,
Function,
Virtual,
@@ -847,14 +846,14 @@ class Analyzer {
case ViolationID::AccessesThreadLocalVariable:
case ViolationID::AccessesObjCMethodOrProperty:
S.Diag(Viol1.Loc, diag::warn_func_effect_violation)
- << effectName << SiteDescIndex(CInfo.CDecl, &Viol1)
+ << SiteDescIndex(CInfo.CDecl, &Viol1) << effectName
<< Viol1.diagnosticSelectIndex();
MaybeAddSiteContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
break;
case ViolationID::CallsExprWithoutEffect:
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_expr_without_effect)
- << effectName << SiteDescIndex(CInfo.CDecl, &Viol1);
+ << SiteDescIndex(CInfo.CDecl, &Viol1) << effectName;
MaybeAddSiteContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
break;
@@ -864,7 +863,7 @@ class Analyzer {
std::string CalleeName = CalleeInfo.name(S);
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_func_without_effect)
- << effectName << SiteDescIndex(CInfo.CDecl, &Viol1)
+ << SiteDescIndex(CInfo.CDecl, &Viol1) << effectName
<< SiteDescIndex(CalleeInfo.CDecl, nullptr) << CalleeName;
MaybeAddSiteContext(CInfo.CDecl, Viol1);
MaybeAddTemplateNote(CInfo.CDecl);
@@ -1362,7 +1361,6 @@ void Sema::diagnoseFunctionEffectMergeConflicts(
}
}
-// Should only be called when getFunctionEffects() returns a non-empty set.
// Decl should be a FunctionDecl or BlockDecl.
void Sema::maybeAddDeclWithEffects(const Decl *D,
const FunctionEffectsRef &FX) {
diff --git a/clang/lib/Serialization/ASTReader.cpp b/clang/lib/Serialization/ASTReader.cpp
index 306bbc097a7df4..2a87631a603ab2 100644
--- a/clang/lib/Serialization/ASTReader.cpp
+++ b/clang/lib/Serialization/ASTReader.cpp
@@ -8397,19 +8397,14 @@ void ASTReader::InitializeSema(Sema &S) {
NewOverrides.applyOverrides(SemaObj->getLangOpts());
}
- if (!DeclsWithEffectsToVerify.empty()) {
- for (GlobalDeclID ID : DeclsWithEffectsToVerify) {
- Decl *D = GetDecl(ID);
- FunctionEffectsRef FX;
- if (auto *FD = dyn_cast<FunctionDecl>(D))
- FX = FD->getFunctionEffects();
- else if (auto *BD = dyn_cast<BlockDecl>(D))
- FX = BD->getFunctionEffects();
- if (!FX.empty())
- SemaObj->addDeclWithEffects(D, FX);
- }
- DeclsWithEffectsToVerify.clear();
- }
+ for (GlobalDeclID ID : DeclsWithEffectsToVerify) {
+ Decl *D = GetDecl(ID);
+ if (auto *FD = dyn_cast<FunctionDecl>(D))
+ SemaObj->addDeclWithEffects(FD, FD->getFunctionEffects());
+ else if (auto *BD = dyn_cast<BlockDecl>(D))
+ SemaObj->addDeclWithEffects(BD, BD->getFunctionEffects());
+ }
+ DeclsWithEffectsToVerify.clear();
SemaObj->OpenCLFeatures = OpenCLExtensions;
diff --git a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
index d2c25da462c404..b81d3d475e47fc 100644
--- a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
@@ -4,7 +4,7 @@
// These need '-fms-extensions' (and maybe '-fdeclspec')
void f1() [[clang::nonblocking]] {
- __try {} __except (1) {} // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ __try {} __except (1) {} // expected-warning {{function with 'nonblocking' attribute must not throw or catch exceptions}}
}
struct S {
@@ -20,7 +20,7 @@ struct S {
void f2() [[clang::nonblocking]] {
S a;
- a.x; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'S::get_x'}}
+ a.x; // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'S::get_x'}}
a.nb;
a.nb2;
}
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 2890199c609106..9ae30a39ff772c 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -9,21 +9,21 @@
void nb1() [[clang::nonblocking]]
{
- int *pInt = new int; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
- delete pInt; // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
+ int *pInt = new int; // expected-warning {{function with 'nonblocking' attribute must not allocate or deallocate memory}}
+ delete pInt; // expected-warning {{function with 'nonblocking' attribute must not allocate or deallocate memory}}
}
void nb2() [[clang::nonblocking]]
{
- static int global; // expected-warning {{'nonblocking' function must not have static local variables}}
+ static int global; // expected-warning {{function with 'nonblocking' attribute must not have static local variables}}
}
void nb3() [[clang::nonblocking]]
{
try {
- throw 42; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ throw 42; // expected-warning {{function with 'nonblocking' attribute must not throw or catch exceptions}}
}
- catch (...) { // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ catch (...) { // expected-warning {{function with 'nonblocking' attribute must not throw or catch exceptions}}
}
}
@@ -33,7 +33,7 @@ void nb4_not_inline(); // expected-note {{declaration cannot be inferred 'nonblo
void nb4() [[clang::nonblocking]]
{
nb4_inline(); // OK
- nb4_not_inline(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nb4_not_inline(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
}
@@ -44,7 +44,7 @@ struct HasVirtual {
void nb5() [[clang::nonblocking]]
{
HasVirtual hv;
- hv.unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ hv.unsafe(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
}
void nb6_unsafe(); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
@@ -55,21 +55,21 @@ void nb6_transitively_unsafe()
void nb6() [[clang::nonblocking]]
{
- nb6_transitively_unsafe(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nb6_transitively_unsafe(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
}
thread_local int tl_var{ 42 };
bool tl_test() [[clang::nonblocking]]
{
- return tl_var > 0; // expected-warning {{'nonblocking' function must not use thread-local variables}}
+ return tl_var > 0; // expected-warning {{function with 'nonblocking' attribute must not use thread-local variables}}
}
void nb7()
{
// Make sure we verify blocks
auto blk = ^() [[clang::nonblocking]] {
- throw 42; // expected-warning {{'nonblocking' block must not throw or catch exceptions}}
+ throw 42; // expected-warning {{block with 'nonblocking' attribute must not throw or catch exceptions}}
};
}
@@ -77,7 +77,7 @@ void nb8()
{
// Make sure we verify lambdas
auto lambda = []() [[clang::nonblocking]] {
- throw 42; // expected-warning {{'nonblocking' lambda must not throw or catch exceptions}}
+ throw 42; // expected-warning {{lambda with 'nonblocking' attribute must not throw or catch exceptions}}
};
}
@@ -92,7 +92,7 @@ void nb8a() [[clang::nonblocking]]
void nb8b() [[clang::nonblocking]]
{
// An unsafe lambda capture makes the outer function unsafe.
- auto unsafeCapture = [foo = new int]() { // expected-warning {{'nonblocking' function must not allocate or deallocate memory}}
+ auto unsafeCapture = [foo = new int]() { // expected-warning {{function with 'nonblocking' attribute must not allocate or deallocate memory}}
delete foo;
};
}
@@ -109,7 +109,7 @@ void nb8c()
struct Adder {
static T add_explicit(T x, T y) [[clang::nonblocking]]
{
- return x + y; // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ return x + y; // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
}
static T add_implicit(T x, T y)
{
@@ -140,7 +140,7 @@ void nb9() [[clang::nonblocking]]
Adder<int>::add_implicit(1, 2);
Adder<Stringy>::add_explicit({}, {}); // expected-note {{in template expansion here}}
- Adder<Stringy2>::add_implicit({}, {}); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}} \
+ Adder<Stringy2>::add_implicit({}, {}); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}} \
expected-note {{in template expansion here}}
}
@@ -149,7 +149,7 @@ void nb10(
void (*fp2)() [[clang::nonblocking]]
) [[clang::nonblocking]]
{
- fp1(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ fp1(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
fp2();
}
@@ -166,19 +166,19 @@ struct ComputedNB {
void nb11() [[clang::nonblocking]]
{
- nb11_no_inference_1(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
- nb11_no_inference_2(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ nb11_no_inference_1(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
+ nb11_no_inference_2(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
ComputedNB<true> CNB_true;
CNB_true.method();
ComputedNB<false> CNB_false;
- CNB_false.method(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function}}
+ CNB_false.method(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
}
// Verify that when attached to a redeclaration, the attribute successfully attaches.
void nb12() {
- static int x; // expected-warning {{'nonblocking' function must not have static local variables}}
+ static int x; // expected-warning {{function with 'nonblocking' attribute must not have static local variables}}
}
void nb12() [[clang::nonblocking]];
void nb13() [[clang::nonblocking]] { nb12(); }
@@ -212,18 +212,18 @@ void nb18(void (^block)() [[clang::nonblocking]]) [[clang::nonblocking]]
// Builtin functions
void nb19() [[clang::nonblocking]] {
__builtin_assume(1);
- void *ptr = __builtin_malloc(1); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_malloc'}}
- __builtin_free(ptr); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_free'}}
+ void *ptr = __builtin_malloc(1); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function '__builtin_malloc'}}
+ __builtin_free(ptr); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function '__builtin_free'}}
- void *p2 = __builtin_operator_new(1); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_operator_new'}}
- __builtin_operator_delete(p2); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function '__builtin_operator_delete'}}
+ void *p2 = __builtin_operator_new(1); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function '__builtin_operator_new'}}
+ __builtin_operator_delete(p2); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function '__builtin_operator_delete'}}
}
// Function try-block
void catches() try {} catch (...) {} // expected-note {{function cannot be inferred 'nonblocking' because it throws or catches exceptions}}
void nb20() [[clang::nonblocking]] {
- catches(); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'catches'}}
+ catches(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'catches'}}
}
struct S {
@@ -245,14 +245,14 @@ struct B {
};
void f() [[clang::nonblocking]] {
- S s1(3); // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'S::S'}}
- S s2(3.0); // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'S::S'}}
- A a; // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'A::A'}}
- B b; // expected-warning {{'nonblocking' function must not call non-'nonblocking' constructor 'B::B'}}
+ S s1(3); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' constructor 'S::S'}}
+ S s2(3.0); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' constructor 'S::S'}}
+ A a; // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' constructor 'A::A'}}
+ B b; // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' constructor 'B::B'}}
}
struct T {
- int x = badi(); // expected-warning {{'nonblocking' constructor's member initializer must not call non-'nonblocking' function 'badi'}}
+ int x = badi(); // expected-warning {{member initializer of constructor with 'nonblocking' attribute must not call non-'nonblocking' function 'badi'}}
T() [[clang::nonblocking]] {} // expected-note {{in constructor here}}
T(int x) [[clang::nonblocking]] : x(x) {} // OK
};
@@ -262,16 +262,16 @@ int badForDefaultArg(); // expected-note {{declaration cannot be inferred 'nonbl
expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}} \
expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
-void hasDefaultArg(int param = badForDefaultArg()) { // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'badForDefaultArg'}} \
+void hasDefaultArg(int param = badForDefaultArg()) { // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'badForDefaultArg'}} \
expected-note {{function cannot be inferred 'nonblocking' because it calls non-'nonblocking' function 'badForDefaultArg'}}
}
void nb21() [[clang::nonblocking]] {
hasDefaultArg(); // expected-note {{in evaluating default argument here}} \
- expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'hasDefaultArg'}}
+ expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'hasDefaultArg'}}
}
-void nb22(int param = badForDefaultArg()) [[clang::nonblocking]] { // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'badForDefaultArg'}}
+void nb22(int param = badForDefaultArg()) [[clang::nonblocking]] { // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'badForDefaultArg'}}
}
// Verify traversal of implicit code paths - constructors and destructors.
@@ -285,13 +285,13 @@ struct Unsafe {
Unsafe(int x); // expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}} expected-note {{declaration cannot be inferred 'nonblocking' because it has no definition in this translation unit}}
// Delegating initializer.
- Unsafe(float y) [[clang::nonblocking]] : Unsafe(int(y)) {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
+ Unsafe(float y) [[clang::nonblocking]] : Unsafe(int(y)) {} // expected-warning {{constructor with 'nonblocking' attribute must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
};
struct DerivedFromUnsafe : public Unsafe {
- DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
- DerivedFromUnsafe(int x) [[clang::nonblocking]] : Unsafe(x) {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
- ~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' destructor must not call non-'nonblocking' destructor 'Unsafe::~Unsafe'}}
+ DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{constructor with 'nonblocking' attribute must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
+ DerivedFromUnsafe(int x) [[clang::nonblocking]] : Unsafe(x) {} // expected-warning {{constructor with 'nonblocking' attribute must not call non-'nonblocking' constructor 'Unsafe::Unsafe'}}
+ ~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{destructor with 'nonblocking' attribute must not call non-'nonblocking' destructor 'Unsafe::~Unsafe'}}
};
// Virtual inheritance
@@ -303,9 +303,9 @@ struct VBase {
};
struct VDerived : virtual VBase {
- VDerived() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' constructor must not call non-'nonblocking' constructor 'VBase::VBase'}}
+ VDerived() [[clang::nonblocking]] {} // expected-warning {{constructor with 'nonblocking' attribute must not call non-'nonblocking' constructor 'VBase::VBase'}}
- ~VDerived() [[clang::nonblocking]] {} // expected-warning {{'nonblocking' destructor must not call non-'nonblocking' destructor 'VBase::~VBase'}}
+ ~VDerived() [[clang::nonblocking]] {} // expected-warning {{destructor with 'nonblocking' attribute must not call non-'nonblocking' destructor 'VBase::~VBase'}}
};
// Contexts where there is no function call, no diagnostic.
@@ -329,6 +329,6 @@ void g() [[clang::nonblocking]] {
// --- nonblocking implies noexcept ---
#pragma clang diagnostic warning "-Wperf-constraint-implies-noexcept"
-void needs_noexcept() [[clang::nonblocking]] // expected-warning {{'nonblocking' function should be declared noexcept}}
+void needs_noexcept() [[clang::nonblocking]] // expected-warning {{function with 'nonblocking' attribute should be declared noexcept}}
{
}
>From ba57bfbde08716c353110516bc0c9b78a7c2c95c Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 4 Sep 2024 16:43:35 -0700
Subject: [PATCH 42/59] Fix: Don't try to follow a deleted destructor. (Happens
with a std::optional<T>, which contains a union with a deleted destructor.
Exposed by a recent fix which wasn't following the complete chain of
destructors.)
---
clang/lib/Sema/SemaFunctionEffects.cpp | 3 ++-
.../Sema/attr-nonblocking-constraints.cpp | 23 +++++++++++++++++++
2 files changed, 25 insertions(+), 1 deletion(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index c1df87bcacea01..36bc20d52aeeab 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1077,7 +1077,8 @@ class Analyzer {
if (Ty->isRecordType()) {
if (const CXXRecordDecl *Class = Ty->getAsCXXRecordDecl()) {
- if (CXXDestructorDecl *Dtor = Class->getDestructor()) {
+ if (CXXDestructorDecl *Dtor = Class->getDestructor();
+ Dtor && !Dtor->isDeleted()) {
CallableInfo CI(*Dtor);
followCall(CI, CallSite);
}
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 9ae30a39ff772c..9838d842abcafc 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -294,6 +294,29 @@ struct DerivedFromUnsafe : public Unsafe {
~DerivedFromUnsafe() [[clang::nonblocking]] {} // expected-warning {{destructor with 'nonblocking' attribute must not call non-'nonblocking' destructor 'Unsafe::~Unsafe'}}
};
+// Don't try to follow a deleted destructor, as with std::optional<T>.
+struct HasDtor {
+ ~HasDtor() {}
+};
+
+template <typename T>
+struct Optional {
+ union {
+ char __null_state_;
+ T __val_;
+ };
+ bool engaged = false;
+
+ ~Optional() {
+ if (engaged)
+ __val_.~T();
+ }
+};
+
+void nb_opt() [[clang::nonblocking]] {
+ Optional<HasDtor> x;
+}
+
// Virtual inheritance
struct VBase {
int *Ptr;
>From 54feb05e7e697de5a98089693d1a6b3cabb0c37f Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 4 Sep 2024 17:33:42 -0700
Subject: [PATCH 43/59] Fix test broken by rewording of warnings.
---
clang/test/SemaObjCXX/attr-nonblocking-constraints.mm | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
index 262d647142d548..0ff72d3d6d19de 100644
--- a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
+++ b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
@@ -8,19 +8,19 @@ - (void)method;
@end
void nb1(OCClass *oc) [[clang::nonblocking]] {
- [oc method]; // expected-warning {{'nonblocking' function must not access ObjC methods or properties}}
+ [oc method]; // expected-warning {{function with 'nonblocking' attribute must not access ObjC methods or properties}}
}
void nb2(OCClass *oc) {
[oc method]; // expected-note {{function cannot be inferred 'nonblocking' because it accesses an ObjC method or property}}
}
void nb3(OCClass *oc) [[clang::nonblocking]] {
- nb2(oc); // expected-warning {{'nonblocking' function must not call non-'nonblocking' function 'nb2'}}
+ nb2(oc); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'nb2'}}
}
void nb4() [[clang::nonblocking]] {
@try {
- @throw @"foo"; // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ @throw @"foo"; // expected-warning {{function with 'nonblocking' attribute must not throw or catch exceptions}}
}
- @catch (...) { // expected-warning {{'nonblocking' function must not throw or catch exceptions}}
+ @catch (...) { // expected-warning {{function with 'nonblocking' attribute must not throw or catch exceptions}}
}
}
>From 93cb74ea642cc231d551ed715e758fe63bd42707 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 5 Sep 2024 06:55:26 -0700
Subject: [PATCH 44/59] Fix: need to ignore concept requirements.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 5 +++++
.../test/Sema/attr-nonblocking-constraints.cpp | 18 ++++++++++++++++++
2 files changed, 23 insertions(+)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 36bc20d52aeeab..b65281ca9df2f7 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1289,6 +1289,11 @@ class Analyzer {
bool TraverseCXXNoexceptExpr(CXXNoexceptExpr *Node) { return true; }
bool TraverseCXXTypeidExpr(CXXTypeidExpr *Node) { return true; }
+
+ // Skip concept requirements since they don't generate code.
+ bool TraverseConceptRequirement(concepts::Requirement *R) {
+ return true;
+ }
};
};
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 9838d842abcafc..2a491a16dc723c 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -348,6 +348,24 @@ void g() [[clang::nonblocking]] {
#pragma clang diagnostic pop
}
+// Make sure we are skipping concept requirements -- they can trigger an unexpected
+// warning involving use of a function pointer (e.g. std::reverse_iterator::operator==
+struct HasFoo { int foo() const { return 0; } };
+
+template <class A, class B>
+inline bool compare(const A& a, const B& b)
+ requires requires {
+ a.foo();
+ }
+{
+ return a.foo() == b.foo();
+}
+
+void nb25() [[clang::nonblocking]] {
+ HasFoo a, b;
+ compare(a, b);
+}
+
// --- nonblocking implies noexcept ---
#pragma clang diagnostic warning "-Wperf-constraint-implies-noexcept"
>From d583c85fdd19028075b103481d2376c1b2ee6505 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Thu, 5 Sep 2024 07:12:22 -0700
Subject: [PATCH 45/59] clang-format
---
clang/lib/Sema/SemaFunctionEffects.cpp | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index b65281ca9df2f7..cc140386ed26f9 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1291,9 +1291,7 @@ class Analyzer {
bool TraverseCXXTypeidExpr(CXXTypeidExpr *Node) { return true; }
// Skip concept requirements since they don't generate code.
- bool TraverseConceptRequirement(concepts::Requirement *R) {
- return true;
- }
+ bool TraverseConceptRequirement(concepts::Requirement *R) { return true; }
};
};
>From cda1a9c520f01a9d51f782fb5a589c8f7686cd89 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Sat, 7 Sep 2024 06:15:39 -0700
Subject: [PATCH 46/59] Make the FunctionEffects and
PerfConstraintImpliesNoexcept diagnostics disabled by default, but enabled
with -Wall.
---
clang/include/clang/Basic/DiagnosticGroups.td | 13 +++++++------
clang/include/clang/Basic/DiagnosticSemaKinds.td | 16 ++++++++--------
.../Sema/attr-nonblocking-constraints-ms.cpp | 1 +
clang/test/Sema/attr-nonblocking-constraints.cpp | 1 +
clang/test/Sema/attr-nonblocking-sema.cpp | 2 ++
5 files changed, 19 insertions(+), 14 deletions(-)
diff --git a/clang/include/clang/Basic/DiagnosticGroups.td b/clang/include/clang/Basic/DiagnosticGroups.td
index 55d9442a939dae..5f79d2dad8cfd7 100644
--- a/clang/include/clang/Basic/DiagnosticGroups.td
+++ b/clang/include/clang/Basic/DiagnosticGroups.td
@@ -1128,12 +1128,18 @@ def ThreadSafetyBeta : DiagGroup<"thread-safety-beta">;
// Uniqueness Analysis warnings
def Consumed : DiagGroup<"consumed">;
+// Warnings and notes related to the function effects system underlying
+// the nonblocking and nonallocating attributes.
+def FunctionEffects : DiagGroup<"function-effects">;
+def PerfConstraintImpliesNoexcept : DiagGroup<"perf-constraint-implies-noexcept">;
+
// Note that putting warnings in -Wall will not disable them by default. If a
// warning should be active _only_ when -Wall is passed in, mark it as
// DefaultIgnore in addition to putting it here.
def All : DiagGroup<"all", [Most, Parentheses, Switch, SwitchBool,
MisleadingIndentation, PackedNonPod,
- VLACxxExtension]>;
+ VLACxxExtension, FunctionEffects,
+ PerfConstraintImpliesNoexcept]>;
// Warnings that should be in clang-cl /w4.
def : DiagGroup<"CL4", [All, Extra]>;
@@ -1554,11 +1560,6 @@ def ReadOnlyPlacementChecks : DiagGroup<"read-only-types">;
def UnsafeBufferUsageInContainer : DiagGroup<"unsafe-buffer-usage-in-container">;
def UnsafeBufferUsage : DiagGroup<"unsafe-buffer-usage", [UnsafeBufferUsageInContainer]>;
-// Warnings and notes related to the function effects system underlying
-// the nonblocking and nonallocating attributes.
-def FunctionEffects : DiagGroup<"function-effects">;
-def PerfConstraintImpliesNoexcept : DiagGroup<"perf-constraint-implies-noexcept">;
-
// Warnings and notes InstallAPI verification.
def InstallAPIViolation : DiagGroup<"installapi-violation">;
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index efdfd53616cc9d..9f5e8aa5f6dc8b 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10955,7 +10955,7 @@ def warn_func_effect_violation : Warning<
"with '%1' attribute "
"must not %select{allocate or deallocate memory|throw or catch exceptions|"
"have static local variables|use thread-local variables|access ObjC methods or properties}2">,
- InGroup<FunctionEffects>;
+ InGroup<FunctionEffects>, DefaultIgnore;
def note_func_effect_violation : Note<
"%select{function|constructor|destructor|lambda|block|member initializer}0 "
"cannot be inferred '%1' because it "
@@ -10968,7 +10968,7 @@ def warn_func_effect_calls_func_without_effect : Warning<
"must not call non-'%1' "
"%select{function|constructor|destructor|lambda|block}2 "
"'%3'">,
- InGroup<FunctionEffects>;
+ InGroup<FunctionEffects>, DefaultIgnore;
def note_func_effect_calls_func_without_effect : Note<
"%select{function|constructor|destructor|lambda|block|member initializer}0 "
"cannot be inferred '%1' because it calls non-'%1' "
@@ -10978,7 +10978,7 @@ def warn_func_effect_calls_expr_without_effect : Warning<
"%select{function|constructor|destructor|lambda|block|member initializer of constructor}0 "
"with '%1' attribute "
"must not call non-'%0' expression">,
- InGroup<FunctionEffects>;
+ InGroup<FunctionEffects>, DefaultIgnore;
def note_func_effect_call_extern : Note<
"declaration cannot be inferred '%0' because it has no definition in this translation unit">;
def note_func_effect_call_disallows_inference : Note<
@@ -10988,7 +10988,7 @@ def note_func_effect_call_indirect : Note<
"%select{virtual method|function pointer}0 cannot be inferred '%1'">;
def warn_perf_constraint_implies_noexcept : Warning<
"function with '%0' attribute should be declared noexcept">,
- InGroup<PerfConstraintImpliesNoexcept>;
+ InGroup<PerfConstraintImpliesNoexcept>, DefaultIgnore;
// FIXME: It would be nice if we could provide fuller template expansion notes.
def note_func_effect_from_template : Note<
@@ -11001,16 +11001,16 @@ def note_in_evaluating_default_argument : Note<
// spoofing nonblocking/nonallocating
def warn_invalid_add_func_effects : Warning<
"attribute '%0' should not be added via type conversion">,
- InGroup<FunctionEffects>;
+ InGroup<FunctionEffects>, DefaultIgnore;
def warn_mismatched_func_effect_override : Warning<
"attribute '%0' on overriding function does not match base declaration">,
- InGroup<FunctionEffects>;
+ InGroup<FunctionEffects>, DefaultIgnore;
def warn_mismatched_func_effect_redeclaration : Warning<
"attribute '%0' on function does not match previous declaration">,
- InGroup<FunctionEffects>;
+ InGroup<FunctionEffects>, DefaultIgnore;
def warn_conflicting_func_effects : Warning<
"effects conflict when merging declarations; kept '%0', discarded '%1'">,
- InGroup<FunctionEffects>;
+ InGroup<FunctionEffects>, DefaultIgnore;
def err_func_with_effects_no_prototype : Error<
"'%0' function must have a prototype">;
diff --git a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
index b81d3d475e47fc..5bf38dceedaed7 100644
--- a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
@@ -1,5 +1,6 @@
// RUN: %clang_cc1 -triple=x86_64-pc-win32 -fsyntax-only -fblocks -fcxx-exceptions -fms-extensions -verify %s
+#pragma clang diagnostic warning "-Wfunction-effects"
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
// These need '-fms-extensions' (and maybe '-fdeclspec')
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 2a491a16dc723c..c3bf05169e3247 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -2,6 +2,7 @@
// These are in a separate file because errors (e.g. incompatible attributes) currently prevent
// the FXAnalysis pass from running at all.
+#pragma clang diagnostic warning "-Wfunction-effects"
// This diagnostic is re-enabled and exercised in isolation later in this file.
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
diff --git a/clang/test/Sema/attr-nonblocking-sema.cpp b/clang/test/Sema/attr-nonblocking-sema.cpp
index 38bf2ac8f8a4cc..157fba79075fae 100644
--- a/clang/test/Sema/attr-nonblocking-sema.cpp
+++ b/clang/test/Sema/attr-nonblocking-sema.cpp
@@ -1,6 +1,8 @@
// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
// RUN: %clang_cc1 -fsyntax-only -fblocks -verify -x c -std=c23 %s
+#pragma clang diagnostic warning "-Wfunction-effects"
+
#if !__has_attribute(nonblocking)
#error "the 'nonblocking' attribute is not available"
#endif
>From 9c971c6e639039833d88446c5cc68064419fbcaa Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Sat, 7 Sep 2024 06:28:02 -0700
Subject: [PATCH 47/59] Add a release note.
---
clang/docs/ReleaseNotes.rst | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/clang/docs/ReleaseNotes.rst b/clang/docs/ReleaseNotes.rst
index ffdd063ec99037..c8462acff45fa9 100644
--- a/clang/docs/ReleaseNotes.rst
+++ b/clang/docs/ReleaseNotes.rst
@@ -387,6 +387,14 @@ New features
if class of allocation and deallocation function mismatches.
`Documentation <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator-c-c>`__.
+- Function effects (the ``nonblocking`` and ``nonallocating`` "performance constraint" attributes)
+ are now verified. Functions with the attribute are checked for language constructs which allocate
+ memory or block, such as using exceptions, static local or thread-local variables, or Objective-C
+ methods or properties. Implicit and explicit function calls are also checked. Called functions
+ must either have the required attribute, or have inline implementations which can be themselves
+ verified. The warnings are controlled by ``-Wfunction-effects``, which is now
+ disabled by default.
+
Crash and bug fixes
^^^^^^^^^^^^^^^^^^^
>From 9bfbe12976b013bcc0c11343b699f1e2aeaed6b0 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Mon, 9 Sep 2024 07:57:53 -0700
Subject: [PATCH 48/59] Fix botched format string in
warn_func_effect_calls_expr_without_effect
---
clang/include/clang/Basic/DiagnosticSemaKinds.td | 2 +-
clang/test/Sema/attr-nonblocking-constraints.cpp | 3 +++
2 files changed, 4 insertions(+), 1 deletion(-)
diff --git a/clang/include/clang/Basic/DiagnosticSemaKinds.td b/clang/include/clang/Basic/DiagnosticSemaKinds.td
index ec2906ffe08676..c071991e277539 100644
--- a/clang/include/clang/Basic/DiagnosticSemaKinds.td
+++ b/clang/include/clang/Basic/DiagnosticSemaKinds.td
@@ -10969,7 +10969,7 @@ def note_func_effect_calls_func_without_effect : Note<
def warn_func_effect_calls_expr_without_effect : Warning<
"%select{function|constructor|destructor|lambda|block|member initializer of constructor}0 "
"with '%1' attribute "
- "must not call non-'%0' expression">,
+ "must not call non-'%1' expression">,
InGroup<FunctionEffects>, DefaultIgnore;
def note_func_effect_call_extern : Note<
"declaration cannot be inferred '%0' because it has no definition in this translation unit">;
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index c3bf05169e3247..f1ac518389150b 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -152,6 +152,9 @@ void nb10(
{
fp1(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function}}
fp2();
+
+ // When there's a cast, there's a separate diagnostic.
+ static_cast<void (*)()>(fp1)(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' expression}}
}
// Interactions with nonblocking(false)
>From f06909b288dd0cd97e6353cc9c37b33b8a67e4e7 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Tue, 17 Sep 2024 09:30:36 -0700
Subject: [PATCH 49/59] Fix test failures introduced by last commit.
---
clang/test/Misc/warning-wall.c | 2 ++
clang/test/SemaObjCXX/attr-nonblocking-constraints.mm | 1 +
2 files changed, 3 insertions(+)
diff --git a/clang/test/Misc/warning-wall.c b/clang/test/Misc/warning-wall.c
index 4909ab034ef30a..b3b4b9ea8e01b5 100644
--- a/clang/test/Misc/warning-wall.c
+++ b/clang/test/Misc/warning-wall.c
@@ -108,5 +108,7 @@ CHECK-NEXT: -Wmisleading-indentation
CHECK-NEXT: -Wpacked-non-pod
CHECK-NEXT: -Wvla-cxx-extension
CHECK-NEXT: -Wvla-extension-static-assert
+CHECK-NEXT: -Wfunction-effects
+CHECK-NEXT: -Wperf-constraint-implies-noexcept
CHECK-NOT:-W
diff --git a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
index 0ff72d3d6d19de..f3fa984ffd9b70 100644
--- a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
+++ b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
@@ -1,5 +1,6 @@
// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -fobjc-exceptions -verify %s
+#pragma clang diagnostic warning "-Wfunction-effects"
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
// Objective-C
>From adcfd14962afc1a76d8505a6170aa0983a2f4edd Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 18 Sep 2024 07:31:16 -0700
Subject: [PATCH 50/59] If a function is noexcept and noreturn, exempt it from
effect analysis.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 4 ++++
clang/test/Sema/attr-nonblocking-constraints.cpp | 7 +++++++
2 files changed, 11 insertions(+)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index cc140386ed26f9..25cf88dec680a6 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1027,6 +1027,10 @@ class Analyzer {
return;
}
}
+ // If the callee is both noreturn and noexcept, it presumably
+ // terminates. Ignore it for the purposes of effect analysis.
+ if (FD->isNoReturn() && isNoexcept(FD))
+ return;
}
Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index f1ac518389150b..9318a43912b843 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -370,6 +370,13 @@ void nb25() [[clang::nonblocking]] {
compare(a, b);
}
+// If the callee is both noreturn and noexcept, it presumably terminates.
+// Ignore it for the purposes of effect analysis.
+[[noreturn]] void abort_wrapper() noexcept;
+
+void nb26() [[clang::nonblocking]] {
+ abort_wrapper(); // no diagnostic
+}
// --- nonblocking implies noexcept ---
#pragma clang diagnostic warning "-Wperf-constraint-implies-noexcept"
>From 17320b84b1275f31c1d7c855865a2761fa1d9dbe Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Mon, 23 Sep 2024 11:32:08 -0700
Subject: [PATCH 51/59] Remove the new diagnostics from `-Wall`. Fix a couple
of sentences in AttrDocs.td, to track changes in this PR.
---
clang/include/clang/Basic/AttrDocs.td | 4 ++--
clang/include/clang/Basic/DiagnosticGroups.td | 13 ++++++-------
clang/test/Misc/warning-wall.c | 2 --
3 files changed, 8 insertions(+), 11 deletions(-)
diff --git a/clang/include/clang/Basic/AttrDocs.td b/clang/include/clang/Basic/AttrDocs.td
index ef077db298831f..e31cf01357f506 100644
--- a/clang/include/clang/Basic/AttrDocs.td
+++ b/clang/include/clang/Basic/AttrDocs.td
@@ -8367,9 +8367,9 @@ compiler warnings:
- A redeclaration of a ``nonblocking`` or ``nonallocating`` function must also be declared with
the same attribute (or a stronger one). A redeclaration may add an attribute.
-The warnings are controlled by ``-Wfunction-effects``, which is enabled by default.
+The warnings are controlled by ``-Wfunction-effects``, which is disabled by default.
-In a future commit, the compiler will diagnose function calls from ``nonblocking`` and ``nonallocating``
+The compiler also diagnoses function calls from ``nonblocking`` and ``nonallocating``
functions to other functions which lack the appropriate attribute.
}];
}
diff --git a/clang/include/clang/Basic/DiagnosticGroups.td b/clang/include/clang/Basic/DiagnosticGroups.td
index 851ad601a0b835..46972d4244cdb1 100644
--- a/clang/include/clang/Basic/DiagnosticGroups.td
+++ b/clang/include/clang/Basic/DiagnosticGroups.td
@@ -1128,18 +1128,12 @@ def ThreadSafetyBeta : DiagGroup<"thread-safety-beta">;
// Uniqueness Analysis warnings
def Consumed : DiagGroup<"consumed">;
-// Warnings and notes related to the function effects system underlying
-// the nonblocking and nonallocating attributes.
-def FunctionEffects : DiagGroup<"function-effects">;
-def PerfConstraintImpliesNoexcept : DiagGroup<"perf-constraint-implies-noexcept">;
-
// Note that putting warnings in -Wall will not disable them by default. If a
// warning should be active _only_ when -Wall is passed in, mark it as
// DefaultIgnore in addition to putting it here.
def All : DiagGroup<"all", [Most, Parentheses, Switch, SwitchBool,
MisleadingIndentation, PackedNonPod,
- VLACxxExtension, FunctionEffects,
- PerfConstraintImpliesNoexcept]>;
+ VLACxxExtension]>;
// Warnings that should be in clang-cl /w4.
def : DiagGroup<"CL4", [All, Extra]>;
@@ -1567,6 +1561,11 @@ def UnsafeBufferUsageInContainer : DiagGroup<"unsafe-buffer-usage-in-container">
def UnsafeBufferUsageInLibcCall : DiagGroup<"unsafe-buffer-usage-in-libc-call">;
def UnsafeBufferUsage : DiagGroup<"unsafe-buffer-usage", [UnsafeBufferUsageInContainer, UnsafeBufferUsageInLibcCall]>;
+// Warnings and notes related to the function effects system underlying
+// the nonblocking and nonallocating attributes.
+def FunctionEffects : DiagGroup<"function-effects">;
+def PerfConstraintImpliesNoexcept : DiagGroup<"perf-constraint-implies-noexcept">;
+
// Warnings and notes InstallAPI verification.
def InstallAPIViolation : DiagGroup<"installapi-violation">;
diff --git a/clang/test/Misc/warning-wall.c b/clang/test/Misc/warning-wall.c
index b3b4b9ea8e01b5..4909ab034ef30a 100644
--- a/clang/test/Misc/warning-wall.c
+++ b/clang/test/Misc/warning-wall.c
@@ -108,7 +108,5 @@ CHECK-NEXT: -Wmisleading-indentation
CHECK-NEXT: -Wpacked-non-pod
CHECK-NEXT: -Wvla-cxx-extension
CHECK-NEXT: -Wvla-extension-static-assert
-CHECK-NEXT: -Wfunction-effects
-CHECK-NEXT: -Wperf-constraint-implies-noexcept
CHECK-NOT:-W
>From 909d7ff0a468c80d94315d1a62ebab3bfeafc2e1 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <doug at sonosphere.com>
Date: Mon, 23 Sep 2024 15:17:45 -0700
Subject: [PATCH 52/59] Apply suggestions from code review
Co-authored-by: Sirraide <aeternalmail at gmail.com>
---
clang/docs/ReleaseNotes.rst | 7 +------
clang/include/clang/Sema/Sema.h | 4 ++--
clang/lib/Sema/SemaFunctionEffects.cpp | 10 ++++------
3 files changed, 7 insertions(+), 14 deletions(-)
diff --git a/clang/docs/ReleaseNotes.rst b/clang/docs/ReleaseNotes.rst
index 1641395eb9a66f..bd2cd688a9d9de 100644
--- a/clang/docs/ReleaseNotes.rst
+++ b/clang/docs/ReleaseNotes.rst
@@ -513,12 +513,7 @@ New features
`Documentation <https://clang.llvm.org/docs/analyzer/checkers.html#unix-mismatcheddeallocator-c-c>`__.
- Function effects (the ``nonblocking`` and ``nonallocating`` "performance constraint" attributes)
- are now verified. Functions with the attribute are checked for language constructs which allocate
- memory or block, such as using exceptions, static local or thread-local variables, or Objective-C
- methods or properties. Implicit and explicit function calls are also checked. Called functions
- must either have the required attribute, or have inline implementations which can be themselves
- verified. The warnings are controlled by ``-Wfunction-effects``, which is now
- disabled by default.
+ are now verified.
Crash and bug fixes
^^^^^^^^^^^^^^^^^^^
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index 3854c6f65d039b..94ae608d205fe8 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -15028,8 +15028,8 @@ class Sema final : public SemaBase {
FunctionEffect::Kind EffectKind;
Kind DiffKind;
- FunctionEffectWithCondition Old; // invalid when Kind is Added.
- FunctionEffectWithCondition New; // invalid when Kind is Removed.
+ FunctionEffectWithCondition Old; // Invalid when 'Kind' is 'Added'.
+ FunctionEffectWithCondition New; // Invalid when 'Kind' is 'Removed'.
StringRef effectName() const {
if (Old.Effect.kind() != FunctionEffect::Kind::None)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 25cf88dec680a6..8d7fbacc64a2f9 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -206,7 +206,6 @@ static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
case Builtin::ID::BIvscanf:
case Builtin::ID::BIvfscanf:
case Builtin::ID::BIvsscanf:
-
Result.insert(FunctionEffect(FunctionEffect::Kind::Blocking));
break;
}
@@ -318,7 +317,7 @@ class EffectToViolationMap {
return nullptr;
auto *Iter =
- std::find_if(Impl->begin(), Impl->end(),
+ llvm::find_if(*Impl,
[&](const auto &Item) { return Item.Effect == Key; });
return Iter != Impl->end() ? &*Iter : nullptr;
}
@@ -417,8 +416,7 @@ class PendingFunctionAnalysis {
ArrayRef<Violation> getSortedViolationsForExplicitEffects(SourceManager &SM) {
if (!ViolationsForExplicitEffects.empty())
- std::sort(ViolationsForExplicitEffects.begin(),
- ViolationsForExplicitEffects.end(),
+ llvm::sort(ViolationsForExplicitEffects,
[&SM](const Violation &LHS, const Violation &RHS) {
return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
});
@@ -527,9 +525,9 @@ class Analyzer {
CallableInfo CI(*item.first);
const auto AP = item.second;
OS << item.first << " " << CI.name(SemaRef) << " : ";
- if (AP.isNull())
+ if (AP.isNull()) {
OS << "null\n";
- else if (isa<CompleteFunctionAnalysis *>(AP)) {
+ } else if (isa<CompleteFunctionAnalysis *>(AP)) {
auto *CFA = AP.get<CompleteFunctionAnalysis *>();
OS << CFA << " ";
CFA->dump(OS);
>From 9367103393d8ffa8535cbc1a1a8f0bb6f57bf626 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Mon, 23 Sep 2024 15:28:59 -0700
Subject: [PATCH 53/59] Review feedback: - Make FunctionEffectKindSet only as
large as necessary. - Rename FunctionEffectDifferences ->
FunctionEffectDiffVector. - Rename CallableInfo::name() ->
getNameForDiagnostic(). - Use ranges with algorithms.
---
clang/include/clang/AST/Type.h | 22 +++++++---
clang/include/clang/Sema/Sema.h | 6 +--
clang/lib/Sema/Sema.cpp | 2 +-
clang/lib/Sema/SemaDecl.cpp | 2 +-
clang/lib/Sema/SemaDeclCXX.cpp | 2 +-
clang/lib/Sema/SemaFunctionEffects.cpp | 43 ++++++++++---------
.../Sema/attr-nonblocking-constraints-ms.cpp | 3 +-
.../Sema/attr-nonblocking-constraints.cpp | 3 +-
clang/test/Sema/attr-nonblocking-sema.cpp | 8 ++--
.../attr-nonblocking-constraints.mm | 3 +-
10 files changed, 50 insertions(+), 44 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index fe2d0abc922d24..e7bdef68a1ee17 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4719,8 +4719,9 @@ class FunctionEffect {
NonBlocking = 1,
NonAllocating = 2,
Blocking = 3,
- Allocating = 4
+ Allocating = 4,
};
+ constexpr static size_t KindMaximum = 4;
/// Flags describing some behaviors of the effect.
using Flags = unsigned;
@@ -4958,20 +4959,23 @@ class FunctionEffectsRef {
/// A mutable set of FunctionEffect::Kind.
class FunctionEffectKindSet {
// For now this only needs to be a bitmap.
- constexpr static size_t EndBitPos = 8;
+ constexpr static size_t EndBitPos = FunctionEffect::KindMaximum;
using KindBitsT = std::bitset<EndBitPos>;
KindBitsT KindBits{};
explicit FunctionEffectKindSet(KindBitsT KB) : KindBits(KB) {}
+ // Functions to translate between an effect kind, starting at 1, and a
+ // position in the bitset.
+
constexpr static size_t kindToPos(FunctionEffect::Kind K) {
- return static_cast<size_t>(K);
+ return static_cast<size_t>(K) - 1;
}
-public:
- FunctionEffectKindSet() = default;
- explicit FunctionEffectKindSet(FunctionEffectsRef FX) { insert(FX); }
+ constexpr static FunctionEffect::Kind posToKind(size_t Pos) {
+ return static_cast<FunctionEffect::Kind>(Pos + 1);
+ }
// Iterates through the bits which are set.
class iterator {
@@ -5001,10 +5005,14 @@ class FunctionEffectKindSet {
FunctionEffect operator*() const {
assert(Idx < EndBitPos && "Dereference of end iterator");
- return FunctionEffect(FunctionEffect::Kind(Idx));
+ return FunctionEffect(posToKind(Idx));
}
};
+public:
+ FunctionEffectKindSet() = default;
+ explicit FunctionEffectKindSet(FunctionEffectsRef FX) { insert(FX); }
+
iterator begin() const { return iterator(*this, 0); }
iterator end() const { return iterator(*this, EndBitPos); }
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index 94ae608d205fe8..d9d66f551c831e 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -15066,10 +15066,10 @@ class Sema final : public SemaBase {
const CXXMethodDecl &NewMethod, const FunctionEffectsRef &NewFX) const;
};
- struct FunctionEffectDifferences : public SmallVector<FunctionEffectDiff> {
+ struct FunctionEffectDiffVector : public SmallVector<FunctionEffectDiff> {
/// Caller should short-circuit by checking for equality first.
- FunctionEffectDifferences(const FunctionEffectsRef &Old,
- const FunctionEffectsRef &New);
+ FunctionEffectDiffVector(const FunctionEffectsRef &Old,
+ const FunctionEffectsRef &New);
};
/// All functions/lambdas/blocks which have bodies and which have a non-empty
diff --git a/clang/lib/Sema/Sema.cpp b/clang/lib/Sema/Sema.cpp
index 84bf2a7c292297..23eef1ecb44d95 100644
--- a/clang/lib/Sema/Sema.cpp
+++ b/clang/lib/Sema/Sema.cpp
@@ -644,7 +644,7 @@ void Sema::diagnoseFunctionEffectConversion(QualType DstType, QualType SrcType,
const auto SrcFX = FunctionEffectsRef::get(SrcType);
const auto DstFX = FunctionEffectsRef::get(DstType);
if (SrcFX != DstFX) {
- for (const auto &Diff : FunctionEffectDifferences(SrcFX, DstFX)) {
+ for (const auto &Diff : FunctionEffectDiffVector(SrcFX, DstFX)) {
if (Diff.shouldDiagnoseConversion(SrcType, SrcFX, DstType, DstFX))
Diag(Loc, diag::warn_invalid_add_func_effects) << Diff.effectName();
}
diff --git a/clang/lib/Sema/SemaDecl.cpp b/clang/lib/Sema/SemaDecl.cpp
index c13d553ad32126..2bbc7c91a8de4e 100644
--- a/clang/lib/Sema/SemaDecl.cpp
+++ b/clang/lib/Sema/SemaDecl.cpp
@@ -3803,7 +3803,7 @@ bool Sema::MergeFunctionDecl(FunctionDecl *New, NamedDecl *&OldD, Scope *S,
const auto OldFX = Old->getFunctionEffects();
const auto NewFX = New->getFunctionEffects();
if (OldFX != NewFX) {
- const auto Diffs = FunctionEffectDifferences(OldFX, NewFX);
+ const auto Diffs = FunctionEffectDiffVector(OldFX, NewFX);
for (const auto &Diff : Diffs) {
if (Diff.shouldDiagnoseRedeclaration(*Old, OldFX, *New, NewFX)) {
Diag(New->getLocation(),
diff --git a/clang/lib/Sema/SemaDeclCXX.cpp b/clang/lib/Sema/SemaDeclCXX.cpp
index 6b6fa98bf394ca..6008f4edc9b6c1 100644
--- a/clang/lib/Sema/SemaDeclCXX.cpp
+++ b/clang/lib/Sema/SemaDeclCXX.cpp
@@ -18179,7 +18179,7 @@ bool Sema::CheckOverridingFunctionAttributes(CXXMethodDecl *New,
if (OldFX != NewFXOrig) {
FunctionEffectSet NewFX(NewFXOrig);
- const auto Diffs = FunctionEffectDifferences(OldFX, NewFX);
+ const auto Diffs = FunctionEffectDiffVector(OldFX, NewFX);
FunctionEffectSet::Conflicts Errs;
for (const auto &Diff : Diffs) {
switch (Diff.shouldDiagnoseMethodOverride(*Old, OldFX, *New, NewFX)) {
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 8d7fbacc64a2f9..fb0069f6aa0e06 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -83,7 +83,8 @@ struct Violation {
ViolationID ID = ViolationID::None;
ViolationSite Site;
SourceLocation Loc;
- const Decl *Callee = nullptr; // Only valid for Calls*.
+ const Decl *Callee =
+ nullptr; // Only valid for ViolationIDs Calls{Decl,Expr}WithoutEffect.
Violation() = default;
@@ -275,7 +276,7 @@ struct CallableInfo {
}
/// Generate a name for logging and diagnostics.
- std::string name(Sema &S) const {
+ std::string getNameForDiagnostic(Sema &S) const {
std::string Name;
llvm::raw_string_ostream OS(Name);
@@ -298,6 +299,7 @@ class EffectToViolationMap {
// than 1), use a SmallVector with an inline capacity of 1. Since it
// is often empty, use a unique_ptr to the SmallVector.
// Note that Violation itself contains a FunctionEffect which is the key.
+ // FIXME: Is there a way to simplify this using existing data structures?
using ImplVec = llvm::SmallVector<Violation, 1>;
std::unique_ptr<ImplVec> Impl;
@@ -316,9 +318,8 @@ class EffectToViolationMap {
if (Impl == nullptr)
return nullptr;
- auto *Iter =
- llvm::find_if(*Impl,
- [&](const auto &Item) { return Item.Effect == Key; });
+ auto *Iter = llvm::find_if(
+ *Impl, [&](const auto &Item) { return Item.Effect == Key; });
return Iter != Impl->end() ? &*Iter : nullptr;
}
@@ -417,9 +418,9 @@ class PendingFunctionAnalysis {
ArrayRef<Violation> getSortedViolationsForExplicitEffects(SourceManager &SM) {
if (!ViolationsForExplicitEffects.empty())
llvm::sort(ViolationsForExplicitEffects,
- [&SM](const Violation &LHS, const Violation &RHS) {
- return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
- });
+ [&SM](const Violation &LHS, const Violation &RHS) {
+ return SM.isBeforeInTranslationUnit(LHS.Loc, RHS.Loc);
+ });
return ViolationsForExplicitEffects;
}
@@ -434,7 +435,7 @@ class PendingFunctionAnalysis {
OS << "; Calls: ";
for (const DirectCall &Call : UnverifiedDirectCalls) {
CallableInfo CI(*Call.Callee);
- OS << " " << CI.name(SemaRef);
+ OS << " " << CI.getNameForDiagnostic(SemaRef);
}
}
OS << "\n";
@@ -524,7 +525,7 @@ class Analyzer {
for (const auto &item : *this) {
CallableInfo CI(*item.first);
const auto AP = item.second;
- OS << item.first << " " << CI.name(SemaRef) << " : ";
+ OS << item.first << " " << CI.getNameForDiagnostic(SemaRef) << " : ";
if (AP.isNull()) {
OS << "null\n";
} else if (isa<CompleteFunctionAnalysis *>(AP)) {
@@ -642,7 +643,8 @@ class Analyzer {
// a fairly trivial move to a heap-allocated object.
PendingFunctionAnalysis FAnalysis(S, CInfo, AllInferrableEffectsToVerify);
- LLVM_DEBUG(llvm::dbgs() << "\nVerifying " << CInfo.name(S) << " ";
+ LLVM_DEBUG(llvm::dbgs()
+ << "\nVerifying " << CInfo.getNameForDiagnostic(S) << " ";
FAnalysis.dump(S, llvm::dbgs()););
FunctionBodyASTVisitor Visitor(*this, FAnalysis, CInfo);
@@ -683,8 +685,8 @@ class Analyzer {
// the possibility of inference. Deletes Pending.
void finishPendingAnalysis(const Decl *D, PendingFunctionAnalysis *Pending) {
CallableInfo Caller(*D);
- LLVM_DEBUG(llvm::dbgs()
- << "finishPendingAnalysis for " << Caller.name(S) << " : ";
+ LLVM_DEBUG(llvm::dbgs() << "finishPendingAnalysis for "
+ << Caller.getNameForDiagnostic(S) << " : ";
Pending->dump(S, llvm::dbgs()); llvm::dbgs() << "\n";);
for (const PendingFunctionAnalysis::DirectCall &Call :
Pending->unverifiedCalls()) {
@@ -726,9 +728,10 @@ class Analyzer {
if (!Callee.isVerifiable())
IsInferencePossible = false;
- LLVM_DEBUG(llvm::dbgs() << "followCall from " << Caller.name(S) << " to "
- << Callee.name(S) << "; verifiable: "
- << Callee.isVerifiable() << "; callee ";
+ LLVM_DEBUG(llvm::dbgs()
+ << "followCall from " << Caller.getNameForDiagnostic(S)
+ << " to " << Callee.getNameForDiagnostic(S)
+ << "; verifiable: " << Callee.isVerifiable() << "; callee ";
CalleeEffects.dump(llvm::dbgs()); llvm::dbgs() << "\n";
llvm::dbgs() << " callee " << Callee.CDecl << " canonical "
<< Callee.CDecl->getCanonicalDecl() << "\n";);
@@ -858,7 +861,7 @@ class Analyzer {
case ViolationID::CallsDeclWithoutEffect: {
CallableInfo CalleeInfo(*Viol1.Callee);
- std::string CalleeName = CalleeInfo.name(S);
+ std::string CalleeName = CalleeInfo.getNameForDiagnostic(S);
S.Diag(Viol1.Loc, diag::warn_func_effect_calls_func_without_effect)
<< SiteDescIndex(CInfo.CDecl, &Viol1) << effectName
@@ -935,14 +938,14 @@ class Analyzer {
S.Diag(Viol2.Loc, diag::note_func_effect_calls_func_without_effect)
<< SiteDescIndex(CalleeInfo.CDecl, &Viol2) << effectName
<< SiteDescIndex(Viol2.Callee, nullptr)
- << MaybeNextCallee->name(S);
+ << MaybeNextCallee->getNameForDiagnostic(S);
break;
}
MaybeAddTemplateNote(Callee);
Callee = Viol2.Callee;
if (MaybeNextCallee) {
CalleeInfo = *MaybeNextCallee;
- CalleeName = CalleeInfo.name(S);
+ CalleeName = CalleeInfo.getNameForDiagnostic(S);
}
}
} break;
@@ -1417,7 +1420,7 @@ void Sema::performFunctionEffectAnalysis(TranslationUnitDecl *TU) {
Analyzer{*this}.run(*TU);
}
-Sema::FunctionEffectDifferences::FunctionEffectDifferences(
+Sema::FunctionEffectDiffVector::FunctionEffectDiffVector(
const FunctionEffectsRef &Old, const FunctionEffectsRef &New) {
FunctionEffectsRef::iterator POld = Old.begin();
diff --git a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
index 5bf38dceedaed7..dcbcef410987f5 100644
--- a/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints-ms.cpp
@@ -1,6 +1,5 @@
-// RUN: %clang_cc1 -triple=x86_64-pc-win32 -fsyntax-only -fblocks -fcxx-exceptions -fms-extensions -verify %s
+// RUN: %clang_cc1 -triple=x86_64-pc-win32 -fsyntax-only -fblocks -fcxx-exceptions -fms-extensions -verify -Wfunction-effects %s
-#pragma clang diagnostic warning "-Wfunction-effects"
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
// These need '-fms-extensions' (and maybe '-fdeclspec')
diff --git a/clang/test/Sema/attr-nonblocking-constraints.cpp b/clang/test/Sema/attr-nonblocking-constraints.cpp
index 9318a43912b843..377bb0ef36313a 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.cpp
+++ b/clang/test/Sema/attr-nonblocking-constraints.cpp
@@ -1,8 +1,7 @@
-// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -std=c++20 -verify %s
+// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -std=c++20 -verify -Wfunction-effects %s
// These are in a separate file because errors (e.g. incompatible attributes) currently prevent
// the FXAnalysis pass from running at all.
-#pragma clang diagnostic warning "-Wfunction-effects"
// This diagnostic is re-enabled and exercised in isolation later in this file.
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
diff --git a/clang/test/Sema/attr-nonblocking-sema.cpp b/clang/test/Sema/attr-nonblocking-sema.cpp
index 157fba79075fae..9056f81f5296b9 100644
--- a/clang/test/Sema/attr-nonblocking-sema.cpp
+++ b/clang/test/Sema/attr-nonblocking-sema.cpp
@@ -1,7 +1,5 @@
-// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify %s
-// RUN: %clang_cc1 -fsyntax-only -fblocks -verify -x c -std=c23 %s
-
-#pragma clang diagnostic warning "-Wfunction-effects"
+// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -verify -Wfunction-effects %s
+// RUN: %clang_cc1 -fsyntax-only -fblocks -verify -x c -std=c23 -Wfunction-effects %s
#if !__has_attribute(nonblocking)
#error "the 'nonblocking' attribute is not available"
@@ -79,7 +77,7 @@ void type_conversions()
void (*fp_nonallocating)() [[clang::nonallocating]];
fp_nonallocating = nullptr;
fp_nonallocating = nonallocating;
- fp_nonallocating = nonblocking; // no warning because nonblocking includes nonallocating fp_nonallocating = unannotated;
+ fp_nonallocating = nonblocking; // no warning because nonblocking includes nonallocating
fp_nonallocating = unannotated; // expected-warning {{attribute 'nonallocating' should not be added via type conversion}}
}
diff --git a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
index f3fa984ffd9b70..abd0938ac321af 100644
--- a/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
+++ b/clang/test/SemaObjCXX/attr-nonblocking-constraints.mm
@@ -1,6 +1,5 @@
-// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -fobjc-exceptions -verify %s
+// RUN: %clang_cc1 -fsyntax-only -fblocks -fcxx-exceptions -fobjc-exceptions -verify -Wfunction-effects %s
-#pragma clang diagnostic warning "-Wfunction-effects"
#pragma clang diagnostic ignored "-Wperf-constraint-implies-noexcept"
// Objective-C
>From eb782e00023949bfc884af4cf5f8254145dd96a1 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Tue, 24 Sep 2024 07:19:01 -0700
Subject: [PATCH 54/59] - Add constraint tests for plain C. - Prevent crash in
isNoexcept if a FunctionDecl doesn't have a prototype. - [[noreturn]] alone
(without noexcept) is enough to exclude a callee from diagnostics if plain C.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 12 ++++++------
clang/test/Sema/attr-nonblocking-constraints.c | 18 ++++++++++++++++++
2 files changed, 24 insertions(+), 6 deletions(-)
create mode 100644 clang/test/Sema/attr-nonblocking-constraints.c
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index fb0069f6aa0e06..d6021bb4ebe3e6 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -121,10 +121,8 @@ static bool functionIsVerifiable(const FunctionDecl *FD) {
}
static bool isNoexcept(const FunctionDecl *FD) {
- const auto *FPT = FD->getType()->castAs<FunctionProtoType>();
- if (FPT->isNothrow() || FD->hasAttr<NoThrowAttr>())
- return true;
- return false;
+ const auto *FPT = FD->getType()->getAs<FunctionProtoType>();
+ return FPT && (FPT->isNothrow() || FD->hasAttr<NoThrowAttr>());
}
// This list is probably incomplete.
@@ -1028,9 +1026,11 @@ class Analyzer {
return;
}
}
- // If the callee is both noreturn and noexcept, it presumably
+ // If the callee is both `noreturn` and `noexcept`, it presumably
// terminates. Ignore it for the purposes of effect analysis.
- if (FD->isNoReturn() && isNoexcept(FD))
+ // If not C++, `noreturn` alone is sufficient.
+ if (FD->isNoReturn() &&
+ (!Outer.S.getLangOpts().CPlusPlus || isNoexcept(FD)))
return;
}
diff --git a/clang/test/Sema/attr-nonblocking-constraints.c b/clang/test/Sema/attr-nonblocking-constraints.c
new file mode 100644
index 00000000000000..03e040c1851ffc
--- /dev/null
+++ b/clang/test/Sema/attr-nonblocking-constraints.c
@@ -0,0 +1,18 @@
+// RUN: %clang_cc1 -fsyntax-only -verify -std=c89 -Wfunction-effects %s
+
+// Tests for a few cases involving C functions without prototypes.
+
+void hasproto(void) __attribute__((blocking)); // expected-note {{function does not permit inference of 'nonblocking' because it is declared 'blocking'}}
+
+// Has no prototype, inferably safe.
+void nb1() {}
+
+// Has no prototype, noreturn.
+[[noreturn]]
+void aborts();
+
+void nb2(void) __attribute__((nonblocking)) {
+ hasproto(); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'hasproto'}}
+ nb1();
+ aborts(); // no diagnostic because it's noreturn.
+}
>From eccc7cff686d37917f047542b392a9e36af07539 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Tue, 24 Sep 2024 07:37:58 -0700
Subject: [PATCH 55/59] -Wperf-constraint-implies-noexcept is part of -Wall
again
---
clang/include/clang/Basic/DiagnosticGroups.td | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/clang/include/clang/Basic/DiagnosticGroups.td b/clang/include/clang/Basic/DiagnosticGroups.td
index 46972d4244cdb1..a85768d7ca72d1 100644
--- a/clang/include/clang/Basic/DiagnosticGroups.td
+++ b/clang/include/clang/Basic/DiagnosticGroups.td
@@ -1125,6 +1125,11 @@ def ThreadSafety : DiagGroup<"thread-safety",
def ThreadSafetyVerbose : DiagGroup<"thread-safety-verbose">;
def ThreadSafetyBeta : DiagGroup<"thread-safety-beta">;
+// Warnings and notes related to the function effects system which underlies
+// the nonblocking and nonallocating attributes.
+def FunctionEffects : DiagGroup<"function-effects">;
+def PerfConstraintImpliesNoexcept : DiagGroup<"perf-constraint-implies-noexcept">;
+
// Uniqueness Analysis warnings
def Consumed : DiagGroup<"consumed">;
@@ -1133,7 +1138,7 @@ def Consumed : DiagGroup<"consumed">;
// DefaultIgnore in addition to putting it here.
def All : DiagGroup<"all", [Most, Parentheses, Switch, SwitchBool,
MisleadingIndentation, PackedNonPod,
- VLACxxExtension]>;
+ VLACxxExtension, PerfConstraintImpliesNoexcept]>;
// Warnings that should be in clang-cl /w4.
def : DiagGroup<"CL4", [All, Extra]>;
@@ -1561,11 +1566,6 @@ def UnsafeBufferUsageInContainer : DiagGroup<"unsafe-buffer-usage-in-container">
def UnsafeBufferUsageInLibcCall : DiagGroup<"unsafe-buffer-usage-in-libc-call">;
def UnsafeBufferUsage : DiagGroup<"unsafe-buffer-usage", [UnsafeBufferUsageInContainer, UnsafeBufferUsageInLibcCall]>;
-// Warnings and notes related to the function effects system underlying
-// the nonblocking and nonallocating attributes.
-def FunctionEffects : DiagGroup<"function-effects">;
-def PerfConstraintImpliesNoexcept : DiagGroup<"perf-constraint-implies-noexcept">;
-
// Warnings and notes InstallAPI verification.
def InstallAPIViolation : DiagGroup<"installapi-violation">;
>From 220a1bff654285e40984c3c521b57e2668cc0d19 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 25 Sep 2024 15:33:56 -0700
Subject: [PATCH 56/59] Remove FunctionEffect::Kind::None as a sentinel; use
optionals instead.
---
clang/include/clang/AST/Type.h | 23 +++++++++------------
clang/include/clang/Sema/Sema.h | 12 ++++++-----
clang/lib/AST/Type.cpp | 13 ++----------
clang/lib/Sema/SemaDeclCXX.cpp | 2 +-
clang/lib/Sema/SemaFunctionEffects.cpp | 28 +++++++++-----------------
5 files changed, 29 insertions(+), 49 deletions(-)
diff --git a/clang/include/clang/AST/Type.h b/clang/include/clang/AST/Type.h
index e7bdef68a1ee17..d7835adf734707 100644
--- a/clang/include/clang/AST/Type.h
+++ b/clang/include/clang/AST/Type.h
@@ -4715,13 +4715,13 @@ class FunctionEffect {
public:
/// Identifies the particular effect.
enum class Kind : uint8_t {
- None = 0,
- NonBlocking = 1,
- NonAllocating = 2,
- Blocking = 3,
- Allocating = 4,
+ NonBlocking = 0,
+ NonAllocating = 1,
+ Blocking = 2,
+ Allocating = 3,
+
};
- constexpr static size_t KindMaximum = 4;
+ constexpr static size_t KindCount = 4;
/// Flags describing some behaviors of the effect.
using Flags = unsigned;
@@ -4747,8 +4747,6 @@ class FunctionEffect {
// be considered for uniqueness.
public:
- FunctionEffect() : FKind(Kind::None) {}
-
explicit FunctionEffect(Kind K) : FKind(K) {}
/// The kind of the effect.
@@ -4777,8 +4775,6 @@ class FunctionEffect {
case Kind::Blocking:
case Kind::Allocating:
return 0;
- case Kind::None:
- break;
}
llvm_unreachable("unknown effect kind");
}
@@ -4843,7 +4839,6 @@ struct FunctionEffectWithCondition {
FunctionEffect Effect;
EffectConditionExpr Cond;
- FunctionEffectWithCondition() = default;
FunctionEffectWithCondition(FunctionEffect E, const EffectConditionExpr &C)
: Effect(E), Cond(C) {}
@@ -4959,7 +4954,7 @@ class FunctionEffectsRef {
/// A mutable set of FunctionEffect::Kind.
class FunctionEffectKindSet {
// For now this only needs to be a bitmap.
- constexpr static size_t EndBitPos = FunctionEffect::KindMaximum;
+ constexpr static size_t EndBitPos = FunctionEffect::KindCount;
using KindBitsT = std::bitset<EndBitPos>;
KindBitsT KindBits{};
@@ -4970,11 +4965,11 @@ class FunctionEffectKindSet {
// position in the bitset.
constexpr static size_t kindToPos(FunctionEffect::Kind K) {
- return static_cast<size_t>(K) - 1;
+ return static_cast<size_t>(K);
}
constexpr static FunctionEffect::Kind posToKind(size_t Pos) {
- return static_cast<FunctionEffect::Kind>(Pos + 1);
+ return static_cast<FunctionEffect::Kind>(Pos);
}
// Iterates through the bits which are set.
diff --git a/clang/include/clang/Sema/Sema.h b/clang/include/clang/Sema/Sema.h
index d9d66f551c831e..30e4fa5d2fd121 100644
--- a/clang/include/clang/Sema/Sema.h
+++ b/clang/include/clang/Sema/Sema.h
@@ -15028,13 +15028,15 @@ class Sema final : public SemaBase {
FunctionEffect::Kind EffectKind;
Kind DiffKind;
- FunctionEffectWithCondition Old; // Invalid when 'Kind' is 'Added'.
- FunctionEffectWithCondition New; // Invalid when 'Kind' is 'Removed'.
+ std::optional<FunctionEffectWithCondition>
+ Old; // Invalid when 'Kind' is 'Added'.
+ std::optional<FunctionEffectWithCondition>
+ New; // Invalid when 'Kind' is 'Removed'.
StringRef effectName() const {
- if (Old.Effect.kind() != FunctionEffect::Kind::None)
- return Old.Effect.name();
- return New.Effect.name();
+ if (Old)
+ return Old.value().Effect.name();
+ return New.value().Effect.name();
}
/// Describes the result of effects differing between a base class's virtual
diff --git a/clang/lib/AST/Type.cpp b/clang/lib/AST/Type.cpp
index 8542c16a8e10e2..c92dc881dba537 100644
--- a/clang/lib/AST/Type.cpp
+++ b/clang/lib/AST/Type.cpp
@@ -5117,8 +5117,6 @@ FunctionEffect::Kind FunctionEffect::oppositeKind() const {
return Kind::Allocating;
case Kind::Allocating:
return Kind::NonAllocating;
- case Kind::None:
- return Kind::None;
}
llvm_unreachable("unknown effect kind");
}
@@ -5133,8 +5131,6 @@ StringRef FunctionEffect::name() const {
return "blocking";
case Kind::Allocating:
return "allocating";
- case Kind::None:
- return "(none)";
}
llvm_unreachable("unknown effect kind");
}
@@ -5159,11 +5155,8 @@ std::optional<FunctionEffect> FunctionEffect::effectProhibitingInference(
case Kind::Blocking:
assert(0 && "effectProhibitingInference with non-inferable effect kind");
break;
-
- case Kind::None:
- break;
}
- llvm_unreachable("unknown effect kind or None");
+ llvm_unreachable("unknown effect kind");
}
bool FunctionEffect::shouldDiagnoseFunctionCall(
@@ -5185,10 +5178,8 @@ bool FunctionEffect::shouldDiagnoseFunctionCall(
case Kind::Allocating:
case Kind::Blocking:
return false;
- case Kind::None:
- break;
}
- llvm_unreachable("unknown effect kind or None");
+ llvm_unreachable("unknown effect kind");
}
// =====
diff --git a/clang/lib/Sema/SemaDeclCXX.cpp b/clang/lib/Sema/SemaDeclCXX.cpp
index 6008f4edc9b6c1..9c172c3c181899 100644
--- a/clang/lib/Sema/SemaDeclCXX.cpp
+++ b/clang/lib/Sema/SemaDeclCXX.cpp
@@ -18192,7 +18192,7 @@ bool Sema::CheckOverridingFunctionAttributes(CXXMethodDecl *New,
<< Old->getReturnTypeSourceRange();
break;
case FunctionEffectDiff::OverrideResult::Merge: {
- NewFX.insert(Diff.Old, Errs);
+ NewFX.insert(Diff.Old.value(), Errs);
const auto *NewFT = New->getType()->castAs<FunctionProtoType>();
FunctionProtoType::ExtProtoInfo EPI = NewFT->getExtProtoInfo();
EPI.FunctionEffects = FunctionEffectsRef(NewFX);
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index d6021bb4ebe3e6..35e59c542caf77 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -78,7 +78,7 @@ class ViolationSite {
// be inferred as holding that effect.
struct Violation {
FunctionEffect Effect;
- FunctionEffect
+ std::optional<FunctionEffect>
CalleeEffectPreventingInference; // Only for certain IDs; can be None.
ViolationID ID = ViolationID::None;
ViolationSite Site;
@@ -86,14 +86,11 @@ struct Violation {
const Decl *Callee =
nullptr; // Only valid for ViolationIDs Calls{Decl,Expr}WithoutEffect.
- Violation() = default;
-
Violation(FunctionEffect Effect, ViolationID ID, ViolationSite VS,
SourceLocation Loc, const Decl *Callee = nullptr,
std::optional<FunctionEffect> CalleeEffect = std::nullopt)
- : Effect(Effect), CalleeEffectPreventingInference(
- CalleeEffect.value_or(FunctionEffect())),
- ID(ID), Site(VS), Loc(Loc), Callee(Callee) {}
+ : Effect(Effect), CalleeEffectPreventingInference(CalleeEffect), ID(ID),
+ Site(VS), Loc(Loc), Callee(Callee) {}
unsigned diagnosticSelectIndex() const {
return unsigned(ID) - unsigned(ViolationID::BaseDiagnosticIndex);
@@ -915,7 +912,7 @@ class Analyzer {
case ViolationID::DeclDisallowsInference:
S.Diag(Viol2.Loc, diag::note_func_effect_call_disallows_inference)
<< SiteDescIndex(CalleeInfo.CDecl, nullptr) << effectName
- << Viol2.CalleeEffectPreventingInference.name();
+ << Viol2.CalleeEffectPreventingInference->name();
break;
case ViolationID::CallsExprWithoutEffect:
S.Diag(Viol2.Loc, diag::note_func_effect_call_indirect)
@@ -1458,14 +1455,16 @@ Sema::FunctionEffectDiffVector::FunctionEffectDiffVector(
if (cmp < 0) {
// removal
FunctionEffectWithCondition Old = *POld;
- push_back(FunctionEffectDiff{
- Old.Effect.kind(), FunctionEffectDiff::Kind::Removed, Old, {}});
+ push_back(FunctionEffectDiff{Old.Effect.kind(),
+ FunctionEffectDiff::Kind::Removed, Old,
+ std::nullopt});
++POld;
} else if (cmp > 0) {
// addition
FunctionEffectWithCondition New = *PNew;
- push_back(FunctionEffectDiff{
- New.Effect.kind(), FunctionEffectDiff::Kind::Added, {}, New});
+ push_back(FunctionEffectDiff{New.Effect.kind(),
+ FunctionEffectDiff::Kind::Added,
+ std::nullopt, New});
++PNew;
} else {
++POld;
@@ -1506,8 +1505,6 @@ bool Sema::FunctionEffectDiff::shouldDiagnoseConversion(
case FunctionEffect::Kind::Blocking:
case FunctionEffect::Kind::Allocating:
return false;
- case FunctionEffect::Kind::None:
- break;
}
llvm_unreachable("unknown effect kind");
}
@@ -1531,8 +1528,6 @@ bool Sema::FunctionEffectDiff::shouldDiagnoseRedeclaration(
case FunctionEffect::Kind::Blocking:
case FunctionEffect::Kind::Allocating:
return false;
- case FunctionEffect::Kind::None:
- break;
}
llvm_unreachable("unknown effect kind");
}
@@ -1563,9 +1558,6 @@ Sema::FunctionEffectDiff::shouldDiagnoseMethodOverride(
case FunctionEffect::Kind::Blocking:
case FunctionEffect::Kind::Allocating:
return OverrideResult::NoAction;
-
- case FunctionEffect::Kind::None:
- break;
}
llvm_unreachable("unknown effect kind");
}
>From a8fef93efe629216c4c0847918acccd8260fbe4c Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 25 Sep 2024 17:14:52 -0700
Subject: [PATCH 57/59] Ensure that setjmp() is not included in the special
treatment of `noreturn` functions.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 9 ++++++++-
clang/test/Headers/Inputs/include/setjmp.h | 3 +++
clang/test/Sema/attr-nonblocking-constraints.c | 11 ++++++++++-
3 files changed, 21 insertions(+), 2 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 35e59c542caf77..4c87fbf0b6e25e 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -158,6 +158,8 @@ static FunctionEffectKindSet getBuiltinFunctionEffects(unsigned BuiltinID) {
break;
// These block in some other way than allocating memory.
+ // longjmp() and friends are presumed unsafe because they are the moral
+ // equivalent of throwing a C++ exception, which is unsafe.
case Builtin::ID::BIlongjmp:
case Builtin::ID::BI_longjmp:
case Builtin::ID::BIsiglongjmp:
@@ -1016,17 +1018,22 @@ class Analyzer {
// Check for a call to a builtin function, whose effects are
// handled specially.
if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl)) {
+ bool IgnoreIfNoexceptNoreturn = true;
if (unsigned BuiltinID = FD->getBuiltinID()) {
CI.Effects = getBuiltinFunctionEffects(BuiltinID);
if (CI.Effects.empty()) {
// A builtin with no known effects is assumed safe.
return;
}
+ // A builtin WITH effects doesn't get any special treatment for
+ // being noreturn/noexcept, e.g. longjmp().
+ IgnoreIfNoexceptNoreturn = false;
}
+
// If the callee is both `noreturn` and `noexcept`, it presumably
// terminates. Ignore it for the purposes of effect analysis.
// If not C++, `noreturn` alone is sufficient.
- if (FD->isNoReturn() &&
+ if (IgnoreIfNoexceptNoreturn && FD->isNoReturn() &&
(!Outer.S.getLangOpts().CPlusPlus || isNoexcept(FD)))
return;
}
diff --git a/clang/test/Headers/Inputs/include/setjmp.h b/clang/test/Headers/Inputs/include/setjmp.h
index 3d5e903eff6fce..c24951e92501f9 100644
--- a/clang/test/Headers/Inputs/include/setjmp.h
+++ b/clang/test/Headers/Inputs/include/setjmp.h
@@ -5,4 +5,7 @@ typedef struct {
int x[42];
} jmp_buf;
+ __attribute__((noreturn))
+void longjmp(jmp_buf, int);
+
#endif
diff --git a/clang/test/Sema/attr-nonblocking-constraints.c b/clang/test/Sema/attr-nonblocking-constraints.c
index 03e040c1851ffc..e7ab661b3125a2 100644
--- a/clang/test/Sema/attr-nonblocking-constraints.c
+++ b/clang/test/Sema/attr-nonblocking-constraints.c
@@ -1,4 +1,4 @@
-// RUN: %clang_cc1 -fsyntax-only -verify -std=c89 -Wfunction-effects %s
+// RUN: %clang_cc1 -fsyntax-only -verify -std=c89 -Wfunction-effects -internal-isystem %S/../Headers/Inputs/include %s
// Tests for a few cases involving C functions without prototypes.
@@ -16,3 +16,12 @@ void nb2(void) __attribute__((nonblocking)) {
nb1();
aborts(); // no diagnostic because it's noreturn.
}
+
+#include <setjmp.h>
+
+void nb3(int x, int y) __attribute__((nonblocking)) {
+ if (x != y) {
+ jmp_buf jb;
+ longjmp(jb, 0); // expected-warning {{function with 'nonblocking' attribute must not call non-'nonblocking' function 'longjmp'}}
+ }
+}
>From 092bc169eb5f3aa60f19e8fbf654e75b289ab124 Mon Sep 17 00:00:00 2001
From: Doug Wyatt <doug at sonosphere.com>
Date: Wed, 25 Sep 2024 17:17:38 -0700
Subject: [PATCH 58/59] Update clang/lib/Sema/SemaFunctionEffects.cpp
Co-authored-by: Sirraide <aeternalmail at gmail.com>
---
clang/lib/Sema/SemaFunctionEffects.cpp | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index 4c87fbf0b6e25e..f7f521cb15e73e 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -79,7 +79,7 @@ class ViolationSite {
struct Violation {
FunctionEffect Effect;
std::optional<FunctionEffect>
- CalleeEffectPreventingInference; // Only for certain IDs; can be None.
+ CalleeEffectPreventingInference; // Only for certain IDs; can be nullopt.
ViolationID ID = ViolationID::None;
ViolationSite Site;
SourceLocation Loc;
>From 424a74b2ca9f386d6b63279eb9fe2a297e7cb9ec Mon Sep 17 00:00:00 2001
From: Doug Wyatt <dwyatt at apple.com>
Date: Wed, 25 Sep 2024 17:27:00 -0700
Subject: [PATCH 59/59] Builtins with effects don't get the noexcept/noreturn
special treatment.
---
clang/lib/Sema/SemaFunctionEffects.cpp | 19 +++++++++----------
1 file changed, 9 insertions(+), 10 deletions(-)
diff --git a/clang/lib/Sema/SemaFunctionEffects.cpp b/clang/lib/Sema/SemaFunctionEffects.cpp
index f7f521cb15e73e..9ae2e2931647dc 100644
--- a/clang/lib/Sema/SemaFunctionEffects.cpp
+++ b/clang/lib/Sema/SemaFunctionEffects.cpp
@@ -1018,7 +1018,6 @@ class Analyzer {
// Check for a call to a builtin function, whose effects are
// handled specially.
if (const auto *FD = dyn_cast<FunctionDecl>(CI.CDecl)) {
- bool IgnoreIfNoexceptNoreturn = true;
if (unsigned BuiltinID = FD->getBuiltinID()) {
CI.Effects = getBuiltinFunctionEffects(BuiltinID);
if (CI.Effects.empty()) {
@@ -1026,16 +1025,16 @@ class Analyzer {
return;
}
// A builtin WITH effects doesn't get any special treatment for
- // being noreturn/noexcept, e.g. longjmp().
- IgnoreIfNoexceptNoreturn = false;
+ // being noreturn/noexcept, e.g. longjmp(), so we skip the check
+ // below.
+ } else {
+ // If the callee is both `noreturn` and `noexcept`, it presumably
+ // terminates. Ignore it for the purposes of effect analysis.
+ // If not C++, `noreturn` alone is sufficient.
+ if (FD->isNoReturn() &&
+ (!Outer.S.getLangOpts().CPlusPlus || isNoexcept(FD)))
+ return;
}
-
- // If the callee is both `noreturn` and `noexcept`, it presumably
- // terminates. Ignore it for the purposes of effect analysis.
- // If not C++, `noreturn` alone is sufficient.
- if (IgnoreIfNoexceptNoreturn && FD->isNoReturn() &&
- (!Outer.S.getLangOpts().CPlusPlus || isNoexcept(FD)))
- return;
}
Outer.followCall(CurrentCaller, CurrentFunction, CI, CallLoc,
More information about the cfe-commits
mailing list