| ============ |
| Debug Checks |
| ============ |
| |
| .. contents:: |
| :local: |
| |
| The analyzer contains a number of checkers which can aid in debugging. Enable |
| them by using the "-analyzer-checker=" flag, followed by the name of the |
| checker. |
| |
| |
| General Analysis Dumpers |
| ======================== |
| |
| These checkers are used to dump the results of various infrastructural analyses |
| to stderr. Some checkers also have "view" variants, which will display a graph |
| using a 'dot' format viewer (such as Graphviz on OS X) instead. |
| |
| - debug.DumpCallGraph, debug.ViewCallGraph: Show the call graph generated for |
| the current translation unit. This is used to determine the order in which to |
| analyze functions when inlining is enabled. |
| |
| - debug.DumpCFG, debug.ViewCFG: Show the CFG generated for each top-level |
| function being analyzed. |
| |
| - debug.DumpDominators: Shows the dominance tree for the CFG of each top-level |
| function. |
| |
| - debug.DumpLiveVars: Show the results of live variable analysis for each |
| top-level function being analyzed. |
| |
| - debug.ViewExplodedGraph: Show the Exploded Graphs generated for the |
| analysis of different functions in the input translation unit. When there |
| are several functions analyzed, display one graph per function. Beware |
| that these graphs may grow very large, even for small functions. |
| |
| Path Tracking |
| ============= |
| |
| These checkers print information about the path taken by the analyzer engine. |
| |
| - debug.DumpCalls: Prints out every function or method call encountered during a |
| path traversal. This is indented to show the call stack, but does NOT do any |
| special handling of branches, meaning different paths could end up |
| interleaved. |
| |
| - debug.DumpTraversal: Prints the name of each branch statement encountered |
| during a path traversal ("IfStmt", "WhileStmt", etc). Currently used to check |
| whether the analysis engine is doing BFS or DFS. |
| |
| |
| State Checking |
| ============== |
| |
| These checkers will print out information about the analyzer state in the form |
| of analysis warnings. They are intended for use with the -verify functionality |
| in regression tests. |
| |
| - debug.TaintTest: Prints out the word "tainted" for every expression that |
| carries taint. At the time of this writing, taint was only introduced by the |
| checks under experimental.security.taint.TaintPropagation; this checker may |
| eventually move to the security.taint package. |
| |
| - debug.ExprInspection: Responds to certain function calls, which are modeled |
| after builtins. These function calls should affect the program state other |
| than the evaluation of their arguments; to use them, you will need to declare |
| them within your test file. The available functions are described below. |
| |
| (FIXME: debug.ExprInspection should probably be renamed, since it no longer only |
| inspects expressions.) |
| |
| |
| ExprInspection checks |
| --------------------- |
| |
| - ``void clang_analyzer_eval(bool);`` |
| |
| Prints TRUE if the argument is known to have a non-zero value, FALSE if the |
| argument is known to have a zero or null value, and UNKNOWN if the argument |
| isn't sufficiently constrained on this path. You can use this to test other |
| values by using expressions like "x == 5". Note that this functionality is |
| currently DISABLED in inlined functions, since different calls to the same |
| inlined function could provide different information, making it difficult to |
| write proper -verify directives. |
| |
| In C, the argument can be typed as 'int' or as '_Bool'. |
| |
| Example usage:: |
| |
| clang_analyzer_eval(x); // expected-warning{{UNKNOWN}} |
| if (!x) return; |
| clang_analyzer_eval(x); // expected-warning{{TRUE}} |
| |
| |
| - ``void clang_analyzer_checkInlined(bool);`` |
| |
| If a call occurs within an inlined function, prints TRUE or FALSE according to |
| the value of its argument. If a call occurs outside an inlined function, |
| nothing is printed. |
| |
| The intended use of this checker is to assert that a function is inlined at |
| least once (by passing 'true' and expecting a warning), or to assert that a |
| function is never inlined (by passing 'false' and expecting no warning). The |
| argument is technically unnecessary but is intended to clarify intent. |
| |
| You might wonder why we can't print TRUE if a function is ever inlined and |
| FALSE if it is not. The problem is that any inlined function could conceivably |
| also be analyzed as a top-level function (in which case both TRUE and FALSE |
| would be printed), depending on the value of the -analyzer-inlining option. |
| |
| In C, the argument can be typed as 'int' or as '_Bool'. |
| |
| Example usage:: |
| |
| int inlined() { |
| clang_analyzer_checkInlined(true); // expected-warning{{TRUE}} |
| return 42; |
| } |
| |
| void topLevel() { |
| clang_analyzer_checkInlined(false); // no-warning (not inlined) |
| int value = inlined(); |
| // This assertion will not be valid if the previous call was not inlined. |
| clang_analyzer_eval(value == 42); // expected-warning{{TRUE}} |
| } |
| |
| - ``void clang_analyzer_warnIfReached();`` |
| |
| Generate a warning if this line of code gets reached by the analyzer. |
| |
| Example usage:: |
| |
| if (true) { |
| clang_analyzer_warnIfReached(); // expected-warning{{REACHABLE}} |
| } |
| else { |
| clang_analyzer_warnIfReached(); // no-warning |
| } |
| |
| - ``void clang_analyzer_numTimesReached();`` |
| |
| Same as above, but include the number of times this call expression |
| gets reached by the analyzer during the current analysis. |
| |
| Example usage:: |
| |
| for (int x = 0; x < 3; ++x) { |
| clang_analyzer_numTimesReached(); // expected-warning{{3}} |
| } |
| |
| - ``void clang_analyzer_warnOnDeadSymbol(int);`` |
| |
| Subscribe for a delayed warning when the symbol that represents the value of |
| the argument is garbage-collected by the analyzer. |
| |
| When calling 'clang_analyzer_warnOnDeadSymbol(x)', if value of 'x' is a |
| symbol, then this symbol is marked by the ExprInspection checker. Then, |
| during each garbage collection run, the checker sees if the marked symbol is |
| being collected and issues the 'SYMBOL DEAD' warning if it does. |
| This way you know where exactly, up to the line of code, the symbol dies. |
| |
| It is unlikely that you call this function after the symbol is already dead, |
| because the very reference to it as the function argument prevents it from |
| dying. However, if the argument is not a symbol but a concrete value, |
| no warning would be issued. |
| |
| Example usage:: |
| |
| do { |
| int x = generate_some_integer(); |
| clang_analyzer_warnOnDeadSymbol(x); |
| } while(0); // expected-warning{{SYMBOL DEAD}} |
| |
| |
| - ``void clang_analyzer_explain(a single argument of any type);`` |
| |
| This function explains the value of its argument in a human-readable manner |
| in the warning message. You can make as many overrides of its prototype |
| in the test code as necessary to explain various integral, pointer, |
| or even record-type values. To simplify usage in C code (where overloading |
| the function declaration is not allowed), you may append an arbitrary suffix |
| to the function name, without affecting functionality. |
| |
| Example usage:: |
| |
| void clang_analyzer_explain(int); |
| void clang_analyzer_explain(void *); |
| |
| // Useful in C code |
| void clang_analyzer_explain_int(int); |
| |
| void foo(int param, void *ptr) { |
| clang_analyzer_explain(param); // expected-warning{{argument 'param'}} |
| clang_analyzer_explain_int(param); // expected-warning{{argument 'param'}} |
| if (!ptr) |
| clang_analyzer_explain(ptr); // expected-warning{{memory address '0'}} |
| } |
| |
| - ``void clang_analyzer_dump( /* a single argument of any type */);`` |
| |
| Similar to clang_analyzer_explain, but produces a raw dump of the value, |
| same as SVal::dump(). |
| |
| Example usage:: |
| |
| void clang_analyzer_dump(int); |
| void foo(int x) { |
| clang_analyzer_dump(x); // expected-warning{{reg_$0<x>}} |
| } |
| |
| - ``size_t clang_analyzer_getExtent(void *);`` |
| |
| This function returns the value that represents the extent of a memory region |
| pointed to by the argument. This value is often difficult to obtain otherwise, |
| because no valid code that produces this value. However, it may be useful |
| for testing purposes, to see how well does the analyzer model region extents. |
| |
| Example usage:: |
| |
| void foo() { |
| int x, *y; |
| size_t xs = clang_analyzer_getExtent(&x); |
| clang_analyzer_explain(xs); // expected-warning{{'4'}} |
| size_t ys = clang_analyzer_getExtent(&y); |
| clang_analyzer_explain(ys); // expected-warning{{'8'}} |
| } |
| |
| - ``void clang_analyzer_printState();`` |
| |
| Dumps the current ProgramState to the stderr. Quickly lookup the program state |
| at any execution point without ViewExplodedGraph or re-compiling the program. |
| This is not very useful for writing tests (apart from testing how ProgramState |
| gets printed), but useful for debugging tests. Also, this method doesn't |
| produce a warning, so it gets printed on the console before all other |
| ExprInspection warnings. |
| |
| Example usage:: |
| |
| void foo() { |
| int x = 1; |
| clang_analyzer_printState(); // Read the stderr! |
| } |
| |
| - ``void clang_analyzer_hashDump(int);`` |
| |
| The analyzer can generate a hash to identify reports. To debug what information |
| is used to calculate this hash it is possible to dump the hashed string as a |
| warning of an arbitrary expression using the function above. |
| |
| Example usage:: |
| |
| void foo() { |
| int x = 1; |
| clang_analyzer_hashDump(x); // expected-warning{{hashed string for x}} |
| } |
| |
| Statistics |
| ========== |
| |
| The debug.Stats checker collects various information about the analysis of each |
| function, such as how many blocks were reached and if the analyzer timed out. |
| |
| There is also an additional -analyzer-stats flag, which enables various |
| statistics within the analyzer engine. Note the Stats checker (which produces at |
| least one bug report per function) may actually change the values reported by |
| -analyzer-stats. |