diff --git a/clang/unittests/Analysis/FlowSensitive/CMakeLists.txt b/clang/unittests/Analysis/FlowSensitive/CMakeLists.txt --- a/clang/unittests/Analysis/FlowSensitive/CMakeLists.txt +++ b/clang/unittests/Analysis/FlowSensitive/CMakeLists.txt @@ -4,6 +4,7 @@ ) add_clang_unittest(ClangAnalysisFlowSensitiveTests + SingleVarConstantPropagationTest.cpp TestingSupport.cpp TestingSupportTest.cpp TypeErasedDataflowAnalysisTest.cpp diff --git a/clang/unittests/Analysis/FlowSensitive/SingleVarConstantPropagationTest.cpp b/clang/unittests/Analysis/FlowSensitive/SingleVarConstantPropagationTest.cpp new file mode 100644 --- /dev/null +++ b/clang/unittests/Analysis/FlowSensitive/SingleVarConstantPropagationTest.cpp @@ -0,0 +1,374 @@ +//===- unittests/Analysis/FlowSensitive/SingelVarConstantPropagation.cpp --===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// +// +// This file defines a simplistic version of Constant Propagation as an example +// of a forward, monotonic dataflow analysis. The analysis only tracks one +// variable at a time -- the one with the most recent declaration encountered. +// +//===----------------------------------------------------------------------===// + +#include "TestingSupport.h" +#include "clang/AST/ASTContext.h" +#include "clang/AST/Decl.h" +#include "clang/AST/Expr.h" +#include "clang/AST/Stmt.h" +#include "clang/ASTMatchers/ASTMatchFinder.h" +#include "clang/ASTMatchers/ASTMatchers.h" +#include "clang/Analysis/FlowSensitive/DataflowAnalysis.h" +#include "clang/Analysis/FlowSensitive/DataflowEnvironment.h" +#include "clang/Analysis/FlowSensitive/DataflowLattice.h" +#include "clang/Tooling/Tooling.h" +#include "llvm/ADT/None.h" +#include "llvm/ADT/Optional.h" +#include "llvm/ADT/StringRef.h" +#include "llvm/ADT/Twine.h" +#include "llvm/Support/Error.h" +#include "llvm/Testing/Support/Annotations.h" +#include "gmock/gmock.h" +#include "gtest/gtest.h" +#include +#include +#include +#include +#include + +namespace clang { +namespace dataflow { +namespace { +using namespace ast_matchers; + +// A semi-lattice for dataflow analysis that tracks the value of a single +// integer variable. If it can be identified with a single (constant) value, +// then that value is stored. +struct ConstantPropagationLattice { + // A null `Var` represents "top": either more than one value is possible or + // more than one variable was encountered. Otherwise, `Data` indicates that + // `Var` has the given `Value` at the program point with which this lattice + // element is associated, for all paths through the program. + struct VarValue { + const VarDecl *Var; + int64_t Value; + + friend bool operator==(VarValue Lhs, VarValue Rhs) { + return Lhs.Var == Rhs.Var && Lhs.Value == Rhs.Value; + } + }; + // `None` is "bottom". + llvm::Optional Data; + + static constexpr ConstantPropagationLattice bottom() { return {llvm::None}; } + static constexpr ConstantPropagationLattice top() { + return {VarValue{nullptr, 0}}; + } + + friend bool operator==(ConstantPropagationLattice Element1, + ConstantPropagationLattice Element2) { + return Element1.Data == Element2.Data; + } + + LatticeJoinEffect join(ConstantPropagationLattice Other) { + if (*this == Other || Other == bottom() || *this == top()) + return LatticeJoinEffect::Unchanged; + + if (*this == bottom()) { + *this = Other; + return LatticeJoinEffect::Changed; + } + + *this = top(); + return LatticeJoinEffect::Changed; + } +}; + +std::ostream &operator<<(std::ostream &OS, + const ConstantPropagationLattice &L) { + if (L == L.bottom()) + return OS << "None"; + if (L == L.top()) + return OS << "Any"; + return OS << L.Data->Var->getName().str() << " = " << L.Data->Value; +} + +} // namespace + +static constexpr char kVar[] = "var"; +static constexpr char kInit[] = "init"; +static constexpr char kJustAssignment[] = "just-assignment"; +static constexpr char kAssignment[] = "assignment"; +static constexpr char kRHS[] = "rhs"; + +static auto refToVar() { return declRefExpr(to(varDecl().bind(kVar))); } + +static auto dispatchMatcher() { + return stmt( + anyOf(declStmt(hasSingleDecl(varDecl(hasType(isInteger()), + hasInitializer(expr().bind(kInit))) + .bind(kVar))), + binaryOperator(hasOperatorName("="), hasLHS(refToVar()), + hasRHS(expr().bind(kRHS))) + .bind(kJustAssignment), + binaryOperator(isAssignmentOperator(), hasLHS(refToVar())) + .bind(kAssignment))); +} + +static llvm::Optional transferInternal(const BoundNodes &Nodes, + const ASTContext &Context) { + if (const auto *E = Nodes.getNodeAs(kInit)) { + Expr::EvalResult R; + if (E->EvaluateAsInt(R, Context) && R.Val.isInt()) + return R.Val.getInt().getExtValue(); + return llvm::None; + } + + if (Nodes.getNodeAs(kJustAssignment)) { + const auto *RHS = Nodes.getNodeAs(kRHS); + assert(RHS != nullptr); + + Expr::EvalResult R; + if (RHS->EvaluateAsInt(R, Context) && R.Val.isInt()) + return R.Val.getInt().getExtValue(); + return llvm::None; + } + + // Any assignment involving the expression itself resets the variable to + // "unknown". A more advanced analysis could try to evaluate the compound + // assignment. For example, `x += 0` need not invalidate `x`. + if (const auto *E = Nodes.getNodeAs(kAssignment)) + return llvm::None; + + llvm_unreachable("expected at least one bound identifier"); +} + +namespace { +class ConstantPropagationAnalysis + : public DataflowAnalysis { +public: + explicit ConstantPropagationAnalysis(ASTContext &Context) + : DataflowAnalysis(Context) {} + + static ConstantPropagationLattice initialElement() { + return ConstantPropagationLattice::bottom(); + } + + ConstantPropagationLattice transfer(const Stmt *Stmt, + ConstantPropagationLattice Element, + Environment &Env) { + auto Results = match(dispatchMatcher(), *Stmt, getASTContext()); + if (Results.empty()) + return Element; + + const auto *Var = Results[0].getNodeAs(kVar); + assert(Var != nullptr); + + if (llvm::Optional Value = + transferInternal(Results[0], getASTContext())) + return ConstantPropagationLattice{{{Var, *Value}}}; + return ConstantPropagationLattice::top(); + } +}; + +using ::testing::Pair; +using ::testing::UnorderedElementsAre; + +MATCHER_P(HasConstantVal, v, "") { + return arg.Data.hasValue() && arg.Data->Value == v; +} + +MATCHER(IsUnknown, "") { return arg == arg.bottom(); } +MATCHER(Varies, "") { return arg == arg.top(); } + +MATCHER_P(HoldsCPLattice, m, + ((negation ? "doesn't hold" : "holds") + + llvm::StringRef(" a lattice element that ") + + ::testing::DescribeMatcher(m, negation)) + .str()) { + return ExplainMatchResult(m, arg.Lattice, result_listener); +} + +class ConstantPropagationTest : public ::testing::Test { +protected: + ConstantPropagationTest() = default; + + template + void RunDataflow(llvm::StringRef Code, Matcher Expectations) { + test::checkDataflow( + Code, "fun", + [](ASTContext &C, Environment &) { + return ConstantPropagationAnalysis(C); + }, + [&Expectations]( + llvm::ArrayRef>> + Results, + ASTContext &) { EXPECT_THAT(Results, Expectations); }, + {"-fsyntax-only", "-std=c++17"}); + } +}; + +TEST_F(ConstantPropagationTest, JustInit) { + std::string code = R"( + void fun() { + int target = 1; + // [[p]] + } + )"; + RunDataflow( + code, UnorderedElementsAre(Pair("p", HoldsCPLattice(HasConstantVal(1))))); +} + +// Verifies that the analysis tracks the last variable seen. +TEST_F(ConstantPropagationTest, TwoVariables) { + std::string code = R"( + void fun() { + int target = 1; + // [[p1]] + int other = 2; + // [[p2]] + target = 3; + // [[p3]] + } + )"; + RunDataflow(code, UnorderedElementsAre( + Pair("p1", HoldsCPLattice(HasConstantVal(1))), + Pair("p2", HoldsCPLattice(HasConstantVal(2))), + Pair("p3", HoldsCPLattice(HasConstantVal(3))))); +} + +TEST_F(ConstantPropagationTest, Assignment) { + std::string code = R"( + void fun() { + int target = 1; + // [[p1]] + target = 2; + // [[p2]] + } + )"; + RunDataflow(code, UnorderedElementsAre( + Pair("p1", HoldsCPLattice(HasConstantVal(1))), + Pair("p2", HoldsCPLattice(HasConstantVal(2))))); +} + +TEST_F(ConstantPropagationTest, PlusAssignment) { + std::string code = R"( + void fun() { + int target = 1; + // [[p1]] + target += 2; + // [[p2]] + } + )"; + RunDataflow( + code, UnorderedElementsAre(Pair("p1", HoldsCPLattice(HasConstantVal(1))), + Pair("p2", HoldsCPLattice(Varies())))); +} + +TEST_F(ConstantPropagationTest, SameAssignmentInBranches) { + std::string code = R"cc( + void fun(bool b) { + int target; + // [[p1]] + if (b) { + target = 2; + // [[pT]] + } else { + target = 2; + // [[pF]] + } + (void)0; + // [[p2]] + } + )cc"; + RunDataflow(code, UnorderedElementsAre( + Pair("p1", HoldsCPLattice(IsUnknown())), + Pair("pT", HoldsCPLattice(HasConstantVal(2))), + Pair("pF", HoldsCPLattice(HasConstantVal(2))), + Pair("p2", HoldsCPLattice(HasConstantVal(2))))); +} + +TEST_F(ConstantPropagationTest, SameAssignmentInBranch) { + std::string code = R"cc( + void fun(bool b) { + int target = 1; + // [[p1]] + if (b) { + target = 1; + } + (void)0; + // [[p2]] + } + )cc"; + RunDataflow(code, UnorderedElementsAre( + Pair("p1", HoldsCPLattice(HasConstantVal(1))), + Pair("p2", HoldsCPLattice(HasConstantVal(1))))); +} + +TEST_F(ConstantPropagationTest, NewVarInBranch) { + std::string code = R"cc( + void fun(bool b) { + if (b) { + int target; + // [[p1]] + target = 1; + // [[p2]] + } else { + int target; + // [[p3]] + target = 1; + // [[p4]] + } + } + )cc"; + RunDataflow(code, UnorderedElementsAre( + Pair("p1", HoldsCPLattice(IsUnknown())), + Pair("p2", HoldsCPLattice(HasConstantVal(1))), + Pair("p3", HoldsCPLattice(IsUnknown())), + Pair("p4", HoldsCPLattice(HasConstantVal(1))))); +} + +TEST_F(ConstantPropagationTest, DifferentAssignmentInBranches) { + std::string code = R"cc( + void fun(bool b) { + int target; + // [[p1]] + if (b) { + target = 1; + } else { + target = 2; + } + (void)0; + // [[p2]] + } + )cc"; + RunDataflow(code, + UnorderedElementsAre(Pair("p1", HoldsCPLattice(IsUnknown())), + Pair("p2", HoldsCPLattice(Varies())))); +} + +TEST_F(ConstantPropagationTest, DifferentAssignmentInBranch) { + std::string code = R"cc( + void fun(bool b) { + int target = 1; + // [[p1]] + if (b) { + target = 3; + } + (void)0; + // [[p2]] + } + )cc"; + RunDataflow( + code, UnorderedElementsAre(Pair("p1", HoldsCPLattice(HasConstantVal(1))), + Pair("p2", HoldsCPLattice(Varies())))); +} + +} // namespace +} // namespace dataflow +} // namespace clang diff --git a/clang/unittests/Analysis/FlowSensitive/TestingSupport.h b/clang/unittests/Analysis/FlowSensitive/TestingSupport.h --- a/clang/unittests/Analysis/FlowSensitive/TestingSupport.h +++ b/clang/unittests/Analysis/FlowSensitive/TestingSupport.h @@ -1,4 +1,4 @@ -//===--- DataflowValues.h - Data structure for dataflow values --*- C++ -*-===// +//===--- TestingSupport.h - Testing utils for dataflow analyses -*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. @@ -6,9 +6,7 @@ // //===----------------------------------------------------------------------===// // -// This file defines a skeleton data structure for encapsulating the dataflow -// values for a CFG. Typically this is subclassed to provide methods for -// computing these values from a CFG. +// This file defines utilities to simplify testing of dataflow analyses. // //===----------------------------------------------------------------------===// @@ -81,8 +79,7 @@ using StateT = DataflowAnalysisState; llvm::Annotations AnnotatedCode(Code); - auto Unit = tooling::buildASTFromCodeWithArgs( - AnnotatedCode.code(), {"-fsyntax-only", "-std=c++17"}); + auto Unit = tooling::buildASTFromCodeWithArgs(AnnotatedCode.code(), Args); auto &Context = Unit->getASTContext(); if (Context.getDiagnostics().getClient()->getNumErrors() != 0) { @@ -134,8 +131,7 @@ return; if (auto *Lattice = llvm::any_cast( &State.Lattice.Value)) { - Results.emplace_back( - It->second, StateT{std::move(*Lattice), std::move(State.Env)}); + Results.emplace_back(It->second, StateT{*Lattice, State.Env}); } else { FAIL() << "Could not cast lattice element to expected type."; }