###
DOI:
计算机系统应用英文版:2016,25(2):212-218
本文二维码信息
码上扫一扫!
高效而精确的锁别名分析方法
陈露1,2,3, 顾乃杰1,2,3, 黄理1,2,3, 杜云开1,2,3
(1.中国科学技术大学 计算机科学与技术学院, 合肥 230027;2.中国科学技术大学 安徽省计算与通信软件重点实验室, 合肥 230027;3.中国科学技术大学 先进技术研究院, 合肥 230027)
Efficient and Accurate Lock Alias Analysis Method
CHEN Lu1,2,3, GU Nai-Jie1,2,3, HUANG Li1,2,3, DU Yun-Kai1,2,3
(1.School of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China;2.Anhui Province Key Laboratory of Computing and Communication Software, Hefei 230027, China;3.Institute of Advanced Technology, University of Science and Technology of China, Hefei 230027, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 1820次   下载 2894
Received:May 07, 2015    Revised:June 08, 2015
中文摘要: 锁别名分析能够得到锁指针变量的指向信息,有效的锁别名分析可以更好地辅助数据竞争分析和死锁分析.现有锁别名分析往往采用保守的方式处理,进而影响分析结果的准确性.针对这一问题,提出了一种锁别名分析方法,该方法首先使用GCC插件获取SSA形式的中间代码,然后对中间代码进行预处理以获得与锁、函数指针操作相关的语句,最后对预处理后的程序使用本文提出的FP_LOCK算法进行准确的流敏感、上下文敏感分析.实验结果表明该方法能精确地确定锁别名,并且经过预处理后的FP_LOCK算法对分析大程序平均有9.95倍的加速比.
Abstract:Lock alias analysis can obtain the precise lock pointer information. Efficient lock alias analysis can make a good contribution to data races analysis and deadlock analysis. However, existing lock alias analyses often use a conservative approach, which impacts the accuracy of analysis. This paper proposes a lock alias analysis method. This method firstly gains SSA-form intermediate code by a GCC plugin. Then it preprocesses the intermediate code to obtain the statements related to function pointer and lock operation. Based on this we present the flow-sensitive and context-sensitive function pointer and lock analysis algorithm(referred as FP_LOCK algorithm). Experimental results show that this method has well precision and advances 9.95 times on average compared with the original algorithm.
文章编号:     中图分类号:    文献标志码:
基金项目:安徽省自然科学基金(1408085MKL06);高等学校学科创新引智计划(B07033)
引用文本:
陈露,顾乃杰,黄理,杜云开.高效而精确的锁别名分析方法.计算机系统应用,2016,25(2):212-218
CHEN Lu,GU Nai-Jie,HUANG Li,DU Yun-Kai.Efficient and Accurate Lock Alias Analysis Method.COMPUTER SYSTEMS APPLICATIONS,2016,25(2):212-218