I'm trying to generate calling graph with which to find out all the possible execution paths that are hitting a particular function (so that I don't have to figure out all the paths manually, as there are many paths that lead to this function). For instance:
path 1: A -> B -> C -> D
path 2: A -> B -> X -> Y -> D
path 3: A -> G -> M -> N -> O -> P -> S -> D
...
path n: ...
I have tried Codeviz and Doxygen, somehow both results show nothing but callees of target function, D. In my case, D is a member function of a class whose object will be wrapped within a smart pointer. Clients will always obtain the smart pointer object through a factory in order to invoke D.
Does anyone know how to achieve this?
You can achieve that by using doxygen (with option to use dot for graphs generation).
With Johannes Schaub - litb main.cpp, it generates this:
doxygen/dot are probably easier than clang/opt to install and run. I did not manage to install it myself and that's why I tried to find an alternative solution!
In order for the
clang++
command to find standard header files likempi.h
two additional options should be used-### -fsyntax-only
, i.e. the full command should look as:The "C++ Bsc Analyzer" can display call graphs - by reading the file generated by the bscmake utility.
Scitools Understand is a fantastic tool, better than everything I know for reverse engineering, and generates high quality graphs.
But note it is quite expensive and that the trial version has its butterfly call graph limited to only one level of call (IMHO I believe they don't help themselves doing so…)
doxygen + graphviz could solve most problems when we wanna generate call graph,next handed to manpower.
Statically computing an accurate C++ call graph is hard, because you need a precise langauge parser, correct name lookup, and a good points-to analyzer that honors the language semantics properly. Doxygen doesn't have any of these, I don't know why people claim to like it for C++; it is easy to construct a 10 line C++ example that Doxygen erroneously analyzes).
You might be better off running a timing profiler which collects a call graph dynamically (this describes ours) and simply exercise a lot of cases. Such profilers will show you the actual call graph exercised.
EDIT: I suddenly remembered Understand for C++, which claims to construct call graphs. I don't know what they use for a parser, or whether they do the detailed analysis right; I have no specific experience with their product.
I am impressed by Schaub's answer, using Clang; I would expect Clang to have all the elements right.