Details | Last modification | View Log | RSS feed
| Rev | Author | Line No. | Line | 
|---|---|---|---|
| 14 | pmbaty | 1 | //===-- AnalyzerOptions.def - Metadata about Static Analyses ----*- C++ -*-===// | 
| 2 | // | ||
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. | ||
| 4 | // See https://llvm.org/LICENSE.txt for license information. | ||
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | ||
| 6 | // | ||
| 7 | //===----------------------------------------------------------------------===// | ||
| 8 | // | ||
| 9 | // This file defines the analyzer options avaible with -analyzer-config. | ||
| 10 | // | ||
| 11 | //===----------------------------------------------------------------------===// | ||
| 12 | |||
| 13 | #ifndef LLVM_ADT_STRINGREF_H | ||
| 14 | #error This .def file is expected to be included in translation units where \ | ||
| 15 | "llvm/ADT/StringRef.h" is already included! | ||
| 16 | #endif | ||
| 17 | |||
| 18 | #ifdef ANALYZER_OPTION | ||
| 19 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE | ||
| 20 | #error If you didnt include this file with the intent of generating methods, \ | ||
| 21 | define both 'ANALYZER_OPTION' and 'ANALYZER_OPTION_DEPENDS_ON_USER_MODE' macros! | ||
| 22 | #endif | ||
| 23 | #endif | ||
| 24 | |||
| 25 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE | ||
| 26 | #ifdef ANALYZER_OPTION | ||
| 27 | #error If you didnt include this file with the intent of generating methods, \ | ||
| 28 | define both 'ANALYZER_OPTION' and 'ANALYZER_OPTION_DEPENDS_ON_USER_MODE' macros! | ||
| 29 | #endif | ||
| 30 | #endif | ||
| 31 | |||
| 32 | #ifndef ANALYZER_OPTION | ||
| 33 | /// Create a new analyzer option, but dont generate a method for it in | ||
| 34 | /// AnalyzerOptions. | ||
| 35 | /// | ||
| 36 | /// TYPE - The type of the option object that will be stored in | ||
| 37 | /// AnalyzerOptions. This file is expected to be icluded in translation | ||
| 38 | /// units where AnalyzerOptions.h is included, so types from that | ||
| 39 | /// header should be used. | ||
| 40 | /// NAME - The name of the option object. | ||
| 41 | /// CMDFLAG - The command line flag for the option. | ||
| 42 | /// (-analyzer-config CMDFLAG=VALUE) | ||
| 43 | /// DESC - Description of the flag. | ||
| 44 | /// DEFAULT_VAL - The default value for CMDFLAG. | ||
| 45 | #define ANALYZER_OPTION(TYPE, NAME, CMDFLAG, DESC, DEFAULT_VAL) | ||
| 46 | #endif | ||
| 47 | |||
| 48 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE | ||
| 49 | /// Create a new analyzer option, but dont generate a method for it in | ||
| 50 | /// AnalyzerOptions. It's value depends on the option "user-mode". | ||
| 51 | /// | ||
| 52 | /// TYPE - The type of the option object that will be stored in | ||
| 53 | /// AnalyzerOptions. This file is expected to be icluded in translation | ||
| 54 | /// units where AnalyzerOptions.h is included, so types from that | ||
| 55 | /// header should be used. | ||
| 56 | /// NAME - The name of the option object. | ||
| 57 | /// CMDFLAG - The command line flag for the option. | ||
| 58 | /// (-analyzer-config CMDFLAG=VALUE) | ||
| 59 | /// DESC - Description of the flag. | ||
| 60 | /// SHALLOW_VAL - The default value for CMDFLAG, when "user-mode" was set to | ||
| 61 | /// "shallow". | ||
| 62 | /// DEEP_VAL - The default value for CMDFLAG, when "user-mode" was set to | ||
| 63 | /// "deep". | ||
| 64 | #define ANALYZER_OPTION_DEPENDS_ON_USER_MODE(TYPE, NAME, CMDFLAG, DESC, \ | ||
| 65 | SHALLOW_VAL, DEEP_VAL) | ||
| 66 | #endif | ||
| 67 | |||
| 68 | //===----------------------------------------------------------------------===// | ||
| 69 | // The "mode" option. Since some options depend on this, we list it on top of | ||
| 70 | // this file in order to make sure that the generated field for it is | ||
| 71 | // initialized before the rest. | ||
| 72 | //===----------------------------------------------------------------------===// | ||
| 73 | |||
| 74 | ANALYZER_OPTION( | ||
| 75 | StringRef, UserMode, "mode", | ||
| 76 | "(string) Controls the high-level analyzer mode, which influences the " | ||
| 77 | "default settings for some of the lower-level config options (such as " | ||
| 78 | "IPAMode). Value: \"deep\", \"shallow\".", | ||
| 79 | "deep") | ||
| 80 | |||
| 81 | //===----------------------------------------------------------------------===// | ||
| 82 | // Boolean analyzer options. | ||
| 83 | //===----------------------------------------------------------------------===// | ||
| 84 | |||
| 85 | ANALYZER_OPTION(bool, ShouldIncludeImplicitDtorsInCFG, "cfg-implicit-dtors", | ||
| 86 | "Whether or not implicit destructors for C++ objects " | ||
| 87 | "should be included in the CFG.", | ||
| 88 | true) | ||
| 89 | |||
| 90 | ANALYZER_OPTION(bool, ShouldIncludeTemporaryDtorsInCFG, "cfg-temporary-dtors", | ||
| 91 | "Whether or not the destructors for C++ temporary " | ||
| 92 | "objects should be included in the CFG.", | ||
| 93 | true) | ||
| 94 | |||
| 95 | ANALYZER_OPTION( | ||
| 96 | bool, ShouldIncludeLifetimeInCFG, "cfg-lifetime", | ||
| 97 | "Whether or not end-of-lifetime information should be included in the CFG.", | ||
| 98 | false) | ||
| 99 | |||
| 100 | ANALYZER_OPTION(bool, ShouldIncludeLoopExitInCFG, "cfg-loopexit", | ||
| 101 | "Whether or not the end of the loop information should " | ||
| 102 | "be included in the CFG.", | ||
| 103 | false) | ||
| 104 | |||
| 105 | ANALYZER_OPTION(bool, ShouldIncludeRichConstructorsInCFG, | ||
| 106 | "cfg-rich-constructors", | ||
| 107 | "Whether or not construction site information should be " | ||
| 108 | "included in the CFG C++ constructor elements.", | ||
| 109 | true) | ||
| 110 | |||
| 111 | ANALYZER_OPTION( | ||
| 112 | bool, ShouldIncludeScopesInCFG, "cfg-scopes", | ||
| 113 | "Whether or not scope information should be included in the CFG.", false) | ||
| 114 | |||
| 115 | ANALYZER_OPTION(bool, ShouldIncludeDefaultInitForAggregates, | ||
| 116 | "cfg-expand-default-aggr-inits", | ||
| 117 | "Whether or not inline CXXDefaultInitializers for aggregate " | ||
| 118 | "initialization in the CFG.", | ||
| 119 | false) | ||
| 120 | |||
| 121 | ANALYZER_OPTION( | ||
| 122 | bool, MayInlineTemplateFunctions, "c++-template-inlining", | ||
| 123 | "Whether or not templated functions may be considered for inlining.", true) | ||
| 124 | |||
| 125 | ANALYZER_OPTION(bool, MayInlineCXXStandardLibrary, "c++-stdlib-inlining", | ||
| 126 | "Whether or not C++ standard library functions may be " | ||
| 127 | "considered for inlining.", | ||
| 128 | true) | ||
| 129 | |||
| 130 | ANALYZER_OPTION(bool, MayInlineCXXAllocator, "c++-allocator-inlining", | ||
| 131 | "Whether or not allocator and deallocator calls may be " | ||
| 132 | "considered for inlining.", | ||
| 133 | true) | ||
| 134 | |||
| 135 | ANALYZER_OPTION( | ||
| 136 | bool, MayInlineCXXSharedPtrDtor, "c++-shared_ptr-inlining", | ||
| 137 | "Whether or not the destructor of C++ 'shared_ptr' may be considered for " | ||
| 138 | "inlining. This covers std::shared_ptr, std::tr1::shared_ptr, and " | ||
| 139 | "boost::shared_ptr, and indeed any destructor named '~shared_ptr'.", | ||
| 140 | false) | ||
| 141 | |||
| 142 | ANALYZER_OPTION(bool, MayInlineCXXTemporaryDtors, "c++-temp-dtor-inlining", | ||
| 143 | "Whether C++ temporary destructors should be inlined " | ||
| 144 | "during analysis. If temporary destructors are disabled " | ||
| 145 | "in the CFG via the 'cfg-temporary-dtors' option, " | ||
| 146 | "temporary destructors would not be inlined anyway.", | ||
| 147 | true) | ||
| 148 | |||
| 149 | ANALYZER_OPTION( | ||
| 150 | bool, ShouldSuppressNullReturnPaths, "suppress-null-return-paths", | ||
| 151 | "Whether or not paths that go through null returns should be suppressed. " | ||
| 152 | "This is a heuristic for avoiding bug reports with paths that go through " | ||
| 153 | "inlined functions that are more defensive than their callers.", | ||
| 154 | true) | ||
| 155 | |||
| 156 | ANALYZER_OPTION( | ||
| 157 | bool, ShouldAvoidSuppressingNullArgumentPaths, | ||
| 158 | "avoid-suppressing-null-argument-paths", | ||
| 159 | "Whether a bug report should not be suppressed if its path includes a call " | ||
| 160 | "with a null argument, even if that call has a null return. This option " | ||
| 161 | "has no effect when ShouldSuppressNullReturnPaths is false. This is a " | ||
| 162 | "counter-heuristic to avoid false negatives.", | ||
| 163 | false) | ||
| 164 | |||
| 165 | ANALYZER_OPTION(bool, ShouldSuppressInlinedDefensiveChecks, | ||
| 166 | "suppress-inlined-defensive-checks", | ||
| 167 | "Whether or not diagnostics containing inlined " | ||
| 168 | "defensive NULL checks should be suppressed.", | ||
| 169 | true) | ||
| 170 | |||
| 171 | ANALYZER_OPTION(bool, MayInlineCXXContainerMethods, "c++-container-inlining", | ||
| 172 | "Whether or not methods of C++ container objects may be " | ||
| 173 | "considered for inlining.", | ||
| 174 | false) | ||
| 175 | |||
| 176 | ANALYZER_OPTION(bool, ShouldSuppressFromCXXStandardLibrary, | ||
| 177 | "suppress-c++-stdlib", | ||
| 178 | "Whether or not diagnostics reported within the C++ " | ||
| 179 | "standard library should be suppressed.", | ||
| 180 | true) | ||
| 181 | |||
| 182 | ANALYZER_OPTION(bool, ShouldCrosscheckWithZ3, "crosscheck-with-z3", | ||
| 183 | "Whether bug reports should be crosschecked with the Z3 " | ||
| 184 | "constraint manager backend.", | ||
| 185 | false) | ||
| 186 | |||
| 187 | ANALYZER_OPTION(bool, ShouldReportIssuesInMainSourceFile, | ||
| 188 | "report-in-main-source-file", | ||
| 189 | "Whether or not the diagnostic report should be always " | ||
| 190 | "reported in the main source file and not the headers.", | ||
| 191 | false) | ||
| 192 | |||
| 193 | ANALYZER_OPTION(bool, ShouldWriteStableReportFilename, "stable-report-filename", | ||
| 194 | "Deprecated: report filenames are now always stable. " | ||
| 195 | "See also 'verbose-report-filename'.", | ||
| 196 | false) | ||
| 197 | |||
| 198 | ANALYZER_OPTION(bool, ShouldWriteVerboseReportFilename, "verbose-report-filename", | ||
| 199 | "Whether or not the report filename should contain extra " | ||
| 200 | "information about the issue.", | ||
| 201 | false) | ||
| 202 | |||
| 203 | ANALYZER_OPTION( | ||
| 204 | bool, ShouldSerializeStats, "serialize-stats", | ||
| 205 | "Whether the analyzer should serialize statistics to plist output. " | ||
| 206 | "Statistics would be serialized in JSON format inside the main dictionary " | ||
| 207 | "under the statistics key. Available only if compiled in assert mode or " | ||
| 208 | "with LLVM statistics explicitly enabled.", | ||
| 209 | false) | ||
| 210 | |||
| 211 | ANALYZER_OPTION(bool, MayInlineObjCMethod, "objc-inlining", | ||
| 212 | "Whether ObjectiveC inlining is enabled, false otherwise.", | ||
| 213 | true) | ||
| 214 | |||
| 215 | ANALYZER_OPTION(bool, ShouldPrunePaths, "prune-paths", | ||
| 216 | "Whether irrelevant parts of a bug report path should " | ||
| 217 | "be pruned out of the final output.", | ||
| 218 | true) | ||
| 219 | |||
| 220 | ANALYZER_OPTION(bool, ShouldAddPopUpNotes, "add-pop-up-notes", | ||
| 221 | "Whether pop-up notes should be added to the final output.", | ||
| 222 | true) | ||
| 223 | |||
| 224 | ANALYZER_OPTION( | ||
| 225 | bool, ShouldConditionalizeStaticInitializers, | ||
| 226 | "cfg-conditional-static-initializers", | ||
| 227 | "Whether 'static' initializers should be in conditional logic in the CFG.", | ||
| 228 | true) | ||
| 229 | |||
| 230 | ANALYZER_OPTION(bool, ShouldSynthesizeBodies, "faux-bodies", | ||
| 231 | "Whether the analyzer engine should synthesize fake " | ||
| 232 | "bodies for well-known functions.", | ||
| 233 | true) | ||
| 234 | |||
| 235 | ANALYZER_OPTION( | ||
| 236 | bool, ShouldElideConstructors, "elide-constructors", | ||
| 237 | "Whether elidable C++ copy-constructors and move-constructors should be " | ||
| 238 | "actually elided during analysis. Both behaviors are allowed by the C++ " | ||
| 239 | "standard, and the analyzer, like CodeGen, defaults to eliding. Starting " | ||
| 240 | "with C++17 some elisions become mandatory, and in these cases the option " | ||
| 241 | "will be ignored.", | ||
| 242 | true) | ||
| 243 | |||
| 244 | ANALYZER_OPTION( | ||
| 245 | bool, ShouldInlineLambdas, "inline-lambdas", | ||
| 246 | "Whether lambdas should be inlined. Otherwise a sink node will be " | ||
| 247 | "generated each time a LambdaExpr is visited.", | ||
| 248 | true) | ||
| 249 | |||
| 250 | ANALYZER_OPTION(bool, ShouldWidenLoops, "widen-loops", | ||
| 251 | "Whether the analysis should try to widen loops.", false) | ||
| 252 | |||
| 253 | ANALYZER_OPTION( | ||
| 254 | bool, ShouldUnrollLoops, "unroll-loops", | ||
| 255 | "Whether the analysis should try to unroll loops with known bounds.", false) | ||
| 256 | |||
| 257 | ANALYZER_OPTION( | ||
| 258 | bool, ShouldDisplayNotesAsEvents, "notes-as-events", | ||
| 259 | "Whether the bug reporter should transparently treat extra note diagnostic " | ||
| 260 | "pieces as event diagnostic pieces. Useful when the diagnostic consumer " | ||
| 261 | "doesn't support the extra note pieces.", | ||
| 262 | false) | ||
| 263 | |||
| 264 | ANALYZER_OPTION( | ||
| 265 | bool, ShouldAggressivelySimplifyBinaryOperation, | ||
| 266 | "aggressive-binary-operation-simplification", | ||
| 267 | "Whether SValBuilder should rearrange comparisons and additive operations " | ||
| 268 | "of symbolic expressions which consist of a sum of a symbol and a concrete " | ||
| 269 | "integer into the format where symbols are on the left-hand side and the " | ||
| 270 | "integer is on the right. This is only done if both symbols and both " | ||
| 271 | "concrete integers are signed, greater than or equal to the quarter of the " | ||
| 272 | "minimum value of the type and less than or equal to the quarter of the " | ||
| 273 | "maximum value of that type. A + n <OP> B + m becomes A - B <OP> m - n, " | ||
| 274 | "where A and B symbolic, n and m are integers. <OP> is any of '==', '!=', " | ||
| 275 | "'<', '<=', '>', '>=', '+' or '-'. The rearrangement also happens with '-' " | ||
| 276 | "instead of '+' on either or both side and also if any or both integers " | ||
| 277 | "are missing.", | ||
| 278 | false) | ||
| 279 | |||
| 280 | ANALYZER_OPTION( | ||
| 281 | bool, ShouldEagerlyAssume, "eagerly-assume", | ||
| 282 | "Whether we should eagerly assume evaluations of conditionals, thus, " | ||
| 283 | "bifurcating the path. This indicates how the engine should handle " | ||
| 284 | "expressions such as: 'x = (y != 0)'. When this is true then the " | ||
| 285 | "subexpression 'y != 0' will be eagerly assumed to be true or false, thus " | ||
| 286 | "evaluating it to the integers 0 or 1 respectively. The upside is that " | ||
| 287 | "this can increase analysis precision until we have a better way to lazily " | ||
| 288 | "evaluate such logic. The downside is that it eagerly bifurcates paths.", | ||
| 289 | true) | ||
| 290 | |||
| 291 | ANALYZER_OPTION( | ||
| 292 | bool, IsNaiveCTUEnabled, "experimental-enable-naive-ctu-analysis", | ||
| 293 | "Whether naive cross translation unit analysis is enabled. This is an " | ||
| 294 | "experimental feature to inline functions from other translation units.", | ||
| 295 | false) | ||
| 296 | |||
| 297 | ANALYZER_OPTION(bool, ShouldDisplayMacroExpansions, "expand-macros", | ||
| 298 | "Whether macros related to the bugpath should be " | ||
| 299 | "expanded and included in the plist output.", | ||
| 300 | false) | ||
| 301 | |||
| 302 | ANALYZER_OPTION(bool, DisplayCTUProgress, "display-ctu-progress", | ||
| 303 | "Whether to emit verbose output about " | ||
| 304 | "the analyzer's progress related to ctu.", | ||
| 305 | false) | ||
| 306 | |||
| 307 | ANALYZER_OPTION(bool, ShouldTrackConditions, "track-conditions", | ||
| 308 | "Whether to track conditions that are a control dependency of " | ||
| 309 | "an already tracked variable.", | ||
| 310 | true) | ||
| 311 | |||
| 312 | ANALYZER_OPTION(bool, ShouldTrackConditionsDebug, "track-conditions-debug", | ||
| 313 | "Whether to place an event at each tracked condition.", | ||
| 314 | false) | ||
| 315 | |||
| 316 | ANALYZER_OPTION(bool, ShouldApplyFixIts, "apply-fixits", | ||
| 317 | "Apply the fix-it hints to the files", | ||
| 318 | false) | ||
| 319 | |||
| 320 | ANALYZER_OPTION(bool, ShouldDisplayCheckerNameForText, "display-checker-name", | ||
| 321 | "Display the checker name for textual outputs", | ||
| 322 | true) | ||
| 323 | |||
| 324 | ANALYZER_OPTION(bool, ShouldSupportSymbolicIntegerCasts, | ||
| 325 | "support-symbolic-integer-casts", | ||
| 326 | "Produce cast symbols for integral types.", | ||
| 327 | false) | ||
| 328 | |||
| 329 | ANALYZER_OPTION( | ||
| 330 | bool, ShouldConsiderSingleElementArraysAsFlexibleArrayMembers, | ||
| 331 | "consider-single-element-arrays-as-flexible-array-members", | ||
| 332 | "Consider single element arrays as flexible array member candidates. " | ||
| 333 | "This will prevent the analyzer from assuming that a single element array " | ||
| 334 | "holds a single element. [DEPRECATED, removing in clang-17; " | ||
| 335 | "use '-fstrict-flex-arrays=<N>' instead]", | ||
| 336 | true) | ||
| 337 | |||
| 338 | ANALYZER_OPTION( | ||
| 339 | bool, ShouldAssumeControlledEnvironment, "assume-controlled-environment", | ||
| 340 | "Whether the analyzed application runs in a controlled environment. " | ||
| 341 | "We will assume that environment variables exist in queries and they hold " | ||
| 342 | "no malicious data. For instance, if this option is enabled, 'getenv()' " | ||
| 343 | "might be modeled by the analyzer to never return NULL.", | ||
| 344 | false) | ||
| 345 | |||
| 346 | ANALYZER_OPTION( | ||
| 347 | bool, ShouldIgnoreBisonGeneratedFiles, "ignore-bison-generated-files", | ||
| 348 | "If enabled, any files containing the \"/* A Bison parser, made by\" " | ||
| 349 | "won't be analyzed.", | ||
| 350 | true) | ||
| 351 | |||
| 352 | ANALYZER_OPTION( | ||
| 353 | bool, ShouldIgnoreFlexGeneratedFiles, "ignore-flex-generated-files", | ||
| 354 | "If enabled, any files containing the \"/* A lexical scanner generated by " | ||
| 355 | "flex\" won't be analyzed.", | ||
| 356 | true) | ||
| 357 | |||
| 358 | //===----------------------------------------------------------------------===// | ||
| 359 | // Unsigned analyzer options. | ||
| 360 | //===----------------------------------------------------------------------===// | ||
| 361 | |||
| 362 | ANALYZER_OPTION(unsigned, CTUImportThreshold, "ctu-import-threshold", | ||
| 363 | "The maximal amount of translation units that is considered " | ||
| 364 | "for import when inlining functions during CTU analysis. " | ||
| 365 | "Lowering this threshold can alleviate the memory burden of " | ||
| 366 | "analysis with many interdependent definitions located in " | ||
| 367 | "various translation units. This is valid only for non C++ " | ||
| 368 | "source files.", | ||
| 369 | 24u) | ||
| 370 | |||
| 371 | ANALYZER_OPTION(unsigned, CTUImportCppThreshold, "ctu-import-cpp-threshold", | ||
| 372 | "The maximal amount of translation units that is considered " | ||
| 373 | "for import when inlining functions during CTU analysis of C++ " | ||
| 374 | "source files.", | ||
| 375 | 8u) | ||
| 376 | |||
| 377 | ANALYZER_OPTION( | ||
| 378 | unsigned, AlwaysInlineSize, "ipa-always-inline-size", | ||
| 379 | "The size of the functions (in basic blocks), which should be considered " | ||
| 380 | "to be small enough to always inline.", | ||
| 381 | 3) | ||
| 382 | |||
| 383 | ANALYZER_OPTION( | ||
| 384 | unsigned, GraphTrimInterval, "graph-trim-interval", | ||
| 385 | "How often nodes in the ExplodedGraph should be recycled to save memory. " | ||
| 386 | "To disable node reclamation, set the option to 0.", | ||
| 387 | 1000) | ||
| 388 | |||
| 389 | ANALYZER_OPTION( | ||
| 390 | unsigned, MinCFGSizeTreatFunctionsAsLarge, | ||
| 391 | "min-cfg-size-treat-functions-as-large", | ||
| 392 | "The number of basic blocks a function needs to have to be considered " | ||
| 393 | "large for the 'max-times-inline-large' config option.", | ||
| 394 | 14) | ||
| 395 | |||
| 396 | ANALYZER_OPTION(unsigned, MaxSymbolComplexity, "max-symbol-complexity", | ||
| 397 | "The maximum complexity of symbolic constraint.", 35) | ||
| 398 | |||
| 399 | ANALYZER_OPTION(unsigned, MaxTimesInlineLarge, "max-times-inline-large", | ||
| 400 | "The maximum times a large function could be inlined.", 32) | ||
| 401 | |||
| 402 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( | ||
| 403 | unsigned, MaxInlinableSize, "max-inlinable-size", | ||
| 404 | "The bound on the number of basic blocks in an inlined function.", | ||
| 405 | /* SHALLOW_VAL */ 4, /* DEEP_VAL */ 100) | ||
| 406 | |||
| 407 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( | ||
| 408 | unsigned, MaxNodesPerTopLevelFunction, "max-nodes", | ||
| 409 | "The maximum number of nodes the analyzer can generate while exploring a " | ||
| 410 | "top level function (for each exploded graph). 0 means no limit.", | ||
| 411 | /* SHALLOW_VAL */ 75000, /* DEEP_VAL */ 225000) | ||
| 412 | |||
| 413 | ANALYZER_OPTION( | ||
| 414 | unsigned, CTUMaxNodesPercentage, "ctu-max-nodes-pct", | ||
| 415 | "The percentage of single-TU analysed nodes that the CTU analysis is " | ||
| 416 | "allowed to visit.", 50) | ||
| 417 | |||
| 418 | ANALYZER_OPTION( | ||
| 419 | unsigned, CTUMaxNodesMin, "ctu-max-nodes-min", | ||
| 420 | "The maximum number of nodes in CTU mode is determinded by " | ||
| 421 | "'ctu-max-nodes-pct'. However, if the number of nodes in single-TU " | ||
| 422 | "analysis is too low, it is meaningful to provide a minimum value that " | ||
| 423 | "serves as an upper bound instead.", 10000) | ||
| 424 | |||
| 425 | ANALYZER_OPTION( | ||
| 426 | StringRef, CTUPhase1InliningMode, "ctu-phase1-inlining", | ||
| 427 | "Controls which functions will be inlined during the first phase of the ctu " | ||
| 428 | "analysis. " | ||
| 429 | "If the value is set to 'all' then all foreign functions are inlinied " | ||
| 430 | "immediately during the first phase, thus rendering the second phase a noop. " | ||
| 431 | "The 'ctu-max-nodes-*' budge has no effect in this case. " | ||
| 432 | "If the value is 'small' then only functions with a linear CFG and with a " | ||
| 433 | "limited number of statements would be inlined during the first phase. The " | ||
| 434 | "long and/or nontrivial functions are handled in the second phase and are " | ||
| 435 | "controlled by the 'ctu-max-nodes-*' budge. " | ||
| 436 | "The value 'none' means that all foreign functions are inlined only in the " | ||
| 437 | "second phase, 'ctu-max-nodes-*' budge limits the second phase. " | ||
| 438 | "Value: \"none\", \"small\", \"all\".", | ||
| 439 | "small") | ||
| 440 | |||
| 441 | ANALYZER_OPTION( | ||
| 442 | unsigned, RegionStoreSmallStructLimit, "region-store-small-struct-limit", | ||
| 443 | "The largest number of fields a struct can have and still be considered " | ||
| 444 | "small. This is currently used to decide whether or not it is worth forcing " | ||
| 445 | "a LazyCompoundVal on bind. To disable all small-struct-dependent " | ||
| 446 | "behavior, set the option to 0.", | ||
| 447 | 2) | ||
| 448 | |||
| 449 | ANALYZER_OPTION( | ||
| 450 | unsigned, RegionStoreSmallArrayLimit, "region-store-small-array-limit", | ||
| 451 | "The largest number of elements an array can have and still be considered " | ||
| 452 | "small. This is currently used to decide whether or not it is worth forcing " | ||
| 453 | "a LazyCompoundVal on bind. To disable all small-array-dependent " | ||
| 454 | "behavior, set the option to 0.", | ||
| 455 | 5) | ||
| 456 | |||
| 457 | //===----------------------------------------------------------------------===// | ||
| 458 | // String analyzer options. | ||
| 459 | //===----------------------------------------------------------------------===// | ||
| 460 | |||
| 461 | ANALYZER_OPTION(StringRef, CTUDir, "ctu-dir", | ||
| 462 | "The directory containing the CTU related files.", "") | ||
| 463 | |||
| 464 | ANALYZER_OPTION(StringRef, CTUIndexName, "ctu-index-name", | ||
| 465 | "The name of the file containing the CTU index of definitions. " | ||
| 466 | "The index file maps USR-names to identifiers. An identifier " | ||
| 467 | "can end with an '.ast' suffix, indicating the indentifier is " | ||
| 468 | "a path to a pch-dump. Otherwise the identifier is regarded as " | ||
| 469 | "path to a source file which is parsed on-demand. Relative " | ||
| 470 | "paths are prefixed with ctu-dir, absolute paths are used " | ||
| 471 | "unmodified during lookup.", | ||
| 472 | "externalDefMap.txt") | ||
| 473 | |||
| 474 | ANALYZER_OPTION( | ||
| 475 | StringRef, CTUInvocationList, "ctu-invocation-list", | ||
| 476 | "The path to the YAML format file containing a mapping from source file " | ||
| 477 | "paths to command-line invocations represented as a list of arguments. " | ||
| 478 | "This invocation is used produce the source-file's AST in case on-demand " | ||
| 479 | "loading is performed. Example file-content: " | ||
| 480 |     "{/main.cpp: [clang++, /main.cpp], other.cpp: [clang++, /other.cpp]}", | ||
| 481 | "invocations.yaml") | ||
| 482 | |||
| 483 | ANALYZER_OPTION( | ||
| 484 | StringRef, ModelPath, "model-path", | ||
| 485 | "The analyzer can inline an alternative implementation written in C at the " | ||
| 486 | "call site if the called function's body is not available. This is a path " | ||
| 487 | "where to look for those alternative implementations (called models).", | ||
| 488 | "") | ||
| 489 | |||
| 490 | ANALYZER_OPTION( | ||
| 491 | StringRef, CXXMemberInliningMode, "c++-inlining", | ||
| 492 | "Controls which C++ member functions will be considered for inlining. " | ||
| 493 | "Value: \"constructors\", \"destructors\", \"methods\".", | ||
| 494 | "destructors") | ||
| 495 | |||
| 496 | ANALYZER_OPTION( | ||
| 497 | StringRef, ExplorationStrategy, "exploration_strategy", | ||
| 498 | "Value: \"dfs\", \"bfs\", \"unexplored_first\", " | ||
| 499 | "\"unexplored_first_queue\", \"unexplored_first_location_queue\", " | ||
| 500 | "\"bfs_block_dfs_contents\".", | ||
| 501 | "unexplored_first_queue") | ||
| 502 | |||
| 503 | ANALYZER_OPTION( | ||
| 504 | StringRef, RawSilencedCheckersAndPackages, "silence-checkers", | ||
| 505 | "A semicolon separated list of checker and package names to silence. " | ||
| 506 | "Silenced checkers will not emit reports, but the modeling remain enabled.", | ||
| 507 | "") | ||
| 508 | |||
| 509 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( | ||
| 510 | StringRef, IPAMode, "ipa", | ||
| 511 | "Controls the mode of inter-procedural analysis. Value: \"none\", " | ||
| 512 | "\"basic-inlining\", \"inlining\", \"dynamic\", \"dynamic-bifurcate\".", | ||
| 513 | /* SHALLOW_VAL */ "inlining", /* DEEP_VAL */ "dynamic-bifurcate") | ||
| 514 | |||
| 515 | #undef ANALYZER_OPTION_DEPENDS_ON_USER_MODE | ||
| 516 | #undef ANALYZER_OPTION |