Details | Last modification | View Log | RSS feed
| Rev | Author | Line No. | Line |
|---|---|---|---|
| 14 | pmbaty | 1 | //===-- AnalyzerOptions.def - Metadata about Static Analyses ----*- C++ -*-===// |
| 2 | // |
||
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
||
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
||
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
||
| 6 | // |
||
| 7 | //===----------------------------------------------------------------------===// |
||
| 8 | // |
||
| 9 | // This file defines the analyzer options avaible with -analyzer-config. |
||
| 10 | // |
||
| 11 | //===----------------------------------------------------------------------===// |
||
| 12 | |||
| 13 | #ifndef LLVM_ADT_STRINGREF_H |
||
| 14 | #error This .def file is expected to be included in translation units where \ |
||
| 15 | "llvm/ADT/StringRef.h" is already included! |
||
| 16 | #endif |
||
| 17 | |||
| 18 | #ifdef ANALYZER_OPTION |
||
| 19 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
||
| 20 | #error If you didnt include this file with the intent of generating methods, \ |
||
| 21 | define both 'ANALYZER_OPTION' and 'ANALYZER_OPTION_DEPENDS_ON_USER_MODE' macros! |
||
| 22 | #endif |
||
| 23 | #endif |
||
| 24 | |||
| 25 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
||
| 26 | #ifdef ANALYZER_OPTION |
||
| 27 | #error If you didnt include this file with the intent of generating methods, \ |
||
| 28 | define both 'ANALYZER_OPTION' and 'ANALYZER_OPTION_DEPENDS_ON_USER_MODE' macros! |
||
| 29 | #endif |
||
| 30 | #endif |
||
| 31 | |||
| 32 | #ifndef ANALYZER_OPTION |
||
| 33 | /// Create a new analyzer option, but dont generate a method for it in |
||
| 34 | /// AnalyzerOptions. |
||
| 35 | /// |
||
| 36 | /// TYPE - The type of the option object that will be stored in |
||
| 37 | /// AnalyzerOptions. This file is expected to be icluded in translation |
||
| 38 | /// units where AnalyzerOptions.h is included, so types from that |
||
| 39 | /// header should be used. |
||
| 40 | /// NAME - The name of the option object. |
||
| 41 | /// CMDFLAG - The command line flag for the option. |
||
| 42 | /// (-analyzer-config CMDFLAG=VALUE) |
||
| 43 | /// DESC - Description of the flag. |
||
| 44 | /// DEFAULT_VAL - The default value for CMDFLAG. |
||
| 45 | #define ANALYZER_OPTION(TYPE, NAME, CMDFLAG, DESC, DEFAULT_VAL) |
||
| 46 | #endif |
||
| 47 | |||
| 48 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
||
| 49 | /// Create a new analyzer option, but dont generate a method for it in |
||
| 50 | /// AnalyzerOptions. It's value depends on the option "user-mode". |
||
| 51 | /// |
||
| 52 | /// TYPE - The type of the option object that will be stored in |
||
| 53 | /// AnalyzerOptions. This file is expected to be icluded in translation |
||
| 54 | /// units where AnalyzerOptions.h is included, so types from that |
||
| 55 | /// header should be used. |
||
| 56 | /// NAME - The name of the option object. |
||
| 57 | /// CMDFLAG - The command line flag for the option. |
||
| 58 | /// (-analyzer-config CMDFLAG=VALUE) |
||
| 59 | /// DESC - Description of the flag. |
||
| 60 | /// SHALLOW_VAL - The default value for CMDFLAG, when "user-mode" was set to |
||
| 61 | /// "shallow". |
||
| 62 | /// DEEP_VAL - The default value for CMDFLAG, when "user-mode" was set to |
||
| 63 | /// "deep". |
||
| 64 | #define ANALYZER_OPTION_DEPENDS_ON_USER_MODE(TYPE, NAME, CMDFLAG, DESC, \ |
||
| 65 | SHALLOW_VAL, DEEP_VAL) |
||
| 66 | #endif |
||
| 67 | |||
| 68 | //===----------------------------------------------------------------------===// |
||
| 69 | // The "mode" option. Since some options depend on this, we list it on top of |
||
| 70 | // this file in order to make sure that the generated field for it is |
||
| 71 | // initialized before the rest. |
||
| 72 | //===----------------------------------------------------------------------===// |
||
| 73 | |||
| 74 | ANALYZER_OPTION( |
||
| 75 | StringRef, UserMode, "mode", |
||
| 76 | "(string) Controls the high-level analyzer mode, which influences the " |
||
| 77 | "default settings for some of the lower-level config options (such as " |
||
| 78 | "IPAMode). Value: \"deep\", \"shallow\".", |
||
| 79 | "deep") |
||
| 80 | |||
| 81 | //===----------------------------------------------------------------------===// |
||
| 82 | // Boolean analyzer options. |
||
| 83 | //===----------------------------------------------------------------------===// |
||
| 84 | |||
| 85 | ANALYZER_OPTION(bool, ShouldIncludeImplicitDtorsInCFG, "cfg-implicit-dtors", |
||
| 86 | "Whether or not implicit destructors for C++ objects " |
||
| 87 | "should be included in the CFG.", |
||
| 88 | true) |
||
| 89 | |||
| 90 | ANALYZER_OPTION(bool, ShouldIncludeTemporaryDtorsInCFG, "cfg-temporary-dtors", |
||
| 91 | "Whether or not the destructors for C++ temporary " |
||
| 92 | "objects should be included in the CFG.", |
||
| 93 | true) |
||
| 94 | |||
| 95 | ANALYZER_OPTION( |
||
| 96 | bool, ShouldIncludeLifetimeInCFG, "cfg-lifetime", |
||
| 97 | "Whether or not end-of-lifetime information should be included in the CFG.", |
||
| 98 | false) |
||
| 99 | |||
| 100 | ANALYZER_OPTION(bool, ShouldIncludeLoopExitInCFG, "cfg-loopexit", |
||
| 101 | "Whether or not the end of the loop information should " |
||
| 102 | "be included in the CFG.", |
||
| 103 | false) |
||
| 104 | |||
| 105 | ANALYZER_OPTION(bool, ShouldIncludeRichConstructorsInCFG, |
||
| 106 | "cfg-rich-constructors", |
||
| 107 | "Whether or not construction site information should be " |
||
| 108 | "included in the CFG C++ constructor elements.", |
||
| 109 | true) |
||
| 110 | |||
| 111 | ANALYZER_OPTION( |
||
| 112 | bool, ShouldIncludeScopesInCFG, "cfg-scopes", |
||
| 113 | "Whether or not scope information should be included in the CFG.", false) |
||
| 114 | |||
| 115 | ANALYZER_OPTION(bool, ShouldIncludeDefaultInitForAggregates, |
||
| 116 | "cfg-expand-default-aggr-inits", |
||
| 117 | "Whether or not inline CXXDefaultInitializers for aggregate " |
||
| 118 | "initialization in the CFG.", |
||
| 119 | false) |
||
| 120 | |||
| 121 | ANALYZER_OPTION( |
||
| 122 | bool, MayInlineTemplateFunctions, "c++-template-inlining", |
||
| 123 | "Whether or not templated functions may be considered for inlining.", true) |
||
| 124 | |||
| 125 | ANALYZER_OPTION(bool, MayInlineCXXStandardLibrary, "c++-stdlib-inlining", |
||
| 126 | "Whether or not C++ standard library functions may be " |
||
| 127 | "considered for inlining.", |
||
| 128 | true) |
||
| 129 | |||
| 130 | ANALYZER_OPTION(bool, MayInlineCXXAllocator, "c++-allocator-inlining", |
||
| 131 | "Whether or not allocator and deallocator calls may be " |
||
| 132 | "considered for inlining.", |
||
| 133 | true) |
||
| 134 | |||
| 135 | ANALYZER_OPTION( |
||
| 136 | bool, MayInlineCXXSharedPtrDtor, "c++-shared_ptr-inlining", |
||
| 137 | "Whether or not the destructor of C++ 'shared_ptr' may be considered for " |
||
| 138 | "inlining. This covers std::shared_ptr, std::tr1::shared_ptr, and " |
||
| 139 | "boost::shared_ptr, and indeed any destructor named '~shared_ptr'.", |
||
| 140 | false) |
||
| 141 | |||
| 142 | ANALYZER_OPTION(bool, MayInlineCXXTemporaryDtors, "c++-temp-dtor-inlining", |
||
| 143 | "Whether C++ temporary destructors should be inlined " |
||
| 144 | "during analysis. If temporary destructors are disabled " |
||
| 145 | "in the CFG via the 'cfg-temporary-dtors' option, " |
||
| 146 | "temporary destructors would not be inlined anyway.", |
||
| 147 | true) |
||
| 148 | |||
| 149 | ANALYZER_OPTION( |
||
| 150 | bool, ShouldSuppressNullReturnPaths, "suppress-null-return-paths", |
||
| 151 | "Whether or not paths that go through null returns should be suppressed. " |
||
| 152 | "This is a heuristic for avoiding bug reports with paths that go through " |
||
| 153 | "inlined functions that are more defensive than their callers.", |
||
| 154 | true) |
||
| 155 | |||
| 156 | ANALYZER_OPTION( |
||
| 157 | bool, ShouldAvoidSuppressingNullArgumentPaths, |
||
| 158 | "avoid-suppressing-null-argument-paths", |
||
| 159 | "Whether a bug report should not be suppressed if its path includes a call " |
||
| 160 | "with a null argument, even if that call has a null return. This option " |
||
| 161 | "has no effect when ShouldSuppressNullReturnPaths is false. This is a " |
||
| 162 | "counter-heuristic to avoid false negatives.", |
||
| 163 | false) |
||
| 164 | |||
| 165 | ANALYZER_OPTION(bool, ShouldSuppressInlinedDefensiveChecks, |
||
| 166 | "suppress-inlined-defensive-checks", |
||
| 167 | "Whether or not diagnostics containing inlined " |
||
| 168 | "defensive NULL checks should be suppressed.", |
||
| 169 | true) |
||
| 170 | |||
| 171 | ANALYZER_OPTION(bool, MayInlineCXXContainerMethods, "c++-container-inlining", |
||
| 172 | "Whether or not methods of C++ container objects may be " |
||
| 173 | "considered for inlining.", |
||
| 174 | false) |
||
| 175 | |||
| 176 | ANALYZER_OPTION(bool, ShouldSuppressFromCXXStandardLibrary, |
||
| 177 | "suppress-c++-stdlib", |
||
| 178 | "Whether or not diagnostics reported within the C++ " |
||
| 179 | "standard library should be suppressed.", |
||
| 180 | true) |
||
| 181 | |||
| 182 | ANALYZER_OPTION(bool, ShouldCrosscheckWithZ3, "crosscheck-with-z3", |
||
| 183 | "Whether bug reports should be crosschecked with the Z3 " |
||
| 184 | "constraint manager backend.", |
||
| 185 | false) |
||
| 186 | |||
| 187 | ANALYZER_OPTION(bool, ShouldReportIssuesInMainSourceFile, |
||
| 188 | "report-in-main-source-file", |
||
| 189 | "Whether or not the diagnostic report should be always " |
||
| 190 | "reported in the main source file and not the headers.", |
||
| 191 | false) |
||
| 192 | |||
| 193 | ANALYZER_OPTION(bool, ShouldWriteStableReportFilename, "stable-report-filename", |
||
| 194 | "Deprecated: report filenames are now always stable. " |
||
| 195 | "See also 'verbose-report-filename'.", |
||
| 196 | false) |
||
| 197 | |||
| 198 | ANALYZER_OPTION(bool, ShouldWriteVerboseReportFilename, "verbose-report-filename", |
||
| 199 | "Whether or not the report filename should contain extra " |
||
| 200 | "information about the issue.", |
||
| 201 | false) |
||
| 202 | |||
| 203 | ANALYZER_OPTION( |
||
| 204 | bool, ShouldSerializeStats, "serialize-stats", |
||
| 205 | "Whether the analyzer should serialize statistics to plist output. " |
||
| 206 | "Statistics would be serialized in JSON format inside the main dictionary " |
||
| 207 | "under the statistics key. Available only if compiled in assert mode or " |
||
| 208 | "with LLVM statistics explicitly enabled.", |
||
| 209 | false) |
||
| 210 | |||
| 211 | ANALYZER_OPTION(bool, MayInlineObjCMethod, "objc-inlining", |
||
| 212 | "Whether ObjectiveC inlining is enabled, false otherwise.", |
||
| 213 | true) |
||
| 214 | |||
| 215 | ANALYZER_OPTION(bool, ShouldPrunePaths, "prune-paths", |
||
| 216 | "Whether irrelevant parts of a bug report path should " |
||
| 217 | "be pruned out of the final output.", |
||
| 218 | true) |
||
| 219 | |||
| 220 | ANALYZER_OPTION(bool, ShouldAddPopUpNotes, "add-pop-up-notes", |
||
| 221 | "Whether pop-up notes should be added to the final output.", |
||
| 222 | true) |
||
| 223 | |||
| 224 | ANALYZER_OPTION( |
||
| 225 | bool, ShouldConditionalizeStaticInitializers, |
||
| 226 | "cfg-conditional-static-initializers", |
||
| 227 | "Whether 'static' initializers should be in conditional logic in the CFG.", |
||
| 228 | true) |
||
| 229 | |||
| 230 | ANALYZER_OPTION(bool, ShouldSynthesizeBodies, "faux-bodies", |
||
| 231 | "Whether the analyzer engine should synthesize fake " |
||
| 232 | "bodies for well-known functions.", |
||
| 233 | true) |
||
| 234 | |||
| 235 | ANALYZER_OPTION( |
||
| 236 | bool, ShouldElideConstructors, "elide-constructors", |
||
| 237 | "Whether elidable C++ copy-constructors and move-constructors should be " |
||
| 238 | "actually elided during analysis. Both behaviors are allowed by the C++ " |
||
| 239 | "standard, and the analyzer, like CodeGen, defaults to eliding. Starting " |
||
| 240 | "with C++17 some elisions become mandatory, and in these cases the option " |
||
| 241 | "will be ignored.", |
||
| 242 | true) |
||
| 243 | |||
| 244 | ANALYZER_OPTION( |
||
| 245 | bool, ShouldInlineLambdas, "inline-lambdas", |
||
| 246 | "Whether lambdas should be inlined. Otherwise a sink node will be " |
||
| 247 | "generated each time a LambdaExpr is visited.", |
||
| 248 | true) |
||
| 249 | |||
| 250 | ANALYZER_OPTION(bool, ShouldWidenLoops, "widen-loops", |
||
| 251 | "Whether the analysis should try to widen loops.", false) |
||
| 252 | |||
| 253 | ANALYZER_OPTION( |
||
| 254 | bool, ShouldUnrollLoops, "unroll-loops", |
||
| 255 | "Whether the analysis should try to unroll loops with known bounds.", false) |
||
| 256 | |||
| 257 | ANALYZER_OPTION( |
||
| 258 | bool, ShouldDisplayNotesAsEvents, "notes-as-events", |
||
| 259 | "Whether the bug reporter should transparently treat extra note diagnostic " |
||
| 260 | "pieces as event diagnostic pieces. Useful when the diagnostic consumer " |
||
| 261 | "doesn't support the extra note pieces.", |
||
| 262 | false) |
||
| 263 | |||
| 264 | ANALYZER_OPTION( |
||
| 265 | bool, ShouldAggressivelySimplifyBinaryOperation, |
||
| 266 | "aggressive-binary-operation-simplification", |
||
| 267 | "Whether SValBuilder should rearrange comparisons and additive operations " |
||
| 268 | "of symbolic expressions which consist of a sum of a symbol and a concrete " |
||
| 269 | "integer into the format where symbols are on the left-hand side and the " |
||
| 270 | "integer is on the right. This is only done if both symbols and both " |
||
| 271 | "concrete integers are signed, greater than or equal to the quarter of the " |
||
| 272 | "minimum value of the type and less than or equal to the quarter of the " |
||
| 273 | "maximum value of that type. A + n <OP> B + m becomes A - B <OP> m - n, " |
||
| 274 | "where A and B symbolic, n and m are integers. <OP> is any of '==', '!=', " |
||
| 275 | "'<', '<=', '>', '>=', '+' or '-'. The rearrangement also happens with '-' " |
||
| 276 | "instead of '+' on either or both side and also if any or both integers " |
||
| 277 | "are missing.", |
||
| 278 | false) |
||
| 279 | |||
| 280 | ANALYZER_OPTION( |
||
| 281 | bool, ShouldEagerlyAssume, "eagerly-assume", |
||
| 282 | "Whether we should eagerly assume evaluations of conditionals, thus, " |
||
| 283 | "bifurcating the path. This indicates how the engine should handle " |
||
| 284 | "expressions such as: 'x = (y != 0)'. When this is true then the " |
||
| 285 | "subexpression 'y != 0' will be eagerly assumed to be true or false, thus " |
||
| 286 | "evaluating it to the integers 0 or 1 respectively. The upside is that " |
||
| 287 | "this can increase analysis precision until we have a better way to lazily " |
||
| 288 | "evaluate such logic. The downside is that it eagerly bifurcates paths.", |
||
| 289 | true) |
||
| 290 | |||
| 291 | ANALYZER_OPTION( |
||
| 292 | bool, IsNaiveCTUEnabled, "experimental-enable-naive-ctu-analysis", |
||
| 293 | "Whether naive cross translation unit analysis is enabled. This is an " |
||
| 294 | "experimental feature to inline functions from other translation units.", |
||
| 295 | false) |
||
| 296 | |||
| 297 | ANALYZER_OPTION(bool, ShouldDisplayMacroExpansions, "expand-macros", |
||
| 298 | "Whether macros related to the bugpath should be " |
||
| 299 | "expanded and included in the plist output.", |
||
| 300 | false) |
||
| 301 | |||
| 302 | ANALYZER_OPTION(bool, DisplayCTUProgress, "display-ctu-progress", |
||
| 303 | "Whether to emit verbose output about " |
||
| 304 | "the analyzer's progress related to ctu.", |
||
| 305 | false) |
||
| 306 | |||
| 307 | ANALYZER_OPTION(bool, ShouldTrackConditions, "track-conditions", |
||
| 308 | "Whether to track conditions that are a control dependency of " |
||
| 309 | "an already tracked variable.", |
||
| 310 | true) |
||
| 311 | |||
| 312 | ANALYZER_OPTION(bool, ShouldTrackConditionsDebug, "track-conditions-debug", |
||
| 313 | "Whether to place an event at each tracked condition.", |
||
| 314 | false) |
||
| 315 | |||
| 316 | ANALYZER_OPTION(bool, ShouldApplyFixIts, "apply-fixits", |
||
| 317 | "Apply the fix-it hints to the files", |
||
| 318 | false) |
||
| 319 | |||
| 320 | ANALYZER_OPTION(bool, ShouldDisplayCheckerNameForText, "display-checker-name", |
||
| 321 | "Display the checker name for textual outputs", |
||
| 322 | true) |
||
| 323 | |||
| 324 | ANALYZER_OPTION(bool, ShouldSupportSymbolicIntegerCasts, |
||
| 325 | "support-symbolic-integer-casts", |
||
| 326 | "Produce cast symbols for integral types.", |
||
| 327 | false) |
||
| 328 | |||
| 329 | ANALYZER_OPTION( |
||
| 330 | bool, ShouldConsiderSingleElementArraysAsFlexibleArrayMembers, |
||
| 331 | "consider-single-element-arrays-as-flexible-array-members", |
||
| 332 | "Consider single element arrays as flexible array member candidates. " |
||
| 333 | "This will prevent the analyzer from assuming that a single element array " |
||
| 334 | "holds a single element. [DEPRECATED, removing in clang-17; " |
||
| 335 | "use '-fstrict-flex-arrays=<N>' instead]", |
||
| 336 | true) |
||
| 337 | |||
| 338 | ANALYZER_OPTION( |
||
| 339 | bool, ShouldAssumeControlledEnvironment, "assume-controlled-environment", |
||
| 340 | "Whether the analyzed application runs in a controlled environment. " |
||
| 341 | "We will assume that environment variables exist in queries and they hold " |
||
| 342 | "no malicious data. For instance, if this option is enabled, 'getenv()' " |
||
| 343 | "might be modeled by the analyzer to never return NULL.", |
||
| 344 | false) |
||
| 345 | |||
| 346 | ANALYZER_OPTION( |
||
| 347 | bool, ShouldIgnoreBisonGeneratedFiles, "ignore-bison-generated-files", |
||
| 348 | "If enabled, any files containing the \"/* A Bison parser, made by\" " |
||
| 349 | "won't be analyzed.", |
||
| 350 | true) |
||
| 351 | |||
| 352 | ANALYZER_OPTION( |
||
| 353 | bool, ShouldIgnoreFlexGeneratedFiles, "ignore-flex-generated-files", |
||
| 354 | "If enabled, any files containing the \"/* A lexical scanner generated by " |
||
| 355 | "flex\" won't be analyzed.", |
||
| 356 | true) |
||
| 357 | |||
| 358 | //===----------------------------------------------------------------------===// |
||
| 359 | // Unsigned analyzer options. |
||
| 360 | //===----------------------------------------------------------------------===// |
||
| 361 | |||
| 362 | ANALYZER_OPTION(unsigned, CTUImportThreshold, "ctu-import-threshold", |
||
| 363 | "The maximal amount of translation units that is considered " |
||
| 364 | "for import when inlining functions during CTU analysis. " |
||
| 365 | "Lowering this threshold can alleviate the memory burden of " |
||
| 366 | "analysis with many interdependent definitions located in " |
||
| 367 | "various translation units. This is valid only for non C++ " |
||
| 368 | "source files.", |
||
| 369 | 24u) |
||
| 370 | |||
| 371 | ANALYZER_OPTION(unsigned, CTUImportCppThreshold, "ctu-import-cpp-threshold", |
||
| 372 | "The maximal amount of translation units that is considered " |
||
| 373 | "for import when inlining functions during CTU analysis of C++ " |
||
| 374 | "source files.", |
||
| 375 | 8u) |
||
| 376 | |||
| 377 | ANALYZER_OPTION( |
||
| 378 | unsigned, AlwaysInlineSize, "ipa-always-inline-size", |
||
| 379 | "The size of the functions (in basic blocks), which should be considered " |
||
| 380 | "to be small enough to always inline.", |
||
| 381 | 3) |
||
| 382 | |||
| 383 | ANALYZER_OPTION( |
||
| 384 | unsigned, GraphTrimInterval, "graph-trim-interval", |
||
| 385 | "How often nodes in the ExplodedGraph should be recycled to save memory. " |
||
| 386 | "To disable node reclamation, set the option to 0.", |
||
| 387 | 1000) |
||
| 388 | |||
| 389 | ANALYZER_OPTION( |
||
| 390 | unsigned, MinCFGSizeTreatFunctionsAsLarge, |
||
| 391 | "min-cfg-size-treat-functions-as-large", |
||
| 392 | "The number of basic blocks a function needs to have to be considered " |
||
| 393 | "large for the 'max-times-inline-large' config option.", |
||
| 394 | 14) |
||
| 395 | |||
| 396 | ANALYZER_OPTION(unsigned, MaxSymbolComplexity, "max-symbol-complexity", |
||
| 397 | "The maximum complexity of symbolic constraint.", 35) |
||
| 398 | |||
| 399 | ANALYZER_OPTION(unsigned, MaxTimesInlineLarge, "max-times-inline-large", |
||
| 400 | "The maximum times a large function could be inlined.", 32) |
||
| 401 | |||
| 402 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( |
||
| 403 | unsigned, MaxInlinableSize, "max-inlinable-size", |
||
| 404 | "The bound on the number of basic blocks in an inlined function.", |
||
| 405 | /* SHALLOW_VAL */ 4, /* DEEP_VAL */ 100) |
||
| 406 | |||
| 407 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( |
||
| 408 | unsigned, MaxNodesPerTopLevelFunction, "max-nodes", |
||
| 409 | "The maximum number of nodes the analyzer can generate while exploring a " |
||
| 410 | "top level function (for each exploded graph). 0 means no limit.", |
||
| 411 | /* SHALLOW_VAL */ 75000, /* DEEP_VAL */ 225000) |
||
| 412 | |||
| 413 | ANALYZER_OPTION( |
||
| 414 | unsigned, CTUMaxNodesPercentage, "ctu-max-nodes-pct", |
||
| 415 | "The percentage of single-TU analysed nodes that the CTU analysis is " |
||
| 416 | "allowed to visit.", 50) |
||
| 417 | |||
| 418 | ANALYZER_OPTION( |
||
| 419 | unsigned, CTUMaxNodesMin, "ctu-max-nodes-min", |
||
| 420 | "The maximum number of nodes in CTU mode is determinded by " |
||
| 421 | "'ctu-max-nodes-pct'. However, if the number of nodes in single-TU " |
||
| 422 | "analysis is too low, it is meaningful to provide a minimum value that " |
||
| 423 | "serves as an upper bound instead.", 10000) |
||
| 424 | |||
| 425 | ANALYZER_OPTION( |
||
| 426 | StringRef, CTUPhase1InliningMode, "ctu-phase1-inlining", |
||
| 427 | "Controls which functions will be inlined during the first phase of the ctu " |
||
| 428 | "analysis. " |
||
| 429 | "If the value is set to 'all' then all foreign functions are inlinied " |
||
| 430 | "immediately during the first phase, thus rendering the second phase a noop. " |
||
| 431 | "The 'ctu-max-nodes-*' budge has no effect in this case. " |
||
| 432 | "If the value is 'small' then only functions with a linear CFG and with a " |
||
| 433 | "limited number of statements would be inlined during the first phase. The " |
||
| 434 | "long and/or nontrivial functions are handled in the second phase and are " |
||
| 435 | "controlled by the 'ctu-max-nodes-*' budge. " |
||
| 436 | "The value 'none' means that all foreign functions are inlined only in the " |
||
| 437 | "second phase, 'ctu-max-nodes-*' budge limits the second phase. " |
||
| 438 | "Value: \"none\", \"small\", \"all\".", |
||
| 439 | "small") |
||
| 440 | |||
| 441 | ANALYZER_OPTION( |
||
| 442 | unsigned, RegionStoreSmallStructLimit, "region-store-small-struct-limit", |
||
| 443 | "The largest number of fields a struct can have and still be considered " |
||
| 444 | "small. This is currently used to decide whether or not it is worth forcing " |
||
| 445 | "a LazyCompoundVal on bind. To disable all small-struct-dependent " |
||
| 446 | "behavior, set the option to 0.", |
||
| 447 | 2) |
||
| 448 | |||
| 449 | ANALYZER_OPTION( |
||
| 450 | unsigned, RegionStoreSmallArrayLimit, "region-store-small-array-limit", |
||
| 451 | "The largest number of elements an array can have and still be considered " |
||
| 452 | "small. This is currently used to decide whether or not it is worth forcing " |
||
| 453 | "a LazyCompoundVal on bind. To disable all small-array-dependent " |
||
| 454 | "behavior, set the option to 0.", |
||
| 455 | 5) |
||
| 456 | |||
| 457 | //===----------------------------------------------------------------------===// |
||
| 458 | // String analyzer options. |
||
| 459 | //===----------------------------------------------------------------------===// |
||
| 460 | |||
| 461 | ANALYZER_OPTION(StringRef, CTUDir, "ctu-dir", |
||
| 462 | "The directory containing the CTU related files.", "") |
||
| 463 | |||
| 464 | ANALYZER_OPTION(StringRef, CTUIndexName, "ctu-index-name", |
||
| 465 | "The name of the file containing the CTU index of definitions. " |
||
| 466 | "The index file maps USR-names to identifiers. An identifier " |
||
| 467 | "can end with an '.ast' suffix, indicating the indentifier is " |
||
| 468 | "a path to a pch-dump. Otherwise the identifier is regarded as " |
||
| 469 | "path to a source file which is parsed on-demand. Relative " |
||
| 470 | "paths are prefixed with ctu-dir, absolute paths are used " |
||
| 471 | "unmodified during lookup.", |
||
| 472 | "externalDefMap.txt") |
||
| 473 | |||
| 474 | ANALYZER_OPTION( |
||
| 475 | StringRef, CTUInvocationList, "ctu-invocation-list", |
||
| 476 | "The path to the YAML format file containing a mapping from source file " |
||
| 477 | "paths to command-line invocations represented as a list of arguments. " |
||
| 478 | "This invocation is used produce the source-file's AST in case on-demand " |
||
| 479 | "loading is performed. Example file-content: " |
||
| 480 | "{/main.cpp: [clang++, /main.cpp], other.cpp: [clang++, /other.cpp]}", |
||
| 481 | "invocations.yaml") |
||
| 482 | |||
| 483 | ANALYZER_OPTION( |
||
| 484 | StringRef, ModelPath, "model-path", |
||
| 485 | "The analyzer can inline an alternative implementation written in C at the " |
||
| 486 | "call site if the called function's body is not available. This is a path " |
||
| 487 | "where to look for those alternative implementations (called models).", |
||
| 488 | "") |
||
| 489 | |||
| 490 | ANALYZER_OPTION( |
||
| 491 | StringRef, CXXMemberInliningMode, "c++-inlining", |
||
| 492 | "Controls which C++ member functions will be considered for inlining. " |
||
| 493 | "Value: \"constructors\", \"destructors\", \"methods\".", |
||
| 494 | "destructors") |
||
| 495 | |||
| 496 | ANALYZER_OPTION( |
||
| 497 | StringRef, ExplorationStrategy, "exploration_strategy", |
||
| 498 | "Value: \"dfs\", \"bfs\", \"unexplored_first\", " |
||
| 499 | "\"unexplored_first_queue\", \"unexplored_first_location_queue\", " |
||
| 500 | "\"bfs_block_dfs_contents\".", |
||
| 501 | "unexplored_first_queue") |
||
| 502 | |||
| 503 | ANALYZER_OPTION( |
||
| 504 | StringRef, RawSilencedCheckersAndPackages, "silence-checkers", |
||
| 505 | "A semicolon separated list of checker and package names to silence. " |
||
| 506 | "Silenced checkers will not emit reports, but the modeling remain enabled.", |
||
| 507 | "") |
||
| 508 | |||
| 509 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( |
||
| 510 | StringRef, IPAMode, "ipa", |
||
| 511 | "Controls the mode of inter-procedural analysis. Value: \"none\", " |
||
| 512 | "\"basic-inlining\", \"inlining\", \"dynamic\", \"dynamic-bifurcate\".", |
||
| 513 | /* SHALLOW_VAL */ "inlining", /* DEEP_VAL */ "dynamic-bifurcate") |
||
| 514 | |||
| 515 | #undef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
||
| 516 | #undef ANALYZER_OPTION |