clang  7.0.0
AnalyzerOptions.h
Go to the documentation of this file.
1 //===- AnalyzerOptions.h - Analysis Engine Options --------------*- C++ -*-===//
2 //
3 // The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This header defines various options for the static analyzer that are set
11 // by the frontend and are consulted throughout the analyzer.
12 //
13 //===----------------------------------------------------------------------===//
14 
15 #ifndef LLVM_CLANG_STATICANALYZER_CORE_ANALYZEROPTIONS_H
16 #define LLVM_CLANG_STATICANALYZER_CORE_ANALYZEROPTIONS_H
17 
18 #include "clang/Basic/LLVM.h"
19 #include "llvm/ADT/IntrusiveRefCntPtr.h"
20 #include "llvm/ADT/Optional.h"
21 #include "llvm/ADT/StringMap.h"
22 #include "llvm/ADT/StringRef.h"
23 #include <string>
24 #include <utility>
25 #include <vector>
26 
27 namespace clang {
28 
29 namespace ento {
30 
31 class CheckerBase;
32 
33 } // namespace ento
34 
35 /// Analysis - Set of available source code analyses.
36 enum Analyses {
37 #define ANALYSIS(NAME, CMDFLAG, DESC, SCOPE) NAME,
38 #include "clang/StaticAnalyzer/Core/Analyses.def"
40 };
41 
42 /// AnalysisStores - Set of available analysis store models.
44 #define ANALYSIS_STORE(NAME, CMDFLAG, DESC, CREATFN) NAME##Model,
45 #include "clang/StaticAnalyzer/Core/Analyses.def"
47 };
48 
49 /// AnalysisConstraints - Set of available constraint models.
51 #define ANALYSIS_CONSTRAINTS(NAME, CMDFLAG, DESC, CREATFN) NAME##Model,
52 #include "clang/StaticAnalyzer/Core/Analyses.def"
54 };
55 
56 /// AnalysisDiagClients - Set of available diagnostic clients for rendering
57 /// analysis results.
59 #define ANALYSIS_DIAGNOSTICS(NAME, CMDFLAG, DESC, CREATFN) PD_##NAME,
60 #include "clang/StaticAnalyzer/Core/Analyses.def"
63 };
64 
65 /// AnalysisPurgeModes - Set of available strategies for dead symbol removal.
67 #define ANALYSIS_PURGE(NAME, CMDFLAG, DESC) NAME,
68 #include "clang/StaticAnalyzer/Core/Analyses.def"
70 };
71 
72 /// AnalysisInlineFunctionSelection - Set of inlining function selection heuristics.
74 #define ANALYSIS_INLINING_MODE(NAME, CMDFLAG, DESC) NAME,
75 #include "clang/StaticAnalyzer/Core/Analyses.def"
77 };
78 
79 /// Describes the different kinds of C++ member functions which can be
80 /// considered for inlining by the analyzer.
81 ///
82 /// These options are cumulative; enabling one kind of member function will
83 /// enable all kinds with lower enum values.
85  // Uninitialized = 0,
86 
87  /// A dummy mode in which no C++ inlining is enabled.
88  CIMK_None = 1,
89 
90  /// Refers to regular member function and operator calls.
92 
93  /// Refers to constructors (implicit or explicit).
94  ///
95  /// Note that a constructor will not be inlined if the corresponding
96  /// destructor is non-trivial.
98 
99  /// Refers to destructors (implicit or explicit).
101 };
102 
103 /// Describes the different modes of inter-procedural analysis.
104 enum IPAKind {
106 
107  /// Perform only intra-procedural analysis.
109 
110  /// Inline C functions and blocks when their definitions are available.
112 
113  /// Inline callees(C, C++, ObjC) when their definitions are available.
115 
116  /// Enable inlining of dynamically dispatched methods.
118 
119  /// Enable inlining of dynamically dispatched methods, bifurcate paths when
120  /// exact type info is unavailable.
122 };
123 
124 class AnalyzerOptions : public RefCountedBase<AnalyzerOptions> {
125 public:
126  using ConfigTable = llvm::StringMap<std::string>;
127 
128  static std::vector<StringRef>
129  getRegisteredCheckers(bool IncludeExperimental = false);
130 
131  /// Pair of checker name and enable/disable.
132  std::vector<std::pair<std::string, bool>> CheckersControlList;
133 
134  /// A key-value table of use-specified configuration values.
136  AnalysisStores AnalysisStoreOpt = RegionStoreModel;
137  AnalysisConstraints AnalysisConstraintsOpt = RangeConstraintsModel;
138  AnalysisDiagClients AnalysisDiagOpt = PD_HTML;
139  AnalysisPurgeMode AnalysisPurgeOpt = PurgeStmt;
140 
142 
143  /// Store full compiler invocation for reproducible instructions in the
144  /// generated report.
146 
147  /// The maximum number of times the analyzer visits a block.
149 
150  /// Disable all analyzer checks.
151  ///
152  /// This flag allows one to disable analyzer checks on the code processed by
153  /// the given analysis consumer. Note, the code will get parsed and the
154  /// command-line options will get checked.
155  unsigned DisableAllChecks : 1;
156 
157  unsigned ShowCheckerHelp : 1;
159  unsigned AnalyzeAll : 1;
161  unsigned AnalyzeNestedBlocks : 1;
162 
163  /// The flag regulates if we should eagerly assume evaluations of
164  /// conditionals, thus, bifurcating the path.
165  ///
166  /// This flag indicates how the engine should handle expressions such as: 'x =
167  /// (y != 0)'. When this flag is true then the subexpression 'y != 0' will be
168  /// eagerly assumed to be true or false, thus evaluating it to the integers 0
169  /// or 1 respectively. The upside is that this can increase analysis
170  /// precision until we have a better way to lazily evaluate such logic. The
171  /// downside is that it eagerly bifurcates paths.
173 
174  unsigned TrimGraph : 1;
177  unsigned UnoptimizedCFG : 1;
178  unsigned PrintStats : 1;
179 
180  /// Do not re-analyze paths leading to exhausted nodes with a different
181  /// strategy. We get better code coverage when retry is enabled.
182  unsigned NoRetryExhausted : 1;
183 
184  /// The inlining stack depth limit.
185  // Cap the stack depth at 4 calls (5 stack frames, base + 4 calls).
186  unsigned InlineMaxStackDepth = 5;
187 
188  /// The mode of function selection used during inlining.
189  AnalysisInliningMode InliningMode = NoRedundancy;
190 
192  DFS,
193  BFS,
194  UnexploredFirst,
195  UnexploredFirstQueue,
196  BFSBlockDFSContents,
197  NotSet
198  };
199 
200 private:
201  ExplorationStrategyKind ExplorationStrategy = ExplorationStrategyKind::NotSet;
202 
203  /// Describes the kinds for high-level analyzer mode.
204  enum UserModeKind {
205  UMK_NotSet = 0,
206 
207  /// Perform shallow but fast analyzes.
208  UMK_Shallow = 1,
209 
210  /// Perform deep analyzes.
211  UMK_Deep = 2
212  };
213 
214  /// Controls the high-level analyzer mode, which influences the default
215  /// settings for some of the lower-level config options (such as IPAMode).
216  /// \sa getUserMode
217  UserModeKind UserMode = UMK_NotSet;
218 
219  /// Controls the mode of inter-procedural analysis.
220  IPAKind IPAMode = IPAK_NotSet;
221 
222  /// Controls which C++ member functions will be considered for inlining.
223  CXXInlineableMemberKind CXXMemberInliningMode;
224 
225  /// \sa includeImplicitDtorsInCFG
226  Optional<bool> IncludeImplicitDtorsInCFG;
227 
228  /// \sa includeTemporaryDtorsInCFG
229  Optional<bool> IncludeTemporaryDtorsInCFG;
230 
231  /// \sa IncludeLifetimeInCFG
232  Optional<bool> IncludeLifetimeInCFG;
233 
234  /// \sa IncludeLoopExitInCFG
235  Optional<bool> IncludeLoopExitInCFG;
236 
237  /// \sa IncludeRichConstructorsInCFG
238  Optional<bool> IncludeRichConstructorsInCFG;
239 
240  /// \sa mayInlineCXXStandardLibrary
241  Optional<bool> InlineCXXStandardLibrary;
242 
243  /// \sa includeScopesInCFG
244  Optional<bool> IncludeScopesInCFG;
245 
246  /// \sa mayInlineTemplateFunctions
247  Optional<bool> InlineTemplateFunctions;
248 
249  /// \sa mayInlineCXXAllocator
250  Optional<bool> InlineCXXAllocator;
251 
252  /// \sa mayInlineCXXContainerMethods
253  Optional<bool> InlineCXXContainerMethods;
254 
255  /// \sa mayInlineCXXSharedPtrDtor
256  Optional<bool> InlineCXXSharedPtrDtor;
257 
258  /// \sa mayInlineCXXTemporaryDtors
259  Optional<bool> InlineCXXTemporaryDtors;
260 
261  /// \sa mayInlineObjCMethod
262  Optional<bool> ObjCInliningMode;
263 
264  // Cache of the "ipa-always-inline-size" setting.
265  // \sa getAlwaysInlineSize
266  Optional<unsigned> AlwaysInlineSize;
267 
268  /// \sa shouldSuppressNullReturnPaths
269  Optional<bool> SuppressNullReturnPaths;
270 
271  // \sa getMaxInlinableSize
272  Optional<unsigned> MaxInlinableSize;
273 
274  /// \sa shouldAvoidSuppressingNullArgumentPaths
275  Optional<bool> AvoidSuppressingNullArgumentPaths;
276 
277  /// \sa shouldSuppressInlinedDefensiveChecks
278  Optional<bool> SuppressInlinedDefensiveChecks;
279 
280  /// \sa shouldSuppressFromCXXStandardLibrary
281  Optional<bool> SuppressFromCXXStandardLibrary;
282 
283  /// \sa shouldCrosscheckWithZ3
284  Optional<bool> CrosscheckWithZ3;
285 
286  /// \sa reportIssuesInMainSourceFile
287  Optional<bool> ReportIssuesInMainSourceFile;
288 
289  /// \sa StableReportFilename
290  Optional<bool> StableReportFilename;
291 
292  Optional<bool> SerializeStats;
293 
294  /// \sa getGraphTrimInterval
295  Optional<unsigned> GraphTrimInterval;
296 
297  /// \sa getMaxSymbolComplexity
298  Optional<unsigned> MaxSymbolComplexity;
299 
300  /// \sa getMaxTimesInlineLarge
301  Optional<unsigned> MaxTimesInlineLarge;
302 
303  /// \sa getMinCFGSizeTreatFunctionsAsLarge
304  Optional<unsigned> MinCFGSizeTreatFunctionsAsLarge;
305 
306  /// \sa getMaxNodesPerTopLevelFunction
307  Optional<unsigned> MaxNodesPerTopLevelFunction;
308 
309  /// \sa shouldInlineLambdas
310  Optional<bool> InlineLambdas;
311 
312  /// \sa shouldWidenLoops
313  Optional<bool> WidenLoops;
314 
315  /// \sa shouldUnrollLoops
316  Optional<bool> UnrollLoops;
317 
318  /// \sa shouldDisplayNotesAsEvents
319  Optional<bool> DisplayNotesAsEvents;
320 
321  /// \sa shouldAggressivelySimplifyBinaryOperation
322  Optional<bool> AggressiveBinaryOperationSimplification;
323 
324  /// \sa getCTUDir
325  Optional<StringRef> CTUDir;
326 
327  /// \sa getCTUIndexName
328  Optional<StringRef> CTUIndexName;
329 
330  /// \sa naiveCTUEnabled
331  Optional<bool> NaiveCTU;
332 
333  /// \sa shouldElideConstructors
334  Optional<bool> ElideConstructors;
335 
336 
337  /// A helper function that retrieves option for a given full-qualified
338  /// checker name.
339  /// Options for checkers can be specified via 'analyzer-config' command-line
340  /// option.
341  /// Example:
342  /// @code-analyzer-config unix.Malloc:OptionName=CheckerOptionValue @endcode
343  /// or @code-analyzer-config unix:OptionName=GroupOptionValue @endcode
344  /// for groups of checkers.
345  /// @param [in] CheckerName Full-qualified checker name, like
346  /// alpha.unix.StreamChecker.
347  /// @param [in] OptionName Name of the option to get.
348  /// @param [in] Default Default value if no option is specified.
349  /// @param [in] SearchInParents If set to true and the searched option was not
350  /// specified for the given checker the options for the parent packages will
351  /// be searched as well. The inner packages take precedence over the outer
352  /// ones.
353  /// @retval CheckerOptionValue An option for a checker if it was specified.
354  /// @retval GroupOptionValue An option for group if it was specified and no
355  /// checker-specific options were found. The closer group to checker,
356  /// the more priority it has. For example, @c coregroup.subgroup has more
357  /// priority than @c coregroup for @c coregroup.subgroup.CheckerName checker.
358  /// @retval Default If nor checker option, nor group option was found.
359  StringRef getCheckerOption(StringRef CheckerName, StringRef OptionName,
360  StringRef Default,
361  bool SearchInParents = false);
362 
363 public:
365  : DisableAllChecks(false), ShowCheckerHelp(false),
366  ShowEnabledCheckerList(false), AnalyzeAll(false),
367  AnalyzerDisplayProgress(false), AnalyzeNestedBlocks(false),
368  eagerlyAssumeBinOpBifurcation(false), TrimGraph(false),
369  visualizeExplodedGraphWithGraphViz(false),
370  visualizeExplodedGraphWithUbiGraph(false), UnoptimizedCFG(false),
371  PrintStats(false), NoRetryExhausted(false), CXXMemberInliningMode() {}
372 
373  /// Interprets an option's string value as a boolean. The "true" string is
374  /// interpreted as true and the "false" string is interpreted as false.
375  ///
376  /// If an option value is not provided, returns the given \p DefaultVal.
377  /// @param [in] Name Name for option to retrieve.
378  /// @param [in] DefaultVal Default value returned if no such option was
379  /// specified.
380  /// @param [in] C The optional checker parameter that can be used to restrict
381  /// the search to the options of this particular checker (and its parents
382  /// depending on search mode).
383  /// @param [in] SearchInParents If set to true and the searched option was not
384  /// specified for the given checker the options for the parent packages will
385  /// be searched as well. The inner packages take precedence over the outer
386  /// ones.
387  bool getBooleanOption(StringRef Name, bool DefaultVal,
388  const ento::CheckerBase *C = nullptr,
389  bool SearchInParents = false);
390 
391  /// Variant that accepts a Optional value to cache the result.
392  ///
393  /// @param [in,out] V Return value storage, returned if parameter contains
394  /// an existing valid option, else it is used to store a return value
395  /// @param [in] Name Name for option to retrieve.
396  /// @param [in] DefaultVal Default value returned if no such option was
397  /// specified.
398  /// @param [in] C The optional checker parameter that can be used to restrict
399  /// the search to the options of this particular checker (and its parents
400  /// depending on search mode).
401  /// @param [in] SearchInParents If set to true and the searched option was not
402  /// specified for the given checker the options for the parent packages will
403  /// be searched as well. The inner packages take precedence over the outer
404  /// ones.
405  bool getBooleanOption(Optional<bool> &V, StringRef Name, bool DefaultVal,
406  const ento::CheckerBase *C = nullptr,
407  bool SearchInParents = false);
408 
409  /// Interprets an option's string value as an integer value.
410  ///
411  /// If an option value is not provided, returns the given \p DefaultVal.
412  /// @param [in] Name Name for option to retrieve.
413  /// @param [in] DefaultVal Default value returned if no such option was
414  /// specified.
415  /// @param [in] C The optional checker parameter that can be used to restrict
416  /// the search to the options of this particular checker (and its parents
417  /// depending on search mode).
418  /// @param [in] SearchInParents If set to true and the searched option was not
419  /// specified for the given checker the options for the parent packages will
420  /// be searched as well. The inner packages take precedence over the outer
421  /// ones.
422  int getOptionAsInteger(StringRef Name, int DefaultVal,
423  const ento::CheckerBase *C = nullptr,
424  bool SearchInParents = false);
425 
426  /// Query an option's string value.
427  ///
428  /// If an option value is not provided, returns the given \p DefaultVal.
429  /// @param [in] Name Name for option to retrieve.
430  /// @param [in] DefaultVal Default value returned if no such option was
431  /// specified.
432  /// @param [in] C The optional checker parameter that can be used to restrict
433  /// the search to the options of this particular checker (and its parents
434  /// depending on search mode).
435  /// @param [in] SearchInParents If set to true and the searched option was not
436  /// specified for the given checker the options for the parent packages will
437  /// be searched as well. The inner packages take precedence over the outer
438  /// ones.
439  StringRef getOptionAsString(StringRef Name, StringRef DefaultVal,
440  const ento::CheckerBase *C = nullptr,
441  bool SearchInParents = false);
442 
443  /// Retrieves and sets the UserMode. This is a high-level option,
444  /// which is used to set other low-level options. It is not accessible
445  /// outside of AnalyzerOptions.
446  UserModeKind getUserMode();
447 
448  ExplorationStrategyKind getExplorationStrategy();
449 
450  /// Returns the inter-procedural analysis mode.
451  IPAKind getIPAMode();
452 
453  /// Returns the option controlling which C++ member functions will be
454  /// considered for inlining.
455  ///
456  /// This is controlled by the 'c++-inlining' config option.
457  ///
458  /// \sa CXXMemberInliningMode
459  bool mayInlineCXXMemberFunction(CXXInlineableMemberKind K);
460 
461  /// Returns true if ObjectiveC inlining is enabled, false otherwise.
462  bool mayInlineObjCMethod();
463 
464  /// Returns whether or not the destructors for C++ temporary objects should
465  /// be included in the CFG.
466  ///
467  /// This is controlled by the 'cfg-temporary-dtors' config option, which
468  /// accepts the values "true" and "false".
469  bool includeTemporaryDtorsInCFG();
470 
471  /// Returns whether or not implicit destructors for C++ objects should
472  /// be included in the CFG.
473  ///
474  /// This is controlled by the 'cfg-implicit-dtors' config option, which
475  /// accepts the values "true" and "false".
476  bool includeImplicitDtorsInCFG();
477 
478  /// Returns whether or not end-of-lifetime information should be included in
479  /// the CFG.
480  ///
481  /// This is controlled by the 'cfg-lifetime' config option, which accepts
482  /// the values "true" and "false".
483  bool includeLifetimeInCFG();
484 
485  /// Returns whether or not the end of the loop information should be included
486  /// in the CFG.
487  ///
488  /// This is controlled by the 'cfg-loopexit' config option, which accepts
489  /// the values "true" and "false".
490  bool includeLoopExitInCFG();
491 
492  /// Returns whether or not construction site information should be included
493  /// in the CFG C++ constructor elements.
494  ///
495  /// This is controlled by the 'cfg-rich-constructors' config options,
496  /// which accepts the values "true" and "false".
497  bool includeRichConstructorsInCFG();
498 
499  /// Returns whether or not scope information should be included in the CFG.
500  ///
501  /// This is controlled by the 'cfg-scope-info' config option, which accepts
502  /// the values "true" and "false".
503  bool includeScopesInCFG();
504 
505  /// Returns whether or not C++ standard library functions may be considered
506  /// for inlining.
507  ///
508  /// This is controlled by the 'c++-stdlib-inlining' config option, which
509  /// accepts the values "true" and "false".
510  bool mayInlineCXXStandardLibrary();
511 
512  /// Returns whether or not templated functions may be considered for inlining.
513  ///
514  /// This is controlled by the 'c++-template-inlining' config option, which
515  /// accepts the values "true" and "false".
516  bool mayInlineTemplateFunctions();
517 
518  /// Returns whether or not allocator call may be considered for inlining.
519  ///
520  /// This is controlled by the 'c++-allocator-inlining' config option, which
521  /// accepts the values "true" and "false".
522  bool mayInlineCXXAllocator();
523 
524  /// Returns whether or not methods of C++ container objects may be considered
525  /// for inlining.
526  ///
527  /// This is controlled by the 'c++-container-inlining' config option, which
528  /// accepts the values "true" and "false".
529  bool mayInlineCXXContainerMethods();
530 
531  /// Returns whether or not the destructor of C++ 'shared_ptr' may be
532  /// considered for inlining.
533  ///
534  /// This covers std::shared_ptr, std::tr1::shared_ptr, and boost::shared_ptr,
535  /// and indeed any destructor named "~shared_ptr".
536  ///
537  /// This is controlled by the 'c++-shared_ptr-inlining' config option, which
538  /// accepts the values "true" and "false".
539  bool mayInlineCXXSharedPtrDtor();
540 
541  /// Returns true if C++ temporary destructors should be inlined during
542  /// analysis.
543  ///
544  /// If temporary destructors are disabled in the CFG via the
545  /// 'cfg-temporary-dtors' option, temporary destructors would not be
546  /// inlined anyway.
547  ///
548  /// This is controlled by the 'c++-temp-dtor-inlining' config option, which
549  /// accepts the values "true" and "false".
550  bool mayInlineCXXTemporaryDtors();
551 
552  /// Returns whether or not paths that go through null returns should be
553  /// suppressed.
554  ///
555  /// This is a heuristic for avoiding bug reports with paths that go through
556  /// inlined functions that are more defensive than their callers.
557  ///
558  /// This is controlled by the 'suppress-null-return-paths' config option,
559  /// which accepts the values "true" and "false".
560  bool shouldSuppressNullReturnPaths();
561 
562  /// Returns whether a bug report should \em not be suppressed if its path
563  /// includes a call with a null argument, even if that call has a null return.
564  ///
565  /// This option has no effect when #shouldSuppressNullReturnPaths() is false.
566  ///
567  /// This is a counter-heuristic to avoid false negatives.
568  ///
569  /// This is controlled by the 'avoid-suppressing-null-argument-paths' config
570  /// option, which accepts the values "true" and "false".
571  bool shouldAvoidSuppressingNullArgumentPaths();
572 
573  /// Returns whether or not diagnostics containing inlined defensive NULL
574  /// checks should be suppressed.
575  ///
576  /// This is controlled by the 'suppress-inlined-defensive-checks' config
577  /// option, which accepts the values "true" and "false".
578  bool shouldSuppressInlinedDefensiveChecks();
579 
580  /// Returns whether or not diagnostics reported within the C++ standard
581  /// library should be suppressed.
582  ///
583  /// This is controlled by the 'suppress-c++-stdlib' config option,
584  /// which accepts the values "true" and "false".
585  bool shouldSuppressFromCXXStandardLibrary();
586 
587  /// Returns whether bug reports should be crosschecked with the Z3
588  /// constraint manager backend.
589  ///
590  /// This is controlled by the 'crosscheck-with-z3' config option,
591  /// which accepts the values "true" and "false".
592  bool shouldCrosscheckWithZ3();
593 
594  /// Returns whether or not the diagnostic report should be always reported
595  /// in the main source file and not the headers.
596  ///
597  /// This is controlled by the 'report-in-main-source-file' config option,
598  /// which accepts the values "true" and "false".
599  bool shouldReportIssuesInMainSourceFile();
600 
601  /// Returns whether or not the report filename should be random or not.
602  ///
603  /// This is controlled by the 'stable-report-filename' config option,
604  /// which accepts the values "true" and "false". Default = false
605  bool shouldWriteStableReportFilename();
606 
607  /// \return Whether the analyzer should
608  /// serialize statistics to plist output.
609  /// Statistics would be serialized in JSON format inside the main dictionary
610  /// under the \c statistics key.
611  /// Available only if compiled in assert mode or with LLVM statistics
612  /// explicitly enabled.
613  bool shouldSerializeStats();
614 
615  /// Returns whether irrelevant parts of a bug report path should be pruned
616  /// out of the final output.
617  ///
618  /// This is controlled by the 'prune-paths' config option, which accepts the
619  /// values "true" and "false".
620  bool shouldPrunePaths();
621 
622  /// Returns true if 'static' initializers should be in conditional logic
623  /// in the CFG.
624  bool shouldConditionalizeStaticInitializers();
625 
626  // Returns the size of the functions (in basic blocks), which should be
627  // considered to be small enough to always inline.
628  //
629  // This is controlled by "ipa-always-inline-size" analyzer-config option.
630  unsigned getAlwaysInlineSize();
631 
632  // Returns the bound on the number of basic blocks in an inlined function
633  // (50 by default).
634  //
635  // This is controlled by "-analyzer-config max-inlinable-size" option.
636  unsigned getMaxInlinableSize();
637 
638  /// Returns true if the analyzer engine should synthesize fake bodies
639  /// for well-known functions.
640  bool shouldSynthesizeBodies();
641 
642  /// Returns how often nodes in the ExplodedGraph should be recycled to save
643  /// memory.
644  ///
645  /// This is controlled by the 'graph-trim-interval' config option. To disable
646  /// node reclamation, set the option to "0".
647  unsigned getGraphTrimInterval();
648 
649  /// Returns the maximum complexity of symbolic constraint (50 by default).
650  ///
651  /// This is controlled by "-analyzer-config max-symbol-complexity" option.
652  unsigned getMaxSymbolComplexity();
653 
654  /// Returns the maximum times a large function could be inlined.
655  ///
656  /// This is controlled by the 'max-times-inline-large' config option.
657  unsigned getMaxTimesInlineLarge();
658 
659  /// Returns the number of basic blocks a function needs to have to be
660  /// considered large for the 'max-times-inline-large' config option.
661  ///
662  /// This is controlled by the 'min-cfg-size-treat-functions-as-large' config
663  /// option.
664  unsigned getMinCFGSizeTreatFunctionsAsLarge();
665 
666  /// Returns the maximum number of nodes the analyzer can generate while
667  /// exploring a top level function (for each exploded graph).
668  /// 150000 is default; 0 means no limit.
669  ///
670  /// This is controlled by the 'max-nodes' config option.
671  unsigned getMaxNodesPerTopLevelFunction();
672 
673  /// Returns true if lambdas should be inlined. Otherwise a sink node will be
674  /// generated each time a LambdaExpr is visited.
675  bool shouldInlineLambdas();
676 
677  /// Returns true if the analysis should try to widen loops.
678  /// This is controlled by the 'widen-loops' config option.
679  bool shouldWidenLoops();
680 
681  /// Returns true if the analysis should try to unroll loops with known bounds.
682  /// This is controlled by the 'unroll-loops' config option.
683  bool shouldUnrollLoops();
684 
685  /// Returns true if the bug reporter should transparently treat extra note
686  /// diagnostic pieces as event diagnostic pieces. Useful when the diagnostic
687  /// consumer doesn't support the extra note pieces.
688  ///
689  /// This is controlled by the 'extra-notes-as-events' option, which defaults
690  /// to false when unset.
691  bool shouldDisplayNotesAsEvents();
692 
693  /// Returns true if SValBuilder should rearrange comparisons and additive
694  /// operations of symbolic expressions which consist of a sum of a symbol and
695  /// a concrete integer into the format where symbols are on the left-hand
696  /// side and the integer is on the right. This is only done if both symbols
697  /// and both concrete integers are signed, greater than or equal to the
698  /// quarter of the minimum value of the type and less than or equal to the
699  /// quarter of the maximum value of that type.
700  ///
701  /// A + n <OP> B + m becomes A - B <OP> m - n, where A and B symbolic,
702  /// n and m are integers. <OP> is any of '==', '!=', '<', '<=', '>', '>=',
703  /// '+' or '-'. The rearrangement also happens with '-' instead of '+' on
704  // either or both side and also if any or both integers are missing.
705  bool shouldAggressivelySimplifyBinaryOperation();
706 
707  /// Returns the directory containing the CTU related files.
708  StringRef getCTUDir();
709 
710  /// Returns the name of the file containing the CTU index of functions.
711  StringRef getCTUIndexName();
712 
713  /// Returns true when naive cross translation unit analysis is enabled.
714  /// This is an experimental feature to inline functions from another
715  /// translation units.
716  bool naiveCTUEnabled();
717 
718  /// Returns true if elidable C++ copy-constructors and move-constructors
719  /// should be actually elided during analysis. Both behaviors are allowed
720  /// by the C++ standard, and the analyzer, like CodeGen, defaults to eliding.
721  /// Starting with C++17 some elisions become mandatory, and in these cases
722  /// the option will be ignored.
723  bool shouldElideConstructors();
724 };
725 
727 
728 } // namespace clang
729 
730 #endif // LLVM_CLANG_STATICANALYZER_CORE_ANALYZEROPTIONS_H
Inline C functions and blocks when their definitions are available.
IPAKind
Describes the different modes of inter-procedural analysis.
unsigned visualizeExplodedGraphWithGraphViz
Perform only intra-procedural analysis.
A dummy mode in which no C++ inlining is enabled.
Inline callees(C, C++, ObjC) when their definitions are available.
unsigned eagerlyAssumeBinOpBifurcation
The flag regulates if we should eagerly assume evaluations of conditionals, thus, bifurcating the pat...
Forward-declares and imports various common LLVM datatypes that clang wants to use unqualified...
std::string FullCompilerInvocation
Store full compiler invocation for reproducible instructions in the generated report.
std::vector< std::pair< std::string, bool > > CheckersControlList
Pair of checker name and enable/disable.
AnalysisStores
AnalysisStores - Set of available analysis store models.
Refers to regular member function and operator calls.
AnalysisInliningMode
AnalysisInlineFunctionSelection - Set of inlining function selection heuristics.
Refers to constructors (implicit or explicit).
Enable inlining of dynamically dispatched methods.
#define false
Definition: stdbool.h:33
AnalysisConstraints
AnalysisConstraints - Set of available constraint models.
llvm::StringMap< std::string > ConfigTable
ConfigTable Config
A key-value table of use-specified configuration values.
unsigned visualizeExplodedGraphWithUbiGraph
Refers to destructors (implicit or explicit).
unsigned maxBlockVisitOnPath
The maximum number of times the analyzer visits a block.
unsigned DisableAllChecks
Disable all analyzer checks.
Dataflow Directional Tag Classes.
std::string AnalyzeSpecificFunction
AnalysisPurgeMode
AnalysisPurgeModes - Set of available strategies for dead symbol removal.
unsigned NoRetryExhausted
Do not re-analyze paths leading to exhausted nodes with a different strategy.
Analyses
Analysis - Set of available source code analyses.
CXXInlineableMemberKind
Describes the different kinds of C++ member functions which can be considered for inlining by the ana...
Enable inlining of dynamically dispatched methods, bifurcate paths when exact type info is unavailabl...
AnalysisDiagClients
AnalysisDiagClients - Set of available diagnostic clients for rendering analysis results.