1 | //===-- AnalyzerOptions.def - Metadata about Static Analyses ----*- C++ -*-===// |
2 | // |
3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
4 | // See https://llvm.org/LICENSE.txt for license information. |
5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
6 | // |
7 | //===----------------------------------------------------------------------===// |
8 | // |
9 | // This file defines the analyzer options avaible with -analyzer-config. |
10 | // |
11 | //===----------------------------------------------------------------------===// |
12 | |
13 | #ifndef LLVM_ADT_STRINGREF_H |
14 | #error This .def file is expected to be included in translation units where \ |
15 | "llvm/ADT/StringRef.h" is already included! |
16 | #endif |
17 | |
18 | #ifdef ANALYZER_OPTION |
19 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
20 | #error If you didnt include this file with the intent of generating methods, \ |
21 | define both 'ANALYZER_OPTION' and 'ANALYZER_OPTION_DEPENDS_ON_USER_MODE' macros! |
22 | #endif |
23 | #endif |
24 | |
25 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
26 | #ifdef ANALYZER_OPTION |
27 | #error If you didnt include this file with the intent of generating methods, \ |
28 | define both 'ANALYZER_OPTION' and 'ANALYZER_OPTION_DEPENDS_ON_USER_MODE' macros! |
29 | #endif |
30 | #endif |
31 | |
32 | #ifndef ANALYZER_OPTION |
33 | /// Create a new analyzer option, but dont generate a method for it in |
34 | /// AnalyzerOptions. |
35 | /// |
36 | /// TYPE - The type of the option object that will be stored in |
37 | /// AnalyzerOptions. This file is expected to be icluded in translation |
38 | /// units where AnalyzerOptions.h is included, so types from that |
39 | /// header should be used. |
40 | /// NAME - The name of the option object. |
41 | /// CMDFLAG - The command line flag for the option. |
42 | /// (-analyzer-config CMDFLAG=VALUE) |
43 | /// DESC - Description of the flag. |
44 | /// DEFAULT_VAL - The default value for CMDFLAG. |
45 | #define ANALYZER_OPTION(TYPE, NAME, CMDFLAG, DESC, DEFAULT_VAL) |
46 | #endif |
47 | |
48 | #ifndef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
49 | /// Create a new analyzer option, but dont generate a method for it in |
50 | /// AnalyzerOptions. It's value depends on the option "user-mode". |
51 | /// |
52 | /// TYPE - The type of the option object that will be stored in |
53 | /// AnalyzerOptions. This file is expected to be icluded in translation |
54 | /// units where AnalyzerOptions.h is included, so types from that |
55 | /// header should be used. |
56 | /// NAME - The name of the option object. |
57 | /// CMDFLAG - The command line flag for the option. |
58 | /// (-analyzer-config CMDFLAG=VALUE) |
59 | /// DESC - Description of the flag. |
60 | /// SHALLOW_VAL - The default value for CMDFLAG, when "user-mode" was set to |
61 | /// "shallow". |
62 | /// DEEP_VAL - The default value for CMDFLAG, when "user-mode" was set to |
63 | /// "deep". |
64 | #define ANALYZER_OPTION_DEPENDS_ON_USER_MODE(TYPE, NAME, CMDFLAG, DESC, \ |
65 | SHALLOW_VAL, DEEP_VAL) |
66 | #endif |
67 | |
68 | //===----------------------------------------------------------------------===// |
69 | // The "mode" option. Since some options depend on this, we list it on top of |
70 | // this file in order to make sure that the generated field for it is |
71 | // initialized before the rest. |
72 | //===----------------------------------------------------------------------===// |
73 | |
74 | ANALYZER_OPTION( |
75 | StringRef, UserMode, "mode" , |
76 | "(string) Controls the high-level analyzer mode, which influences the " |
77 | "default settings for some of the lower-level config options (such as " |
78 | "IPAMode). Value: \"deep\", \"shallow\"." , |
79 | "deep" ) |
80 | |
81 | //===----------------------------------------------------------------------===// |
82 | // Boolean analyzer options. |
83 | //===----------------------------------------------------------------------===// |
84 | |
85 | ANALYZER_OPTION(bool, ShouldIncludeImplicitDtorsInCFG, "cfg-implicit-dtors" , |
86 | "Whether or not implicit destructors for C++ objects " |
87 | "should be included in the CFG." , |
88 | true) |
89 | |
90 | ANALYZER_OPTION(bool, ShouldIncludeTemporaryDtorsInCFG, "cfg-temporary-dtors" , |
91 | "Whether or not the destructors for C++ temporary " |
92 | "objects should be included in the CFG." , |
93 | true) |
94 | |
95 | ANALYZER_OPTION( |
96 | bool, ShouldIncludeLifetimeInCFG, "cfg-lifetime" , |
97 | "Whether or not end-of-lifetime information should be included in the CFG." , |
98 | false) |
99 | |
100 | ANALYZER_OPTION(bool, ShouldIncludeLoopExitInCFG, "cfg-loopexit" , |
101 | "Whether or not the end of the loop information should " |
102 | "be included in the CFG." , |
103 | false) |
104 | |
105 | ANALYZER_OPTION(bool, ShouldIncludeRichConstructorsInCFG, |
106 | "cfg-rich-constructors" , |
107 | "Whether or not construction site information should be " |
108 | "included in the CFG C++ constructor elements." , |
109 | true) |
110 | |
111 | ANALYZER_OPTION( |
112 | bool, ShouldIncludeScopesInCFG, "cfg-scopes" , |
113 | "Whether or not scope information should be included in the CFG." , false) |
114 | |
115 | ANALYZER_OPTION(bool, ShouldIncludeDefaultInitForAggregates, |
116 | "cfg-expand-default-aggr-inits" , |
117 | "Whether or not inline CXXDefaultInitializers for aggregate " |
118 | "initialization in the CFG." , |
119 | false) |
120 | |
121 | ANALYZER_OPTION( |
122 | bool, MayInlineTemplateFunctions, "c++-template-inlining" , |
123 | "Whether or not templated functions may be considered for inlining." , true) |
124 | |
125 | ANALYZER_OPTION(bool, MayInlineCXXStandardLibrary, "c++-stdlib-inlining" , |
126 | "Whether or not C++ standard library functions may be " |
127 | "considered for inlining." , |
128 | true) |
129 | |
130 | ANALYZER_OPTION(bool, MayInlineCXXAllocator, "c++-allocator-inlining" , |
131 | "Whether or not allocator and deallocator calls may be " |
132 | "considered for inlining." , |
133 | true) |
134 | |
135 | ANALYZER_OPTION( |
136 | bool, MayInlineCXXSharedPtrDtor, "c++-shared_ptr-inlining" , |
137 | "Whether or not the destructor of C++ 'shared_ptr' may be considered for " |
138 | "inlining. This covers std::shared_ptr, std::tr1::shared_ptr, and " |
139 | "boost::shared_ptr, and indeed any destructor named '~shared_ptr'." , |
140 | false) |
141 | |
142 | ANALYZER_OPTION(bool, MayInlineCXXTemporaryDtors, "c++-temp-dtor-inlining" , |
143 | "Whether C++ temporary destructors should be inlined " |
144 | "during analysis. If temporary destructors are disabled " |
145 | "in the CFG via the 'cfg-temporary-dtors' option, " |
146 | "temporary destructors would not be inlined anyway." , |
147 | true) |
148 | |
149 | ANALYZER_OPTION( |
150 | bool, ShouldSuppressNullReturnPaths, "suppress-null-return-paths" , |
151 | "Whether or not paths that go through null returns should be suppressed. " |
152 | "This is a heuristic for avoiding bug reports with paths that go through " |
153 | "inlined functions that are more defensive than their callers." , |
154 | true) |
155 | |
156 | ANALYZER_OPTION( |
157 | bool, ShouldAvoidSuppressingNullArgumentPaths, |
158 | "avoid-suppressing-null-argument-paths" , |
159 | "Whether a bug report should not be suppressed if its path includes a call " |
160 | "with a null argument, even if that call has a null return. This option " |
161 | "has no effect when ShouldSuppressNullReturnPaths is false. This is a " |
162 | "counter-heuristic to avoid false negatives." , |
163 | false) |
164 | |
165 | ANALYZER_OPTION(bool, ShouldSuppressInlinedDefensiveChecks, |
166 | "suppress-inlined-defensive-checks" , |
167 | "Whether or not diagnostics containing inlined " |
168 | "defensive NULL checks should be suppressed." , |
169 | true) |
170 | |
171 | ANALYZER_OPTION(bool, MayInlineCXXContainerMethods, "c++-container-inlining" , |
172 | "Whether or not methods of C++ container objects may be " |
173 | "considered for inlining." , |
174 | false) |
175 | |
176 | ANALYZER_OPTION(bool, ShouldSuppressFromCXXStandardLibrary, |
177 | "suppress-c++-stdlib" , |
178 | "Whether or not diagnostics reported within the C++ " |
179 | "standard library should be suppressed." , |
180 | true) |
181 | |
182 | ANALYZER_OPTION(bool, ShouldCrosscheckWithZ3, "crosscheck-with-z3" , |
183 | "Whether bug reports should be crosschecked with the Z3 " |
184 | "constraint manager backend." , |
185 | false) |
186 | |
187 | ANALYZER_OPTION(bool, ShouldReportIssuesInMainSourceFile, |
188 | "report-in-main-source-file" , |
189 | "Whether or not the diagnostic report should be always " |
190 | "reported in the main source file and not the headers." , |
191 | false) |
192 | |
193 | ANALYZER_OPTION(bool, ShouldWriteStableReportFilename, "stable-report-filename" , |
194 | "Deprecated: report filenames are now always stable. " |
195 | "See also 'verbose-report-filename'." , |
196 | false) |
197 | |
198 | ANALYZER_OPTION(bool, ShouldWriteVerboseReportFilename, "verbose-report-filename" , |
199 | "Whether or not the report filename should contain extra " |
200 | "information about the issue." , |
201 | false) |
202 | |
203 | ANALYZER_OPTION( |
204 | bool, ShouldSerializeStats, "serialize-stats" , |
205 | "Whether the analyzer should serialize statistics to plist output. " |
206 | "Statistics would be serialized in JSON format inside the main dictionary " |
207 | "under the statistics key. Available only if compiled in assert mode or " |
208 | "with LLVM statistics explicitly enabled." , |
209 | false) |
210 | |
211 | ANALYZER_OPTION(bool, MayInlineObjCMethod, "objc-inlining" , |
212 | "Whether ObjectiveC inlining is enabled, false otherwise." , |
213 | true) |
214 | |
215 | ANALYZER_OPTION(bool, ShouldPrunePaths, "prune-paths" , |
216 | "Whether irrelevant parts of a bug report path should " |
217 | "be pruned out of the final output." , |
218 | true) |
219 | |
220 | ANALYZER_OPTION(bool, , "add-pop-up-notes" , |
221 | "Whether pop-up notes should be added to the final output." , |
222 | true) |
223 | |
224 | ANALYZER_OPTION( |
225 | bool, ShouldConditionalizeStaticInitializers, |
226 | "cfg-conditional-static-initializers" , |
227 | "Whether 'static' initializers should be in conditional logic in the CFG." , |
228 | true) |
229 | |
230 | ANALYZER_OPTION(bool, ShouldSynthesizeBodies, "faux-bodies" , |
231 | "Whether the analyzer engine should synthesize fake " |
232 | "bodies for well-known functions." , |
233 | true) |
234 | |
235 | ANALYZER_OPTION( |
236 | bool, ShouldElideConstructors, "elide-constructors" , |
237 | "Whether elidable C++ copy-constructors and move-constructors should be " |
238 | "actually elided during analysis. Both behaviors are allowed by the C++ " |
239 | "standard, and the analyzer, like CodeGen, defaults to eliding. Starting " |
240 | "with C++17 some elisions become mandatory, and in these cases the option " |
241 | "will be ignored." , |
242 | true) |
243 | |
244 | ANALYZER_OPTION( |
245 | bool, ShouldInlineLambdas, "inline-lambdas" , |
246 | "Whether lambdas should be inlined. Otherwise a sink node will be " |
247 | "generated each time a LambdaExpr is visited." , |
248 | true) |
249 | |
250 | ANALYZER_OPTION(bool, ShouldWidenLoops, "widen-loops" , |
251 | "Whether the analysis should try to widen loops." , false) |
252 | |
253 | ANALYZER_OPTION( |
254 | bool, ShouldUnrollLoops, "unroll-loops" , |
255 | "Whether the analysis should try to unroll loops with known bounds." , false) |
256 | |
257 | ANALYZER_OPTION( |
258 | bool, ShouldDisplayNotesAsEvents, "notes-as-events" , |
259 | "Whether the bug reporter should transparently treat extra note diagnostic " |
260 | "pieces as event diagnostic pieces. Useful when the diagnostic consumer " |
261 | "doesn't support the extra note pieces." , |
262 | false) |
263 | |
264 | ANALYZER_OPTION( |
265 | bool, ShouldAggressivelySimplifyBinaryOperation, |
266 | "aggressive-binary-operation-simplification" , |
267 | "Whether SValBuilder should rearrange comparisons and additive operations " |
268 | "of symbolic expressions which consist of a sum of a symbol and a concrete " |
269 | "integer into the format where symbols are on the left-hand side and the " |
270 | "integer is on the right. This is only done if both symbols and both " |
271 | "concrete integers are signed, greater than or equal to the quarter of the " |
272 | "minimum value of the type and less than or equal to the quarter of the " |
273 | "maximum value of that type. A + n <OP> B + m becomes A - B <OP> m - n, " |
274 | "where A and B symbolic, n and m are integers. <OP> is any of '==', '!=', " |
275 | "'<', '<=', '>', '>=', '+' or '-'. The rearrangement also happens with '-' " |
276 | "instead of '+' on either or both side and also if any or both integers " |
277 | "are missing." , |
278 | false) |
279 | |
280 | ANALYZER_OPTION( |
281 | bool, ShouldEagerlyAssume, "eagerly-assume" , |
282 | "Whether we should eagerly assume evaluations of conditionals, thus, " |
283 | "bifurcating the path. This indicates how the engine should handle " |
284 | "expressions such as: 'x = (y != 0)'. When this is true then the " |
285 | "subexpression 'y != 0' will be eagerly assumed to be true or false, thus " |
286 | "evaluating it to the integers 0 or 1 respectively. The upside is that " |
287 | "this can increase analysis precision until we have a better way to lazily " |
288 | "evaluate such logic. The downside is that it eagerly bifurcates paths." , |
289 | true) |
290 | |
291 | ANALYZER_OPTION( |
292 | bool, IsNaiveCTUEnabled, "experimental-enable-naive-ctu-analysis" , |
293 | "Whether naive cross translation unit analysis is enabled. This is an " |
294 | "experimental feature to inline functions from other translation units." , |
295 | false) |
296 | |
297 | ANALYZER_OPTION(bool, ShouldDisplayMacroExpansions, "expand-macros" , |
298 | "Whether macros related to the bugpath should be " |
299 | "expanded and included in the plist output." , |
300 | false) |
301 | |
302 | ANALYZER_OPTION(bool, DisplayCTUProgress, "display-ctu-progress" , |
303 | "Whether to emit verbose output about " |
304 | "the analyzer's progress related to ctu." , |
305 | false) |
306 | |
307 | ANALYZER_OPTION(bool, ShouldTrackConditions, "track-conditions" , |
308 | "Whether to track conditions that are a control dependency of " |
309 | "an already tracked variable." , |
310 | true) |
311 | |
312 | ANALYZER_OPTION(bool, ShouldTrackConditionsDebug, "track-conditions-debug" , |
313 | "Whether to place an event at each tracked condition." , |
314 | false) |
315 | |
316 | ANALYZER_OPTION(bool, ShouldApplyFixIts, "apply-fixits" , |
317 | "Apply the fix-it hints to the files" , |
318 | false) |
319 | |
320 | ANALYZER_OPTION(bool, ShouldDisplayCheckerNameForText, "display-checker-name" , |
321 | "Display the checker name for textual outputs" , |
322 | true) |
323 | |
324 | ANALYZER_OPTION(bool, ShouldSupportSymbolicIntegerCasts, |
325 | "support-symbolic-integer-casts" , |
326 | "Produce cast symbols for integral types." , |
327 | false) |
328 | |
329 | ANALYZER_OPTION( |
330 | bool, ShouldAssumeControlledEnvironment, "assume-controlled-environment" , |
331 | "Whether the analyzed application runs in a controlled environment. " |
332 | "We will assume that environment variables exist in queries and they hold " |
333 | "no malicious data. For instance, if this option is enabled, 'getenv()' " |
334 | "might be modeled by the analyzer to never return NULL." , |
335 | false) |
336 | |
337 | ANALYZER_OPTION( |
338 | bool, ShouldIgnoreBisonGeneratedFiles, "ignore-bison-generated-files" , |
339 | "If enabled, any files containing the \"/* A Bison parser, made by\" " |
340 | "won't be analyzed." , |
341 | true) |
342 | |
343 | ANALYZER_OPTION( |
344 | bool, ShouldIgnoreFlexGeneratedFiles, "ignore-flex-generated-files" , |
345 | "If enabled, any files containing the \"/* A lexical scanner generated by " |
346 | "flex\" won't be analyzed." , |
347 | true) |
348 | |
349 | //===----------------------------------------------------------------------===// |
350 | // Unsigned analyzer options. |
351 | //===----------------------------------------------------------------------===// |
352 | |
353 | ANALYZER_OPTION(unsigned, CTUImportThreshold, "ctu-import-threshold" , |
354 | "The maximal amount of translation units that is considered " |
355 | "for import when inlining functions during CTU analysis. " |
356 | "Lowering this threshold can alleviate the memory burden of " |
357 | "analysis with many interdependent definitions located in " |
358 | "various translation units. This is valid only for non C++ " |
359 | "source files." , |
360 | 24u) |
361 | |
362 | ANALYZER_OPTION(unsigned, CTUImportCppThreshold, "ctu-import-cpp-threshold" , |
363 | "The maximal amount of translation units that is considered " |
364 | "for import when inlining functions during CTU analysis of C++ " |
365 | "source files." , |
366 | 8u) |
367 | |
368 | ANALYZER_OPTION( |
369 | unsigned, AlwaysInlineSize, "ipa-always-inline-size" , |
370 | "The size of the functions (in basic blocks), which should be considered " |
371 | "to be small enough to always inline." , |
372 | 3) |
373 | |
374 | ANALYZER_OPTION( |
375 | unsigned, GraphTrimInterval, "graph-trim-interval" , |
376 | "How often nodes in the ExplodedGraph should be recycled to save memory. " |
377 | "To disable node reclamation, set the option to 0." , |
378 | 1000) |
379 | |
380 | ANALYZER_OPTION( |
381 | unsigned, MinCFGSizeTreatFunctionsAsLarge, |
382 | "min-cfg-size-treat-functions-as-large" , |
383 | "The number of basic blocks a function needs to have to be considered " |
384 | "large for the 'max-times-inline-large' config option." , |
385 | 14) |
386 | |
387 | ANALYZER_OPTION(unsigned, MaxSymbolComplexity, "max-symbol-complexity" , |
388 | "The maximum complexity of symbolic constraint." , 35) |
389 | |
390 | ANALYZER_OPTION(unsigned, MaxTimesInlineLarge, "max-times-inline-large" , |
391 | "The maximum times a large function could be inlined." , 32) |
392 | |
393 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( |
394 | unsigned, MaxInlinableSize, "max-inlinable-size" , |
395 | "The bound on the number of basic blocks in an inlined function." , |
396 | /* SHALLOW_VAL */ 4, /* DEEP_VAL */ 100) |
397 | |
398 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( |
399 | unsigned, MaxNodesPerTopLevelFunction, "max-nodes" , |
400 | "The maximum number of nodes the analyzer can generate while exploring a " |
401 | "top level function (for each exploded graph). 0 means no limit." , |
402 | /* SHALLOW_VAL */ 75000, /* DEEP_VAL */ 225000) |
403 | |
404 | ANALYZER_OPTION( |
405 | unsigned, CTUMaxNodesPercentage, "ctu-max-nodes-pct" , |
406 | "The percentage of single-TU analysed nodes that the CTU analysis is " |
407 | "allowed to visit." , 50) |
408 | |
409 | ANALYZER_OPTION( |
410 | unsigned, CTUMaxNodesMin, "ctu-max-nodes-min" , |
411 | "The maximum number of nodes in CTU mode is determinded by " |
412 | "'ctu-max-nodes-pct'. However, if the number of nodes in single-TU " |
413 | "analysis is too low, it is meaningful to provide a minimum value that " |
414 | "serves as an upper bound instead." , 10000) |
415 | |
416 | ANALYZER_OPTION( |
417 | StringRef, CTUPhase1InliningMode, "ctu-phase1-inlining" , |
418 | "Controls which functions will be inlined during the first phase of the ctu " |
419 | "analysis. " |
420 | "If the value is set to 'all' then all foreign functions are inlinied " |
421 | "immediately during the first phase, thus rendering the second phase a noop. " |
422 | "The 'ctu-max-nodes-*' budge has no effect in this case. " |
423 | "If the value is 'small' then only functions with a linear CFG and with a " |
424 | "limited number of statements would be inlined during the first phase. The " |
425 | "long and/or nontrivial functions are handled in the second phase and are " |
426 | "controlled by the 'ctu-max-nodes-*' budge. " |
427 | "The value 'none' means that all foreign functions are inlined only in the " |
428 | "second phase, 'ctu-max-nodes-*' budge limits the second phase. " |
429 | "Value: \"none\", \"small\", \"all\"." , |
430 | "small" ) |
431 | |
432 | ANALYZER_OPTION( |
433 | unsigned, RegionStoreSmallStructLimit, "region-store-small-struct-limit" , |
434 | "The largest number of fields a struct can have and still be considered " |
435 | "small. This is currently used to decide whether or not it is worth forcing " |
436 | "a LazyCompoundVal on bind. To disable all small-struct-dependent " |
437 | "behavior, set the option to 0." , |
438 | 2) |
439 | |
440 | ANALYZER_OPTION( |
441 | unsigned, RegionStoreSmallArrayLimit, "region-store-small-array-limit" , |
442 | "The largest number of elements an array can have and still be considered " |
443 | "small. This is currently used to decide whether or not it is worth forcing " |
444 | "a LazyCompoundVal on bind. To disable all small-array-dependent " |
445 | "behavior, set the option to 0." , |
446 | 5) |
447 | |
448 | //===----------------------------------------------------------------------===// |
449 | // String analyzer options. |
450 | //===----------------------------------------------------------------------===// |
451 | |
452 | ANALYZER_OPTION(StringRef, CTUDir, "ctu-dir" , |
453 | "The directory containing the CTU related files." , "" ) |
454 | |
455 | ANALYZER_OPTION(StringRef, CTUIndexName, "ctu-index-name" , |
456 | "The name of the file containing the CTU index of definitions. " |
457 | "The index file maps USR-names to identifiers. An identifier " |
458 | "can end with an '.ast' suffix, indicating the indentifier is " |
459 | "a path to a pch-dump. Otherwise the identifier is regarded as " |
460 | "path to a source file which is parsed on-demand. Relative " |
461 | "paths are prefixed with ctu-dir, absolute paths are used " |
462 | "unmodified during lookup." , |
463 | "externalDefMap.txt" ) |
464 | |
465 | ANALYZER_OPTION( |
466 | StringRef, CTUInvocationList, "ctu-invocation-list" , |
467 | "The path to the YAML format file containing a mapping from source file " |
468 | "paths to command-line invocations represented as a list of arguments. " |
469 | "This invocation is used produce the source-file's AST in case on-demand " |
470 | "loading is performed. Example file-content: " |
471 | "{/main.cpp: [clang++, /main.cpp], other.cpp: [clang++, /other.cpp]}" , |
472 | "invocations.yaml" ) |
473 | |
474 | ANALYZER_OPTION( |
475 | StringRef, ModelPath, "model-path" , |
476 | "The analyzer can inline an alternative implementation written in C at the " |
477 | "call site if the called function's body is not available. This is a path " |
478 | "where to look for those alternative implementations (called models)." , |
479 | "" ) |
480 | |
481 | ANALYZER_OPTION( |
482 | StringRef, CXXMemberInliningMode, "c++-inlining" , |
483 | "Controls which C++ member functions will be considered for inlining. " |
484 | "Value: \"constructors\", \"destructors\", \"methods\"." , |
485 | "destructors" ) |
486 | |
487 | ANALYZER_OPTION( |
488 | StringRef, ExplorationStrategy, "exploration_strategy" , |
489 | "Value: \"dfs\", \"bfs\", \"unexplored_first\", " |
490 | "\"unexplored_first_queue\", \"unexplored_first_location_queue\", " |
491 | "\"bfs_block_dfs_contents\"." , |
492 | "unexplored_first_queue" ) |
493 | |
494 | ANALYZER_OPTION( |
495 | StringRef, RawSilencedCheckersAndPackages, "silence-checkers" , |
496 | "A semicolon separated list of checker and package names to silence. " |
497 | "Silenced checkers will not emit reports, but the modeling remain enabled." , |
498 | "" ) |
499 | |
500 | ANALYZER_OPTION_DEPENDS_ON_USER_MODE( |
501 | StringRef, IPAMode, "ipa" , |
502 | "Controls the mode of inter-procedural analysis. Value: \"none\", " |
503 | "\"basic-inlining\", \"inlining\", \"dynamic\", \"dynamic-bifurcate\"." , |
504 | /* SHALLOW_VAL */ "inlining" , /* DEEP_VAL */ "dynamic-bifurcate" ) |
505 | |
506 | #undef ANALYZER_OPTION_DEPENDS_ON_USER_MODE |
507 | #undef ANALYZER_OPTION |
508 | |