clang  6.0.0svn
AnalyzerOptions.h
Go to the documentation of this file.
1 //===--- AnalyzerOptions.h - Analysis Engine Options ------------*- C++ -*-===//
2 //
3 // The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This header defines various options for the static analyzer that are set
11 // by the frontend and are consulted throughout the analyzer.
12 //
13 //===----------------------------------------------------------------------===//
14 
15 #ifndef LLVM_CLANG_STATICANALYZER_CORE_ANALYZEROPTIONS_H
16 #define LLVM_CLANG_STATICANALYZER_CORE_ANALYZEROPTIONS_H
17 
18 #include "clang/Basic/LLVM.h"
19 #include "llvm/ADT/IntrusiveRefCntPtr.h"
20 #include "llvm/ADT/Optional.h"
21 #include "llvm/ADT/StringMap.h"
22 #include <string>
23 #include <vector>
24 
25 namespace clang {
26 class ASTConsumer;
27 class DiagnosticsEngine;
28 class Preprocessor;
29 class LangOptions;
30 
31 namespace ento {
32 class CheckerBase;
33 }
34 
35 /// Analysis - Set of available source code analyses.
36 enum Analyses {
37 #define ANALYSIS(NAME, CMDFLAG, DESC, SCOPE) NAME,
38 #include "clang/StaticAnalyzer/Core/Analyses.def"
40 };
41 
42 /// AnalysisStores - Set of available analysis store models.
44 #define ANALYSIS_STORE(NAME, CMDFLAG, DESC, CREATFN) NAME##Model,
45 #include "clang/StaticAnalyzer/Core/Analyses.def"
47 };
48 
49 /// AnalysisConstraints - Set of available constraint models.
51 #define ANALYSIS_CONSTRAINTS(NAME, CMDFLAG, DESC, CREATFN) NAME##Model,
52 #include "clang/StaticAnalyzer/Core/Analyses.def"
54 };
55 
56 /// AnalysisDiagClients - Set of available diagnostic clients for rendering
57 /// analysis results.
59 #define ANALYSIS_DIAGNOSTICS(NAME, CMDFLAG, DESC, CREATFN) PD_##NAME,
60 #include "clang/StaticAnalyzer/Core/Analyses.def"
63 };
64 
65 /// AnalysisPurgeModes - Set of available strategies for dead symbol removal.
67 #define ANALYSIS_PURGE(NAME, CMDFLAG, DESC) NAME,
68 #include "clang/StaticAnalyzer/Core/Analyses.def"
70 };
71 
72 /// AnalysisInlineFunctionSelection - Set of inlining function selection heuristics.
74 #define ANALYSIS_INLINING_MODE(NAME, CMDFLAG, DESC) NAME,
75 #include "clang/StaticAnalyzer/Core/Analyses.def"
77 };
78 
79 /// \brief Describes the different kinds of C++ member functions which can be
80 /// considered for inlining by the analyzer.
81 ///
82 /// These options are cumulative; enabling one kind of member function will
83 /// enable all kinds with lower enum values.
85  // Uninitialized = 0,
86 
87  /// A dummy mode in which no C++ inlining is enabled.
88  CIMK_None = 1,
89 
90  /// Refers to regular member function and operator calls.
92 
93  /// Refers to constructors (implicit or explicit).
94  ///
95  /// Note that a constructor will not be inlined if the corresponding
96  /// destructor is non-trivial.
98 
99  /// Refers to destructors (implicit or explicit).
101 };
102 
103 /// \brief Describes the different modes of inter-procedural analysis.
104 enum IPAKind {
106 
107  /// Perform only intra-procedural analysis.
109 
110  /// Inline C functions and blocks when their definitions are available.
112 
113  /// Inline callees(C, C++, ObjC) when their definitions are available.
115 
116  /// Enable inlining of dynamically dispatched methods.
118 
119  /// Enable inlining of dynamically dispatched methods, bifurcate paths when
120  /// exact type info is unavailable.
122 };
123 
124 class AnalyzerOptions : public RefCountedBase<AnalyzerOptions> {
125 public:
126  typedef llvm::StringMap<std::string> ConfigTable;
127 
128  static std::vector<StringRef>
129  getRegisteredCheckers(bool IncludeExperimental = false);
130 
131  /// \brief Pair of checker name and enable/disable.
132  std::vector<std::pair<std::string, bool> > CheckersControlList;
133 
134  /// \brief A key-value table of use-specified configuration values.
135  ConfigTable Config;
140 
142 
143  /// \brief The maximum number of times the analyzer visits a block.
145 
146 
147  /// \brief Disable all analyzer checks.
148  ///
149  /// This flag allows one to disable analyzer checks on the code processed by
150  /// the given analysis consumer. Note, the code will get parsed and the
151  /// command-line options will get checked.
152  unsigned DisableAllChecks : 1;
153 
154  unsigned ShowCheckerHelp : 1;
156  unsigned AnalyzeAll : 1;
158  unsigned AnalyzeNestedBlocks : 1;
159 
160  /// \brief The flag regulates if we should eagerly assume evaluations of
161  /// conditionals, thus, bifurcating the path.
162  ///
163  /// This flag indicates how the engine should handle expressions such as: 'x =
164  /// (y != 0)'. When this flag is true then the subexpression 'y != 0' will be
165  /// eagerly assumed to be true or false, thus evaluating it to the integers 0
166  /// or 1 respectively. The upside is that this can increase analysis
167  /// precision until we have a better way to lazily evaluate such logic. The
168  /// downside is that it eagerly bifurcates paths.
170 
171  unsigned TrimGraph : 1;
174  unsigned UnoptimizedCFG : 1;
175  unsigned PrintStats : 1;
176 
177  /// \brief Do not re-analyze paths leading to exhausted nodes with a different
178  /// strategy. We get better code coverage when retry is enabled.
179  unsigned NoRetryExhausted : 1;
180 
181  /// \brief The inlining stack depth limit.
183 
184  /// \brief The mode of function selection used during inlining.
186 
187 private:
188  /// \brief Describes the kinds for high-level analyzer mode.
189  enum UserModeKind {
190  UMK_NotSet = 0,
191  /// Perform shallow but fast analyzes.
192  UMK_Shallow = 1,
193  /// Perform deep analyzes.
194  UMK_Deep = 2
195  };
196 
197  /// Controls the high-level analyzer mode, which influences the default
198  /// settings for some of the lower-level config options (such as IPAMode).
199  /// \sa getUserMode
200  UserModeKind UserMode;
201 
202  /// Controls the mode of inter-procedural analysis.
203  IPAKind IPAMode;
204 
205  /// Controls which C++ member functions will be considered for inlining.
206  CXXInlineableMemberKind CXXMemberInliningMode;
207 
208  /// \sa includeImplicitDtorsInCFG
209  Optional<bool> IncludeImplicitDtorsInCFG;
210 
211  /// \sa includeTemporaryDtorsInCFG
212  Optional<bool> IncludeTemporaryDtorsInCFG;
213 
214  /// \sa IncludeLifetimeInCFG
215  Optional<bool> IncludeLifetimeInCFG;
216 
217  /// \sa IncludeLoopExitInCFG
218  Optional<bool> IncludeLoopExitInCFG;
219 
220  /// \sa mayInlineCXXStandardLibrary
221  Optional<bool> InlineCXXStandardLibrary;
222 
223  /// \sa mayInlineTemplateFunctions
224  Optional<bool> InlineTemplateFunctions;
225 
226  /// \sa mayInlineCXXAllocator
227  Optional<bool> InlineCXXAllocator;
228 
229  /// \sa mayInlineCXXContainerMethods
230  Optional<bool> InlineCXXContainerMethods;
231 
232  /// \sa mayInlineCXXSharedPtrDtor
233  Optional<bool> InlineCXXSharedPtrDtor;
234 
235  /// \sa mayInlineObjCMethod
236  Optional<bool> ObjCInliningMode;
237 
238  // Cache of the "ipa-always-inline-size" setting.
239  // \sa getAlwaysInlineSize
240  Optional<unsigned> AlwaysInlineSize;
241 
242  /// \sa shouldSuppressNullReturnPaths
243  Optional<bool> SuppressNullReturnPaths;
244 
245  // \sa getMaxInlinableSize
246  Optional<unsigned> MaxInlinableSize;
247 
248  /// \sa shouldAvoidSuppressingNullArgumentPaths
249  Optional<bool> AvoidSuppressingNullArgumentPaths;
250 
251  /// \sa shouldSuppressInlinedDefensiveChecks
252  Optional<bool> SuppressInlinedDefensiveChecks;
253 
254  /// \sa shouldSuppressFromCXXStandardLibrary
255  Optional<bool> SuppressFromCXXStandardLibrary;
256 
257  /// \sa reportIssuesInMainSourceFile
258  Optional<bool> ReportIssuesInMainSourceFile;
259 
260  /// \sa StableReportFilename
261  Optional<bool> StableReportFilename;
262 
263  /// \sa getGraphTrimInterval
264  Optional<unsigned> GraphTrimInterval;
265 
266  /// \sa getMaxTimesInlineLarge
267  Optional<unsigned> MaxTimesInlineLarge;
268 
269  /// \sa getMinCFGSizeTreatFunctionsAsLarge
270  Optional<unsigned> MinCFGSizeTreatFunctionsAsLarge;
271 
272  /// \sa getMaxNodesPerTopLevelFunction
273  Optional<unsigned> MaxNodesPerTopLevelFunction;
274 
275  /// \sa shouldInlineLambdas
276  Optional<bool> InlineLambdas;
277 
278  /// \sa shouldWidenLoops
279  Optional<bool> WidenLoops;
280 
281  /// \sa shouldUnrollLoops
282  Optional<bool> UnrollLoops;
283 
284  /// \sa shouldDisplayNotesAsEvents
285  Optional<bool> DisplayNotesAsEvents;
286 
287  /// A helper function that retrieves option for a given full-qualified
288  /// checker name.
289  /// Options for checkers can be specified via 'analyzer-config' command-line
290  /// option.
291  /// Example:
292  /// @code-analyzer-config unix.Malloc:OptionName=CheckerOptionValue @endcode
293  /// or @code-analyzer-config unix:OptionName=GroupOptionValue @endcode
294  /// for groups of checkers.
295  /// @param [in] CheckerName Full-qualified checker name, like
296  /// alpha.unix.StreamChecker.
297  /// @param [in] OptionName Name of the option to get.
298  /// @param [in] Default Default value if no option is specified.
299  /// @param [in] SearchInParents If set to true and the searched option was not
300  /// specified for the given checker the options for the parent packages will
301  /// be searched as well. The inner packages take precedence over the outer
302  /// ones.
303  /// @retval CheckerOptionValue An option for a checker if it was specified.
304  /// @retval GroupOptionValue An option for group if it was specified and no
305  /// checker-specific options were found. The closer group to checker,
306  /// the more priority it has. For example, @c coregroup.subgroup has more
307  /// priority than @c coregroup for @c coregroup.subgroup.CheckerName checker.
308  /// @retval Default If nor checker option, nor group option was found.
309  StringRef getCheckerOption(StringRef CheckerName, StringRef OptionName,
310  StringRef Default,
311  bool SearchInParents = false);
312 
313 public:
314  /// Interprets an option's string value as a boolean. The "true" string is
315  /// interpreted as true and the "false" string is interpreted as false.
316  ///
317  /// If an option value is not provided, returns the given \p DefaultVal.
318  /// @param [in] Name Name for option to retrieve.
319  /// @param [in] DefaultVal Default value returned if no such option was
320  /// specified.
321  /// @param [in] C The optional checker parameter that can be used to restrict
322  /// the search to the options of this particular checker (and its parents
323  /// dependening on search mode).
324  /// @param [in] SearchInParents If set to true and the searched option was not
325  /// specified for the given checker the options for the parent packages will
326  /// be searched as well. The inner packages take precedence over the outer
327  /// ones.
328  bool getBooleanOption(StringRef Name, bool DefaultVal,
329  const ento::CheckerBase *C = nullptr,
330  bool SearchInParents = false);
331 
332  /// Variant that accepts a Optional value to cache the result.
333  ///
334  /// @param [in,out] V Return value storage, returned if parameter contains
335  /// an existing valid option, else it is used to store a return value
336  /// @param [in] Name Name for option to retrieve.
337  /// @param [in] DefaultVal Default value returned if no such option was
338  /// specified.
339  /// @param [in] C The optional checker parameter that can be used to restrict
340  /// the search to the options of this particular checker (and its parents
341  /// dependening on search mode).
342  /// @param [in] SearchInParents If set to true and the searched option was not
343  /// specified for the given checker the options for the parent packages will
344  /// be searched as well. The inner packages take precedence over the outer
345  /// ones.
346  bool getBooleanOption(Optional<bool> &V, StringRef Name, bool DefaultVal,
347  const ento::CheckerBase *C = nullptr,
348  bool SearchInParents = false);
349 
350  /// Interprets an option's string value as an integer value.
351  ///
352  /// If an option value is not provided, returns the given \p DefaultVal.
353  /// @param [in] Name Name for option to retrieve.
354  /// @param [in] DefaultVal Default value returned if no such option was
355  /// specified.
356  /// @param [in] C The optional checker parameter that can be used to restrict
357  /// the search to the options of this particular checker (and its parents
358  /// dependening on search mode).
359  /// @param [in] SearchInParents If set to true and the searched option was not
360  /// specified for the given checker the options for the parent packages will
361  /// be searched as well. The inner packages take precedence over the outer
362  /// ones.
363  int getOptionAsInteger(StringRef Name, int DefaultVal,
364  const ento::CheckerBase *C = nullptr,
365  bool SearchInParents = false);
366 
367  /// Query an option's string value.
368  ///
369  /// If an option value is not provided, returns the given \p DefaultVal.
370  /// @param [in] Name Name for option to retrieve.
371  /// @param [in] DefaultVal Default value returned if no such option was
372  /// specified.
373  /// @param [in] C The optional checker parameter that can be used to restrict
374  /// the search to the options of this particular checker (and its parents
375  /// dependening on search mode).
376  /// @param [in] SearchInParents If set to true and the searched option was not
377  /// specified for the given checker the options for the parent packages will
378  /// be searched as well. The inner packages take precedence over the outer
379  /// ones.
380  StringRef getOptionAsString(StringRef Name, StringRef DefaultVal,
381  const ento::CheckerBase *C = nullptr,
382  bool SearchInParents = false);
383 
384  /// \brief Retrieves and sets the UserMode. This is a high-level option,
385  /// which is used to set other low-level options. It is not accessible
386  /// outside of AnalyzerOptions.
387  UserModeKind getUserMode();
388 
389  /// \brief Returns the inter-procedural analysis mode.
390  IPAKind getIPAMode();
391 
392  /// Returns the option controlling which C++ member functions will be
393  /// considered for inlining.
394  ///
395  /// This is controlled by the 'c++-inlining' config option.
396  ///
397  /// \sa CXXMemberInliningMode
398  bool mayInlineCXXMemberFunction(CXXInlineableMemberKind K);
399 
400  /// Returns true if ObjectiveC inlining is enabled, false otherwise.
401  bool mayInlineObjCMethod();
402 
403  /// Returns whether or not the destructors for C++ temporary objects should
404  /// be included in the CFG.
405  ///
406  /// This is controlled by the 'cfg-temporary-dtors' config option, which
407  /// accepts the values "true" and "false".
408  bool includeTemporaryDtorsInCFG();
409 
410  /// Returns whether or not implicit destructors for C++ objects should
411  /// be included in the CFG.
412  ///
413  /// This is controlled by the 'cfg-implicit-dtors' config option, which
414  /// accepts the values "true" and "false".
415  bool includeImplicitDtorsInCFG();
416 
417  /// Returns whether or not end-of-lifetime information should be included in
418  /// the CFG.
419  ///
420  /// This is controlled by the 'cfg-lifetime' config option, which accepts
421  /// the values "true" and "false".
422  bool includeLifetimeInCFG();
423 
424  /// Returns whether or not the end of the loop information should be included
425  /// in the CFG.
426  ///
427  /// This is controlled by the 'cfg-loopexit' config option, which accepts
428  /// the values "true" and "false".
429  bool includeLoopExitInCFG();
430 
431  /// Returns whether or not C++ standard library functions may be considered
432  /// for inlining.
433  ///
434  /// This is controlled by the 'c++-stdlib-inlining' config option, which
435  /// accepts the values "true" and "false".
436  bool mayInlineCXXStandardLibrary();
437 
438  /// Returns whether or not templated functions may be considered for inlining.
439  ///
440  /// This is controlled by the 'c++-template-inlining' config option, which
441  /// accepts the values "true" and "false".
442  bool mayInlineTemplateFunctions();
443 
444  /// Returns whether or not allocator call may be considered for inlining.
445  ///
446  /// This is controlled by the 'c++-allocator-inlining' config option, which
447  /// accepts the values "true" and "false".
448  bool mayInlineCXXAllocator();
449 
450  /// Returns whether or not methods of C++ container objects may be considered
451  /// for inlining.
452  ///
453  /// This is controlled by the 'c++-container-inlining' config option, which
454  /// accepts the values "true" and "false".
455  bool mayInlineCXXContainerMethods();
456 
457  /// Returns whether or not the destructor of C++ 'shared_ptr' may be
458  /// considered for inlining.
459  ///
460  /// This covers std::shared_ptr, std::tr1::shared_ptr, and boost::shared_ptr,
461  /// and indeed any destructor named "~shared_ptr".
462  ///
463  /// This is controlled by the 'c++-shared_ptr-inlining' config option, which
464  /// accepts the values "true" and "false".
465  bool mayInlineCXXSharedPtrDtor();
466 
467  /// Returns whether or not paths that go through null returns should be
468  /// suppressed.
469  ///
470  /// This is a heuristic for avoiding bug reports with paths that go through
471  /// inlined functions that are more defensive than their callers.
472  ///
473  /// This is controlled by the 'suppress-null-return-paths' config option,
474  /// which accepts the values "true" and "false".
475  bool shouldSuppressNullReturnPaths();
476 
477  /// Returns whether a bug report should \em not be suppressed if its path
478  /// includes a call with a null argument, even if that call has a null return.
479  ///
480  /// This option has no effect when #shouldSuppressNullReturnPaths() is false.
481  ///
482  /// This is a counter-heuristic to avoid false negatives.
483  ///
484  /// This is controlled by the 'avoid-suppressing-null-argument-paths' config
485  /// option, which accepts the values "true" and "false".
486  bool shouldAvoidSuppressingNullArgumentPaths();
487 
488  /// Returns whether or not diagnostics containing inlined defensive NULL
489  /// checks should be suppressed.
490  ///
491  /// This is controlled by the 'suppress-inlined-defensive-checks' config
492  /// option, which accepts the values "true" and "false".
493  bool shouldSuppressInlinedDefensiveChecks();
494 
495  /// Returns whether or not diagnostics reported within the C++ standard
496  /// library should be suppressed.
497  ///
498  /// This is controlled by the 'suppress-c++-stdlib' config option,
499  /// which accepts the values "true" and "false".
500  bool shouldSuppressFromCXXStandardLibrary();
501 
502  /// Returns whether or not the diagnostic report should be always reported
503  /// in the main source file and not the headers.
504  ///
505  /// This is controlled by the 'report-in-main-source-file' config option,
506  /// which accepts the values "true" and "false".
507  bool shouldReportIssuesInMainSourceFile();
508 
509  /// Returns whether or not the report filename should be random or not.
510  ///
511  /// This is controlled by the 'stable-report-filename' config option,
512  /// which accepts the values "true" and "false". Default = false
513  bool shouldWriteStableReportFilename();
514 
515  /// Returns whether irrelevant parts of a bug report path should be pruned
516  /// out of the final output.
517  ///
518  /// This is controlled by the 'prune-paths' config option, which accepts the
519  /// values "true" and "false".
520  bool shouldPrunePaths();
521 
522  /// Returns true if 'static' initializers should be in conditional logic
523  /// in the CFG.
524  bool shouldConditionalizeStaticInitializers();
525 
526  // Returns the size of the functions (in basic blocks), which should be
527  // considered to be small enough to always inline.
528  //
529  // This is controlled by "ipa-always-inline-size" analyzer-config option.
530  unsigned getAlwaysInlineSize();
531 
532  // Returns the bound on the number of basic blocks in an inlined function
533  // (50 by default).
534  //
535  // This is controlled by "-analyzer-config max-inlinable-size" option.
536  unsigned getMaxInlinableSize();
537 
538  /// Returns true if the analyzer engine should synthesize fake bodies
539  /// for well-known functions.
540  bool shouldSynthesizeBodies();
541 
542  /// Returns how often nodes in the ExplodedGraph should be recycled to save
543  /// memory.
544  ///
545  /// This is controlled by the 'graph-trim-interval' config option. To disable
546  /// node reclamation, set the option to "0".
547  unsigned getGraphTrimInterval();
548 
549  /// Returns the maximum times a large function could be inlined.
550  ///
551  /// This is controlled by the 'max-times-inline-large' config option.
552  unsigned getMaxTimesInlineLarge();
553 
554  /// Returns the number of basic blocks a function needs to have to be
555  /// considered large for the 'max-times-inline-large' config option.
556  ///
557  /// This is controlled by the 'min-cfg-size-treat-functions-as-large' config
558  /// option.
559  unsigned getMinCFGSizeTreatFunctionsAsLarge();
560 
561  /// Returns the maximum number of nodes the analyzer can generate while
562  /// exploring a top level function (for each exploded graph).
563  /// 150000 is default; 0 means no limit.
564  ///
565  /// This is controlled by the 'max-nodes' config option.
566  unsigned getMaxNodesPerTopLevelFunction();
567 
568  /// Returns true if lambdas should be inlined. Otherwise a sink node will be
569  /// generated each time a LambdaExpr is visited.
570  bool shouldInlineLambdas();
571 
572  /// Returns true if the analysis should try to widen loops.
573  /// This is controlled by the 'widen-loops' config option.
574  bool shouldWidenLoops();
575 
576  /// Returns true if the analysis should try to unroll loops with known bounds.
577  /// This is controlled by the 'unroll-loops' config option.
578  bool shouldUnrollLoops();
579 
580  /// Returns true if the bug reporter should transparently treat extra note
581  /// diagnostic pieces as event diagnostic pieces. Useful when the diagnostic
582  /// consumer doesn't support the extra note pieces.
583  ///
584  /// This is controlled by the 'extra-notes-as-events' option, which defaults
585  /// to false when unset.
586  bool shouldDisplayNotesAsEvents();
587 
588 public:
590  AnalysisStoreOpt(RegionStoreModel),
591  AnalysisConstraintsOpt(RangeConstraintsModel),
592  AnalysisDiagOpt(PD_HTML),
593  AnalysisPurgeOpt(PurgeStmt),
594  DisableAllChecks(0),
595  ShowCheckerHelp(0),
596  ShowEnabledCheckerList(0),
597  AnalyzeAll(0),
598  AnalyzerDisplayProgress(0),
599  AnalyzeNestedBlocks(0),
600  eagerlyAssumeBinOpBifurcation(0),
601  TrimGraph(0),
602  visualizeExplodedGraphWithGraphViz(0),
603  visualizeExplodedGraphWithUbiGraph(0),
604  UnoptimizedCFG(0),
605  PrintStats(0),
606  NoRetryExhausted(0),
607  // Cap the stack depth at 4 calls (5 stack frames, base + 4 calls).
608  InlineMaxStackDepth(5),
609  InliningMode(NoRedundancy),
610  UserMode(UMK_NotSet),
611  IPAMode(IPAK_NotSet),
612  CXXMemberInliningMode() {}
613 
614 };
615 
617 
618 }
619 
620 #endif
Inline C functions and blocks when their definitions are available.
unsigned InlineMaxStackDepth
The inlining stack depth limit.
IPAKind
Describes the different modes of inter-procedural analysis.
unsigned visualizeExplodedGraphWithGraphViz
Perform only intra-procedural analysis.
A dummy mode in which no C++ inlining is enabled.
Inline callees(C, C++, ObjC) when their definitions are available.
unsigned eagerlyAssumeBinOpBifurcation
The flag regulates if we should eagerly assume evaluations of conditionals, thus, bifurcating the pat...
Forward-declares and imports various common LLVM datatypes that clang wants to use unqualified...
std::vector< std::pair< std::string, bool > > CheckersControlList
Pair of checker name and enable/disable.
AnalysisStores
AnalysisStores - Set of available analysis store models.
AnalysisDiagClients AnalysisDiagOpt
AnalysisInliningMode InliningMode
The mode of function selection used during inlining.
Refers to regular member function and operator calls.
AnalysisInliningMode
AnalysisInlineFunctionSelection - Set of inlining function selection heuristics.
Refers to constructors (implicit or explicit).
Enable inlining of dynamically dispatched methods.
AnalysisConstraints
AnalysisConstraints - Set of available constraint models.
AnalysisStores AnalysisStoreOpt
ConfigTable Config
A key-value table of use-specified configuration values.
unsigned visualizeExplodedGraphWithUbiGraph
Refers to destructors (implicit or explicit).
unsigned maxBlockVisitOnPath
The maximum number of times the analyzer visits a block.
unsigned DisableAllChecks
Disable all analyzer checks.
Dataflow Directional Tag Classes.
AnalysisConstraints AnalysisConstraintsOpt
std::string AnalyzeSpecificFunction
AnalysisPurgeMode
AnalysisPurgeModes - Set of available strategies for dead symbol removal.
IntrusiveRefCntPtr< AnalyzerOptions > AnalyzerOptionsRef
unsigned NoRetryExhausted
Do not re-analyze paths leading to exhausted nodes with a different strategy.
Analyses
Analysis - Set of available source code analyses.
llvm::StringMap< std::string > ConfigTable
CXXInlineableMemberKind
Describes the different kinds of C++ member functions which can be considered for inlining by the ana...
AnalysisPurgeMode AnalysisPurgeOpt
Enable inlining of dynamically dispatched methods, bifurcate paths when exact type info is unavailabl...
AnalysisDiagClients
AnalysisDiagClients - Set of available diagnostic clients for rendering analysis results.