1 //===--- AnalyzerOptions.h - Analysis Engine Options ------------*- C++ -*-===// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is distributed under the University of Illinois Open Source 6 // License. See LICENSE.TXT for details. 7 // 8 //===----------------------------------------------------------------------===// 9 // 10 // This header defines various options for the static analyzer that are set 11 // by the frontend and are consulted throughout the analyzer. 12 // 13 //===----------------------------------------------------------------------===// 14 15 #ifndef LLVM_CLANG_STATICANALYZER_CORE_ANALYZEROPTIONS_H 16 #define LLVM_CLANG_STATICANALYZER_CORE_ANALYZEROPTIONS_H 17 18 #include "clang/Basic/LLVM.h" 19 #include "llvm/ADT/IntrusiveRefCntPtr.h" 20 #include "llvm/ADT/Optional.h" 21 #include "llvm/ADT/StringMap.h" 22 #include <string> 23 #include <vector> 24 25 namespace clang { 26 class ASTConsumer; 27 class DiagnosticsEngine; 28 class Preprocessor; 29 class LangOptions; 30 31 namespace ento { 32 class CheckerBase; 33 } 34 35 /// Analysis - Set of available source code analyses. 36 enum Analyses { 37 #define ANALYSIS(NAME, CMDFLAG, DESC, SCOPE) NAME, 38 #include "clang/StaticAnalyzer/Core/Analyses.def" 39 NumAnalyses 40 }; 41 42 /// AnalysisStores - Set of available analysis store models. 43 enum AnalysisStores { 44 #define ANALYSIS_STORE(NAME, CMDFLAG, DESC, CREATFN) NAME##Model, 45 #include "clang/StaticAnalyzer/Core/Analyses.def" 46 NumStores 47 }; 48 49 /// AnalysisConstraints - Set of available constraint models. 50 enum AnalysisConstraints { 51 #define ANALYSIS_CONSTRAINTS(NAME, CMDFLAG, DESC, CREATFN) NAME##Model, 52 #include "clang/StaticAnalyzer/Core/Analyses.def" 53 NumConstraints 54 }; 55 56 /// AnalysisDiagClients - Set of available diagnostic clients for rendering 57 /// analysis results. 58 enum AnalysisDiagClients { 59 #define ANALYSIS_DIAGNOSTICS(NAME, CMDFLAG, DESC, CREATFN) PD_##NAME, 60 #include "clang/StaticAnalyzer/Core/Analyses.def" 61 PD_NONE, 62 NUM_ANALYSIS_DIAG_CLIENTS 63 }; 64 65 /// AnalysisPurgeModes - Set of available strategies for dead symbol removal. 66 enum AnalysisPurgeMode { 67 #define ANALYSIS_PURGE(NAME, CMDFLAG, DESC) NAME, 68 #include "clang/StaticAnalyzer/Core/Analyses.def" 69 NumPurgeModes 70 }; 71 72 /// AnalysisInlineFunctionSelection - Set of inlining function selection heuristics. 73 enum AnalysisInliningMode { 74 #define ANALYSIS_INLINING_MODE(NAME, CMDFLAG, DESC) NAME, 75 #include "clang/StaticAnalyzer/Core/Analyses.def" 76 NumInliningModes 77 }; 78 79 /// \brief Describes the different kinds of C++ member functions which can be 80 /// considered for inlining by the analyzer. 81 /// 82 /// These options are cumulative; enabling one kind of member function will 83 /// enable all kinds with lower enum values. 84 enum CXXInlineableMemberKind { 85 // Uninitialized = 0, 86 87 /// A dummy mode in which no C++ inlining is enabled. 88 CIMK_None = 1, 89 90 /// Refers to regular member function and operator calls. 91 CIMK_MemberFunctions, 92 93 /// Refers to constructors (implicit or explicit). 94 /// 95 /// Note that a constructor will not be inlined if the corresponding 96 /// destructor is non-trivial. 97 CIMK_Constructors, 98 99 /// Refers to destructors (implicit or explicit). 100 CIMK_Destructors 101 }; 102 103 /// \brief Describes the different modes of inter-procedural analysis. 104 enum IPAKind { 105 IPAK_NotSet = 0, 106 107 /// Perform only intra-procedural analysis. 108 IPAK_None = 1, 109 110 /// Inline C functions and blocks when their definitions are available. 111 IPAK_BasicInlining = 2, 112 113 /// Inline callees(C, C++, ObjC) when their definitions are available. 114 IPAK_Inlining = 3, 115 116 /// Enable inlining of dynamically dispatched methods. 117 IPAK_DynamicDispatch = 4, 118 119 /// Enable inlining of dynamically dispatched methods, bifurcate paths when 120 /// exact type info is unavailable. 121 IPAK_DynamicDispatchBifurcate = 5 122 }; 123 124 class AnalyzerOptions : public RefCountedBase<AnalyzerOptions> { 125 public: 126 typedef llvm::StringMap<std::string> ConfigTable; 127 128 /// \brief Pair of checker name and enable/disable. 129 std::vector<std::pair<std::string, bool> > CheckersControlList; 130 131 /// \brief A key-value table of use-specified configuration values. 132 ConfigTable Config; 133 AnalysisStores AnalysisStoreOpt; 134 AnalysisConstraints AnalysisConstraintsOpt; 135 AnalysisDiagClients AnalysisDiagOpt; 136 AnalysisPurgeMode AnalysisPurgeOpt; 137 138 std::string AnalyzeSpecificFunction; 139 140 /// \brief The maximum number of times the analyzer visits a block. 141 unsigned maxBlockVisitOnPath; 142 143 144 /// \brief Disable all analyzer checks. 145 /// 146 /// This flag allows one to disable analyzer checks on the code processed by 147 /// the given analysis consumer. Note, the code will get parsed and the 148 /// command-line options will get checked. 149 unsigned DisableAllChecks : 1; 150 151 unsigned ShowCheckerHelp : 1; 152 unsigned AnalyzeAll : 1; 153 unsigned AnalyzerDisplayProgress : 1; 154 unsigned AnalyzeNestedBlocks : 1; 155 156 /// \brief The flag regulates if we should eagerly assume evaluations of 157 /// conditionals, thus, bifurcating the path. 158 /// 159 /// This flag indicates how the engine should handle expressions such as: 'x = 160 /// (y != 0)'. When this flag is true then the subexpression 'y != 0' will be 161 /// eagerly assumed to be true or false, thus evaluating it to the integers 0 162 /// or 1 respectively. The upside is that this can increase analysis 163 /// precision until we have a better way to lazily evaluate such logic. The 164 /// downside is that it eagerly bifurcates paths. 165 unsigned eagerlyAssumeBinOpBifurcation : 1; 166 167 unsigned TrimGraph : 1; 168 unsigned visualizeExplodedGraphWithGraphViz : 1; 169 unsigned visualizeExplodedGraphWithUbiGraph : 1; 170 unsigned UnoptimizedCFG : 1; 171 unsigned PrintStats : 1; 172 173 /// \brief Do not re-analyze paths leading to exhausted nodes with a different 174 /// strategy. We get better code coverage when retry is enabled. 175 unsigned NoRetryExhausted : 1; 176 177 /// \brief The inlining stack depth limit. 178 unsigned InlineMaxStackDepth; 179 180 /// \brief The mode of function selection used during inlining. 181 AnalysisInliningMode InliningMode; 182 183 private: 184 /// \brief Describes the kinds for high-level analyzer mode. 185 enum UserModeKind { 186 UMK_NotSet = 0, 187 /// Perform shallow but fast analyzes. 188 UMK_Shallow = 1, 189 /// Perform deep analyzes. 190 UMK_Deep = 2 191 }; 192 193 /// Controls the high-level analyzer mode, which influences the default 194 /// settings for some of the lower-level config options (such as IPAMode). 195 /// \sa getUserMode 196 UserModeKind UserMode; 197 198 /// Controls the mode of inter-procedural analysis. 199 IPAKind IPAMode; 200 201 /// Controls which C++ member functions will be considered for inlining. 202 CXXInlineableMemberKind CXXMemberInliningMode; 203 204 /// \sa includeTemporaryDtorsInCFG 205 Optional<bool> IncludeTemporaryDtorsInCFG; 206 207 /// \sa mayInlineCXXStandardLibrary 208 Optional<bool> InlineCXXStandardLibrary; 209 210 /// \sa mayInlineTemplateFunctions 211 Optional<bool> InlineTemplateFunctions; 212 213 /// \sa mayInlineCXXAllocator 214 Optional<bool> InlineCXXAllocator; 215 216 /// \sa mayInlineCXXContainerMethods 217 Optional<bool> InlineCXXContainerMethods; 218 219 /// \sa mayInlineCXXSharedPtrDtor 220 Optional<bool> InlineCXXSharedPtrDtor; 221 222 /// \sa mayInlineObjCMethod 223 Optional<bool> ObjCInliningMode; 224 225 // Cache of the "ipa-always-inline-size" setting. 226 // \sa getAlwaysInlineSize 227 Optional<unsigned> AlwaysInlineSize; 228 229 /// \sa shouldSuppressNullReturnPaths 230 Optional<bool> SuppressNullReturnPaths; 231 232 // \sa getMaxInlinableSize 233 Optional<unsigned> MaxInlinableSize; 234 235 /// \sa shouldAvoidSuppressingNullArgumentPaths 236 Optional<bool> AvoidSuppressingNullArgumentPaths; 237 238 /// \sa shouldSuppressInlinedDefensiveChecks 239 Optional<bool> SuppressInlinedDefensiveChecks; 240 241 /// \sa shouldSuppressFromCXXStandardLibrary 242 Optional<bool> SuppressFromCXXStandardLibrary; 243 244 /// \sa reportIssuesInMainSourceFile 245 Optional<bool> ReportIssuesInMainSourceFile; 246 247 /// \sa StableReportFilename 248 Optional<bool> StableReportFilename; 249 250 /// \sa getGraphTrimInterval 251 Optional<unsigned> GraphTrimInterval; 252 253 /// \sa getMaxTimesInlineLarge 254 Optional<unsigned> MaxTimesInlineLarge; 255 256 /// \sa getMinCFGSizeTreatFunctionsAsLarge 257 Optional<unsigned> MinCFGSizeTreatFunctionsAsLarge; 258 259 /// \sa getMaxNodesPerTopLevelFunction 260 Optional<unsigned> MaxNodesPerTopLevelFunction; 261 262 /// \sa shouldInlineLambdas 263 Optional<bool> InlineLambdas; 264 265 /// \sa shouldWidenLoops 266 Optional<bool> WidenLoops; 267 268 /// A helper function that retrieves option for a given full-qualified 269 /// checker name. 270 /// Options for checkers can be specified via 'analyzer-config' command-line 271 /// option. 272 /// Example: 273 /// @code-analyzer-config unix.Malloc:OptionName=CheckerOptionValue @endcode 274 /// or @code-analyzer-config unix:OptionName=GroupOptionValue @endcode 275 /// for groups of checkers. 276 /// @param [in] CheckerName Full-qualified checker name, like 277 /// alpha.unix.StreamChecker. 278 /// @param [in] OptionName Name of the option to get. 279 /// @param [in] Default Default value if no option is specified. 280 /// @param [in] SearchInParents If set to true and the searched option was not 281 /// specified for the given checker the options for the parent packages will 282 /// be searched as well. The inner packages take precedence over the outer 283 /// ones. 284 /// @retval CheckerOptionValue An option for a checker if it was specified. 285 /// @retval GroupOptionValue An option for group if it was specified and no 286 /// checker-specific options were found. The closer group to checker, 287 /// the more priority it has. For example, @c coregroup.subgroup has more 288 /// priority than @c coregroup for @c coregroup.subgroup.CheckerName checker. 289 /// @retval Default If nor checker option, nor group option was found. 290 StringRef getCheckerOption(StringRef CheckerName, StringRef OptionName, 291 StringRef Default, 292 bool SearchInParents = false); 293 294 public: 295 /// Interprets an option's string value as a boolean. The "true" string is 296 /// interpreted as true and the "false" string is interpreted as false. 297 /// 298 /// If an option value is not provided, returns the given \p DefaultVal. 299 /// @param [in] Name Name for option to retrieve. 300 /// @param [in] DefaultVal Default value returned if no such option was 301 /// specified. 302 /// @param [in] C The optional checker parameter that can be used to restrict 303 /// the search to the options of this particular checker (and its parents 304 /// dependening on search mode). 305 /// @param [in] SearchInParents If set to true and the searched option was not 306 /// specified for the given checker the options for the parent packages will 307 /// be searched as well. The inner packages take precedence over the outer 308 /// ones. 309 bool getBooleanOption(StringRef Name, bool DefaultVal, 310 const ento::CheckerBase *C = nullptr, 311 bool SearchInParents = false); 312 313 /// Variant that accepts a Optional value to cache the result. 314 /// 315 /// @param [in,out] V Return value storage, returned if parameter contains 316 /// an existing valid option, else it is used to store a return value 317 /// @param [in] Name Name for option to retrieve. 318 /// @param [in] DefaultVal Default value returned if no such option was 319 /// specified. 320 /// @param [in] C The optional checker parameter that can be used to restrict 321 /// the search to the options of this particular checker (and its parents 322 /// dependening on search mode). 323 /// @param [in] SearchInParents If set to true and the searched option was not 324 /// specified for the given checker the options for the parent packages will 325 /// be searched as well. The inner packages take precedence over the outer 326 /// ones. 327 bool getBooleanOption(Optional<bool> &V, StringRef Name, bool DefaultVal, 328 const ento::CheckerBase *C = nullptr, 329 bool SearchInParents = false); 330 331 /// Interprets an option's string value as an integer value. 332 /// 333 /// If an option value is not provided, returns the given \p DefaultVal. 334 /// @param [in] Name Name for option to retrieve. 335 /// @param [in] DefaultVal Default value returned if no such option was 336 /// specified. 337 /// @param [in] C The optional checker parameter that can be used to restrict 338 /// the search to the options of this particular checker (and its parents 339 /// dependening on search mode). 340 /// @param [in] SearchInParents If set to true and the searched option was not 341 /// specified for the given checker the options for the parent packages will 342 /// be searched as well. The inner packages take precedence over the outer 343 /// ones. 344 int getOptionAsInteger(StringRef Name, int DefaultVal, 345 const ento::CheckerBase *C = nullptr, 346 bool SearchInParents = false); 347 348 /// Query an option's string value. 349 /// 350 /// If an option value is not provided, returns the given \p DefaultVal. 351 /// @param [in] Name Name for option to retrieve. 352 /// @param [in] DefaultVal Default value returned if no such option was 353 /// specified. 354 /// @param [in] C The optional checker parameter that can be used to restrict 355 /// the search to the options of this particular checker (and its parents 356 /// dependening on search mode). 357 /// @param [in] SearchInParents If set to true and the searched option was not 358 /// specified for the given checker the options for the parent packages will 359 /// be searched as well. The inner packages take precedence over the outer 360 /// ones. 361 StringRef getOptionAsString(StringRef Name, StringRef DefaultVal, 362 const ento::CheckerBase *C = nullptr, 363 bool SearchInParents = false); 364 365 /// \brief Retrieves and sets the UserMode. This is a high-level option, 366 /// which is used to set other low-level options. It is not accessible 367 /// outside of AnalyzerOptions. 368 UserModeKind getUserMode(); 369 370 /// \brief Returns the inter-procedural analysis mode. 371 IPAKind getIPAMode(); 372 373 /// Returns the option controlling which C++ member functions will be 374 /// considered for inlining. 375 /// 376 /// This is controlled by the 'c++-inlining' config option. 377 /// 378 /// \sa CXXMemberInliningMode 379 bool mayInlineCXXMemberFunction(CXXInlineableMemberKind K); 380 381 /// Returns true if ObjectiveC inlining is enabled, false otherwise. 382 bool mayInlineObjCMethod(); 383 384 /// Returns whether or not the destructors for C++ temporary objects should 385 /// be included in the CFG. 386 /// 387 /// This is controlled by the 'cfg-temporary-dtors' config option, which 388 /// accepts the values "true" and "false". 389 bool includeTemporaryDtorsInCFG(); 390 391 /// Returns whether or not C++ standard library functions may be considered 392 /// for inlining. 393 /// 394 /// This is controlled by the 'c++-stdlib-inlining' config option, which 395 /// accepts the values "true" and "false". 396 bool mayInlineCXXStandardLibrary(); 397 398 /// Returns whether or not templated functions may be considered for inlining. 399 /// 400 /// This is controlled by the 'c++-template-inlining' config option, which 401 /// accepts the values "true" and "false". 402 bool mayInlineTemplateFunctions(); 403 404 /// Returns whether or not allocator call may be considered for inlining. 405 /// 406 /// This is controlled by the 'c++-allocator-inlining' config option, which 407 /// accepts the values "true" and "false". 408 bool mayInlineCXXAllocator(); 409 410 /// Returns whether or not methods of C++ container objects may be considered 411 /// for inlining. 412 /// 413 /// This is controlled by the 'c++-container-inlining' config option, which 414 /// accepts the values "true" and "false". 415 bool mayInlineCXXContainerMethods(); 416 417 /// Returns whether or not the destructor of C++ 'shared_ptr' may be 418 /// considered for inlining. 419 /// 420 /// This covers std::shared_ptr, std::tr1::shared_ptr, and boost::shared_ptr, 421 /// and indeed any destructor named "~shared_ptr". 422 /// 423 /// This is controlled by the 'c++-shared_ptr-inlining' config option, which 424 /// accepts the values "true" and "false". 425 bool mayInlineCXXSharedPtrDtor(); 426 427 /// Returns whether or not paths that go through null returns should be 428 /// suppressed. 429 /// 430 /// This is a heuristic for avoiding bug reports with paths that go through 431 /// inlined functions that are more defensive than their callers. 432 /// 433 /// This is controlled by the 'suppress-null-return-paths' config option, 434 /// which accepts the values "true" and "false". 435 bool shouldSuppressNullReturnPaths(); 436 437 /// Returns whether a bug report should \em not be suppressed if its path 438 /// includes a call with a null argument, even if that call has a null return. 439 /// 440 /// This option has no effect when #shouldSuppressNullReturnPaths() is false. 441 /// 442 /// This is a counter-heuristic to avoid false negatives. 443 /// 444 /// This is controlled by the 'avoid-suppressing-null-argument-paths' config 445 /// option, which accepts the values "true" and "false". 446 bool shouldAvoidSuppressingNullArgumentPaths(); 447 448 /// Returns whether or not diagnostics containing inlined defensive NULL 449 /// checks should be suppressed. 450 /// 451 /// This is controlled by the 'suppress-inlined-defensive-checks' config 452 /// option, which accepts the values "true" and "false". 453 bool shouldSuppressInlinedDefensiveChecks(); 454 455 /// Returns whether or not diagnostics reported within the C++ standard 456 /// library should be suppressed. 457 /// 458 /// This is controlled by the 'suppress-c++-stdlib' config option, 459 /// which accepts the values "true" and "false". 460 bool shouldSuppressFromCXXStandardLibrary(); 461 462 /// Returns whether or not the diagnostic report should be always reported 463 /// in the main source file and not the headers. 464 /// 465 /// This is controlled by the 'report-in-main-source-file' config option, 466 /// which accepts the values "true" and "false". 467 bool shouldReportIssuesInMainSourceFile(); 468 469 /// Returns whether or not the report filename should be random or not. 470 /// 471 /// This is controlled by the 'stable-report-filename' config option, 472 /// which accepts the values "true" and "false". Default = false 473 bool shouldWriteStableReportFilename(); 474 475 /// Returns whether irrelevant parts of a bug report path should be pruned 476 /// out of the final output. 477 /// 478 /// This is controlled by the 'prune-paths' config option, which accepts the 479 /// values "true" and "false". 480 bool shouldPrunePaths(); 481 482 /// Returns true if 'static' initializers should be in conditional logic 483 /// in the CFG. 484 bool shouldConditionalizeStaticInitializers(); 485 486 // Returns the size of the functions (in basic blocks), which should be 487 // considered to be small enough to always inline. 488 // 489 // This is controlled by "ipa-always-inline-size" analyzer-config option. 490 unsigned getAlwaysInlineSize(); 491 492 // Returns the bound on the number of basic blocks in an inlined function 493 // (50 by default). 494 // 495 // This is controlled by "-analyzer-config max-inlinable-size" option. 496 unsigned getMaxInlinableSize(); 497 498 /// Returns true if the analyzer engine should synthesize fake bodies 499 /// for well-known functions. 500 bool shouldSynthesizeBodies(); 501 502 /// Returns how often nodes in the ExplodedGraph should be recycled to save 503 /// memory. 504 /// 505 /// This is controlled by the 'graph-trim-interval' config option. To disable 506 /// node reclamation, set the option to "0". 507 unsigned getGraphTrimInterval(); 508 509 /// Returns the maximum times a large function could be inlined. 510 /// 511 /// This is controlled by the 'max-times-inline-large' config option. 512 unsigned getMaxTimesInlineLarge(); 513 514 /// Returns the number of basic blocks a function needs to have to be 515 /// considered large for the 'max-times-inline-large' config option. 516 /// 517 /// This is controlled by the 'min-cfg-size-treat-functions-as-large' config 518 /// option. 519 unsigned getMinCFGSizeTreatFunctionsAsLarge(); 520 521 /// Returns the maximum number of nodes the analyzer can generate while 522 /// exploring a top level function (for each exploded graph). 523 /// 150000 is default; 0 means no limit. 524 /// 525 /// This is controlled by the 'max-nodes' config option. 526 unsigned getMaxNodesPerTopLevelFunction(); 527 528 /// Returns true if lambdas should be inlined. Otherwise a sink node will be 529 /// generated each time a LambdaExpr is visited. 530 bool shouldInlineLambdas(); 531 532 /// Returns true if the analysis should try to widen loops. 533 /// This is controlled by the 'widen-loops' config option. 534 bool shouldWidenLoops(); 535 536 public: 537 AnalyzerOptions() : 538 AnalysisStoreOpt(RegionStoreModel), 539 AnalysisConstraintsOpt(RangeConstraintsModel), 540 AnalysisDiagOpt(PD_HTML), 541 AnalysisPurgeOpt(PurgeStmt), 542 DisableAllChecks(0), 543 ShowCheckerHelp(0), 544 AnalyzeAll(0), 545 AnalyzerDisplayProgress(0), 546 AnalyzeNestedBlocks(0), 547 eagerlyAssumeBinOpBifurcation(0), 548 TrimGraph(0), 549 visualizeExplodedGraphWithGraphViz(0), 550 visualizeExplodedGraphWithUbiGraph(0), 551 UnoptimizedCFG(0), 552 PrintStats(0), 553 NoRetryExhausted(0), 554 // Cap the stack depth at 4 calls (5 stack frames, base + 4 calls). 555 InlineMaxStackDepth(5), 556 InliningMode(NoRedundancy), 557 UserMode(UMK_NotSet), 558 IPAMode(IPAK_NotSet), 559 CXXMemberInliningMode() {} 560 561 }; 562 563 typedef IntrusiveRefCntPtr<AnalyzerOptions> AnalyzerOptionsRef; 564 565 } 566 567 #endif 568