"Fossies" - the Fresh Open Source Software Archive

Member "cfe-9.0.0.src/test/Analysis/analyzer-checker-option-help.c" (23 May 2019, 4363 Bytes) of package /linux/misc/cfe-9.0.0.src.tar.xz:


As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) C and C++ source code syntax highlighting (style: standard) with prefixed line numbers and code folding option. Alternatively you can here view or download the uninterpreted source code file.

    1 // RUN: %clang_cc1 -analyzer-checker-option-help \
    2 // RUN:   2>&1 | FileCheck %s -check-prefix=CHECK-STABLE
    3 
    4 // RUN: %clang_cc1 -analyzer-checker-option-help-alpha \
    5 // RUN:   2>&1 | FileCheck %s -check-prefix=CHECK-ALPHA
    6 
    7 // RUN: %clang_cc1 -analyzer-checker-option-help-developer \
    8 // RUN:   2>&1 | FileCheck %s -check-prefix=CHECK-DEVELOPER
    9 
   10 // RUN: %clang_cc1 -analyzer-checker-option-help-developer \
   11 // RUN:   -analyzer-checker-option-help-alpha \
   12 // RUN:   2>&1 | FileCheck %s -check-prefix=CHECK-DEVELOPER-ALPHA
   13 
   14 // RUN: %clang_cc1 -analyzer-checker-option-help \
   15 // RUN:   -analyzer-checker-option-help-alpha \
   16 // RUN:   2>&1 | FileCheck %s -check-prefix=CHECK-STABLE-ALPHA
   17 
   18 // RUN: %clang_cc1 -analyzer-checker-option-help \
   19 // RUN:   -analyzer-checker-option-help-developer \
   20 // RUN:   2>&1 | FileCheck %s -check-prefix=CHECK-STABLE-DEVELOPER
   21 
   22 // RUN: %clang_cc1 -analyzer-checker-option-help \
   23 // RUN:   -analyzer-checker-option-help-alpha \
   24 // RUN:   -analyzer-checker-option-help-developer \
   25 // RUN:   2>&1 | FileCheck %s -check-prefix=CHECK-STABLE-ALPHA-DEVELOPER
   26 
   27 // CHECK-STABLE: OVERVIEW: Clang Static Analyzer Checker and Package Option List
   28 //
   29 // CHECK-STABLE: USAGE: -analyzer-config <OPTION1=VALUE,OPTION2=VALUE,...>
   30 //
   31 // CHECK-STABLE:        -analyzer-config OPTION1=VALUE, -analyzer-config
   32 // CHECK-STABLE-SAME:   OPTION2=VALUE, ...
   33 //
   34 // CHECK-STABLE: OPTIONS:
   35 //
   36 // CHECK-STABLE:   cplusplus.Move:WarnOn
   37 // CHECK-STABLE-SAME:          (string) In non-aggressive mode, only warn
   38 // CHECK-STABLLE:              on use-after-move of local variables (or
   39 // CHECK-STABLLE:              local rvalue references) and of STL objects.
   40 // CHECK-STABLLE:              The former is possible because local variables
   41 // CHECK-STABLLE:              (or local rvalue references) are not tempting
   42 // CHECK-STABLLE:              their user to re-use the storage. The latter
   43 // CHECK-STABLLE:              is possible because STL objects are known
   44 // CHECK-STABLLE:              to end up in a valid but unspecified state
   45 // CHECK-STABLLE:              after the move and their state-reset methods
   46 // CHECK-STABLLE:              are also known, which allows us to predict
   47 // CHECK-STABLLE:              precisely when use-after-move is invalid.
   48 // CHECK-STABLLE:              Some STL objects are known to conform to
   49 // CHECK-STABLLE:              additional contracts after move, so they
   50 // CHECK-STABLLE:              are not tracked. However, smart pointers
   51 // CHECK-STABLLE:              specifically are tracked because we can
   52 // CHECK-STABLLE:              perform extra checking over them. In aggressive
   53 // CHECK-STABLLE:              mode, warn on any use-after-move because
   54 // CHECK-STABLLE:              the user has intentionally asked us to completely
   55 // CHECK-STABLLE:              eliminate use-after-move in his code. Values:
   56 // CHECK-STABLLE:              "KnownsOnly", "KnownsAndLocals", "All".
   57 // CHECK-STABLLE:              (default: KnownsAndLocals)
   58 
   59 // CHECK-STABLE-NOT: debug.AnalysisOrder:*
   60 // CHECK-DEVELOPER:  debug.AnalysisOrder:*
   61 // CHECK-ALPHA-NOT:  debug.AnalysisOrder:*
   62 
   63 // CHECK-STABLE-NOT:    optin.cplusplus.UninitializedObject:IgnoreGuardedFields
   64 // CHECK-DEVELOPER-NOT: optin.cplusplus.UninitializedObject:IgnoreGuardedFields
   65 // CHECK-ALPHA:         optin.cplusplus.UninitializedObject:IgnoreGuardedFields
   66 
   67 // CHECK-STABLE:        optin.performance.Padding:AllowedPad
   68 // CHECK-DEVELOPER-NOT: optin.performance.Padding:AllowedPad
   69 // CHECK-ALPHA-NOT:     optin.performance.Padding:AllowedPad
   70 
   71 
   72 // CHECK-STABLE-ALPHA-NOT: debug.AnalysisOrder:*
   73 // CHECK-DEVELOPER-ALPHA:  debug.AnalysisOrder:*
   74 // CHECK-STABLE-DEVELOPER: debug.AnalysisOrder:*
   75 
   76 // CHECK-STABLE-ALPHA:         optin.cplusplus.UninitializedObject:IgnoreGuardedFields
   77 // CHECK-DEVELOPER-ALPHA:      optin.cplusplus.UninitializedObject:IgnoreGuardedFields
   78 // CHECK-STABLE-DEVELOPER-NOT: optin.cplusplus.UninitializedObject:IgnoreGuardedFields
   79 
   80 // CHECK-STABLE-ALPHA:        optin.performance.Padding:AllowedPad
   81 // CHECK-DEVELOPER-ALPHA-NOT: optin.performance.Padding:AllowedPad
   82 // CHECK-STABLE-DEVELOPER:    optin.performance.Padding:AllowedPad
   83 
   84 
   85 // CHECK-STABLE-ALPHA-DEVELOPER: debug.AnalysisOrder:*
   86 // CHECK-STABLE-ALPHA-DEVELOPER: optin.cplusplus.UninitializedObject:IgnoreGuardedFields
   87 // CHECK-STABLE-ALPHA-DEVELOPER: optin.performance.Padding:AllowedPad