Index: include/clang/Basic/DiagnosticFrontendKinds.td =================================================================== --- include/clang/Basic/DiagnosticFrontendKinds.td +++ include/clang/Basic/DiagnosticFrontendKinds.td @@ -174,8 +174,6 @@ def err_unknown_analyzer_checker : Error< "no analyzer checkers are associated with '%0'">; -def note_suggest_disabling_all_checkers : Note< - "use -analyzer-disable-all-checks to disable all static analyzer checkers">; def warn_incompatible_analyzer_plugin_api : Warning< "checker plugin '%0' is not compatible with this version of the analyzer">, Index: include/clang/StaticAnalyzer/Core/CheckerRegistry.h =================================================================== --- include/clang/StaticAnalyzer/Core/CheckerRegistry.h +++ include/clang/StaticAnalyzer/Core/CheckerRegistry.h @@ -95,6 +95,7 @@ }; using CheckerInfoList = std::vector; + using CheckerInfoSet = llvm::SetVector; private: template @@ -131,9 +132,13 @@ /// Prints the name and description of all checkers in this registry. /// This output is not intended to be machine-parseable. void printHelp(raw_ostream &out, size_t maxNameChars = 30) const; - void printList(raw_ostream &out, const AnalyzerOptions &opts) const; + void printList(raw_ostream &out, const AnalyzerOptions &opts, + DiagnosticsEngine &diags) const; private: + CheckerInfoSet getEnabledCheckers(const AnalyzerOptions &Opts, + DiagnosticsEngine &diags) const; + mutable CheckerInfoList Checkers; mutable llvm::StringMap Packages; }; Index: include/clang/StaticAnalyzer/Frontend/FrontendActions.h =================================================================== --- include/clang/StaticAnalyzer/Frontend/FrontendActions.h +++ include/clang/StaticAnalyzer/Frontend/FrontendActions.h @@ -54,7 +54,8 @@ void printCheckerHelp(raw_ostream &OS, ArrayRef plugins); void printEnabledCheckerList(raw_ostream &OS, ArrayRef plugins, - const AnalyzerOptions &opts); + const AnalyzerOptions &opts, + DiagnosticsEngine &diags); void printAnalyzerConfigList(raw_ostream &OS); } // end GR namespace Index: lib/FrontendTool/ExecuteCompilerInvocation.cpp =================================================================== --- lib/FrontendTool/ExecuteCompilerInvocation.cpp +++ lib/FrontendTool/ExecuteCompilerInvocation.cpp @@ -246,7 +246,8 @@ if (Clang->getAnalyzerOpts()->ShowEnabledCheckerList) { ento::printEnabledCheckerList(llvm::outs(), Clang->getFrontendOpts().Plugins, - *Clang->getAnalyzerOpts()); + *Clang->getAnalyzerOpts(), + Clang->getDiagnostics()); } // Honor -analyzer-config-help. Index: lib/StaticAnalyzer/Core/CheckerRegistry.cpp =================================================================== --- lib/StaticAnalyzer/Core/CheckerRegistry.cpp +++ lib/StaticAnalyzer/Core/CheckerRegistry.cpp @@ -9,7 +9,6 @@ #include "clang/StaticAnalyzer/Core/CheckerRegistry.h" #include "clang/Basic/Diagnostic.h" -#include "clang/Basic/LLVM.h" #include "clang/Frontend/FrontendDiagnostic.h" #include "clang/StaticAnalyzer/Core/CheckerManager.h" #include "clang/StaticAnalyzer/Core/AnalyzerOptions.h" @@ -19,50 +18,11 @@ #include "llvm/ADT/StringRef.h" #include "llvm/Support/raw_ostream.h" #include -#include -#include using namespace clang; using namespace ento; -static const char PackageSeparator = '.'; - -using CheckerInfoSet = llvm::SetVector; - -namespace { -/// Represents a request to include or exclude a checker or package from a -/// specific analysis run. -/// -/// \sa CheckerRegistry::initializeManager -class CheckerOptInfo { - StringRef Name; - bool Enable; - bool Claimed; - -public: - CheckerOptInfo(StringRef name, bool enable) - : Name(name), Enable(enable), Claimed(false) { } - - StringRef getName() const { return Name; } - bool isEnabled() const { return Enable; } - bool isDisabled() const { return !isEnabled(); } - - bool isClaimed() const { return Claimed; } - bool isUnclaimed() const { return !isClaimed(); } - void claim() { Claimed = true; } -}; - -} // end of anonymous namespace - -static SmallVector -getCheckerOptList(const AnalyzerOptions &opts) { - SmallVector checkerOpts; - for (unsigned i = 0, e = opts.CheckersControlList.size(); i != e; ++i) { - const std::pair &opt = opts.CheckersControlList[i]; - checkerOpts.push_back(CheckerOptInfo(opt.first, opt.second)); - } - return checkerOpts; -} +static constexpr char PackageSeparator = '.'; static bool checkerNameLT(const CheckerRegistry::CheckerInfo &a, const CheckerRegistry::CheckerInfo &b) { @@ -86,40 +46,48 @@ return false; } -/// Collects the checkers for the supplied \p opt option into \p collected. -static void collectCheckers(const CheckerRegistry::CheckerInfoList &checkers, - const llvm::StringMap &packageSizes, - CheckerOptInfo &opt, CheckerInfoSet &collected) { - // Use a binary search to find the possible start of the package. - CheckerRegistry::CheckerInfo packageInfo(nullptr, opt.getName(), ""); - auto end = checkers.cend(); - auto i = std::lower_bound(checkers.cbegin(), end, packageInfo, checkerNameLT); - - // If we didn't even find a possible package, give up. - if (i == end) - return; - - // If what we found doesn't actually start the package, give up. - if (!isInPackage(*i, opt.getName())) - return; - - // There is at least one checker in the package; claim the option. - opt.claim(); - - // See how large the package is. - // If the package doesn't exist, assume the option refers to a single checker. - size_t size = 1; - llvm::StringMap::const_iterator packageSize = - packageSizes.find(opt.getName()); - if (packageSize != packageSizes.end()) - size = packageSize->getValue(); - - // Step through all the checkers in the package. - for (auto checkEnd = i+size; i != checkEnd; ++i) - if (opt.isEnabled()) - collected.insert(&*i); - else - collected.remove(&*i); +CheckerRegistry::CheckerInfoSet CheckerRegistry::getEnabledCheckers( + const AnalyzerOptions &Opts, + DiagnosticsEngine &diags) const { + + assert(std::is_sorted(Checkers.begin(), Checkers.end(), checkerNameLT) && + "In order to efficiently gather checkers, this function expects them " + "to be already sorted!"); + + CheckerInfoSet enabledCheckers; + const auto end = Checkers.cend(); + + for (const std::pair &opt : Opts.CheckersControlList) { + // Use a binary search to find the possible start of the package. + CheckerRegistry::CheckerInfo packageInfo(nullptr, opt.first, ""); + auto firstRelatedChecker = + std::lower_bound(Checkers.cbegin(), end, packageInfo, checkerNameLT); + + if (firstRelatedChecker == end || + !isInPackage(*firstRelatedChecker, opt.first)) { + diags.Report(diag::err_unknown_analyzer_checker) << opt.first; + return {}; + } + + // See how large the package is. + // If the package doesn't exist, assume the option refers to a single + // checker. + size_t size = 1; + llvm::StringMap::const_iterator packageSize = + Packages.find(opt.first); + if (packageSize != Packages.end()) + size = packageSize->getValue(); + + // Step through all the checkers in the package. + for (auto lastRelatedChecker = firstRelatedChecker+size; + firstRelatedChecker != lastRelatedChecker; ++firstRelatedChecker) + if (opt.second) + enabledCheckers.insert(&*firstRelatedChecker); + else + enabledCheckers.remove(&*firstRelatedChecker); + } + + return enabledCheckers; } void CheckerRegistry::addChecker(InitializationFunction fn, StringRef name, @@ -141,26 +109,14 @@ // Sort checkers for efficient collection. llvm::sort(Checkers, checkerNameLT); - llvm::SmallVector checkerOpts = getCheckerOptList(Opts); // Collect checkers enabled by the options. - CheckerInfoSet enabledCheckers; - for (auto &i : checkerOpts) - collectCheckers(Checkers, Packages, i, enabledCheckers); + CheckerInfoSet enabledCheckers = getEnabledCheckers(Opts, diags); // Initialize the CheckerManager with all enabled checkers. - for (const auto *i :enabledCheckers) { + for (const auto *i : enabledCheckers) { checkerMgr.setCurrentCheckName(CheckName(i->FullName)); i->Initialize(checkerMgr); } - - for (unsigned i = 0, e = checkerOpts.size(); i != e; ++i) { - if (checkerOpts[i].isUnclaimed()) { - diags.Report(diag::err_unknown_analyzer_checker) - << checkerOpts[i].getName(); - diags.Report(diag::note_suggest_disabling_all_checkers); - } - - } } void CheckerRegistry::validateCheckerOptions(const AnalyzerOptions &opts, @@ -223,14 +179,13 @@ } void CheckerRegistry::printList(raw_ostream &out, - const AnalyzerOptions &opts) const { + const AnalyzerOptions &opts, + DiagnosticsEngine &diags) const { + // Sort checkers for efficient collection. llvm::sort(Checkers, checkerNameLT); - llvm::SmallVector checkerOpts = getCheckerOptList(opts); // Collect checkers enabled by the options. - CheckerInfoSet enabledCheckers; - for (auto &i : checkerOpts) - collectCheckers(Checkers, Packages, i, enabledCheckers); + CheckerInfoSet enabledCheckers = getEnabledCheckers(opts, diags); for (const auto *i : enabledCheckers) out << i->FullName << '\n'; Index: lib/StaticAnalyzer/Frontend/CheckerRegistration.cpp =================================================================== --- lib/StaticAnalyzer/Frontend/CheckerRegistration.cpp +++ lib/StaticAnalyzer/Frontend/CheckerRegistration.cpp @@ -130,10 +130,11 @@ void ento::printEnabledCheckerList(raw_ostream &out, ArrayRef plugins, - const AnalyzerOptions &opts) { + const AnalyzerOptions &opts, + DiagnosticsEngine &diags) { out << "OVERVIEW: Clang Static Analyzer Enabled Checkers List\n\n"; - ClangCheckerRegistry(plugins).printList(out, opts); + ClangCheckerRegistry(plugins).printList(out, opts, diags); } void ento::printAnalyzerConfigList(raw_ostream &out) { Index: test/Analysis/disable-all-checks.c =================================================================== --- test/Analysis/disable-all-checks.c +++ test/Analysis/disable-all-checks.c @@ -1,10 +1,18 @@ -// RUN: %clang_analyze_cc1 -analyzer-checker=core -analyzer-store=region -analyzer-disable-all-checks -verify %s -// RUN: %clang_analyze_cc1 -analyzer-disable-all-checks -analyzer-checker=core -analyzer-store=region -verify %s +// RUN: %clang_analyze_cc1 -analyzer-checker=core -analyzer-store=region \ +// RUN: -analyzer-disable-all-checks -verify %s +// +// RUN: %clang_analyze_cc1 -analyzer-disable-all-checks -analyzer-checker=core \ +// RUN: -analyzer-store=region -verify %s +// // RUN: %clang_analyze_cc1 -analyzer-disable-all-checks -verify %s -// RUN: not %clang_analyze_cc1 -analyzer-checker=core -analyzer-store=region -analyzer-disable-checker -verify %s 2>&1 | FileCheck %s +// +// RUN: not %clang_analyze_cc1 -analyzer-checker=core -analyzer-store=region \ +// RUN: -analyzer-disable-checker non.existant.Checker -verify %s 2>&1 \ +// RUN: | FileCheck %s +// // expected-no-diagnostics -// CHECK: use -analyzer-disable-all-checks to disable all static analyzer checkers +// CHECK: no analyzer checkers are associated with 'non.existant.Checker' int buggy() { int x = 0; return 5/x; // no warning