1. 5238474 [analyzer] Fixup for r146793. Add tests for atol and atoll. by Anna Zaks · 13 years ago
  2. 9ffbe24 [analyzer] Add support for taint flowing through a function (atoi). by Anna Zaks · 13 years ago
  3. d3d8548 [analyzer] Better stdin support. by Anna Zaks · 13 years ago
  4. 2135ebb Add support for matching one or more (aka regex +) diagnostic messages with -verify. by Anna Zaks · 13 years ago
  5. 557a382 [analyzer] Ensure that the order in which checker callbacks are called by Anna Zaks · 13 years ago
  6. 2fe9b7f Modify how the -verify flag works. Currently, the verification string and by Richard Trieu · 13 years ago
  7. 9929523 [analyzer] Disable verification step on the failing test. by Anna Zaks · 13 years ago
  8. 86277c5 [analyzer] Re-enable the test which was failing on one of the bots. by Anna Zaks · 13 years ago
  9. f512560 [analyzer] Revert the taint test, which is failing on one of the bots for time being. by Anna Zaks · 13 years ago
  10. efd6989 [analyzer] Treat stdin as a source of taint. by Anna Zaks · 13 years ago
  11. 1009ac7 [analyzer] Mark output of fscanf and fopen as tainted. by Anna Zaks · 13 years ago
  12. e55a22b [analyzer] Mark getenv output as tainted. by Anna Zaks · 13 years ago
  13. e3d250e [analyzer] CStringChecker should not rely on the analyzer generating UndefOrUnknown value when it cannot reason about the expression. by Anna Zaks · 13 years ago
  14. 6fcd932 Check that arguments to a scanf call match the format specifier, by Hans Wennborg · 13 years ago
  15. 432a455 [analyzer] Fix inconsistency on when SValBuilder assumes that 2 by Anna Zaks · 13 years ago
  16. 5fc7def [analyzer] If memory region is tainted mark data as tainted. + random comments by Anna Zaks · 13 years ago
  17. dc30967 Add an experimental MallocSizeofChecker, which reports inconsistencies by Peter Collingbourne · 13 years ago
  18. dcf06fa [analyzer] Propagate taint through MemRegions. by Anna Zaks · 13 years ago
  19. aace9ef [analyzer] Propagate taint through NonLoc to NonLoc casts. by Anna Zaks · 13 years ago
  20. 4473755 [analyzer] Simplify the expected-warning statement. by Anna Zaks · 13 years ago
  21. bea728b [analyzer] Add a missing taint tester warning. by Anna Zaks · 13 years ago
  22. 76462f0 [analyzer] Remove all uses of ConstraintManager::canResonAbout() from by Anna Zaks · 13 years ago
  23. a50b7ab [analyzer] Add a debug checker to test for tainted data. by Anna Zaks · 13 years ago
  24. ee5a21f [analyzer] Make KeychainAPI checker less aggressive. radar://10508828 by Anna Zaks · 13 years ago
  25. 60a4481 Fix typo. by Ted Kremenek · 13 years ago
  26. a078ecf When analyzing a C++ method (without a specific caller), assume 'this' is non-null. Fixes <rdar://problem/10508787>. by Ted Kremenek · 13 years ago
  27. 381c066 Per an offline conversation with John McCall, have StmtPrinter actually print out the source expression for OpaqueValueExpr. by Ted Kremenek · 13 years ago
  28. 214323b Relax RegionStore to allow loads from CodeTextRegions. Apparently you can actually write code that does this. This seems worthy of a checker, but the StoreManager should handle the memory abstraction without crashing. Fixes PR 11450. by Ted Kremenek · 13 years ago
  29. 3881c69 [analyzer] Add more simple taint tests. by Anna Zaks · 13 years ago
  30. 8f4caf5 [analyzer] Warn when non pointer arguments are passed to scanf (only when running taint checker). by Anna Zaks · 13 years ago
  31. 01f2a1e [analyzer] The compiler warning was disabling the analyzer in this test. by Anna Zaks · 13 years ago
  32. 0d339d0 [analyzer] Do not conjure a symbol when we need to propagate taint. by Anna Zaks · 13 years ago
  33. 960809e Added missing ImplicitCastExpr around conversion operator call. by Abramo Bagnara · 13 years ago
  34. e42a0ab Fixed crash with initializer lists and unnamed bitfields in the RegionStore by Jim Goodnow II · 13 years ago
  35. 9b0970f [analyzer] Catch the first taint propagation implied buffer overflow. by Anna Zaks · 13 years ago
  36. b302996 Use Sema::RequireCompleteType to check for the completeness of by Douglas Gregor · 13 years ago
  37. 4c42bb7 [static analyzer] Tweak RetainCountChecker's diagnostics to correctly indicate if a message was due to a property access. This can by Ted Kremenek · 13 years ago
  38. 729aa06 [analyzer;Regionstore] handle loads from StringLiteral elements for StringLiterals representing wide strings. Fixes PR 11294. by Ted Kremenek · 13 years ago
  39. ccf1bfd [analyzer] teach AnalysisDeclContext::getSelfDecl() about blocks that capture the 'self' variable of the enclosing ObjC method decl. Fixes <rdar://problem/10380300>. by Ted Kremenek · 13 years ago
  40. 4b9c2d2 Change the AST representation of operations on Objective-C by John McCall · 13 years ago
  41. 129d924 Switch these two tests to use the Clang driver instead of CC1. They want by Chandler Carruth · 13 years ago
  42. 6a9065a Per discussion with John McCall, don't add OpaqueValueExprs to the CFG. by Ted Kremenek · 13 years ago
  43. 2d950b1 [analyzer] Fix PR11282 - an assert in markAsSink by Anna Zaks · 13 years ago
  44. cdcc653 [analyzer] BranchNodeBuilder should not generate autotransitions. by Anna Zaks · 13 years ago
  45. 4a037c7 [analyzer] ObjC message sends to nil receivers that return structs are now okay (compiler zeroes out the data). Fixes <rdar://problem/9151319>. by Ted Kremenek · 13 years ago
  46. 58f6f1e Add source-level dominators analysis. Patch by Guoping Long! by Ted Kremenek · 13 years ago
  47. 1d26f48 Rename AnalysisContext to AnalysisDeclContext. Not only is this name more accurate, but it frees up the name AnalysisContext for other uses. by Ted Kremenek · 13 years ago
  48. beedc5f Add test case for analyzer crash reported in <rdar://problem/10308201> (which is already fixed in mainline). by Ted Kremenek · 13 years ago
  49. 18c9bd3 Fix the signatures of vfork, __sigsetjmp and sigsetjmp. by Rafael Espindola · 13 years ago
  50. 762bb9d Update all tests other than Driver/std.cpp to use -std=c++11 rather than by Richard Smith · 13 years ago
  51. 6700415 Add returns_twice to functions that are known to return twice. This implements by Rafael Espindola · 13 years ago
  52. a7957ff [analyzer] Warn about the use of insecure, deprecated vfork() function PR11053 (http://llvm.org/bugs/show_bug.cgi?id=11053). by Anna Zaks · 13 years ago
  53. 46eaf77 [analyzer] Teach the static analyzer about CXXForRangeStmt. Patch by Jim Goodnow II! by Ted Kremenek · 13 years ago
  54. 744f1cd Provide basic static analyzer support for CXXTemporaryObjectExpr. Patch by Jim Goodnow II. by Ted Kremenek · 13 years ago
  55. c808503 [static analyzer] Fix crash in LiveVariables and Environment::getSVal() when analyzing C++ pointer-to-member calls. Fixes <rdar://problem/10243398>. by Ted Kremenek · 13 years ago
  56. 93edbc5 Fix major regression in RetainCountChecker. DefaultSummaries were not being used when they were meant to be. Fixes <rdar://problem/10241614>. by Ted Kremenek · 13 years ago
  57. d1e40d5 Make -fobjc-nonfragile-abi the -cc1 default, since it's the by John McCall · 13 years ago
  58. 6a835dd Fix LiveVariables analysis bug with MaterializeTemporaryExpr and fix handling in ExprEngine. Fixes <rdar://problem/10201666>. by Ted Kremenek · 13 years ago
  59. b459cf3 Address PR10616. The crash has already been fixed by Ted in r140725, so just refactor to use existing API + test case. by Anna Zaks · 13 years ago
  60. 7df2ff4 Tweak the interface for analyzing the CF conventions for a name by John McCall · 13 years ago
  61. e4c6675 Fix crash when analyzing C++ code involving constant enums and switch statements (<rdar://problem/10202899>). by Ted Kremenek · 13 years ago
  62. 0658879 [analyzer] Fix a bug in RetainReleaseChecker diagnostics. It gives more precise error message on the modified test case (and prevents duplicate diagnostics when we purge at block granularity). by Anna Zaks · 13 years ago
  63. d309528 [analyzer] Add -analyzer-purge option which can take on multiple values, remove -analyzer-purge=none. (Small refactor as well: move the work of constructing AnalysisManager from the callers to the class itself.) by Anna Zaks · 13 years ago
  64. 7e5f112 Fix a crash in MallocOverflowSecurityChecker. Patch by Lei Zhang. by Anna Zaks · 13 years ago
  65. 6479c66 [analyzer] Remove target triple from the malloc overflow test. by Anna Zaks · 13 years ago
  66. 09ca9ef [analyzer] Fix a bug where PathDiagnosticLocation did not generate a valid range and add asserts to check validity of locations early on. Ignore invalid ranges in PathDiagnosticPiece (they could be added by checker writers). by Anna Zaks · 13 years ago
  67. 0cd5948 [analyzer] Refactor: make PathDiagnosticLocation responsible for validation of SourceLocations (commit 5 of ?): by Anna Zaks · 13 years ago
  68. f2b4e66 [analyzer] Refactor: make PathDiagnosticLocation responsible for validation of SourceLocations (commit 4 of ?): by Anna Zaks · 13 years ago
  69. 4d353eb [analyzer] After CFG has been linearized, we can have a situation where an ExpoledNode has an invalid SourceLocation (which has no correspondence in the source code). This commit is the first step to solve this problem. by Anna Zaks · 13 years ago
  70. 773d847 [analyzer] Simplify the test, use generic/more descriptive names. by Anna Zaks · 13 years ago
  71. 7a75646 [analyzer] Fix a failure encountered while analyzing bind (radar://10105448). by Anna Zaks · 13 years ago
  72. f7afe4a [analyzer] Fix a new failure encountered while building Adium exposed as a result of r138196(radar://10087620). ObjectiveC property of type int has a value of type ObjCPropRef, which is a Loc. by Anna Zaks · 13 years ago
  73. 0047ed1 [analyzer] Test for -analyze-function on ObjectiveC to accompany r139439. by Anna Zaks · 13 years ago
  74. 822eeb5 Stop cluttering the test directory with temporary files. by Benjamin Kramer · 13 years ago
  75. 17a38e2 [analyzer] Move the knowledge of whether or not GC is enabled for the current analysis from CFRefCount to ExprEngine. by Jordy Rose · 13 years ago
  76. d56763f If size was equal to 0, either NULL or a pointer suitable to be passed to by Zhongxing Xu · 13 years ago
  77. 8b6eb7c Fix: Bug 10798 - [analyzer] Crash when analyzing ICU. (A slight improvement on the previous commit.) by Anna Zaks · 13 years ago
  78. 5c96f86 Fix bug 10797: Crash: "cast<Ty>() argument of incompatible type!" assert when analyzing ICU. by Anna Zaks · 13 years ago
  79. 05a4652 [analyzer] Add test case for handling of __bridge_transfer that previously resulted in a 'stack address' warning (that was fixed in r138616). Fixes <rdar://problem/10018376>. by Ted Kremenek · 13 years ago
  80. 782f63e Handle CXXTempObjectRegion in StackAddrEscapeChecker. by Jeffrey Yasskin · 13 years ago
  81. 9840111 [analyzer] MacOSKeychainAPIChecker: Provide reacher diagnostic trace by pointing to the allocation site when reporting a leak. by Anna Zaks · 13 years ago
  82. 6cf0ed0 [analyzer] MacOSKeychainAPIChecker: Add reasoning about functions which MIGHT deallocate the memory region allocated with SecKeychain APIs. Specifically, when the buffer is passed to CFStringCreateWithBytesNoCopy along with a custom deallocator, which might potentially correctly release the memory. by Anna Zaks · 13 years ago
  83. 540dda6 Fix regression in -Wuninitialized involving VLAs. It turns out that we were modeling sizeof(VLAs) by Ted Kremenek · 13 years ago
  84. 7bbd166 [analyzer] MacOSKeychainAPIChecker: Users of KeyChain API often use free() to deallocate the password. Catch this error explicitly and generate the error message at the place where free() is called. by Anna Zaks · 13 years ago
  85. e62e87b [analyzer] Move handling of hardcoded noreturn ("panic") methods from CFRefCount to NoReturnFunctionChecker. No functionality change intended. by Jordy Rose · 13 years ago
  86. 647a751 Add a test for checking that custom diagnostic visitors are working. by Anna Zaks · 13 years ago
  87. 5bd0495 [analyzer] teach ExprEngine about loads from static C++ class fields. Fixes <rdar://problem/9948787>. by Ted Kremenek · 13 years ago
  88. b1a1950 MacOSKeychainAPIChecker: Turn it on by default. by Anna Zaks · 13 years ago
  89. f0c7fe5 MacOSKeychainAPIChecker: Do not report double allocation if first allocation returned an error. by Anna Zaks · 13 years ago
  90. f7ce52b MacOSKeychainAPIChecker: Test all APIs. by Anna Zaks · 13 years ago
  91. 79c9c75 MacOSKeychainAPIChecker: If the allocated data address entered as an enclosing function parameter, skip it to avoid false positives. by Anna Zaks · 13 years ago
  92. 703ffb1 MacOSKeychainAPIChecker: by Anna Zaks · 13 years ago
  93. ddddd48 De-Unicode-ify. by NAKAMURA Takumi · 13 years ago
  94. 7d11c3f [analyzer] add more buffer overflow tests to show we handle sizeof(VLA) in obstruse ways... by Ted Kremenek · 13 years ago
  95. ca0b57e KeychainAPI checker: Generate an error on double allocation. Pull out getAsPointeeMemoryRegion so that it could be reused. by Anna Zaks · 13 years ago
  96. 62a811d KeychainAPI checker: forgot to commit the test with r136930. This should fix the bot. by Anna Zaks · 13 years ago
  97. 03826aa KeychainAPI checker: Add basic diagnostics. Track MemoryRegion istead of SymbolicRef since the address might not be a symbolic value in some cases, for example in fooOnlyFree() test. by Anna Zaks · 13 years ago
  98. 033a07e [analyzer] rename all experimental checker packages to have 'experimental' be the common root package. by Ted Kremenek · 13 years ago
  99. 17f7bdd [analyzer] Introduce MallocOverflowSecurityChecker, a simple flow-sensitive checker that may be useful for security auditing. This checker is currently too noisy to be on by default. by Ted Kremenek · 13 years ago
  100. e68b5f1 KeychainAPI checker: only check the paths on which the allocator function returned noErr. (+ minor cleanup) by Anna Zaks · 13 years ago