- 5d0ea6d [analyzer] Removing references to CheckerContext::getNodeBuilder(): checkers can obtain block count directly from the Context. by Anna Zaks · 13 years ago
- 8ba7214 [analyzer] Remove unused methods, add comments to others. by Anna Zaks · 13 years ago
- 3381a73 [analyzer] Remove redundant state (AnalysisContext pointer for every BinaryOperator tracked) from IdempotentOperationChecker. by Anna Zaks · 13 years ago
- 1e9775d [analyzer] In UndefBranchChecker, use a node generator which does not create an edge/branching. (ExprEngine should be in charge of generating edges. The checkers should examine the condition and generate PostCondition node if needed.) by Anna Zaks · 13 years ago
- 9c81bc2 [analyzer] Cleanup in UndefBranchChecker: by Anna Zaks · 13 years ago
- 491306a Allow getting all source locations of selector identifiers in a ObjCMethodDecl. by Argyrios Kyrtzidis · 13 years ago
- 7df2ff4 Tweak the interface for analyzing the CF conventions for a name by John McCall · 13 years ago
- 0658879 [analyzer] Fix a bug in RetainReleaseChecker diagnostics. It gives more precise error message on the modified test case (and prevents duplicate diagnostics when we purge at block granularity). by Anna Zaks · 13 years ago
- 7e5f112 Fix a crash in MallocOverflowSecurityChecker. Patch by Lei Zhang. by Anna Zaks · 13 years ago
- d25be9f Fix comment typo. by Benjamin Kramer · 13 years ago
- b219cfc Switch assert(0/false) llvm_unreachable. by David Blaikie · 13 years ago
- 590dd8e [analyzer] Refactor PathDiagnosticLocation: Make PathDiagnosticLocation(SourceLocation...) private. Most of the effort here goes to making BugReport refer to a PathDiagnosticLocation instead of FullSourceLocation. by Anna Zaks · 13 years ago
- 4fdf97b [analyzer] Refactor: make PathDiagnosticLocation responsible for validation of SourceLocations (commit 2 of ?): by Anna Zaks · 13 years ago
- 220ac8c [analyzer] Refactor: make PathDiagnosticLocation responsible for validation of SourceLocations (commit 2 of ?): by Anna Zaks · 13 years ago
- 43f48b0 [analyzer] Refactor: Make PathDiagnosticLocation responsible for creating a valid object given an ExploadedNode (the same logic can be reused by other checkers). by Anna Zaks · 13 years ago
- e289d81 Switch LangOptions over to a .def file that describes header of the by Douglas Gregor · 13 years ago
- d77ba89 Make helpers static, remove unused variables. by Benjamin Kramer · 13 years ago
- d1e5a89 [analyzer] Remove TransferFuncs.h, then deal with the fallout. by Jordy Rose · 13 years ago
- 910c405 [analyzer] Move RetainReleaseChecker to the Checkers library and rename it to RetainCountChecker...and clean up the file while I'm at it. by Jordy Rose · 13 years ago
- 17a38e2 [analyzer] Move the knowledge of whether or not GC is enabled for the current analysis from CFRefCount to ExprEngine. by Jordy Rose · 13 years ago
- bcfd1f5 Extend the ASTContext constructor to delay the initialization of by Douglas Gregor · 13 years ago
- d56763f If size was equal to 0, either NULL or a pointer suitable to be passed to by Zhongxing Xu · 13 years ago
- 1af9d9e [analyzer] Fix varargs helper to only use POD types even for named arguments. Thanks, Joerg. by Jordy Rose · 13 years ago
- 065a405 [analyzer] MacOSKeychainAPIChecker: Simplify getSymbolForRegion by using existing API. Thanks Jordy. by Anna Zaks · 13 years ago
- 8b6eb7c Fix: Bug 10798 - [analyzer] Crash when analyzing ICU. (A slight improvement on the previous commit.) by Anna Zaks · 13 years ago
- 5c96f86 Fix bug 10797: Crash: "cast<Ty>() argument of incompatible type!" assert when analyzing ICU. by Anna Zaks · 13 years ago
- 537716a [analyzer] Change the check::RegionChanges callback to include the regions explicitly requested for invalidation. by Jordy Rose · 13 years ago
- 782f63e Handle CXXTempObjectRegion in StackAddrEscapeChecker. by Jeffrey Yasskin · 13 years ago
- eacd2b4 [analyzer] MacOSKeychainAPIChecker: Cleanup AllocationState structure. by Anna Zaks · 13 years ago
- 6b7aad9 [analyzer] MacOSKeychainAPIChecker: Add the custom BugReport visitor(which highlights the allocation site) to all the relevant reports within the checker. by Anna Zaks · 13 years ago
- 5eb7d82 [analyzer] Do not use references in std::pair. by Anna Zaks · 13 years ago
- e94cb98 [analyzer] Unbreak the release buildbot. by Anna Zaks · 13 years ago
- 9840111 [analyzer] MacOSKeychainAPIChecker: Provide reacher diagnostic trace by pointing to the allocation site when reporting a leak. by Anna Zaks · 13 years ago
- 6cf0ed0 [analyzer] MacOSKeychainAPIChecker: Add reasoning about functions which MIGHT deallocate the memory region allocated with SecKeychain APIs. Specifically, when the buffer is passed to CFStringCreateWithBytesNoCopy along with a custom deallocator, which might potentially correctly release the memory. by Anna Zaks · 13 years ago
- 31e1028 [analyzer] MacOSKeychainAPIChecker: Retrieve the memory region which we are tracking even when it's no longer a SymbolicRegion, for example, when it is cast to char*. by Anna Zaks · 13 years ago
- dd6060e Move creation of the deallocation mismatch report into a separate function for future reuse. by Anna Zaks · 13 years ago
- 7bbd166 [analyzer] MacOSKeychainAPIChecker: Users of KeyChain API often use free() to deallocate the password. Catch this error explicitly and generate the error message at the place where free() is called. by Anna Zaks · 13 years ago
- 7df1234 [analyzer] Replace calls to getNameAsString() with StringRef equivalents. by Jordy Rose · 13 years ago
- d9f5a70 Fix compile on platforms that don't implicitly include stdarg.h here. by Benjamin Kramer · 13 years ago
- e62e87b [analyzer] Move handling of hardcoded noreturn ("panic") methods from CFRefCount to NoReturnFunctionChecker. No functionality change intended. by Jordy Rose · 13 years ago
- e0e2933 Remove dead code. by Ted Kremenek · 13 years ago
- 50bbc16 Static Analyzer Diagnostics: Kill the addVisitorCreator(callbackTy, void*) API in favor of addVisitor(BugReporterVisitor*). by Anna Zaks · 13 years ago
- e172e8b Remove EnhancedBugReport and RangedBugReport - pull all the extra functionality they provided into their parent BugReport. The only functional changes are: made getRanges() non const - it adds default range to Ranges if none are supplied, made getStmt() private, which was another FIXME. by Anna Zaks · 13 years ago
- 08b8653 [analyzer] Overhaul of checker registration in preparation for basic plugin support. Removes support for checker groups (we can add them back in later if we decide they are still useful), and -analyzer-checker-help output is a little worse for the time being (no packages). by Jordy Rose · 13 years ago
- b1a1950 MacOSKeychainAPIChecker: Turn it on by default. by Anna Zaks · 13 years ago
- f0c7fe5 MacOSKeychainAPIChecker: Do not report double allocation if first allocation returned an error. by Anna Zaks · 13 years ago
- 7d458b0 MacOSKeychainAPIChecker: The security API/memory leak checker should always generate regular nodes instead of sink nodes. by Anna Zaks · 13 years ago
- 18c66fd Rename GRState to ProgramState, and cleanup some code formatting along the way. by Ted Kremenek · 13 years ago
- 67f7fa4 MacOSKeychainAPIChecker: Use llvm::SmallString instead of std::string (as per code review for r137523). by Anna Zaks · 13 years ago
- 9c378f7 Cleanup various declarations of 'Stmt*' to be 'Stmt *', etc. in libAnalyzer and libStaticAnalyzer[*]. It was highly inconsistent, and very ugly to look at. by Ted Kremenek · 13 years ago
- ca80453 [analyzer] change "tag" in ProgramPoint from "void*" to a ProgramPointTag*. by Ted Kremenek · 13 years ago
- 79c9c75 MacOSKeychainAPIChecker: If the allocated data address entered as an enclosing function parameter, skip it to avoid false positives. by Anna Zaks · 13 years ago
- 703ffb1 MacOSKeychainAPIChecker: by Anna Zaks · 13 years ago
- 096aef9 [analyzer] Nitpicks on Olaf's patch, which I meant to e-mail but then didn't in by Jordy Rose · 13 years ago
- 864d252 MacOSKeychainAPIChecker: There is no need to use SymbolMetadata to represent the allocated data symbol, we can just use the symbol corresponding to the SymbolicRegion. This simplifies tracking of the symbol, for example, SymbolMetadata needs to go through extra hoops to stay alive. by Anna Zaks · 13 years ago
- 9697934 [analyzer] Introduce new MemRegion, "TypedValueRegion", so that we can separate TypedRegions that implement getValueType() from those that don't. by Ted Kremenek · 13 years ago
- 5a58c6d KeychainAPI checker: Track SymbolMetadata instead of MemRegion in checker state so that we could clear the state on evalDeadSymbols; also track the return value. by Anna Zaks · 13 years ago
- ca0b57e KeychainAPI checker: Generate an error on double allocation. Pull out getAsPointeeMemoryRegion so that it could be reused. by Anna Zaks · 13 years ago
- 76cbb75 KeychainAPI checker: Track additional pair of SecKeychain APIs. Also, keep exploring the transition on which a call to allocator function failed (to be able to find errors in examples like ErrorCodesFromDifferentAPISDoNotInterfere). by Anna Zaks · 13 years ago
- 083fcb2 KeychainAPI checker: Refactor to make it easier to add more allocator/deallocator API pairs. Add the allocator function ID to the checker state. Better comments. by Anna Zaks · 13 years ago
- 08551b5 KeychainAPI checker: refactor to use early exit. by Anna Zaks · 13 years ago
- 03826aa KeychainAPI checker: Add basic diagnostics. Track MemoryRegion istead of SymbolicRef since the address might not be a symbolic value in some cases, for example in fooOnlyFree() test. by Anna Zaks · 13 years ago
- 0e24471 [analyzer] Remove 'all-experimental' checker group. by Ted Kremenek · 13 years ago
- 033a07e [analyzer] rename all experimental checker packages to have 'experimental' be the common root package. by Ted Kremenek · 13 years ago
- 17f7bdd [analyzer] Introduce MallocOverflowSecurityChecker, a simple flow-sensitive checker that may be useful for security auditing. This checker is currently too noisy to be on by default. by Ted Kremenek · 13 years ago
- e68b5f1 KeychainAPI checker: only check the paths on which the allocator function returned noErr. (+ minor cleanup) by Anna Zaks · 13 years ago
- f57be28 Add a skeleton for the Keychain Services API Checker. Register it as OSX experimental for now. Note, the checker still does not handle tracking of escaped values, taking into account the return value of the allocator functions, nor the actual bug reporting.. by Anna Zaks · 13 years ago
- b9a8adf Remove dead code flagged by GCC's -Wunused-but-set-variable. by Benjamin Kramer · 13 years ago
- 8829989 [analyzer] Overhaul how the static analyzer expects CFGs by forcing CFGs to be linearized only when used by the static analyzer. This required a rewrite of LiveVariables, and exposed a ton of subtle bugs. by Ted Kremenek · 13 years ago
- 217470e [analyzer] fix bug in malloc checker where the tracked symbol would not properly be removed from the state. by Ted Kremenek · 13 years ago
- 6421162 Rename getInstantiationLineNumber to getExpansionLineNumber in both by Chandler Carruth · 13 years ago
- 5f9e272 remove unneeded llvm:: namespace qualifiers on some core types now that LLVM.h imports by Chris Lattner · 13 years ago
- 4cc1187 [analyzer] Very minor cleanup in PthreadLockChecker. No functionality change. by Jordy Rose · 13 years ago
- dcb1d5d [analysis] Add checks for double-locking and lock order reversal bugs for by Jordy Rose · 13 years ago
- 0556048 [analyzer] Place checking for Core Foundation "Create" rule into a proper API. No functionality change. by Ted Kremenek · 13 years ago
- af5b043 Clean up UnixAPIChecker, including switching its array of BugTypes to llvm::OwningPtr<BugType> vars (the new convention). No functionality change. by Jordy Rose · 13 years ago
- 57964bd Clean up MacOSXAPIChecker, including switching its array of BugTypes to a single llvm::OwningPtr<BugType> (the new convention). No functionality change. by Jordy Rose · 13 years ago
- aa7333c Update for llvm commit r134291. by Eric Christopher · 13 years ago
- 03e8003 Introduce a new AST node describing reference binding to temporaries. by Douglas Gregor · 13 years ago
- 8912aae [analyzer] Finish size argument checking for strncat (and strncpy). by Jordy Rose · 13 years ago
- 8cc2491 [analyzer] Replace stream-built error message with constant string. No functionality change. by Jordy Rose · 13 years ago
- 5e5f150 [analyzer] Re-enable checking for strncpy, along with a new validation of the size argument. strncat is not yet up-to-date, but I'm leaving it enabled for now (there shouldn't be any false positives, at least...) by Jordy Rose · 13 years ago
- 9e49d9f [analyzer] Eliminate "byte string function" from CStringChecker's diagnostics, and make it easier to provide custom messages for overflow checking, in preparation for re-enabling strncpy checking. by Jordy Rose · 13 years ago
- adc42d4 [analyzer] Clean up modeling of strcmp, including cases where a string literal has an embedded null character, and where both arguments are the same buffer. Also use nested ifs rather than early returns; in this case early returns will lose any assumptions we've made earlier in the function. by Jordy Rose · 13 years ago
- ee2fde1 [analyzer] Fix trivial errors in previous commit. by Jordy Rose · 13 years ago
- 1e02241 [analyzer] Cleanup: mainly 80-char violations and preferring SValBuilder::getComparisonType() to just referencing IntTy. by Jordy Rose · 13 years ago
- f85e193 Automatic Reference Counting. by John McCall · 13 years ago
- d5af0e1 [analyzer] Revise CStringChecker's modelling of strcpy() and strcat(): by Jordy Rose · 13 years ago
- 210c05b [analyzer] If a C string length is UnknownVal, clear any existing length binding. No tests yet because the only thing that sets string length is strcpy(), and that needs some work anyway. by Jordy Rose · 13 years ago
- 467f7c8 [analyzer] CStringChecker checks functions in the C standard library, not C++. Its external name is now unix.experimental.CString. by Jordy Rose · 13 years ago
- bd32bee [analyzer] Change large if body to early return. No functionality change. by Jordy Rose · 13 years ago
- 793bff3 [analyzer] Fix modeling of strnlen to be more conservative. Move tests we can't properly model (yet?) to string-fail.c. by Jordy Rose · 13 years ago
- 7182b96 [analyzer] Change an indent-if to an early return. No functionality change. by Jordy Rose · 14 years ago
- 3f8bb2f [analyzer] Don't crash when copying an unknown number of bytes with memcpy(). Also handle all memcpy-family return values in evalCopyCommon(), rather than having some outside and some inside. by Jordy Rose · 14 years ago
- 7eb83ca [analyzer] Remove extra assignment that actually lost a few of the assumptions. by Jordy Rose · 14 years ago
- c152586 [analyzer] Fix comment for (still-disabled) evalStrncpy by Jordy Rose · 14 years ago
- 22d2717 [analyzer] Fix handling of "copy zero bytes" for memcpy and friends. by Jordy Rose · 14 years ago
- be460d8 [analyzer] __mempcpy_chk is the same as mempcpy (at least to CStringChecker) by Jordy Rose · 14 years ago
- 10620eb Modify some deleted function methods to better reflect reality: by Sean Hunt · 14 years ago
- 094ea0a Removing strncpy() checking in CString checker for now. Some significant changes need to be made to properly support modeling of it since it potentially leaves strings non-null terminated. by Lenny Maiorani · 14 years ago