1. 5d0ea6d [analyzer] Removing references to CheckerContext::getNodeBuilder(): checkers can obtain block count directly from the Context. by Anna Zaks · 13 years ago
  2. 8ba7214 [analyzer] Remove unused methods, add comments to others. by Anna Zaks · 13 years ago
  3. 3381a73 [analyzer] Remove redundant state (AnalysisContext pointer for every BinaryOperator tracked) from IdempotentOperationChecker. by Anna Zaks · 13 years ago
  4. 1e9775d [analyzer] In UndefBranchChecker, use a node generator which does not create an edge/branching. (ExprEngine should be in charge of generating edges. The checkers should examine the condition and generate PostCondition node if needed.) by Anna Zaks · 13 years ago
  5. 9c81bc2 [analyzer] Cleanup in UndefBranchChecker: by Anna Zaks · 13 years ago
  6. 491306a Allow getting all source locations of selector identifiers in a ObjCMethodDecl. by Argyrios Kyrtzidis · 13 years ago
  7. 7df2ff4 Tweak the interface for analyzing the CF conventions for a name by John McCall · 13 years ago
  8. 0658879 [analyzer] Fix a bug in RetainReleaseChecker diagnostics. It gives more precise error message on the modified test case (and prevents duplicate diagnostics when we purge at block granularity). by Anna Zaks · 13 years ago
  9. 7e5f112 Fix a crash in MallocOverflowSecurityChecker. Patch by Lei Zhang. by Anna Zaks · 13 years ago
  10. d25be9f Fix comment typo. by Benjamin Kramer · 13 years ago
  11. b219cfc Switch assert(0/false) llvm_unreachable. by David Blaikie · 13 years ago
  12. 590dd8e [analyzer] Refactor PathDiagnosticLocation: Make PathDiagnosticLocation(SourceLocation...) private. Most of the effort here goes to making BugReport refer to a PathDiagnosticLocation instead of FullSourceLocation. by Anna Zaks · 13 years ago
  13. 4fdf97b [analyzer] Refactor: make PathDiagnosticLocation responsible for validation of SourceLocations (commit 2 of ?): by Anna Zaks · 13 years ago
  14. 220ac8c [analyzer] Refactor: make PathDiagnosticLocation responsible for validation of SourceLocations (commit 2 of ?): by Anna Zaks · 13 years ago
  15. 43f48b0 [analyzer] Refactor: Make PathDiagnosticLocation responsible for creating a valid object given an ExploadedNode (the same logic can be reused by other checkers). by Anna Zaks · 13 years ago
  16. e289d81 Switch LangOptions over to a .def file that describes header of the by Douglas Gregor · 13 years ago
  17. d77ba89 Make helpers static, remove unused variables. by Benjamin Kramer · 13 years ago
  18. d1e5a89 [analyzer] Remove TransferFuncs.h, then deal with the fallout. by Jordy Rose · 13 years ago
  19. 910c405 [analyzer] Move RetainReleaseChecker to the Checkers library and rename it to RetainCountChecker...and clean up the file while I'm at it. by Jordy Rose · 13 years ago
  20. 17a38e2 [analyzer] Move the knowledge of whether or not GC is enabled for the current analysis from CFRefCount to ExprEngine. by Jordy Rose · 13 years ago
  21. bcfd1f5 Extend the ASTContext constructor to delay the initialization of by Douglas Gregor · 13 years ago
  22. d56763f If size was equal to 0, either NULL or a pointer suitable to be passed to by Zhongxing Xu · 13 years ago
  23. 1af9d9e [analyzer] Fix varargs helper to only use POD types even for named arguments. Thanks, Joerg. by Jordy Rose · 13 years ago
  24. 065a405 [analyzer] MacOSKeychainAPIChecker: Simplify getSymbolForRegion by using existing API. Thanks Jordy. by Anna Zaks · 13 years ago
  25. 8b6eb7c Fix: Bug 10798 - [analyzer] Crash when analyzing ICU. (A slight improvement on the previous commit.) by Anna Zaks · 13 years ago
  26. 5c96f86 Fix bug 10797: Crash: "cast<Ty>() argument of incompatible type!" assert when analyzing ICU. by Anna Zaks · 13 years ago
  27. 537716a [analyzer] Change the check::RegionChanges callback to include the regions explicitly requested for invalidation. by Jordy Rose · 13 years ago
  28. 782f63e Handle CXXTempObjectRegion in StackAddrEscapeChecker. by Jeffrey Yasskin · 13 years ago
  29. eacd2b4 [analyzer] MacOSKeychainAPIChecker: Cleanup AllocationState structure. by Anna Zaks · 13 years ago
  30. 6b7aad9 [analyzer] MacOSKeychainAPIChecker: Add the custom BugReport visitor(which highlights the allocation site) to all the relevant reports within the checker. by Anna Zaks · 13 years ago
  31. 5eb7d82 [analyzer] Do not use references in std::pair. by Anna Zaks · 13 years ago
  32. e94cb98 [analyzer] Unbreak the release buildbot. by Anna Zaks · 13 years ago
  33. 9840111 [analyzer] MacOSKeychainAPIChecker: Provide reacher diagnostic trace by pointing to the allocation site when reporting a leak. by Anna Zaks · 13 years ago
  34. 6cf0ed0 [analyzer] MacOSKeychainAPIChecker: Add reasoning about functions which MIGHT deallocate the memory region allocated with SecKeychain APIs. Specifically, when the buffer is passed to CFStringCreateWithBytesNoCopy along with a custom deallocator, which might potentially correctly release the memory. by Anna Zaks · 13 years ago
  35. 31e1028 [analyzer] MacOSKeychainAPIChecker: Retrieve the memory region which we are tracking even when it's no longer a SymbolicRegion, for example, when it is cast to char*. by Anna Zaks · 13 years ago
  36. dd6060e Move creation of the deallocation mismatch report into a separate function for future reuse. by Anna Zaks · 13 years ago
  37. 7bbd166 [analyzer] MacOSKeychainAPIChecker: Users of KeyChain API often use free() to deallocate the password. Catch this error explicitly and generate the error message at the place where free() is called. by Anna Zaks · 13 years ago
  38. 7df1234 [analyzer] Replace calls to getNameAsString() with StringRef equivalents. by Jordy Rose · 13 years ago
  39. d9f5a70 Fix compile on platforms that don't implicitly include stdarg.h here. by Benjamin Kramer · 13 years ago
  40. e62e87b [analyzer] Move handling of hardcoded noreturn ("panic") methods from CFRefCount to NoReturnFunctionChecker. No functionality change intended. by Jordy Rose · 13 years ago
  41. e0e2933 Remove dead code. by Ted Kremenek · 13 years ago
  42. 50bbc16 Static Analyzer Diagnostics: Kill the addVisitorCreator(callbackTy, void*) API in favor of addVisitor(BugReporterVisitor*). by Anna Zaks · 13 years ago
  43. e172e8b Remove EnhancedBugReport and RangedBugReport - pull all the extra functionality they provided into their parent BugReport. The only functional changes are: made getRanges() non const - it adds default range to Ranges if none are supplied, made getStmt() private, which was another FIXME. by Anna Zaks · 13 years ago
  44. 08b8653 [analyzer] Overhaul of checker registration in preparation for basic plugin support. Removes support for checker groups (we can add them back in later if we decide they are still useful), and -analyzer-checker-help output is a little worse for the time being (no packages). by Jordy Rose · 13 years ago
  45. b1a1950 MacOSKeychainAPIChecker: Turn it on by default. by Anna Zaks · 13 years ago
  46. f0c7fe5 MacOSKeychainAPIChecker: Do not report double allocation if first allocation returned an error. by Anna Zaks · 13 years ago
  47. 7d458b0 MacOSKeychainAPIChecker: The security API/memory leak checker should always generate regular nodes instead of sink nodes. by Anna Zaks · 13 years ago
  48. 18c66fd Rename GRState to ProgramState, and cleanup some code formatting along the way. by Ted Kremenek · 13 years ago
  49. 67f7fa4 MacOSKeychainAPIChecker: Use llvm::SmallString instead of std::string (as per code review for r137523). by Anna Zaks · 13 years ago
  50. 9c378f7 Cleanup various declarations of 'Stmt*' to be 'Stmt *', etc. in libAnalyzer and libStaticAnalyzer[*]. It was highly inconsistent, and very ugly to look at. by Ted Kremenek · 13 years ago
  51. ca80453 [analyzer] change "tag" in ProgramPoint from "void*" to a ProgramPointTag*. by Ted Kremenek · 13 years ago
  52. 79c9c75 MacOSKeychainAPIChecker: If the allocated data address entered as an enclosing function parameter, skip it to avoid false positives. by Anna Zaks · 13 years ago
  53. 703ffb1 MacOSKeychainAPIChecker: by Anna Zaks · 13 years ago
  54. 096aef9 [analyzer] Nitpicks on Olaf's patch, which I meant to e-mail but then didn't in by Jordy Rose · 13 years ago
  55. 864d252 MacOSKeychainAPIChecker: There is no need to use SymbolMetadata to represent the allocated data symbol, we can just use the symbol corresponding to the SymbolicRegion. This simplifies tracking of the symbol, for example, SymbolMetadata needs to go through extra hoops to stay alive. by Anna Zaks · 13 years ago
  56. 9697934 [analyzer] Introduce new MemRegion, "TypedValueRegion", so that we can separate TypedRegions that implement getValueType() from those that don't. by Ted Kremenek · 13 years ago
  57. 5a58c6d KeychainAPI checker: Track SymbolMetadata instead of MemRegion in checker state so that we could clear the state on evalDeadSymbols; also track the return value. by Anna Zaks · 13 years ago
  58. ca0b57e KeychainAPI checker: Generate an error on double allocation. Pull out getAsPointeeMemoryRegion so that it could be reused. by Anna Zaks · 13 years ago
  59. 76cbb75 KeychainAPI checker: Track additional pair of SecKeychain APIs. Also, keep exploring the transition on which a call to allocator function failed (to be able to find errors in examples like ErrorCodesFromDifferentAPISDoNotInterfere). by Anna Zaks · 13 years ago
  60. 083fcb2 KeychainAPI checker: Refactor to make it easier to add more allocator/deallocator API pairs. Add the allocator function ID to the checker state. Better comments. by Anna Zaks · 13 years ago
  61. 08551b5 KeychainAPI checker: refactor to use early exit. by Anna Zaks · 13 years ago
  62. 03826aa KeychainAPI checker: Add basic diagnostics. Track MemoryRegion istead of SymbolicRef since the address might not be a symbolic value in some cases, for example in fooOnlyFree() test. by Anna Zaks · 13 years ago
  63. 0e24471 [analyzer] Remove 'all-experimental' checker group. by Ted Kremenek · 13 years ago
  64. 033a07e [analyzer] rename all experimental checker packages to have 'experimental' be the common root package. by Ted Kremenek · 13 years ago
  65. 17f7bdd [analyzer] Introduce MallocOverflowSecurityChecker, a simple flow-sensitive checker that may be useful for security auditing. This checker is currently too noisy to be on by default. by Ted Kremenek · 13 years ago
  66. e68b5f1 KeychainAPI checker: only check the paths on which the allocator function returned noErr. (+ minor cleanup) by Anna Zaks · 13 years ago
  67. f57be28 Add a skeleton for the Keychain Services API Checker. Register it as OSX experimental for now. Note, the checker still does not handle tracking of escaped values, taking into account the return value of the allocator functions, nor the actual bug reporting.. by Anna Zaks · 13 years ago
  68. b9a8adf Remove dead code flagged by GCC's -Wunused-but-set-variable. by Benjamin Kramer · 13 years ago
  69. 8829989 [analyzer] Overhaul how the static analyzer expects CFGs by forcing CFGs to be linearized only when used by the static analyzer. This required a rewrite of LiveVariables, and exposed a ton of subtle bugs. by Ted Kremenek · 13 years ago
  70. 217470e [analyzer] fix bug in malloc checker where the tracked symbol would not properly be removed from the state. by Ted Kremenek · 13 years ago
  71. 6421162 Rename getInstantiationLineNumber to getExpansionLineNumber in both by Chandler Carruth · 13 years ago
  72. 5f9e272 remove unneeded llvm:: namespace qualifiers on some core types now that LLVM.h imports by Chris Lattner · 13 years ago
  73. 4cc1187 [analyzer] Very minor cleanup in PthreadLockChecker. No functionality change. by Jordy Rose · 13 years ago
  74. dcb1d5d [analysis] Add checks for double-locking and lock order reversal bugs for by Jordy Rose · 13 years ago
  75. 0556048 [analyzer] Place checking for Core Foundation "Create" rule into a proper API. No functionality change. by Ted Kremenek · 13 years ago
  76. af5b043 Clean up UnixAPIChecker, including switching its array of BugTypes to llvm::OwningPtr<BugType> vars (the new convention). No functionality change. by Jordy Rose · 13 years ago
  77. 57964bd Clean up MacOSXAPIChecker, including switching its array of BugTypes to a single llvm::OwningPtr<BugType> (the new convention). No functionality change. by Jordy Rose · 13 years ago
  78. aa7333c Update for llvm commit r134291. by Eric Christopher · 13 years ago
  79. 03e8003 Introduce a new AST node describing reference binding to temporaries. by Douglas Gregor · 13 years ago
  80. 8912aae [analyzer] Finish size argument checking for strncat (and strncpy). by Jordy Rose · 13 years ago
  81. 8cc2491 [analyzer] Replace stream-built error message with constant string. No functionality change. by Jordy Rose · 13 years ago
  82. 5e5f150 [analyzer] Re-enable checking for strncpy, along with a new validation of the size argument. strncat is not yet up-to-date, but I'm leaving it enabled for now (there shouldn't be any false positives, at least...) by Jordy Rose · 13 years ago
  83. 9e49d9f [analyzer] Eliminate "byte string function" from CStringChecker's diagnostics, and make it easier to provide custom messages for overflow checking, in preparation for re-enabling strncpy checking. by Jordy Rose · 13 years ago
  84. adc42d4 [analyzer] Clean up modeling of strcmp, including cases where a string literal has an embedded null character, and where both arguments are the same buffer. Also use nested ifs rather than early returns; in this case early returns will lose any assumptions we've made earlier in the function. by Jordy Rose · 13 years ago
  85. ee2fde1 [analyzer] Fix trivial errors in previous commit. by Jordy Rose · 13 years ago
  86. 1e02241 [analyzer] Cleanup: mainly 80-char violations and preferring SValBuilder::getComparisonType() to just referencing IntTy. by Jordy Rose · 13 years ago
  87. f85e193 Automatic Reference Counting. by John McCall · 13 years ago
  88. d5af0e1 [analyzer] Revise CStringChecker's modelling of strcpy() and strcat(): by Jordy Rose · 13 years ago
  89. 210c05b [analyzer] If a C string length is UnknownVal, clear any existing length binding. No tests yet because the only thing that sets string length is strcpy(), and that needs some work anyway. by Jordy Rose · 13 years ago
  90. 467f7c8 [analyzer] CStringChecker checks functions in the C standard library, not C++. Its external name is now unix.experimental.CString. by Jordy Rose · 13 years ago
  91. bd32bee [analyzer] Change large if body to early return. No functionality change. by Jordy Rose · 13 years ago
  92. 793bff3 [analyzer] Fix modeling of strnlen to be more conservative. Move tests we can't properly model (yet?) to string-fail.c. by Jordy Rose · 13 years ago
  93. 7182b96 [analyzer] Change an indent-if to an early return. No functionality change. by Jordy Rose · 14 years ago
  94. 3f8bb2f [analyzer] Don't crash when copying an unknown number of bytes with memcpy(). Also handle all memcpy-family return values in evalCopyCommon(), rather than having some outside and some inside. by Jordy Rose · 14 years ago
  95. 7eb83ca [analyzer] Remove extra assignment that actually lost a few of the assumptions. by Jordy Rose · 14 years ago
  96. c152586 [analyzer] Fix comment for (still-disabled) evalStrncpy by Jordy Rose · 14 years ago
  97. 22d2717 [analyzer] Fix handling of "copy zero bytes" for memcpy and friends. by Jordy Rose · 14 years ago
  98. be460d8 [analyzer] __mempcpy_chk is the same as mempcpy (at least to CStringChecker) by Jordy Rose · 14 years ago
  99. 10620eb Modify some deleted function methods to better reflect reality: by Sean Hunt · 14 years ago
  100. 094ea0a Removing strncpy() checking in CString checker for now. Some significant changes need to be made to properly support modeling of it since it potentially leaves strings non-null terminated. by Lenny Maiorani · 14 years ago