From: Anna Zaks Date: Wed, 9 May 2012 17:57:16 +0000 (+0000) Subject: [analyzer]Extend the available checks list and the release notes for 264 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=30a0908aeb54ecef0eedf14b2ea62a896a9909dc;p=clang [analyzer]Extend the available checks list and the release notes for 264 git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@156488 91177308-0d34-0410-b5e6-96231b3b80d8 --- diff --git a/www/analyzer/available_checks.html b/www/analyzer/available_checks.html index 3f40d323f0..3a902a3d36 100644 --- a/www/analyzer/available_checks.html +++ b/www/analyzer/available_checks.html @@ -74,9 +74,11 @@ deadcode.DeadStoresCheck for values stored to variables that are never read afterwards. + osx.APICheck for proper uses of various Mac OS X APIs. @@ -108,6 +110,9 @@ osx.cocoa.RetainCountCheck for leaks and improper reference count management. +osx.cocoa.SelfInitCheck that 'self' is properly initialized inside an initializer method. + + osx.cocoa.UnusedIvarsWarn about private ivars that are never used. @@ -122,9 +127,52 @@ osx.coreFoundation.CFRetainReleaseCheck for null arguments to CFRetain/CFRelease. +osx.coreFoundation.containers.OutOfBoundsChecks for index out-of-bounds when using 'CFArray' API. + + +osx.coreFoundation.containers.PointerSizedValuesWarns if 'CFArray', 'CFDictionary', 'CFSet' are created with non-pointer-size values. + + +security.FloatLoopCounterWarn on using a floating point value as a loop counter (CERT: FLP30-C, FLP30-CPP). + + +security.insecureAPI.UncheckedReturnWarn on uses of functions whose return values must be always checked. + + +security.insecureAPI.getpwWarn on uses of the 'getpw' function. + + +security.insecureAPI.getsWarn on uses of the 'gets' function. + + +security.insecureAPI.mkstempWarn when 'mkstemp' is passed fewer than 6 X's in the format string. + + +security.insecureAPI.mktempWarn on uses of the 'mktemp' function. + + +security.insecureAPI.randWarn on uses of the 'rand', 'random', and related functions. + + +security.insecureAPI.strcpyWarn on uses of the 'strcpy' and 'strcat' functions. + + +security.insecureAPI.vforkWarn on uses of the 'vfork' function. + unix.APICheck calls to various UNIX/Posix functions. + +unix.MallocCheck for memory leaks, double free, and use-after-free problems. + + +unix.MallocSizeofCheck for dubious malloc arguments involving sizeof. + + +unix.cstring.BadSizeArgCheck the size argument passed into C string functions for common erroneous patterns. + + +unix.cstring.NullArgCheck for null pointers being passed as arguments to C string functions.

In addition to these the analyzer contains numerous experimental (beta) checkers.

diff --git a/www/analyzer/release_notes.html b/www/analyzer/release_notes.html index e0369df5b4..606c88ebf1 100644 --- a/www/analyzer/release_notes.html +++ b/www/analyzer/release_notes.html @@ -22,7 +22,9 @@

highlights:

This release contains a fix for a major crasher introduced in checker-264, and various refinements to -improve the precision of the analyzer in general.

+improve the precision and reduce the false positive rate of the analyzer. It also enables a new unix.MallocSizeof check, which reports +inconsistencies between the casted type of the return value of a 'malloc/calloc/realloc' call and the operand +of sizeof expressions contained within its argument(s).

checker-264