Skip to content
  1. Jul 02, 2012
    • Jordan Rose's avatar
      [analyzer] Move the last bits of CallOrObjCMessage over to CallEvent. · 7ab0182e
      Jordan Rose authored
      This involved refactoring some common pointer-escapes code onto CallEvent,
      then having MallocChecker use those callbacks for whether or not to consider
      a pointer's /ownership/ as escaping. This still needs to be pinned down, and
      probably we want to make the new argumentsMayEscape() function a little more
      discerning (content invalidation vs. ownership/metadata invalidation), but
      this is a good improvement.
      
      As a bonus, also remove CallOrObjCMessage from the source completely.
      
      llvm-svn: 159557
      7ab0182e
    • Jordan Rose's avatar
      [analyzer] Add a new abstraction over all types of calls: CallEvent · 742920c8
      Jordan Rose authored
      This is intended to replace CallOrObjCMessage, and is eventually intended to be
      used for anything that cares more about /what/ is being called than /how/ it's
      being called. For example, inlining destructors should be the same as inlining
      blocks, and checking __attribute__((nonnull)) should apply to the allocator
      calls generated by operator new.
      
      llvm-svn: 159554
      742920c8
  2. Jun 25, 2012
  3. Jun 23, 2012
  4. Jun 22, 2012
  5. Jun 21, 2012
  6. Jun 20, 2012
  7. Jun 19, 2012
  8. Jun 16, 2012
    • Jordan Rose's avatar
      [analyzer] Buffers passed to CGBitmapContextCreate can escape. · de409b6d
      Jordan Rose authored
      Specifically, although the bitmap context does not take ownership of the
      buffer (unlike CGBitmapContextCreateWithData), the data buffer can be extracted
      out of the created CGContextRef. Thus the buffer is not leaked even if its
      original pointer goes out of scope, as long as
      - the context escapes, or
      - it is retrieved via CGBitmapContextGetData and freed.
      
      Actually implementing that logic is beyond the current scope of MallocChecker,
      so for now CGBitmapContextCreate goes on our system function exception list.
      
      llvm-svn: 158579
      de409b6d
  9. Jun 07, 2012
    • Anna Zaks's avatar
      [analyzer] Anti-aliasing: different heap allocations do not alias · 3563fde6
      Anna Zaks authored
      Add a concept of symbolic memory region belonging to heap memory space.
      When comparing symbolic regions allocated on the heap, assume that they
      do not alias. 
      
      Use symbolic heap region to suppress a common false positive pattern in
      the malloc checker, in code that relies on malloc not returning the
      memory aliased to other malloc allocations, stack.
      
      llvm-svn: 158136
      3563fde6
  10. Jun 02, 2012
  11. May 19, 2012
  12. May 18, 2012
  13. May 10, 2012
  14. May 04, 2012
  15. May 02, 2012
  16. Apr 11, 2012
  17. Mar 30, 2012
  18. Mar 26, 2012
  19. Mar 24, 2012
  20. Mar 22, 2012
  21. Mar 21, 2012
    • Benjamin Kramer's avatar
      Remove unused variable, fix indentation. · c25c5e0b
      Benjamin Kramer authored
      llvm-svn: 153220
      c25c5e0b
    • Anna Zaks's avatar
      [analyzer] Malloc: Utter the name of the leaked variable. · fc2e1534
      Anna Zaks authored
      Specifically, we use the last store of the leaked symbol in the leak diagnostic.
      (No support for struct fields since the malloc checker doesn't track those
      yet.)
      
      + Infrastructure to track the regions used in store evaluations.
      This approach is more precise than iterating the store to
      obtain the region bound to the symbol, which is used in RetainCount
      checker. The region corresponds to what is uttered in the code in the
      last store and we do not rely on the store implementation to support
      this functionality.
      
      llvm-svn: 153212
      fc2e1534
  22. Mar 18, 2012
    • Jordy Rose's avatar
      [analyzer] Mark a failed-realloc's result as an interesting symbol between the... · bf38f20e
      Jordy Rose authored
      [analyzer] Mark a failed-realloc's result as an interesting symbol between the realloc call and the null check, so we get nicer path notes. Fixes a regression introduced by the diagnostic pruning added in r152361.
      
      This is accomplished by calling markInteresting /during/ path diagnostic generation, and as such relies on deterministic ordering of BugReporterVisitors -- namely, that BugReporterVisitors are run in /reverse/ order from how they are added. (Right now that's a consequence of storing visitors in an ImmutableList, where new items are added to the front.) It's a little hacky, but it works for now.
      
      I think this is the best we can do without storing the relation between the old and new symbols, and that would be a hit whether or not there ends up being an error.
      
      llvm-svn: 153010
      bf38f20e
  23. Mar 17, 2012
    • Anna Zaks's avatar
      [analyzer] Shorten the stack hint diagnostic. · a7f457a5
      Anna Zaks authored
      Do not display the standard "Returning from 'foo'", when a stack hint is
      available.
      
      llvm-svn: 152964
      a7f457a5
    • Anna Zaks's avatar
      [analyzer] Create symbol-aware stack hints (building upon r152837). · cba4f298
      Anna Zaks authored
      The symbol-aware stack hint combines the checker-provided message
      with the information about how the symbol was passed to the callee: as
      a parameter or a return value.
      
      For malloc, the generated messages look like this :
      "Returning from 'foo'; released memory via 1st parameter"
      "Returning from 'foo'; allocated memory via 1st parameter"
      "Returning from 'foo'; allocated memory returned"
      "Returning from 'foo'; reallocation of 1st parameter failed"
      
      
      (We are yet to handle cases when the symbol is a field in a struct or
      an array element.)
      
      llvm-svn: 152962
      cba4f298
  24. Mar 15, 2012
    • Anna Zaks's avatar
      [analyzer] Allow checkers to supply call stack diagnostic hints for the · 1ff57d57
      Anna Zaks authored
      BugVisitor DiagnosticPieces.
      
      When checkers create a DiagnosticPieceEvent, they can supply an extra
      string, which will be concatenated with the call exit message for every
      call on the stack between the diagnostic event and the final bug report.
      (This is a simple version, which could be/will be further enhanced.)
      
      For example, this is used in Malloc checker to produce the ",
      which allocated memory" in the following example:
      
      static char *malloc_wrapper() { // 2. Entered call from 'use'
          return malloc(12);    // 3. Memory is allocated
      }
      
      void use() {
          char *v;
          v = malloc_wrapper(); // 1. Calling 'malloc_wrappers'
              // 4. Returning from 'malloc_wrapper', which allocated memory
      }                         // 5. Memory is never released; potential
      memory leak
      
      llvm-svn: 152837
      1ff57d57
  25. Mar 09, 2012
    • Ted Kremenek's avatar
      [analyzer] Implement basic path diagnostic pruning based on "interesting" symbols and regions. · 1e809b4c
      Ted Kremenek authored
      Essentially, a bug centers around a story for various symbols and regions.  We should only include
      the path diagnostic events that relate to those symbols and regions.
      
      The pruning is done by associating a set of interesting symbols and regions with a BugReporter, which
      can be modified at BugReport creation or by BugReporterVisitors.
      
      This patch reduces the diagnostics emitted in several of our test cases.  I've vetted these as
      having desired behavior.  The only regression is a missing null check diagnostic for the return
      value of realloc() in test/Analysis/malloc-plist.c.  This will require some investigation to fix,
      and I have added a FIXME to the test case.
      
      llvm-svn: 152361
      1e809b4c
  26. Mar 06, 2012
  27. Mar 05, 2012
  28. Mar 01, 2012
  29. Feb 29, 2012
    • Anna Zaks's avatar
      [analyzer] Malloc: A pointer might escape through CFContainers APIs, · e0c03cab
      Anna Zaks authored
      funopen, setvbuf.
      
      Teach the checker and the engine about these APIs to resolve malloc
      false positives. As I am adding more of these APIs, it is clear that all
      this should be factored out into a separate callback (for example,
      region escapes). Malloc, KeyChainAPI and RetainRelease checkers could
      all use it.
      
      llvm-svn: 151737
      e0c03cab
  30. Feb 28, 2012
  31. Feb 25, 2012
    • Anna Zaks's avatar
      [analyzer] Malloc: reason about the ObjC messages and C++. · 7ac344a4
      Anna Zaks authored
      Assume none of the ObjC messages defined in system headers free memory,
      except for the ones containing 'freeWhenDone' selector. Currently, just
      assume that the region escapes to the messages with 'freeWhenDone'
      (ideally, we want to treat it as 'free()').
      
      For now, always assume that regions escape when passed to C++ methods.
      
      llvm-svn: 151410
      7ac344a4
  32. Feb 23, 2012
Loading