balazske wrote:
The two patches (#149106 and this) are a different solution for the problem. I
started the other because it looks more difficult to make this checker work if
memory invalidations happen, probably many cases should be handled to maintain
the checker internal data. The other solu
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/149106
From ba535f818b36e5ab758b4148e46816e8f3ee6550 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 2 Jul 2025 11:09:58 +0200
Subject: [PATCH 1/2] [clang][analyzer] Improve checker
'uni
balazske wrote:
> Do we have tests that cover these additions already?
This PR is not relevant any more. The code was committed in a different PR
#138838 . (Probably tests are not perfect.)
https://github.com/llvm/llvm-project/pull/138845
___
cfe-com
https://github.com/balazske created
https://github.com/llvm/llvm-project/pull/149106
Check for non-presence of terminating zero in simple cases.
From ba535f818b36e5ab758b4148e46816e8f3ee6550 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 2 Jul 2025 11:09:58 +0200
@@ -1022,6 +1022,23 @@ getStackOrCaptureRegionForDeclContext(const
LocationContext *LC,
return (const StackFrameContext *)nullptr;
}
+static bool isStdStreamVar(const VarDecl *D) {
balazske wrote:
The current code should filter this out. Still it is not su
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/147766
From f8dc303029c68762cdbd19b217730192d26f6fca Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 9 Jul 2025 16:55:07 +0200
Subject: [PATCH 1/4] [clang][analyzer] Add C standard stream
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/147766
From f8dc303029c68762cdbd19b217730192d26f6fca Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 9 Jul 2025 16:55:07 +0200
Subject: [PATCH 1/3] [clang][analyzer] Add C standard stream
@@ -519,14 +519,53 @@ void reopen_std_stream(void) {
if (!fp) return;
stdout = fp; // Let's make them alias.
- clang_analyzer_eval(fp == oldStdout); // expected-warning {{UNKNOWN}}
- clang_analyzer_eval(fp == stdout);// expected-warning {{TRUE}}
no-FALSE
-
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/147766
From f8dc303029c68762cdbd19b217730192d26f6fca Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 9 Jul 2025 16:55:07 +0200
Subject: [PATCH 1/2] [clang][analyzer] Add C standard stream
https://github.com/balazske closed
https://github.com/llvm/llvm-project/pull/138845
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
https://github.com/balazske closed
https://github.com/llvm/llvm-project/pull/140913
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
https://github.com/balazske created
https://github.com/llvm/llvm-project/pull/147766
If variables `stdin`, `stdout`, `stderr` are added to the system memory space,
they are invalidated at any call to system (or C library) functions. These
variables are not expected to be changed by system func
@@ -0,0 +1,295 @@
+//=== MissingTerminatingZeroChecker.cpp -*- C++
-*-===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Ap
@@ -2098,6 +2098,58 @@ Check the size argument passed into C string functions
for common erroneous patt
// warn: potential buffer overflow
}
+.. _unix-cstring-MissingTerminatingZero:
+
+unix.cstring.MissingTerminatingZero (C)
+"""
+Ch
@@ -0,0 +1,295 @@
+//=== MissingTerminatingZeroChecker.cpp -*- C++
-*-===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Ap
@@ -0,0 +1,295 @@
+//=== MissingTerminatingZeroChecker.cpp -*- C++
-*-===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Ap
https://github.com/balazske converted_to_draft
https://github.com/llvm/llvm-project/pull/146664
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
balazske wrote:
Pointer escape and region changes are not handled yet.
https://github.com/llvm/llvm-project/pull/146664
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
https://github.com/balazske created
https://github.com/llvm/llvm-project/pull/146664
A new checker for checking if terminating zero is missing from a string. There
is an existing `unix.cstring.NotNullTerminated` checker that looks similar but
checks just if a non-string like object is passed t
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/136823
From 4ce7497bb0dc89de3b9f139177c295291e7d3e9c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 17 Apr 2025 17:36:03 +0200
Subject: [PATCH 1/6] [clang-tidy] Add check
'bugprone-inva
https://github.com/balazske approved this pull request.
I think we can put in this change. I tested it on some projects, the number of
crashes got less after this change (it is possible that new ones appeared but
the total count was less).
https://github.com/llvm/llvm-project/pull/138838
_
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/140086
From 65d44a4eb9621e49a96f1ac43e5a1bbd6691dc13 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 15 May 2025 17:41:16 +0200
Subject: [PATCH 1/9] [clang-tidy] Added check
'bugprone-fu
@@ -1039,6 +1058,177 @@ Expected
ASTNodeImporter::import(ConceptReference *From) {
return ConceptRef;
}
+StringRef ASTNodeImporter::ImportASTStringRef(StringRef FromStr) {
balazske wrote:
Probably an explanation can be added about use of this function. A `
balazske wrote:
If `FromTypeRequirement.isSubstitutionFailure()` can be true at compile error
it can be still possible to call `testImport` or `getTuDecl` with the code.
https://github.com/llvm/llvm-project/pull/138838
___
cfe-commits mailing list
cfe
balazske wrote:
> Newly added VisitSubstNonTypeTemplateParmPackExpr, VisitPseudoObjectExpr,
> VisitCXXParenListInitExpr are also without tests.
> I've faced them on my project, and looks like it is not because of newly
> implemented concepts imports. But I'm not sure. Should I move 'em to separ
https://github.com/balazske edited
https://github.com/llvm/llvm-project/pull/138838
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
@@ -7359,6 +7549,150 @@ ExpectedStmt ASTNodeImporter::VisitExpr(Expr *E) {
return make_error(ASTImportError::UnsupportedConstruct);
}
+ExpectedStmt ASTNodeImporter::VisitRequiresExpr(RequiresExpr* E) {
+ Error Err = Error::success();
+ auto RequiresKWLoc = importChecked(Er
@@ -1363,6 +1364,26 @@ extern const internal::VariadicDynCastAllOfMatcher
extern const internal::VariadicDynCastAllOfMatcher
conceptDecl;
+/// Matches concept requirement.
+///
+/// Example matches requirement expression
balazske wrote:
It is better to te
@@ -7359,6 +7549,150 @@ ExpectedStmt ASTNodeImporter::VisitExpr(Expr *E) {
return make_error(ASTImportError::UnsupportedConstruct);
}
+ExpectedStmt ASTNodeImporter::VisitRequiresExpr(RequiresExpr* E) {
+ Error Err = Error::success();
+ auto RequiresKWLoc = importChecked(Er
@@ -1363,6 +1364,26 @@ extern const internal::VariadicDynCastAllOfMatcher
extern const internal::VariadicDynCastAllOfMatcher
conceptDecl;
+/// Matches concept requirement.
+///
+/// Example matches requirement expression
+/// \code
+/// template
+/// concept dereferenc
@@ -28,6 +28,7 @@
# Nested build directory
/build*
+/debug*
balazske wrote:
Is this change needed?
https://github.com/llvm/llvm-project/pull/138838
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://li
@@ -1609,6 +1609,12 @@ static bool
IsStructurallyEquivalent(StructuralEquivalenceContext &Context,
static bool IsStructurallyEquivalent(StructuralEquivalenceContext &Context,
CXXMethodDecl *Method1,
CXXM
@@ -7359,6 +7549,150 @@ ExpectedStmt ASTNodeImporter::VisitExpr(Expr *E) {
return make_error(ASTImportError::UnsupportedConstruct);
}
+ExpectedStmt ASTNodeImporter::VisitRequiresExpr(RequiresExpr* E) {
+ Error Err = Error::success();
+ auto RequiresKWLoc = importChecked(Er
https://github.com/balazske commented:
Code looks almost acceptable. I could not verify if the tests are sufficient (I
am not familiar with this new syntax). Can you test this on large projects that
use these types of expressions?
https://github.com/llvm/llvm-project/pull/138838
__
balazske wrote:
After change #141104 it is possible to compile and link the code without
problems.
There are some things to fix in this patch (with naming and formatting rules
and code correctness), I would like better if the code would look like in PR
#138845. Additionally tests are needed fo
@@ -7379,8 +7650,8 @@ ExpectedStmt ASTNodeImporter::VisitVAArgExpr(VAArgExpr
*E) {
Error Err = Error::success();
auto ToBuiltinLoc = importChecked(Err, E->getBuiltinLoc());
- auto ToSubExpr = importChecked(Err, E->getSubExpr());
- auto ToWrittenTypeInfo = importChecked(
@@ -1063,6 +1100,146 @@ Expected ASTNodeImporter::import(const
LambdaCapture &From) {
EllipsisLoc);
}
+template<>
+Expected
ASTNodeImporter::import(concepts::Requirement* FromRequire) {
+ auto ImportStringRef = [this](const StringRef& FromString) {
+ char* ToDiag
@@ -7359,6 +7536,100 @@ ExpectedStmt ASTNodeImporter::VisitExpr(Expr *E) {
return make_error(ASTImportError::UnsupportedConstruct);
}
+ExpectedStmt ASTNodeImporter::VisitRequiresExpr(RequiresExpr* E) {
+ Error Err = Error::success();
+ // auto ToType = importChecked(Err, E
@@ -735,6 +740,38 @@ namespace clang {
// that type is declared inside the body of the function.
// E.g. auto f() { struct X{}; return X(); }
bool hasReturnTypeDeclaredInside(FunctionDecl *D);
+
+Expected FillConstraintSatisfaction(const
ASTConstraintSatisf
https://github.com/balazske requested changes to this pull request.
https://github.com/llvm/llvm-project/pull/138838
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/140086
From 65d44a4eb9621e49a96f1ac43e5a1bbd6691dc13 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 15 May 2025 17:41:16 +0200
Subject: [PATCH 1/8] [clang-tidy] Added check
'bugprone-fu
balazske wrote:
> > In my opinion, it should not be bugprone because I don't find any potential
> > bug in this code style. Maybe it more like a readability issue? @PiotrZSL
> > @EugeneZelenko what do you think?
>
> Sorry, I don't have strong opinion on this matter.
I think the "misc" module
@@ -0,0 +1,136 @@
+//===--- FunctionVisibilityChangeCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Ap
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/140086
From 65d44a4eb9621e49a96f1ac43e5a1bbd6691dc13 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 15 May 2025 17:41:16 +0200
Subject: [PATCH 1/6] [clang-tidy] Added check
'bugprone-fu
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/140086
From 65d44a4eb9621e49a96f1ac43e5a1bbd6691dc13 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 15 May 2025 17:41:16 +0200
Subject: [PATCH 1/5] [clang-tidy] Added check
'bugprone-fu
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/136823
From 4ce7497bb0dc89de3b9f139177c295291e7d3e9c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 17 Apr 2025 17:36:03 +0200
Subject: [PATCH 1/5] [clang-tidy] Add check
'bugprone-inva
balazske wrote:
The check can now warn for (default) initializations that are recursively
inside a type structure (members of structs, elements of arrays). In these
cases it can look difficult to find the member or place where the value with
enum type exists. The check now only makes a single
@@ -0,0 +1,112 @@
+//===--- InvalidEnumDefaultInitializationCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Ap
balazske wrote:
After #141104 clang should be buildable with dynamic linking too with this
change included. Only tests should be added for the new node types, but I can
do it only later.
https://github.com/llvm/llvm-project/pull/138845
___
cfe-commit
https://github.com/balazske closed
https://github.com/llvm/llvm-project/pull/141076
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
https://github.com/balazske edited
https://github.com/llvm/llvm-project/pull/141076
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
@@ -105,9 +105,6 @@ void errno_getcwd(char *Buf, size_t Sz) {
clang_analyzer_eval(errno != 0); // expected-warning{{TRUE}}
clang_analyzer_eval(Path == NULL); // expected-warning{{TRUE}}
if (errno) {} // no warning
- } else if (Path == NULL) {
https://github.com/balazske created
https://github.com/llvm/llvm-project/pull/141076
Add extra branches for the case when the buffer argument is NULL.
From a82a775585ea473d6c29457b260848436071d0ff Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 22 May 2025 16:41:4
balazske wrote:
> > The problem was that nodes like `concepts::TypeRequirement` have
> > constructors (and probably other related functions) defined in
> > SemaConcepts.cpp. These can not be linked to the AST library, but are
> > needed in `ASTImporter` for the new import functions.
>
> Can y
balazske wrote:
This change can help to fix issue #129393 .
https://github.com/llvm/llvm-project/pull/140913
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
https://github.com/balazske created
https://github.com/llvm/llvm-project/pull/140913
It became necessary to add `Sema` as dependency of `ASTImporter`.
This is needed to implement import of concept related nodes.
`Sema` can not be a dependency of `AST`, but this split of
`ASTImporter` makes it po
balazske wrote:
I have renamed the check, if OK the class name will be changed too (in a new
commit).
https://github.com/llvm/llvm-project/pull/140086
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listi
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/140086
From 65d44a4eb9621e49a96f1ac43e5a1bbd6691dc13 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 15 May 2025 17:41:16 +0200
Subject: [PATCH 1/3] [clang-tidy] Added check
'bugprone-fu
@@ -105,9 +105,6 @@ void errno_getcwd(char *Buf, size_t Sz) {
clang_analyzer_eval(errno != 0); // expected-warning{{TRUE}}
clang_analyzer_eval(Path == NULL); // expected-warning{{TRUE}}
if (errno) {} // no warning
- } else if (Path == NULL) {
balazske wrote:
The current code is not finished. I want to check for false positives and
probably add options to disable check at destructors and operators.
https://github.com/llvm/llvm-project/pull/140086
___
cfe-commits mailing list
cfe-commits@lis
@@ -0,0 +1,74 @@
+//===--- FunctionVisibilityChangeCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apa
@@ -0,0 +1,74 @@
+//===--- FunctionVisibilityChangeCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apa
@@ -0,0 +1,74 @@
+//===--- FunctionVisibilityChangeCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apa
@@ -0,0 +1,74 @@
+//===--- FunctionVisibilityChangeCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apa
@@ -0,0 +1,74 @@
+//===--- FunctionVisibilityChangeCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apa
@@ -0,0 +1,43 @@
+.. title:: clang-tidy - bugprone-function-visibility-change
+
+bugprone-function-visibility-change
+===
+
+Check changes in visibility of C++ member functions in subclasses. The check
balazske wrote:
fixed
https:
@@ -124,6 +124,11 @@ New checks
pointer and store it as class members without handle the copy and move
constructors and the assignments.
+- New :doc:`bugprone-function-visibility-change
+ ` check.
+
+ Check function visibility changes in subclasses.
bala
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/140086
From 65d44a4eb9621e49a96f1ac43e5a1bbd6691dc13 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 15 May 2025 17:41:16 +0200
Subject: [PATCH 1/2] [clang-tidy] Added check
'bugprone-fu
balazske wrote:
I have now a working patch for "splitting" `ASTImporter` from `AST`. If this
change will be accepted it is possible to add the new visit functions. The
"split" change may require discussion on discord because it affects clang code
layout.
https://github.com/llvm/llvm-project/p
https://github.com/balazske closed
https://github.com/llvm/llvm-project/pull/132242
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
balazske wrote:
I checked the code and it looks difficult to split the `ASTImporter` to a
separate component. The problem is that `ExternalASTSource` is used for AST
related things and uses `ASTImporter` too.
Another way to fix the problem is to move code of classes like
`concepts::TypeRequire
balazske wrote:
I think that `ASTImporter` must be moved into a new component (directory in
"clang/lib") to fix this problem. `AST` is already dependency of `Sema` so
`Sema` can not be added to `AST` as dependency (but could be added to
`ASTImporter` if it would be a new component and `Sema` w
balazske wrote:
We should ensure that the code builds with `-DBUILD_SHARED_LIBS=ON` cmake
option. I think this is why I can not build it. I get this error:
```
/usr/bin/ld: tools/clang/lib/AST/CMakeFiles/obj.clangAST.dir/ASTImporter.cpp.o:
in function `std::conditional, llvm::Expected, llvm::E
https://github.com/balazske created
https://github.com/llvm/llvm-project/pull/140086
None
From 65d44a4eb9621e49a96f1ac43e5a1bbd6691dc13 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 15 May 2025 17:41:16 +0200
Subject: [PATCH] [clang-tidy] Added check
'bugprone-
balazske wrote:
I have fixed the review issues.
https://github.com/llvm/llvm-project/pull/136823
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/136823
From 4ce7497bb0dc89de3b9f139177c295291e7d3e9c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 17 Apr 2025 17:36:03 +0200
Subject: [PATCH 1/4] [clang-tidy] Add check
'bugprone-inva
@@ -105,9 +105,6 @@ void errno_getcwd(char *Buf, size_t Sz) {
clang_analyzer_eval(errno != 0); // expected-warning{{TRUE}}
clang_analyzer_eval(Path == NULL); // expected-warning{{TRUE}}
if (errno) {} // no warning
- } else if (Path == NULL) {
@@ -0,0 +1,58 @@
+//===--- MisleadingSetterOfReferenceCheck.cpp -
clang-tidy-===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apa
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/132242
Rate limit · GitHub
body {
background-color: #f6f8fa;
color: #24292e;
font-family: -apple-system,BlinkMacSystemFont,Segoe
UI,Helvetica,Arial,sans-
@@ -105,9 +105,6 @@ void errno_getcwd(char *Buf, size_t Sz) {
clang_analyzer_eval(errno != 0); // expected-warning{{TRUE}}
clang_analyzer_eval(Path == NULL); // expected-warning{{TRUE}}
if (errno) {} // no warning
- } else if (Path == NULL) {
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/132242
From e3064b600ea726ab7b3dea054e9f11e1ce028297 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 19 Mar 2025 16:09:04 +0100
Subject: [PATCH 1/6] [clang-tidy] Add check
bugprone-misle
@@ -0,0 +1,58 @@
+//===--- MisleadingSetterOfReferenceCheck.cpp -
clang-tidy-===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apa
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/132242
From e3064b600ea726ab7b3dea054e9f11e1ce028297 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 19 Mar 2025 16:09:04 +0100
Subject: [PATCH 1/5] [clang-tidy] Add check
bugprone-misle
https://github.com/balazske closed
https://github.com/llvm/llvm-project/pull/128735
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
balazske wrote:
I am now not really sure what happens, if there is a single anonymous namespace
for a TU or there are separate ones for the anonymous namespaces in for example
`extern "C"` blocks (and how it should work according to the C++ standard).
Probably adding more tests where there is
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/136823
From 4ce7497bb0dc89de3b9f139177c295291e7d3e9c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 17 Apr 2025 17:36:03 +0200
Subject: [PATCH 1/3] [clang-tidy] Add check
'bugprone-inva
balazske wrote:
The current behavior is the same for named or anonymous namespace: If there is
an existing namespace with same name in the target ("To") TU, the imported one
is merged into this (this is what was wrong before this fix, the anonymous
namespace was not merged if it was inside a `
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/136823
From 4ce7497bb0dc89de3b9f139177c295291e7d3e9c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Thu, 17 Apr 2025 17:36:03 +0200
Subject: [PATCH 1/2] [clang-tidy] Add check
'bugprone-inva
balazske wrote:
> I wonder if behavior of this check should be an extension to
> [optin.core.EnumCastOutOfRange](https://clang.llvm.org/docs/analyzer/checkers.html#optin-core-enumcastoutofrange).
> Sure, we don't have `static_cast` here but it's still considered as "cast
> out of range"? Maybe
@@ -0,0 +1,114 @@
+//===--- InvalidEnumDefaultInitializationCheck.cpp - clang-tidy
---===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM
Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Ap
https://github.com/balazske closed
https://github.com/llvm/llvm-project/pull/134387
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
@@ -436,9 +436,9 @@ class StdLibraryFunctionsChecker
llvm::raw_ostream &Out) const override;
ValueConstraintPtr negate() const override {
- NotNullBufferConstraint Tmp(*this);
+ BufferNullnessConstraint Tmp(*this);
Tmp.Cannot
balazske wrote:
The checker had only a few results from the usual C projects where we test it,
but more of these are difficult to understand.
[This](https://codechecker-demo.eastus.cloudapp.azure.com/Default/report-detail?run=vim_v8.2.1920_fixedaddr_on_test&newcheck=vim_v8.2.1920_fixedaddr_off_
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/134387
From 8936d300045d96d8719ecee04c36b2b0cb5d96d6 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Fri, 4 Apr 2025 16:05:28 +0200
Subject: [PATCH 1/2] [clang][analyzer] Fix a possible crash
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/132242
From e3064b600ea726ab7b3dea054e9f11e1ce028297 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 19 Mar 2025 16:09:04 +0100
Subject: [PATCH 1/4] [clang-tidy] Add check
bugprone-misle
https://github.com/balazske created
https://github.com/llvm/llvm-project/pull/134387
None
From 8936d300045d96d8719ecee04c36b2b0cb5d96d6 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Fri, 4 Apr 2025 16:05:28 +0200
Subject: [PATCH] [clang][analyzer] Fix a possible cras
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/132242
From e3064b600ea726ab7b3dea054e9f11e1ce028297 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 19 Mar 2025 16:09:04 +0100
Subject: [PATCH 1/3] [clang-tidy] Add check
bugprone-misle
https://github.com/balazske updated
https://github.com/llvm/llvm-project/pull/132242
From e3064b600ea726ab7b3dea054e9f11e1ce028297 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Bal=C3=A1zs=20K=C3=A9ri?=
Date: Wed, 19 Mar 2025 16:09:04 +0100
Subject: [PATCH 1/2] [clang-tidy] Add check
bugprone-misle
https://github.com/balazske closed
https://github.com/llvm/llvm-project/pull/132404
___
cfe-commits mailing list
cfe-commits@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits
@@ -1165,7 +1165,7 @@ ProgramStateRef
StdLibraryFunctionsChecker::NotNullConstraint::apply(
return State->assume(L, CannotBeNull);
}
-void StdLibraryFunctionsChecker::NotNullConstraint::describe(
+void StdLibraryFunctionsChecker::NullnessConstraint::describe(
Descripti
1 - 100 of 920 matches
Mail list logo