diff options
Diffstat (limited to 'clang/lib/StaticAnalyzer/Checkers')
28 files changed, 49 insertions, 47 deletions
diff --git a/clang/lib/StaticAnalyzer/Checkers/ArrayBoundCheckerV2.cpp b/clang/lib/StaticAnalyzer/Checkers/ArrayBoundCheckerV2.cpp index e462e2b2f15..6c83bdbf24f 100644 --- a/clang/lib/StaticAnalyzer/Checkers/ArrayBoundCheckerV2.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/ArrayBoundCheckerV2.cpp @@ -63,7 +63,7 @@ public: void dump() const; void dumpToStream(raw_ostream &os) const; }; -} +} // namespace static SVal computeExtentBegin(SValBuilder &svalBuilder, const MemRegion *region) { diff --git a/clang/lib/StaticAnalyzer/Checkers/BasicObjCFoundationChecks.cpp b/clang/lib/StaticAnalyzer/Checkers/BasicObjCFoundationChecks.cpp index 3fd55760bc5..780d80a4b72 100644 --- a/clang/lib/StaticAnalyzer/Checkers/BasicObjCFoundationChecks.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/BasicObjCFoundationChecks.cpp @@ -132,7 +132,7 @@ namespace { void checkPostStmt(const ObjCArrayLiteral *AL, CheckerContext &C) const; }; -} +} // namespace void NilArgChecker::warnIfNilExpr(const Expr *E, const char *Msg, @@ -631,7 +631,7 @@ class ClassReleaseChecker : public Checker<check::PreObjCMessage> { public: void checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const; }; -} +} // namespace void ClassReleaseChecker::checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const { @@ -692,7 +692,7 @@ class VariadicMethodTypeChecker : public Checker<check::PreObjCMessage> { public: void checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const; }; -} +} // namespace /// isVariadicMessage - Returns whether the given message is a variadic message, /// where all arguments must be Objective-C types. @@ -855,7 +855,7 @@ public: const CallEvent *Call, PointerEscapeKind Kind) const; }; -} +} // namespace static bool isKnownNonNilCollectionType(QualType T) { const ObjCObjectPointerType *PT = T->getAs<ObjCObjectPointerType>(); @@ -1208,7 +1208,7 @@ public: void checkPostObjCMessage(const ObjCMethodCall &M, CheckerContext &C) const; }; -} +} // namespace ProgramStateRef ObjCNonNilReturnValueChecker::assumeExprIsNonNull(const Expr *NonNullExpr, diff --git a/clang/lib/StaticAnalyzer/Checkers/CStringSyntaxChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/CStringSyntaxChecker.cpp index abfb971d4cc..f698d1beb45 100644 --- a/clang/lib/StaticAnalyzer/Checkers/CStringSyntaxChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/CStringSyntaxChecker.cpp @@ -184,7 +184,7 @@ public: walker.Visit(D->getBody()); } }; -} +} // namespace void ento::registerCStringSyntaxChecker(CheckerManager &mgr) { mgr.registerChecker<CStringSyntaxChecker>(); diff --git a/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp b/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp index 339af8f0332..5b5fe1ca054 100644 --- a/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/CheckObjCDealloc.cpp @@ -241,7 +241,7 @@ public: BR); } }; -} +} // namespace void ento::registerObjCDeallocChecker(CheckerManager &mgr) { mgr.registerChecker<ObjCDeallocChecker>(); diff --git a/clang/lib/StaticAnalyzer/Checkers/CheckSecuritySyntaxOnly.cpp b/clang/lib/StaticAnalyzer/Checkers/CheckSecuritySyntaxOnly.cpp index 0beb917833d..81cd028668c 100644 --- a/clang/lib/StaticAnalyzer/Checkers/CheckSecuritySyntaxOnly.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/CheckSecuritySyntaxOnly.cpp @@ -756,7 +756,7 @@ public: walker.Visit(D->getBody()); } }; -} +} // namespace #define REGISTER_CHECKER(name) \ void ento::register##name(CheckerManager &mgr) { \ diff --git a/clang/lib/StaticAnalyzer/Checkers/CheckSizeofPointer.cpp b/clang/lib/StaticAnalyzer/Checkers/CheckSizeofPointer.cpp index a61e658f69c..60826642393 100644 --- a/clang/lib/StaticAnalyzer/Checkers/CheckSizeofPointer.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/CheckSizeofPointer.cpp @@ -34,7 +34,7 @@ public: void VisitStmt(Stmt *S) { VisitChildren(S); } void VisitChildren(Stmt *S); }; -} +} // namespace void WalkAST::VisitChildren(Stmt *S) { for (Stmt::child_iterator I = S->child_begin(), E = S->child_end(); I!=E; ++I) diff --git a/clang/lib/StaticAnalyzer/Checkers/ClangSACheckers.h b/clang/lib/StaticAnalyzer/Checkers/ClangSACheckers.h index 05b4a61c5af..81cb6a60327 100644 --- a/clang/lib/StaticAnalyzer/Checkers/ClangSACheckers.h +++ b/clang/lib/StaticAnalyzer/Checkers/ClangSACheckers.h @@ -30,8 +30,8 @@ class CheckerRegistry; #undef CHECKER #undef GET_CHECKERS -} // end ento namespace +} // namespace ento -} // end clang namespace +} // namespace clang #endif diff --git a/clang/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp index f4be5b3e82f..1494dccaa05 100644 --- a/clang/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/DeadStoresChecker.cpp @@ -77,7 +77,7 @@ public: return reachable[block->getBlockID()]; } }; -} +} // namespace void ReachableCode::computeReachableBlocks() { if (!cfg.getNumBlockIDs()) @@ -445,7 +445,7 @@ public: } } }; -} +} // namespace void ento::registerDeadStoresChecker(CheckerManager &mgr) { mgr.registerChecker<DeadStoresChecker>(); diff --git a/clang/lib/StaticAnalyzer/Checkers/DebugCheckers.cpp b/clang/lib/StaticAnalyzer/Checkers/DebugCheckers.cpp index 51e7a3d3ce3..ee486b246ed 100644 --- a/clang/lib/StaticAnalyzer/Checkers/DebugCheckers.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/DebugCheckers.cpp @@ -40,7 +40,7 @@ public: } } }; -} +} // namespace void ento::registerDominatorsTreeDumper(CheckerManager &mgr) { mgr.registerChecker<DominatorsTreeDumper>(); @@ -60,7 +60,7 @@ public: } } }; -} +} // namespace void ento::registerLiveVariablesDumper(CheckerManager &mgr) { mgr.registerChecker<LiveVariablesDumper>(); @@ -80,7 +80,7 @@ public: } } }; -} +} // namespace void ento::registerCFGViewer(CheckerManager &mgr) { mgr.registerChecker<CFGViewer>(); @@ -106,7 +106,7 @@ public: } } }; -} +} // namespace void ento::registerCFGDumper(CheckerManager &mgr) { mgr.registerChecker<CFGDumper>(); @@ -126,7 +126,7 @@ public: CG.viewGraph(); } }; -} +} // namespace void ento::registerCallGraphViewer(CheckerManager &mgr) { mgr.registerChecker<CallGraphViewer>(); @@ -146,7 +146,7 @@ public: CG.dump(); } }; -} +} // namespace void ento::registerCallGraphDumper(CheckerManager &mgr) { mgr.registerChecker<CallGraphDumper>(); @@ -185,7 +185,7 @@ public: llvm::errs() << "[stats]\n" << "num-entries = " << Keys.size() << '\n'; } }; -} +} // namespace void ento::registerConfigDumper(CheckerManager &mgr) { mgr.registerChecker<ConfigDumper>(); diff --git a/clang/lib/StaticAnalyzer/Checkers/DirectIvarAssignment.cpp b/clang/lib/StaticAnalyzer/Checkers/DirectIvarAssignment.cpp index 0bcebf6e774..7696fabe5b8 100644 --- a/clang/lib/StaticAnalyzer/Checkers/DirectIvarAssignment.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/DirectIvarAssignment.cpp @@ -205,7 +205,7 @@ void DirectIvarAssignment::MethodCrawler::VisitBinaryOperator( } } } -} +} // namespace // Register the checker that checks for direct accesses in all functions, // except for the initialization and copy routines. diff --git a/clang/lib/StaticAnalyzer/Checkers/DynamicTypePropagation.cpp b/clang/lib/StaticAnalyzer/Checkers/DynamicTypePropagation.cpp index 43a28121877..6317e37d88f 100644 --- a/clang/lib/StaticAnalyzer/Checkers/DynamicTypePropagation.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/DynamicTypePropagation.cpp @@ -41,7 +41,7 @@ public: void checkPostStmt(const ImplicitCastExpr *CastE, CheckerContext &C) const; void checkPostStmt(const CXXNewExpr *NewE, CheckerContext &C) const; }; -} +} // namespace static void recordFixedType(const MemRegion *Region, const CXXMethodDecl *MD, CheckerContext &C) { diff --git a/clang/lib/StaticAnalyzer/Checkers/ExprInspectionChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/ExprInspectionChecker.cpp index f36ec2c687f..ef7ba1670c4 100644 --- a/clang/lib/StaticAnalyzer/Checkers/ExprInspectionChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/ExprInspectionChecker.cpp @@ -31,7 +31,7 @@ class ExprInspectionChecker : public Checker< eval::Call > { public: bool evalCall(const CallExpr *CE, CheckerContext &C) const; }; -} +} // namespace bool ExprInspectionChecker::evalCall(const CallExpr *CE, CheckerContext &C) const { diff --git a/clang/lib/StaticAnalyzer/Checkers/IvarInvalidationChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/IvarInvalidationChecker.cpp index 02c12095b5a..e71fb14e8df 100644 --- a/clang/lib/StaticAnalyzer/Checkers/IvarInvalidationChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/IvarInvalidationChecker.cpp @@ -722,7 +722,7 @@ void IvarInvalidationCheckerImpl::MethodCrawler::VisitObjCMessageExpr( VisitStmt(ME); } -} +} // namespace // Register the checkers. namespace { @@ -738,7 +738,7 @@ public: Walker.visit(D); } }; -} +} // namespace #define REGISTER_CHECKER(name) \ void ento::register##name(CheckerManager &mgr) { \ diff --git a/clang/lib/StaticAnalyzer/Checkers/LLVMConventionsChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/LLVMConventionsChecker.cpp index 0b7375a4b61..68ffb26f068 100644 --- a/clang/lib/StaticAnalyzer/Checkers/LLVMConventionsChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/LLVMConventionsChecker.cpp @@ -312,7 +312,7 @@ public: CheckStringRefAssignedTemporary(D, BR, this); } }; -} +} // namespace void ento::registerLLVMConventionsChecker(CheckerManager &mgr) { mgr.registerChecker<LLVMConventionsChecker>(); diff --git a/clang/lib/StaticAnalyzer/Checkers/MacOSKeychainAPIChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/MacOSKeychainAPIChecker.cpp index 52e29368cea..1ff43c5e251 100644 --- a/clang/lib/StaticAnalyzer/Checkers/MacOSKeychainAPIChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/MacOSKeychainAPIChecker.cpp @@ -151,7 +151,7 @@ private: BugReport &BR) override; }; }; -} +} // namespace /// ProgramState traits to store the currently allocated (and not yet freed) /// symbols. This is a map from the allocated content symbol to the diff --git a/clang/lib/StaticAnalyzer/Checkers/MallocOverflowSecurityChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/MallocOverflowSecurityChecker.cpp index e91347999dc..817122e50ad 100644 --- a/clang/lib/StaticAnalyzer/Checkers/MallocOverflowSecurityChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/MallocOverflowSecurityChecker.cpp @@ -187,7 +187,7 @@ private: toScanFor(v), Context(ctx) { } }; -} +} // namespace // OutputPossibleOverflows - We've found a possible overflow earlier, // now check whether Body might contain a comparison which might be diff --git a/clang/lib/StaticAnalyzer/Checkers/MallocSizeofChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/MallocSizeofChecker.cpp index 296aec66805..cf255772d30 100644 --- a/clang/lib/StaticAnalyzer/Checkers/MallocSizeofChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/MallocSizeofChecker.cpp @@ -246,7 +246,7 @@ public: } }; -} +} // namespace void ento::registerMallocSizeofChecker(CheckerManager &mgr) { mgr.registerChecker<MallocSizeofChecker>(); diff --git a/clang/lib/StaticAnalyzer/Checkers/NSErrorChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/NSErrorChecker.cpp index 2be7f1d4ab8..9d0638dee5c 100644 --- a/clang/lib/StaticAnalyzer/Checkers/NSErrorChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/NSErrorChecker.cpp @@ -47,7 +47,7 @@ public: void checkASTDecl(const ObjCMethodDecl *D, AnalysisManager &mgr, BugReporter &BR) const; }; -} +} // namespace void NSErrorMethodChecker::checkASTDecl(const ObjCMethodDecl *D, AnalysisManager &mgr, @@ -94,7 +94,7 @@ public: void checkASTDecl(const FunctionDecl *D, AnalysisManager &mgr, BugReporter &BR) const; }; -} +} // namespace void CFErrorFunctionChecker::checkASTDecl(const FunctionDecl *D, AnalysisManager &mgr, @@ -146,7 +146,7 @@ public: "Coding conventions (Apple)") {} }; -} +} // namespace namespace { class NSOrCFErrorDerefChecker @@ -164,7 +164,7 @@ public: CheckerContext &C) const; void checkEvent(ImplicitNullDerefEvent event) const; }; -} +} // namespace typedef llvm::ImmutableMap<SymbolRef, unsigned> ErrorOutFlag; REGISTER_TRAIT_WITH_PROGRAMSTATE(NSErrorOut, ErrorOutFlag) diff --git a/clang/lib/StaticAnalyzer/Checkers/NoReturnFunctionChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/NoReturnFunctionChecker.cpp index ba82d1d1d41..6773b58161a 100644 --- a/clang/lib/StaticAnalyzer/Checkers/NoReturnFunctionChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/NoReturnFunctionChecker.cpp @@ -36,7 +36,7 @@ public: void checkPostObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const; }; -} +} // namespace void NoReturnFunctionChecker::checkPostCall(const CallEvent &CE, CheckerContext &C) const { diff --git a/clang/lib/StaticAnalyzer/Checkers/ObjCContainersASTChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/ObjCContainersASTChecker.cpp index e3fc611a7e0..159fb8f7b91 100644 --- a/clang/lib/StaticAnalyzer/Checkers/ObjCContainersASTChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/ObjCContainersASTChecker.cpp @@ -168,7 +168,7 @@ public: walker.Visit(D->getBody()); } }; -} +} // namespace void ento::registerObjCContainersASTChecker(CheckerManager &mgr) { mgr.registerChecker<ObjCContainersASTChecker>(); diff --git a/clang/lib/StaticAnalyzer/Checkers/ObjCMissingSuperCallChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/ObjCMissingSuperCallChecker.cpp index a2cf8e10d09..a398832e7ff 100644 --- a/clang/lib/StaticAnalyzer/Checkers/ObjCMissingSuperCallChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/ObjCMissingSuperCallChecker.cpp @@ -81,7 +81,7 @@ private: mutable bool IsInitialized; }; -} +} // namespace /// \brief Determine whether the given class has a superclass that we want /// to check. The name of the found superclass is stored in SuperclassName. diff --git a/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker.cpp index 49eef236e90..c794de8cfb5 100644 --- a/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker.cpp @@ -61,7 +61,7 @@ template <> struct FoldingSetTrait<RetEffect> { ID.AddInteger((unsigned) X.getObjKind()); } }; -} // end llvm namespace +} // namespace llvm //===----------------------------------------------------------------------===// // Reference-counting logic (typestate + counts). @@ -484,7 +484,7 @@ public: IdentifierInfo *getIdentifier() const { return II; } Selector getSelector() const { return S; } }; -} +} // namespace namespace llvm { template <> struct DenseMapInfo<ObjCSummaryKey> { @@ -510,7 +510,7 @@ template <> struct DenseMapInfo<ObjCSummaryKey> { } }; -} // end llvm namespace +} // namespace llvm namespace { class ObjCSummaryCache { @@ -4032,4 +4032,6 @@ CallEffects CallEffects::getEffect(const FunctionDecl *FD) { #undef createCallEffect -}}} +} // namespace objc_retain +} // namespace ento +} // namespace clang diff --git a/clang/lib/StaticAnalyzer/Checkers/ReturnUndefChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/ReturnUndefChecker.cpp index 6622313c991..fb135bd8002 100644 --- a/clang/lib/StaticAnalyzer/Checkers/ReturnUndefChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/ReturnUndefChecker.cpp @@ -34,7 +34,7 @@ class ReturnUndefChecker : public Checker< check::PreStmt<ReturnStmt> > { public: void checkPreStmt(const ReturnStmt *RS, CheckerContext &C) const; }; -} +} // namespace void ReturnUndefChecker::checkPreStmt(const ReturnStmt *RS, CheckerContext &C) const { diff --git a/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp index 327a9e0ac43..c21f71e6549 100644 --- a/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/StackAddrEscapeChecker.cpp @@ -40,7 +40,7 @@ private: static SourceRange genName(raw_ostream &os, const MemRegion *R, ASTContext &Ctx); }; -} +} // namespace SourceRange StackAddrEscapeChecker::genName(raw_ostream &os, const MemRegion *R, ASTContext &Ctx) { diff --git a/clang/lib/StaticAnalyzer/Checkers/TaintTesterChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/TaintTesterChecker.cpp index d33c977826a..22f4304b05b 100644 --- a/clang/lib/StaticAnalyzer/Checkers/TaintTesterChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/TaintTesterChecker.cpp @@ -34,7 +34,7 @@ class TaintTesterChecker : public Checker< check::PostStmt<Expr> > { public: void checkPostStmt(const Expr *E, CheckerContext &C) const; }; -} +} // namespace inline void TaintTesterChecker::initBugType() const { if (!BT) diff --git a/clang/lib/StaticAnalyzer/Checkers/UndefBranchChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/UndefBranchChecker.cpp index fc49a46eae5..9be10ba863e 100644 --- a/clang/lib/StaticAnalyzer/Checkers/UndefBranchChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/UndefBranchChecker.cpp @@ -56,7 +56,7 @@ public: void checkBranchCondition(const Stmt *Condition, CheckerContext &Ctx) const; }; -} +} // namespace void UndefBranchChecker::checkBranchCondition(const Stmt *Condition, CheckerContext &Ctx) const { diff --git a/clang/lib/StaticAnalyzer/Checkers/UnreachableCodeChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/UnreachableCodeChecker.cpp index d78de3c6f3a..5f7f9ed020d 100644 --- a/clang/lib/StaticAnalyzer/Checkers/UnreachableCodeChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/UnreachableCodeChecker.cpp @@ -48,7 +48,7 @@ private: static bool isInvalidPath(const CFGBlock *CB, const ParentMap &PM); static inline bool isEmptyCFGBlock(const CFGBlock *CB); }; -} +} // namespace void UnreachableCodeChecker::checkEndAnalysis(ExplodedGraph &G, BugReporter &B, diff --git a/clang/lib/StaticAnalyzer/Checkers/VirtualCallChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/VirtualCallChecker.cpp index 7e1fc1eb54a..5bffc41174c 100644 --- a/clang/lib/StaticAnalyzer/Checkers/VirtualCallChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/VirtualCallChecker.cpp @@ -239,7 +239,7 @@ public: } } }; -} +} // namespace void ento::registerVirtualCallChecker(CheckerManager &mgr) { mgr.registerChecker<VirtualCallChecker>(); |