• Home
  • History
  • Annotate
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
2          "http://www.w3.org/TR/html4/strict.dtd">
3<html>
4<head>
5  <title>Release notes for checker-XXX builds</title>
6  <link type="text/css" rel="stylesheet" href="menu.css">
7  <link type="text/css" rel="stylesheet" href="content.css">
8  <script type="text/javascript" src="scripts/menu.js"></script>
9</head>
10<body>
11
12<div id="page">
13<!--#include virtual="menu.html.incl"-->
14<div id="content">
15
16<h1>Release notes for <tt>checker-XXX</tt> builds</h1>
17<h4 id="checker_279">checker-279</h4>
18<p><b>built:</b> November 14, 2016</br>
19	<b>download:</b> <a href="downloads/checker-279.tar.bz2">checker-279.tar.bz2</a></p>
20	<p><b>highlights:</b></p>
21	<ul>
22    <li>The analyzer includes new checks for:
23      <ul>
24        <li>Improper instance cleanup up in Objective-C -dealloc methods under manual retain/release.</li>
25        <li>Inadvertent comparisons of NSNumber, CFNumberRef, and other number object pointers against scalar values.</li>
26        <li>Unsafe usage of dispatch_once_t predicates stored in Objective-C instance variables and other heap-allocated memory.</li>
27        <li>Issues resulting from self-assignment in C++.</li>
28        <li>Incorrect usage of MPI APIs in C and C++. This check can be enabled by passing the following command to scan-build: <br />
29  &nbsp;&nbsp;<tt>-enable-checker optin.mpi.MPI-Checker</tt></li>
30    </ul>
31    <li>The scan-build tool now supports a <tt>--force-analyze-debug-code flag</tt> that forces projects to analyze in debug mode. This flag leaves in assertions and so typically results in fewer false positives.</li>
32    <li>Additional miscellaneous improvements.</li>
33    <li>Now requires macOS 10.8 or later.</li>
34	</ul>
35
36<h4 id="checker_278">checker-278</h4>
37<p><b>built:</b> February 5, 2016</br>
38	<b>download:</b> <a href="downloads/checker-278.tar.bz2">checker-278.tar.bz2</a></p>
39	<p><b>highlights:</b></p>
40	<ul>
41    <li>Greatly improves analysis of C++ lambdas, including interprocedural analysis of lambda applications and reduced 'dead store'
42        false positives for variables captured by reference.</li>
43    <li>The analyzer now checks for misuse of 'vfork()'. This check is enabled by default.</li>
44    <li>The analyzer can now detect excessively-padded structs. This check can be enabled by passing the following
45        command to scan-build:<br />
46  &nbsp;&nbsp;<tt>-enable-checker optin.performance.Padding</tt> </li>
47    <li>The checks to detect misuse of <tt>_Nonnull</tt> are now enabled by default.</li>
48    <li>The checks to detect misuse of Objective-C generics are now enabled by default.</li>
49    <li>Many miscellaneous improvements.</li>
50	</ul>
51
52<h4 id="checker_277">checker-277</h4>
53<p><b>built:</b> October 28, 2015</br>
54	<b>download:</b> <a href="downloads/checker-277.tar.bz2">checker-277.tar.bz2</a></p>
55	<p><b>highlights:</b></p>
56	<ul>
57    <li>Includes about 20 months of change to Clang itself.</li>
58    <li>New checker for C++ leaks is turned on by default.</li>
59    <li>Added various small checks and bug fixes.</li>
60    <li>Added experimental checkers for Objective-C:</li>
61    <ul>
62        <li>New localizability checks:
63        <ul>
64            <li>Checker warning about uses of non-localized <tt>NSString</tt>s passed to UI methods expecting localized strings.</li>
65            <li>Checker warning when the comment argument is missing from <tt>NSLocalizedString</tt> macros.</li>
66            <li>These can be enabled by passing the following command to <tt>scan-build</tt>:
67<br />
68  &nbsp;&nbsp;<tt>-enable-checker alpha.osx.cocoa.NonLocalizedStringChecker,alpha.osx.cocoa.EmptyLocalizationContextChecker</tt>
69</li>
70        </ul>
71        </li>
72        <li>New checks for <tt>_Nonnull</tt> type qualifiers. These can be enabled with:
73<br />
74  &nbsp;&nbsp;<tt>-enable-checker nullability.NullPassedToNonnull,nullability.NullReturnedFromNonnull</tt></li>
75        <li>New checks for misuse of Objective-C generics. These can be enabled with <tt>-enable-checker alpha.osx.cocoa.ObjCGenerics</tt>.</li>
76    </ul>
77    <li>Support for <tt>cf_returns_retained</tt> and <tt>cf_returns_not_retained</tt> attributes in out-parameters.</li>
78    <li>The analyzer now creates one state for a range switch case instead of multiple, resulting in performance improvements.</li>
79    <li>Now requires OS X 10.7 or later.
80	</ul>
81
82<h4 id="checker_276">checker-276</h4>
83<p><b>built:</b> February 19, 2014</br>
84	<b>download:</b> <a href="downloads/checker-276.tar.bz2">checker-276.tar.bz2</a></p>
85	<p><b>highlights:</b></p>
86	<ul>
87    <li>Includes about 9 months of change to Clang itself (improved C++11/14 support, etc.)</li>
88    <li>More precise modeling of Objective-C properties, which enables the analyzer to find more bugs.</li>
89    <li>Includes a new "missing call to <tt>super</tt>" warning, which looks for common pattern in iOS/OSX APIs that require chaining a call to a super class's implementation of a method.</li>
90    <li>Accepts <tt>-arch arm64</tt> (which may be passed by Xcode 5.0), but for the time being analyzes code in such cases as <tt>-arch armv7s</tt>.</li>
91    <li>Many sundry fixes, improvements to C++ support, etc.</li>
92	</ul>
93
94<h4 id="checker_275">checker-275</h4>
95<p><b>built:</b> May 23, 2013</br>
96	<b>download:</b> <a href="downloads/checker-275.tar.bz2">checker-275.tar.bz2</a></p>
97	<p><b>highlights:</b></p>
98	<ul>
99    <li>Xcode: Includes a new arrow layout algorithm for issue presentation within Xcode.  The goal is for interprocedural bug reports to look cleaner and less busy (and easier to read).  Feedback appreciated.</li>
100    <li>Xcode: Bugs that occur within header code (e.g., C++) are now reported within the callers in the main source file.  For example, if you misuse a C++ function declared in a header the primary diagnostic will be in the caller (in the main source file).  The full expanded path, however, will show the bug in the header code as well.  These kind of cross-file issues are currently only support by Xcode, not the HTML output.</li>
101    <li>This build is built with LLVM's Link-Time Optimization (LTO), which should make it slightly faster.</li>
102    <li>LTO also reduces the download size (about 19% smaller than checker-274).</li>
103    <li>Many sundry fixes.</li>
104	</ul>
105
106<h4 id="checker_274">checker-274</h4>
107<p><b>built:</b> April 23, 2013</br>
108	<b>download:</b> <a href="https://attache.apple.com/AttacheWeb/dl?id=ATCdb3165f4406a4589b5878a22494c3b79">checker-274.tar.bz2</a></p>
109	<p><b>highlights:</b></p>
110	<ul>
111    <li>Improved use-after-free and mismatched deallocator checking.</li>
112    <li>Diagnostic polish.</li>
113    <li>Fixes crashes found in checker-273.</li>
114	</ul>
115
116<h4 id="checker_273">checker-273</h4>
117<p><b>built:</b> April 8, 2013</br>
118	<b>download:</b> <a href="https://attache.apple.com/AttacheWeb/dl?id=ATCdefcc852a99546cfbaba2a960e07478e">checker-273.tar.bz2</a></p>
119	<p><b>highlights:</b></p>
120	<ul>
121    <li>Additional checks for misuse of Foundation collection APIs.
122    <li>New C++ checker for attempting to create a reference to null.</li>
123    <li>New use-after-free checker for C++ 'delete'.</li>
124    <li>New checker for simple cases of mismatched allocators and deallocators, e.g. "delete malloc(4);"</li>
125    <li>Support for basic interprocedural analysis of C++ destructors.</li>
126    <li>Additional heuristics for suppressing null pointer false positives.</li>
127    <li>Misc. bug fixes and performance enhancements.</li>
128	</ul>
129
130<h4 id="checker_272">checker-272</h4>
131<p><b>built:</b> March 1, 2013</p>
132	<p><b>highlights:</b></p>
133	<ul>
134        <li>Better modeling of C++ constructors:
135            <ul>
136                <li>Interprocedural analysis support for constructors of types with trivial destructors</li>
137                <li>Efficient model of trivial copy and move constructors</li>
138            </ul>
139        </li>
140        <li>Better diagnostics for loops that execute 0 times</li>
141        <li>Fixes a linking issue that prevented the checker from running on OS X v10.6 and earlier</li>
142        <li>Fixes for misc. crashes and false positives</li>
143	</ul>
144
145<h4 id="checker_271">checker-271</h4>
146<p><b>built:</b> February 8, 2013</p>
147	<p><b>highlights:</b></p>
148	<ul>
149        <li>Faster analysis for <tt>scan-build xcodebuild</tt> when using Xcode 4.6 and higher:
150            <ul>
151                <li><tt>scan-build</tt> now uses Xcode's built-in interposition mechanism for the static analyzer to provide faster builds while doing static analysis (PCH files are now built).</li>
152                <li>This change also allows <tt>scan-build</tt> to have better support for iOS project analysis without having to specifying weird SDK settings to <tt>scan-build</tt>.</li>
153            </ul></li>
154        <li>Better diagnostics for implicitly-defined member functions in C++.</li>
155        <li>New warning for <tt>malloc</tt>/<tt>free</tt> checker when passing <tt>malloc</tt>'ed pointer with non-zero offset to <tt>free()</tt>.
156        <li>Fixes for misc. parser crashes.</li>
157        <li>Newer than the static analyzer version in Xcode 4.6</li>
158	</ul>
159
160<h4 id="checker_270">checker-270</h4>
161<p><b>built:</b> January 4, 2013</p>
162	<p><b>highlights:</b></p>
163	<ul>
164		<li>Major performance enhancements to speed up interprocedural analysis.</li>
165		<li>Misc. bug fixes.</li>
166	</ul>
167
168<h4 id="checker_269">checker-269</h4>
169<p><b>built:</b> September 25, 2012</p>
170	<p><b>highlights:</b></p>
171	<ul>
172		<li>Significantly improves interprocedural analysis for Objective-C.</li>
173		<li>Numerous bug fixes and heuristics to reduce false positives reported
174			over checker-268.</li>
175	</ul>
176
177<h4 id="checker_268">checker-268</h4>
178<p><b>built:</b> September 11, 2012</p>
179	<p><b>highlights:</b></p>
180
181<ul>
182	<li>Adds initial interprocedural analysis support for C++ and Objective-C. This will greatly improve analysis coverage and find deeper bugs in Objective-C and C++ code.</li>
183	<li>Contains a static analyzer newer than Xcode 4.4.</li>
184</ul>
185
186<p>NOTE: this checker build includes a <i>huge</i> number of changes. It has the potential to find many more bugs, but may report new kinds of false positives. We'd like to know about
187these, and any other problems you encounter. When you encounter an issue, please <a href="/filing_bugs.html">file a bug report</a>.</p>
188
189<h4 id="checker_267">checker-267</h4>
190<p><b>built:</b> June 1, 2012</p>
191   <p><b>highlights:</b></p>
192
193<p>Adds basic interprocedural analysis support for blocks.</p>
194
195<h4 id="checker_266">checker-266</h4>
196<p><b>built:</b> May 23, 2012</p>
197   <p><b>highlights:</b></p>
198
199<p>Contains numerous stability fixes over checker-266, especially when analyzing C++11 code.</p>
200
201<h4 id="checker_265">checker-265</h4>
202<p><b>built:</b> May 8, 2012</p>
203   <p><b>highlights:</b></p>
204
205<p>This release contains a fix for a major crasher introduced in checker-264, and various refinements to
206improve the precision and reduce the false positive rate of the analyzer. It also enables a new unix.MallocSizeof check, which reports
207inconsistencies between the casted type of the return value of a 'malloc/calloc/realloc' call and the operand
208of sizeof expressions contained within its argument(s).</p>
209
210<h4 id="checker_264">checker-264</h4>
211
212<p><b>built:</b> April 26, 2012</p>
213  <p><b>highlights:</b></p>
214
215<p>This release contains misc. bug fixes and performance enhancements over checker-263, including
216  a reduction of some kinds of false positives related to the malloc() checker.</p>
217
218<h4 id="checker_263">checker-263</h4>
219
220<p><b>built:</b> March 22, 2012</p>
221<p><b>highlights:</b></p>
222
223<ul>
224<li>Fixes several serious bugs with inter-procedural analysis, including a case where retain/releases would be &quot;double-counted&quot;.</li>
225</ul>
226
227<h4 id="checker_262">checker-262</h4>
228
229<p><b>built: </b>March 15, 2012</p>
230<p><b>highlights:</b></p>
231
232<ul>
233  <li>Enables experimental interprocedural analysis (within a file), which greatly amplifies the analyzer's ability to find issues.</li>
234  <li>Many bug fixes to the malloc/free checker.</li>
235  <li>Support for new Objective-C NSArray/NSDictionary/NSNumber literals syntax, and Objective-C container subscripting.</li>
236</ul>
237
238<p>NOTE: This build contains new interprocedural analysis that allows the analyzer to find more complicated bugs that span function boundaries.  It may have problems, performance issues, etc.  We'd like to <a href="/filing_bugs.html">hear about them</a>.
239
240<h4 id="checker_261">checker-261</h4>
241
242<p><b>built: </b>February 22, 2012<br>
243<p><b>highlights:</b></p>
244
245<ul>
246  <li>Contains a new experimental malloc/free checker.</li>
247  <li>Better support for projects using ARC.</li>
248  <li>Warns about null pointers passed as arguments to C string functions.</li>
249  <li>Warns about common anti-patterns in 'strncat' size argument, which can lead to buffer overflows.</li>
250  <li>set-xcode-analyzer now supports self-contained Xcode.app (Xcode 4.3 and later).</li>
251  <li>Contains a newer version of the analyzer than Xcode 4.3.</li>
252  <li>Misc. bug fixes and performance work.</li>
253</ul>
254
255<h4 id="checker_260">checker-260</h4>
256
257<p><b>built: </b>January 25, 2012<br>
258<p><b>highlights:</b></p>
259
260<p>This is essentially the same as checker-259, but enables the following <i>experimental</i> checkers (please provide feedback):</p>
261
262<ul>
263  <li>Warns about unsafe uses of CFArrayCreate, CFSetCreate, and CFDictionaryCreate</li>
264  <li>Warns about unsafe uses of getpw, gets, which are sources of buffer overflows</li>
265  <li>Warns about unsafe uses of mktemp and mktemps, which can lead to insecure temporary files</li>
266  <li>Warns about unsafe uses of vfork, which is <a href="https://www.securecoding.cert.org/confluence/display/seccode/POS33-C.+Do+not+use+vfork()">insecure</a> to use</li>
267  <li>Warns about not checking the return values of setuid, setgid, seteuid, setegid, setreuid, setregid (another security issue)</li>
268</ul>
269
270<h4 id="checker_259">checker-259</h4>
271
272<p><b>built: </b>January 25, 2012<br>
273<p><b>highlights:</b></p>
274
275<ul>
276  <li>Contains a newer version of the analyzer than the one shipped in Xcode 4.2.</li>
277  <li>Significant performance optimizations to reduce memory usage of the analyzer.</li>
278  <li>Tweaks to scan-build to have it work more easily with Xcode projects using Clang.</li>
279  <li>Numerous bug fixes to better support code using ARC.</li>
280</ul>
281
282<h4 id="checker_258">checker-258</h4>
283
284<p><b>built: </b>October 13, 2011<br>
285<p><b>highlights:</b></p>
286
287<ul>
288  <li>Contains a newer version of the analyzer than the one shipped in Xcode 4.2.</li>
289  <li>Adds a new security checker for looking at correct uses of the Mac OS KeyChain API.</li>
290  <li>Supports ARC (please file bugs where you see issues)</li>
291  <li>Major under-the-cover changes.  This should result in more precise results in some cases, but this is laying the groundwork for major improvements.  Please file bugs where you see regressions or issues.</li>
292</ul>
293
294<h4 id="checker_257">checker-257</h4>
295
296<p><b>built: </b>May 25, 2011<br>
297<p><b>highlights:</b></p>
298
299<ul>
300  <li>The analyzer is now far more aggressive with checking conformance with Core Foundation conventions.  Any function that returns a CF type must now obey the Core Foundation naming conventions, or use the <a href="/annotations.html#attr_cf_returns_retained">cf_returns_retained</a> or <a href="/annotations.html#attr_cf_returns_not_retained">cf_returns_not_retained</a> annotations.</li>
301  <li>Fixed a serious regression where the analyzer would not analyze Objective-C methods in class extensions.</li>
302  <li>Misc. bug fixes to improve analyzer precision.
303  </li>
304</ul>
305
306<h4 id="checker_256">checker-256</h4>
307
308<p><b>built: </b>April 13, 2011<br>
309<p><b>highlights:</b></p>
310
311<ul>
312  <li>Lots of bug fixes and improvements to analyzer precision (fewer false positives, possibly more bugs found).
313  <li>Introductory analysis support for C++ and Objective-C++.
314</ul>
315
316<p>This build contains basic support for C++ and Objective-C++ that is ready to be tried out
317  by general users.  It is still in its infancy, but establishes a baseline for things to come.  The main hope is that it can find some
318  issues and have a reasonable false positive rate.</p>
319
320<p><b>Please</b> <a href="/filing_bugs.html">file bugs</a> when you see issues of any kind so we can assess
321  where development on C++ analysis support needs to be focused.</p>
322
323<p>To try out C++ analysis support, it should work out of the box using <tt>scan-build</tt>.  If you are using this checker build
324  as a replacement to the analyzer bundled with Xcode, first use the <tt>set-xcode-analyzer</tt> script to <a href="/xcode.html">change Xcode to use
325  your version of the analyzer</a>.  You will then need to modify one configuration file in Xcode to enable C++ analysis support.  This can
326  be done with the following steps:</p>
327
328<ol>
329  <li>Find the clang .xcspec file:
330<pre>$ cd /Developer/Library
331$ find . | grep xcspec | grep Clang
332./Xcode/<b>&lt;SNIP&gt;</b>/Clang LLVM 1.0.xcplugin/Contents/Resources/Clang LLVM 1.0.xcspec
333</pre></li>
334  <li>The exact location of the file may vary depending on your installation of Xcode.  Edit that file, and look for the string &quot;--analyze&quot;:
335<pre>
336  SourceFileOption = "--analyze";
337  FileTypes = (
338      "sourcecode.c.c",
339      "sourcecode.c.objc",
340  );
341  ...
342</pre>
343  Change the &quot;FileTypes&quot; entry to:
344<pre>
345  FileTypes = (
346      "sourcecode.c.c",
347      "sourcecode.c.objc",
348      "sourcecode.cpp.cpp",
349      "sourcecode.cpp.objcpp",
350  );
351</pre></li>
352<li>Restart Xcode.</li>
353</ol>
354
355<h4 id="checker_255">checker-255</h4>
356
357<p><b>built: </b> February 11, 2011<br>
358<p><b>highlights:</b></p>
359
360<ul>
361<li>Mac OS X builds are now Intel <tt>i386</tt> and <tt>x86_64</tt> only (no <tt>ppc</tt> support)</li>
362<li>Turns on new <tt>-init</tt> method checker by default</li>
363<li>Reduces memory usage of analyzer by 10%</li>
364<li>Misc. fixes to reduce false positives on dead stores and idempotent operations.</li>
365</ul>
366
367<h4 id="checker_254">checker-254</h4>
368
369<p><b>built: </b> January 27, 2011<br>
370<p><b>highlights:</b></p>
371
372<ul>
373<li>Introduces new <tt>-init</tt> method checker to check if a super class's init method is properly called.</li>
374<li>Objective-C retain/release checker now reasons about calls to property accessor methods (setter/getter).</li>
375<li>Introduces new attribute <a href="annotations.html#attr_ns_consumes_self">ns_consumes_self</a> to educate the Objective-C retain/release checker about custom &quot;init-like&quot; methods that do not follow the standard Cocoa naming conventions.</li>
376<li>Introduces new attributes <a href="annotations.html#attr_ns_consumed">ns_consumed</a> and <a href="annotations.html#attr_cf_consumed">cf_consumed</a> to educate the Objective-C retain/release checker about methods/functions that decrement the reference count of a parameter.</li>
377</ul>
378
379</div>
380</div>
381</body>
382</html>
383