Home
last modified time | relevance | path

Searched refs:CheckNames (Results 1 – 6 of 6) sorted by relevance

/freebsd-13.1/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DStackAddrEscapeChecker.cpp46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon4e1f22990111::StackAddrEscapeChecker
160 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError()
200 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures()
224 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures()
340 CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction()
381 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
H A DValistChecker.cpp49 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon023dcfaa0111::ValistChecker
255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess()
277 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
278 ? CheckNames[CK_Uninitialized] in reportLeakedVALists()
279 : CheckNames[CK_Unterminated], in reportLeakedVALists()
415 checker->CheckNames[ValistChecker::CK_##name] = \
H A DPthreadLockChecker.cpp81 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon658ccf480111::PthreadLockChecker
236 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType()
238 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType()
240 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType()
242 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType()
243 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType()
710 checker->CheckNames[PthreadLockChecker::CK_##name] = \
H A DMallocChecker.cpp318 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon0cb0310f0411::MallocChecker
2015 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc()
2063 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca()
2088 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc()
2151 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree()
2244 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree()
2273 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete()
2302 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc()
2333 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree()
3365 Out << " (" << CheckNames[*CheckKind].getName() << ")"; in printState()
[all …]
H A DNullabilityChecker.cpp119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonec55baa00111::NullabilityChecker
124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType()
1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
H A DStdLibraryFunctionsChecker.cpp567 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anondd300ad00111::StdLibraryFunctionsChecker
591 CheckNames[CK_StdCLibraryFunctionArgsChecker], in reportBug()
2665 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \