Home
last modified time | relevance | path

Searched refs:CheckNames (Results 1 – 5 of 5) sorted by relevance

/freebsd-14.2/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DValistChecker.cpp50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon506ece2c0111::ValistChecker
255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess()
277 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
278 ? CheckNames[CK_Uninitialized] in reportLeakedVALists()
279 : CheckNames[CK_Unterminated], in reportLeakedVALists()
415 checker->CheckNames[ValistChecker::CK_##name] = \
H A DStackAddrEscapeChecker.cpp46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon1bab935b0111::StackAddrEscapeChecker
158 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError()
198 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures()
222 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures()
368 std::make_unique<BugType>(CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction()
436 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
H A DPthreadLockChecker.cpp82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonbf4b2f0a0111::PthreadLockChecker
237 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType()
239 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType()
241 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType()
243 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType()
244 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType()
710 checker->CheckNames[PthreadLockChecker::CK_##name] = \
H A DMallocChecker.cpp331 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon5ae12f910411::MallocChecker
2223 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc()
2271 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca()
2296 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc()
2359 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree()
2452 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree()
2481 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete()
2510 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc()
2542 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree()
3575 Out << " (" << CheckNames[*CheckKind].getName() << ")"; in printState()
[all …]
H A DNullabilityChecker.cpp125 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon46141a620111::NullabilityChecker
130 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType()
1400 checker->CheckNames[NullabilityChecker::CK_##name] = \