| /llvm-project-15.0.7/clang/lib/StaticAnalyzer/Checkers/ |
| H A D | ValistChecker.cpp | 50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anona21762260111::ValistChecker 256 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess() 278 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists() 279 ? CheckNames[CK_Uninitialized] in reportLeakedVALists() 280 : CheckNames[CK_Unterminated], in reportLeakedVALists() 416 checker->CheckNames[ValistChecker::CK_##name] = \
|
| H A D | StackAddrEscapeChecker.cpp | 46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anoncdfb40950111::StackAddrEscapeChecker 160 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError() 200 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures() 224 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures() 372 CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction() 435 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
|
| H A D | PthreadLockChecker.cpp | 82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon87714f440111::PthreadLockChecker 237 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType() 239 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType() 241 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType() 243 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType() 244 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType() 709 checker->CheckNames[PthreadLockChecker::CK_##name] = \
|
| H A D | MallocChecker.cpp | 330 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonac89c38b0411::MallocChecker 2227 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc() 2275 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca() 2300 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc() 2363 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree() 2456 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree() 2485 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete() 2514 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc() 2546 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree() 3581 Out << " (" << CheckNames[*CheckKind].getName() << ")"; in printState() [all …]
|
| H A D | NullabilityChecker.cpp | 119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon0e3a3a9c0111::NullabilityChecker 124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType() 1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
|
| H A D | StdLibraryFunctionsChecker.cpp | 714 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon09a2c6cc0111::StdLibraryFunctionsChecker 739 CheckNames[CK_StdCLibraryFunctionArgsChecker], in reportBug() 3024 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \
|
| /llvm-project-15.0.7/clang-tools-extra/clang-tidy/ |
| H A D | ClangTidy.cpp | 459 std::vector<std::string> CheckNames; in getCheckNames() local 462 CheckNames.emplace_back(CheckFactory.getKey()); in getCheckNames() 468 CheckNames.push_back(AnalyzerCheckNamePrefix + AnalyzerCheck.first); in getCheckNames() 471 llvm::sort(CheckNames); in getCheckNames() 472 return CheckNames; in getCheckNames()
|