Home
last modified time | relevance | path

Searched refs:CheckNames (Results 1 – 7 of 7) sorted by relevance

/llvm-project-15.0.7/clang/lib/StaticAnalyzer/Checkers/
H A DValistChecker.cpp50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anona21762260111::ValistChecker
256 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess()
278 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
279 ? CheckNames[CK_Uninitialized] in reportLeakedVALists()
280 : CheckNames[CK_Unterminated], in reportLeakedVALists()
416 checker->CheckNames[ValistChecker::CK_##name] = \
H A DStackAddrEscapeChecker.cpp46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anoncdfb40950111::StackAddrEscapeChecker
160 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError()
200 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures()
224 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures()
372 CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction()
435 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
H A DPthreadLockChecker.cpp82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon87714f440111::PthreadLockChecker
237 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType()
239 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType()
241 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType()
243 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType()
244 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType()
709 checker->CheckNames[PthreadLockChecker::CK_##name] = \
H A DMallocChecker.cpp330 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonac89c38b0411::MallocChecker
2227 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc()
2275 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca()
2300 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc()
2363 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree()
2456 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree()
2485 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete()
2514 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc()
2546 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree()
3581 Out << " (" << CheckNames[*CheckKind].getName() << ")"; in printState()
[all …]
H A DNullabilityChecker.cpp119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon0e3a3a9c0111::NullabilityChecker
124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType()
1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
H A DStdLibraryFunctionsChecker.cpp714 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon09a2c6cc0111::StdLibraryFunctionsChecker
739 CheckNames[CK_StdCLibraryFunctionArgsChecker], in reportBug()
3024 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \
/llvm-project-15.0.7/clang-tools-extra/clang-tidy/
H A DClangTidy.cpp459 std::vector<std::string> CheckNames; in getCheckNames() local
462 CheckNames.emplace_back(CheckFactory.getKey()); in getCheckNames()
468 CheckNames.push_back(AnalyzerCheckNamePrefix + AnalyzerCheck.first); in getCheckNames()
471 llvm::sort(CheckNames); in getCheckNames()
472 return CheckNames; in getCheckNames()