Searched refs:CheckNames (Results 1 – 6 of 6) sorted by relevance
/netbsd-src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/ |
H A D | StackAddrEscapeChecker.cpp | 46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon7a23f6500111::StackAddrEscapeChecker 160 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError() 200 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures() 224 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures() 340 CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction() 381 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
|
H A D | ValistChecker.cpp | 49 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonfec7a1810111::ValistChecker 255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess() 277 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists() 278 ? CheckNames[CK_Uninitialized] in reportLeakedVALists() 279 : CheckNames[CK_Unterminated], in reportLeakedVALists() 415 checker->CheckNames[ValistChecker::CK_##name] = \
|
H A D | PthreadLockChecker.cpp | 81 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon1b665f7f0111::PthreadLockChecker 236 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType() 238 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType() 240 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType() 242 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType() 243 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType() 710 checker->CheckNames[PthreadLockChecker::CK_##name] = \
|
H A D | MallocChecker.cpp | 318 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon093a02e60411::MallocChecker 2015 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc() 2063 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca() 2088 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc() 2151 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree() 2205 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); in HandleUseAfterFree() 2244 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree() 2273 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete() 2302 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc() 2333 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree() [all …]
|
H A D | NullabilityChecker.cpp | 119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anona22f4ad70111::NullabilityChecker 124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType() 1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
|
H A D | StdLibraryFunctionsChecker.cpp | 567 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon6255e2070111::StdLibraryFunctionsChecker 591 CheckNames[CK_StdCLibraryFunctionArgsChecker], in reportBug() 2665 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \
|