| /netbsd-src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/ |
| H A D | ExprInspectionChecker.cpp | 58 ExplodedNode *reportBug(llvm::StringRef Msg, CheckerContext &C, 60 ExplodedNode *reportBug(llvm::StringRef Msg, BugReporter &BR, ExplodedNode *N, 157 ExplodedNode *ExprInspectionChecker::reportBug(llvm::StringRef Msg, in reportBug() function in ExprInspectionChecker 161 reportBug(Msg, C.getBugReporter(), N, ExprVal); in reportBug() 165 ExplodedNode *ExprInspectionChecker::reportBug(llvm::StringRef Msg, in reportBug() function in ExprInspectionChecker 185 reportBug("Missing argument", C); in getArgExpr() 199 reportBug("Cannot obtain the region", C); in getArgRegion() 215 reportBug(getArgumentValueString(CE, C), C); in analyzerEval() 220 reportBug("REACHABLE", C); in analyzerWarnIfReached() 244 reportBug(getArgumentValueString(CE, C), C); in analyzerCheckInlined() [all …]
|
| H A D | VLASizeChecker.cpp | 56 void reportBug(VLASize_Kind Kind, const Expr *SizeE, ProgramStateRef State, 139 reportBug(VLA_Overflow, SizeE, State, C); in checkVLA() 158 reportBug(VLA_Garbage, SizeE, State, C); in checkVLAIndexSize() 169 reportBug(VLA_Tainted, SizeE, nullptr, C, in checkVLAIndexSize() 181 reportBug(VLA_Zero, SizeE, StateZero, C); in checkVLAIndexSize() 202 reportBug(VLA_Negative, SizeE, State, C); in checkVLAIndexSize() 211 void VLASizeChecker::reportBug( in reportBug() function in VLASizeChecker
|
| H A D | DivZeroChecker.cpp | 28 void reportBug(const char *Msg, ProgramStateRef StateZero, CheckerContext &C, 43 void DivZeroChecker::reportBug( in reportBug() function in DivZeroChecker 84 reportBug("Division by zero", stateZero, C); in checkPreStmt() 90 reportBug("Division by a tainted value, possibly zero", stateZero, C, in checkPreStmt()
|
| H A D | TestAfterDivZeroChecker.cpp | 81 void reportBug(SVal Val, CheckerContext &C) const; 165 void TestAfterDivZeroChecker::reportBug(SVal Val, CheckerContext &C) const { in reportBug() function in TestAfterDivZeroChecker 228 reportBug(Val, C); in checkBranchCondition() 238 reportBug(Val, C); in checkBranchCondition() 242 reportBug(Val, C); in checkBranchCondition() 250 reportBug(Val, C); in checkBranchCondition() 255 reportBug(Val, C); in checkBranchCondition()
|
| H A D | VforkChecker.cpp | 55 void reportBug(const char *What, CheckerContext &C, 121 void VforkChecker::reportBug(const char *What, CheckerContext &C, in reportBug() function in VforkChecker 188 reportBug("This function call", C); in checkPreCall() 206 reportBug("This assignment", C); in checkBind() 213 reportBug("Return", C, "call _exit() instead"); in checkPreStmt()
|
| H A D | MismatchedIteratorChecker.cpp | 39 void reportBug(const StringRef &Message, const SVal &Val1, 42 void reportBug(const StringRef &Message, const SVal &Val, 234 reportBug("Container accessed using foreign iterator argument.", in verifyMatch() 273 reportBug("Iterators of different containers used where the " in verifyMatch() 278 void MismatchedIteratorChecker::reportBug(const StringRef &Message, in reportBug() function in MismatchedIteratorChecker 290 void MismatchedIteratorChecker::reportBug(const StringRef &Message, in reportBug() function in MismatchedIteratorChecker
|
| H A D | ConversionChecker.cpp | 52 void reportBug(ExplodedNode *N, CheckerContext &C, const char Msg[]) const; 111 reportBug(N, C, "Loss of sign in implicit conversion"); in checkPreStmt() 113 reportBug(N, C, "Loss of precision in implicit conversion"); in checkPreStmt() 117 void ConversionChecker::reportBug(ExplodedNode *N, CheckerContext &C, in reportBug() function in ConversionChecker
|
| H A D | SmartPtrChecker.cpp | 42 void reportBug(CheckerContext &C, const MemRegion *DerefRegion, 75 reportBug(C, ThisRegion, Call); in checkPreCall() 79 void SmartPtrChecker::reportBug(CheckerContext &C, const MemRegion *DerefRegion, in reportBug() function in SmartPtrChecker
|
| H A D | DereferenceChecker.cpp | 39 void reportBug(DerefKind K, ProgramStateRef State, const Stmt *S, 123 void DereferenceChecker::reportBug(DerefKind K, ProgramStateRef State, in reportBug() function in DereferenceChecker 213 reportBug(DerefKind::UndefinedPointerValue, C.getState(), DerefExpr, C); in checkLocation() 234 reportBug(DerefKind::NullPointer, nullState, expr, C); in checkLocation() 276 reportBug(DerefKind::NullPointer, StNull, expr, C); in checkBind()
|
| H A D | PthreadLockChecker.cpp | 170 void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[], 413 reportBug(C, BT_doublelock, MtxExpr, CheckKind, in AcquireLockAux() 417 reportBug(C, BT_destroylock, MtxExpr, CheckKind, in AcquireLockAux() 491 reportBug(C, BT_doubleunlock, MtxExpr, CheckKind, in ReleaseLockAux() 495 reportBug(C, BT_destroylock, MtxExpr, CheckKind, in ReleaseLockAux() 506 reportBug(C, BT_lor, MtxExpr, CheckKind, in ReleaseLockAux() 584 reportBug(C, BT_destroylock, MtxExpr, CheckKind, Message); in DestroyLockAux() 619 reportBug(C, BT_initlock, MtxExpr, CheckKind, Message); in InitLockAux() 622 void PthreadLockChecker::reportBug(CheckerContext &C, in reportBug() function in PthreadLockChecker
|
| H A D | InvalidatedIteratorChecker.cpp | 37 void reportBug(const StringRef &Message, const SVal &Val, 125 reportBug("Invalidated iterator accessed.", Val, C, N); in verifyAccess() 129 void InvalidatedIteratorChecker::reportBug(const StringRef &Message, in reportBug() function in InvalidatedIteratorChecker
|
| H A D | IteratorRangeChecker.cpp | 45 void reportBug(const StringRef &Message, SVal Val, CheckerContext &C, 204 reportBug("Past-the-end iterator dereferenced.", Val, C, N); in verifyDereference() 251 reportBug("Iterator decremented ahead of its valid range.", LHS, in verifyRandomIncrOrDecr() 258 reportBug("Iterator incremented behind the past-the-end " in verifyRandomIncrOrDecr() 278 void IteratorRangeChecker::reportBug(const StringRef &Message, SVal Val, in reportBug() function in IteratorRangeChecker
|
| H A D | FuchsiaHandleChecker.cpp | 221 void reportBug(SymbolRef Sym, ExplodedNode *ErrorNode, CheckerContext &C, 618 reportBug(LeakedHandle, ErrNode, C, nullptr, LeakBugType, in reportLeaks() 628 reportBug(HandleSym, ErrNode, C, &Range, DoubleReleaseBugType, in reportDoubleRelease() 636 reportBug(HandleSym, ErrNode, C, &Range, ReleaseUnownedBugType, in reportUnownedRelease() 644 reportBug(HandleSym, ErrNode, C, &Range, UseAfterReleaseBugType, in reportUseAfterFree() 648 void FuchsiaHandleChecker::reportBug(SymbolRef Sym, ExplodedNode *ErrorNode, in reportBug() function in FuchsiaHandleChecker
|
| H A D | MoveChecker.cpp | 217 ExplodedNode *reportBug(const MemRegion *Region, const CXXRecordDecl *RD, 381 ExplodedNode *N = reportBug(Region, RD, C, MK); in modelUse() 391 ExplodedNode *MoveChecker::reportBug(const MemRegion *Region, in reportBug() function in MoveChecker
|
| H A D | NullabilityChecker.cpp | 166 void reportBug(StringRef Msg, ErrorKind Error, CheckKind CK, ExplodedNode *N, in reportBug() function in __anona22f4ad70111::NullabilityChecker 450 reportBug(Msg, Error, CK, N, Region, C.getBugReporter(), ValueExpr); in reportBugIfInvariantHolds() 501 reportBug("Nullable pointer is dereferenced", in checkEvent() 505 reportBug("Nullable pointer is passed to a callee that requires a " in checkEvent()
|
| H A D | StdLibraryFunctionsChecker.cpp | 580 void reportBug(const CallEvent &Call, ExplodedNode *N, in reportBug() function in __anon6255e2070111::StdLibraryFunctionsChecker 820 reportBug(Call, N, Constraint.get(), Summary, C); in checkPreCall()
|
| /netbsd-src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/WebKit/ |
| H A D | UncountedLambdaCapturesChecker.cpp | 64 reportBug(C, CapturedVar, CapturedVarType); in visitLambdaExpr() 71 void reportBug(const LambdaCapture &Capture, VarDecl *CapturedVar, in reportBug() function in __anonf03e8ee00111::UncountedLambdaCapturesChecker
|
| H A D | NoUncountedMembersChecker.cpp | 82 reportBug(Member, MemberType, MemberCXXRD, RD); in visitRecordDecl() 122 void reportBug(const FieldDecl *Member, const Type *MemberType, in reportBug() function in __anonb1adb8800111::NoUncountedMemberChecker
|
| H A D | RefCntblBaseVirtualDtorChecker.cpp | 96 reportBug(RD, ProblematicBaseSpecifier, ProblematicBaseClass); in visitCXXRecordDecl() 128 void reportBug(const CXXRecordDecl *DerivedClass, in reportBug() function in __anon5568594e0111::RefCntblBaseVirtualDtorChecker
|
| H A D | UncountedCallArgsChecker.cpp | 116 reportBug(Arg, *P); in visitCallExpr() 164 void reportBug(const Expr *CallArg, const ParmVarDecl *Param) const { in reportBug() function in __anon2eff1ba10111::UncountedCallArgsChecker
|
| H A D | UncountedLocalVarsChecker.cpp | 213 reportBug(V); in visitVarDecl() 228 void reportBug(const VarDecl *V) const { in reportBug() function in __anone6ceadbf0111::UncountedLocalVarsChecker
|