| /openbsd-src/gnu/llvm/clang/lib/StaticAnalyzer/Checkers/ |
| H A D | ExprInspectionChecker.cpp | 61 ExplodedNode *reportBug(llvm::StringRef Msg, CheckerContext &C, 63 ExplodedNode *reportBug(llvm::StringRef Msg, BugReporter &BR, ExplodedNode *N, 166 ExprInspectionChecker::reportBug(llvm::StringRef Msg, CheckerContext &C, in reportBug() function in ExprInspectionChecker 169 reportBug(Msg, C.getBugReporter(), N, ExprVal); in reportBug() 174 ExprInspectionChecker::reportBug(llvm::StringRef Msg, BugReporter &BR, in reportBug() function in ExprInspectionChecker 194 reportBug("Missing argument", C); in getArgExpr() 208 reportBug("Cannot obtain the region", C); in getArgRegion() 224 reportBug(getArgumentValueString(CE, C), C); in analyzerEval() 229 reportBug("REACHABLE", C); in analyzerWarnIfReached() 253 reportBug(getArgumentValueString(CE, C), C); in analyzerCheckInlined() [all …]
|
| H A D | DivZeroChecker.cpp | 29 void reportBug(const char *Msg, ProgramStateRef StateZero, CheckerContext &C, 44 void DivZeroChecker::reportBug( in reportBug() function in DivZeroChecker 85 reportBug("Division by zero", stateZero, C); in checkPreStmt() 91 reportBug("Division by a tainted value, possibly zero", stateZero, C, in checkPreStmt()
|
| H A D | VLASizeChecker.cpp | 57 void reportBug(VLASize_Kind Kind, const Expr *SizeE, ProgramStateRef State, 140 reportBug(VLA_Overflow, SizeE, State, C); in checkVLA() 159 reportBug(VLA_Garbage, SizeE, State, C); in checkVLAIndexSize() 170 reportBug(VLA_Tainted, SizeE, nullptr, C, in checkVLAIndexSize() 182 reportBug(VLA_Zero, SizeE, StateZero, C); in checkVLAIndexSize() 203 reportBug(VLA_Negative, SizeE, State, C); in checkVLAIndexSize() 212 void VLASizeChecker::reportBug( in reportBug() function in VLASizeChecker
|
| H A D | VforkChecker.cpp | 57 void reportBug(const char *What, CheckerContext &C, 123 void VforkChecker::reportBug(const char *What, CheckerContext &C, in reportBug() function in VforkChecker 191 reportBug("This function call", C); in checkPreCall() 209 reportBug("This assignment", C); in checkBind() 216 reportBug("Return", C, "call _exit() instead"); in checkPreStmt()
|
| H A D | TestAfterDivZeroChecker.cpp | 82 void reportBug(SVal Val, CheckerContext &C) const; 166 void TestAfterDivZeroChecker::reportBug(SVal Val, CheckerContext &C) const { in reportBug() function in TestAfterDivZeroChecker 229 reportBug(Val, C); in checkBranchCondition() 239 reportBug(Val, C); in checkBranchCondition() 243 reportBug(Val, C); in checkBranchCondition() 251 reportBug(Val, C); in checkBranchCondition() 256 reportBug(Val, C); in checkBranchCondition()
|
| H A D | MismatchedIteratorChecker.cpp | 39 void reportBug(const StringRef &Message, const SVal &Val1, 42 void reportBug(const StringRef &Message, const SVal &Val, 236 reportBug("Container accessed using foreign iterator argument.", in verifyMatch() 275 reportBug("Iterators of different containers used where the " in verifyMatch() 280 void MismatchedIteratorChecker::reportBug(const StringRef &Message, in reportBug() function in MismatchedIteratorChecker 292 void MismatchedIteratorChecker::reportBug(const StringRef &Message, in reportBug() function in MismatchedIteratorChecker
|
| H A D | SmartPtrChecker.cpp | 42 void reportBug(CheckerContext &C, const MemRegion *DerefRegion, 75 reportBug(C, ThisRegion, Call); in checkPreCall() 79 void SmartPtrChecker::reportBug(CheckerContext &C, const MemRegion *DerefRegion, in reportBug() function in SmartPtrChecker
|
| H A D | ConversionChecker.cpp | 52 void reportBug(ExplodedNode *N, const Expr *E, CheckerContext &C, 121 reportBug(N, Cast, C, "Loss of sign in implicit conversion"); in checkPreStmt() 123 reportBug(N, Cast, C, "Loss of precision in implicit conversion"); in checkPreStmt() 127 void ConversionChecker::reportBug(ExplodedNode *N, const Expr *E, in reportBug() function in ConversionChecker
|
| H A D | DereferenceChecker.cpp | 40 void reportBug(DerefKind K, ProgramStateRef State, const Stmt *S, 154 void DereferenceChecker::reportBug(DerefKind K, ProgramStateRef State, in reportBug() function in DereferenceChecker 244 reportBug(DerefKind::UndefinedPointerValue, C.getState(), DerefExpr, C); in checkLocation() 265 reportBug(DerefKind::NullPointer, nullState, expr, C); in checkLocation() 307 reportBug(DerefKind::NullPointer, StNull, expr, C); in checkBind()
|
| H A D | InvalidatedIteratorChecker.cpp | 37 void reportBug(const StringRef &Message, const SVal &Val, 125 reportBug("Invalidated iterator accessed.", Val, C, N); in verifyAccess() 129 void InvalidatedIteratorChecker::reportBug(const StringRef &Message, in reportBug() function in InvalidatedIteratorChecker
|
| H A D | PthreadLockChecker.cpp | 171 void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[], 414 reportBug(C, BT_doublelock, MtxExpr, CheckKind, in AcquireLockAux() 418 reportBug(C, BT_destroylock, MtxExpr, CheckKind, in AcquireLockAux() 492 reportBug(C, BT_doubleunlock, MtxExpr, CheckKind, in ReleaseLockAux() 496 reportBug(C, BT_destroylock, MtxExpr, CheckKind, in ReleaseLockAux() 507 reportBug(C, BT_lor, MtxExpr, CheckKind, in ReleaseLockAux() 585 reportBug(C, BT_destroylock, MtxExpr, CheckKind, Message); in DestroyLockAux() 620 reportBug(C, BT_initlock, MtxExpr, CheckKind, Message); in InitLockAux() 623 void PthreadLockChecker::reportBug(CheckerContext &C, in reportBug() function in PthreadLockChecker
|
| H A D | IteratorRangeChecker.cpp | 45 void reportBug(const StringRef &Message, SVal Val, CheckerContext &C, 204 reportBug("Past-the-end iterator dereferenced.", Val, C, N); in verifyDereference() 251 reportBug("Iterator decremented ahead of its valid range.", LHS, in verifyRandomIncrOrDecr() 258 reportBug("Iterator incremented behind the past-the-end " in verifyRandomIncrOrDecr() 278 void IteratorRangeChecker::reportBug(const StringRef &Message, SVal Val, in reportBug() function in IteratorRangeChecker
|
| H A D | FuchsiaHandleChecker.cpp | 222 void reportBug(SymbolRef Sym, ExplodedNode *ErrorNode, CheckerContext &C, 615 reportBug(LeakedHandle, ErrNode, C, nullptr, LeakBugType, in reportLeaks() 625 reportBug(HandleSym, ErrNode, C, &Range, DoubleReleaseBugType, in reportDoubleRelease() 633 reportBug(HandleSym, ErrNode, C, &Range, ReleaseUnownedBugType, in reportUnownedRelease() 641 reportBug(HandleSym, ErrNode, C, &Range, UseAfterReleaseBugType, in reportUseAfterFree() 645 void FuchsiaHandleChecker::reportBug(SymbolRef Sym, ExplodedNode *ErrorNode, in reportBug() function in FuchsiaHandleChecker
|
| H A D | MoveChecker.cpp | 216 ExplodedNode *reportBug(const MemRegion *Region, const CXXRecordDecl *RD, 380 ExplodedNode *N = reportBug(Region, RD, C, MK); in modelUse() 390 ExplodedNode *MoveChecker::reportBug(const MemRegion *Region, in reportBug() function in MoveChecker
|
| H A D | NullabilityChecker.cpp | 168 void reportBug(StringRef Msg, ErrorKind Error, CheckKind CK, ExplodedNode *N, in reportBug() function in __anon73d492230111::NullabilityChecker 486 reportBug(Msg, Error, CK, N, Region, C.getBugReporter(), ValueExpr); in reportBugIfInvariantHolds() 550 reportBug("Nullable pointer is dereferenced", in checkEvent() 554 reportBug("Nullable pointer is passed to a callee that requires a " in checkEvent()
|
| H A D | StdLibraryFunctionsChecker.cpp | 727 void reportBug(const CallEvent &Call, ExplodedNode *N, in reportBug() function in __anon2143b5530111::StdLibraryFunctionsChecker 988 reportBug(Call, N, Constraint.get(), Summary, C); in checkPreCall()
|
| /openbsd-src/gnu/llvm/clang/lib/StaticAnalyzer/Checkers/WebKit/ |
| H A D | UncountedLambdaCapturesChecker.cpp | 65 reportBug(C, CapturedVar, CapturedVarType); in visitLambdaExpr() 72 void reportBug(const LambdaCapture &Capture, ValueDecl *CapturedVar, in reportBug() function in __anon7f423aac0111::UncountedLambdaCapturesChecker
|
| H A D | NoUncountedMembersChecker.cpp | 83 reportBug(Member, MemberType, MemberCXXRD, RD); in visitRecordDecl() 123 void reportBug(const FieldDecl *Member, const Type *MemberType, in reportBug() function in __anon48b7d4cc0111::NoUncountedMemberChecker
|
| H A D | RefCntblBaseVirtualDtorChecker.cpp | 96 reportBug(RD, ProblematicBaseSpecifier, ProblematicBaseClass); in visitCXXRecordDecl() 128 void reportBug(const CXXRecordDecl *DerivedClass, in reportBug() function in __anone46c051a0111::RefCntblBaseVirtualDtorChecker
|
| H A D | UncountedCallArgsChecker.cpp | 116 reportBug(Arg, *P); in visitCallExpr() 164 void reportBug(const Expr *CallArg, const ParmVarDecl *Param) const { in reportBug() function in __anon2bd0de6d0111::UncountedCallArgsChecker
|
| H A D | UncountedLocalVarsChecker.cpp | 214 reportBug(V); in visitVarDecl() 229 void reportBug(const VarDecl *V) const { in reportBug() function in __anon7dd8ca0b0111::UncountedLocalVarsChecker
|