/freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
H A D | BugReporter.h | 57 class BugType; variable 128 const BugType& BT; 136 BugReport(Kind kind, const BugType &bt, StringRef desc) in BugReport() 139 BugReport(Kind K, const BugType &BT, StringRef ShortDescription, in BugReport() 149 const BugType& getBugType() const { return BT; } in getBugType() 256 BasicBugReport(const BugType &bt, StringRef desc, PathDiagnosticLocation l) in BasicBugReport() 369 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport() 373 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc, in PathSensitiveBugReport() 386 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport() 393 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc, [all …]
|
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
H A D | PthreadLockChecker.cpp | 204 void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[], 260 mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds]; 261 mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds]; 262 mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds]; 263 mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds]; 264 mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds]; 270 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType() 272 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType() 273 BT_destroylock[CheckKind].reset(new BugType{ in initBugType() 275 BT_initlock[CheckKind].reset(new BugType{ in initBugType() [all …]
|
H A D | SmartPtrChecker.cpp | 33 static const BugType *NullDereferenceBugTypePtr; 38 BugType NullDereferenceBugType{this, "Null SmartPtr dereference", 54 const BugType *getNullDereferenceBugType() { return NullDereferenceBugTypePtr; } in getNullDereferenceBugType()
|
H A D | UnixAPIChecker.cpp | 47 const BugType BT_open{this, "Improper use of 'open'", categories::UnixAPI}; 48 const BugType BT_getline{this, "Improper use of getdelim", 50 const BugType BT_pthreadOnce{this, "Improper use of 'pthread_once'", 52 const BugType BT_ArgumentNull{this, "NULL pointer", categories::UnixAPI}; 58 std::optional<std::reference_wrapper<const BugType>> BT = 88 const BugType BT_mallocZero{ 116 std::optional<std::reference_wrapper<const BugType>> BT) const { in EnsurePtrNotNull()
|
H A D | DereferenceChecker.cpp | 36 BugType BT_Null{this, "Dereference of null pointer", categories::LogicError}; 37 BugType BT_Undef{this, "Dereference of undefined pointer value", 39 BugType BT_Label{this, "Dereference of the address of a label", 158 const BugType *BT = nullptr; in reportBug()
|
H A D | SmartPtr.h | 31 const BugType *getNullDereferenceBugType();
|
H A D | SimpleStreamChecker.cpp | 58 const BugType DoubleCloseBugType{this, "Double fclose", 60 const BugType LeakBugType{this, "Resource Leak", "Unix Stream API Error",
|
H A D | CXXDeleteChecker.cpp | 69 const BugType BT{ 79 const BugType BT{this,
|
H A D | MallocChecker.cpp | 360 mutable std::unique_ptr<BugType> BT_DoubleFree[CK_NumCheckKinds]; 361 mutable std::unique_ptr<BugType> BT_DoubleDelete; 362 mutable std::unique_ptr<BugType> BT_Leak[CK_NumCheckKinds]; 363 mutable std::unique_ptr<BugType> BT_UseFree[CK_NumCheckKinds]; 364 mutable std::unique_ptr<BugType> BT_BadFree[CK_NumCheckKinds]; 365 mutable std::unique_ptr<BugType> BT_FreeAlloca[CK_NumCheckKinds]; 366 mutable std::unique_ptr<BugType> BT_MismatchedDealloc; 367 mutable std::unique_ptr<BugType> BT_OffsetFree[CK_NumCheckKinds]; 368 mutable std::unique_ptr<BugType> BT_UseZerroAllocated[CK_NumCheckKinds]; 369 mutable std::unique_ptr<BugType> BT_TaintedAlloc; [all …]
|
H A D | ErrnoChecker.cpp | 57 BugType BT_InvalidErrnoRead{this, "Value of 'errno' could be undefined", 59 BugType BT_ErrnoNotChecked{this, "Value of 'errno' was not checked",
|
H A D | PutenvStackArrayChecker.cpp | 31 BugType BT{this, "'putenv' called with stack-allocated string",
|
H A D | ValistChecker.cpp | 32 mutable std::unique_ptr<BugType> BT_leakedvalist, BT_uninitaccess; 254 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess() 276 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
|
H A D | UndefinedNewArraySizeChecker.cpp | 28 BugType BT{this, "Undefined array element count in new[]",
|
H A D | MmapWriteExecChecker.cpp | 35 const BugType BT{this, "W^X check fails, Write Exec prot flags set",
|
H A D | CheckPlacementNew.cpp | 57 BugType SBT{this, "Insufficient storage for placement new", 59 BugType ABT{this, "Bad align storage for placement new",
|
H A D | VLASizeChecker.cpp | 37 const BugType BT{this, "Dangerous variable-length array (VLA) declaration"}; 38 const BugType TaintBT{this,
|
H A D | StringChecker.cpp | 26 BugType BT_Null{this, "Dereference of null pointer", categories::LogicError};
|
H A D | BoolAssignmentChecker.cpp | 27 const BugType BT{this, "Assignment of a non-Boolean value"};
|
H A D | BlockInCriticalSectionChecker.cpp | 181 const BugType BlockInCritSectionBugType{ 337 const BugType *BT = &this->BlockInCritSectionBugType; in createCritSectionNote()
|
H A D | ChrootChecker.cpp | 44 const BugType BT_BreakJail{this, "Break out of jail"};
|
H A D | DebugContainerModeling.cpp | 31 const BugType DebugMsgBugType{this, "Checking analyzer assumptions", "debug",
|
/freebsd/contrib/llvm-project/clang/lib/Analysis/plugins/SampleAnalyzer/ |
H A D | MainCallChecker.cpp | 11 mutable std::unique_ptr<BugType> BT; 37 BT.reset(new BugType(this, "call to main", "example analyzer plugin")); in checkPreStmt()
|
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker/ |
H A D | RetainCountDiagnostics.h | 27 class RefCountBug : public BugType {
|
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/WebKit/ |
H A D | UncountedLambdaCapturesChecker.cpp | 26 BugType Bug{this, "Lambda capture of uncounted variable",
|
H A D | NoUncountedMembersChecker.cpp | 31 BugType Bug;
|