| /freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
| H A D | CallAndMessageChecker.cpp | 34 mutable std::unique_ptr<BugType> BT_call_null; 35 mutable std::unique_ptr<BugType> BT_call_undef; 36 mutable std::unique_ptr<BugType> BT_cxx_call_null; 37 mutable std::unique_ptr<BugType> BT_cxx_call_undef; 38 mutable std::unique_ptr<BugType> BT_call_arg; 39 mutable std::unique_ptr<BugType> BT_cxx_delete_undef; 40 mutable std::unique_ptr<BugType> BT_msg_undef; 41 mutable std::unique_ptr<BugType> BT_objc_prop_undef; 42 mutable std::unique_ptr<BugType> BT_objc_subscript_undef; 43 mutable std::unique_ptr<BugType> BT_msg_arg; [all …]
|
| H A D | DereferenceChecker.cpp | 58 std::unique_ptr<BugType> BT_Null; 59 std::unique_ptr<BugType> BT_Undef; 60 std::unique_ptr<BugType> BT_Label; 61 std::unique_ptr<BugType> BT_FixedAddress; 163 const BugType *BT = nullptr; in reportBug() 406 Chk->BT_Null.reset(new BugType(Mgr.getCurrentCheckerName(), in registerNullDereferenceChecker() 409 Chk->BT_Undef.reset(new BugType(Mgr.getCurrentCheckerName(), in registerNullDereferenceChecker() 412 Chk->BT_Label.reset(new BugType(Mgr.getCurrentCheckerName(), in registerNullDereferenceChecker() 424 Chk->BT_FixedAddress.reset(new BugType(Mgr.getCurrentCheckerName(), in registerFixedAddressDereferenceChecker()
|
| H A D | PthreadLockChecker.cpp | 204 void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[], 260 mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds]; 261 mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds]; 262 mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds]; 263 mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds]; 264 mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds]; 270 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType() 272 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType() 273 BT_destroylock[CheckKind].reset(new BugType{ in initBugType() 275 BT_initlock[CheckKind].reset(new BugType{ in initBugType() [all …]
|
| H A D | SmartPtrChecker.cpp | 29 static const BugType *NullDereferenceBugTypePtr; 34 BugType NullDereferenceBugType{this, "Null SmartPtr dereference", 50 const BugType *getNullDereferenceBugType() { return NullDereferenceBugTypePtr; } in getNullDereferenceBugType()
|
| H A D | NSErrorChecker.cpp | 146 class NSErrorDerefBug : public BugType { 149 : BugType(Checker, "NSError** null dereference", in NSErrorDerefBug() 153 class CFErrorDerefBug : public BugType { 156 : BugType(Checker, "CFErrorRef* null dereference", in CFErrorDerefBug() 277 BugType *bug = nullptr; in checkEvent()
|
| H A D | DeadStoresChecker.cpp | 211 const char *BugType = nullptr; in Report() local 217 BugType = "Dead initialization"; in Report() 241 BugType = "Dead increment"; in Report() 244 if (!BugType) BugType = "Dead assignment"; in Report() 252 BugType = "Dead nested assignment"; in Report() 260 BR.EmitBasicReport(AC->getDecl(), Checker, BugType, categories::UnusedCode, in Report()
|
| H A D | UnixAPIChecker.cpp | 57 const BugType BT_open{this, "Improper use of 'open'", categories::UnixAPI}; 58 const BugType BT_getline{this, "Improper use of getdelim", 60 const BugType BT_pthreadOnce{this, "Improper use of 'pthread_once'", 62 const BugType BT_ArgumentNull{this, "NULL pointer", categories::UnixAPI}; 68 std::optional<std::reference_wrapper<const BugType>> BT = 101 const BugType BT_mallocZero{ 129 std::optional<std::reference_wrapper<const BugType>> BT) const { in EnsurePtrNotNull()
|
| H A D | StackAddrEscapeChecker.cpp | 34 mutable std::unique_ptr<BugType> BT_stackleak; 35 mutable std::unique_ptr<BugType> BT_returnstack; 36 mutable std::unique_ptr<BugType> BT_capturedstackasync; 37 mutable std::unique_ptr<BugType> BT_capturedstackret; 174 BT_returnstack = std::make_unique<BugType>( in EmitReturnLeakError() 219 BT_capturedstackasync = std::make_unique<BugType>( in checkAsyncExecutedBlockCaptures() 586 std::make_unique<BugType>(CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction()
|
| H A D | SmartPtr.h | 31 const BugType *getNullDereferenceBugType();
|
| H A D | BitwiseShiftChecker.cpp | 55 const BugType &BT; 66 const BugType &B, bool P) in BitwiseShiftValidator() 346 BugType BT{this, "Bitwise shift", "Suspicious operation"};
|
| H A D | SimpleStreamChecker.cpp | 58 const BugType DoubleCloseBugType{this, "Double fclose", 60 const BugType LeakBugType{this, "Resource Leak", "Unix Stream API Error",
|
| H A D | CXXDeleteChecker.cpp | 65 const BugType BT{ 75 const BugType BT{this,
|
| H A D | ErrnoChecker.cpp | 56 BugType BT_InvalidErrnoRead{this, "Value of 'errno' could be undefined", 58 BugType BT_ErrnoNotChecked{this, "Value of 'errno' was not checked",
|
| H A D | FixedAddressChecker.cpp | 27 const BugType BT{this, "Use fixed address"};
|
| H A D | PutenvStackArrayChecker.cpp | 30 BugType BT{this, "'putenv' called with stack-allocated string",
|
| H A D | NonNullParamChecker.cpp | 34 const BugType BTAttrNonNull{ 36 const BugType BTNullRefArg{this, "Dereference of null pointer"};
|
| H A D | ValistChecker.cpp | 32 mutable std::unique_ptr<BugType> BT_leakedvalist, BT_uninitaccess; 254 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess() 275 BT_leakedvalist.reset(new BugType( in reportLeakedVALists()
|
| H A D | UndefinedNewArraySizeChecker.cpp | 28 BugType BT{this, "Undefined array element count in new[]",
|
| H A D | MmapWriteExecChecker.cpp | 33 const BugType BT{this, "W^X check fails, Write Exec prot flags set",
|
| H A D | VLASizeChecker.cpp | 35 const BugType BT{this, "Dangerous variable-length array (VLA) declaration"}; 36 const BugType TaintBT{this,
|
| /freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
| H A D | BugType.h | 28 class BugType { 45 BugType(CheckerNameRef CheckerName, StringRef Desc, 52 BugType(const CheckerFrontend *Checker, StringRef Desc, 56 virtual ~BugType() = default; 80 class CheckerFrontendWithBugType : public CheckerFrontend, public BugType { 85 : BugType(this, Desc, Cat, SuppressOnSink) {} in BugType() function
|
| H A D | BugReporter.h | 57 class BugType; variable 128 const BugType& BT; 136 BugReport(Kind kind, const BugType &bt, StringRef desc) in BugReport() 139 BugReport(Kind K, const BugType &BT, StringRef ShortDescription, in BugReport() 149 const BugType& getBugType() const { return BT; } in getBugType() 256 BasicBugReport(const BugType &bt, StringRef desc, PathDiagnosticLocation l) in BasicBugReport() 369 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport() 373 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc, in PathSensitiveBugReport() 386 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport() 393 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc, [all …]
|
| /freebsd/contrib/llvm-project/clang/lib/Analysis/plugins/SampleAnalyzer/ |
| H A D | MainCallChecker.cpp | 11 mutable std::unique_ptr<BugType> BT; 37 BT.reset(new BugType(this, "call to main", "example analyzer plugin")); in checkPreStmt()
|
| /freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/WebKit/ |
| H A D | MemoryUnsafeCastChecker.cpp | 32 BugType BT{this, "Unsafe cast", "WebKit coding guidelines"}; 43 const BugType &BT) { in emitDiagnostics() 63 const BugType &BT) { in emitDiagnosticsUnrelated()
|
| /freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker/ |
| H A D | RetainCountDiagnostics.h | 27 class RefCountBug : public BugType {
|