Home
last modified time | relevance | path

Searched refs:CheckNames (Results 1 – 4 of 4) sorted by relevance

/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DValistChecker.cpp50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonfee4e6f60111::ValistChecker
254 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess()
276 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
277 ? CheckNames[CK_Uninitialized] in reportLeakedVALists()
278 : CheckNames[CK_Unterminated], in reportLeakedVALists()
414 checker->CheckNames[ValistChecker::CK_##name] = \
H A DPthreadLockChecker.cpp82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonba8256140111::PthreadLockChecker
270 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType()
272 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType()
274 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType()
276 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType()
277 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType()
739 checker->CheckNames[PthreadLockChecker::CK_##name] = \
H A DMallocChecker.cpp332 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon0957485b0411::MallocChecker
1702 BT_TaintedAlloc.reset(new BugType(CheckNames[CK_TaintedAllocChecker], in reportTaintBug()
2271 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc()
2319 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca()
2344 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc()
2407 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree()
2461 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); in HandleUseAfterFree()
2500 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree()
2529 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete()
2558 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc()
[all …]
H A DNullabilityChecker.cpp125 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon414b416c0111::NullabilityChecker
130 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType()
1401 checker->CheckNames[NullabilityChecker::CK_##name] = \