Searched refs:CheckNames (Results 1 – 4 of 4) sorted by relevance
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
H A D | ValistChecker.cpp | 50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonfee4e6f60111::ValistChecker 254 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess() 276 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists() 277 ? CheckNames[CK_Uninitialized] in reportLeakedVALists() 278 : CheckNames[CK_Unterminated], in reportLeakedVALists() 414 checker->CheckNames[ValistChecker::CK_##name] = \
|
H A D | PthreadLockChecker.cpp | 82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonba8256140111::PthreadLockChecker 270 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType() 272 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType() 274 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType() 276 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType() 277 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType() 739 checker->CheckNames[PthreadLockChecker::CK_##name] = \
|
H A D | MallocChecker.cpp | 332 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon0957485b0411::MallocChecker 1702 BT_TaintedAlloc.reset(new BugType(CheckNames[CK_TaintedAllocChecker], in reportTaintBug() 2271 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc() 2319 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca() 2344 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc() 2407 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree() 2461 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); in HandleUseAfterFree() 2500 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree() 2529 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete() 2558 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc() [all …]
|
H A D | NullabilityChecker.cpp | 125 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon414b416c0111::NullabilityChecker 130 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType() 1401 checker->CheckNames[NullabilityChecker::CK_##name] = \
|