Home
last modified time | relevance | path

Searched refs:BugType (Results 1 – 25 of 55) sorted by relevance

123

/freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Core/BugReporter/
H A DBugReporter.h57 class BugType; variable
128 const BugType& BT;
136 BugReport(Kind kind, const BugType &bt, StringRef desc) in BugReport()
139 BugReport(Kind K, const BugType &BT, StringRef ShortDescription, in BugReport()
149 const BugType& getBugType() const { return BT; } in getBugType()
256 BasicBugReport(const BugType &bt, StringRef desc, PathDiagnosticLocation l) in BasicBugReport()
369 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport()
373 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc, in PathSensitiveBugReport()
386 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport()
393 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc,
[all …]
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DPthreadLockChecker.cpp204 void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[],
260 mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds];
261 mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds];
262 mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds];
263 mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds];
264 mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds];
270 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType()
272 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType()
273 BT_destroylock[CheckKind].reset(new BugType{ in initBugType()
275 BT_initlock[CheckKind].reset(new BugType{ in initBugType()
[all …]
H A DSmartPtrChecker.cpp33 static const BugType *NullDereferenceBugTypePtr;
38 BugType NullDereferenceBugType{this, "Null SmartPtr dereference",
54 const BugType *getNullDereferenceBugType() { return NullDereferenceBugTypePtr; } in getNullDereferenceBugType()
H A DUnixAPIChecker.cpp47 const BugType BT_open{this, "Improper use of 'open'", categories::UnixAPI};
48 const BugType BT_getline{this, "Improper use of getdelim",
50 const BugType BT_pthreadOnce{this, "Improper use of 'pthread_once'",
52 const BugType BT_ArgumentNull{this, "NULL pointer", categories::UnixAPI};
58 std::optional<std::reference_wrapper<const BugType>> BT =
88 const BugType BT_mallocZero{
116 std::optional<std::reference_wrapper<const BugType>> BT) const { in EnsurePtrNotNull()
H A DDereferenceChecker.cpp36 BugType BT_Null{this, "Dereference of null pointer", categories::LogicError};
37 BugType BT_Undef{this, "Dereference of undefined pointer value",
39 BugType BT_Label{this, "Dereference of the address of a label",
158 const BugType *BT = nullptr; in reportBug()
H A DSmartPtr.h31 const BugType *getNullDereferenceBugType();
H A DSimpleStreamChecker.cpp58 const BugType DoubleCloseBugType{this, "Double fclose",
60 const BugType LeakBugType{this, "Resource Leak", "Unix Stream API Error",
H A DCXXDeleteChecker.cpp69 const BugType BT{
79 const BugType BT{this,
H A DMallocChecker.cpp360 mutable std::unique_ptr<BugType> BT_DoubleFree[CK_NumCheckKinds];
361 mutable std::unique_ptr<BugType> BT_DoubleDelete;
362 mutable std::unique_ptr<BugType> BT_Leak[CK_NumCheckKinds];
363 mutable std::unique_ptr<BugType> BT_UseFree[CK_NumCheckKinds];
364 mutable std::unique_ptr<BugType> BT_BadFree[CK_NumCheckKinds];
365 mutable std::unique_ptr<BugType> BT_FreeAlloca[CK_NumCheckKinds];
366 mutable std::unique_ptr<BugType> BT_MismatchedDealloc;
367 mutable std::unique_ptr<BugType> BT_OffsetFree[CK_NumCheckKinds];
368 mutable std::unique_ptr<BugType> BT_UseZerroAllocated[CK_NumCheckKinds];
369 mutable std::unique_ptr<BugType> BT_TaintedAlloc;
[all …]
H A DErrnoChecker.cpp57 BugType BT_InvalidErrnoRead{this, "Value of 'errno' could be undefined",
59 BugType BT_ErrnoNotChecked{this, "Value of 'errno' was not checked",
H A DPutenvStackArrayChecker.cpp31 BugType BT{this, "'putenv' called with stack-allocated string",
H A DValistChecker.cpp32 mutable std::unique_ptr<BugType> BT_leakedvalist, BT_uninitaccess;
254 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess()
276 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
H A DUndefinedNewArraySizeChecker.cpp28 BugType BT{this, "Undefined array element count in new[]",
H A DMmapWriteExecChecker.cpp35 const BugType BT{this, "W^X check fails, Write Exec prot flags set",
H A DCheckPlacementNew.cpp57 BugType SBT{this, "Insufficient storage for placement new",
59 BugType ABT{this, "Bad align storage for placement new",
H A DVLASizeChecker.cpp37 const BugType BT{this, "Dangerous variable-length array (VLA) declaration"};
38 const BugType TaintBT{this,
H A DStringChecker.cpp26 BugType BT_Null{this, "Dereference of null pointer", categories::LogicError};
H A DBoolAssignmentChecker.cpp27 const BugType BT{this, "Assignment of a non-Boolean value"};
H A DBlockInCriticalSectionChecker.cpp181 const BugType BlockInCritSectionBugType{
337 const BugType *BT = &this->BlockInCritSectionBugType; in createCritSectionNote()
H A DChrootChecker.cpp44 const BugType BT_BreakJail{this, "Break out of jail"};
H A DDebugContainerModeling.cpp31 const BugType DebugMsgBugType{this, "Checking analyzer assumptions", "debug",
/freebsd/contrib/llvm-project/clang/lib/Analysis/plugins/SampleAnalyzer/
H A DMainCallChecker.cpp11 mutable std::unique_ptr<BugType> BT;
37 BT.reset(new BugType(this, "call to main", "example analyzer plugin")); in checkPreStmt()
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/RetainCountChecker/
H A DRetainCountDiagnostics.h27 class RefCountBug : public BugType {
/freebsd/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/WebKit/
H A DUncountedLambdaCapturesChecker.cpp26 BugType Bug{this, "Lambda capture of uncounted variable",
H A DNoUncountedMembersChecker.cpp31 BugType Bug;

123