Home
last modified time | relevance | path

Searched refs:CheckNames (Results 1 – 5 of 5) sorted by relevance

/src/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DStackAddrEscapeChecker.cpp46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon232ec35a0111::StackAddrEscapeChecker
158 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError()
198 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures()
222 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures()
368 std::make_unique<BugType>(CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction()
436 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
H A DValistChecker.cpp50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon597dcb4b0111::ValistChecker
254 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess()
276 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
277 ? CheckNames[CK_Uninitialized] in reportLeakedVALists()
278 : CheckNames[CK_Unterminated], in reportLeakedVALists()
414 checker->CheckNames[ValistChecker::CK_##name] = \
H A DPthreadLockChecker.cpp82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon129037890111::PthreadLockChecker
270 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType()
272 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType()
274 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType()
276 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType()
277 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType()
739 checker->CheckNames[PthreadLockChecker::CK_##name] = \
H A DMallocChecker.cpp332 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon63f02cb00411::MallocChecker
1702 BT_TaintedAlloc.reset(new BugType(CheckNames[CK_TaintedAllocChecker], in reportTaintBug()
2271 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc()
2319 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca()
2344 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc()
2407 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree()
2461 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); in HandleUseAfterFree()
2500 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree()
2529 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete()
2558 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc()
[all …]
H A DNullabilityChecker.cpp125 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon995922e10111::NullabilityChecker
130 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType()
1401 checker->CheckNames[NullabilityChecker::CK_##name] = \