Searched refs:CheckNames (Results 1 - 5 of 5) sorted by relevance

/freebsd-current/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/
H A DValistChecker.cpp50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1043::ValistChecker
255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized],
277 new BugType(CheckNames[CK_Unterminated].getName().empty()
278 ? CheckNames[CK_Uninitialized]
279 : CheckNames[CK_Unterminated],
415 checker->CheckNames[ValistChecker::CK_##name] = \
H A DPthreadLockChecker.cpp82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon888::PthreadLockChecker
237 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"});
239 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"});
241 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"});
243 CheckNames[CheckKind], "Init invalid lock", "Lock checker"});
244 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind],
710 checker->CheckNames[PthreadLockChecker::CK_##name] = \
H A DStackAddrEscapeChecker.cpp46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon985::StackAddrEscapeChecker
158 CheckNames[CK_StackAddrEscapeChecker],
198 CheckNames[CK_StackAddrAsyncEscapeChecker],
222 CheckNames[CK_StackAddrEscapeChecker],
368 std::make_unique<BugType>(CheckNames[CK_StackAddrEscapeChecker],
436 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
H A DNullabilityChecker.cpp125 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon966::NullabilityChecker
130 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability",
1400 checker->CheckNames[NullabilityChecker::CK_##name] = \
H A DMallocChecker.cpp331 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon954::MallocChecker
2223 CheckNames[*CheckKind], "Bad free", categories::MemoryError));
2271 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError));
2296 new BugType(CheckNames[CK_MismatchedDeallocatorChecker],
2359 CheckNames[*CheckKind], "Offset free", categories::MemoryError));
2413 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError));
2452 CheckNames[*CheckKind], "Double free", categories::MemoryError));
2481 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker],
2510 new BugType(CheckNames[*CheckKind], "Use of zero allocated",
2542 CheckNames[*CheckKin
[all...]

Completed in 137 milliseconds