Searched refs:CheckNames (Results 1 - 5 of 5) sorted by relevance
/freebsd-current/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
H A D | ValistChecker.cpp | 50 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1043::ValistChecker 255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], 277 new BugType(CheckNames[CK_Unterminated].getName().empty() 278 ? CheckNames[CK_Uninitialized] 279 : CheckNames[CK_Unterminated], 415 checker->CheckNames[ValistChecker::CK_##name] = \
|
H A D | PthreadLockChecker.cpp | 82 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon888::PthreadLockChecker 237 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); 239 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); 241 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); 243 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); 244 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], 710 checker->CheckNames[PthreadLockChecker::CK_##name] = \
|
H A D | StackAddrEscapeChecker.cpp | 46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon985::StackAddrEscapeChecker 158 CheckNames[CK_StackAddrEscapeChecker], 198 CheckNames[CK_StackAddrAsyncEscapeChecker], 222 CheckNames[CK_StackAddrEscapeChecker], 368 std::make_unique<BugType>(CheckNames[CK_StackAddrEscapeChecker], 436 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
|
H A D | NullabilityChecker.cpp | 125 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon966::NullabilityChecker 130 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", 1400 checker->CheckNames[NullabilityChecker::CK_##name] = \
|
H A D | MallocChecker.cpp | 331 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon954::MallocChecker 2223 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); 2271 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); 2296 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], 2359 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); 2413 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); 2452 CheckNames[*CheckKind], "Double free", categories::MemoryError)); 2481 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], 2510 new BugType(CheckNames[*CheckKind], "Use of zero allocated", 2542 CheckNames[*CheckKin [all...] |
Completed in 137 milliseconds