Searched refs:CheckNames (Results 1 - 6 of 6) sorted by relevance

/netbsd-current/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/
H A DValistChecker.cpp49 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1072::ValistChecker
255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized],
277 new BugType(CheckNames[CK_Unterminated].getName().empty()
278 ? CheckNames[CK_Uninitialized]
279 : CheckNames[CK_Unterminated],
415 checker->CheckNames[ValistChecker::CK_##name] = \
H A DStackAddrEscapeChecker.cpp46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1052::StackAddrEscapeChecker
160 CheckNames[CK_StackAddrEscapeChecker],
200 CheckNames[CK_StackAddrAsyncEscapeChecker],
224 CheckNames[CK_StackAddrEscapeChecker],
340 CheckNames[CK_StackAddrEscapeChecker],
381 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
H A DPthreadLockChecker.cpp81 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1040::PthreadLockChecker
236 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"});
238 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"});
240 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"});
242 CheckNames[CheckKind], "Init invalid lock", "Lock checker"});
243 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind],
710 checker->CheckNames[PthreadLockChecker::CK_##name] = \
H A DNullabilityChecker.cpp119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1018::NullabilityChecker
124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability",
1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
H A DMallocChecker.cpp318 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1001::MallocChecker
2015 CheckNames[*CheckKind], "Bad free", categories::MemoryError));
2063 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError));
2088 new BugType(CheckNames[CK_MismatchedDeallocatorChecker],
2151 CheckNames[*CheckKind], "Offset free", categories::MemoryError));
2205 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError));
2244 CheckNames[*CheckKind], "Double free", categories::MemoryError));
2273 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker],
2302 new BugType(CheckNames[*CheckKind], "Use of zero allocated",
2333 CheckNames[*CheckKin
[all...]
H A DStdLibraryFunctionsChecker.cpp567 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1053::StdLibraryFunctionsChecker
591 CheckNames[CK_StdCLibraryFunctionArgsChecker],
2665 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \

Completed in 235 milliseconds