Searched refs:CheckNames (Results 1 - 6 of 6) sorted by relevance
/netbsd-current/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/ |
H A D | ValistChecker.cpp | 49 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1072::ValistChecker 255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], 277 new BugType(CheckNames[CK_Unterminated].getName().empty() 278 ? CheckNames[CK_Uninitialized] 279 : CheckNames[CK_Unterminated], 415 checker->CheckNames[ValistChecker::CK_##name] = \
|
H A D | StackAddrEscapeChecker.cpp | 46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1052::StackAddrEscapeChecker 160 CheckNames[CK_StackAddrEscapeChecker], 200 CheckNames[CK_StackAddrAsyncEscapeChecker], 224 CheckNames[CK_StackAddrEscapeChecker], 340 CheckNames[CK_StackAddrEscapeChecker], 381 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
|
H A D | PthreadLockChecker.cpp | 81 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1040::PthreadLockChecker 236 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); 238 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); 240 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); 242 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); 243 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], 710 checker->CheckNames[PthreadLockChecker::CK_##name] = \
|
H A D | NullabilityChecker.cpp | 119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1018::NullabilityChecker 124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", 1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
|
H A D | MallocChecker.cpp | 318 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1001::MallocChecker 2015 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); 2063 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); 2088 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], 2151 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); 2205 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); 2244 CheckNames[*CheckKind], "Double free", categories::MemoryError)); 2273 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], 2302 new BugType(CheckNames[*CheckKind], "Use of zero allocated", 2333 CheckNames[*CheckKin [all...] |
H A D | StdLibraryFunctionsChecker.cpp | 567 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in class:__anon1053::StdLibraryFunctionsChecker 591 CheckNames[CK_StdCLibraryFunctionArgsChecker], 2665 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \
|
Completed in 235 milliseconds