Home
last modified time | relevance | path

Searched refs:CheckNames (Results 1 – 11 of 11) sorted by relevance

/external/llvm-project/clang/lib/StaticAnalyzer/Checkers/
DStackAddrEscapeChecker.cpp46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon9ac71c550111::StackAddrEscapeChecker
160 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError()
200 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures()
224 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures()
340 CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction()
381 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
DValistChecker.cpp49 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon12af05e60111::ValistChecker
255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess()
277 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists()
278 ? CheckNames[CK_Uninitialized] in reportLeakedVALists()
279 : CheckNames[CK_Unterminated], in reportLeakedVALists()
415 checker->CheckNames[ValistChecker::CK_##name] = \
DPthreadLockChecker.cpp81 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anone7254b040111::PthreadLockChecker
236 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType()
238 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType()
240 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType()
242 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType()
243 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType()
699 checker->CheckNames[PthreadLockChecker::CK_##name] = \
DMallocChecker.cpp318 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon1d21674b0411::MallocChecker
2078 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc()
2126 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca()
2151 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc()
2214 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree()
2268 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); in HandleUseAfterFree()
2307 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree()
2336 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete()
2365 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc()
2396 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree()
[all …]
DNullabilityChecker.cpp119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon6dee365c0111::NullabilityChecker
124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType()
1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
DStdLibraryFunctionsChecker.cpp527 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anoncc76828c0111::StdLibraryFunctionsChecker
551 CheckNames[CK_StdCLibraryFunctionArgsChecker], in reportBug()
2509 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \
/external/llvm-project/clang-tools-extra/clang-tidy/
DClangTidy.cpp453 std::vector<std::string> CheckNames; in getCheckNames() local
456 CheckNames.emplace_back(CheckFactory.getKey()); in getCheckNames()
462 CheckNames.push_back(AnalyzerCheckNamePrefix + AnalyzerCheck.first); in getCheckNames()
465 llvm::sort(CheckNames); in getCheckNames()
466 return CheckNames; in getCheckNames()
/external/cldr/tools/java/org/unicode/cldr/test/
DCheckNames.java10 public class CheckNames extends CheckCLDR { class
DCheckCLDR.java577 .add(new CheckNames()) in getCheckAll()
/external/clang/lib/StaticAnalyzer/Checkers/
DMallocChecker.cpp199 CheckName CheckNames[CK_NumCheckKinds]; member in __anone8977cbd0111::MallocChecker
1614 new BugType(CheckNames[*CheckKind], "Bad free", "Memory Error")); in ReportBadFree()
1659 new BugType(CheckNames[*CheckKind], "Free alloca()", "Memory Error")); in ReportFreeAlloca()
1683 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in ReportMismatchedDealloc()
1745 new BugType(CheckNames[*CheckKind], "Offset free", "Memory Error")); in ReportOffsetFree()
1796 CheckNames[*CheckKind], "Use-after-free", "Memory Error")); in ReportUseAfterFree()
1823 new BugType(CheckNames[*CheckKind], "Double free", "Memory Error")); in ReportDoubleFree()
1850 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in ReportDoubleDelete()
1878 CheckNames[*CheckKind], "Use of zero allocated", "Memory Error")); in ReportUseZeroAllocated()
2081 new BugType(CheckNames[*CheckKind], "Memory leak", "Memory Error")); in reportLeak()
[all …]
/external/cldr/tools/cldr-unittest/src/org/unicode/cldr/unittest/
DTestCheckCLDR.java28 import org.unicode.cldr.test.CheckNames;
452 CheckCLDR c = new CheckNames(); in TestCheckNames()