/external/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
D | StackAddrEscapeChecker.cpp | 46 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anond1544cfc0111::StackAddrEscapeChecker 160 CheckNames[CK_StackAddrEscapeChecker], in EmitStackError() 200 CheckNames[CK_StackAddrAsyncEscapeChecker], in checkAsyncExecutedBlockCaptures() 224 CheckNames[CK_StackAddrEscapeChecker], in checkReturnedBlockCaptures() 340 CheckNames[CK_StackAddrEscapeChecker], in checkEndFunction() 381 Chk->CheckNames[StackAddrEscapeChecker::CK_##name] = \
|
D | ValistChecker.cpp | 49 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon4f5966ad0111::ValistChecker 255 BT_uninitaccess.reset(new BugType(CheckNames[CK_Uninitialized], in reportUninitializedAccess() 277 new BugType(CheckNames[CK_Unterminated].getName().empty() in reportLeakedVALists() 278 ? CheckNames[CK_Uninitialized] in reportLeakedVALists() 279 : CheckNames[CK_Unterminated], in reportLeakedVALists() 415 checker->CheckNames[ValistChecker::CK_##name] = \
|
D | PthreadLockChecker.cpp | 81 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon5d7e402b0111::PthreadLockChecker 236 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType() 238 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType() 240 CheckNames[CheckKind], "Use destroyed lock", "Lock checker"}); in initBugType() 242 CheckNames[CheckKind], "Init invalid lock", "Lock checker"}); in initBugType() 243 BT_lor[CheckKind].reset(new BugType{CheckNames[CheckKind], in initBugType() 699 checker->CheckNames[PthreadLockChecker::CK_##name] = \
|
D | MallocChecker.cpp | 318 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anon59cbc8120411::MallocChecker 2078 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleNonHeapDealloc() 2126 CheckNames[*CheckKind], "Free alloca()", categories::MemoryError)); in HandleFreeAlloca() 2151 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in HandleMismatchedDealloc() 2214 CheckNames[*CheckKind], "Offset free", categories::MemoryError)); in HandleOffsetFree() 2268 CheckNames[*CheckKind], "Use-after-free", categories::MemoryError)); in HandleUseAfterFree() 2307 CheckNames[*CheckKind], "Double free", categories::MemoryError)); in HandleDoubleFree() 2336 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in HandleDoubleDelete() 2365 new BugType(CheckNames[*CheckKind], "Use of zero allocated", in HandleUseZeroAlloc() 2396 CheckNames[*CheckKind], "Bad free", categories::MemoryError)); in HandleFunctionPtrFree() [all …]
|
D | NullabilityChecker.cpp | 119 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anone4472b830111::NullabilityChecker 124 BTs[Kind].reset(new BugType(CheckNames[Kind], "Nullability", in getBugType() 1243 checker->CheckNames[NullabilityChecker::CK_##name] = \
|
D | StdLibraryFunctionsChecker.cpp | 527 CheckerNameRef CheckNames[CK_NumCheckKinds]; member in __anonf1e9aeb30111::StdLibraryFunctionsChecker 551 CheckNames[CK_StdCLibraryFunctionArgsChecker], in reportBug() 2509 checker->CheckNames[StdLibraryFunctionsChecker::CK_##name] = \
|
/external/llvm-project/clang-tools-extra/clang-tidy/ |
D | ClangTidy.cpp | 453 std::vector<std::string> CheckNames; in getCheckNames() local 456 CheckNames.emplace_back(CheckFactory.getKey()); in getCheckNames() 462 CheckNames.push_back(AnalyzerCheckNamePrefix + AnalyzerCheck.first); in getCheckNames() 465 llvm::sort(CheckNames); in getCheckNames() 466 return CheckNames; in getCheckNames()
|
/external/cldr/tools/java/org/unicode/cldr/test/ |
D | CheckNames.java | 10 public class CheckNames extends CheckCLDR { class
|
D | CheckCLDR.java | 577 .add(new CheckNames()) in getCheckAll()
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
D | MallocChecker.cpp | 199 CheckName CheckNames[CK_NumCheckKinds]; member in __anond5670e240111::MallocChecker 1614 new BugType(CheckNames[*CheckKind], "Bad free", "Memory Error")); in ReportBadFree() 1659 new BugType(CheckNames[*CheckKind], "Free alloca()", "Memory Error")); in ReportFreeAlloca() 1683 new BugType(CheckNames[CK_MismatchedDeallocatorChecker], in ReportMismatchedDealloc() 1745 new BugType(CheckNames[*CheckKind], "Offset free", "Memory Error")); in ReportOffsetFree() 1796 CheckNames[*CheckKind], "Use-after-free", "Memory Error")); in ReportUseAfterFree() 1823 new BugType(CheckNames[*CheckKind], "Double free", "Memory Error")); in ReportDoubleFree() 1850 BT_DoubleDelete.reset(new BugType(CheckNames[CK_NewDeleteChecker], in ReportDoubleDelete() 1878 CheckNames[*CheckKind], "Use of zero allocated", "Memory Error")); in ReportUseZeroAllocated() 2081 new BugType(CheckNames[*CheckKind], "Memory leak", "Memory Error")); in reportLeak() [all …]
|
/external/cldr/tools/cldr-unittest/src/org/unicode/cldr/unittest/ |
D | TestCheckCLDR.java | 28 import org.unicode.cldr.test.CheckNames; 452 CheckCLDR c = new CheckNames(); in TestCheckNames()
|