/external/clang/lib/StaticAnalyzer/Checkers/ |
FixedAddressChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 55 if (!BT) 56 BT.reset(new BuiltinBug("Use fixed address", 60 RangedBugReport *R = new RangedBugReport(*BT, BT->getDescription(), N);
|
ReturnUndefChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 49 if (!BT) 50 BT.reset(new BuiltinBug("Garbage return value", 54 new EnhancedBugReport(*BT, BT->getDescription(), N);
|
UndefinedArraySubscriptChecker.cpp | 27 mutable llvm::OwningPtr<BugType> BT; 39 if (!BT) 40 BT.reset(new BuiltinBug("Array subscript is undefined")); 43 EnhancedBugReport *R = new EnhancedBugReport(*BT, BT->getName(), N);
|
ArrayBoundChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 67 if (!BT) 68 BT.reset(new BuiltinBug("Out-of-bound array access", 77 new RangedBugReport(*BT, BT->getDescription(), N);
|
CastToStructChecker.cpp | 27 mutable llvm::OwningPtr<BuiltinBug> BT; 60 if (!BT) 61 BT.reset(new BuiltinBug("Cast from non-struct type to struct type", 65 RangedBugReport *R = new RangedBugReport(*BT,BT->getDescription(), N);
|
DivZeroChecker.cpp | 26 mutable llvm::OwningPtr<BuiltinBug> BT; 60 if (!BT) 61 BT.reset(new BuiltinBug("Division by zero")); 64 new EnhancedBugReport(*BT, BT->getDescription(), N);
|
PointerArithChecker.cpp | 27 mutable llvm::OwningPtr<BuiltinBug> BT; 54 if (!BT) 55 BT.reset(new BuiltinBug("Dangerous pointer arithmetic", 59 RangedBugReport *R = new RangedBugReport(*BT, BT->getDescription(), N);
|
PointerSubChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 63 if (!BT) 64 BT.reset(new BuiltinBug("Pointer subtraction", 67 RangedBugReport *R = new RangedBugReport(*BT, BT->getDescription(), N);
|
ReturnPointerRangeChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Return of pointer value outside of expected range", 82 new RangedBugReport(*BT, BT->getDescription(), N);
|
UndefResultChecker.cpp | 29 mutable llvm::OwningPtr<BugType> BT; 45 if (!BT) 46 BT.reset(new BuiltinBug("Result of operation is garbage or undefined")); 74 EnhancedBugReport *report = new EnhancedBugReport(*BT, OS.str(), N);
|
UndefinedAssignmentChecker.cpp | 27 mutable llvm::OwningPtr<BugType> BT; 46 if (!BT) 47 BT.reset(new BuiltinBug(str)); 77 EnhancedBugReport *R = new EnhancedBugReport(*BT, str, N);
|
CastSizeChecker.cpp | 26 mutable llvm::OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Cast region with wrong size.", 75 RangedBugReport *R = new RangedBugReport(*BT, BT->getDescription(),
|
UndefCapturedBlockVarChecker.cpp | 28 mutable llvm::OwningPtr<BugType> BT; 80 if (!BT) 81 BT.reset(new BuiltinBug("uninitialized variable captured by block")); 90 EnhancedBugReport *R = new EnhancedBugReport(*BT, os.str(), N);
|
UndefBranchChecker.cpp | 27 mutable llvm::OwningPtr<BuiltinBug> BT; 68 if (!BT) 69 BT.reset( 102 EnhancedBugReport *R = new EnhancedBugReport(*BT, BT->getDescription(),N);
|
CallAndMessageChecker.cpp | 42 const char *BT_desc, llvm::OwningPtr<BugType> &BT); 44 const Expr *argEx, const char *BT_desc, llvm::OwningPtr<BugType> &BT); 46 static void EmitBadCall(BugType *BT, CheckerContext &C, const CallExpr *CE); 53 static void LazyInit_BT(const char *desc, llvm::OwningPtr<BugType> &BT) { 54 if (!BT) 55 BT.reset(new BuiltinBug(desc)); 60 void CallAndMessageChecker::EmitBadCall(BugType *BT, CheckerContext &C, 66 EnhancedBugReport *R = new EnhancedBugReport(*BT, BT->getName(), N); 75 llvm::OwningPtr<BugType> &BT) { [all...] |
AttrNonNullChecker.cpp | 27 mutable llvm::OwningPtr<BugType> BT; 99 if (!BT) 100 BT.reset(new BugType("Argument with 'nonnull' attribute passed null", 104 new EnhancedBugReport(*BT,
|
AdjustedReturnValueChecker.cpp | 65 const BlockPointerType *BT=BR->getLocationType()->getAs<BlockPointerType>(); 66 const FunctionType *FT = BT->getPointeeType()->getAs<FunctionType>();
|
BasicObjCFoundationChecks.cpp | 72 mutable llvm::OwningPtr<APIMisuse> BT; 86 if (!BT) 87 BT.reset(new APIMisuse("nil argument")); 95 RangedBugReport *R = new RangedBugReport(*BT, os.str(), N); 143 mutable llvm::OwningPtr<APIMisuse> BT; 335 if (!BT) 336 BT.reset(new APIMisuse("Bad use of CFNumberCreate")); 338 RangedBugReport *report = new RangedBugReport(*BT, os.str(), N); 350 mutable llvm::OwningPtr<APIMisuse> BT; 373 if (!BT) { [all...] |
UnixAPIChecker.cpp | 50 static inline void LazyInitialize(llvm::OwningPtr<BugType> &BT, 52 if (BT) 54 BT.reset(new BugType(name, "Unix API"));
|
ArrayBoundCheckerV2.cpp | 29 mutable llvm::OwningPtr<BuiltinBug> BT; 178 if (!BT) 179 BT.reset(new BuiltinBug("Out-of-bound access")); 190 checkerContext.EmitReport(new RangedBugReport(*BT, os.str(), errorNode));
|
/external/clang/lib/Serialization/ |
ASTCommon.h | 31 TypeIdx TypeIdxFromBuiltin(const BuiltinType *BT); 46 if (const BuiltinType *BT = dyn_cast<BuiltinType>(T.getTypePtr())) 47 return TypeIdxFromBuiltin(BT).asTypeID(FastQuals);
|
ASTCommon.cpp | 25 serialization::TypeIdxFromBuiltin(const BuiltinType *BT) { 27 switch (BT->getKind()) {
|
/frameworks/base/libs/rs/ |
rsScriptC.cpp | 36 BT = NULL; 42 if (BT) { 43 delete BT; 44 BT = NULL; 200 if (BT) { 201 delete BT; 203 BT = new bcinfo::BitcodeTranslator((const char *)bitcode, bitcodeLen, 205 if (!BT->translate()) { 207 delete BT; 208 BT = NULL [all...] |
/external/clang/lib/AST/ |
Type.cpp | 293 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 294 return BT->getKind() == BuiltinType::Void; 539 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 540 return BT->getKind() >= BuiltinType::Bool && 541 BT->getKind() <= BuiltinType::Int128; 576 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 577 return BT->getKind() >= BuiltinType::Bool && 578 BT->getKind() <= BuiltinType::Int128; 588 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 589 return BT->getKind() >= BuiltinType::Bool & [all...] |
/frameworks/compile/libbcc/bcinfo/tools/ |
main.cpp | 171 bcinfo::BitcodeTranslator *BT = 173 if (!BT->translate()) { 179 new bcinfo::MetadataExtractor(BT->getTranslatedBitcode(), 180 BT->getTranslatedBitcodeSize()); 189 delete BT;
|