/external/clang/lib/StaticAnalyzer/Checkers/ |
UndefinedArraySubscriptChecker.cpp | 27 mutable llvm::OwningPtr<BugType> BT; 39 if (!BT) 40 BT.reset(new BuiltinBug("Array subscript is undefined")); 43 BugReport *R = new BugReport(*BT, BT->getName(), N);
|
FixedAddressChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 55 if (!BT) 56 BT.reset(new BuiltinBug("Use fixed address", 60 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
ReturnUndefChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 49 if (!BT) 50 BT.reset(new BuiltinBug("Garbage return value", 54 new BugReport(*BT, BT->getDescription(), N);
|
DivZeroChecker.cpp | 26 mutable llvm::OwningPtr<BuiltinBug> BT; 60 if (!BT) 61 BT.reset(new BuiltinBug("Division by zero")); 64 new BugReport(*BT, BT->getDescription(), N);
|
PointerArithChecker.cpp | 27 mutable llvm::OwningPtr<BuiltinBug> BT; 54 if (!BT) 55 BT.reset(new BuiltinBug("Dangerous pointer arithmetic", 59 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
UndefResultChecker.cpp | 29 mutable llvm::OwningPtr<BugType> BT; 45 if (!BT) 46 BT.reset(new BuiltinBug("Result of operation is garbage or undefined")); 74 BugReport *report = new BugReport(*BT, OS.str(), N);
|
UndefinedAssignmentChecker.cpp | 27 mutable llvm::OwningPtr<BugType> BT; 48 if (!BT) 49 BT.reset(new BuiltinBug(str)); 78 BugReport *R = new BugReport(*BT, str, N);
|
AdjustedReturnValueChecker.cpp | 65 const BlockPointerType *BT=BR->getLocationType()->getAs<BlockPointerType>(); 66 const FunctionType *FT = BT->getPointeeType()->getAs<FunctionType>();
|
ArrayBoundChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 68 if (!BT) 69 BT.reset(new BuiltinBug("Out-of-bound array access", 78 new BugReport(*BT, BT->getDescription(), N);
|
CastSizeChecker.cpp | 26 mutable llvm::OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Cast region with wrong size.", 75 BugReport *R = new BugReport(*BT, BT->getDescription(),
|
CastToStructChecker.cpp | 27 mutable llvm::OwningPtr<BuiltinBug> BT; 60 if (!BT) 61 BT.reset(new BuiltinBug("Cast from non-struct type to struct type", 65 BugReport *R = new BugReport(*BT,BT->getDescription(), N);
|
PointerSubChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 63 if (!BT) 64 BT.reset(new BuiltinBug("Pointer subtraction", 67 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
ReturnPointerRangeChecker.cpp | 28 mutable llvm::OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Return of pointer value outside of expected range", 82 new BugReport(*BT, BT->getDescription(), N);
|
UndefCapturedBlockVarChecker.cpp | 28 mutable llvm::OwningPtr<BugType> BT; 81 if (!BT) 82 BT.reset(new BuiltinBug("uninitialized variable captured by block")); 91 BugReport *R = new BugReport(*BT, os.str(), N);
|
AttrNonNullChecker.cpp | 27 mutable llvm::OwningPtr<BugType> BT; 99 if (!BT) 100 BT.reset(new BugType("Argument with 'nonnull' attribute passed null", 104 new BugReport(*BT, "Null pointer passed as an argument to a "
|
UndefBranchChecker.cpp | 27 mutable llvm::OwningPtr<BuiltinBug> BT; 74 if (!BT) 75 BT.reset( 106 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
ArrayBoundCheckerV2.cpp | 29 mutable llvm::OwningPtr<BuiltinBug> BT; 180 if (!BT) 181 BT.reset(new BuiltinBug("Out-of-bound access")); 192 checkerContext.EmitReport(new BugReport(*BT, os.str(), errorNode));
|
IdempotentOperationChecker.cpp | 345 BugType *BT = new BugType("Idempotent operation", "Dead code"); 415 BugReport *report = new BugReport(*BT, os.str(), *I);
|
BasicObjCFoundationChecks.cpp | 73 mutable llvm::OwningPtr<APIMisuse> BT; 87 if (!BT) 88 BT.reset(new APIMisuse("nil argument")); 96 BugReport *R = new BugReport(*BT, os.str(), N); 144 mutable llvm::OwningPtr<APIMisuse> BT; 336 if (!BT) 337 BT.reset(new APIMisuse("Bad use of CFNumberCreate")); 339 BugReport *report = new BugReport(*BT, os.str(), N); 351 mutable llvm::OwningPtr<APIMisuse> BT; 374 if (!BT) { [all...] |
/external/clang/examples/analyzer-plugin/ |
MainCallChecker.cpp | 11 mutable llvm::OwningPtr<BugType> BT; 36 if (!BT) 37 BT.reset(new BugType("call to main", "example analyzer plugin")); 39 BugReport *report = new BugReport(*BT, BT->getName(), N);
|
/frameworks/base/libs/rs/ |
rsScriptC.h | 69 bcinfo::BitcodeTranslator *BT;
|
/frameworks/compile/libbcc/bcinfo/tools/ |
main.cpp | 171 bcinfo::BitcodeTranslator *BT = 173 if (!BT->translate()) { 179 new bcinfo::MetadataExtractor(BT->getTranslatedBitcode(), 180 BT->getTranslatedBitcodeSize()); 189 delete BT;
|
/external/clang/lib/Analysis/ |
PrintfFormatString.cpp | 375 const BuiltinType *BT = QT->getAs<BuiltinType>(); 376 if (!BT) 380 switch (BT->getKind()) {
|
/external/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
BugReporter.h | 69 BugType& BT; 84 BugReport(BugType& bt, StringRef desc, const ExplodedNode *errornode) 85 : BT(bt), Description(desc), ErrorNode(errornode), 88 BugReport(BugType& bt, StringRef shortDesc, StringRef desc, 90 : BT(bt), ShortDescription(shortDesc), Description(desc), 93 BugReport(BugType& bt, StringRef desc, PathDiagnosticLocation l) 94 : BT(bt), Description(desc), Location(l), ErrorNode(0) [all...] |
/frameworks/compile/slang/ |
slang_rs_export_type.cpp | 134 const clang::BuiltinType *BT = 137 switch (BT->getKind()) { 457 const clang::BuiltinType *BT = 460 switch (BT->getKind()) { 814 const clang::BuiltinType *BT = 816 switch (BT->getKind()) { 1021 const clang::BuiltinType *BT = UNSAFE_CAST_TYPE(const clang::BuiltinType, 1027 switch (BT->getKind()) [all...] |