/external/clang/examples/analyzer-plugin/ |
MainCallChecker.cpp | 11 mutable OwningPtr<BugType> BT; 37 if (!BT) 38 BT.reset(new BugType("call to main", "example analyzer plugin")); 40 BugReport *report = new BugReport(*BT, BT->getName(), N);
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
FixedAddressChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 54 if (!BT) 55 BT.reset(new BuiltinBug("Use fixed address", 59 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
ReturnUndefChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 49 if (!BT) 50 BT.reset(new BuiltinBug("Garbage return value", 54 new BugReport(*BT, BT->getDescription(), N);
|
UndefinedArraySubscriptChecker.cpp | 27 mutable OwningPtr<BugType> BT; 39 if (!BT) 40 BT.reset(new BuiltinBug("Array subscript is undefined")); 43 BugReport *R = new BugReport(*BT, BT->getName(), N);
|
TaintTesterChecker.cpp | 25 mutable OwningPtr<BugType> BT; 40 if (!BT) 41 BT.reset(new BugType("Tainted data", "General")); 53 BugReport *report = new BugReport(*BT, "tainted",N);
|
ArrayBoundChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 68 if (!BT) 69 BT.reset(new BuiltinBug("Out-of-bound array access", 78 new BugReport(*BT, BT->getDescription(), N);
|
CastToStructChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 60 if (!BT) 61 BT.reset(new BuiltinBug("Cast from non-struct type to struct type", 65 BugReport *R = new BugReport(*BT,BT->getDescription(), N);
|
PointerArithChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 55 if (!BT) 56 BT.reset(new BuiltinBug("Dangerous pointer arithmetic", 60 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
PointerSubChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 64 if (!BT) 65 BT.reset(new BuiltinBug("Pointer subtraction", 68 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
ReturnPointerRangeChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Return of pointer value outside of expected range", 82 new BugReport(*BT, BT->getDescription(), N);
|
NSAutoreleasePoolChecker.cpp | 35 mutable OwningPtr<BugType> BT; 70 if (!BT) 71 BT.reset(new BugType("Use -drain instead of -release", 80 BugReport *Report = new BugReport(*BT, "Use -drain instead of -release when "
|
UndefResultChecker.cpp | 30 mutable OwningPtr<BugType> BT; 47 if (!BT) 48 BT.reset(new BuiltinBug("Result of operation is garbage or undefined")); 76 BugReport *report = new BugReport(*BT, OS.str(), N);
|
UndefinedAssignmentChecker.cpp | 27 mutable OwningPtr<BugType> BT; 48 if (!BT) 49 BT.reset(new BuiltinBug(str)); 78 BugReport *R = new BugReport(*BT, str, N);
|
CastSizeChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Cast region with wrong size.", 75 BugReport *R = new BugReport(*BT, BT->getDescription(),
|
UndefBranchChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 69 if (!BT) 70 BT.reset( 101 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
CallAndMessageChecker.cpp | 45 const char *BT_desc, OwningPtr<BugType> &BT); 50 OwningPtr<BugType> &BT); 52 static void EmitBadCall(BugType *BT, CheckerContext &C, const CallExpr *CE); 60 static void LazyInit_BT(const char *desc, OwningPtr<BugType> &BT) { 61 if (!BT) 62 BT.reset(new BuiltinBug(desc)); 67 void CallAndMessageChecker::EmitBadCall(BugType *BT, CheckerContext &C, 73 BugReport *R = new BugReport(*BT, BT->getName(), N); 82 OwningPtr<BugType> &BT) { [all...] |
DivZeroChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 39 if (!BT) 40 BT.reset(new BuiltinBug("Division by zero")); 43 new BugReport(*BT, Msg, N);
|
UndefCapturedBlockVarChecker.cpp | 29 mutable OwningPtr<BugType> BT; 83 if (!BT) 84 BT.reset(new BuiltinBug("uninitialized variable captured by block")); 93 BugReport *R = new BugReport(*BT, os.str(), N);
|
BoolAssignmentChecker.cpp | 26 mutable llvm::OwningPtr<BuiltinBug> BT; 36 if (!BT) 37 BT.reset(new BuiltinBug("Assignment of a non-Boolean value")); 38 C.EmitReport(new BugReport(*BT, BT->getDescription(), N));
|
AttrNonNullChecker.cpp | 27 mutable OwningPtr<BugType> BT; 100 if (!BT) 101 BT.reset(new BugType("Argument with 'nonnull' attribute passed null", 105 new BugReport(*BT, "Null pointer passed as an argument to a "
|
AdjustedReturnValueChecker.cpp | 66 const BlockPointerType *BT=BR->getLocationType()->getAs<BlockPointerType>(); 67 const FunctionType *FT = BT->getPointeeType()->getAs<FunctionType>();
|
/external/clang/lib/Serialization/ |
ASTCommon.h | 31 TypeIdx TypeIdxFromBuiltin(const BuiltinType *BT); 46 if (const BuiltinType *BT = dyn_cast<BuiltinType>(T.getTypePtr())) 47 return TypeIdxFromBuiltin(BT).asTypeID(FastQuals);
|
/frameworks/rs/ |
rsScriptC.cpp | 37 BT = NULL; 43 if (BT) { 44 delete BT; 45 BT = NULL; 220 if (BT) { 221 delete BT; 223 BT = new bcinfo::BitcodeTranslator((const char *)bitcode, bitcodeLen, 225 if (!BT->translate()) { 227 delete BT; 228 BT = NULL [all...] |
/device/generic/armv7-a/ |
BoardConfig.mk | 18 # Some framework code requires this to enable BT
|
/device/generic/armv7-a-neon/ |
BoardConfig.mk | 18 # Some framework code requires this to enable BT
|