/external/clang/lib/StaticAnalyzer/Checkers/ |
ObjCContainersChecker.cpp | 34 mutable OwningPtr<BugType> BT; 36 if (!BT) 37 BT.reset(new BugType("CFArray API", 148 BugReport *R = new BugReport(*BT, "Index is out of bounds", N);
|
VLASizeChecker.cpp | 31 mutable OwningPtr<BugType> BT; 52 if (!BT) 53 BT.reset(new BuiltinBug("Dangerous variable-length array (VLA) declaration")); 70 BugReport *report = new BugReport(*BT, os.str(), N);
|
ArrayBoundCheckerV2.cpp | 31 mutable OwningPtr<BuiltinBug> BT; 190 if (!BT) 191 BT.reset(new BuiltinBug("Out-of-bound access")); 211 checkerContext.EmitReport(new BugReport(*BT, os.str(), errorNode));
|
CallAndMessageChecker.cpp | 45 const char *BT_desc, OwningPtr<BugType> &BT); 50 OwningPtr<BugType> &BT); 52 static void EmitBadCall(BugType *BT, CheckerContext &C, const CallExpr *CE); 60 static void LazyInit_BT(const char *desc, OwningPtr<BugType> &BT) { 61 if (!BT) 62 BT.reset(new BuiltinBug(desc)); 67 void CallAndMessageChecker::EmitBadCall(BugType *BT, CheckerContext &C, 73 BugReport *R = new BugReport(*BT, BT->getName(), N); 82 OwningPtr<BugType> &BT) { [all...] |
IdempotentOperationChecker.cpp | 346 BugType *BT = new BugType("Idempotent operation", "Dead code"); 416 BugReport *report = new BugReport(*BT, os.str(), *I);
|
GenericTaintChecker.cpp | 45 mutable OwningPtr<BugType> BT; 47 if (!BT) 48 BT.reset(new BugType("Use of Untrusted Data", "Untrusted Data")); 645 BugReport *report = new BugReport(*BT, Msg, N);
|
BasicObjCFoundationChecks.cpp | 74 mutable OwningPtr<APIMisuse> BT; 88 if (!BT) 89 BT.reset(new APIMisuse("nil argument")); 97 BugReport *R = new BugReport(*BT, os.str(), N); 145 mutable OwningPtr<APIMisuse> BT; 335 if (!BT) 336 BT.reset(new APIMisuse("Bad use of CFNumberCreate")); 338 BugReport *report = new BugReport(*BT, os.str(), N); 350 mutable OwningPtr<APIMisuse> BT; 370 if (!BT) { [all...] |
MacOSKeychainAPIChecker.cpp | 33 mutable OwningPtr<BugType> BT; 96 if (!BT) 97 BT.reset(new BugType("Improper use of SecKeychain API", "Mac OS API")); 281 BugReport *Report = new BugReport(*BT, os.str(), N); 318 BugReport *Report = new BugReport(*BT, os.str(), N); 370 BugReport *Report = new BugReport(*BT, 434 BugReport *Report = new BugReport(*BT, 555 BugReport *Report = new BugReport(*BT, os.str(), N, LocUsedForUniqueing);
|
CStringChecker.cpp | 251 BuiltinBug *BT = static_cast<BuiltinBug*>(BT_Null.get()); 252 BugReport *report = new BugReport(*BT, os.str(), N); 308 BuiltinBug *BT = static_cast<BuiltinBug*>(BT_Bounds.get()); 313 report = new BugReport(*BT, warningMsg, N); 323 report = new BugReport(*BT, os.str(), N); [all...] |
RetainCountChecker.cpp | [all...] |
/external/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
BugReporter.h | 71 BugType& BT; 106 BugReport(BugType& bt, StringRef desc, const ExplodedNode *errornode) 107 : BT(bt), DeclWithIssue(0), Description(desc), ErrorNode(errornode), 110 BugReport(BugType& bt, StringRef shortDesc, StringRef desc, 112 : BT(bt), DeclWithIssue(0), ShortDescription(shortDesc), Description(desc), 115 BugReport(BugType& bt, StringRef desc, PathDiagnosticLocation l) 116 : BT(bt), DeclWithIssue(0), Description(desc), Location(l), ErrorNode(0) [all...] |
/frameworks/compile/slang/ |
slang_rs_export_type.cpp | 173 const clang::BuiltinType *BT = 176 switch (BT->getKind()) { 548 const clang::BuiltinType *BT = 551 switch (BT->getKind()) { 906 const clang::BuiltinType *BT = 908 switch (BT->getKind()) { [all...] |
/external/llvm/lib/Target/X86/ |
X86ISelLowering.h | 87 BT, [all...] |
X86ISelLowering.cpp | [all...] |
/external/clang/lib/AST/ |
Type.cpp | 579 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 580 return BT->getKind() >= BuiltinType::Bool && 581 BT->getKind() <= BuiltinType::Int128; 592 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 593 return BT->getKind() >= BuiltinType::Bool && 594 BT->getKind() <= BuiltinType::Int128; 609 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 610 return BT->getKind() == BuiltinType::Char_U || 611 BT->getKind() == BuiltinType::UChar || 612 BT->getKind() == BuiltinType::Char_S | [all...] |
ASTContext.cpp | 706 const BuiltinType *BT = T->getAs<BuiltinType>(); 707 assert(BT && "Not a floating point type!"); 708 switch (BT->getKind()) { [all...] |
/external/clang/lib/StaticAnalyzer/Core/ |
BugReporter.cpp | [all...] |
/external/qemu/tcg/ppc/ |
tcg-target.c | 412 #define BT(n, c) (((c)+((n)*4))<<21) 584 tcg_out32 (s, CRAND | BT (7, CR_EQ) | BA (6, CR_EQ) | BB (7, CR_EQ)); 780 tcg_out32 (s, CRAND | BT (7, CR_EQ) | BA (6, CR_EQ) | BB (7, CR_EQ)); 1100 tcg_out32 (s, op | BT (7, CR_EQ) | BA (6, CR_EQ) | BB (7, CR_EQ)); 1114 tcg_out32 (s, op | BT (7, CR_EQ) | BA (5, CR_EQ) | BB (7, b->bit2)); 1115 tcg_out32 (s, CROR | BT (7, CR_EQ) | BA (5, b->bit1) | BB (7, CR_EQ)); 1205 crop = CRNOR | BT (7, CR_EQ) | BA (7, CR_LT) | BB (7, CR_LT); 1211 crop = CRNOR | BT (7, CR_EQ) | BA (7, CR_GT) | BB (7, CR_GT); [all...] |
/external/qemu/tcg/ppc64/ |
tcg-target.c | 410 #define BT(n, c) (((c)+((n)*4))<<21) 1140 crop = CRNOR | BT (7, CR_EQ) | BA (7, CR_LT) | BB (7, CR_LT); 1146 crop = CRNOR | BT (7, CR_EQ) | BA (7, CR_GT) | BB (7, CR_GT); [all...] |
/external/clang/lib/Analysis/ |
CFG.cpp | [all...] |
/external/clang/lib/Sema/ |
SemaChecking.cpp | [all...] |
/external/qemu/ |
ppc-dis.c | 446 as the BT field in the same instruction. */ 527 /* The BT field in an X or XL form instruction. */ 528 #define BT BH + 1 535 #define CR BT + 1 905 the BT field in the same instruction. This operand is marked FAKE [all...] |