/external/clang/lib/StaticAnalyzer/Checkers/ |
CheckSizeofPointer.cpp | 26 BugReporter &BR; 30 WalkAST(BugReporter &br, AnalysisDeclContext* ac) : BR(br), AC(ac) {} 65 PathDiagnosticLocation::createBegin(E, BR.getSourceManager(), AC); 66 BR.EmitBasicReport(AC->getDecl(), 83 BugReporter &BR) const { 84 WalkAST walker(BR, mgr.getAnalysisDeclContext(D));
|
CheckObjCInstMethSignature.cpp | 43 BugReporter &BR, ASTContext &Ctx, 71 BR.getSourceManager()); 73 BR.EmitBasicReport(MethDerived, 81 BugReporter& BR) { 89 ASTContext &Ctx = BR.getContext(); 122 CompareReturnTypes(MethDerived, M, BR, Ctx, ID); 138 BugReporter &BR) const { 139 CheckObjCInstMethSignature(D, BR);
|
DebugCheckers.cpp | 33 BugReporter &BR) const { 55 BugReporter &BR) const { 75 BugReporter &BR) const { 95 BugReporter &BR) const { 116 BugReporter &BR) const { 136 BugReporter &BR) const {
|
UndefCapturedBlockVarChecker.cpp | 38 if (const DeclRefExpr *BR = dyn_cast<DeclRefExpr>(S)) 39 if (BR->getDecl() == VD) 40 return BR; 45 const DeclRefExpr *BR = FindBlockDeclRefExpr(child, VD); 46 if (BR) 47 return BR;
|
LLVMConventionsChecker.cpp | 117 BugReporter &BR; 120 StringRefCheckerVisitor(const Decl *declWithIssue, BugReporter &br) 121 : BR(br), DeclWithIssue(declWithIssue) {} 135 static void CheckStringRefAssignedTemporary(const Decl *D, BugReporter &BR) { 136 StringRefCheckerVisitor walker(D, BR); 180 PathDiagnosticLocation::createBegin(VD, BR.getSourceManager()); 181 BR.EmitBasicReport(DeclWithIssue, desc, "LLVM Conventions", desc, 217 BugReporter &BR; 219 ASTFieldVisitor(const CXXRecordDecl *root, BugReporter &br) [all...] |
NSErrorChecker.cpp | 47 AnalysisManager &mgr, BugReporter &BR) const; 53 BugReporter &BR) const { 76 PathDiagnosticLocation::create(D, BR.getSourceManager()); 77 BR.EmitBasicReport(D, "Bad return type when passing NSError**", 95 AnalysisManager &mgr, BugReporter &BR) const; 101 BugReporter &BR) const { 124 PathDiagnosticLocation::create(D, BR.getSourceManager()); 125 BR.EmitBasicReport(D, "Bad return type when passing CFErrorRef*", 257 BugReporter &BR = *event.BR; [all...] |
VirtualCallChecker.cpp | 30 BugReporter &BR; 60 WalkAST(BugReporter &br, AnalysisDeclContext *ac) 61 : BR(br), 183 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 189 BR.EmitBasicReport(AC->getDecl(), 199 BR.EmitBasicReport(AC->getDecl(), 216 BugReporter &BR) const { 217 WalkAST walker(BR, mgr.getAnalysisDeclContext(RD));
|
CheckSecuritySyntaxOnly.cpp | 59 BugReporter &BR; 68 WalkAST(BugReporter &br, AnalysisDeclContext* ac, 70 : BR(br), AC(ac), II_setid(), 71 CheckRand(isArc4RandomAvailable(BR.getContext())), 289 PathDiagnosticLocation::createBegin(FS, BR.getSourceManager(), AC); 290 BR.EmitBasicReport(AC->getDecl(), 320 if (PT->getPointeeType().getUnqualifiedType() != BR.getContext().CharTy) 326 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 327 BR.EmitBasicReport(AC->getDecl() [all...] |
CStringSyntaxChecker.cpp | 34 BugReporter &BR; 85 WalkAST(BugReporter &br, AnalysisDeclContext* ac) : 86 BR(br), AC(ac), ASTC(AC->getASTContext()) { 145 PathDiagnosticLocation::createBegin(LenArg, BR.getSourceManager(), AC); 160 BR.EmitBasicReport(FD, "Anti-pattern in the argument", "C String API", 181 BugReporter &BR) const { 182 WalkAST walker(BR, Mgr.getAnalysisDeclContext(D));
|
ObjCContainersASTChecker.cpp | 29 BugReporter &BR; 76 WalkAST(BugReporter &br, AnalysisDeclContext* ac) 77 : BR(br), AC(ac), ASTC(AC->getASTContext()), 146 PathDiagnosticLocation::createBegin(CE, BR.getSourceManager(), AC); 147 BR.EmitBasicReport(AC->getDecl(), 167 BugReporter &BR) const { 168 WalkAST walker(BR, Mgr.getAnalysisDeclContext(D));
|
CheckObjCDealloc.cpp | 100 const LangOptions& LOpts, BugReporter& BR) { 104 ASTContext &Ctx = BR.getContext(); 170 PathDiagnosticLocation::createBegin(D, BR.getSourceManager()); 182 BR.EmitBasicReport(D, name, categories::CoreFoundationObjectiveC, 200 BR.EmitBasicReport(MD, name, categories::CoreFoundationObjectiveC, 264 PathDiagnosticLocation::createBegin(*I, BR.getSourceManager()); 266 BR.EmitBasicReport(MD, name, categories::CoreFoundationObjectiveC, 281 BugReporter &BR) const { 284 checkObjCDealloc(cast<ObjCImplementationDecl>(D), mgr.getLangOpts(), BR);
|
MallocOverflowSecurityChecker.cpp | 44 BugReporter &BR) const; 52 const Decl *D, BugReporter &BR, AnalysisManager &mgr) const; 201 const Decl *D, BugReporter &BR, AnalysisManager &mgr) const { 207 CheckOverflowOps c(PossibleMallocOverflows, BR.getContext()); 217 BR.EmitBasicReport(D, "malloc() size overflow", categories::UnixAPI, 220 BR.getSourceManager()), &R, 1); 226 BugReporter &BR) const { 262 OutputPossibleOverflows(PossibleMallocOverflows, D, BR, mgr);
|
CheckerDocumentation.cpp | 171 BugReporter &BR, 179 BugReporter &BR) const {} 255 BugReporter &BR) const {}
|
MallocSizeofChecker.cpp | 175 BugReporter &BR) const { 177 CastedAllocFinder Finder(&BR.getContext()); 200 if (typesCompatible(BR.getContext(), PointeeType, SizeofType)) 205 if (compatibleWithArrayType(BR.getContext(), PointeeType, SizeofType)) 236 BR.getSourceManager(), ADC); 238 BR.EmitBasicReport(D, "Allocator sizeof operand mismatch",
|
ObjCUnusedIVarsChecker.cpp | 112 BugReporter &BR) { 159 SourceManager &SM = BR.getSourceManager(); 172 PathDiagnosticLocation::create(I->first, BR.getSourceManager()); 173 BR.EmitBasicReport(D, "Unused instance variable", "Optimization", 187 BugReporter &BR) const { 188 checkObjCUnusedIvar(D, BR);
|
DeadStoresChecker.cpp | 124 BugReporter& BR; 136 BugReporter& br, AnalysisDeclContext* ac, ParentMap& parents, 138 : cfg(cfg), Ctx(ctx), BR(br), AC(ac), Parents(parents), 200 BR.EmitBasicReport(AC->getDecl(), BugType, "Dead store", os.str(), L, R); 218 PathDiagnosticLocation::createBegin(Ex, BR.getSourceManager(), AC); 373 PathDiagnosticLocation::create(V, BR.getSourceManager()); 422 BugReporter &BR) const { 429 DeadStoreObs A(cfg, BR.getContext(), BR, AC, pmap, FS.Escaped) [all...] |
StackAddrEscapeChecker.cpp | 67 else if (const BlockDataRegion *BR = dyn_cast<BlockDataRegion>(R)) { 68 const BlockDecl *BD = BR->getCodeRegion()->getDecl();
|
/external/libphonenumber/java/test/com/android/i18n/phonenumbers/ |
ShortNumberUtilTest.java | 58 assertTrue(shortUtil.connectsToEmergencyNumber("911", RegionCode.BR)); 59 assertTrue(shortUtil.connectsToEmergencyNumber("190", RegionCode.BR)); 60 assertFalse(shortUtil.connectsToEmergencyNumber("999", RegionCode.BR)); 65 assertFalse(shortUtil.connectsToEmergencyNumber("9111", RegionCode.BR)); 66 assertFalse(shortUtil.connectsToEmergencyNumber("1900", RegionCode.BR)); 67 assertFalse(shortUtil.connectsToEmergencyNumber("9996", RegionCode.BR)); 114 assertTrue(shortUtil.isEmergencyNumber("911", RegionCode.BR)); 115 assertTrue(shortUtil.isEmergencyNumber("190", RegionCode.BR)); 116 assertFalse(shortUtil.isEmergencyNumber("999", RegionCode.BR)); 120 assertFalse(shortUtil.isEmergencyNumber("9111", RegionCode.BR)); [all...] |
RegionCode.java | 30 static final String BR = "BR";
|
/external/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
BugReporterVisitor.h | 61 BugReport &BR) = 0; 71 BugReport &BR); 78 BugReport &BR); 113 static void registerStatementVarDecls(BugReport &BR, const Stmt *S); 128 BugReport &BR); 147 BugReport &BR); 162 BugReport &BR); 177 BugReport &BR); 182 BugReport &BR); 249 BugReport &BR); [all...] |
BugType.h | 48 virtual void FlushReports(BugReporter& BR);
|
BugReporter.h | 475 GRBugReporter &BR; 477 BugReporterContext(GRBugReporter& br) : BR(br) {} 481 GRBugReporter& getBugReporter() { return BR; } 483 ExplodedGraph &getGraph() { return BR.getGraph(); } 486 return BR.getStateManager(); 494 return BR.getContext(); 498 return BR.getSourceManager();
|
/external/llvm/lib/CodeGen/ |
LiveIntervalAnalysis.cpp | [all...] |
/external/clang/lib/StaticAnalyzer/Core/ |
BugReporterVisitors.cpp | 98 BugReport &BR) { 105 BugReport &BR) { 110 llvm::tie(Beg, End) = BR.getRanges(); 115 BR.getDescription(), 153 BugReport &BR) { 177 BR.addVisitor(new ReturnVisitor(CEE->getCalleeContext())); 184 BugReport &BR) { 223 bugreporter::trackNullOrUndefValue(N, RetE, BR); 235 BR.markInteresting(V); 261 BugReport &BR) { [all...] |
/external/llvm/lib/Transforms/IPO/ |
PartialInlining.cpp | 53 BranchInst *BR = dyn_cast<BranchInst>(entryBlock->getTerminator()); 54 if (!BR || BR->isUnconditional())
|