/external/clang/examples/analyzer-plugin/ |
MainCallChecker.cpp | 11 mutable OwningPtr<BugType> BT; 37 if (!BT) 38 BT.reset(new BugType("call to main", "example analyzer plugin")); 40 BugReport *report = new BugReport(*BT, BT->getName(), N);
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
FixedAddressChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 54 if (!BT) 55 BT.reset(new BuiltinBug("Use fixed address", 59 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
UndefinedArraySubscriptChecker.cpp | 27 mutable OwningPtr<BugType> BT; 39 if (!BT) 40 BT.reset(new BuiltinBug("Array subscript is undefined")); 43 BugReport *R = new BugReport(*BT, BT->getName(), N);
|
NSAutoreleasePoolChecker.cpp | 35 mutable OwningPtr<BugType> BT; 61 if (!BT) 62 BT.reset(new BugType("Use -drain instead of -release", 71 BugReport *Report = new BugReport(*BT, "Use -drain instead of -release when "
|
TaintTesterChecker.cpp | 25 mutable OwningPtr<BugType> BT; 40 if (!BT) 41 BT.reset(new BugType("Tainted data", "General")); 53 BugReport *report = new BugReport(*BT, "tainted",N);
|
ArrayBoundChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 68 if (!BT) 69 BT.reset(new BuiltinBug("Out-of-bound array access", 78 new BugReport(*BT, BT->getDescription(), N);
|
CastToStructChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 60 if (!BT) 61 BT.reset(new BuiltinBug("Cast from non-struct type to struct type", 65 BugReport *R = new BugReport(*BT,BT->getDescription(), N);
|
PointerArithChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 55 if (!BT) 56 BT.reset(new BuiltinBug("Dangerous pointer arithmetic", 60 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
PointerSubChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 64 if (!BT) 65 BT.reset(new BuiltinBug("Pointer subtraction", 68 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
ReturnPointerRangeChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Return of pointer value outside of expected range", 82 new BugReport(*BT, BT->getDescription(), N);
|
UndefResultChecker.cpp | 31 mutable OwningPtr<BugType> BT; 48 if (!BT) 49 BT.reset(new BuiltinBug("Result of operation is garbage or undefined")); 77 BugReport *report = new BugReport(*BT, OS.str(), N);
|
UndefinedAssignmentChecker.cpp | 27 mutable OwningPtr<BugType> BT; 48 if (!BT) 49 BT.reset(new BuiltinBug(str)); 78 BugReport *R = new BugReport(*BT, str, N);
|
ExprInspectionChecker.cpp | 21 mutable OwningPtr<BugType> BT; 93 if (!BT) 94 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 96 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N); 113 if (!BT) 114 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 116 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N);
|
CastSizeChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Cast region with wrong size.", 75 BugReport *R = new BugReport(*BT, BT->getDescription(),
|
UndefBranchChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 69 if (!BT) 70 BT.reset( 101 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
CallAndMessageChecker.cpp | 53 const CallEvent &Call, OwningPtr<BugType> &BT); 55 static void emitBadCall(BugType *BT, CheckerContext &C, const Expr *BadE); 63 static void LazyInit_BT(const char *desc, OwningPtr<BugType> &BT) { 64 if (!BT) 65 BT.reset(new BuiltinBug(desc)); 70 void CallAndMessageChecker::emitBadCall(BugType *BT, CheckerContext &C, 76 BugReport *R = new BugReport(*BT, BT->getName(), N); 117 OwningPtr<BugType> &BT) { 120 LazyInit_BT("Uninitialized argument value", BT); [all...] |
DivZeroChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 39 if (!BT) 40 BT.reset(new BuiltinBug("Division by zero")); 42 BugReport *R = new BugReport(*BT, Msg, N);
|
UndefCapturedBlockVarChecker.cpp | 30 mutable OwningPtr<BugType> BT; 81 if (!BT) 82 BT.reset(new BuiltinBug("uninitialized variable captured by block")); 91 BugReport *R = new BugReport(*BT, os.str(), N);
|
BoolAssignmentChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 36 if (!BT) 37 BT.reset(new BuiltinBug("Assignment of a non-Boolean value")); 38 C.emitReport(new BugReport(*BT, BT->getDescription(), N));
|
ReturnUndefChecker.cpp | 72 static void emitBug(CheckerContext &C, BuiltinBug &BT, const Expr *RetE, 78 BugReport *Report = new BugReport(BT, BT.getDescription(), N);
|
BasicObjCFoundationChecks.cpp | 96 mutable OwningPtr<APIMisuse> BT; 110 if (!BT) 111 BT.reset(new APIMisuse("nil argument")); 119 BugReport *R = new BugReport(*BT, os.str(), N); 196 mutable OwningPtr<APIMisuse> BT; 366 if (!BT) 367 BT.reset(new APIMisuse("Bad use of CFNumberCreate")); 369 BugReport *report = new BugReport(*BT, os.str(), N); 381 mutable OwningPtr<APIMisuse> BT; 401 if (!BT) { [all...] |
ObjCContainersChecker.cpp | 33 mutable OwningPtr<BugType> BT; 35 if (!BT) 36 BT.reset(new BugType("CFArray API", 140 BugReport *R = new BugReport(*BT, "Index is out of bounds", N);
|
/external/clang/lib/Serialization/ |
ASTCommon.h | 31 TypeIdx TypeIdxFromBuiltin(const BuiltinType *BT); 46 if (const BuiltinType *BT = dyn_cast<BuiltinType>(T.getTypePtr())) 47 return TypeIdxFromBuiltin(BT).asTypeID(FastQuals);
|
/frameworks/rs/ |
rsScriptC.cpp | 44 BT = NULL; 52 if (BT) { 53 delete BT; 54 BT = NULL; 253 if (BT) { 254 delete BT; 256 BT = new bcinfo::BitcodeTranslator((const char *)bitcode, bitcodeLen, 258 if (!BT->translate()) { 260 delete BT; 261 BT = NULL [all...] |
/device/generic/armv7-a-neon/ |
BoardConfig.mk | 19 # Some framework code requires this to enable BT
|