/external/clang/lib/StaticAnalyzer/Core/ |
BugReporter.cpp | 204 bool BugReporter::RemoveUnneededCalls(PathPieces &pieces, BugReport *R) { 303 class NodeMapClosure : public BugReport::NodeResolver { 314 BugReport *R; 321 BugReport *r, InterExplodedGraphMap &Backmap, 332 BugReport *getBugReport() { return R; } 519 BugReport *R = PDB.getBugReport(); 878 BugReport *R = PDB.getBugReport(); [all...] |
BugReporterVisitors.cpp | 99 BugReport &BR) { 106 BugReport &BR) { 110 BugReport::ranges_iterator Beg, End; 165 BugReport &BR) { 228 BugReport &BR) { 325 BugReport &BR) { 377 BugReport &BR) { 392 BugReport &BR) { 411 BugReport &BR) { 657 BugReport &BR) [all...] |
/external/clang/lib/StaticAnalyzer/Checkers/ |
DereferenceChecker.cpp | 163 BugReport *report = 164 new BugReport(*BT_null, 185 BugReport *report = 186 new BugReport(*BT_undef, BT_undef->getDescription(), N);
|
SimpleStreamChecker.cpp | 218 BugReport *R = new BugReport(*DoubleCloseBugType, 232 BugReport *R = new BugReport(*LeakBugType,
|
BasicObjCFoundationChecks.cpp | 119 BugReport *R = new BugReport(*BT, os.str(), N); 369 BugReport *report = new BugReport(*BT, os.str(), N); 452 BugReport *report = new BugReport(*BT, description, N); 511 BugReport *report = new BugReport(*BT, os.str(), N); 664 BugReport *R = new BugReport(*BT, os.str(), errorNode.getValue()) [all...] |
ChrootChecker.cpp | 139 // If jail state is ROOT_CHANGED, generate BugReport. 148 BugReport *R = new BugReport(*BT_BreakJail,
|
ObjCContainersChecker.cpp | 140 BugReport *R = new BugReport(*BT, "Index is out of bounds", N);
|
StreamChecker.cpp | 276 BugReport *R = new BugReport(*BT_illegalwhence, 353 BugReport *R =new BugReport(*BT_nullfp, BT_nullfp->getDescription(), N); 384 BugReport *R = new BugReport(*BT_doubleclose, 412 BugReport *R = new BugReport(*BT_ResourceLeak,
|
VLASizeChecker.cpp | 71 BugReport *report = new BugReport(*BT, os.str(), N);
|
UnixAPIChecker.cpp | 136 BugReport *report = 137 new BugReport(*BT_open, 184 BugReport *report = new BugReport(*BT_pthreadOnce, os.str(), N); 225 BugReport *report = new BugReport(*BT_mallocZero, os.str(), N);
|
BoolAssignmentChecker.cpp | 38 C.emitReport(new BugReport(*BT, BT->getDescription(), N));
|
NSErrorChecker.cpp | 270 BugReport *report = new BugReport(*bug, os.str(),
|
CStringChecker.cpp | 242 BugReport *report = new BugReport(*BT, os.str(), N); 300 BugReport *report; 302 report = new BugReport(*BT, warningMsg, N); 312 report = new BugReport(*BT, os.str(), N); 529 BugReport *report = 530 new BugReport(*BT_Overlap, 597 BugReport *report = new BugReport(*BT_AdditionOverflow, warning, N); 701 BugReport *report = new BugReport(*BT_NotCString [all...] |
ObjCSelfInitChecker.cpp | 165 BugReport *report = 166 new BugReport(*new InitSelfBug(), errorStr, N);
|
ArrayBoundCheckerV2.cpp | 210 checkerContext.emitReport(new BugReport(*BT, os.str(), errorNode));
|
GenericTaintChecker.cpp | 649 BugReport *report = new BugReport(*BT, Msg, N);
|
IdempotentOperationChecker.cpp | 420 BugReport *report = new BugReport(*BT, os.str(), *I);
|
RetainCountChecker.cpp | [all...] |
MallocChecker.cpp | 249 /// BugReport path. For example, showing the allocation site of the leaked 317 BugReport &BR); 321 BugReport &BR) { 911 BugReport *R = new BugReport(*BT_BadFree, os.str(), N); [all...] |
/external/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ |
CheckerContext.h | 234 void emitReport(BugReport *R) {
|
/external/clang/tools/scan-view/ |
Reporter.py | 5 __all__ = ['ReportFailure', 'BugReport', 'getReporters'] 16 class BugReport:
|
ScanView.py | 324 bug = Reporter.BugReport(title, description, files)
|
/development/testrunner/ |
adb_interface.py | 93 def BugReport(self, path): 94 """Dumps adb bugreport to the file specified by the path. 97 path: Path of the file where adb bugreport is dumped to. 99 bug_output = self.SendShellCommand("bugreport", timeout_time=60)
|