/external/libvpx/libvpx/vpx_ports/ |
mem.h | 40 * that it's safe to use uninitialized. Silences 'may be used uninitialized'
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
CallAndMessageChecker.cpp | 94 return "Argument in message expression is an uninitialized value"; 97 return "Argument for property setter is an uninitialized value"; 100 return "Argument for subscript setter is an uninitialized value"; 101 return "Subscript index is an uninitialized value"; 106 return "Block call argument is an uninitialized value"; 108 return "Function call argument is an uninitialized value"; 121 LazyInit_BT("Uninitialized argument value", BT); 187 LazyInit_BT("Uninitialized argument value", BT); 190 os << "Passed-by-value struct argument contains uninitialized data"; 212 // FIXME: enhance track back for uninitialized value for arbitrar [all...] |
UndefinedAssignmentChecker.cpp | 41 // Do not report assignments of uninitialized values inside swap functions. 42 // This should allow to swap partially uninitialized structs 68 "uninitialized value. The computed value will also be garbage";
|
/external/chromium_org/third_party/WebKit/Source/core/html/parser/ |
HTMLToken.h | 69 Uninitialized, 103 m_type = Uninitialized; 111 bool isUninitialized() { return m_type == Uninitialized; } 116 ASSERT(m_type == Uninitialized); 175 ASSERT(m_type == Uninitialized); 254 ASSERT(m_type == Uninitialized); 266 ASSERT(m_type == Uninitialized); 277 ASSERT(m_type == Uninitialized); 378 ASSERT(m_type == Uninitialized || m_type == Character); 417 ASSERT(m_type == Uninitialized); [all...] |
/art/runtime/verifier/ |
reg_type_test.cc | 373 // Tests creating types uninitialized types from unresolved types. 380 // Create an uninitialized type of this unresolved type 381 const RegType& unresolved_unintialised = cache.Uninitialized(ref_type, 1101ull); 385 // Create an uninitialized type of this unresolved type with different PC 386 const RegType& ref_type_unresolved_unintialised_1 = cache.Uninitialized(ref_type, 1102ull); 389 // Create an uninitialized type of this unresolved type with the same PC 390 const RegType& unresolved_unintialised_2 = cache.Uninitialized(ref_type, 1101ull); 401 const RegType& resolved_unintialiesd = cache.Uninitialized(resolved_ref, 10); 402 const RegType& unresolved_unintialized = cache.Uninitialized(unresolved_ref, 12); 409 expected ="Uninitialized Reference: java.lang.String Allocation PC: 10" [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLDialogElement.cpp | 95 , m_centeringMode(Uninitialized) 135 m_centeringMode = Uninitialized; 137 if (m_centeringMode == Uninitialized) 173 ASSERT(m_centeringMode == Uninitialized); 180 ASSERT(m_centeringMode == Uninitialized);
|
/external/clang/test/Analysis/ |
misc-ps.c | 139 // This was triggering a false "use of uninitialized value" warning. 156 // Test that we handle an uninitialized value within a logical expression. 176 int uninitialized; local 177 context->callback(uninitialized); // expected-warning {{uninitialized}}
|
properties.m | 147 // <rdar://problem/9241180> Static analyzer doesn't detect uninitialized variable issues for property accesses 158 if (y && o.x) // expected-warning {{Property access on an uninitialized object pointer}} 164 self.x = y; // expected-warning {{Argument for property setter is an uninitialized value}}
|
inline.c | 84 // Test that passing a struct value with an uninitialized field does 93 return test_rdar10977037_aux_2(v); // expected-warning {{Passed-by-value struct argument contains uninitialized data}}
|
/external/chromium_org/media/filters/ |
fake_video_decoder.cc | 20 state_(UNINITIALIZED), 26 DCHECK_EQ(state_, UNINITIALIZED); 179 state_ = UNINITIALIZED;
|
/external/compiler-rt/lib/msan/lit_tests/ |
heap-origin.cc | 24 // CHECK: WARNING: MemorySanitizer: use-of-uninitialized-value 27 // CHECK-ORIGINS: Uninitialized value was created by a heap allocation 31 // CHECK: SUMMARY: MemorySanitizer: use-of-uninitialized-value {{.*heap-origin.cc:.* main}}
|
stack-origin.cc | 25 // CHECK: WARNING: MemorySanitizer: use-of-uninitialized-value 28 // CHECK-ORIGINS: Uninitialized value was created by an allocation of 'x' in the stack frame of function 'main' 30 // CHECK: SUMMARY: MemorySanitizer: use-of-uninitialized-value {{.*stack-origin.cc:.* main}}
|
/cts/tools/signature-tools/src/signature/model/impl/ |
SigParameterizedType.java | 87 } else if (Uninitialized.isInitialized(thiz.getOwnerType())) { 88 if (!Uninitialized.isInitialized(other.getOwnerType())) {
|
SigApi.java | 29 private Set<IPackage> packages = Uninitialized.unset();
|
SigPackage.java | 32 private Set<IClassDefinition> classes = Uninitialized.unset();
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_internals_browsertest.js | 51 TEST_F('SyncInternalsWebUITest', 'Uninitialized', function() { 54 expectTrue(this.hasInDetails(false, 'Summary', 'Uninitialized'));
|
/external/chromium_org/chrome/installer/util/ |
registry_key_backup_unittest.cc | 32 // Test that writing an uninitialized backup does nothing. 33 TEST_F(RegistryKeyBackupTest, Uninitialized) {
|
/external/chromium_org/third_party/WebKit/Source/core/html/track/vtt/ |
VTTToken.h | 39 Uninitialized, 51 VTTToken() : m_type(Type::Uninitialized) { }
|
/external/chromium_org/ui/gfx/ozone/dri/ |
hardware_display_controller.cc | 41 state_ = UNINITIALIZED; 63 CHECK(state_ == UNINITIALIZED);
|
/external/chromium_org/v8/src/ |
once.cc | 51 // - UNINITIALIZED: We are the first thread calling this function. 54 // First, try to change the state from UNINITIALIZED to EXECUTING_FUNCTION
|
/external/proguard/src/proguard/classfile/attribute/preverification/ |
UninitializedType.java | 28 * This VerificationType represents a Uninitialized type. 38 * Creates an uninitialized UninitializedType.
|
/external/v8/src/ |
once.cc | 51 // - UNINITIALIZED: We are the first thread calling this function. 54 // First, try to change the state from UNINITIALIZED to EXECUTING_FUNCTION
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MySignature1.java | 48 public static int UNINITIALIZED = Signature.UNINITIALIZED;
|
/packages/screensavers/PhotoTable/src/com/android/dreams/phototable/ |
CursorPhotoSource.java | 27 // An invalid cursor position to represent the uninitialized state. 28 protected static final int UNINITIALIZED = -1;
|
/cts/tests/tests/net/src/android/net/wifi/cts/ |
SupplicantStateTest.java | 38 assertFalse(SupplicantState.isValidState(SupplicantState.UNINITIALIZED));
|