/external/clang/examples/analyzer-plugin/ |
MainCallChecker.cpp | 11 mutable OwningPtr<BugType> BT; 37 if (!BT) 38 BT.reset(new BugType("call to main", "example analyzer plugin")); 40 BugReport *report = new BugReport(*BT, BT->getName(), N);
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
FixedAddressChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 54 if (!BT) 55 BT.reset(new BuiltinBug("Use fixed address", 59 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
UndefinedArraySubscriptChecker.cpp | 28 mutable OwningPtr<BugType> BT; 52 if (!BT) 53 BT.reset(new BuiltinBug("Array subscript is undefined")); 56 BugReport *R = new BugReport(*BT, BT->getName(), N);
|
NSAutoreleasePoolChecker.cpp | 35 mutable OwningPtr<BugType> BT; 61 if (!BT) 62 BT.reset(new BugType("Use -drain instead of -release", 71 BugReport *Report = new BugReport(*BT, "Use -drain instead of -release when "
|
TaintTesterChecker.cpp | 25 mutable OwningPtr<BugType> BT; 40 if (!BT) 41 BT.reset(new BugType("Tainted data", "General")); 53 BugReport *report = new BugReport(*BT, "tainted",N);
|
ArrayBoundChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 68 if (!BT) 69 BT.reset(new BuiltinBug("Out-of-bound array access", 78 new BugReport(*BT, BT->getDescription(), N);
|
CastToStructChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 60 if (!BT) 61 BT.reset(new BuiltinBug("Cast from non-struct type to struct type", 65 BugReport *R = new BugReport(*BT,BT->getDescription(), N);
|
PointerArithChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 55 if (!BT) 56 BT.reset(new BuiltinBug("Dangerous pointer arithmetic", 60 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
PointerSubChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 64 if (!BT) 65 BT.reset(new BuiltinBug("Pointer subtraction", 68 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
ReturnPointerRangeChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Return of pointer value outside of expected range", 82 new BugReport(*BT, BT->getDescription(), N);
|
UndefinedAssignmentChecker.cpp | 27 mutable OwningPtr<BugType> BT; 56 if (!BT) 57 BT.reset(new BuiltinBug(str)); 86 BugReport *R = new BugReport(*BT, str, N);
|
ExprInspectionChecker.cpp | 21 mutable OwningPtr<BugType> BT; 95 if (!BT) 96 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 98 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N); 115 if (!BT) 116 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 118 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N);
|
CastSizeChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 71 if (!BT) 72 BT.reset(new BuiltinBug("Cast region with wrong size.", 75 BugReport *R = new BugReport(*BT, BT->getDescription(),
|
UndefBranchChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; 69 if (!BT) 70 BT.reset( 101 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
CallAndMessageChecker.cpp | 54 const CallEvent &Call, OwningPtr<BugType> &BT); 56 static void emitBadCall(BugType *BT, CheckerContext &C, const Expr *BadE); 64 static void LazyInit_BT(const char *desc, OwningPtr<BugType> &BT) { 65 if (!BT) 66 BT.reset(new BuiltinBug(desc)); 71 void CallAndMessageChecker::emitBadCall(BugType *BT, CheckerContext &C, 77 BugReport *R = new BugReport(*BT, BT->getName(), N); 118 OwningPtr<BugType> &BT) { 121 LazyInit_BT("Uninitialized argument value", BT); [all...] |
DivZeroChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 39 if (!BT) 40 BT.reset(new BuiltinBug("Division by zero")); 42 BugReport *R = new BugReport(*BT, Msg, N);
|
UndefCapturedBlockVarChecker.cpp | 30 mutable OwningPtr<BugType> BT; 81 if (!BT) 82 BT.reset(new BuiltinBug("uninitialized variable captured by block")); 91 BugReport *R = new BugReport(*BT, os.str(), N);
|
UndefResultChecker.cpp | 31 mutable OwningPtr<BugType> BT; 57 if (!BT) 58 BT.reset(new BuiltinBug("Result of operation is garbage or undefined")); 86 BugReport *report = new BugReport(*BT, OS.str(), N);
|
BoolAssignmentChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; 36 if (!BT) 37 BT.reset(new BuiltinBug("Assignment of a non-Boolean value")); 38 C.emitReport(new BugReport(*BT, BT->getDescription(), N));
|
ReturnUndefChecker.cpp | 81 static void emitBug(CheckerContext &C, BuiltinBug &BT, const Expr *RetE, 87 BugReport *Report = new BugReport(BT, BT.getDescription(), N);
|
ObjCContainersChecker.cpp | 33 mutable OwningPtr<BugType> BT; 35 if (!BT) 36 BT.reset(new BugType("CFArray API", 140 BugReport *R = new BugReport(*BT, "Index is out of bounds", N);
|
VLASizeChecker.cpp | 32 mutable OwningPtr<BugType> BT; 53 if (!BT) 54 BT.reset(new BuiltinBug("Dangerous variable-length array (VLA) declaration")); 71 BugReport *report = new BugReport(*BT, os.str(), N);
|
/external/clang/lib/Serialization/ |
ASTCommon.h | 32 TypeIdx TypeIdxFromBuiltin(const BuiltinType *BT); 47 if (const BuiltinType *BT = dyn_cast<BuiltinType>(T.getTypePtr())) 48 return TypeIdxFromBuiltin(BT).asTypeID(FastQuals);
|
/frameworks/rs/ |
rsScriptC.cpp | 45 BT = NULL; 53 if (BT) { 54 delete BT; 55 BT = NULL; 271 if (BT) { 272 delete BT; 274 BT = new bcinfo::BitcodeTranslator((const char *)bitcode, bitcodeLen, 276 if (!BT->translate()) { 278 delete BT; 279 BT = NULL [all...] |
/device/generic/armv7-a-neon/ |
BoardConfig.mk | 19 # Some framework code requires this to enable BT
|