/external/clang/examples/analyzer-plugin/ |
H A D | MainCallChecker.cpp | 11 mutable OwningPtr<BugType> BT; member in class:__anon3384::MainCallChecker 37 if (!BT) 38 BT.reset(new BugType("call to main", "example analyzer plugin")); 40 BugReport *report = new BugReport(*BT, BT->getName(), N);
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
H A D | FixedAddressChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon4025::FixedAddressChecker 54 if (!BT) 55 BT.reset(new BuiltinBug("Use fixed address", 59 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | UndefinedArraySubscriptChecker.cpp | 27 mutable OwningPtr<BugType> BT; member in class:__anon4080::UndefinedArraySubscriptChecker 39 if (!BT) 40 BT.reset(new BuiltinBug("Array subscript is undefined")); 43 BugReport *R = new BugReport(*BT, BT->getName(), N);
|
H A D | NSAutoreleasePoolChecker.cpp | 35 mutable OwningPtr<BugType> BT; member in class:__anon4040::NSAutoreleasePoolChecker 61 if (!BT) 62 BT.reset(new BugType("Use -drain instead of -release", 71 BugReport *Report = new BugReport(*BT, "Use -drain instead of -release when "
|
H A D | TaintTesterChecker.cpp | 25 mutable OwningPtr<BugType> BT; member in class:__anon4074::TaintTesterChecker 40 if (!BT) 41 BT.reset(new BugType("Tainted data", "General")); 53 BugReport *report = new BugReport(*BT, "tainted",N);
|
H A D | ArrayBoundChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon3982::ArrayBoundChecker 68 if (!BT) 69 BT.reset(new BuiltinBug("Out-of-bound array access", 78 new BugReport(*BT, BT->getDescription(), N);
|
H A D | CastToStructChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; member in class:__anon3999::CastToStructChecker 60 if (!BT) 61 BT.reset(new BuiltinBug("Cast from non-struct type to struct type", 65 BugReport *R = new BugReport(*BT,BT->getDescription(), N);
|
H A D | PointerArithChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; member in class:__anon4057::PointerArithChecker 55 if (!BT) 56 BT.reset(new BuiltinBug("Dangerous pointer arithmetic", 60 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | PointerSubChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon4058::PointerSubChecker 64 if (!BT) 65 BT.reset(new BuiltinBug("Pointer subtraction", 68 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | ReturnPointerRangeChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon4068::ReturnPointerRangeChecker 71 if (!BT) 72 BT.reset(new BuiltinBug("Return of pointer value outside of expected range", 82 new BugReport(*BT, BT->getDescription(), N);
|
H A D | UndefResultChecker.cpp | 31 mutable OwningPtr<BugType> BT; member in class:__anon4079::UndefResultChecker 48 if (!BT) 49 BT.reset(new BuiltinBug("Result of operation is garbage or undefined")); 77 BugReport *report = new BugReport(*BT, OS.str(), N);
|
H A D | UndefinedAssignmentChecker.cpp | 27 mutable OwningPtr<BugType> BT; member in class:__anon4081::UndefinedAssignmentChecker 48 if (!BT) 49 BT.reset(new BuiltinBug(str)); 78 BugReport *R = new BugReport(*BT, str, N);
|
H A D | ExprInspectionChecker.cpp | 21 mutable OwningPtr<BugType> BT; member in class:__anon4024::ExprInspectionChecker 93 if (!BT) 94 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 96 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N); 113 if (!BT) 114 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 116 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N);
|
H A D | CastSizeChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; member in class:__anon3998::CastSizeChecker 71 if (!BT) 72 BT.reset(new BuiltinBug("Cast region with wrong size.", 75 BugReport *R = new BugReport(*BT, BT->getDescription(),
|
H A D | UndefBranchChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; member in class:__anon4077::UndefBranchChecker 69 if (!BT) 70 BT.reset( 101 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | CallAndMessageChecker.cpp | 53 const CallEvent &Call, OwningPtr<BugType> &BT); 55 static void emitBadCall(BugType *BT, CheckerContext &C, const Expr *BadE); 63 static void LazyInit_BT(const char *desc, OwningPtr<BugType> &BT) { argument 64 if (!BT) 65 BT.reset(new BuiltinBug(desc)); 70 void CallAndMessageChecker::emitBadCall(BugType *BT, CheckerContext &C, argument 76 BugReport *R = new BugReport(*BT, BT->getName(), N); 117 OwningPtr<BugType> &BT) { 120 LazyInit_BT("Uninitialized argument value", BT); 111 PreVisitProcessArg(CheckerContext &C, SVal V, SourceRange argRange, const Expr *argEx, bool IsFirstArgument, bool checkUninitFields, const CallEvent &Call, OwningPtr<BugType> &BT) argument 291 OwningPtr<BugType> *BT; local 312 BugType *BT = 0; local [all...] |
H A D | DivZeroChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; member in class:__anon4022::DivZeroChecker 39 if (!BT) 40 BT.reset(new BuiltinBug("Division by zero")); 42 BugReport *R = new BugReport(*BT, Msg, N);
|
H A D | UndefCapturedBlockVarChecker.cpp | 30 mutable OwningPtr<BugType> BT; member in class:__anon4078::UndefCapturedBlockVarChecker 81 if (!BT) 82 BT.reset(new BuiltinBug("uninitialized variable captured by block")); 91 BugReport *R = new BugReport(*BT, os.str(), N);
|
H A D | BoolAssignmentChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; member in class:__anon3992::BoolAssignmentChecker 36 if (!BT) 37 BT.reset(new BuiltinBug("Assignment of a non-Boolean value")); 38 C.emitReport(new BugReport(*BT, BT->getDescription(), N));
|
H A D | ReturnUndefChecker.cpp | 72 static void emitBug(CheckerContext &C, BuiltinBug &BT, const Expr *RetE, argument 78 BugReport *Report = new BugReport(BT, BT.getDescription(), N);
|
H A D | BasicObjCFoundationChecks.cpp | 96 mutable OwningPtr<APIMisuse> BT; member in class:__anon3985::NilArgChecker 110 if (!BT) 111 BT.reset(new APIMisuse("nil argument")); 119 BugReport *R = new BugReport(*BT, os.str(), N); 196 mutable OwningPtr<APIMisuse> BT; member in class:__anon3986::CFNumberCreateChecker 366 if (!BT) 367 BT.reset(new APIMisuse("Bad use of CFNumberCreate")); 369 BugReport *report = new BugReport(*BT, os.str(), N); 381 mutable OwningPtr<APIMisuse> BT; member in class:__anon3987::CFRetainReleaseChecker 401 if (!BT) { 473 mutable OwningPtr<BugType> BT; member in class:__anon3988::ClassReleaseChecker 530 mutable OwningPtr<BugType> BT; member in class:__anon3989::VariadicMethodTypeChecker [all...] |
H A D | ObjCContainersChecker.cpp | 33 mutable OwningPtr<BugType> BT; member in class:__anon4050::ObjCContainersChecker 35 if (!BT) 36 BT.reset(new BugType("CFArray API", 140 BugReport *R = new BugReport(*BT, "Index is out of bounds", N);
|
H A D | VLASizeChecker.cpp | 32 mutable OwningPtr<BugType> BT; member in class:__anon4084::VLASizeChecker 53 if (!BT) 54 BT.reset(new BuiltinBug("Dangerous variable-length array (VLA) declaration")); 71 BugReport *report = new BugReport(*BT, os.str(), N);
|
/external/clang/lib/Serialization/ |
H A D | ASTCommon.h | 31 TypeIdx TypeIdxFromBuiltin(const BuiltinType *BT); 46 if (const BuiltinType *BT = dyn_cast<BuiltinType>(T.getTypePtr())) 47 return TypeIdxFromBuiltin(BT).asTypeID(FastQuals);
|
/external/clang/lib/AST/ |
H A D | Type.cpp | 642 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 643 return BT->getKind() >= BuiltinType::Bool && 644 BT->getKind() <= BuiltinType::Int128; 655 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 656 return BT->getKind() >= BuiltinType::Bool && 657 BT->getKind() <= BuiltinType::Int128; 672 if (const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType)) 673 return BT->getKind() == BuiltinType::Char_U || 674 BT->getKind() == BuiltinType::UChar || 675 BT 702 const BuiltinType *BT = dyn_cast<BuiltinType>(CanonicalType); local [all...] |