/external/clang/lib/StaticAnalyzer/Checkers/ |
H A D | FixedAddressChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15519::FixedAddressChecker 54 if (!BT) 55 BT.reset(new BuiltinBug("Use fixed address", 59 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | TaintTesterChecker.cpp | 25 mutable OwningPtr<BugType> BT; member in class:__anon15568::TaintTesterChecker 40 if (!BT) 41 BT.reset(new BugType("Tainted data", "General")); 53 BugReport *report = new BugReport(*BT, "tainted",N);
|
H A D | UndefinedArraySubscriptChecker.cpp | 28 mutable OwningPtr<BugType> BT; member in class:__anon15574::UndefinedArraySubscriptChecker 52 if (!BT) 53 BT.reset(new BuiltinBug("Array subscript is undefined")); 56 BugReport *R = new BugReport(*BT, BT->getName(), N);
|
H A D | ArrayBoundChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15475::ArrayBoundChecker 68 if (!BT) 69 BT.reset(new BuiltinBug("Out-of-bound array access", 78 new BugReport(*BT, BT->getDescription(), N);
|
H A D | CastSizeChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15491::CastSizeChecker 71 if (!BT) 72 BT.reset(new BuiltinBug("Cast region with wrong size.", 75 BugReport *R = new BugReport(*BT, BT->getDescription(),
|
H A D | CastToStructChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15492::CastToStructChecker 60 if (!BT) 61 BT.reset(new BuiltinBug("Cast from non-struct type to struct type", 65 BugReport *R = new BugReport(*BT,BT->getDescription(), N);
|
H A D | DivZeroChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15516::DivZeroChecker 39 if (!BT) 40 BT.reset(new BuiltinBug("Division by zero")); 42 BugReport *R = new BugReport(*BT, Msg, N);
|
H A D | NSAutoreleasePoolChecker.cpp | 35 mutable OwningPtr<BugType> BT; member in class:__anon15534::NSAutoreleasePoolChecker 61 if (!BT) 62 BT.reset(new BugType("Use -drain instead of -release", 71 BugReport *Report = new BugReport(*BT, "Use -drain instead of -release when "
|
H A D | PointerArithChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15551::PointerArithChecker 55 if (!BT) 56 BT.reset(new BuiltinBug("Dangerous pointer arithmetic", 60 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | PointerSubChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15552::PointerSubChecker 64 if (!BT) 65 BT.reset(new BuiltinBug("Pointer subtraction", 68 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | ReturnPointerRangeChecker.cpp | 28 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15562::ReturnPointerRangeChecker 71 if (!BT) 72 BT.reset(new BuiltinBug("Return of pointer value outside of expected range", 82 new BugReport(*BT, BT->getDescription(), N);
|
H A D | UndefCapturedBlockVarChecker.cpp | 30 mutable OwningPtr<BugType> BT; member in class:__anon15572::UndefCapturedBlockVarChecker 81 if (!BT) 82 BT.reset(new BuiltinBug("uninitialized variable captured by block")); 91 BugReport *R = new BugReport(*BT, os.str(), N);
|
H A D | UndefResultChecker.cpp | 31 mutable OwningPtr<BugType> BT; member in class:__anon15573::UndefResultChecker 57 if (!BT) 58 BT.reset(new BuiltinBug("Result of operation is garbage or undefined")); 86 BugReport *report = new BugReport(*BT, OS.str(), N);
|
H A D | UndefinedAssignmentChecker.cpp | 27 mutable OwningPtr<BugType> BT; member in class:__anon15575::UndefinedAssignmentChecker 56 if (!BT) 57 BT.reset(new BuiltinBug(str)); 86 BugReport *R = new BugReport(*BT, str, N);
|
H A D | ExprInspectionChecker.cpp | 21 mutable OwningPtr<BugType> BT; member in class:__anon15518::ExprInspectionChecker 95 if (!BT) 96 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 98 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N); 115 if (!BT) 116 BT.reset(new BugType("Checking analyzer assumptions", "debug")); 118 BugReport *R = new BugReport(*BT, getArgumentValueString(CE, C), N);
|
H A D | ReturnUndefChecker.cpp | 81 static void emitBug(CheckerContext &C, BuiltinBug &BT, const Expr *RetE, argument 87 BugReport *Report = new BugReport(BT, BT.getDescription(), N);
|
H A D | BoolAssignmentChecker.cpp | 26 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15485::BoolAssignmentChecker 36 if (!BT) 37 BT.reset(new BuiltinBug("Assignment of a non-Boolean value")); 38 C.emitReport(new BugReport(*BT, BT->getDescription(), N));
|
H A D | UndefBranchChecker.cpp | 27 mutable OwningPtr<BuiltinBug> BT; member in class:__anon15571::UndefBranchChecker 69 if (!BT) 70 BT.reset( 101 BugReport *R = new BugReport(*BT, BT->getDescription(), N);
|
H A D | ObjCContainersChecker.cpp | 33 mutable OwningPtr<BugType> BT; member in class:__anon15544::ObjCContainersChecker 35 if (!BT) 36 BT.reset(new BugType("CFArray API", 140 BugReport *R = new BugReport(*BT, "Index is out of bounds", N);
|
H A D | VLASizeChecker.cpp | 32 mutable OwningPtr<BugType> BT; member in class:__anon15578::VLASizeChecker 53 if (!BT) 54 BT.reset(new BuiltinBug("Dangerous variable-length array (VLA) declaration")); 71 BugReport *report = new BugReport(*BT, os.str(), N);
|
/external/clang/examples/analyzer-plugin/ |
H A D | MainCallChecker.cpp | 11 mutable OwningPtr<BugType> BT; member in class:__anon14871::MainCallChecker 37 if (!BT) 38 BT.reset(new BugType("call to main", "example analyzer plugin")); 40 BugReport *report = new BugReport(*BT, BT->getName(), N);
|
/external/clang/lib/Serialization/ |
H A D | ASTCommon.cpp | 26 serialization::TypeIdxFromBuiltin(const BuiltinType *BT) { argument 28 switch (BT->getKind()) {
|
/external/clang/lib/AST/ |
H A D | NSAPI.cpp | 290 const BuiltinType *BT = T->getAs<BuiltinType>(); local 291 if (!BT) 305 switch (BT->getKind()) {
|
/external/clang/lib/Analysis/ |
H A D | ScanfFormatString.cpp | 387 const BuiltinType *BT = PT->getAs<BuiltinType>(); local 388 if (!BT) 402 switch (BT->getKind()) {
|
H A D | PrintfFormatString.cpp | 438 const BuiltinType *BT = QT->getAs<BuiltinType>(); local 439 if (!BT) 443 switch (BT->getKind()) {
|