/external/chromium_org/third_party/yasm/source/patched-yasm/modules/parsers/tasm/tests/ |
H A D | segment.asm | 5 assume es:data label
|
/external/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ |
H A D | ConstraintManager.h | 67 virtual ProgramStateRef assume(ProgramStateRef state, 76 ProgramStateRef StTrue = assume(State, Cond, true); 86 assert(assume(State, Cond, false) && "System is over constrained."); 91 ProgramStateRef StFalse = assume(State, Cond, false);
|
H A D | ProgramState.h | 158 // Various "assume" methods form the interface for adding constraints to 159 // symbolic values. A call to 'assume' indicates an assumption being placed 160 // on one or symbolic values. 'assume' methods take the following inputs: 164 // (2) The assumed constraint (which is specific to a given "assume" method). 169 // The output of "assume*" is a new ProgramState object with the added constraints. 178 ProgramStateRef assume(DefinedOrUnknownSVal cond, bool assumption) const; 183 /// This is more efficient than calling assume() twice. Note that one (but not 186 assume(DefinedOrUnknownSVal cond) const; 634 inline ProgramStateRef ProgramState::assume(DefinedOrUnknownSVal Cond, function in class:clang::ento::ProgramState 640 ->assume(thi 644 ProgramState::assume(DefinedOrUnknownSVal Cond) const { function in class:clang::ento::ProgramState [all...] |
/external/clang/lib/StaticAnalyzer/Core/ |
H A D | SimpleConstraintManager.h | 36 ProgramStateRef assume(ProgramStateRef state, DefinedSVal Cond, 39 ProgramStateRef assume(ProgramStateRef state, NonLoc Cond, bool Assumption);
|
H A D | SimpleConstraintManager.cpp | 68 ProgramStateRef SimpleConstraintManager::assume(ProgramStateRef state, function in class:clang::ento::SimpleConstraintManager 84 return assume(state, Cond.castAs<NonLoc>(), Assumption); 87 ProgramStateRef SimpleConstraintManager::assume(ProgramStateRef state, function in class:clang::ento::SimpleConstraintManager 188 return assume(state, Cond.castAs<nonloc::LocAsInteger>().getLoc(),
|
H A D | ExprEngineObjC.cpp | 168 std::tie(notNilState, nilState) = State->assume(receiverVal);
|
H A D | ExprEngine.cpp | 131 if (ProgramStateRef newState = state->assume(*Constraint, true)) 147 state = state->assume(*LV, true); 162 state = state->assume(*LV, true); 1501 std::tie(StTrue, StFalse) = PrevState->assume(V); 1669 // Now "assume" that the case matches. 1670 if (ProgramStateRef stateNew = state->assume(Res, true)) { 1680 // Now "assume" that the case doesn't match. Add this state 1683 if (ProgramStateRef stateNew = DefaultSt->assume(Res, false)) { 1772 state = state->assume(V.castAs<DefinedOrUnknownSVal>(), true); 1859 // We instead treat these as lvalues and assume tha [all...] |
/external/clang/test/Analysis/inlining/ |
H A D | inline-defensive-checks.c | 115 void idcZero(int assume) { argument 116 if (assume)
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
H A D | ObjCAtSyncChecker.cpp | 63 std::tie(notNullState, nullState) = state->assume(V.castAs<DefinedSVal>()); 83 // under-constrained to be null or non-null, assume it is non-null
|
H A D | VLASizeChecker.cpp | 117 std::tie(stateNotZero, stateZero) = state->assume(sizeD); 124 // From this point on, assume that the size is not zero. 145 // Finally, assume that the array's extent matches the given size. 152 state = state->assume(sizeIsKnown, true);
|
H A D | BuiltinFunctionChecker.cpp | 71 state = state->assume(extentMatchesSizeArg, true);
|
H A D | PthreadLockChecker.cpp | 166 std::tie(lockFail, lockSucc) = state->assume(retVal); 169 std::tie(lockSucc, lockFail) = state->assume(retVal); 179 lockSucc = state->assume(retVal, false);
|
H A D | ExprInspectionChecker.cpp | 72 State->assume(AssertionVal.castAs<DefinedOrUnknownSVal>());
|
H A D | ReturnUndefChecker.cpp | 62 // is not available, but the return value expression has 'void' type, assume 106 std::tie(StNonNull, StNull) = C.getState()->assume(RetVal); 109 // Going forward, assume the location is non-null.
|
H A D | ArrayBoundCheckerV2.cpp | 124 state->assume(*lowerBoundToCheck); 132 // Otherwise, assume the constraint of the lower bound. 156 state->assume(*upperboundToCheck);
|
H A D | DereferenceChecker.cpp | 204 std::tie(notNullState, nullState) = state->assume(location); 243 std::tie(StNonNull, StNull) = State->assume(V.castAs<DefinedOrUnknownSVal>());
|
H A D | CStringChecker.cpp | 215 return state->assume(svalBuilder.evalEQ(state, *val, zero)); 256 // From here on, assume that the value is non-null. 447 state->assume(svalBuilder.evalEQ(state, *firstLoc, *secondLoc)); 455 // assume the two expressions are not equal. 468 std::tie(stateTrue, stateFalse) = state->assume(*reverseTest); 513 std::tie(stateTrue, stateFalse) = state->assume(*OverlapTest); 521 // assume the two expressions don't overlap. 585 state->assume(willOverflow.castAs<DefinedOrUnknownSVal>()); 612 // From now on, assume an overflow didn't occur. 690 state = state->assume(evalLengt [all...] |
H A D | UnixAPIChecker.cpp | 117 std::tie(trueState, falseState) = state->assume(maskedFlags); 198 state->assume(argVal.castAs<DefinedSVal>());
|
H A D | CallAndMessageChecker.cpp | 315 std::tie(StNonNull, StNull) = State->assume(L.castAs<DefinedOrUnknownSVal>()); 371 State->assume(V.castAs<DefinedOrUnknownSVal>()); 480 std::tie(notNilState, nilState) = state->assume(receiverVal); 578 // it most likely isn't nil. We should assume the semantics
|
H A D | BasicObjCFoundationChecks.cpp | 589 std::tie(stateTrue, stateFalse) = state->assume(ArgIsNull); 897 std::tie(StNonNil, StNil) = State->assume(*KnownCollection); 936 // Go ahead and assume the value is non-nil. 938 return State->assume(Val.castAs<DefinedOrUnknownSVal>(), true); 971 return State->assume(*CountGreaterThanZero, Assumption); 1149 // The symbol escaped. Pessimistically, assume that the count could have 1219 return State->assume(*DV, true); 1260 // Go ahead and assume the value is non-nil. 1268 // Go ahead and assume the value is non-nil.
|
H A D | MacOSKeychainAPIChecker.cpp | 244 ProgramStateRef ErrState = State->assume(NoErr, noError); 401 // In all other cases, assume the user supplied a correct deallocator 425 if (State->assume(ArgSVal.castAs<DefinedSVal>(), false) &&
|
/external/chromium_org/third_party/cython/src/Cython/Includes/cpython/ |
H A D | tuple.pxd | 66 # success. Client code should never assume that the resulting
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/preprocs/nasm/ |
H A D | nasm-pp.c | 525 struct TSegmentAssume *assume; local 528 for (assume = TAssumes; assume->segreg; assume++) { 529 if (!strcmp(assume->segment, segment)) 532 return assume->segreg; 861 } else if (!nasm_stricmp(p, "assume")) { 862 struct TSegmentAssume *assume; local 879 for (assume = TAssumes; assume [all...] |
/external/qemu/qobject/ |
H A D | json-parser.c | 651 * QInt/int64 container, thus we should assume these are to be handled
|
/external/jpeg/ |
H A D | ltconfig | 132 --with-gcc assume that the GNU C compiler will be used 133 --with-gnu-ld assume that the C compiler uses the GNU linker 553 # create non-PIC objects. So, if there were any warnings, we assume that
|