/external/cblas/ |
H A D | Makefile.ALPHA | 40 CFLAGS = -std1 -I/usr/include -assume aligned_objects -DADD_
|
/external/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ |
H A D | ConstraintManager.h | 67 virtual ProgramStateRef assume(ProgramStateRef state, 76 ProgramStateRef StTrue = assume(State, Cond, true); 86 assert(assume(State, Cond, false) && "System is over constrained."); 91 ProgramStateRef StFalse = assume(State, Cond, false);
|
H A D | ProgramState.h | 159 // Various "assume" methods form the interface for adding constraints to 160 // symbolic values. A call to 'assume' indicates an assumption being placed 161 // on one or symbolic values. 'assume' methods take the following inputs: 165 // (2) The assumed constraint (which is specific to a given "assume" method). 170 // The output of "assume*" is a new ProgramState object with the added constraints. 179 ProgramStateRef assume(DefinedOrUnknownSVal cond, bool assumption) const; 184 /// This is more efficient than calling assume() twice. Note that one (but not 187 assume(DefinedOrUnknownSVal cond) const; 635 inline ProgramStateRef ProgramState::assume(DefinedOrUnknownSVal Cond, function in class:clang::ento::ProgramState 641 ->assume(thi 645 ProgramState::assume(DefinedOrUnknownSVal Cond) const { function in class:clang::ento::ProgramState [all...] |
/external/llvm/lib/Analysis/ |
H A D | AssumptionCache.cpp | 1 //===- AssumptionCache.cpp - Cache finding @llvm.assume calls -------------===// 10 // This file contains a pass that keeps track of @llvm.assume intrinsics in 31 // Go through all instructions in all blocks, add all calls to @llvm.assume 35 if (match(&II, m_Intrinsic<Intrinsic::assume>())) 43 assert(match(CI, m_Intrinsic<Intrinsic::assume>()) && 44 "Registered call does not call @llvm.assume"); 55 "Cannot register @llvm.assume call not in a basic block"); 57 "Cannot register @llvm.assume call not in this function"); 69 assert(match(cast<CallInst>(VH), m_Intrinsic<Intrinsic::assume>()) && 70 "Cached something other than a call to @llvm.assume!"); [all...] |
/external/clang/lib/StaticAnalyzer/Core/ |
H A D | SimpleConstraintManager.h | 36 ProgramStateRef assume(ProgramStateRef state, DefinedSVal Cond, 39 ProgramStateRef assume(ProgramStateRef state, NonLoc Cond, bool Assumption);
|
H A D | SimpleConstraintManager.cpp | 68 ProgramStateRef SimpleConstraintManager::assume(ProgramStateRef state, function in class:clang::ento::SimpleConstraintManager 84 return assume(state, Cond.castAs<NonLoc>(), Assumption); 87 ProgramStateRef SimpleConstraintManager::assume(ProgramStateRef state, function in class:clang::ento::SimpleConstraintManager 188 return assume(state, Cond.castAs<nonloc::LocAsInteger>().getLoc(),
|
H A D | ExprEngineObjC.cpp | 168 std::tie(notNilState, nilState) = State->assume(receiverVal);
|
H A D | ExprEngine.cpp | 140 if (ProgramStateRef newState = state->assume(*Constraint, true)) 156 state = state->assume(*LV, true); 171 state = state->assume(*LV, true); 1592 std::tie(StTrue, StFalse) = PrevState->assume(V); 1779 // Now "assume" that the case matches. 1780 if (ProgramStateRef stateNew = state->assume(Res, true)) { 1790 // Now "assume" that the case doesn't match. Add this state 1793 if (ProgramStateRef stateNew = DefaultSt->assume(Res, false)) { 1882 state = state->assume(V.castAs<DefinedOrUnknownSVal>(), true); 1971 // We instead treat these as lvalues and assume tha [all...] |
/external/clang/test/Analysis/inlining/ |
H A D | inline-defensive-checks.c | 115 void idcZero(int assume) { argument 116 if (assume)
|
/external/clang/lib/StaticAnalyzer/Checkers/ |
H A D | ObjCAtSyncChecker.cpp | 63 std::tie(notNullState, nullState) = state->assume(V.castAs<DefinedSVal>()); 83 // under-constrained to be null or non-null, assume it is non-null
|
H A D | VLASizeChecker.cpp | 120 std::tie(stateNotZero, stateZero) = state->assume(sizeD); 127 // From this point on, assume that the size is not zero. 167 // Finally, assume that the array's extent matches the given size. 174 state = state->assume(sizeIsKnown, true);
|
H A D | BuiltinFunctionChecker.cpp | 73 state = state->assume(extentMatchesSizeArg, true);
|
H A D | PthreadLockChecker.cpp | 166 std::tie(lockFail, lockSucc) = state->assume(retVal); 169 std::tie(lockSucc, lockFail) = state->assume(retVal); 179 lockSucc = state->assume(retVal, false);
|
H A D | ExprInspectionChecker.cpp | 72 State->assume(AssertionVal.castAs<DefinedOrUnknownSVal>());
|
H A D | ReturnUndefChecker.cpp | 62 // is not available, but the return value expression has 'void' type, assume 106 std::tie(StNonNull, StNull) = C.getState()->assume(RetVal); 109 // Going forward, assume the location is non-null.
|
H A D | ArrayBoundCheckerV2.cpp | 124 state->assume(*lowerBoundToCheck); 132 // Otherwise, assume the constraint of the lower bound. 156 state->assume(*upperboundToCheck);
|
H A D | DereferenceChecker.cpp | 204 std::tie(notNullState, nullState) = state->assume(location); 243 std::tie(StNonNull, StNull) = State->assume(V.castAs<DefinedOrUnknownSVal>());
|
H A D | CStringChecker.cpp | 215 return state->assume(svalBuilder.evalEQ(state, *val, zero)); 256 // From here on, assume that the value is non-null. 447 state->assume(svalBuilder.evalEQ(state, *firstLoc, *secondLoc)); 455 // assume the two expressions are not equal. 468 std::tie(stateTrue, stateFalse) = state->assume(*reverseTest); 513 std::tie(stateTrue, stateFalse) = state->assume(*OverlapTest); 521 // assume the two expressions don't overlap. 585 state->assume(willOverflow.castAs<DefinedOrUnknownSVal>()); 612 // From now on, assume an overflow didn't occur. 690 state = state->assume(evalLengt [all...] |
H A D | UnixAPIChecker.cpp | 149 std::tie(trueState, falseState) = state->assume(maskedFlags); 222 state->assume(argVal.castAs<DefinedSVal>());
|
H A D | CallAndMessageChecker.cpp | 315 std::tie(StNonNull, StNull) = State->assume(L.castAs<DefinedOrUnknownSVal>()); 371 State->assume(V.castAs<DefinedOrUnknownSVal>()); 480 std::tie(notNilState, nilState) = state->assume(receiverVal); 578 // it most likely isn't nil. We should assume the semantics
|
H A D | BasicObjCFoundationChecks.cpp | 589 std::tie(stateTrue, stateFalse) = state->assume(ArgIsNull); 897 std::tie(StNonNil, StNil) = State->assume(*KnownCollection); 936 // Go ahead and assume the value is non-nil. 938 return State->assume(Val.castAs<DefinedOrUnknownSVal>(), true); 971 return State->assume(*CountGreaterThanZero, Assumption); 1149 // The symbol escaped. Pessimistically, assume that the count could have 1219 return State->assume(*DV, true); 1260 // Go ahead and assume the value is non-nil. 1268 // Go ahead and assume the value is non-nil.
|
H A D | MacOSKeychainAPIChecker.cpp | 244 ProgramStateRef ErrState = State->assume(NoErr, noError); 409 // In all other cases, assume the user supplied a correct deallocator 433 if (State->assume(ArgSVal.castAs<DefinedSVal>(), false) &&
|
/external/llvm/include/llvm/Transforms/Utils/ |
H A D | VectorUtils.h | 104 ID == Intrinsic::lifetime_end || ID == Intrinsic::assume)
|
/external/google-breakpad/android/google_breakpad/ |
H A D | Android.mk | 49 # We assume this Android.mk to be under 'android/google_breakpad'
|
/external/jpeg/ |
H A D | ltconfig | 132 --with-gcc assume that the GNU C compiler will be used 133 --with-gnu-ld assume that the C compiler uses the GNU linker 553 # create non-PIC objects. So, if there were any warnings, we assume that
|