/external/llvm/test/Other/ |
D | lint.ll | 19 ; CHECK: Null pointer dereference 21 ; CHECK: Null pointer dereference 23 ; CHECK: Undef pointer dereference 25 ; CHECK: Undef pointer dereference 27 ; CHECK: All-ones pointer dereference 29 ; CHECK: Address one pointer dereference 67 ; CHECK: Undefined behavior: Null pointer dereference 69 ; CHECK: Undefined behavior: Null pointer dereference 168 ; CHECK: Undefined behavior: Undef pointer dereference
|
/external/parameter-framework/asio-1.10.6/include/asio/ip/ |
D | basic_resolver_iterator.hpp | 141 return dereference(); in operator *() 147 return &dereference(); in operator ->() 199 const basic_resolver_entry<InternetProtocol>& dereference() const in dereference() function in asio::ip::basic_resolver_iterator
|
/external/parameter-framework/asio-1.10.6/include/asio/detail/ |
D | consuming_buffers.hpp | 69 return dereference(); in operator *() 75 return &dereference(); in operator ->() 137 const Buffer& dereference() const in dereference() function in asio::detail::consuming_buffers_iterator
|
/external/jsoncpp/src/lib_json/ |
D | json_internalarray.inl | 176 Value& ValueInternalArray::dereference(const IteratorState& it) { function in Json::ValueInternalArray 181 "ValueInternalArray::dereference(): dereferencing invalid iterator"); 219 new (value) Value(dereference(itOther)); 235 Value* value = &dereference(it); 272 Value* value = &dereference(it); 311 Value* value = &dereference(it);
|
D | json_valueiterator.inl | 51 return ValueInternalArray::dereference(iterator_.array_);
|
/external/clang/test/Analysis/ |
D | CheckNSError.m | 25 …or errorWithDomain:@"domain" code:1 userInfo:0]; // expected-warning {{Potential null dereference}} 38 *error = 0; // expected-warning {{Potential null dereference}}
|
D | reference.mm | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify -Wno-null-dereference %s
|
D | CFRetainRelease_NSAssertionHandler.m | 31 // There should be no null dereference flagged by the checker because of
|
D | misc-ps.m | 2 …zer-constraints=range -verify -fblocks -Wno-unreachable-code -Wno-null-dereference -Wno-objc-root-… 3 …zer-constraints=range -verify -fblocks -Wno-unreachable-code -Wno-null-dereference -Wno-objc-root-… 416 // <rdar://problem/7062158> false positive null dereference due to 885 // Not a null dereference. 1129 // <rdar://problem/6352035> rule request: direct structure member access null pointer dereference 1140 …friend->c = 7; // expected-warning{{Access to instance variable 'c' results in a dereference of a … 1144 …c = 7; // expected-warning{{Access to instance variable 'c' results in a dereference of a null poi… 1164 // PR 8440 - False null dereference during store to array-in-field-in-global.
|
D | null-deref-path-notes.m | 33 … in a dereference of a null pointer (loaded from variable 'self')}} expected-note{{Access to insta… 506 … <string>Access to instance variable 'uniqueID' results in a dereference of a null point… 508 … <string>Access to instance variable 'uniqueID' results in a dereference of a null point… 511 …><string>Access to instance variable 'uniqueID' results in a dereference of a null point…
|
D | nullability.mm | 58 // Make every dereference a different path to avoid sinks after errors.
|
D | misc-ps-region-store.m | 363 // The following use of 'y->x' previously triggered a null dereference, as the value of 'y' 535 // When using basic-store, we get a null dereference here because we lose information 976 // Previously this triggered a bogus null dereference warning. 1137 // is the same as one of the string literals. The null dereference
|
/external/bison/m4/ |
D | memchr.m4 | 25 # memchr should not dereference anything with length 0 27 # memchr should not dereference overestimated length after a match
|
/external/eigen/debug/gdb/ |
D | printers.py | 114 item = self.dataPtr.dereference() 163 item = self.dataPtr.dereference()
|
/external/llvm/test/Assembler/ |
D | ConstantExprNoFold.ll | 14 ; icmp should return true. It's not valid to *dereference* in @B from a pointer 15 ; based on @A, but icmp isn't a dereference.
|
/external/guava/guava/src/com/google/common/util/concurrent/ |
D | AsyncSettableFuture.java | 45 private final ListenableFuture<V> dereferenced = Futures.dereference(nested);
|
/external/clang/test/Modules/ |
D | crashes.m | 10 // While iterating through the macros it would dereference a null pointer if the macro was undefine…
|
/external/c-ares/ |
D | RELEASE-NOTES | 17 o advance_tcp_send_queue: avoid NULL ptr dereference
|
/external/v8/tools/gcmole/ |
D | README | 16 includes receiver) in any order. That means it can dereference baz before
|
/external/clang/test/Analysis/inlining/ |
D | inline-defensive-checks.m | 76 …return mem->x; // expected-warning {{Access to instance variable 'x' results in a dereference of a…
|
/external/guava/guava-tests/test/com/google/common/util/concurrent/ |
D | FuturesTest.java | 744 ListenableFuture<?> dereferenced = Futures.dereference(outer); 752 ListenableFuture<Foo> dereferenced = Futures.<Foo>dereference(outer); 758 ListenableFuture<Foo> dereferenced = Futures.dereference(outer); 766 ListenableFuture<Foo> dereferenced = Futures.dereference(outer); 773 ListenableFuture<Foo> dereferenced = Futures.dereference(outer); 781 ListenableFuture<Foo> dereferenced = Futures.dereference(outer);
|
/external/libcxx/include/ |
D | __hash_table | 154 … "Attempted to dereference a non-dereferenceable unordered container iterator"); 163 … "Attempted to dereference a non-dereferenceable unordered container iterator"); 301 … "Attempted to dereference a non-dereferenceable unordered container const_iterator"); 310 … "Attempted to dereference a non-dereferenceable unordered container const_iterator"); 433 … "Attempted to dereference a non-dereferenceable unordered container local_iterator"); 442 … "Attempted to dereference a non-dereferenceable unordered container local_iterator"); 598 … "Attempted to dereference a non-dereferenceable unordered container const_local_iterator"); 607 … "Attempted to dereference a non-dereferenceable unordered container const_local_iterator");
|
/external/curl/ |
D | RELEASE-NOTES | 48 o FTP: fix dangling conn->ip_addr dereference on verbose EPSV
|
/external/jsoncpp/include/json/ |
D | value.h | 799 static Value& dereference(const IteratorState& iterator);
|
/external/expat/ |
D | Changes | 6 #502: Fix potential null pointer dereference
|