X-Git-Url: http://plrg.eecs.uci.edu/git/?a=blobdiff_plain;f=include%2Fllvm%2FAnalysis%2FFindUnsafePointerTypes.h;h=8f1cdcf0940de33e8a3819e1fcd335111ccda05a;hb=6fbcc26f1460eaee4e0eb8b426fc1ff0c7af11be;hp=038d7639c3b5b96e7baf42cacf0e5da75d046876;hpb=5d549083e2dc55cc1aa035f1069480d052717061;p=oota-llvm.git diff --git a/include/llvm/Analysis/FindUnsafePointerTypes.h b/include/llvm/Analysis/FindUnsafePointerTypes.h index 038d7639c3b..8f1cdcf0940 100644 --- a/include/llvm/Analysis/FindUnsafePointerTypes.h +++ b/include/llvm/Analysis/FindUnsafePointerTypes.h @@ -1,4 +1,11 @@ -//===- llvm/Analysis/FindUnsafePointerTypes.h - Unsafe pointers ---*- C++ -*-=// +//===- llvm/Analysis/FindUnsafePointerTypes.h - Unsafe pointers -*- C++ -*-===// +// +// The LLVM Compiler Infrastructure +// +// This file was developed by the LLVM research group and is distributed under +// the University of Illinois Open Source License. See LICENSE.TXT for details. +// +//===----------------------------------------------------------------------===// // // This file defines a pass that can be used to determine, interprocedurally, // which pointer types are accessed unsafely in a program. If there is an @@ -26,8 +33,6 @@ struct FindUnsafePointerTypes : public Pass { // UnsafeTypes - Set of types that are not safe to transform. std::set UnsafeTypes; public: - static AnalysisID ID; // We are an analysis, we must have an ID - // Accessor for underlying type set... inline const std::set &getUnsafeTypes() const { return UnsafeTypes; @@ -39,16 +44,14 @@ public: // virtual bool run(Module &M); - // printResults - Loop over the results of the analysis, printing out unsafe - // types. + // print - Loop over the results of the analysis, printing out unsafe types. // - void printResults(const Module *Mod, std::ostream &o) const; + void print(std::ostream &o, const Module *Mod) const; // getAnalysisUsage - Of course, we provide ourself... // virtual void getAnalysisUsage(AnalysisUsage &AU) const { AU.setPreservesAll(); - AU.addProvided(ID); } };