diff --git a/lib/checkbufferoverrun.cpp b/lib/checkbufferoverrun.cpp index 17020f926..25944688a 100644 --- a/lib/checkbufferoverrun.cpp +++ b/lib/checkbufferoverrun.cpp @@ -690,7 +690,8 @@ Check::FileInfo * CheckBufferOverrun::loadFileInfoFromXml(const tinyxml2::XMLEle } /** @brief Analyse all file infos for all TU */ -bool CheckBufferOverrun::analyseWholeProgram(const CTU::FileInfo *ctu, const std::list &fileInfo, const Settings& settings, ErrorLogger &errorLogger) { +bool CheckBufferOverrun::analyseWholeProgram(const CTU::FileInfo *ctu, const std::list &fileInfo, const Settings& settings, ErrorLogger &errorLogger) +{ if (!ctu) return false; bool foundErrors = false; @@ -698,8 +699,7 @@ bool CheckBufferOverrun::analyseWholeProgram(const CTU::FileInfo *ctu, const std const std::map> callsMap = ctu->getCallsMap(); - for (Check::FileInfo *fi1 : fileInfo) - { + for (Check::FileInfo *fi1 : fileInfo) { const MyFileInfo *fi = dynamic_cast(fi1); if (!fi) continue; @@ -707,12 +707,12 @@ bool CheckBufferOverrun::analyseWholeProgram(const CTU::FileInfo *ctu, const std const CTU::FileInfo::FunctionCall *functionCall = nullptr; const std::list &locationList = - ctu->getErrorPath(CTU::FileInfo::InvalidValueType::bufferOverflow, - unsafeUsage, - callsMap, - "Using argument ARG", - &functionCall, - false); + ctu->getErrorPath(CTU::FileInfo::InvalidValueType::bufferOverflow, + unsafeUsage, + callsMap, + "Using argument ARG", + &functionCall, + false); if (locationList.empty()) continue;