/external/clang/lib/StaticAnalyzer/Core/ |
CheckerManager.cpp | 1 //===--- CheckerManager.cpp - Static Analyzer Checker Manager -------------===// 10 // Defines the Static Analyzer Checker Manager. 17 #include "clang/StaticAnalyzer/Core/Checker.h" 158 Pred->getLocationContext(), checkFn.Checker); 196 const ProgramPoint &L = Msg.getProgramPoint(IsPreVisit,checkFn.Checker); 239 const ProgramPoint &L = Call.getProgramPoint(IsPreVisit,checkFn.Checker); 288 checkFn.Checker); 328 const ProgramPoint &L = PP.withTag(checkFn.Checker); 354 // Note, We do not chain the checker output (like in expandGraphWithCheckers) 370 checkFn.Checker); [all...] |
/external/clang/include/clang/StaticAnalyzer/Core/ |
Checker.h | 1 //== Checker.h - Registration mechanism for checkers -------------*- C++ -*--=// 10 // This file defines Checker, used to create and register checkers. 29 static void _register(void *checker, CheckerManager &mgr) { } 34 template <typename CHECKER> 35 static void _checkDecl(void *checker, const Decl *D, AnalysisManager& mgr, 37 ((const CHECKER *)checker)->checkASTDecl(cast<DECL>(D), mgr, BR); 44 template <typename CHECKER> 45 static void _register(CHECKER *checker, CheckerManager &mgr) [all...] |
/external/clang/lib/StaticAnalyzer/Checkers/ |
BasicObjCFoundationChecks.cpp | 24 #include "clang/StaticAnalyzer/Core/Checker.h" 93 class NilArgChecker : public Checker<check::PreObjCMessage, 310 class CFNumberCreateChecker : public Checker< check::PreStmt<CallExpr> > { 495 class CFRetainReleaseChecker : public Checker< check::PreStmt<CallExpr> > { 583 class ClassReleaseChecker : public Checker<check::PreObjCMessage> { 638 class VariadicMethodTypeChecker : public Checker<check::PreObjCMessage> { 795 : public Checker<check::PostStmt<ObjCForCollectionStmt>, [all...] |
CStringSyntaxChecker.cpp | 10 // An AST checker that looks for common pitfalls when using C string APIs. 23 #include "clang/StaticAnalyzer/Core/Checker.h" 178 class CStringSyntaxChecker: public Checker<check::ASTCodeBody> {
|
ChrootChecker.cpp | 10 // This file defines chroot checker, which checks improper use of chroot. 16 #include "clang/StaticAnalyzer/Core/Checker.h" 34 // This checker checks improper use of chroot. 41 class ChrootChecker : public Checker<eval::Call, check::PreStmt<CallExpr> > {
|
NonNullParamChecker.cpp | 1 //===--- NonNullParamChecker.cpp - Undefined arguments checker -*- C++ -*--===// 21 #include "clang/StaticAnalyzer/Core/Checker.h" 31 : public Checker< check::PreCall > {
|
ObjCContainersASTChecker.cpp | 10 // An AST checker that looks for common pitfalls when using 'CFArray', 19 #include "clang/StaticAnalyzer/Core/Checker.h" 162 class ObjCContainersASTChecker : public Checker<check::ASTCodeBody> {
|
ObjCContainersChecker.cpp | 1 //== ObjCContainersChecker.cpp - Path sensitive checker for CFArray *- C++ -*=// 22 #include "clang/StaticAnalyzer/Core/Checker.h" 31 class ObjCContainersChecker : public Checker< check::PreStmt<CallExpr>, 50 /// A tag to id this checker. 65 // Undefined is reported by another checker. 148 /// Register checker.
|
ObjCMissingSuperCallChecker.cpp | 10 // This file defines a ObjCMissingSuperCallChecker, a checker that 23 #include "clang/StaticAnalyzer/Core/Checker.h" 67 class ObjCSuperCallChecker : public Checker<
|
PthreadLockChecker.cpp | 10 // This defines PthreadLockChecker, a simple lock -> unlock checker. 17 #include "clang/StaticAnalyzer/Core/Checker.h" 27 class PthreadLockChecker : public Checker< check::PostStmt<CallExpr> > { 105 BT_doublelock.reset(new BugType("Double locking", "Lock checker")); 168 BT_lor.reset(new BugType("Lock order reversal", "Lock checker"));
|
VLASizeChecker.cpp | 1 //=== VLASizeChecker.cpp - Undefined dereference checker --------*- C++ -*-===// 20 #include "clang/StaticAnalyzer/Core/Checker.h" 31 class VLASizeChecker : public Checker< check::PreStmt<DeclStmt> > {
|
VirtualCallChecker.cpp | 10 // This file defines a checker that checks virtual function calls during 19 #include "clang/StaticAnalyzer/Core/Checker.h" 214 class VirtualCallChecker : public Checker<check::ASTDecl<CXXRecordDecl> > {
|
ArrayBoundCheckerV2.cpp | 18 #include "clang/StaticAnalyzer/Core/Checker.h" 30 public Checker<check::Location> {
|
CheckObjCDealloc.cpp | 10 // This file defines a CheckObjCDealloc, a checker that 24 #include "clang/StaticAnalyzer/Core/Checker.h" 278 class ObjCDeallocChecker : public Checker<
|
DereferenceChecker.cpp | 1 //== NullDerefChecker.cpp - Null dereference checker ------------*- C++ -*--==// 18 #include "clang/StaticAnalyzer/Core/Checker.h" 29 : public Checker< check::Location,
|
DirectIvarAssignment.cpp | 13 // Two versions of a checker exist: one that checks all methods and the other 17 // The checker does not warn about assignments to Ivars, annotated with 20 // checker. The annotation is allowed on properties and Ivars. 29 #include "clang/StaticAnalyzer/Core/Checker.h" 60 public Checker<check::ASTDecl<ObjCImplementationDecl> > { 196 // as a false positive suppression mechanism for the checker. The 225 // Register the checker that checks for direct accesses in all functions, 231 // Register the checker that checks for direct accesses in functions annotated
|
DynamicTypePropagation.cpp | 10 // This checker defines the rules for dynamic type gathering and propagation. 17 #include "clang/StaticAnalyzer/Core/Checker.h" 28 public Checker< check::PreCall,
|
MallocOverflowSecurityChecker.cpp | 10 // This checker detects a common memory allocation security flaw. 24 #include "clang/StaticAnalyzer/Core/Checker.h" 41 class MallocOverflowSecurityChecker : public Checker<check::ASTCodeBody> {
|
MallocSizeofChecker.cpp | 20 #include "clang/StaticAnalyzer/Core/Checker.h" 173 class MallocSizeofChecker : public Checker<check::ASTCodeBody> {
|
ObjCUnusedIVarsChecker.cpp | 10 // This file defines a CheckObjCUnusedIvars, a checker that 25 #include "clang/StaticAnalyzer/Core/Checker.h" 185 class ObjCUnusedIvarsChecker : public Checker<
|
/external/chromium_org/third_party/mesa/src/src/mesa/main/ |
APIspec.py | 216 self.checker = Checker() 226 self.checker.add_desc(desc) 229 self.checker.validate(self, param_nodes) 319 class Checker(object): 320 """A checker is the collection of all descriptions on the same level. 350 """Validate the checker against a function.""" 351 tmp = Checker() 376 flat_list.extend(desc.checker.flatten(name)) 389 if not desc.checker.always_check(name) [all...] |
/external/mesa3d/src/mesa/main/ |
APIspec.py | 216 self.checker = Checker() 226 self.checker.add_desc(desc) 229 self.checker.validate(self, param_nodes) 319 class Checker(object): 320 """A checker is the collection of all descriptions on the same level. 350 """Validate the checker against a function.""" 351 tmp = Checker() 376 flat_list.extend(desc.checker.flatten(name)) 389 if not desc.checker.always_check(name) [all...] |
/prebuilts/tools/common/m2/internal/com/google/code/findbugs/annotations/2.0.1/ |
annotations-2.0.1.jar | |
/external/chromium/chrome/browser/sync/engine/ |
build_and_process_conflict_sets_command.cc | 351 template <typename Checker> 355 Checker checker) { 367 double_step_parent_id = checker.GetAndExamineParent( 369 double_step_parent_id = checker.GetAndExamineParent( 373 if (checker.CausingConflict(parent, entry)) { 389 ServerDeletedPathChecker checker; local 390 CrawlDeletedTreeMergingSets(trans, *entry, conflict_progress, checker); 399 LocallyDeletedPathChecker checker; 400 if (!checker.CausingConflict(parent, *entry) [all...] |
/external/chromium_org/chrome/browser/extensions/api/declarative_webrequest/ |
webrequest_rules_registry.cc | 185 base::Bind(&Checker, base::Unretained(extension)), 333 bool WebRequestRulesRegistry::Checker(const Extension* extension,
|