OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:checker
(Results
251 - 275
of
1436
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/clang/include/clang/StaticAnalyzer/Checkers/
CheckerBase.td
1
//===--- CheckerBase.td -
Checker
TableGen classes ------------------------===//
28
class
Checker
<string name = ""> {
/external/clang/lib/StaticAnalyzer/Checkers/
ClangSACheckers.h
27
#define
CHECKER
(FULLNAME,CLASS,CXXFILE,HELPTEXT,GROUPINDEX,HIDDEN) \
30
#undef
CHECKER
CheckObjCInstMethSignature.cpp
22
#include "clang/StaticAnalyzer/Core/
Checker
.h"
44
const CheckerBase *
Checker
) {
74
MethDerived,
Checker
, "Incompatible instance method return type",
81
const CheckerBase *
Checker
) {
116
CompareReturnTypes(MethDerived, M, BR, Ctx, ID,
Checker
);
128
class ObjCMethSigsChecker : public
Checker
<
ObjCContainersChecker.cpp
1
//== ObjCContainersChecker.cpp - Path sensitive
checker
for CFArray *- C++ -*=//
22
#include "clang/StaticAnalyzer/Core/
Checker
.h"
31
class ObjCContainersChecker : public
Checker
< check::PreStmt<CallExpr>,
51
/// A tag to id this
checker
.
70
// Undefined is reported by another
checker
.
172
/// Register
checker
.
DynamicTypeChecker.cpp
10
// This
checker
looks for cases where the dynamic type of an object is unrelated
12
// by the DynamicTypePropagation
checker
. This check does not report any type
14
// ObjC Generics
checker
. This
checker
is not supposed to modify the program
22
#include "clang/StaticAnalyzer/Core/
Checker
.h"
33
class DynamicTypeChecker : public
Checker
<check::PostStmt<ImplicitCastExpr>> {
197
// Specialized objects are handled by the generics
checker
.
PthreadLockChecker.cpp
10
// This defines PthreadLockChecker, a simple lock -> unlock
checker
.
17
#include "clang/StaticAnalyzer/Core/
Checker
.h"
52
class PthreadLockChecker : public
Checker
< check::PostStmt<CallExpr> > {
144
"Lock
checker
"));
206
"Lock
checker
"));
229
BT_lor.reset(new BugType(this, "Lock order reversal", "Lock
checker
"));
274
"Lock
checker
"));
309
"Lock
checker
"));
322
"Lock
checker
"));
VirtualCallChecker.cpp
10
// This file defines a
checker
that checks virtual function calls during
19
#include "clang/StaticAnalyzer/Core/
Checker
.h"
31
const CheckerBase *
Checker
;
62
WalkAST(const CheckerBase *
checker
, BugReporter &br,
64
:
Checker
(
checker
), BR(br), AC(ac), visitingCallExpr(nullptr) {}
197
BR.EmitBasicReport(AC->getDecl(),
Checker
,
206
BR.EmitBasicReport(AC->getDecl(),
Checker
,
219
class VirtualCallChecker : public
Checker
<check::ASTDecl<CXXRecordDecl> > {
/external/clang/test/Analysis/
Malloc+MismatchedDeallocator_intersections.cpp
1
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,unix.Malloc,unix.MismatchedDeallocator -analyzer-store region -std=c++11 -verify %s
10
// warnings produced by the alpha.cplusplus.NewDelete
checker
.
cxx11-crashes.cpp
1
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core -std=c++11 -verify %s
78
// the dereference
checker
issues an assume on a CompoundVal.
properties.mm
1
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,osx.cocoa.RetainCount,debug.ExprInspection -analyzer-store=region -verify -Wno-objc-root-class %s
2
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,osx.cocoa.RetainCount,debug.ExprInspection -analyzer-store=region -verify -Wno-objc-root-class -fobjc-arc %s
rdar-6540084.m
1
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,alpha.core -analyzer-
checker
=deadcode.DeadStores -verify %s
rdar-6562655.m
1
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,osx.cocoa.RetainCount,alpha.core -analyzer-constraints=range -analyzer-store=region -verify %s
4
// This test case mainly checks that the retain/release
checker
doesn't crash
/external/clang/test/Analysis/inlining/
retain-count-self-init.m
1
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,osx.cocoa.RetainCount,osx.cocoa.SelfInit -analyzer-config ipa=dynamic-bifurcate -verify %s
22
// stop tracking the receiver of init with respect to Retain Release
checker
.
stl.cpp
1
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,unix.Malloc,cplusplus.NewDelete,debug.ExprInspection -analyzer-config c++-container-inlining=true -analyzer-config c++-stdlib-inlining=false -std=c++11 -verify %s
2
// RUN: %clang_cc1 -analyze -analyzer-
checker
=core,unix.Malloc,cplusplus.NewDelete,debug.ExprInspection -analyzer-config c++-container-inlining=true -analyzer-config c++-stdlib-inlining=true -std=c++11 -DINLINE=1 -verify %s
/external/clang/test/SemaObjCXX/
property-reference.mm
63
// Make sure that the default-argument
checker
looks through
65
// needs to force l2r to test this effectively because the
checker
/prebuilts/go/darwin-x86/src/net/http/
filetransport_test.go
14
func
checker
(t *testing.T) func(string, error) {
func
24
check :=
checker
(t)
/prebuilts/go/linux-x86/src/net/http/
filetransport_test.go
14
func
checker
(t *testing.T) func(string, error) {
func
24
check :=
checker
(t)
/prebuilts/go/darwin-x86/pkg/darwin_amd64/go/
types.a
331
type @"".
Checker
struct { @"".conf *@"".Config; @"".fset *@"go/token".FileSet; @"".pkg *@"".Package; ? *@"".Info; @"".objMap map[@"".Object]*@"".declInfo; @"".files []*@"go/ast".File; @"".unusedDotImports map[*@"".Scope]map[*@"".Package]@"go/token".Pos; @"".firstErr error; @"".methods map[string][]*@"".Func; @"".untyped map[@"go/ast".Expr]@"".exprInfo; @"".funcs []@"".funcInfo; @"".delayed []func(); ? @"".context; @"".pos @"go/token".Pos; @"".indent int }
332
func (@"".check·2 *@"".
Checker
) Files (@"".files·3 []*@"go/ast".File "esc:0x9") (@"".err·1 error)
333
func (@"".check·1 *@"".
Checker
"esc:0x9") @"".addDeclDep (@"".to·2 @"".Object) { var @"".from·3 *@"".declInfo; @"".from·3 = @"".check·1.@"".context.@"".decl; if @"".from·3 == nil { return }; { var @"".found·4 bool; _, @"".found·4 = @"".check·1.@"".objMap[@"".to·2]; if !@"".found·4 { return }}; @"".from·3.@"".addDep(@"".to·2) }
334
func (@"".check·1 *@"".
Checker
) @"".addMethodDecls (@"".obj·2 *@"".TypeName "esc:0x9"
[
all
...]
/prebuilts/go/linux-x86/pkg/linux_amd64/go/
types.a
331
type @"".
Checker
struct { @"".conf *@"".Config; @"".fset *@"go/token".FileSet; @"".pkg *@"".Package; ? *@"".Info; @"".objMap map[@"".Object]*@"".declInfo; @"".files []*@"go/ast".File; @"".unusedDotImports map[*@"".Scope]map[*@"".Package]@"go/token".Pos; @"".firstErr error; @"".methods map[string][]*@"".Func; @"".untyped map[@"go/ast".Expr]@"".exprInfo; @"".funcs []@"".funcInfo; @"".delayed []func(); ? @"".context; @"".pos @"go/token".Pos; @"".indent int }
332
func (@"".check·2 *@"".
Checker
) Files (@"".files·3 []*@"go/ast".File "esc:0x9") (@"".err·1 error)
333
func (@"".check·1 *@"".
Checker
"esc:0x9") @"".addDeclDep (@"".to·2 @"".Object) { var @"".from·3 *@"".declInfo; @"".from·3 = @"".check·1.@"".context.@"".decl; if @"".from·3 == nil { return }; { var @"".found·4 bool; _, @"".found·4 = @"".check·1.@"".objMap[@"".to·2]; if !@"".found·4 { return }}; @"".from·3.@"".addDep(@"".to·2) }
334
func (@"".check·1 *@"".
Checker
) @"".addMethodDecls (@"".obj·2 *@"".TypeName "esc:0x9"
[
all
...]
/external/chromium-trace/catapult/third_party/closure_linter/closure_linter/
checkerbase.py
36
def Initialize(self,
checker
, limited_doc_checks, is_html):
40
checker
: Class to report errors to.
44
self.__checker =
checker
50
"""Call the HandleError function for the
checker
we are associated with."""
90
"""Initialize a
checker
object.
122
"""Returns true if the style
checker
has found any errors.
125
True if the style
checker
has found any errors.
/external/mesa3d/src/mesa/main/
APIspecutil.py
112
switch = func.
checker
.switches.get(param.name, [])
115
if not desc.
checker
.switches:
120
items = desc.
checker
.switches.items()
129
if dep_desc.
checker
.switches:
154
if not func.
checker
.always_check(src_param.name):
157
for desc in func.
checker
.flatten(src_param.name):
183
for desc in func.
checker
.flatten(param.name):
/external/clang/include/clang/StaticAnalyzer/Core/
AnalyzerOptions.h
128
/// \brief Pair of
checker
name and enable/disable.
269
///
checker
name.
276
/// @param [in] CheckerName Full-qualified
checker
name, like
281
/// specified for the given
checker
the options for the parent packages will
284
/// @retval CheckerOptionValue An option for a
checker
if it was specified.
286
///
checker
-specific options were found. The closer group to
checker
,
288
/// priority than @c coregroup for @c coregroup.subgroup.CheckerName
checker
.
289
/// @retval Default If nor
checker
option, nor group option was found.
302
/// @param [in] C The optional
checker
parameter that can be used to restric
[
all
...]
/external/antlr/antlr-3.4/runtime/Python/
pylintrc
3
# This is the main
checker
controling the other ones and the reports
4
# generation. It is itself both a raw
checker
and an astng
checker
in order
41
# Enable only
checker
(s) with the given id(s). This option conflict with the
42
# disable-
checker
option
43
#enable-
checker
=
45
# Enable all
checker
(s) except those with the given id(s). This option conflict
46
# with the disable-
checker
option
47
#disable-
checker
=
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/
pylintrc
3
# This is the main
checker
controlling the other ones and the reports
4
# generation. It is itself both a raw
checker
and an astng
checker
in order
35
# Enable only
checker
(s) with the given id(s). This option conflict with the
36
# disable-
checker
option
37
#enable-
checker
=
39
# Enable all
checker
(s) except those with the given id(s). This option conflict
40
# with the disable-
checker
option
41
#disable-
checker
=
/device/generic/goldfish/camera/
EmulatedFakeCameraDevice.h
43
* a black and white
checker
board, moving diagonally towards the 0,0 corner.
103
/* Draws a black and white
checker
board in the current frame buffer. */
126
* Pixel colors in YUV format used when drawing the
checker
board.
171
/* Defines time (in nanoseconds) between redrawing the
checker
board.
172
* We will redraw the
checker
board every 15 milliseconds. */
Completed in 907 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>