HomeSort by relevance Sort by last modified time
    Searched full:checker (Results 251 - 275 of 1436) sorted by null

<<11121314151617181920>>

  /external/clang/include/clang/StaticAnalyzer/Checkers/
CheckerBase.td 1 //===--- CheckerBase.td - Checker TableGen classes ------------------------===//
28 class Checker<string name = ""> {
  /external/clang/lib/StaticAnalyzer/Checkers/
ClangSACheckers.h 27 #define CHECKER(FULLNAME,CLASS,CXXFILE,HELPTEXT,GROUPINDEX,HIDDEN) \
30 #undef CHECKER
CheckObjCInstMethSignature.cpp 22 #include "clang/StaticAnalyzer/Core/Checker.h"
44 const CheckerBase *Checker) {
74 MethDerived, Checker, "Incompatible instance method return type",
81 const CheckerBase *Checker) {
116 CompareReturnTypes(MethDerived, M, BR, Ctx, ID, Checker);
128 class ObjCMethSigsChecker : public Checker<
ObjCContainersChecker.cpp 1 //== ObjCContainersChecker.cpp - Path sensitive checker for CFArray *- C++ -*=//
22 #include "clang/StaticAnalyzer/Core/Checker.h"
31 class ObjCContainersChecker : public Checker< check::PreStmt<CallExpr>,
51 /// A tag to id this checker.
70 // Undefined is reported by another checker.
172 /// Register checker.
DynamicTypeChecker.cpp 10 // This checker looks for cases where the dynamic type of an object is unrelated
12 // by the DynamicTypePropagation checker. This check does not report any type
14 // ObjC Generics checker. This checker is not supposed to modify the program
22 #include "clang/StaticAnalyzer/Core/Checker.h"
33 class DynamicTypeChecker : public Checker<check::PostStmt<ImplicitCastExpr>> {
197 // Specialized objects are handled by the generics checker.
PthreadLockChecker.cpp 10 // This defines PthreadLockChecker, a simple lock -> unlock checker.
17 #include "clang/StaticAnalyzer/Core/Checker.h"
52 class PthreadLockChecker : public Checker< check::PostStmt<CallExpr> > {
144 "Lock checker"));
206 "Lock checker"));
229 BT_lor.reset(new BugType(this, "Lock order reversal", "Lock checker"));
274 "Lock checker"));
309 "Lock checker"));
322 "Lock checker"));
VirtualCallChecker.cpp 10 // This file defines a checker that checks virtual function calls during
19 #include "clang/StaticAnalyzer/Core/Checker.h"
31 const CheckerBase *Checker;
62 WalkAST(const CheckerBase *checker, BugReporter &br,
64 : Checker(checker), BR(br), AC(ac), visitingCallExpr(nullptr) {}
197 BR.EmitBasicReport(AC->getDecl(), Checker,
206 BR.EmitBasicReport(AC->getDecl(), Checker,
219 class VirtualCallChecker : public Checker<check::ASTDecl<CXXRecordDecl> > {
  /external/clang/test/Analysis/
Malloc+MismatchedDeallocator_intersections.cpp 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc,unix.MismatchedDeallocator -analyzer-store region -std=c++11 -verify %s
10 // warnings produced by the alpha.cplusplus.NewDelete checker.
cxx11-crashes.cpp 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core -std=c++11 -verify %s
78 // the dereference checker issues an assume on a CompoundVal.
properties.mm 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,debug.ExprInspection -analyzer-store=region -verify -Wno-objc-root-class %s
2 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,debug.ExprInspection -analyzer-store=region -verify -Wno-objc-root-class -fobjc-arc %s
rdar-6540084.m 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-checker=deadcode.DeadStores -verify %s
rdar-6562655.m 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-constraints=range -analyzer-store=region -verify %s
4 // This test case mainly checks that the retain/release checker doesn't crash
  /external/clang/test/Analysis/inlining/
retain-count-self-init.m 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,osx.cocoa.SelfInit -analyzer-config ipa=dynamic-bifurcate -verify %s
22 // stop tracking the receiver of init with respect to Retain Release checker.
stl.cpp 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc,cplusplus.NewDelete,debug.ExprInspection -analyzer-config c++-container-inlining=true -analyzer-config c++-stdlib-inlining=false -std=c++11 -verify %s
2 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc,cplusplus.NewDelete,debug.ExprInspection -analyzer-config c++-container-inlining=true -analyzer-config c++-stdlib-inlining=true -std=c++11 -DINLINE=1 -verify %s
  /external/clang/test/SemaObjCXX/
property-reference.mm 63 // Make sure that the default-argument checker looks through
65 // needs to force l2r to test this effectively because the checker
  /prebuilts/go/darwin-x86/src/net/http/
filetransport_test.go 14 func checker(t *testing.T) func(string, error) { func
24 check := checker(t)
  /prebuilts/go/linux-x86/src/net/http/
filetransport_test.go 14 func checker(t *testing.T) func(string, error) { func
24 check := checker(t)
  /prebuilts/go/darwin-x86/pkg/darwin_amd64/go/
types.a 331 type @"".Checker struct { @"".conf *@"".Config; @"".fset *@"go/token".FileSet; @"".pkg *@"".Package; ? *@"".Info; @"".objMap map[@"".Object]*@"".declInfo; @"".files []*@"go/ast".File; @"".unusedDotImports map[*@"".Scope]map[*@"".Package]@"go/token".Pos; @"".firstErr error; @"".methods map[string][]*@"".Func; @"".untyped map[@"go/ast".Expr]@"".exprInfo; @"".funcs []@"".funcInfo; @"".delayed []func(); ? @"".context; @"".pos @"go/token".Pos; @"".indent int }
332 func (@"".check·2 *@"".Checker) Files (@"".files·3 []*@"go/ast".File "esc:0x9") (@"".err·1 error)
333 func (@"".check·1 *@"".Checker "esc:0x9") @"".addDeclDep (@"".to·2 @"".Object) { var @"".from·3 *@"".declInfo; @"".from·3 = @"".check·1.@"".context.@"".decl; if @"".from·3 == nil { return }; { var @"".found·4 bool; _, @"".found·4 = @"".check·1.@"".objMap[@"".to·2]; if !@"".found·4 { return }}; @"".from·3.@"".addDep(@"".to·2) }
334 func (@"".check·1 *@"".Checker) @"".addMethodDecls (@"".obj·2 *@"".TypeName "esc:0x9"
    [all...]
  /prebuilts/go/linux-x86/pkg/linux_amd64/go/
types.a 331 type @"".Checker struct { @"".conf *@"".Config; @"".fset *@"go/token".FileSet; @"".pkg *@"".Package; ? *@"".Info; @"".objMap map[@"".Object]*@"".declInfo; @"".files []*@"go/ast".File; @"".unusedDotImports map[*@"".Scope]map[*@"".Package]@"go/token".Pos; @"".firstErr error; @"".methods map[string][]*@"".Func; @"".untyped map[@"go/ast".Expr]@"".exprInfo; @"".funcs []@"".funcInfo; @"".delayed []func(); ? @"".context; @"".pos @"go/token".Pos; @"".indent int }
332 func (@"".check·2 *@"".Checker) Files (@"".files·3 []*@"go/ast".File "esc:0x9") (@"".err·1 error)
333 func (@"".check·1 *@"".Checker "esc:0x9") @"".addDeclDep (@"".to·2 @"".Object) { var @"".from·3 *@"".declInfo; @"".from·3 = @"".check·1.@"".context.@"".decl; if @"".from·3 == nil { return }; { var @"".found·4 bool; _, @"".found·4 = @"".check·1.@"".objMap[@"".to·2]; if !@"".found·4 { return }}; @"".from·3.@"".addDep(@"".to·2) }
334 func (@"".check·1 *@"".Checker) @"".addMethodDecls (@"".obj·2 *@"".TypeName "esc:0x9"
    [all...]
  /external/chromium-trace/catapult/third_party/closure_linter/closure_linter/
checkerbase.py 36 def Initialize(self, checker, limited_doc_checks, is_html):
40 checker: Class to report errors to.
44 self.__checker = checker
50 """Call the HandleError function for the checker we are associated with."""
90 """Initialize a checker object.
122 """Returns true if the style checker has found any errors.
125 True if the style checker has found any errors.
  /external/mesa3d/src/mesa/main/
APIspecutil.py 112 switch = func.checker.switches.get(param.name, [])
115 if not desc.checker.switches:
120 items = desc.checker.switches.items()
129 if dep_desc.checker.switches:
154 if not func.checker.always_check(src_param.name):
157 for desc in func.checker.flatten(src_param.name):
183 for desc in func.checker.flatten(param.name):
  /external/clang/include/clang/StaticAnalyzer/Core/
AnalyzerOptions.h 128 /// \brief Pair of checker name and enable/disable.
269 /// checker name.
276 /// @param [in] CheckerName Full-qualified checker name, like
281 /// specified for the given checker the options for the parent packages will
284 /// @retval CheckerOptionValue An option for a checker if it was specified.
286 /// checker-specific options were found. The closer group to checker,
288 /// priority than @c coregroup for @c coregroup.subgroup.CheckerName checker.
289 /// @retval Default If nor checker option, nor group option was found.
302 /// @param [in] C The optional checker parameter that can be used to restric
    [all...]
  /external/antlr/antlr-3.4/runtime/Python/
pylintrc 3 # This is the main checker controling the other ones and the reports
4 # generation. It is itself both a raw checker and an astng checker in order
41 # Enable only checker(s) with the given id(s). This option conflict with the
42 # disable-checker option
43 #enable-checker=
45 # Enable all checker(s) except those with the given id(s). This option conflict
46 # with the disable-checker option
47 #disable-checker=
  /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/
pylintrc 3 # This is the main checker controlling the other ones and the reports
4 # generation. It is itself both a raw checker and an astng checker in order
35 # Enable only checker(s) with the given id(s). This option conflict with the
36 # disable-checker option
37 #enable-checker=
39 # Enable all checker(s) except those with the given id(s). This option conflict
40 # with the disable-checker option
41 #disable-checker=
  /device/generic/goldfish/camera/
EmulatedFakeCameraDevice.h 43 * a black and white checker board, moving diagonally towards the 0,0 corner.
103 /* Draws a black and white checker board in the current frame buffer. */
126 * Pixel colors in YUV format used when drawing the checker board.
171 /* Defines time (in nanoseconds) between redrawing the checker board.
172 * We will redraw the checker board every 15 milliseconds. */

Completed in 907 milliseconds

<<11121314151617181920>>