/prebuilts/go/darwin-x86/src/go/types/testdata/ |
vardecl.src | 18 // In a real-world scenario, the type-checker would not be run
|
/prebuilts/go/linux-x86/src/cmd/vet/testdata/ |
shift.go | 5 // This file contains tests for the suspicious shift checker.
|
/prebuilts/go/linux-x86/src/go/types/ |
conversions.go | 13 func (check *Checker) conversion(x *operand, T Type) {
|
/prebuilts/go/linux-x86/src/go/types/testdata/ |
vardecl.src | 18 // In a real-world scenario, the type-checker would not be run
|
/system/core/libmemunreachable/ |
README.md | 6 libmemunreachable is a zero-overhead native memory leak detector. It uses an imprecise mark-and-sweep garbage collector pass over all native memory, reporting any unreachable blocks as leaks. It is similar to the [Heap Checker from tcmalloc](http://htmlpreview.github.io/?https://github.com/gperftools/gperftools/blob/master/doc/heap_checker.html), but with a few key differences to remove the overhead. Instead of instrumenting every call to malloc and free, it queries the allocator (jemalloc) for active allocations when leak detection is requested. In addition, it performs a very short stop-the-world data collection on the main process, and then forks a copy of the process to perform the mark-and-sweep, minimizing disruption to the original process.
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/build/builders/ |
PreCompilerBuilder.java | 844 RenderScriptChecker checker = new RenderScriptChecker(sourceFolders, local 859 RenderScriptChecker checker = mRenderScriptSourceChangeHandler.getChecker(); local [all...] |
/external/chromium-trace/catapult/third_party/beautifulsoup4/bs4/ |
element.py | [all...] |
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/text/ |
SpoofCheckerTest.java | 123 // The checker we just built from source rules should be equivalent to the 124 // default checker created from prebuilt rules baked into the ICU data. 126 assertTrue("Checker built from rules equals default", defaultChecker.equals(rsc)); 143 // being used by the existing checker) 734 // Create a default spoof checker to use in this test. [all...] |
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/text/ |
SpoofCheckerTest.java | 119 // The checker we just built from source rules should be equivalent to the 120 // default checker created from prebuilt rules baked into the ICU data. 122 assertTrue("Checker built from rules equals default", defaultChecker.equals(rsc)); 139 // being used by the existing checker) 730 // Create a default spoof checker to use in this test. [all...] |
/external/llvm/docs/ |
GetElementPtr.rst | 458 There is currently no checker for the getelementptr rules. Currently, the only 462 It's not possible to write a checker which could find all rule violations 463 statically. It would be possible to write a checker which works by instrumenting 465 write a static checker which catches a subset of possible problems. However, no 466 such checker exists today.
|
/prebuilts/clang/darwin-x86/host/3.6/tools/scan-build/ |
scan-build | 96 # Print default checker names [all...] |
/prebuilts/clang/host/darwin-x86/3.8/tools/scan-build/ |
scan-build | 96 # Print default checker names [all...] |
/prebuilts/clang/host/linux-x86/3.8/tools/scan-build/ |
scan-build | 96 # Print default checker names [all...] |
/prebuilts/clang/linux-x86/host/3.6/tools/scan-build/ |
scan-build | 96 # Print default checker names [all...] |
/external/clang/lib/StaticAnalyzer/Checkers/ |
CheckSecuritySyntaxOnly.cpp | 19 #include "clang/StaticAnalyzer/Core/Checker.h" 91 // Checker-specific methods. 748 class SecuritySyntaxChecker : public Checker<check::ASTCodeBody> { 762 SecuritySyntaxChecker *checker = \ 764 checker->filter.check_##name = true; \ 765 checker->filter.checkName_##name = mgr.getCurrentCheckName(); \
|
StreamChecker.cpp | 16 #include "clang/StaticAnalyzer/Core/Checker.h" 59 class StreamChecker : public Checker<eval::Call,
|
UnixAPIChecker.cpp | 18 #include "clang/StaticAnalyzer/Core/Checker.h" 32 class UnixAPIChecker : public Checker< check::PreStmt<CallExpr> > {
|
/art/test/478-checker-clinit-check-pruning/src/ |
Main.java | 438 * so we wouldn't really get to the checker tests below. 518 // TODO: Write checker statements.
|
/art/test/527-checker-array-access-split/src/ |
Main.java | 215 // checker will match the previous `IntConstant`, and we will thus fail the 271 // checker will match the previous `IntConstant`, and we will thus fail the
|
/art/tools/checker/file_format/checker/ |
test.py | 19 from file_format.checker.parser import ParseCheckerStream 20 from file_format.checker.struct import CheckerFile, TestCase, TestAssertion, TestExpression
|
/external/autotest/client/tests/kvm/tests/ |
qmp_basic.py | 316 Check that QMP's argument checker is detecting all possible errors. 366 # qdev-type commands have their own argument checker, all QMP does
|
qmp_basic_rhel6.py | 317 Check that QMP's argument checker is detecting all possible errors. 348 # qdev-type commands have their own argument checker, all QMP does
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
ExtendedPKIXParameters.java | 618 * Returns the attribute certificate checker. The returned set contains 621 * @return Returns the attribute certificate checker. Is never
|
/external/clang/test/Analysis/ |
MismatchedDeallocator-path-notes.cpp | 1 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.MismatchedDeallocator -analyzer-output=text -verify %s 2 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.MismatchedDeallocator -analyzer-output=plist -analyzer-config path-diagnostics-alternate=false %s -o %t.plist
|
dead-stores.c | 1 // RUN: %clang_cc1 -Wunused-variable -analyze -analyzer-checker=core,deadcode.DeadStores -fblocks -verify -Wno-unreachable-code -analyzer-opt-analyze-nested-blocks %s 2 // RUN: %clang_cc1 -Wunused-variable -analyze -analyzer-checker=core,deadcode.DeadStores -analyzer-store=region -analyzer-constraints=range -fblocks -verify -Wno-unreachable-code -analyzer-opt-analyze-nested-blocks %s
|