| /src/external/bsd/libarchive/dist/libarchive/test/ |
| test_short_writes.c | 39 struct checker { struct 54 struct checker *checker = client_data; local 56 size_t new_len = checker->shortbuf_len + to_write; 57 char *new_buf = realloc(checker->shortbuf, new_len); 60 checker->shortbuf = new_buf; 61 memcpy(checker->shortbuf + checker->shortbuf_len, buffer, to_write); 62 checker->shortbuf_len = new_len; 72 struct checker *checker = client_data local 120 struct checker *checker; local 181 struct checker *checker; local [all...] |
| /src/external/apache2/llvm/dist/clang/include/clang/StaticAnalyzer/Core/ |
| Checker.h | 1 //== Checker.h - Registration mechanism for checkers -------------*- C++ -*--=// 9 // This file defines Checker, used to create and register checkers. 30 template <typename CHECKER> 31 static void _checkDecl(void *checker, const Decl *D, AnalysisManager& mgr, 33 ((const CHECKER *)checker)->checkASTDecl(cast<DECL>(D), mgr, BR); 40 template <typename CHECKER> 41 static void _register(CHECKER *checker, CheckerManager &mgr) { 42 mgr._registerForDecl(CheckerManager::CheckDeclFunc(checker, [all...] |
| CheckerManager.h | 1 //===- CheckerManager.h - Static Analyzer Checker Manager -------*- C++ -*-===// 9 // Defines the Static Analyzer Checker Manager. 68 CheckerBase *Checker; 70 CheckerFn(CheckerBase *checker, Func fn) : Fn(fn), Checker(checker) {} 73 return Fn(Checker, ps...); 103 /// CheckerRegistry are used as check names. We want to make sure all checker 139 // CheckerRegistry cannot be moved to the Core library, because the checker 149 /// checkers. Useful for unit testing, unless the checker infrastructur 210 CHECKER *checker = new CHECKER(std::forward<AT>(Args)...); local [all...] |
| /src/external/apache2/llvm/dist/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
| BugType.h | 18 #include "clang/StaticAnalyzer/Core/Checker.h" 34 const CheckerBase *Checker; 43 Checker(nullptr), SuppressOnSink(SuppressOnSink) {} 44 BugType(const CheckerBase *Checker, StringRef Name, StringRef Cat, 46 : CheckerName(Checker->getCheckerName()), Description(Name), 47 Category(Cat), Checker(Checker), SuppressOnSink(SuppressOnSink) {} 54 // used. The checker names are set after the constructors are run. 55 // In case the BugType object is initialized in the checker's ctor 58 StringRef Ret = Checker ? Checker->getCheckerName() : CheckerName [all...] |
| /src/share/mk/ |
| bsd.clang-analyze.mk | 9 .for checker in ${CLANG_ANALYZE_CHECKERS} 10 CLANG_ANALYZE_FLAGS+= -Xanalyzer -analyzer-checker=${checker}
|
| /src/external/apache2/llvm/dist/llvm/utils/ |
| check-each-file | 49 checker="$4" 54 echo "$myname OBJECTS-FILE PROGRAM LINKER CHECKER" 62 echo "CHECKER is the script that exits 0 if PROGRAM is ok, 1 if it is not OK" 63 echo "(LINKER and CHECKER must be in your PATH, or you should specify ./)" 101 if [ -z "$checker" ] 106 if [ ! -x "$checker" ] 108 echo "ERROR: $checker not found or not executable" 121 if $checker 133 if $checker
|
| /src/tests/lib/libpthread/ |
| h_thread_local_dtor.cpp | 54 thread_local OrderChecker checker{ID};
|
| /src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/ |
| CheckSizeofPointer.cpp | 17 #include "clang/StaticAnalyzer/Core/Checker.h" 26 const CheckerBase *Checker; 30 WalkAST(BugReporter &br, const CheckerBase *checker, AnalysisDeclContext *ac) 31 : BR(br), Checker(checker), AC(ac) {} 66 BR.EmitBasicReport(AC->getDecl(), Checker, 80 class SizeofPointerChecker : public Checker<check::ASTCodeBody> {
|
| NSErrorChecker.cpp | 21 #include "clang/StaticAnalyzer/Core/Checker.h" 40 : public Checker< check::ASTDecl<ObjCMethodDecl> > { 87 : public Checker< check::ASTDecl<FunctionDecl> > { 147 NSErrorDerefBug(const CheckerNameRef Checker) 148 : BugType(Checker, "NSError** null dereference", 154 CFErrorDerefBug(const CheckerNameRef Checker) 155 : BugType(Checker, "CFErrorRef* null dereference", 163 : public Checker< check::Location, 332 NSOrCFErrorDerefChecker *checker = mgr.getChecker<NSOrCFErrorDerefChecker>(); local 333 checker->ShouldCheckNSError = true 343 NSOrCFErrorDerefChecker *checker = mgr.getChecker<NSOrCFErrorDerefChecker>(); local [all...] |
| LLVMConventionsChecker.cpp | 18 #include "clang/StaticAnalyzer/Core/Checker.h" 118 const CheckerBase *Checker; 122 const CheckerBase *checker) 123 : DeclWithIssue(declWithIssue), BR(br), Checker(checker) {} 137 const CheckerBase *Checker) { 138 StringRefCheckerVisitor walker(D, BR, Checker); 183 BR.EmitBasicReport(DeclWithIssue, Checker, desc, "LLVM Conventions", desc, 218 const CheckerBase *Checker; 222 const CheckerBase *checker) [all...] |
| ObjCContainersASTChecker.cpp | 9 // An AST checker that looks for common pitfalls when using 'CFArray', 18 #include "clang/StaticAnalyzer/Core/Checker.h" 29 const CheckerBase *Checker; 73 WalkAST(BugReporter &br, const CheckerBase *checker, AnalysisDeclContext *ac) 74 : BR(br), Checker(checker), AC(ac), ASTC(AC->getASTContext()), 144 BR.EmitBasicReport(AC->getDecl(), Checker, OsName.str(), 160 class ObjCContainersASTChecker : public Checker<check::ASTCodeBody> {
|
| NullabilityChecker.cpp | 1 //===-- NullabilityChecker.cpp - Nullability checker ----------------------===// 9 // This checker tries to find nullability violations. There are several kinds of 18 // This checker propagates the nullability information of the pointers and looks 20 // considered a way to suppress false positives for this checker. The other way 22 // code. In addition to the nullability propagation this checker also uses some 30 #include "clang/StaticAnalyzer/Core/Checker.h" 81 : public Checker<check::Bind, check::PreCall, check::PreStmt<ReturnStmt>, 87 // If true, the checker will not diagnose nullabilility issues for calls 159 /// path by this checker. 246 // As a matter of policy, the nullability checker typically warns on direc [all...] |
| ValistChecker.cpp | 1 //== ValistChecker.cpp - stdarg.h macro usage checker -----------*- C++ -*--==// 16 #include "clang/StaticAnalyzer/Core/Checker.h" 29 class ValistChecker : public Checker<check::PreCall, check::PreStmt<VAArgExpr>, 412 void ento::register##name##Checker(CheckerManager &mgr) { \ 413 ValistChecker *checker = mgr.getChecker<ValistChecker>(); \ 414 checker->ChecksEnabled[ValistChecker::CK_##name] = true; \ 415 checker->CheckNames[ValistChecker::CK_##name] = \ 419 bool ento::shouldRegister##name##Checker(const CheckerManager &mgr) { \
|
| IvarInvalidationChecker.cpp | 9 // This checker implements annotation driven invalidation checking. If a class 24 // the invalidation method. The checker checks that each invalidation 35 #include "clang/StaticAnalyzer/Core/Checker.h" 726 public Checker<check::ASTDecl<ObjCImplementationDecl> > { 748 IvarInvalidationChecker *checker = \ 750 checker->Filter.check_##name = true; \ 751 checker->Filter.checkName_##name = mgr.getCurrentCheckerName(); \
|
| DeadStoresChecker.cpp | 9 // This file defines a DeadStores, a flow-sensitive checker that looks for 22 #include "clang/StaticAnalyzer/Core/Checker.h" 124 class DeadStoresChecker : public Checker<check::ASTCodeBody> { 137 const DeadStoresChecker *Checker; 149 const DeadStoresChecker *checker, AnalysisDeclContext *ac, 153 : cfg(cfg), Ctx(ctx), BR(br), Checker(checker), AC(ac), Parents(parents), 226 if (Checker->ShowFixIts) { 254 if (!Checker->WarnForDeadNestedAssignments) 264 BR.EmitBasicReport(AC->getDecl(), Checker, BugType, categories::UnusedCode [all...] |
| /src/external/bsd/lutok/dist/ |
| operations_test.cpp | 178 stack_balance_checker checker(state); 192 stack_balance_checker checker(state); 236 stack_balance_checker checker(state); 246 stack_balance_checker checker(state); 257 stack_balance_checker checker(state); 270 stack_balance_checker checker(state);
|
| /src/external/apache2/llvm/dist/clang/lib/ARCMigrate/ |
| TransBlockObjCVariable.cpp | 92 BlockVarChecker checker(var); 93 bool onlyValueOfVarIsNeeded = checker.TraverseStmt(block->getBody());
|
| /src/external/gpl3/gcc/dist/gcc/ |
| gimple-array-bounds.cc | 805 array_bounds_checker *checker = (array_bounds_checker *) wi->info; local 806 gcc_assert (checker->m_stmt == wi->stmt); 809 warned = checker->check_array_ref (location, t, wi->stmt, 812 warned = checker->check_mem_ref (location, t, 816 checker->check_addr_expr (location, t, wi->stmt); 840 check_array_bounds_dom_walker (array_bounds_checker *checker) 846 checker (checker) { } 852 array_bounds_checker *checker; member in class:check_array_bounds_dom_walker 872 wi.info = checker; [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/ |
| gimple-array-bounds.cc | 720 array_bounds_checker *checker = (array_bounds_checker *) wi->info; local 721 gcc_assert (checker->m_stmt == wi->stmt); 724 warned = checker->check_array_ref (location, t, wi->stmt, 727 warned = checker->check_mem_ref (location, t, 731 checker->check_addr_expr (location, t, wi->stmt); 755 check_array_bounds_dom_walker (array_bounds_checker *checker) 761 checker (checker) { } 767 array_bounds_checker *checker; member in class:check_array_bounds_dom_walker 787 wi.info = checker; [all...] |
| /src/usr.bin/xlint/lint1/ |
| cksnprintb.c | 57 } checker; typedef in typeref:struct:__anon8362 105 check_bit(checker *ck, uint64_t dir_lsb, uint64_t width, 138 parse_description(checker *ck, const quoted_iterator *dir) 158 check_conversion(checker *ck) 296 checker ck = {
|
| /src/external/apache2/llvm/dist/clang/tools/scan-build-py/libscanbuild/ |
| clang.py | 18 # regex for activated checker 19 ACTIVE_CHECKER_PATTERN = re.compile(r'^-analyzer-checker=(.*)$') 59 """ Get the active checker list. 63 :return: list of checker names which are active 66 compilation would be called. And take out the enabled checker from the 88 """ Returns a method, which classifies the checker active or not, 89 based on the received checker name list. """ 91 def predicate(checker): 92 """ Returns True if the given checker is active. """ 94 return any(pattern.match(checker) for pattern in predicate.patterns [all...] |
| /src/external/apache2/llvm/dist/clang/utils/TableGen/ |
| ClangSACheckersEmitter.cpp | 142 OS << "CHECKER(" << "\""; 179 std::vector<Record*> checkers = Records.getAllDerivedDefinitions("Checker"); 245 // CHECKER(FULLNAME, CLASS, HELPTEXT) 246 // - FULLNAME: The full name of the checker, including packages, e.g.: 248 // - CLASS: The name of the checker, with "Checker" appended, e.g.: 250 // - HELPTEXT: The description of the checker. 254 for (const Record *checker : checkers) { 255 printChecker(OS, *checker); 264 // - FULLNAME: The full name of the checker that depends on another checker [all...] |
| /src/external/apache2/llvm/dist/clang/tools/scan-build/bin/ |
| scan-build | 126 # Print default checker names 1358 -enable-checker [checker name] 1359 -disable-checker [checker name] 1388 if ($val =~ /-analyzer-checker\=([^\s]+)/) { 1402 my $ExecLine = join(' ', qq/"$Clang"/, "-cc1", @PluginLoadCommandline, "-analyzer-checker-help", "2>&1", "|"); 1428 # Is the checker enabled? 1429 my $checker = $1; 1432 foreach my $domain (split /\./, $checker) { [all...] |
| /src/external/apache2/llvm/dist/clang/utils/check_cfc/ |
| check_cfc.py | 382 checker = class_(temp_output_file_orig) 384 checker.perform_check(arguments_a, my_env)
|
| /src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Frontend/ |
| CheckerRegistry.cpp | 59 #define CHECKER(FULLNAME, CLASS, HELPTEXT, DOC_URI, IS_HIDDEN) \ 67 #undef CHECKER 160 "A checker cannot strong and weak depend on the same checker!"); 171 // Parse '-analyzer-checker' and '-analyzer-disable-checker' options from the 182 for (CheckerInfo &checker : CheckerForCmdLineArg) { 183 checker.State = Opt.second ? StateFromCmdLine::State_Enabled 212 auto IsEnabledFromCmdLine = [&](const CheckerInfo *Checker) { 213 return !Checker->isDisabled(Mgr) [all...] |