HomeSort by: relevance | last modified time | path
    Searched refs:checker (Results 1 - 25 of 129) sorted by relevancy

1 2 3 4 5 6

  /src/external/bsd/libarchive/dist/libarchive/test/
test_short_writes.c 39 struct checker { struct
54 struct checker *checker = client_data; local
56 size_t new_len = checker->shortbuf_len + to_write;
57 char *new_buf = realloc(checker->shortbuf, new_len);
60 checker->shortbuf = new_buf;
61 memcpy(checker->shortbuf + checker->shortbuf_len, buffer, to_write);
62 checker->shortbuf_len = new_len;
72 struct checker *checker = client_data local
120 struct checker *checker; local
181 struct checker *checker; local
    [all...]
  /src/external/apache2/llvm/dist/clang/include/clang/StaticAnalyzer/Core/
Checker.h 1 //== Checker.h - Registration mechanism for checkers -------------*- C++ -*--=//
9 // This file defines Checker, used to create and register checkers.
30 template <typename CHECKER>
31 static void _checkDecl(void *checker, const Decl *D, AnalysisManager& mgr,
33 ((const CHECKER *)checker)->checkASTDecl(cast<DECL>(D), mgr, BR);
40 template <typename CHECKER>
41 static void _register(CHECKER *checker, CheckerManager &mgr) {
42 mgr._registerForDecl(CheckerManager::CheckDeclFunc(checker,
    [all...]
CheckerManager.h 1 //===- CheckerManager.h - Static Analyzer Checker Manager -------*- C++ -*-===//
9 // Defines the Static Analyzer Checker Manager.
68 CheckerBase *Checker;
70 CheckerFn(CheckerBase *checker, Func fn) : Fn(fn), Checker(checker) {}
73 return Fn(Checker, ps...);
103 /// CheckerRegistry are used as check names. We want to make sure all checker
139 // CheckerRegistry cannot be moved to the Core library, because the checker
149 /// checkers. Useful for unit testing, unless the checker infrastructur
210 CHECKER *checker = new CHECKER(std::forward<AT>(Args)...); local
    [all...]
  /src/external/apache2/llvm/dist/clang/include/clang/StaticAnalyzer/Core/BugReporter/
BugType.h 18 #include "clang/StaticAnalyzer/Core/Checker.h"
34 const CheckerBase *Checker;
43 Checker(nullptr), SuppressOnSink(SuppressOnSink) {}
44 BugType(const CheckerBase *Checker, StringRef Name, StringRef Cat,
46 : CheckerName(Checker->getCheckerName()), Description(Name),
47 Category(Cat), Checker(Checker), SuppressOnSink(SuppressOnSink) {}
54 // used. The checker names are set after the constructors are run.
55 // In case the BugType object is initialized in the checker's ctor
58 StringRef Ret = Checker ? Checker->getCheckerName() : CheckerName
    [all...]
  /src/share/mk/
bsd.clang-analyze.mk 9 .for checker in ${CLANG_ANALYZE_CHECKERS}
10 CLANG_ANALYZE_FLAGS+= -Xanalyzer -analyzer-checker=${checker}
  /src/external/apache2/llvm/dist/llvm/utils/
check-each-file 49 checker="$4"
54 echo "$myname OBJECTS-FILE PROGRAM LINKER CHECKER"
62 echo "CHECKER is the script that exits 0 if PROGRAM is ok, 1 if it is not OK"
63 echo "(LINKER and CHECKER must be in your PATH, or you should specify ./)"
101 if [ -z "$checker" ]
106 if [ ! -x "$checker" ]
108 echo "ERROR: $checker not found or not executable"
121 if $checker
133 if $checker
  /src/tests/lib/libpthread/
h_thread_local_dtor.cpp 54 thread_local OrderChecker checker{ID};
  /src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/
CheckSizeofPointer.cpp 17 #include "clang/StaticAnalyzer/Core/Checker.h"
26 const CheckerBase *Checker;
30 WalkAST(BugReporter &br, const CheckerBase *checker, AnalysisDeclContext *ac)
31 : BR(br), Checker(checker), AC(ac) {}
66 BR.EmitBasicReport(AC->getDecl(), Checker,
80 class SizeofPointerChecker : public Checker<check::ASTCodeBody> {
NSErrorChecker.cpp 21 #include "clang/StaticAnalyzer/Core/Checker.h"
40 : public Checker< check::ASTDecl<ObjCMethodDecl> > {
87 : public Checker< check::ASTDecl<FunctionDecl> > {
147 NSErrorDerefBug(const CheckerNameRef Checker)
148 : BugType(Checker, "NSError** null dereference",
154 CFErrorDerefBug(const CheckerNameRef Checker)
155 : BugType(Checker, "CFErrorRef* null dereference",
163 : public Checker< check::Location,
332 NSOrCFErrorDerefChecker *checker = mgr.getChecker<NSOrCFErrorDerefChecker>(); local
333 checker->ShouldCheckNSError = true
343 NSOrCFErrorDerefChecker *checker = mgr.getChecker<NSOrCFErrorDerefChecker>(); local
    [all...]
LLVMConventionsChecker.cpp 18 #include "clang/StaticAnalyzer/Core/Checker.h"
118 const CheckerBase *Checker;
122 const CheckerBase *checker)
123 : DeclWithIssue(declWithIssue), BR(br), Checker(checker) {}
137 const CheckerBase *Checker) {
138 StringRefCheckerVisitor walker(D, BR, Checker);
183 BR.EmitBasicReport(DeclWithIssue, Checker, desc, "LLVM Conventions", desc,
218 const CheckerBase *Checker;
222 const CheckerBase *checker)
    [all...]
ObjCContainersASTChecker.cpp 9 // An AST checker that looks for common pitfalls when using 'CFArray',
18 #include "clang/StaticAnalyzer/Core/Checker.h"
29 const CheckerBase *Checker;
73 WalkAST(BugReporter &br, const CheckerBase *checker, AnalysisDeclContext *ac)
74 : BR(br), Checker(checker), AC(ac), ASTC(AC->getASTContext()),
144 BR.EmitBasicReport(AC->getDecl(), Checker, OsName.str(),
160 class ObjCContainersASTChecker : public Checker<check::ASTCodeBody> {
NullabilityChecker.cpp 1 //===-- NullabilityChecker.cpp - Nullability checker ----------------------===//
9 // This checker tries to find nullability violations. There are several kinds of
18 // This checker propagates the nullability information of the pointers and looks
20 // considered a way to suppress false positives for this checker. The other way
22 // code. In addition to the nullability propagation this checker also uses some
30 #include "clang/StaticAnalyzer/Core/Checker.h"
81 : public Checker<check::Bind, check::PreCall, check::PreStmt<ReturnStmt>,
87 // If true, the checker will not diagnose nullabilility issues for calls
159 /// path by this checker.
246 // As a matter of policy, the nullability checker typically warns on direc
    [all...]
ValistChecker.cpp 1 //== ValistChecker.cpp - stdarg.h macro usage checker -----------*- C++ -*--==//
16 #include "clang/StaticAnalyzer/Core/Checker.h"
29 class ValistChecker : public Checker<check::PreCall, check::PreStmt<VAArgExpr>,
412 void ento::register##name##Checker(CheckerManager &mgr) { \
413 ValistChecker *checker = mgr.getChecker<ValistChecker>(); \
414 checker->ChecksEnabled[ValistChecker::CK_##name] = true; \
415 checker->CheckNames[ValistChecker::CK_##name] = \
419 bool ento::shouldRegister##name##Checker(const CheckerManager &mgr) { \
IvarInvalidationChecker.cpp 9 // This checker implements annotation driven invalidation checking. If a class
24 // the invalidation method. The checker checks that each invalidation
35 #include "clang/StaticAnalyzer/Core/Checker.h"
726 public Checker<check::ASTDecl<ObjCImplementationDecl> > {
748 IvarInvalidationChecker *checker = \
750 checker->Filter.check_##name = true; \
751 checker->Filter.checkName_##name = mgr.getCurrentCheckerName(); \
DeadStoresChecker.cpp 9 // This file defines a DeadStores, a flow-sensitive checker that looks for
22 #include "clang/StaticAnalyzer/Core/Checker.h"
124 class DeadStoresChecker : public Checker<check::ASTCodeBody> {
137 const DeadStoresChecker *Checker;
149 const DeadStoresChecker *checker, AnalysisDeclContext *ac,
153 : cfg(cfg), Ctx(ctx), BR(br), Checker(checker), AC(ac), Parents(parents),
226 if (Checker->ShowFixIts) {
254 if (!Checker->WarnForDeadNestedAssignments)
264 BR.EmitBasicReport(AC->getDecl(), Checker, BugType, categories::UnusedCode
    [all...]
  /src/external/bsd/lutok/dist/
operations_test.cpp 178 stack_balance_checker checker(state);
192 stack_balance_checker checker(state);
236 stack_balance_checker checker(state);
246 stack_balance_checker checker(state);
257 stack_balance_checker checker(state);
270 stack_balance_checker checker(state);
  /src/external/apache2/llvm/dist/clang/lib/ARCMigrate/
TransBlockObjCVariable.cpp 92 BlockVarChecker checker(var);
93 bool onlyValueOfVarIsNeeded = checker.TraverseStmt(block->getBody());
  /src/external/gpl3/gcc/dist/gcc/
gimple-array-bounds.cc 805 array_bounds_checker *checker = (array_bounds_checker *) wi->info; local
806 gcc_assert (checker->m_stmt == wi->stmt);
809 warned = checker->check_array_ref (location, t, wi->stmt,
812 warned = checker->check_mem_ref (location, t,
816 checker->check_addr_expr (location, t, wi->stmt);
840 check_array_bounds_dom_walker (array_bounds_checker *checker)
846 checker (checker) { }
852 array_bounds_checker *checker; member in class:check_array_bounds_dom_walker
872 wi.info = checker;
    [all...]
  /src/external/gpl3/gcc.old/dist/gcc/
gimple-array-bounds.cc 720 array_bounds_checker *checker = (array_bounds_checker *) wi->info; local
721 gcc_assert (checker->m_stmt == wi->stmt);
724 warned = checker->check_array_ref (location, t, wi->stmt,
727 warned = checker->check_mem_ref (location, t,
731 checker->check_addr_expr (location, t, wi->stmt);
755 check_array_bounds_dom_walker (array_bounds_checker *checker)
761 checker (checker) { }
767 array_bounds_checker *checker; member in class:check_array_bounds_dom_walker
787 wi.info = checker;
    [all...]
  /src/usr.bin/xlint/lint1/
cksnprintb.c 57 } checker; typedef in typeref:struct:__anon8362
105 check_bit(checker *ck, uint64_t dir_lsb, uint64_t width,
138 parse_description(checker *ck, const quoted_iterator *dir)
158 check_conversion(checker *ck)
296 checker ck = {
  /src/external/apache2/llvm/dist/clang/tools/scan-build-py/libscanbuild/
clang.py 18 # regex for activated checker
19 ACTIVE_CHECKER_PATTERN = re.compile(r'^-analyzer-checker=(.*)$')
59 """ Get the active checker list.
63 :return: list of checker names which are active
66 compilation would be called. And take out the enabled checker from the
88 """ Returns a method, which classifies the checker active or not,
89 based on the received checker name list. """
91 def predicate(checker):
92 """ Returns True if the given checker is active. """
94 return any(pattern.match(checker) for pattern in predicate.patterns
    [all...]
  /src/external/apache2/llvm/dist/clang/utils/TableGen/
ClangSACheckersEmitter.cpp 142 OS << "CHECKER(" << "\"";
179 std::vector<Record*> checkers = Records.getAllDerivedDefinitions("Checker");
245 // CHECKER(FULLNAME, CLASS, HELPTEXT)
246 // - FULLNAME: The full name of the checker, including packages, e.g.:
248 // - CLASS: The name of the checker, with "Checker" appended, e.g.:
250 // - HELPTEXT: The description of the checker.
254 for (const Record *checker : checkers) {
255 printChecker(OS, *checker);
264 // - FULLNAME: The full name of the checker that depends on another checker
    [all...]
  /src/external/apache2/llvm/dist/clang/tools/scan-build/bin/
scan-build 126 # Print default checker names
1358 -enable-checker [checker name]
1359 -disable-checker [checker name]
1388 if ($val =~ /-analyzer-checker\=([^\s]+)/) {
1402 my $ExecLine = join(' ', qq/"$Clang"/, "-cc1", @PluginLoadCommandline, "-analyzer-checker-help", "2>&1", "|");
1428 # Is the checker enabled?
1429 my $checker = $1;
1432 foreach my $domain (split /\./, $checker) {
    [all...]
  /src/external/apache2/llvm/dist/clang/utils/check_cfc/
check_cfc.py 382 checker = class_(temp_output_file_orig)
384 checker.perform_check(arguments_a, my_env)
  /src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Frontend/
CheckerRegistry.cpp 59 #define CHECKER(FULLNAME, CLASS, HELPTEXT, DOC_URI, IS_HIDDEN) \
67 #undef CHECKER
160 "A checker cannot strong and weak depend on the same checker!");
171 // Parse '-analyzer-checker' and '-analyzer-disable-checker' options from the
182 for (CheckerInfo &checker : CheckerForCmdLineArg) {
183 checker.State = Opt.second ? StateFromCmdLine::State_Enabled
212 auto IsEnabledFromCmdLine = [&](const CheckerInfo *Checker) {
213 return !Checker->isDisabled(Mgr)
    [all...]

Completed in 44 milliseconds

1 2 3 4 5 6