OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:analyzer
(Results
151 - 175
of
334
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/clang/test/Analysis/
malloc.c
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,deadcode.experimental.UnreachableCode,core.experimental.CastSize,unix.experimental.Malloc -
analyzer
-store=region -verify %s
124
// However, this case is considered an
analyzer
bug since it causes false-positives.
132
// However, this case is considered an
analyzer
bug since it causes false-positives.
blocks.m
1
// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -
analyzer
-checker=core -
analyzer
-store=region -fblocks -verify %s
46
// test1 - This test case exposed logic that caused the
analyzer
to crash because of a memory bug
initializers-cfg-output.cpp
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=debug.DumpCFG -cfg-add-initializers %s 2>&1 | FileCheck %s
pthreadlock.c
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=unix.experimental.PthreadLock -verify %s
ptr-arith.c
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core.experimental.FixedAddr,core.experimental.PointerArithm,core.experimental.PointerSub -
analyzer
-store=region -verify -triple x86_64-apple-darwin9 %s
2
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core.experimental.FixedAddr,core.experimental.PointerArithm,core.experimental.PointerSub -
analyzer
-store=region -verify -triple i686-apple-darwin9 %s
security-syntax-checks.m
1
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -
analyzer
-checker=security.experimental.SecuritySyntactic %s -verify
2
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -DUSE_BUILTINS -
analyzer
-checker=security.experimental.SecuritySyntactic %s -verify
3
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -DVARIANT -
analyzer
-checker=security.experimental.SecuritySyntactic %s -verify
4
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -DUSE_BUILTINS -DVARIANT -
analyzer
-checker=security.experimental.SecuritySyntactic %s -verify
method-arg-decay.m
1
// RUN: %clang_cc1 -
analyzer
-checker=core -verify %s
/external/clang/utils/analyzer/
CmpRuns
4
CmpRuns - A simple tool for comparing two static
analyzer
runs to determine
7
This is designed to support automated testing using the static
analyzer
, from
9
1. To monitor changes in the static
analyzer
's reports on real code bases, for
12
2. For use by end users who want to integrate regular static
analyzer
testing
ubiviz
10
# This script reads visualization data emitted by the static
analyzer
for
/external/clang/include/clang/Driver/
CC1Options.td
36
//
Analyzer
Options
46
def analyzer_store : Separate<"-
analyzer
-store">,
48
def analyzer_store_EQ : Joined<"-
analyzer
-store=">, Alias<analyzer_store>;
50
def analyzer_constraints : Separate<"-
analyzer
-constraints">,
52
def analyzer_constraints_EQ : Joined<"-
analyzer
-constraints=">,
55
def analyzer_output : Separate<"-
analyzer
-output">,
57
def analyzer_output_EQ : Joined<"-
analyzer
-output=">,
60
def analyzer_opt_analyze_headers : Flag<"-
analyzer
-opt-analyze-headers">,
61
HelpText<"Force the static
analyzer
to analyze functions defined in header files">;
62
def analyzer_opt_analyze_nested_blocks : Flag<"-
analyzer
-opt-analyze-nested-blocks">
[
all
...]
/external/clang/tools/scan-build/
c++-analyzer
11
# both gcc and the static
analyzer
.
31
if ($FindBin::Script =~ /c\+\+-
analyzer
/) {
114
# Running the
analyzer
.
187
push @Args, "-Xclang", "-
analyzer
-display-progress";
196
push @Args, "-Xclang", "-
analyzer
-viz-egraph-ubigraph";
225
# Capture the STDOUT of clang and reroute it to ccc-
analyzer
's STDERR.
440
# Modes ccc-
analyzer
supports
617
push @AnalyzeArgs, "-
analyzer
-store=$StoreModel";
621
push @AnalyzeArgs, "-
analyzer
-constraints=$ConstraintsModel";
629
push @AnalyzeArgs, "-
analyzer
-output=" . $OutputFormat
[
all
...]
ccc-analyzer
11
# both gcc and the static
analyzer
.
31
if ($FindBin::Script =~ /c\+\+-
analyzer
/) {
114
# Running the
analyzer
.
187
push @Args, "-Xclang", "-
analyzer
-display-progress";
196
push @Args, "-Xclang", "-
analyzer
-viz-egraph-ubigraph";
225
# Capture the STDOUT of clang and reroute it to ccc-
analyzer
's STDERR.
440
# Modes ccc-
analyzer
supports
617
push @AnalyzeArgs, "-
analyzer
-store=$StoreModel";
621
push @AnalyzeArgs, "-
analyzer
-constraints=$ConstraintsModel";
629
push @AnalyzeArgs, "-
analyzer
-output=" . $OutputFormat
[
all
...]
set-xcode-analyzer
23
if line.find("Static
Analyzer
") >= 0:
/external/javassist/src/main/javassist/bytecode/analysis/
Analyzer.java
34
* A data-flow
analyzer
that determines the type state of the stack and local
73
*
Analyzer
analyzer
= new
Analyzer
();
74
* Frame[] frames =
analyzer
.analyze(clazz, method);
85
public class
Analyzer
implements Opcode {
/frameworks/base/tools/layoutlib/create/
README.txt
58
-
Analyzer
61
The goal of the
analyzer
is to create a graph of all the classes from the input JAR
64
To do that, the
analyzer
is created with a list of base classes to keep -- everything
68
The
analyzer
is also given a list of class names to keep in the output.
74
With this information, the
analyzer
parses the input zip to find all the classes.
81
The output of the
analyzer
is a set of ASM ClassReader instances which are then
/external/javassist/src/main/javassist/convert/
TransformAccessArrayField.java
27
import javassist.bytecode.analysis.
Analyzer
;
56
* data-flow
analyzer
, since it relies on consistent code state. Even
104
frames = ((new
Analyzer
())).analyze(clazz, minfo);
/external/clang/lib/Driver/
Action.cpp
28
case AnalyzeJobClass: return "
analyzer
";
/external/clang/www/
menu.html.incl
30
<a href="http://clang-
analyzer
.llvm.org">Automatic Bug-Finding</a>
/external/srec/srec/Semproc/include/
SR_SemanticProcessorImpl.h
52
LexicalAnalyzer*
analyzer
;
member in struct:SR_SemanticProcessorImpl_t
/external/clang/include/clang/StaticAnalyzer/Core/PathSensitive/
AnalysisManager.h
55
// The maximum number of exploded nodes the
analyzer
will generate.
58
// The maximum number of times the
analyzer
visit a block.
/external/clang/lib/Index/
Analyzer.cpp
1
//===---
Analyzer
.cpp - Analysis for indexing information -------*- C++ -*-===//
10
// This file implements the
Analyzer
interface.
14
#include "clang/Index/
Analyzer
.h"
148
// FIXME: Finding @selector references should be through another
Analyzer
432
//
Analyzer
Implementation
435
void
Analyzer
::FindDeclarations(Decl *D, TULocationHandler &Handler) {
445
void
Analyzer
::FindReferences(Decl *D, TULocationHandler &Handler) {
464
void
Analyzer
::FindObjCMethods(ObjCMessageExpr *Msg,
/external/clang/test/Driver/
phases.c
57
//
Analyzer
61
// ANALYZE: 2:
analyzer
, {1}, plist
/frameworks/ex/variablespeed/jni/
sola_time_scaler.h
80
// @param
analyzer
SolaAnalyzer instance
81
void set_analyzer(SolaAnalyzer*
analyzer
);
/cts/apps/CtsVerifier/src/com/android/cts/verifier/camera/analyzer/
CameraAnalyzerActivity.java
16
package com.android.cts.verifier.camera.
analyzer
;
ColorChecker.java
17
package com.android.cts.verifier.camera.
analyzer
;
Completed in 620 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>