Home | History | Annotate | Download | only in analyzer

Lines Matching full:program

21 <p>The static analyzer engine performs path-sensitive exploration of the program and 
44 <li><a href="#extendingstates">Custom Program States</a></li>
90 The analyzer core performs symbolic execution of the given program. All the
92 the values of all the expressions in the program based on the input symbols
94 the program is explored. The explored execution traces are represented with
101 represents the corresponding location in the program (or the CFG graph).
108 represents abstract state of the program. It consists of:
238 <li> What checker-specific data needs to be stored as part of the program
240 implementing custom program state is given in section <a
241 href="#extendingstates">Custom Program States</a>.
310 them from the program state in order to keep the state as small as possible.
346 <h2 id=extendingstates>Custom Program States</h2>
350 program will be explored, or even that all possible paths will be explored, this
466 the bug in the program and the program's state when the location is reached. These are
472 is based on whether the detected bug is one that would prevent the program under
474 analysis, as the program can continue to run after the leak. Dereferencing a
476 the program to meaningfully continue after such an error.