Home
last modified time | relevance | path

Searched refs:analysis (Results 1 – 25 of 86) sorted by relevance

1234

/freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Core/
H A DAnalyses.def28 ANALYSIS_DIAGNOSTICS(HTML, "html", "Output analysis results using HTML",
33 "Output analysis results using HTML (not allowing for multi-file bugs)",
36 ANALYSIS_DIAGNOSTICS(PLIST, "plist", "Output analysis results using Plists",
41 "Output analysis results using Plists (allowing for multi-file bugs)",
45 "Output analysis results using HTML wrapped with Plists",
48 ANALYSIS_DIAGNOSTICS(SARIF, "sarif", "Output analysis results using SARIF",
52 "Output analysis results using both SARIF and HTML "
56 ANALYSIS_DIAGNOSTICS(TEXT, "text", "Text output of analysis results to stderr",
62 "used in addition to other analysis types",
H A DAnalyzerOptions.def144 "during analysis. If temporary destructors are disabled "
258 "actually elided during analysis. Both behaviors are allowed by the C++ "
271 "Whether the analysis should try to widen loops.", false)
275 "Whether the analysis should try to unroll loops with known bounds.", false)
307 "this can increase analysis precision until we have a better way to lazily "
312 bool, IsNaiveCTUEnabled, "experimental-enable-naive-ctu-analysis",
313 "Whether naive cross translation unit analysis is enabled. This is an "
375 "for import when inlining functions during CTU analysis. "
377 "analysis with many interdependent definitions located in "
384 "for import when inlining functions during CTU analysis of C++ "
[all …]
/freebsd/contrib/llvm-project/llvm/include/llvm/
H A DPassSupport.h38 #define INITIALIZE_PASS(passName, arg, name, cfg, analysis) \ argument
42 PassInfo::NormalCtor_t(callDefaultCtor<passName>), cfg, analysis); \
52 #define INITIALIZE_PASS_BEGIN(passName, arg, name, cfg, analysis) \ argument
59 #define INITIALIZE_PASS_END(passName, arg, name, cfg, analysis) \ argument
62 PassInfo::NormalCtor_t(callDefaultCtor<passName>), cfg, analysis); \
168 #define INITIALIZE_AG_PASS(passName, agName, arg, name, cfg, analysis, def) \ argument
174 PassInfo::NormalCtor_t(callDefaultCtor<passName>), cfg, analysis); \
188 #define INITIALIZE_AG_PASS_BEGIN(passName, agName, arg, n, cfg, analysis, def) \ argument
193 #define INITIALIZE_AG_PASS_END(passName, agName, arg, n, cfg, analysis, def) \ argument
196 PassInfo::NormalCtor_t(callDefaultCtor<passName>), cfg, analysis); \
/freebsd/tools/build/options/
H A DWITH_META_ERROR_TARGET8 to help with failure analysis.
/freebsd/lib/libblacklist/
H A DMakefile11 CFLAGS.clang+=-Wno-thread-safety-analysis
/freebsd/sys/contrib/device-tree/Bindings/csky/
H A Dpmu.txt6 it could count cpu's events for helping analysis performance issues.
/freebsd/contrib/openbsm/
H A DCREDITS43 In addition, Coverity, Inc.'s Prevent(tm) static analysis tool and Gimpel
/freebsd/contrib/unbound/doc/
H A DCREDITS14 Ondřej Surý - running coverity analysis tool on 0.9 dev version.
/freebsd/contrib/libucl/m4/
H A Dgcov.m428 AC_ARG_ENABLE(coverage, AC_HELP_STRING([--enable-coverage],[configure code coverage analysis tools]…
/freebsd/contrib/llvm-project/llvm/lib/Target/X86/
H A DX86InstrInfo.td10 // for code generation, machine code emission, and analysis.
H A DX86InstrFMA.td262 // Commuting the 1st operand of FMA*_Int requires some additional analysis,
264 // the lowest element of the FMA*_Int instruction. Even though such analysis
291 // forms and is possible only after special analysis of all uses of the initial
292 // instruction. Such analysis do not exist yet and thus introducing the 231
294 // such analysis will be implemented eventually.
/freebsd/contrib/one-true-awk/testdir/
H A Dfunstack.in423 classcodes = "C4110 (Error analysis in numerical methods)",
425 …keywords = "difference equations; error analysis; error propagation; recursive computation; su…
758 …ywords = "compilers; computational complexity; context-free grammar; parsing; syntax analysis",
951 …ata; debugging; diagnostics; error correction; error detection; lexical analysis systems programmi…
1060 …classcodes = "C4110 (Error analysis in numerical methods); C4160 (Numerical integration and diff…
1063 …keywords = "adaptive integration; error analysis; error improvement estimate; integration; mat…
1511 …y; computers; computers, programming; data handling; data reduction and analysis; graphics; image …
1564 …abstract = "Four different sequential sampling procedures are applied to the analysis of data …
1569 …keywords = "computers; control; data reduction and analysis; industrial management, data proce…
1633 …keywords = "automatic control, analysis; computers; data handling; data structures; electric c…
[all …]
/freebsd/contrib/llvm-project/clang/include/clang/Analysis/Analyses/
H A DUnsafeBufferUsageGadgets.def10 /// the UnsafeBufferUsage analysis.
/freebsd/sys/contrib/libsodium/
H A DTHANKS89 - Coverity, Inc. to provide static analysis.
/freebsd/contrib/llvm-project/llvm/include/llvm/Demangle/
H A DREADME.txt10 base ManglingParser to perform some simple analysis on the mangled
/freebsd/contrib/llvm-project/clang/include/clang/Basic/
H A DBuiltinsBase.td38 // Type is not important to semantic analysis and codegen; recognize as builtin
H A DDiagnosticGroups.td521 def RangeLoopAnalysis : DiagGroup<"range-loop-analysis",
523 def ForLoopAnalysis : DiagGroup<"for-loop-analysis">;
524 def LoopAnalysis : DiagGroup<"loop-analysis", [ForLoopAnalysis,
1114 def ThreadSafetyAnalysis : DiagGroup<"thread-safety-analysis">;
1381 `-Rpass-analysis=stack-frame-layout` command-line flag to the compiler
1392 clang -c a.cpp -Rpass-analysis=stack-frame-layout -mllvm -filter-print-funcs=foo
1396 clang -c a.cpp -Rpass-analysis=stack-frame-layout -foptimization-record-file=<file>
1405 def BackendOptimizationRemarkAnalysis : DiagGroup<"pass-analysis">;
1479 // A group for cross translation unit static analysis related warnings.
H A DBuiltins.def75 // T -> type is not important to semantic analysis and codegen; recognize as
/freebsd/crypto/openssl/doc/man3/
H A DRSA_check_key.pod61 acceleration or analysis purposes, then in all likelihood the RSA key data
/freebsd/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Checkers/
H A DCheckers.td47 // Optional checkers related to taint security analysis.
337 HelpText<"Stores information during the analysis about nullability.">,
463 "no reports, but adds valuable information to the analysis when "
518 "emits no reports, but adds valuable information to the analysis "
1420 HelpText<"Print callbacks that are called during analysis in order">,
1576 HelpText<"Print results of live variable analysis">,
1580 HelpText<"Print results of live expression analysis">,
/freebsd/share/doc/papers/
H A Dbsdreferences.bib84 keywords = {bug fixing, code migration, empirical study, social network analysis},
309 keywords = {global development, open source, quantitative analysis},
/freebsd/contrib/llvm-project/llvm/tools/llvm-readobj/
H A DOpts.td22 def pretty_pgo_analysis_map : FF<"pretty-pgo-analysis-map", "Display PGO analysis values with forma…
/freebsd/crypto/libecc/
H A Dcommon.mk89 …at-type-confusion -Widiomatic-parentheses -Wimplicit-fallthrough -Wloop-analysis -Wpointer-arith -…
/freebsd/contrib/llvm-project/llvm/tools/llvm-objdump/
H A DObjdumpOpts.td213 def pretty_pgo_analysis_map : Flag<["--"], "pretty-pgo-analysis-map">,
214 HelpText<"Display PGO analysis values with "
/freebsd/sys/contrib/zstd/
H A DCONTRIBUTING.md73 … * Ensure that static analysis passes on your development machine. See the Static Analysis section
112 Static analysis is a process for examining the correctness or validity of a program without actually
114 static analysis. You can install it by following the instructions for your OS on https://clang-anal…
116 Once installed, you can ensure that our static analysis tests pass on your local development machine
129 ### Pitfalls of static analysis

1234