Go to main content
oracle home
Oracle
®
Developer Studio 12.5: Code Analyzer User's Guide
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
» ...
Documentation Home
»
Oracle Developer Studio 12.5 Information Library
»
Oracle
®
Developer Studio 12.5: ...
»
Index B
Updated: June 2016
Oracle
®
Developer Studio 12.5: Code Analyzer User's Guide
Document Information
Using This Documentation
Product Documentation Library
Feedback
Chapter 1 Using Code Analyzer
Data Analyzed by Code Analyzer
Static Code Checking
Dynamic Memory Access Checking
Code Coverage Checking
Requirements for Using Code Analyzer
Code Analyzer GUI
Code Analyzer Command-Line Interface
Remote Desktop Distribution
Quick Start
Quick Start
Chapter 2 Collecting Data And Starting the Code Analyzer
Collecting Static Error Data
Collecting Dynamic Memory Access Data
How to Collect Dynamic Memory Access Data From the Binary:
Collecting Code Coverage Data
How to Collect Code Coverage Data From the Binary
Using the Code Analyzer GUI
Using the Code Analyzer Command-Line Tool (codean)
codean Options
Data Type Options
Displaying Options
Filtering Options
Labelling Options
Saving Results Options
Comparing Results Options
Test Suite Options
codean Work Flow Example
Labelling Issues
How to Label Issues
How to Show or Hide Issues with a Label
How to Find a Particular Hash
Using codean in Test Suites
Preparing Binaries in Test Suite with discover
Display Reports in a Test Suite
Saving Reports in a Test Suite
Comparing Reports in a Test Suite
Appendix A Errors Analyzed by Code Analyzer
Code Coverage Issues
Static Code Issues
Beyond Array Bounds Read (ABR)
Beyond Array Bounds Write (ABW)
Double Freeing Memory (DFM)
Freed Memory Read (FMR)
Freed Memory Write (FMW)
Infinite Empty Loop (INF)
Memory Leak
Missing Function Return (MFR)
Missing Malloc Return Value Check (MRC)
Leaky Pointer Checker: Null Pointer Dereference (NUL)
Return Freed Memory (RFM)
Uninitialized Memory Read (UMR)
Unused Return Value (URV)
Out-of-Scope Local Variable Usage (VES)
Dynamic Memory Access Errors
Beyond Array Bounds Read (ABR)
Beyond Array Bounds Write (ABW)
Bad Free Memory (BFM)
Bad Realloc Address Parameter (BRP)
Corrupted Guard Block (CGB)
Double Freeing Memory (DFM)
Freed Memory Read (FMR)
Freed Memory Write (FMW)
Freed Realloc Parameter (FRP)
Invalid Memory Read (IMR)
Invalid Memory Write (IMW)
Memory Leak
Overlapping Source and Destination (OLP)
Partially Initialized Read (PIR)
Beyond Stack Bounds Read (SBR)
Beyond Stack Bounds Write (SBW)
Unallocated Memory Read (UAR)
Unallocated Memory Write (UAW)
Uninitialized Memory Read (UMR)
Dynamic Memory Access Warnings
Allocating Zero Size (AZS)
Memory Leak (MLK)
Speculative Memory Read (SMR)
Index
Index B
Index C
Index D
Index G
Index I
Index O
Index R
Index S
Index T
Index X
Language:
English
Index
B
binary-name
.analyze
directory
coverage
subdirectory
How to Collect Code Coverage Data From the Binary
binary-name
.analyze
directory
Using the Code Analyzer GUI
Collecting Data And Starting the Code Analyzer
static subdirectory
Collecting Static Error Data
binary_name
.analyze
directory
dynamic
subdirectory
How to Collect Dynamic Memory Access Data From the Binary:
C
Code Analyzer
requirements for using
Requirements for Using Code Analyzer
Code Analyzer command-line interface
features
Code Analyzer Command-Line Interface
Code Analyzer GUI
features
Code Analyzer GUI
quick start
Quick Start
starting
Using the Code Analyzer GUI
code coverage checking
Code Coverage Checking
code coverage issues
Code Coverage Issues
codean
options
Data Type Options
codean
Using the Code Analyzer Command-Line Tool (codean)
features
Code Analyzer Command-Line Interface
labelling issues
Labelling Issues
options
Test Suite Options
Comparing Results Options
Saving Results Options
Labelling Options
Filtering Options
Displaying Options
codean Options
test suites
Using codean in Test Suites
work flow example
codean Work Flow Example
codean
command
Code Analyzer Command-Line Interface
codean
command-line tool
Using the Code Analyzer Command-Line Tool (codean)
collecting data
binary-name
.analyze directory
Collecting Data And Starting the Code Analyzer
code coverage
Collecting Code Coverage Data
dynamic memory access errors
Collecting Dynamic Memory Access Data
static errors
Collecting Static Error Data
limitations
Collecting Static Error Data
core issues
Data Analyzed by Code Analyzer
D
dynamic memory access checking
Dynamic Memory Access Checking
dynamic memory access issues
errors
Dynamic Memory Access Errors
warnings
Dynamic Memory Access Warnings
G
–g
compiler option
How to Collect Code Coverage Data From the Binary
Collecting Dynamic Memory Access Data
I
instrumenting your program
with Discover
Collecting Dynamic Memory Access Data
with
discover
How to Collect Dynamic Memory Access Data From the Binary:
with Uncover
How to Collect Code Coverage Data From the Binary
How to Collect Code Coverage Data From the Binary
O
optimization, effect on memory errors
Collecting Dynamic Memory Access Data
options
codean Options
comparing results
Comparing Results Options
data type
Data Type Options
displaying
Displaying Options
filtering
Filtering Options
labelling
Labelling Options
saving results
Saving Results Options
test suite
Test Suite Options
R
requirements
for instrumenting your program with Discover
Collecting Dynamic Memory Access Data
for instrumenting your program with
uncover
How to Collect Code Coverage Data From the Binary
for using the Code Analyzer
Requirements for Using Code Analyzer
S
static code checking
Static Code Checking
static code issues
Static Code Issues
T
test suite
options
Test Suite Options
X
–xanalyze=code
compiler option
Collecting Static Error Data
Collecting Static Error Data
Static Code Checking
Linux
Collecting Static Error Data
–xprevise=yes
compiler option
Collecting Static Error Data
Collecting Static Error Data
Static Code Checking
Linux
Collecting Static Error Data
Previous