/aosp_15_r20/external/coreboot/Documentation/infrastructure/ |
H A D | coverity.md | 1 # Coverity Scan for open source firmware 3 ## What’s Coverity and Coverity Scan? 5 Coverity is a static analysis tool. It hooks into the build process 6 and in addition to the compiler creating object files, Coverity collects 10 Coverity Scan is an online service for Open Source projects providing this 12 can be handled in their [web UI](https://scan.coverity.com/). 24 strictly necessary because Coverity Scan simply marks issues it can’t 45 anybody needs a project, a scan-build web-frontend like Coverity Scan would 49 ## Logging into Coverity Scan 51 Coverity Scan needs an account. It supports its own accounts and GitHub [all …]
|
H A D | builders.md | 48 * Coverity Builds, Toolchain builds, Scanbuild-builds 77 as well as Gerrit and [Coverity](coverity.md) builds. 403 ### Coverity Setup 405 To run coverity jobs, the builder needs to have the tools available, and 406 to be marked as a coverity builder. 409 #### Set up the Coverity tools 411 Download the Linux-64 coverity build tool and decompress it into your 415 [https://scan.coverity.com/download](https://scan.coverity.com/download) 418 (cov-analysis-linux64-7.7.0.4) to ‘coverity’, or better, create a 422 ln -s cov-analysis-linux64-7.7.0.4 coverity [all …]
|
/aosp_15_r20/external/libbpf/scripts/ |
H A D | coverity.sh | 2 # Taken from: https://scan.coverity.com/scripts/travisci_build_coverity_scan.sh 8 …CT_NAME and COVERITY_SCAN_TOKEN are available on Project Settings page on scan.coverity.com\033[0m" 19 TOOL_URL=https://scan.coverity.com/download/${PLATFORM} 20 TOOL_BASE=/var/tmp/coverity-scan-analysis 21 UPLOAD_URL="https://scan.coverity.com/builds" 22 SCAN_URL="https://scan.coverity.com" 26 echo -e "\033[33;1mINFO: Skipping Coverity Analysis: branch is a pull request.\033[0m" 56 # Download Coverity Scan Analysis Tool 58 echo -e "\033[33;1mDownloading Coverity Scan Analysis Tool...\033[0m" 62 # Extract Coverity Scan Analysis Tool [all …]
|
/aosp_15_r20/external/tcpdump/ |
H A D | .ci-coverity-scan-build.sh | 6 …_NAME and COVERITY_SCAN_TOKEN are available on Project Settings page on scan.coverity.com\033[0m\n" 14 TOOL_URL=https://scan.coverity.com/download/cxx/${PLATFORM} 15 TOOL_BASE=/tmp/coverity-scan-analysis 16 UPLOAD_URL="https://scan.coverity.com/builds" 17 SCAN_URL="https://scan.coverity.com" 36 # Download Coverity Scan Analysis Tool 38 printf "\033[33;1mDownloading Coverity Scan Analysis Tool...\033[0m\n" 42 # Extract Coverity Scan Analysis Tool 43 printf "\033[33;1mExtracting Coverity Scan Analysis Tool...\033[0m\n" 52 printf "\033[33;1mRunning Coverity Scan Analysis Tool...\033[0m\n" [all …]
|
/aosp_15_r20/external/libpcap/ |
H A D | .ci-coverity-scan-build.sh | 6 …_NAME and COVERITY_SCAN_TOKEN are available on Project Settings page on scan.coverity.com\033[0m\n" 14 TOOL_URL=https://scan.coverity.com/download/cxx/${PLATFORM} 15 TOOL_BASE=/tmp/coverity-scan-analysis 16 UPLOAD_URL="https://scan.coverity.com/builds" 17 SCAN_URL="https://scan.coverity.com" 36 # Download Coverity Scan Analysis Tool 38 printf "\033[33;1mDownloading Coverity Scan Analysis Tool...\033[0m\n" 42 # Extract Coverity Scan Analysis Tool 43 printf "\033[33;1mExtracting Coverity Scan Analysis Tool...\033[0m\n" 52 printf "\033[33;1mRunning Coverity Scan Analysis Tool...\033[0m\n" [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/process/ |
D | contributing.rst | 188 Coverity Scan 191 The TF-A project makes use of `Coverity Scan` for static analysis, a service 199 https://scan.coverity.com/projects/arm-software-arm-trusted-firmware. 201 The `tf-a-ci-scripts repository`_ contains scripts to run the Coverity Scan 203 https://scan.coverity.com. These scripts get executed daily by the 204 `tf-a-coverity Jenkins job`_. 212 being analysed by Coverity. 218 ****** Newly added files detection check for Coverity Scan analysis on patch(es) ****** 225 please ensure to include them for the ``Coverity Scan analysis`` by adding 229 configurations for Coverity scan analysis illustrated with examples: [all …]
|
/aosp_15_r20/external/tpm2-tss/.ci/ |
H A D | travis.run | 21 echo "Running non-coverity build" 32 echo "Running coverity build" 34 # Do coverity steps 42 if [ ! -f "$(pwd)/coverity-analysis/bin/cov-build" ]; then 43 …wget https://scan.coverity.com/download/linux64 --quiet --post-data "token=$COVERITY_SCAN_TOKEN&pr… 44 …wget https://scan.coverity.com/download/linux64 --quiet --post-data "token=$COVERITY_SCAN_TOKEN&pr… 56 /bin/bash -c '/workspace/tpm2-tss/.ci/coverity.run' 61 echo "Submitting data to Coverity" 68 https://scan.coverity.com/builds?project=tpm2-software%2Ftpm2.0-tss
|
H A D | coverity.run | 9 echo "Coverity scan branch detected, not running with clang...exiting!" 14 echo "coverity.run invoked for non-coverity branch $TRAVIS_BRANCH...exiting!" 18 echo "Performing build with Coverity Scan" 23 echo "Collecting Coverity data for submission"
|
/aosp_15_r20/external/python/cpython3/Misc/ |
D | coverity_model.c | 1 /* Coverity Scan model 3 * This is a modeling file for Coverity Scan. Modeling helps to avoid false 14 * Coverity Scan doesn't pick up modifications automatically. The model file 16 * http://scan.coverity.com/projects/200 77 * Coverity considers argv, environ, read() data etc as tained. 114 /* Coverity doesn't understand that fdopendir() may take ownership of fd. */ 127 * Coverity thinks that the input values for these function come from a
|
/aosp_15_r20/external/kmod/ |
H A D | Makefile.am | 369 # coverity 372 kmod-coverity-%.tar.xz: 379 coverity-tar: kmod-coverity-$(shell git describe 2>/dev/null).tar.xz 381 coverity-sync: kmod-coverity-$(shell git describe 2>/dev/null).tar.xz 382 @echo "uploading coverity tarball" 388 https://scan.coverity.com/builds?project=kmod 390 coverity-clean: 391 rm -rf kmod-coverity-*.tar.xz cov-int
|
/aosp_15_r20/external/sdv/vsomeip/third_party/boost/numeric/interval/ |
D | README.md | 14 Branch | Travis | Appveyor | Coverity Scan | codecov.io | Deps | Docs | Tests | 16 …0u28/branch/master) | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [ | [![Coverity Scan Build Status](https://scan.coverity.com/projects/15854/badg…
|
/aosp_15_r20/external/libbpf/.github/workflows/ |
H A D | coverity.yml | 1 name: libbpf-ci-coverity 9 coverity: 12 name: Coverity 16 - name: Run coverity 25 scripts/coverity.sh
|
/aosp_15_r20/external/capstone/.github/workflows/ |
H A D | coverity-scan.yml | 1 name: coverity-scan 11 - name: Download Coverity Build Tool 13 …wget -q https://scan.coverity.com/download/cxx/linux64 --post-data "token=$TOKEN&project=capstone-… 29 - name: Submit the result to Coverity Scan 39 https://scan.coverity.com/builds?project=capstone-next
|
/aosp_15_r20/external/harfbuzz_ng/.github/workflows/ |
H A D | coverity-scan.yml | 1 name: coverity-scan 18 - name: Download Coverity 20 …wget -q https://scan.coverity.com/download/cxx/linux64 --post-data "token=$TOKEN&project=HarfBuzz"… 31 - name: submit to coverity 40 https://scan.coverity.com/builds?project=HarfBuzz
|
/aosp_15_r20/external/arm-trusted-firmware/docs/process/ |
H A D | contributing.rst | 175 - ``Coverity Scan analysis`` is one of the tests we perform on our source code 178 code being analysed by Coverity. 181 ensure to include them for the ``Coverity Scan analysis`` by adding the 185 configurations for Coverity Scan analysis: 191 ``tf-a-ci-scripts/script/tf-coverity/tf-cov-make`` 195 source files get built and analysed by Coverity. 257 .. _tf-cov-make: https://git.trustedfirmware.org/ci/tf-a-ci-scripts.git/tree/script/tf-coverity/tf-…
|