/external/chromium_org/content/renderer/media/crypto/ |
H A D | key_systems_support_uma.cc | 26 void Report(); 45 void OneTimeReporter::Report() { function in class:content::__anon8476::OneTimeReporter 59 void Report(bool has_type, bool is_supported); 79 void KeySystemsSupportUMA::Reporter::Report(bool has_type, bool is_supported) { function in class:content::KeySystemsSupportUMA::Reporter 80 call_reporter_.Report(); 82 call_with_type_reporter_.Report(); 87 support_reporter_.Report(); 89 support_with_type_reporter_.Report(); 106 reporter->Report(has_type, false); 114 reporter->Report(has_typ [all...] |
/external/clang/lib/StaticAnalyzer/Checkers/ |
H A D | NSAutoreleasePoolChecker.cpp | 71 BugReport *Report = new BugReport(*BT, "Use -drain instead of -release when " local 73 Report->addRange(msg.getSourceRange()); 74 C.emitReport(Report);
|
H A D | ReturnUndefChecker.cpp | 87 BugReport *Report = new BugReport(BT, BT.getDescription(), N); 89 Report->addRange(RetE->getSourceRange()); 90 bugreporter::trackNullOrUndefValue(N, TrackingE ? TrackingE : RetE, *Report); 92 C.emitReport(Report);
|
H A D | MacOSKeychainAPIChecker.cpp | 252 // Report deallocator mismatch. Remove the region from tracking - reporting a 272 BugReport *Report = new BugReport(*BT, os.str(), N); local 273 Report->addVisitor(new SecKeychainBugVisitor(AP.first)); 274 Report->addRange(ArgExpr->getSourceRange()); 275 markInteresting(Report, AP); 276 C.emitReport(Report); 313 BugReport *Report = new BugReport(*BT, os.str(), N); local 314 Report->addVisitor(new SecKeychainBugVisitor(V)); 315 Report->addRange(ArgExpr->getSourceRange()); 316 Report 365 BugReport *Report = new BugReport(*BT, local 431 BugReport *Report = new BugReport(*BT, local 540 BugReport *Report = new BugReport(*BT, os.str(), N, LocUsedForUniqueing, local [all...] |
/external/doclava/test/doclava/ |
H A D | ApiCheckTest.java | 23 import com.google.doclava.apicheck.ApiCheck.Report; 43 Report report = apiCheck.checkApi(args); 50 Report report = apiCheck.checkApi(args); 58 Report report = apiCheck.checkApi(args); 72 Report report = apiCheck.checkApi(args); 85 Report report = apiCheck.checkApi(args); 93 Report report = apiCheck.checkApi(args); 101 Report report = apiCheck.checkApi(args); 109 Report report = apiCheck.checkApi(args); 116 Report repor [all...] |
/external/clang/lib/Frontend/ |
H A D | Warnings.cpp | 41 Diags.Report(isPositive? diag::warn_unknown_warning_option_suggest : 45 Diags.Report(isPositive? diag::warn_unknown_warning_option : 86 for (unsigned Report = 0, ReportEnd = 2; Report != ReportEnd; ++Report) { 87 bool SetDiagnostic = (Report == 0); 142 if (Report) 143 Diags.Report(diag::warn_unknown_warning_specifier) 170 if (Report) 171 Diags.Report(dia [all...] |
H A D | TextDiagnosticBuffer.cpp | 68 Diags.Report(Diags.getCustomDiagID(DiagnosticsEngine::Error, 71 Diags.Report(Diags.getCustomDiagID(DiagnosticsEngine::Warning, 74 Diags.Report(Diags.getCustomDiagID(DiagnosticsEngine::Note,
|
H A D | CreateInvocationFromCommandLine.cpp | 70 Diags->Report(diag::err_fe_expected_compiler_job) << OS.str(); 76 Diags->Report(diag::err_fe_expected_clang_command);
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_symbolizer_posix_libcdep.cc | 40 Report("WARNING: invalid path to external symbolizer!\n"); 59 Report("WARNING: Can't create a socket pair to start " 86 Report("WARNING: failed to fork external symbolizer " 117 Report("WARNING: external symbolizer didn't start up correctly!\n");
|
H A D | sanitizer_posix.cc | 59 // The Report() and CHECK calls below may call mmap recursively and fail. 65 Report("ERROR: %s failed to allocate 0x%zx (%zd) bytes of %s: %d\n", 77 Report("ERROR: %s failed to deallocate 0x%zx (%zd) bytes at address %p\n", 92 Report("ERROR: " 107 Report("ERROR:" 163 Report("Process memory map follows:\n"); 168 Report("End of process memory map.\n");
|
H A D | sanitizer_symbolizer_linux.cc | 43 Report("WARNING: readlink(\"/proc/self/exe\") failed with errno %d, "
|
H A D | sanitizer_stoptheworld_linux_libcdep.cc | 109 Report("Could not attach to thread %d (errno %d).\n", thread_id, pterrno); 113 Report("Attached to thread %d.\n", thread_id); 122 Report("Waiting on thread %d failed, detaching (errno %d).\n", thread_id, 139 Report("Detached from thread %d.\n", tid); 144 Report("Could not detach from thread %d (errno %d).\n", tid, pterrno); 243 Report("Failed suspending threads.\n"); 333 Report("Failed spawning a tracer thread (errno %d).\n", errno); 350 Report("Waiting on the tracer thread failed (errno %d).\n", wperrno); 401 Report("Could not get registers from thread %d (errno %d).\n",
|
H A D | sanitizer_common.cc | 62 Report("Sanitizer CHECK failed: %s:%d %s (%lld, %lld)\n", file, line, cond, 76 Report("ERROR: Can't open file: %s\n", report_path_full.data()); 181 Report("ERROR: Path is too long: %c%c%c%c%c%c%c%c...\n",
|
/external/clang/lib/Lex/ |
H A D | ModuleMap.cpp | 62 Diags->Report(Id[0].second, diag::err_mmap_missing_module_unqualified) 73 Diags->Report(Id[I].second, diag::err_mmap_missing_module_qualified) 912 Diags.Report(LToken.getLocation(), diag::err_invalid_string_udl); 940 Diags.Report(LToken.getLocation(), diag::err_mmap_unknown_token); 1008 Diags.Report(Tok.getLocation(), diag::err_mmap_expected_module_name); 1071 Diags.Report(Tok.getLocation(), diag::err_mmap_expected_module); 1092 Diags.Report(Id.front().second, diag::err_mmap_nested_submodule_id) 1100 Diags.Report(ExplicitLoc, diag::err_mmap_explicit_top_level); 1118 Diags.Report(Id[I].second, diag::err_mmap_missing_module_qualified) 1121 Diags.Report(I [all...] |
/external/doclava/src/com/google/doclava/apicheck/ |
H A D | ApiCheck.java | 67 Report report = acheck.checkApi(originalArgs); 77 public Report checkApi(String[] originalArgs) { 99 return new Report(2, Errors.getErrors()); 113 return new Report(1, Errors.getErrors()); 121 return new Report(Errors.hadError ? 1 : 0, Errors.getErrors()); 201 public class Report { class in class:ApiCheck 205 private Report(int code, Set<ErrorMessage> errors) { method in class:ApiCheck.Report
|
/external/clang/lib/StaticAnalyzer/Frontend/ |
H A D | CheckerRegistration.cpp | 95 diags->Report(diag::warn_incompatible_analyzer_plugin_api) 97 diags->Report(diag::note_incompatible_analyzer_plugin_api) 122 diags.Report(diag::err_unknown_analyzer_checker)
|
/external/compiler-rt/lib/lsan/ |
H A D | lsan_common.cc | 123 Report("Scanning %s range %p-%p.\n", region_type, begin, end); 138 Report("%p: found %p pointing into chunk %p-%p of size %zu.\n", pp, p, 153 if (flags()->log_threads) Report("Processing thread %d.\n", os_id); 162 Report("Thread %d not found in registry.\n", os_id); 169 Report("Unable to get registers from thread %d.\n"); 180 Report("Stack at %p-%p, SP = %p.\n", stack_begin, stack_end, sp); 186 Report("WARNING: stack pointer not in stack range.\n"); 196 if (flags()->log_threads) Report("TLS at %p-%p.\n", tls_begin, tls_end); 261 Report("Scanning ignored chunks.\n"); 269 Report("Scannin [all...] |
H A D | lsan_common_linux.cc | 46 Report("LeakSanitizer: Dynamic linker not found. " 49 Report("LeakSanitizer: Multiple modules match \"%s\". "
|
/external/chromium_org/tools/clang/plugins/ |
H A D | FindBadConstructs.cpp | 275 diagnostic().Report(full_loc, diag_method_requires_virtual_) 337 diagnostic().Report(token_end, diag_method_requires_override_) 340 diagnostic().Report(loc, diag_method_requires_override_); 521 diagnostic().Report(it->Base->getLocStart(), diag_note_inheritance_) 567 diagnostic().Report(loc, DiagnosticForIssue(issue)); 576 diagnostic().Report(loc, diag_protected_non_virtual_dtor_); 626 diagnostic().Report(record_location, diag_no_explicit_dtor_); 628 diagnostic().Report(loc, diag_note_implicit_dtor_) << problem_record; 631 diagnostic().Report(record_location, diag_public_dtor_); 633 diagnostic().Report(lo [all...] |
/external/compiler-rt/lib/asan/ |
H A D | asan_mac.cc | 178 Report("exec()-ing the program with\n"); 179 Report("%s=%s\n", kDyldInsertLibraries, new_env); 180 Report("to enable ASan wrappers.\n"); 181 Report("Set ASAN_OPTIONS=allow_reexec=0 to disable this.\n"); 315 Report("asan_dispatch_call_block_and_release(): " 350 Report(#dispatch_x_f "(): context: %p, pthread_self: %p\n", \ 368 Report("dispatch_after_f: %p\n", asan_ctxt); 381 Report("dispatch_group_async_f(): context: %p, pthread_self: %p\n",
|
H A D | asan_posix.cc | 48 Report("Installed the sigaction for signal %d\n", signum); 75 Report("Alternative stack for T%d set: [%p,%p)\n",
|
H A D | asan_rtl.cc | 40 Report("Sleeping for %d second(s)\n", flags()->sleep_before_dying); 60 Report("AddressSanitizer CHECK failed: %s:%d \"%s\" (0x%zx, 0x%zx)\n", 184 Report("Using the defaults from __asan_default_options: %s\n", 193 Report("%s: detect_leaks is not supported on this platform.\n", 200 Report("%s: detect_leaks is ignored (requires use_stack_depot).\n", 229 Report("ReserveShadowMemoryRange failed while trying to map 0x%zx bytes. " 422 Report("WARNING: ASan is ignoring requested __asan_handle_no_return: " 459 Report("Parsed ASAN_OPTIONS: %s\n", options); 521 Report("Shadow memory range interleaves with an existing memory mapping. " 566 Report("AddressSanitize [all...] |
/external/clang/tools/driver/ |
H A D | cc1as_main.cpp | 161 Diags.Report(diag::err_drv_missing_argument) 169 Diags.Report(diag::err_drv_unknown_argument) << (*it) ->getAsString(*Args); 203 Diags.Report(diag::err_drv_unknown_argument) << A->getAsString(*Args); 218 Diags.Report(diag::err_drv_invalid_value) 256 Diags.Report(diag::err_fe_unable_to_open_output) 270 Diags.Report(diag::err_target_unknown_triple) << Opts.Triple; 277 Diags.Report(diag::err_fe_error_reading) << Opts.InputFile; 370 Diags.Report(diag::err_target_unknown_triple) << Opts.Triple; 392 Diags.Report(diag::err_fe_error_backend) << Message;
|
/external/grub/util/ |
H A D | grub-md5-crypt | 41 Report bugs to <bug-grub@gnu.org>.
|
H A D | grub-md5-crypt.in | 41 Report bugs to <bug-grub@gnu.org>.
|