/external/valgrind/main/memcheck/tests/ |
H A D | supp-dir.stderr.exp | 2 FATAL: suppressions file "x86/" is a directory
|
/external/chromium_org/tools/valgrind/ |
H A D | unused_suppressions.py | 9 import suppressions namespace 13 supp = suppressions.GetSuppressions()
|
H A D | test_suppressions.py | 13 import suppressions namespace 88 for (symbol, suppressions) in sorted_reports[:top_count]: 89 print "%4d occurrences : %s" % (len(suppressions), symboltable[symbol]) 92 supp = suppressions.GetSuppressions() 104 help='Filter out all suppressions not containing the specified symbol(s). ' 122 # Include mac suppressions if the report is only present on Mac 125 # Include win32 suppressions if the report is only present on Windows 154 print "didn't match any suppressions:" 165 print ("%d unique reports don't match any of the suppressions" % 172 # TODO(timurrrr): also make sure none of the old suppressions [all...] |
H A D | valgrind.sh | 83 SUPPRESSIONS="$THISDIR/$TOOL_NAME/suppressions.txt" 122 --suppressions="$SUPPRESSIONS" \
|
H A D | suppressions.py | 6 # suppressions.py 12 # optional one-line comments anywhere in the suppressions file. 24 If ran from the command line, suppressions.py does a self-test 46 supp_filename = JOIN(suppressions_root, "memcheck", "suppressions.txt") 48 supp_filename = JOIN(suppressions_root, "tsan", "suppressions.txt") 68 supp_filename = JOIN(suppressions_root, "..", "heapcheck", "suppressions.txt") 71 supp_filename = JOIN(suppressions_root, "drmemory", "suppressions.txt") 132 We match our suppressions against generated suppressions 153 tools/heapcheck/suppressions [all...] |
H A D | waterfall.sh | 9 # suppressions match the reports on the waterfall. 164 suppressions match the reports on the waterfall.
|
H A D | valgrind_test.py | 260 parser.add_option("", "--suppressions", default=[], 377 for suppression_file in self._options.suppressions: 380 proc += ["--suppressions=%s" % suppression_file] 549 ret = ["--gen-suppressions=all", "--demangle=no"] 691 ret += ["--gen-suppressions=true"] 721 # The -v flag is needed for printing the list of used suppressions and 745 parser.add_option("", "--suppressions", default=[], 762 for suppression_file in self._options.suppressions: 766 proc += ["--suppressions=%s" % suppression_file] 806 parser.add_option("", "--suppressions", defaul [all...] |
/external/chromium_org/tools/valgrind/memcheck/ |
H A D | PRESUBMIT.py | 13 """Checks the memcheck suppressions files for bad data.""" 14 sup_regex = re.compile('suppressions.*\.txt$') 15 suppressions = {} 36 if suppressions.has_key(line): 37 if f.LocalPath() == suppressions[line][1]: 41 suppressions[line][1])) 46 suppressions[line][0], suppressions[line][1])) 48 suppressions[line] = (f, line_num)
|
/external/chromium_org/tools/valgrind/drmemory/ |
H A D | PRESUBMIT.py | 11 """Checks the DrMemory suppression files for bad suppressions.""" 20 import suppressions namespace 21 return suppressions.PresubmitCheck(input_api, output_api)
|
/external/chromium_org/tools/valgrind/tsan/ |
H A D | PRESUBMIT.py | 11 """Checks the TSan suppressions files for bad suppressions.""" 20 import suppressions namespace 21 return suppressions.PresubmitCheck(input_api, output_api)
|
/external/chromium_org/tools/heapcheck/ |
H A D | PRESUBMIT.py | 13 """Checks the heapcheck suppressions files for bad data.""" 14 sup_regex = re.compile('suppressions.*\.txt$') 15 suppressions = {} 31 if suppressions.has_key(line): 35 suppressions[line][1])) 37 suppressions[line] = (f, line_num)
|
H A D | heapcheck_test.py | 14 import suppressions namespace 34 self._suppressions.extend(suppressions.ReadSuppressionsFromFile(fname)) 68 """Analyzes the app's output and applies suppressions to the reports. 71 suppressions to them. Unsuppressed reports and other log messages are 156 # Update the suppressions histogram. 177 # Print the list of suppressions used.
|
/external/valgrind/unittest/ |
H A D | run_output_tests.sh | 10 SUPP=--suppressions=output_tests/${TEST}.supp
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_flags.h | 54 const char *suppressions; member in struct:__tsan::Flags 55 // Print matched suppressions at exit.
|
H A D | tsan_flags.cc | 51 f->suppressions = ""; 82 ParseFlag(env, &f->suppressions, "suppressions");
|
H A D | tsan_suppressions.cc | 45 Printf("ThreadSanitizer: failed to open suppressions file '%s'\n", 52 Printf("ThreadSanitizer: failed to stat suppressions file '%s'\n", 58 Printf("ThreadSanitizer: failed to read suppressions file '%s'\n", 70 const char *supp = ReadFile(flags()->suppressions); 146 Printf("ThreadSanitizer: Matched %d suppressions (pid=%d):\n", hit_count,
|
/external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/ |
H A D | closurizednamespacesinfo.py | 318 if jsdoc and ('extraRequire' in jsdoc.suppressions): 333 if jsdoc and ('extraProvide' in jsdoc.suppressions): 425 if jsdoc and 'missingProvide' in jsdoc.suppressions: 441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
|
H A D | ecmalintrules.py | 592 and not ('accessControls' in jsdoc.suppressions)): 597 and not ('accessControls' in jsdoc.suppressions)): 602 not ('underscore' in jsdoc.suppressions) and not 604 ('accessControls' in jsdoc.suppressions))): 608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions: 611 jsdoc.suppressions['underscore'])
|
H A D | statetracker.py | 223 suppressions: Map of suppression type to the token that added it. 236 self.suppressions = {} 274 self.suppressions[suppression] = token
|
/external/chromium_org/third_party/closure_linter/closure_linter/ |
H A D | closurizednamespacesinfo.py | 318 if jsdoc and ('extraRequire' in jsdoc.suppressions): 333 if jsdoc and ('extraProvide' in jsdoc.suppressions): 425 if jsdoc and 'missingProvide' in jsdoc.suppressions: 441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
|
H A D | ecmalintrules.py | 592 and not ('accessControls' in jsdoc.suppressions)): 597 and not ('accessControls' in jsdoc.suppressions)): 602 not ('underscore' in jsdoc.suppressions) and not 604 ('accessControls' in jsdoc.suppressions))): 608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions: 611 jsdoc.suppressions['underscore'])
|
H A D | statetracker.py | 223 suppressions: Map of suppression type to the token that added it. 236 self.suppressions = {} 274 self.suppressions[suppression] = token
|
/external/compiler-rt/lib/lsan/ |
H A D | lsan_common.h | 55 const char* suppressions; member in struct:__lsan::Flags
|
H A D | lsan_common.cc | 43 f->suppressions=""; 69 ParseFlag(options, &f->suppressions, "suppressions"); 81 if (ReadFileToBuffer(flags()->suppressions, &suppressions_from_file, 84 if (flags()->suppressions[0] && !buffer_size) { 85 Printf("LeakSanitizer: failed to read suppressions file '%s'\n", 86 flags()->suppressions);
|
/external/valgrind/main/coregrind/ |
H A D | m_errormgr.c | 75 suppressions file. Note that the list gets rearranged as a result 77 static Supp* suppressions = NULL; variable 881 /* Show the used suppressions. Returns False if no suppression 892 for (su = suppressions; su != NULL; su = su->next) { 917 suppressions used. */ 927 /* If we're printing XML, just show the suppressions and stop. */ 1171 /* Read suppressions from the file specified in VG_(clo_suppressions) 1172 and place them in the suppressions list. If there's any difficulty 1191 VG_(umsg)("FATAL: suppressions file \"%s\" is a directory\n", filename ); 1200 VG_(umsg)("FATAL: can't open suppressions fil [all...] |