Searched refs:suppressions (Results 1 - 25 of 29) sorted by relevance

12

/external/valgrind/main/memcheck/tests/
H A Dsupp-dir.stderr.exp2 FATAL: suppressions file "x86/" is a directory
/external/chromium_org/tools/valgrind/
H A Dunused_suppressions.py9 import suppressions namespace
13 supp = suppressions.GetSuppressions()
H A Dtest_suppressions.py13 import suppressions namespace
88 for (symbol, suppressions) in sorted_reports[:top_count]:
89 print "%4d occurrences : %s" % (len(suppressions), symboltable[symbol])
92 supp = suppressions.GetSuppressions()
104 help='Filter out all suppressions not containing the specified symbol(s). '
122 # Include mac suppressions if the report is only present on Mac
125 # Include win32 suppressions if the report is only present on Windows
154 print "didn't match any suppressions:"
165 print ("%d unique reports don't match any of the suppressions" %
172 # TODO(timurrrr): also make sure none of the old suppressions
[all...]
H A Dvalgrind.sh83 SUPPRESSIONS="$THISDIR/$TOOL_NAME/suppressions.txt"
122 --suppressions="$SUPPRESSIONS" \
H A Dsuppressions.py6 # suppressions.py
12 # optional one-line comments anywhere in the suppressions file.
24 If ran from the command line, suppressions.py does a self-test
46 supp_filename = JOIN(suppressions_root, "memcheck", "suppressions.txt")
48 supp_filename = JOIN(suppressions_root, "tsan", "suppressions.txt")
68 supp_filename = JOIN(suppressions_root, "..", "heapcheck", "suppressions.txt")
71 supp_filename = JOIN(suppressions_root, "drmemory", "suppressions.txt")
132 We match our suppressions against generated suppressions
153 tools/heapcheck/suppressions
[all...]
H A Dwaterfall.sh9 # suppressions match the reports on the waterfall.
164 suppressions match the reports on the waterfall.
H A Dvalgrind_test.py260 parser.add_option("", "--suppressions", default=[],
377 for suppression_file in self._options.suppressions:
380 proc += ["--suppressions=%s" % suppression_file]
549 ret = ["--gen-suppressions=all", "--demangle=no"]
691 ret += ["--gen-suppressions=true"]
721 # The -v flag is needed for printing the list of used suppressions and
745 parser.add_option("", "--suppressions", default=[],
762 for suppression_file in self._options.suppressions:
766 proc += ["--suppressions=%s" % suppression_file]
806 parser.add_option("", "--suppressions", defaul
[all...]
/external/chromium_org/tools/valgrind/memcheck/
H A DPRESUBMIT.py13 """Checks the memcheck suppressions files for bad data."""
14 sup_regex = re.compile('suppressions.*\.txt$')
15 suppressions = {}
36 if suppressions.has_key(line):
37 if f.LocalPath() == suppressions[line][1]:
41 suppressions[line][1]))
46 suppressions[line][0], suppressions[line][1]))
48 suppressions[line] = (f, line_num)
/external/chromium_org/tools/valgrind/drmemory/
H A DPRESUBMIT.py11 """Checks the DrMemory suppression files for bad suppressions."""
20 import suppressions namespace
21 return suppressions.PresubmitCheck(input_api, output_api)
/external/chromium_org/tools/valgrind/tsan/
H A DPRESUBMIT.py11 """Checks the TSan suppressions files for bad suppressions."""
20 import suppressions namespace
21 return suppressions.PresubmitCheck(input_api, output_api)
/external/chromium_org/tools/heapcheck/
H A DPRESUBMIT.py13 """Checks the heapcheck suppressions files for bad data."""
14 sup_regex = re.compile('suppressions.*\.txt$')
15 suppressions = {}
31 if suppressions.has_key(line):
35 suppressions[line][1]))
37 suppressions[line] = (f, line_num)
H A Dheapcheck_test.py14 import suppressions namespace
34 self._suppressions.extend(suppressions.ReadSuppressionsFromFile(fname))
68 """Analyzes the app's output and applies suppressions to the reports.
71 suppressions to them. Unsuppressed reports and other log messages are
156 # Update the suppressions histogram.
177 # Print the list of suppressions used.
/external/valgrind/unittest/
H A Drun_output_tests.sh10 SUPP=--suppressions=output_tests/${TEST}.supp
/external/compiler-rt/lib/tsan/rtl/
H A Dtsan_flags.h54 const char *suppressions; member in struct:__tsan::Flags
55 // Print matched suppressions at exit.
H A Dtsan_flags.cc51 f->suppressions = "";
82 ParseFlag(env, &f->suppressions, "suppressions");
H A Dtsan_suppressions.cc45 Printf("ThreadSanitizer: failed to open suppressions file '%s'\n",
52 Printf("ThreadSanitizer: failed to stat suppressions file '%s'\n",
58 Printf("ThreadSanitizer: failed to read suppressions file '%s'\n",
70 const char *supp = ReadFile(flags()->suppressions);
146 Printf("ThreadSanitizer: Matched %d suppressions (pid=%d):\n", hit_count,
/external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/
H A Dclosurizednamespacesinfo.py318 if jsdoc and ('extraRequire' in jsdoc.suppressions):
333 if jsdoc and ('extraProvide' in jsdoc.suppressions):
425 if jsdoc and 'missingProvide' in jsdoc.suppressions:
441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
H A Decmalintrules.py592 and not ('accessControls' in jsdoc.suppressions)):
597 and not ('accessControls' in jsdoc.suppressions)):
602 not ('underscore' in jsdoc.suppressions) and not
604 ('accessControls' in jsdoc.suppressions))):
608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions:
611 jsdoc.suppressions['underscore'])
H A Dstatetracker.py223 suppressions: Map of suppression type to the token that added it.
236 self.suppressions = {}
274 self.suppressions[suppression] = token
/external/chromium_org/third_party/closure_linter/closure_linter/
H A Dclosurizednamespacesinfo.py318 if jsdoc and ('extraRequire' in jsdoc.suppressions):
333 if jsdoc and ('extraProvide' in jsdoc.suppressions):
425 if jsdoc and 'missingProvide' in jsdoc.suppressions:
441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
H A Decmalintrules.py592 and not ('accessControls' in jsdoc.suppressions)):
597 and not ('accessControls' in jsdoc.suppressions)):
602 not ('underscore' in jsdoc.suppressions) and not
604 ('accessControls' in jsdoc.suppressions))):
608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions:
611 jsdoc.suppressions['underscore'])
H A Dstatetracker.py223 suppressions: Map of suppression type to the token that added it.
236 self.suppressions = {}
274 self.suppressions[suppression] = token
/external/compiler-rt/lib/lsan/
H A Dlsan_common.h55 const char* suppressions; member in struct:__lsan::Flags
H A Dlsan_common.cc43 f->suppressions="";
69 ParseFlag(options, &f->suppressions, "suppressions");
81 if (ReadFileToBuffer(flags()->suppressions, &suppressions_from_file,
84 if (flags()->suppressions[0] && !buffer_size) {
85 Printf("LeakSanitizer: failed to read suppressions file '%s'\n",
86 flags()->suppressions);
/external/valgrind/main/coregrind/
H A Dm_errormgr.c75 suppressions file. Note that the list gets rearranged as a result
77 static Supp* suppressions = NULL; variable
881 /* Show the used suppressions. Returns False if no suppression
892 for (su = suppressions; su != NULL; su = su->next) {
917 suppressions used. */
927 /* If we're printing XML, just show the suppressions and stop. */
1171 /* Read suppressions from the file specified in VG_(clo_suppressions)
1172 and place them in the suppressions list. If there's any difficulty
1191 VG_(umsg)("FATAL: suppressions file \"%s\" is a directory\n", filename );
1200 VG_(umsg)("FATAL: can't open suppressions fil
[all...]

Completed in 906 milliseconds

12