Searched refs:suppressions (Results 1 - 25 of 31) sorted by relevance

12

/external/valgrind/main/memcheck/tests/
H A Dsupp-dir.stderr.exp2 FATAL: suppressions file "x86/" is a directory
/external/chromium_org/tools/valgrind/
H A Dunused_suppressions.py9 import suppressions namespace
13 supp = suppressions.GetSuppressions()
H A Dfixed_suppressions.sh6 bugs=$(egrep -o 'bug_[0-9]+' tools/valgrind/memcheck/suppressions.txt |\
H A Dtest_suppressions.py14 import suppressions namespace
88 for (symbol, suppressions) in sorted_reports[:top_count]:
89 print "%4d occurrences : %s" % (len(suppressions), symboltable[symbol])
98 supp = suppressions.GetSuppressions()
110 help='Filter out all suppressions not containing the specified symbol(s). '
113 help='Filter out all suppressions containing the specified symbol(s). '
144 # Include mac suppressions if the report is only present on Mac
147 # Include win32 suppressions if the report is only present on Windows
175 print "didn't match any suppressions:"
186 print ("%d unique reports don't match any of the suppressions"
[all...]
H A Dvalgrind.sh83 SUPPRESSIONS="$THISDIR/$TOOL_NAME/suppressions.txt"
122 --suppressions="$SUPPRESSIONS" \
H A Dsuppressions.py6 # suppressions.py
12 # optional one-line comments anywhere in the suppressions file.
24 If ran from the command line, suppressions.py does a self-test
46 supp_filename = JOIN(suppressions_root, "memcheck", "suppressions.txt")
48 supp_filename = JOIN(suppressions_root, "tsan", "suppressions.txt")
68 supp_filename = JOIN(suppressions_root, "drmemory", "suppressions.txt")
129 We match our suppressions against generated suppressions
150 tools/valgrind/tsan/suppressions.txt -> tsan
151 tools/valgrind/drmemory/suppressions
[all...]
H A Dwaterfall.sh9 # suppressions match the reports on the waterfall.
164 suppressions match the reports on the waterfall.
/external/chromium_org/tools/valgrind/memcheck/
H A DPRESUBMIT.py13 """Checks the memcheck suppressions files for bad data."""
14 sup_regex = re.compile('suppressions.*\.txt$')
15 suppressions = {}
36 if suppressions.has_key(line):
37 if f.LocalPath() == suppressions[line][1]:
41 suppressions[line][1]))
46 suppressions[line][0], suppressions[line][1]))
48 suppressions[line] = (f, line_num)
/external/chromium_org/third_party/libyuv/tools/valgrind-libyuv/memcheck/
H A DPRESUBMIT.py22 """Checks the memcheck suppressions files for bad data."""
28 import suppressions namespace
30 sup_regex = re.compile('suppressions.*\.txt$')
31 suppressions = {}
52 if suppressions.has_key(line):
53 if f.LocalPath() == suppressions[line][1]:
57 suppressions[line][1]))
62 suppressions[line][0], suppressions[line][1]))
64 suppressions[lin
[all...]
/external/chromium_org/third_party/libyuv/tools/valgrind-libyuv/tsan/
H A DPRESUBMIT.py22 """Checks the TSan suppressions files for bad suppressions."""
28 import suppressions namespace
30 return suppressions.PresubmitCheck(input_api, output_api)
/external/chromium_org/tools/valgrind/drmemory/
H A DPRESUBMIT.py11 """Checks the DrMemory suppression files for bad suppressions."""
20 import suppressions namespace
21 return suppressions.PresubmitCheck(input_api, output_api)
/external/chromium_org/tools/valgrind/tsan/
H A DPRESUBMIT.py11 """Checks the TSan suppressions files for bad suppressions."""
20 import suppressions namespace
21 return suppressions.PresubmitCheck(input_api, output_api)
/external/compiler-rt/lib/tsan/rtl/
H A Dtsan_flags.h51 const char *suppressions; member in struct:__tsan::Flags
52 // Print matched suppressions at exit.
H A Dtsan_flags.cc48 ParseFlag(env, &f->suppressions, "suppressions", "");
83 f->suppressions = "";
H A Dtsan_suppressions.cc56 Printf("ThreadSanitizer: failed to open suppressions file '%s'\n",
63 Printf("ThreadSanitizer: failed to stat suppressions file '%s'\n",
69 Printf("ThreadSanitizer: failed to read suppressions file '%s'\n",
81 const char *supp = ReadFile(flags()->suppressions);
174 Printf("ThreadSanitizer: Matched %d suppressions (pid=%d):\n", hit_count,
/external/valgrind/main/drd/tests/
H A Dverify-xml-output19 ../../vg-in-place --tool=drd --xml=yes --xml-file="$b-%q{USER}.xml" --xml-user-comment="<runBy>$(basename $0)</runBy>" --child-silent-after-fork=yes --gen-suppressions=all $vgopts ./$prog $args
/external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/
H A Dclosurizednamespacesinfo.py318 if jsdoc and ('extraRequire' in jsdoc.suppressions):
333 if jsdoc and ('extraProvide' in jsdoc.suppressions):
425 if jsdoc and 'missingProvide' in jsdoc.suppressions:
441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
H A Decmalintrules.py592 and not ('accessControls' in jsdoc.suppressions)):
597 and not ('accessControls' in jsdoc.suppressions)):
602 not ('underscore' in jsdoc.suppressions) and not
604 ('accessControls' in jsdoc.suppressions))):
608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions:
611 jsdoc.suppressions['underscore'])
H A Dstatetracker.py223 suppressions: Map of suppression type to the token that added it.
236 self.suppressions = {}
274 self.suppressions[suppression] = token
/external/chromium_org/third_party/closure_linter/closure_linter/
H A Dclosurizednamespacesinfo.py318 if jsdoc and ('extraRequire' in jsdoc.suppressions):
333 if jsdoc and ('extraProvide' in jsdoc.suppressions):
425 if jsdoc and 'missingProvide' in jsdoc.suppressions:
441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
H A Decmalintrules.py592 and not ('accessControls' in jsdoc.suppressions)):
597 and not ('accessControls' in jsdoc.suppressions)):
602 not ('underscore' in jsdoc.suppressions) and not
604 ('accessControls' in jsdoc.suppressions))):
608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions:
611 jsdoc.suppressions['underscore'])
/external/compiler-rt/lib/lsan/
H A Dlsan_common.h54 // Print matched suppressions after leak checking.
57 const char* suppressions; member in struct:__lsan::Flags
H A Dlsan_common.cc47 f->suppressions="";
76 ParseFlag(options, &f->suppressions, "suppressions", "");
98 if (ReadFileToBuffer(flags()->suppressions, &suppressions_from_file,
101 if (flags()->suppressions[0] && !buffer_size) {
102 Printf("LeakSanitizer: failed to read suppressions file '%s'\n",
103 flags()->suppressions);
/external/compiler-rt/lib/tsan/tests/unit/
H A Dtsan_flags_test.cc49 " suppressions=qwerty"
94 " suppressions=aaaaa"
139 EXPECT_EQ(f->suppressions, std::string("qwerty"));
184 EXPECT_EQ(f->suppressions, std::string("aaaaa"));
/external/valgrind/main/coregrind/
H A Dm_errormgr.c75 suppressions file. Note that the list gets rearranged as a result
77 static Supp* suppressions = NULL; variable
895 /* Show the used suppressions. Returns False if no suppression
906 for (su = suppressions; su != NULL; su = su->next) {
940 suppressions used. */
950 /* If we're printing XML, just show the suppressions and stop. */
1221 /* Read suppressions from the file specified in
1223 and place them in the suppressions list. If there's any difficulty
1244 VG_(umsg)("FATAL: suppressions file \"%s\" is a directory\n", filename );
1253 VG_(umsg)("FATAL: can't open suppressions fil
[all...]

Completed in 645 milliseconds

12