/external/valgrind/main/memcheck/tests/ |
H A D | supp-dir.stderr.exp | 2 FATAL: suppressions file "x86/" is a directory
|
/external/chromium_org/tools/valgrind/ |
H A D | unused_suppressions.py | 9 import suppressions namespace 13 supp = suppressions.GetSuppressions()
|
H A D | fixed_suppressions.sh | 6 bugs=$(egrep -o 'bug_[0-9]+' tools/valgrind/memcheck/suppressions.txt |\
|
H A D | test_suppressions.py | 14 import suppressions namespace 88 for (symbol, suppressions) in sorted_reports[:top_count]: 89 print "%4d occurrences : %s" % (len(suppressions), symboltable[symbol]) 98 supp = suppressions.GetSuppressions() 110 help='Filter out all suppressions not containing the specified symbol(s). ' 113 help='Filter out all suppressions containing the specified symbol(s). ' 144 # Include mac suppressions if the report is only present on Mac 147 # Include win32 suppressions if the report is only present on Windows 175 print "didn't match any suppressions:" 186 print ("%d unique reports don't match any of the suppressions" [all...] |
H A D | valgrind.sh | 83 SUPPRESSIONS="$THISDIR/$TOOL_NAME/suppressions.txt" 122 --suppressions="$SUPPRESSIONS" \
|
H A D | suppressions.py | 6 # suppressions.py 12 # optional one-line comments anywhere in the suppressions file. 24 If ran from the command line, suppressions.py does a self-test 46 supp_filename = JOIN(suppressions_root, "memcheck", "suppressions.txt") 48 supp_filename = JOIN(suppressions_root, "tsan", "suppressions.txt") 68 supp_filename = JOIN(suppressions_root, "drmemory", "suppressions.txt") 129 We match our suppressions against generated suppressions 150 tools/valgrind/tsan/suppressions.txt -> tsan 151 tools/valgrind/drmemory/suppressions [all...] |
H A D | waterfall.sh | 9 # suppressions match the reports on the waterfall. 164 suppressions match the reports on the waterfall.
|
/external/chromium_org/tools/valgrind/memcheck/ |
H A D | PRESUBMIT.py | 13 """Checks the memcheck suppressions files for bad data.""" 14 sup_regex = re.compile('suppressions.*\.txt$') 15 suppressions = {} 36 if suppressions.has_key(line): 37 if f.LocalPath() == suppressions[line][1]: 41 suppressions[line][1])) 46 suppressions[line][0], suppressions[line][1])) 48 suppressions[line] = (f, line_num)
|
/external/chromium_org/third_party/libyuv/tools/valgrind-libyuv/memcheck/ |
H A D | PRESUBMIT.py | 22 """Checks the memcheck suppressions files for bad data.""" 28 import suppressions namespace 30 sup_regex = re.compile('suppressions.*\.txt$') 31 suppressions = {} 52 if suppressions.has_key(line): 53 if f.LocalPath() == suppressions[line][1]: 57 suppressions[line][1])) 62 suppressions[line][0], suppressions[line][1])) 64 suppressions[lin [all...] |
/external/chromium_org/third_party/libyuv/tools/valgrind-libyuv/tsan/ |
H A D | PRESUBMIT.py | 22 """Checks the TSan suppressions files for bad suppressions.""" 28 import suppressions namespace 30 return suppressions.PresubmitCheck(input_api, output_api)
|
/external/chromium_org/tools/valgrind/drmemory/ |
H A D | PRESUBMIT.py | 11 """Checks the DrMemory suppression files for bad suppressions.""" 20 import suppressions namespace 21 return suppressions.PresubmitCheck(input_api, output_api)
|
/external/chromium_org/tools/valgrind/tsan/ |
H A D | PRESUBMIT.py | 11 """Checks the TSan suppressions files for bad suppressions.""" 20 import suppressions namespace 21 return suppressions.PresubmitCheck(input_api, output_api)
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_flags.h | 51 const char *suppressions; member in struct:__tsan::Flags 52 // Print matched suppressions at exit.
|
H A D | tsan_flags.cc | 48 ParseFlag(env, &f->suppressions, "suppressions", ""); 83 f->suppressions = "";
|
H A D | tsan_suppressions.cc | 56 Printf("ThreadSanitizer: failed to open suppressions file '%s'\n", 63 Printf("ThreadSanitizer: failed to stat suppressions file '%s'\n", 69 Printf("ThreadSanitizer: failed to read suppressions file '%s'\n", 81 const char *supp = ReadFile(flags()->suppressions); 174 Printf("ThreadSanitizer: Matched %d suppressions (pid=%d):\n", hit_count,
|
/external/valgrind/main/drd/tests/ |
H A D | verify-xml-output | 19 ../../vg-in-place --tool=drd --xml=yes --xml-file="$b-%q{USER}.xml" --xml-user-comment="<runBy>$(basename $0)</runBy>" --child-silent-after-fork=yes --gen-suppressions=all $vgopts ./$prog $args
|
/external/chromium-trace/trace-viewer/third_party/closure_linter/closure_linter/ |
H A D | closurizednamespacesinfo.py | 318 if jsdoc and ('extraRequire' in jsdoc.suppressions): 333 if jsdoc and ('extraProvide' in jsdoc.suppressions): 425 if jsdoc and 'missingProvide' in jsdoc.suppressions: 441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
|
H A D | ecmalintrules.py | 592 and not ('accessControls' in jsdoc.suppressions)): 597 and not ('accessControls' in jsdoc.suppressions)): 602 not ('underscore' in jsdoc.suppressions) and not 604 ('accessControls' in jsdoc.suppressions))): 608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions: 611 jsdoc.suppressions['underscore'])
|
H A D | statetracker.py | 223 suppressions: Map of suppression type to the token that added it. 236 self.suppressions = {} 274 self.suppressions[suppression] = token
|
/external/chromium_org/third_party/closure_linter/closure_linter/ |
H A D | closurizednamespacesinfo.py | 318 if jsdoc and ('extraRequire' in jsdoc.suppressions): 333 if jsdoc and ('extraProvide' in jsdoc.suppressions): 425 if jsdoc and 'missingProvide' in jsdoc.suppressions: 441 if jsdoc and 'missingRequire' in jsdoc.suppressions:
|
H A D | ecmalintrules.py | 592 and not ('accessControls' in jsdoc.suppressions)): 597 and not ('accessControls' in jsdoc.suppressions)): 602 not ('underscore' in jsdoc.suppressions) and not 604 ('accessControls' in jsdoc.suppressions))): 608 if jsdoc.HasFlag('private') and 'underscore' in jsdoc.suppressions: 611 jsdoc.suppressions['underscore'])
|
/external/compiler-rt/lib/lsan/ |
H A D | lsan_common.h | 54 // Print matched suppressions after leak checking. 57 const char* suppressions; member in struct:__lsan::Flags
|
H A D | lsan_common.cc | 47 f->suppressions=""; 76 ParseFlag(options, &f->suppressions, "suppressions", ""); 98 if (ReadFileToBuffer(flags()->suppressions, &suppressions_from_file, 101 if (flags()->suppressions[0] && !buffer_size) { 102 Printf("LeakSanitizer: failed to read suppressions file '%s'\n", 103 flags()->suppressions);
|
/external/compiler-rt/lib/tsan/tests/unit/ |
H A D | tsan_flags_test.cc | 49 " suppressions=qwerty" 94 " suppressions=aaaaa" 139 EXPECT_EQ(f->suppressions, std::string("qwerty")); 184 EXPECT_EQ(f->suppressions, std::string("aaaaa"));
|
/external/valgrind/main/coregrind/ |
H A D | m_errormgr.c | 75 suppressions file. Note that the list gets rearranged as a result 77 static Supp* suppressions = NULL; variable 895 /* Show the used suppressions. Returns False if no suppression 906 for (su = suppressions; su != NULL; su = su->next) { 940 suppressions used. */ 950 /* If we're printing XML, just show the suppressions and stop. */ 1221 /* Read suppressions from the file specified in 1223 and place them in the suppressions list. If there's any difficulty 1244 VG_(umsg)("FATAL: suppressions file \"%s\" is a directory\n", filename ); 1253 VG_(umsg)("FATAL: can't open suppressions fil [all...] |