/netbsd-current/external/apache2/llvm/dist/clang/tools/scan-build-py/libscanbuild/ |
H A D | report.py | 149 for bug_type in types.values(): 152 | <td class="SUMM_DESC">{bug_type}</td> 160 | </tr>""", indent).format(**bug_type)) 200 | <td class="DESC">{bug_type}</td> 391 'bug_type': bug['type'], 402 patterns = [re.compile(r'<!-- BUGTYPE (?P<bug_type>.*) -->$'), 464 return escape('bt_' + smash('bug_category') + '_' + smash('bug_type')) 478 bug_type = bug['bug_type'] 480 current_type = current_category.get(bug_type, { [all...] |
/netbsd-current/sys/external/bsd/compiler_rt/dist/lib/asan/ |
H A D | asan_descriptions.h | 159 void Print(const char *bug_type = "") const; 168 bool DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type); 172 // bug_type is optional and is used for checking if we're reporting an 177 // may take access_size and bug_type parameters if needed. 179 const char *bug_type = "");
|
H A D | asan_descriptions.cc | 314 const char *bug_type) { 318 descr.Print(bug_type); 326 void GlobalAddressDescription::Print(const char *bug_type) const { 329 if (bug_type && 330 0 == internal_strcmp(bug_type, "initialization-order-fiasco") && 472 const char *bug_type) { 481 global_descr.Print(bug_type); 313 DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type) argument
|
H A D | asan_errors.h | 277 char bug_type[100]; local 278 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); 280 scariness.Scare(10, bug_type);
|
H A D | asan_errors.cc | 282 char bug_type[100]; local 283 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); 288 bug_type, addr1_description.Address(), 296 ReportErrorSummary(bug_type, stack);
|
/netbsd-current/external/gpl3/gcc.old/dist/libsanitizer/asan/ |
H A D | asan_descriptions.h | 157 void Print(const char *bug_type = "") const; 166 bool DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type); 170 // bug_type is optional and is used for checking if we're reporting an 175 // may take access_size and bug_type parameters if needed. 177 const char *bug_type = "");
|
H A D | asan_descriptions.cc | 312 const char *bug_type) { 316 descr.Print(bug_type); 324 void GlobalAddressDescription::Print(const char *bug_type) const { 327 if (bug_type && 328 0 == internal_strcmp(bug_type, "initialization-order-fiasco") && 470 const char *bug_type) { 479 global_descr.Print(bug_type); 311 DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type) argument
|
H A D | asan_errors.h | 275 char bug_type[100]; local 276 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); 278 scariness.Scare(10, bug_type);
|
H A D | asan_errors.cc | 280 char bug_type[100]; local 281 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); 286 bug_type, addr1_description.Address(), 294 ReportErrorSummary(bug_type, stack);
|
/netbsd-current/external/gpl3/gcc/dist/libsanitizer/asan/ |
H A D | asan_descriptions.h | 165 void Print(const char *bug_type = "") const; 174 bool DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type); 178 // bug_type is optional and is used for checking if we're reporting an 183 // may take access_size and bug_type parameters if needed. 185 const char *bug_type = "");
|
H A D | asan_descriptions.cpp | 312 const char *bug_type) { 316 descr.Print(bug_type); 325 void GlobalAddressDescription::Print(const char *bug_type) const { 328 if (bug_type && 329 0 == internal_strcmp(bug_type, "initialization-order-fiasco") && 477 const char *bug_type) { 486 global_descr.Print(bug_type); 311 DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type) argument
|
H A D | asan_errors.h | 292 char bug_type[100]; local 293 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); 295 scariness.Scare(10, bug_type);
|
H A D | asan_errors.cpp | 293 char bug_type[100]; local 294 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); 299 bug_type, (void *)addr1_description.Address(), 308 ReportErrorSummary(bug_type, stack);
|
/netbsd-current/external/gpl3/gcc/dist/libsanitizer/hwasan/ |
H A D | hwasan_report.cpp | 582 const char *bug_type = "invalid-free"; local 586 SanitizerToolName, bug_type, untagged_addr, pc, thread->unique_id()); 589 SanitizerToolName, bug_type, untagged_addr, pc); 603 ReportErrorSummary(bug_type, stack); 622 const char *bug_type = "allocation-tail-overwritten"; local 624 bug_type, untagged_addr, untagged_addr + orig_size, orig_size); 676 ReportErrorSummary(bug_type, stack); 688 const char *bug_type = "tag-mismatch"; local 691 Report("ERROR: %s: %s on address %p at pc %p\n", SanitizerToolName, bug_type, 745 ReportErrorSummary(bug_type, stac [all...] |
/netbsd-current/external/apache2/llvm/dist/clang/tools/scan-build/bin/ |
H A D | scan-build | 712 my $bug_type = ($row->[2]); 714 my $key = "$bug_category:$bug_type"; 716 if (!defined $Totals{$key}) { $Totals{$key} = [1,$bug_category,$bug_type]; }
|