Searched refs:bug_type (Results 1 - 15 of 15) sorted by relevance

/netbsd-current/external/apache2/llvm/dist/clang/tools/scan-build-py/libscanbuild/
H A Dreport.py149 for bug_type in types.values():
152 | <td class="SUMM_DESC">{bug_type}</td>
160 | </tr>""", indent).format(**bug_type))
200 | <td class="DESC">{bug_type}</td>
391 'bug_type': bug['type'],
402 patterns = [re.compile(r'<!-- BUGTYPE (?P<bug_type>.*) -->$'),
464 return escape('bt_' + smash('bug_category') + '_' + smash('bug_type'))
478 bug_type = bug['bug_type']
480 current_type = current_category.get(bug_type, {
[all...]
/netbsd-current/sys/external/bsd/compiler_rt/dist/lib/asan/
H A Dasan_descriptions.h159 void Print(const char *bug_type = "") const;
168 bool DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type);
172 // bug_type is optional and is used for checking if we're reporting an
177 // may take access_size and bug_type parameters if needed.
179 const char *bug_type = "");
H A Dasan_descriptions.cc314 const char *bug_type) {
318 descr.Print(bug_type);
326 void GlobalAddressDescription::Print(const char *bug_type) const {
329 if (bug_type &&
330 0 == internal_strcmp(bug_type, "initialization-order-fiasco") &&
472 const char *bug_type) {
481 global_descr.Print(bug_type);
313 DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type) argument
H A Dasan_errors.h277 char bug_type[100]; local
278 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function);
280 scariness.Scare(10, bug_type);
H A Dasan_errors.cc282 char bug_type[100]; local
283 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function);
288 bug_type, addr1_description.Address(),
296 ReportErrorSummary(bug_type, stack);
/netbsd-current/external/gpl3/gcc.old/dist/libsanitizer/asan/
H A Dasan_descriptions.h157 void Print(const char *bug_type = "") const;
166 bool DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type);
170 // bug_type is optional and is used for checking if we're reporting an
175 // may take access_size and bug_type parameters if needed.
177 const char *bug_type = "");
H A Dasan_descriptions.cc312 const char *bug_type) {
316 descr.Print(bug_type);
324 void GlobalAddressDescription::Print(const char *bug_type) const {
327 if (bug_type &&
328 0 == internal_strcmp(bug_type, "initialization-order-fiasco") &&
470 const char *bug_type) {
479 global_descr.Print(bug_type);
311 DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type) argument
H A Dasan_errors.h275 char bug_type[100]; local
276 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function);
278 scariness.Scare(10, bug_type);
H A Dasan_errors.cc280 char bug_type[100]; local
281 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function);
286 bug_type, addr1_description.Address(),
294 ReportErrorSummary(bug_type, stack);
/netbsd-current/external/gpl3/gcc/dist/libsanitizer/asan/
H A Dasan_descriptions.h165 void Print(const char *bug_type = "") const;
174 bool DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type);
178 // bug_type is optional and is used for checking if we're reporting an
183 // may take access_size and bug_type parameters if needed.
185 const char *bug_type = "");
H A Dasan_descriptions.cpp312 const char *bug_type) {
316 descr.Print(bug_type);
325 void GlobalAddressDescription::Print(const char *bug_type) const {
328 if (bug_type &&
329 0 == internal_strcmp(bug_type, "initialization-order-fiasco") &&
477 const char *bug_type) {
486 global_descr.Print(bug_type);
311 DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type) argument
H A Dasan_errors.h292 char bug_type[100]; local
293 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function);
295 scariness.Scare(10, bug_type);
H A Dasan_errors.cpp293 char bug_type[100]; local
294 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function);
299 bug_type, (void *)addr1_description.Address(),
308 ReportErrorSummary(bug_type, stack);
/netbsd-current/external/gpl3/gcc/dist/libsanitizer/hwasan/
H A Dhwasan_report.cpp582 const char *bug_type = "invalid-free"; local
586 SanitizerToolName, bug_type, untagged_addr, pc, thread->unique_id());
589 SanitizerToolName, bug_type, untagged_addr, pc);
603 ReportErrorSummary(bug_type, stack);
622 const char *bug_type = "allocation-tail-overwritten"; local
624 bug_type, untagged_addr, untagged_addr + orig_size, orig_size);
676 ReportErrorSummary(bug_type, stack);
688 const char *bug_type = "tag-mismatch"; local
691 Report("ERROR: %s: %s on address %p at pc %p\n", SanitizerToolName, bug_type,
745 ReportErrorSummary(bug_type, stac
[all...]
/netbsd-current/external/apache2/llvm/dist/clang/tools/scan-build/bin/
H A Dscan-build712 my $bug_type = ($row->[2]);
714 my $key = "$bug_category:$bug_type";
716 if (!defined $Totals{$key}) { $Totals{$key} = [1,$bug_category,$bug_type]; }

Completed in 136 milliseconds