HomeSort by relevance Sort by last modified time
    Searched refs:supp (Results 1 - 25 of 26) sorted by null

1 2

  /external/chromium_org/tools/valgrind/
unused_suppressions.py 13 supp = suppressions.GetSuppressions()
16 for supps in supp.values():
test_suppressions.py 92 supp = suppressions.GetSuppressions()
119 cur_supp = supp['common_suppressions']
123 cur_supp += supp['mac_suppressions']
126 cur_supp += supp['win_suppressions']
128 cur_supp += supp['linux_suppressions']
131 cur_supp += supp['heapcheck_suppressions']
133 cur_supp += supp['drmem_suppressions']
135 cur_supp += supp['drmem_full_suppressions']
memcheck_analyze.py 285 supp = self._suppression;
286 supp = supp.replace("fun:_Znwj", "fun:_Znw*")
287 supp = supp.replace("fun:_Znwm", "fun:_Znw*")
288 supp = supp.replace("fun:_Znaj", "fun:_Zna*")
289 supp = supp.replace("fun:_Znam", "fun:_Zna*")
293 supp = supp.replace("Memcheck:Addr%d" % sz, "Memcheck:Unaddressable"
    [all...]
suppressions.py 556 for supp in positive:
557 parsed = suppression_parser(supp.split("\n"), "positive_suppression")
559 "Suppression:\n%s\ndidn't match stack:\n%s" % (supp, stack))
560 for supp in negative:
561 parsed = suppression_parser(supp.split("\n"), "negative_suppression")
563 "Suppression:\n%s\ndid match stack:\n%s" % (supp, stack))
    [all...]
tsan_analyze.py 123 supp = ""
126 supp += self.line_
132 (int(hashlib.md5(supp).hexdigest()[:16], 16)))
135 result.append(supp)
  /external/valgrind/unittest/
run_output_tests.sh 8 SUPP=
9 if [ -f output_tests/${TEST}.supp ]; then
10 SUPP=--suppressions=output_tests/${TEST}.supp
18 CMD="$TSAN $SUPP $IGNORE -- ./${BIN}output_tests/${TEST}-${BUILD}${EXE} 2>&1 | python match_output.py output_tests/${TEST}.tmpl"
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 38 struct wpa_sm *supp; member in struct:wpa
51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
135 return wpa_sm_set_ap_rsn_ie(wpa->supp, ie, 2 + ie[1]);
136 return wpa_sm_set_ap_wpa_ie(wpa->supp, ie, 2 + ie[1]);
145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
148 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len)
    [all...]
  /external/valgrind/main/coregrind/
m_errormgr.c 77 static Supp* suppressions = NULL;
96 static Supp* is_suppressible_error ( Error* err );
134 Supp* supp; member in struct:_Error
241 SuppKind VG_(get_supp_kind) ( Supp* su )
246 Char* VG_(get_supp_string) ( Supp* su )
251 void* VG_(get_supp_extra) ( Supp* su )
257 void VG_(set_supp_kind) ( Supp* su, SuppKind skind )
262 void VG_(set_supp_string) ( Supp* su, Char* string )
267 void VG_(set_supp_extra) ( Supp* su, void* extra
1209 Supp* supp; local
    [all...]
  /external/compiler-rt/lib/tsan/rtl/
tsan_suppressions.cc 70 const char *supp = ReadFile(flags()->suppressions); local
71 g_ctx->Parse(supp);
73 supp = __tsan_default_suppressions();
74 g_ctx->Parse(supp);
tsan_rtl_report.cc 517 Suppression *supp = 0; local
518 uptr suppress_pc = IsSuppressed(rep->typ, suppress_stack1, &supp);
520 suppress_pc = IsSuppressed(rep->typ, suppress_stack2, &supp);
522 suppress_pc = IsSuppressed(rep->typ, suppress_loc, &supp);
524 FiredSuppression s = {srep.GetReport()->typ, suppress_pc, supp};
543 if (s->supp)
544 s->supp->hit_count++;
560 if (s->supp)
561 s->supp->hit_count++;
599 FiredSuppression supp = {rep->typ, frame->pc, 0} local
    [all...]
tsan_rtl.h 518 Suppression *supp; member in struct:__tsan::FiredSuppression
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 43 wpa_sm_deinit(peer->supp);
68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
114 return wpa_sm_set_ap_rsn_ie(peer->supp,
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d
750 int supp; local
    [all...]
ibss_rsn.h 35 struct wpa_sm *supp; member in struct:ibss_rsn_peer
  /external/chromium_org/third_party/openssl/openssl/crypto/des/
makefile.bc 33 ofb64ede.obj supp.obj
  /external/openssl/crypto/des/
makefile.bc 33 ofb64ede.obj supp.obj
  /external/chromium_org/tools/heapcheck/
heapcheck_test.py 109 for supp in self._suppressions:
110 if supp.Match(cur_stack):
112 description = supp.description
chrome_tests.py 242 supp = self.Suppressions()
255 return heapcheck_test.RunTool(cmd, supp, module)
402 supp = self.Suppressions()
403 return heapcheck_test.RunTool(cmd, supp, "layout")
  /external/valgrind/main/drd/
drd_error.c 510 static Bool drd_is_recognized_suppression(Char* const name, Supp* const supp)
545 VG_(set_supp_kind)(supp, skind);
558 SizeT* nBufp, Supp* supp)
567 static Bool drd_error_matches_suppression(Error* const e, Supp* const supp)
569 return VG_(get_supp_kind)(supp) == VG_(get_error_kind)(e);
  /external/chromium_org/third_party/icu/source/test/cintltst/
custrtst.c 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local
866 first!=u_strchr32(s+1, supp) ||
867 first!=u_memchr32(s+1, supp, 9) ||
873 last!=u_strrchr32(s+1, supp) ||
874 last!=u_memrchr32(s+1, supp, 9) ||
    [all...]
  /external/icu4c/test/cintltst/
custrtst.c 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local
866 first!=u_strchr32(s+1, supp) ||
867 first!=u_memchr32(s+1, supp, 9) ||
873 last!=u_strrchr32(s+1, supp) ||
874 last!=u_memrchr32(s+1, supp, 9) ||
    [all...]
  /external/e2fsprogs/debugfs/
debugfs.c 2075 __u32 supp[3] = { EXT2_LIB_FEATURE_COMPAT_SUPP, local
    [all...]
  /external/valgrind/main/
Android.mk 653 LOCAL_MODULE := default.supp
657 LOCAL_SRC_FILES := bionic.supp
  /external/icu4c/i18n/
ucol_elm.cpp 770 UChar32 supp = U16_GET_SUPPLEMENTARY(c, 0xdc00); local
771 UChar32 suppLimit = supp + 0x400;
772 while (supp < suppLimit) {
773 fcd |= nfcImpl->getFCD16FromNormData(supp++);
    [all...]
  /prebuilts/tools/common/netbeans-visual/
org-openide-util.jar 
  /cts/suite/cts/deviceTests/browserbench/assets/octane/
code-load.js     [all...]

Completed in 715 milliseconds

1 2