/external/chromium_org/tools/valgrind/ |
unused_suppressions.py | 13 supp = suppressions.GetSuppressions() 16 for supps in supp.values():
|
test_suppressions.py | 91 supp = suppressions.GetSuppressions() 121 cur_supp = supp['common_suppressions'] 125 cur_supp += supp['mac_suppressions'] 128 cur_supp += supp['win_suppressions'] 130 cur_supp += supp['linux_suppressions'] 134 cur_supp += supp['heapcheck_suppressions'] 136 cur_supp += supp['drmem_suppressions'] 138 cur_supp += supp['drmem_full_suppressions']
|
memcheck_analyze.py | 285 supp = self._suppression; 286 supp = supp.replace("fun:_Znwj", "fun:_Znw*") 287 supp = supp.replace("fun:_Znwm", "fun:_Znw*") 288 supp = supp.replace("fun:_Znaj", "fun:_Zna*") 289 supp = supp.replace("fun:_Znam", "fun:_Zna*") 293 supp = supp.replace("Memcheck:Addr%d" % sz, "Memcheck:Unaddressable" [all...] |
suppressions.py | 556 for supp in positive: 557 parsed = suppression_parser(supp.split("\n"), "positive_suppression") 559 "Suppression:\n%s\ndidn't match stack:\n%s" % (supp, stack)) 560 for supp in negative: 561 parsed = suppression_parser(supp.split("\n"), "negative_suppression") 563 "Suppression:\n%s\ndid match stack:\n%s" % (supp, stack)) [all...] |
tsan_analyze.py | 119 supp = "" 122 supp += self.line_ 128 (int(hashlib.md5(supp).hexdigest()[:16], 16))) 131 result.append(supp)
|
/external/valgrind/unittest/ |
run_output_tests.sh | 8 SUPP= 9 if [ -f output_tests/${TEST}.supp ]; then 10 SUPP=--suppressions=output_tests/${TEST}.supp 18 CMD="$TSAN $SUPP $IGNORE -- ./${BIN}output_tests/${TEST}-${BUILD}${EXE} 2>&1 | python match_output.py output_tests/${TEST}.tmpl"
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 38 struct wpa_sm *supp; member in struct:wpa 51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 135 return wpa_sm_set_ap_rsn_ie(wpa->supp, ie, 2 + ie[1]); 136 return wpa_sm_set_ap_wpa_ie(wpa->supp, ie, 2 + ie[1]); 145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 148 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len) [all...] |
/external/valgrind/main/coregrind/ |
m_errormgr.c | 77 static Supp* suppressions = NULL; 96 static Supp* is_suppressible_error ( Error* err ); 134 Supp* supp; member in struct:_Error 241 SuppKind VG_(get_supp_kind) ( Supp* su ) 246 Char* VG_(get_supp_string) ( Supp* su ) 251 void* VG_(get_supp_extra) ( Supp* su ) 257 void VG_(set_supp_kind) ( Supp* su, SuppKind skind ) 262 void VG_(set_supp_string) ( Supp* su, Char* string ) 267 void VG_(set_supp_extra) ( Supp* su, void* extra 1209 Supp* supp; local [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_suppressions.cc | 70 const char *supp = ReadFile(flags()->suppressions); local 71 g_ctx->Parse(supp); 73 supp = __tsan_default_suppressions(); 74 g_ctx->Parse(supp);
|
tsan_rtl_report.cc | 517 Suppression *supp = 0; local 518 uptr suppress_pc = IsSuppressed(rep->typ, suppress_stack1, &supp); 520 suppress_pc = IsSuppressed(rep->typ, suppress_stack2, &supp); 522 suppress_pc = IsSuppressed(rep->typ, suppress_loc, &supp); 524 FiredSuppression s = {srep.GetReport()->typ, suppress_pc, supp}; 543 if (s->supp) 544 s->supp->hit_count++; 560 if (s->supp) 561 s->supp->hit_count++; 599 FiredSuppression supp = {rep->typ, frame->pc, 0} local [all...] |
tsan_rtl.h | 518 Suppression *supp; member in struct:__tsan::FiredSuppression
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 43 wpa_sm_deinit(peer->supp); 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 114 return wpa_sm_set_ap_rsn_ie(peer->supp, 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d 750 int supp; local [all...] |
ibss_rsn.h | 35 struct wpa_sm *supp; member in struct:ibss_rsn_peer
|
/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
makefile.bc | 33 ofb64ede.obj supp.obj
|
/external/openssl/crypto/des/ |
makefile.bc | 33 ofb64ede.obj supp.obj
|
/external/valgrind/main/drd/ |
drd_error.c | 510 static Bool drd_is_recognized_suppression(Char* const name, Supp* const supp) 545 VG_(set_supp_kind)(supp, skind); 558 SizeT* nBufp, Supp* supp) 567 static Bool drd_error_matches_suppression(Error* const e, Supp* const supp) 569 return VG_(get_supp_kind)(supp) == VG_(get_error_kind)(e);
|
/external/libexif/libexif/ |
exif-tag.c | 1116 const ExifSupportLevel supp = ExifTagTable[i].esl[ifd][t]; local 1150 const ExifSupportLevel supp = ExifTagTable[i].esl[ifd][0]; local [all...] |
/external/chromium_org/third_party/icu/source/test/cintltst/ |
custrtst.c | 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local 866 first!=u_strchr32(s+1, supp) || 867 first!=u_memchr32(s+1, supp, 9) || 873 last!=u_strrchr32(s+1, supp) || 874 last!=u_memrchr32(s+1, supp, 9) || [all...] |
/external/icu4c/test/cintltst/ |
custrtst.c | 716 static const UChar32 supp=0x10402, supp2=0x10403, ill=0x123456; local 866 first!=u_strchr32(s+1, supp) || 867 first!=u_memchr32(s+1, supp, 9) || 873 last!=u_strrchr32(s+1, supp) || 874 last!=u_memrchr32(s+1, supp, 9) || [all...] |
/external/e2fsprogs/debugfs/ |
debugfs.c | 2075 __u32 supp[3] = { EXT2_LIB_FEATURE_COMPAT_SUPP, local [all...] |
/external/valgrind/main/ |
Android.mk | 653 LOCAL_MODULE := default.supp 657 LOCAL_SRC_FILES := bionic.supp
|
/external/icu4c/i18n/ |
ucol_elm.cpp | 770 UChar32 supp = U16_GET_SUPPLEMENTARY(c, 0xdc00); local 771 UChar32 suppLimit = supp + 0x400; 772 while (supp < suppLimit) { 773 fcd |= nfcImpl->getFCD16FromNormData(supp++); [all...] |
/prebuilts/tools/common/netbeans-visual/ |
org-openide-util.jar | |
/cts/suite/cts/deviceTests/browserbench/assets/octane/ |
code-load.js | [all...] |
/prebuilts/misc/common/icu4j/ |
icu4j.jar | |