Searched refs:bug_type (Results 1 – 4 of 4) sorted by relevance
/external/llvm/test/Linker/Inputs/ |
D | PR11464.b.ll | 1 %bug_type = type { %bug_type* } 4 define i32 @bug_a(%bug_type* %fp) nounwind uwtable { 6 %d_stream = getelementptr inbounds %bug_type, %bug_type* %fp, i64 0, i32 0
|
D | PR11464.a.ll | 1 %bug_type = type opaque 2 declare i32 @bug_a(%bug_type*) 3 declare i32 @bug_b(%bug_type*)
|
/external/compiler-rt/lib/asan/ |
D | asan_report.cc | 805 char bug_type[100]; in ReportStringFunctionMemoryRangesOverlap() local 806 internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); in ReportStringFunctionMemoryRangesOverlap() 810 bug_type, offset1, offset1 + length1, offset2, offset2 + length2); in ReportStringFunctionMemoryRangesOverlap() 815 ReportErrorSummary(bug_type, stack); in ReportStringFunctionMemoryRangesOverlap() 822 const char *bug_type = "negative-size-param"; in ReportStringFunctionSizeOverflow() local 824 Report("ERROR: AddressSanitizer: %s: (size=%zd)\n", bug_type, size); in ReportStringFunctionSizeOverflow() 828 ReportErrorSummary(bug_type, stack); in ReportStringFunctionSizeOverflow()
|
/external/clang/tools/scan-build/ |
D | scan-build | 662 my $bug_type = ($row->[2]); 664 my $key = "$bug_category:$bug_type"; 666 if (!defined $Totals{$key}) { $Totals{$key} = [1,$bug_category,$bug_type]; }
|