/src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
msan_report.cc | 44 Printf("%s", d.Origin()); 45 Printf( 67 Printf(" %sUninitialized value was stored to memory at%s\n", d.Origin(), 79 Printf(" %sUninitialized value was created by a heap allocation%s\n", 83 Printf(" %sUninitialized value was created by a heap deallocation%s\n", 87 Printf(" %sMemory was marked as uninitialized%s\n", d.Origin(), 91 Printf(" %sUninitialized value was created%s\n", d.Origin(), 105 Printf("%s", d.Warning()); 107 Printf("%s", d.Default()); 118 Printf("WARNING: Expected use of uninitialized value not found\n") [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
tsan_report.cc | 123 Printf(" [failed to restore the stack]\n\n"); 132 Printf("%s\n", res.data()); 134 Printf("\n"); 140 Printf(" (mutexes:"); 142 Printf(" %s M%llu", m.write ? "write" : "read", m.id); 143 Printf(i == mset.Size() - 1 ? ")" : ","); 162 Printf("%s", d.Access()); 164 Printf(" %s of size %d at %p by %s", 171 Printf(" %s access of %s at %p by %s", 176 Printf(":\n") [all...] |
tsan_platform_posix.cc | 36 Printf(kShadowMemoryMappingWarning, SanitizerToolName, addr, addr + size, 38 Printf(kShadowMemoryMappingHint, "MADV_NOHUGEPAGE", 47 Printf(kShadowMemoryMappingWarning, SanitizerToolName, addr, addr + size, 49 Printf(kShadowMemoryMappingHint, "MADV_DONTDUMP", "use_madv_dontdump"); 58 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); 59 Printf("FATAL: Make sure to compile with -fPIE and to link with -pie.\n"); 112 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); 113 Printf("FATAL: Make sure to compile with -fPIE and to link with -pie.\n"); 129 Printf("FATAL: ThreadSanitizer can not protect [%zx,%zx]\n", beg, end); 130 Printf("FATAL: Make sure you are not using unlimited stack\n") [all...] |
tsan_mutex.cc | 105 Printf("Can lock graph:\n"); 108 Printf("%d ", CanLockAdj[i][j]); 110 Printf("\n"); 112 Printf("Can lock graph closure:\n"); 115 Printf("%d ", CanLockAdj2[i][j]); 117 Printf("\n"); 123 Printf("Mutex %d participates in a cycle\n", i); 136 // Printf("LOCK %d @%zu\n", t, seq_ + 1); 153 // Printf(" last %d @%zu\n", max_idx, max_seq); 155 Printf("ThreadSanitizer: internal deadlock detected\n") [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/fuzzer/ |
FuzzerExtFunctionsDlsym.cpp | 30 Printf("WARNING: Failed to find function \"%s\".", FnName); 32 Printf(" Reason %s.", ErrorMsg); 33 Printf("\n");
|
FuzzerCorpus.h | 94 Printf("ADD_TO_CORPUS %zd NF %zd\n", Inputs.size(), NumFeatures); 125 Printf("%c", C); 132 Printf("{"); 134 Printf("%u,", Feature); 135 Printf("}"); 141 Printf("======= CORPUS:\n"); 145 Printf("[%2d] ", i); 146 Printf("%s sz=%zd ", Sha1ToString(II->Sha1).c_str(), II->U.size()); 148 Printf(" "); 150 Printf("\n") [all...] |
FuzzerLoop.cpp | 57 Printf("MallocFreeTracer: START\n"); 64 Printf("MallocFreeTracer: STOP %zd %zd (%s)\n", Mallocs.load(), 108 Printf("MALLOC[%zd] %p %zd\n", N, ptr, size); 121 Printf("FREE[%zd] %p\n", N, ptr); 131 Printf("==%d== ERROR: libFuzzer: out-of-memory (malloc(%zd))\n", GetPid(), 133 Printf(" To change the out-of-memory limit use -rss_limit_mb=<N>\n\n"); 136 Printf("SUMMARY: libFuzzer: out-of-memory\n"); 186 Printf("; base unit: %s\n", Sha1ToString(BaseSha1).c_str()); 225 Printf("INFO: signal received, trying to exit gracefully\n"); 229 Printf("==%lu== ERROR: libFuzzer: file size exceeded\n", GetPid()) [all...] |
FuzzerDriver.cpp | 82 Printf("Usage:\n"); 84 Printf("\nTo run fuzzing pass 0 or more directories.\n"); 85 Printf("%s [-flag1=val1 [-flag2=val2 ...] ] [dir1 [dir2 ...] ]\n", Prog); 87 Printf("\nTo run individual tests without fuzzing pass 1 or more files:\n"); 88 Printf("%s [-flag1=val1 [-flag2=val2 ...] ] file1 [file2 ...]\n", Prog); 90 Printf("\nFlags: (strictly in form -flag=value)\n"); 98 Printf(" %s", D.Name); 100 Printf(" "); 101 Printf("\t"); 102 Printf("%d\t%s\n", D.Default, D.Description) [all...] |
FuzzerUtilDarwin.cpp | 57 Printf("Failed to ignore SIGINT\n"); 62 Printf("Failed to ignore SIGQUIT\n"); 73 Printf("Failed to block SIGCHLD\n"); 142 Printf("Failed to restore SIGINT handling\n"); 146 Printf("Failed to restore SIGQUIT handling\n"); 150 Printf("Failed to unblock SIGCHLD\n");
|
FuzzerExtFunctionsWeakAlias.cpp | 23 Printf("ERROR: Function \"%s\" not defined.\n", #NAME); \ 37 Printf("WARNING: Failed to find function \"%s\".\n", FnName);
|
FuzzerDataFlowTrace.cpp | 26 Printf("INFO: DataFlowTrace: reading from '%s'\n", DirPath.c_str()); 49 Printf("DataFlowTrace: parse error: %s\n File: %s\n Line: %s\n", Err, 53 // Printf("=== %s\n", Name.c_str()); 79 Printf("%s => |%s|\n", Name.c_str(), L.c_str() + SpacePos + 1); 85 Printf("INFO: DataFlowTrace: %zd trace files, %zd functions, "
|
FuzzerUtil.cpp | 31 Printf("0x%x,", (unsigned)Data[i]); 32 Printf("%s", PrintAfter); 41 Printf("\\\\"); 43 Printf("\\\""); 45 Printf("%c", Byte); 47 Printf("\\x%02x", Byte); 53 Printf("%s", PrintAfter); 130 Printf("ParseDictionaryFile: file does not exist or is empty\n"); 147 Printf("ParseDictionaryFile: error in line %d\n\t\t%s\n", LineNo, 198 Printf("%s", DescribePC(SymbolizedFMT, PC).c_str()) [all...] |
FuzzerMerge.cpp | 33 Printf("MERGE: failed to parse the control file (unexpected error)\n"); 162 // Printf("%s -> sz %zd ft %zd\n", Files[i].Name.c_str(), 210 Printf("MERGE-INNER: using the control file '%s'\n", CFPath.c_str()); 216 Printf("MERGE-INNER: '%s' caused a failure at the previous merge step\n", 219 Printf("MERGE-INNER: %zd total files;" 272 Printf("MERGE-OUTER: failed to write to the control file: %s\n", 285 Printf("Merge requires two or more corpus dirs\n"); 296 Printf("MERGE-OUTER: non-empty control file provided: '%s'\n", 301 Printf("MERGE-OUTER: control file ok, %zd files total," 305 Printf("MERGE-OUTER: '%s' will be skipped as unlucky [all...] |
FuzzerExtFunctionsWeak.cpp | 36 Printf("WARNING: Failed to find function \"%s\".\n", FnName);
|
/src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
asan_errors.cc | 48 Printf("%s", d.Error()); 53 Printf("%s", d.Default()); 64 Printf("%s", d.Error()); 69 Printf("%s object passed to delete has wrong type:\n", d.Default()); 71 Printf( 86 Printf( 105 Printf("%s", d.Error()); 110 Printf("%s", d.Default()); 126 Printf("%s", d.Error()); 130 Printf("%s", d.Default()) [all...] |
asan_stats.cc | 35 Printf("%s", prefix); 38 Printf("%zu:%zu; ", i, array[i]); 40 Printf("\n"); 44 Printf("Stats: %zuM malloced (%zuM for red zones) by %zu calls\n", 46 Printf("Stats: %zuM realloced by %zu calls\n", realloced>>20, reallocs); 47 Printf("Stats: %zuM freed by %zu calls\n", freed>>20, frees); 48 Printf("Stats: %zuM really freed by %zu calls\n", 50 Printf("Stats: %zuM (%zuM-%zuM) mmaped; %zu maps, %zu unmaps\n", 55 Printf("Stats: malloc large: %zu\n", malloc_large); 129 Printf("Stats: StackDepot: %zd ids; %zdM allocated\n" [all...] |
asan_rtl.cc | 308 Printf("AddressSanitizer exit stats:\n"); 313 Printf("asan_mapping.h:%zd -- %zd\n", i, AsanMappingProfile[i]); 331 Printf("|| `[%p, %p]` || HighMem ||\n", 333 Printf("|| `[%p, %p]` || HighShadow ||\n", 337 Printf("|| `[%p, %p]` || ShadowGap3 ||\n", 339 Printf("|| `[%p, %p]` || MidMem ||\n", 341 Printf("|| `[%p, %p]` || ShadowGap2 ||\n", 343 Printf("|| `[%p, %p]` || MidShadow ||\n", 346 Printf("|| `[%p, %p]` || ShadowGap ||\n", 349 Printf("|| `[%p, %p]` || LowShadow ||\n" [all...] |
asan_scariness_score.h | 52 Printf("SCARINESS: %d (%s)\n", score, descr);
|
asan_descriptions.cc | 56 Printf("%s", str.data()); 61 Printf("%s", str.data()); 154 Printf("%s", str.data()); 185 Printf( 267 Printf("%s", str.data()); 300 Printf("%s", str.data()); 323 Printf("Address %p is located in the %s area.\n", addr, ShadowNames[kind]); 332 Printf(" registered at:\n"); 360 Printf("%s", d.Location()); 361 Printf("Address %p is located in stack of thread %s", addr [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_flag_parser.cc | 38 Printf("WARNING: found %d unrecognized flag(s):\n", n_unknown_flags_); 40 Printf(" %s\n", unknown_flags_[i]); 60 Printf("Available flags for %s:\n", SanitizerToolName); 62 Printf("\t%s\n\t\t- %s\n", flags_[i].name, flags_[i].desc); 66 Printf("ERROR: %s\n", err); 140 Printf("Failed to read options from '%s': error %d\n", path, err);
|
sanitizer_openbsd.cc | 56 Printf("internal_sysctlbyname not implemented for OpenBSD"); 79 Printf("sysctl KERN_PROC_NARGV failed\n"); 83 Printf("sysctl KERN_PROC_NENV failed\n"); 87 Printf("sysctl KERN_PROC_ARGV failed\n"); 91 Printf("sysctl KERN_PROC_ENV failed\n");
|
sanitizer_common_libcdep.cc | 48 Printf("%s: RSS: %zdMb\n", SanitizerToolName, current_rss_mb); 56 Printf("%s: StackDepot: %zd ids; %zdM allocated\n", 87 Printf("\n\nHEAP PROFILE at RSS %zdMb\n", current_rss_mb);
|
sanitizer_flag_parser.h | 56 Printf("ERROR: Invalid value for bool option: '%s'\n", value); 72 Printf("ERROR: Invalid value for signal handler option: '%s'\n", value); 87 if (!ok) Printf("ERROR: Invalid value for int option: '%s'\n", value); 96 if (!ok) Printf("ERROR: Invalid value for uptr option: '%s'\n", value);
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
sanitizer_printf_test.cc | 22 TEST(Printf, Basic) { 38 TEST(Printf, OverflowStr) { 52 TEST(Printf, OverflowInt) { 65 TEST(Printf, OverflowUint) { 84 TEST(Printf, OverflowPtr) { 118 TEST(Printf, MinMax) { 130 TEST(Printf, Padding) { 143 TEST(Printf, Precision) {
|
/src/sys/arch/epoc32/stand/e32boot/exe/ |
e32boot.cpp | 142 console->Printf(_L("\n")); 143 console->Printf(_L(">> %s, Revision %s\n"), 154 console->Printf(_L(">> Model %s\n"), model->model); 157 console->Printf(_L(">> Memory %d k\n"), membytes / 1024); 160 console->Printf(_L(">> Video %d x %d\n"), video->width, video->height); 162 console->Printf(_L("\n")); 171 console->Printf(_L("\nLoaded\n")); 191 console->Printf(_L("Not Supported machine\n")); 197 console->Printf(_L("LoadLogicalDevice failed: %d\n"), err); 207 console->Printf(_L("DoCreate failed: %d\n"), err) [all...] |