/src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
asan_suppressions.cc | 88 const char *function_name = cur->info.function; local in function:__asan::IsStackTraceSuppressed 89 if (!function_name) { 93 if (suppression_ctx->Match(function_name, kInterceptorViaFunction,
|
/src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
tsan_symbolize.cc | 63 static void AddFrame(void *ctx, const char *function_name, const char *file, 73 if (function_name) { 74 info->function = internal_strdup(function_name);
|
/src/tests/usr.bin/xlint/lint1/ |
lang_level_c99.c | 296 function_name(void) function in typeref:typename:const char *
|
/src/sys/external/bsd/compiler_rt/dist/lib/asan/scripts/ |
asan_symbolize.py | 113 function_name = self.pipe.stdout.readline().rstrip() 114 if not function_name: 118 if (not function_name.startswith('??') or 121 result.append('%s in %s %s' % (addr, function_name, 172 function_name = self.pipe.stdout.readline().rstrip() 176 elif function_name in ['', '??']: 177 assert file_name == function_name 179 lines.append((function_name, file_name)); 247 function_name = match.group(1) 248 function_name = re.sub('\(.*?\)', '', function_name [all...] |
/src/sys/external/bsd/compiler_rt/dist/lib/profile/ |
GCDAProfiling.c | 351 void llvm_gcda_emit_function(uint32_t ident, const char *function_name, 360 function_name ? function_name : "NULL"); 366 if (function_name) 367 len += 1 + length_of_string(function_name); 373 if (function_name) 374 write_string(function_name);
|
/src/sys/external/bsd/compiler_rt/dist/lib/interception/ |
interception_win.h | 42 const char *function_name, uptr new_function,
|
interception_win.cc | 909 // format: "<module> . <function_name>" that is stored into the 911 char function_name[256]; local in function:__interception::InternalGetProcAddress 913 if (funtion_name_length >= sizeof(function_name) - 1) 916 _memcpy(function_name, func, funtion_name_length); 917 function_name[funtion_name_length] = '\0'; 918 char* separator = _strchr(function_name, '.'); 923 void* redirected_module = GetModuleHandleA(function_name); 952 const char *function_name, uptr new_function, 994 if (strcmp(funcname, function_name) == 0)
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
sanitizer_win_dll_thunk.h | 57 static const char function_name[] = #name; \ 58 for (const char* ptr = &function_name[0]; *ptr; ++ptr) \ 72 static const char function_name[] = #name; \ 73 for (const char* ptr = &function_name[0]; *ptr; ++ptr) \
|
sanitizer_symbolizer_libcdep.cc | 208 // <function_name> 210 // <function_name> 292 // <function_name> 300 char *function_name = 0; local in function:__sanitizer::ParseSymbolizePCOutput 301 str = ExtractToken(str, "\n", &function_name); 302 CHECK(function_name); 303 if (function_name[0] == '\0') { 305 InternalFree(function_name); 321 info->function = function_name;
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/scripts/ |
cpplint.py | 685 def Begin(self, function_name): 689 function_name: The name of the function being tracked. 693 self.current_function = function_name 1974 function_name = match_result.group(1).split()[-1] 1975 if function_name == 'TEST' or function_name == 'TEST_F' or ( 1976 not Match(r'[A-Z_]+$', function_name)): 3358 function_name = re.search(r'\b((?:string)?printf)\s*\(', 3362 % (function_name, match.group(1)))
|
/src/usr.bin/xlint/lint1/ |
tree.c | 3030 const char *function_name; local in function:check_unconst_function 3033 is_direct_function_call(rn, &function_name) && 3034 is_unconst_function(function_name) && 3038 warning(346, function_name); 3042 is_direct_function_call(rn, &function_name) && 3043 strcmp(function_name, "bsearch") == 0 && 3047 warning(346, function_name);
|