| /src/contrib/llvm-project/compiler-rt/lib/scudo/standalone/ |
| H A D | report.cpp | 43 ScopedErrorReport Report; in reportCheckFailed() local 44 Report.append("CHECK failed @ %s:%d %s ((u64)op1=%llu, (u64)op2=%llu)\n", in reportCheckFailed() 50 ScopedErrorReport Report; in reportError() local 51 Report.append("%s\n", Message); in reportError() 62 ScopedErrorReport Report; in reportInvalidFlag() local 63 Report.append("invalid value for %s option: '%s'\n", FlagType, Value); in reportInvalidFlag() 69 ScopedErrorReport Report; in reportHeaderCorruption() local 70 Report.append("corrupted chunk header at address %p\n", Ptr); in reportHeaderCorruption() 76 ScopedErrorReport Report; in reportSanityCheckError() local 77 Report.append("maximum possible %s doesn't fit in header\n", Field); in reportSanityCheckError() [all …]
|
| /src/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/MPI-Checker/ |
| H A D | MPIBugReporter.cpp | 33 auto Report = std::make_unique<PathSensitiveBugReport>( in reportDoubleNonblocking() local 36 Report->addRange(MPICallEvent.getSourceRange()); in reportDoubleNonblocking() 40 Report->addRange(Range); in reportDoubleNonblocking() 42 Report->addVisitor(std::make_unique<RequestNodeVisitor>( in reportDoubleNonblocking() 44 Report->markInteresting(RequestRegion); in reportDoubleNonblocking() 46 BReporter.emitReport(std::move(Report)); in reportDoubleNonblocking() 56 auto Report = std::make_unique<PathSensitiveBugReport>(MissingWaitBugType, in reportMissingWait() local 61 Report->addRange(Range); in reportMissingWait() 62 Report->addVisitor(std::make_unique<RequestNodeVisitor>( in reportMissingWait() 64 Report->markInteresting(RequestRegion); in reportMissingWait() [all …]
|
| /src/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
| H A D | sanitizer_allocator_report.cpp | 47 Report("ERROR: %s: calloc parameters overflow: count * size (%zd * %zd) " in ReportCallocOverflow() 58 Report( in ReportReallocArrayOverflow() 69 Report("ERROR: %s: pvalloc parameters overflow: size 0x%zx rounded up to " in ReportPvallocOverflow() 80 Report("ERROR: %s: invalid allocation alignment: %zd, alignment must be a " in ReportInvalidAllocationAlignment() 91 Report("ERROR: %s: invalid alignment requested in " in ReportInvalidAlignedAllocAlignment() 96 Report("ERROR: %s: invalid alignment requested in aligned_alloc: %zd, " in ReportInvalidAlignedAllocAlignment() 109 Report( in ReportInvalidPosixMemalignAlignment() 122 Report("ERROR: %s: requested allocation size 0x%zx exceeds maximum " in ReportAllocationSizeTooBig() 139 Report("ERROR: %s: allocator exceeded the RSS limit\n", SanitizerToolName); in ReportRssLimitExceeded()
|
| H A D | sanitizer_symbolizer_report.cpp | 164 Report("WARNING: %s: writable-executable page usage\n", SanitizerToolName); in ReportMmapWriteExec() 187 Report("Hint: PC is at a non-executable region. Maybe a wild jump?\n"); in MaybeReportNonExecRegion() 212 Report("%s", str.data()); in MaybeDumpInstructionBytes() 226 Report("ERROR: %s: %s on address %p (pc %p bp %p sp %p T%d)\n", in ReportStackOverflowImpl() 245 Report("ERROR: %s: %s on unknown address (pc %p bp %p sp %p T%d)\n", in ReportDeadlySignalImpl() 249 Report("ERROR: %s: %s on unknown address %p (pc %p bp %p sp %p T%d)\n", in ReportDeadlySignalImpl() 254 Report("Hint: pc points to the zero page.\n"); in ReportDeadlySignalImpl() 260 Report("The signal is caused by a %s memory access.\n", access_type); in ReportDeadlySignalImpl() 262 Report("Hint: this fault was caused by a dereference of a high value " in ReportDeadlySignalImpl() 266 Report("Hint: address points to the zero page.\n"); in ReportDeadlySignalImpl() [all …]
|
| H A D | sanitizer_symbolizer_win.cpp | 95 Report("*** WARNING: Failed to initialize DbgHelp! ***\n"); in InitializeDbgHelpIfNeeded() 96 Report("*** Most likely this means that the app is already ***\n"); in InitializeDbgHelpIfNeeded() 97 Report("*** using DbgHelp, possibly with incompatible flags. ***\n"); in InitializeDbgHelpIfNeeded() 98 Report("*** Due to technical reasons, symbolization might crash ***\n"); in InitializeDbgHelpIfNeeded() 99 Report("*** or produce wrong results. ***\n"); in InitializeDbgHelpIfNeeded() 112 Report("*** WARNING: Failed to SymGetSearchPathW ***\n"); in InitializeDbgHelpIfNeeded() 122 Report("*** WARNING: Failed to getting the EXE directory ***\n"); in InitializeDbgHelpIfNeeded() 131 Report("*** WARNING: Failed to SymSetSearchPathW\n"); in InitializeDbgHelpIfNeeded()
|
| /src/contrib/llvm-project/compiler-rt/lib/asan/ |
| H A D | asan_errors.cpp | 49 Report("ERROR: AddressSanitizer: attempting %s on %p in thread %s:\n", in Print() 64 Report("ERROR: AddressSanitizer: %s on %p in thread %s:\n", in Print() 96 Report( in Print() 104 Report( in Print() 125 Report("ERROR: AddressSanitizer: %s (%s vs %s) on %p\n", in Print() 135 Report( in Print() 143 Report( in Print() 156 Report( in Print() 169 Report( in Print() 182 Report( in Print() [all …]
|
| H A D | asan_flags.cpp | 139 Report("%s: detect_leaks is not supported on this platform.\n", in InitializeFlags() 162 Report("%s: please use either 'quarantine_size' (deprecated) or " in InitializeFlags() 184 Report("%s: thread_local_quarantine_size_kb can be set to 0 only when " in InitializeFlags() 189 Report("WARNING: strlen interceptor is enabled even though replace_str=0. " in InitializeFlags() 193 Report("WARNING: strchr* interceptors are enabled even though " in InitializeFlags() 197 Report("WARNING: strndup* interceptors are enabled even though " in InitializeFlags()
|
| /src/contrib/llvm-project/compiler-rt/lib/xray/ |
| H A D | xray_utils.cpp | 61 Report("Failed to resize VMO: %s\n", _zx_status_get_string(Status)); in WriteAll() 69 Report("Failed to write: %s\n", _zx_status_get_string(Status)); in WriteAll() 88 Report("XRay: cannot create VMO: %s\n", _zx_status_get_string(Status)); in Open() 97 Report("XRay: cannot get basic info about current process handle: %s\n", in Open() 113 Report("XRay: cannot duplicate VMO handle: %s\n", in Open() 124 Report("XRay: " FORMAT_DUMPFILE "\n", ProfileSinkName, VmoName); in Open() 148 Report("Failed to write; errno = %d\n", errno); 177 Report("XRay log file name too long (%d): %s\n", NeededLength, TmpFilename); 182 Report("XRay: Failed opening temporary file '%s'; not logging events.\n", 187 Report("XRay: Log file in '%s'\n", TmpFilename);
|
| H A D | xray_fdr_logging.cpp | 194 Report( in fdrIterator() 280 Report("Not flushing log, implementation is not finalized.\n"); in fdrLoggingFlush() 288 Report("Not flushing log, implementation is still flushing.\n"); in fdrLoggingFlush() 294 Report("Cannot flush when global buffer queue is null.\n"); in fdrLoggingFlush() 321 Report("XRay FDR: Not flushing to file, 'no_file_flush=true'.\n"); in fdrLoggingFlush() 389 Report("Cannot finalize log, implementation not initialized.\n"); in fdrLoggingFinalize() 397 Report("Attempting to finalize an uninitialized global buffer!\n"); in fdrLoggingFinalize() 431 Report("clock_gettime(2) return %d, errno=%d", result, int(errno)); in getTimestamp() 567 Report("Custom event size too large; truncating to %d.\n", in fdrLoggingHandleCustomEvent() 597 Report("Typed event size too large; truncating to %d.\n", in fdrLoggingHandleTypedEvent() [all …]
|
| H A D | xray_profiling.cpp | 208 Report("Not flushing profiles, profiling not been finalized.\n"); in profilingFlush() 215 Report("Cannot finalize properly inside a signal handler!\n"); in profilingFlush() 227 Report("Not flushing profiles, implementation still flushing.\n"); in profilingFlush() 239 Report("profiling: No data to flush.\n"); in profilingFlush() 244 Report("profiling: Failed to flush to file, dropping data.\n"); in profilingFlush() 318 Report("Cannot finalize profile, the profiling is not initialized.\n"); in profilingFinalize() 360 Report("Cannot initialize already initialised profiling " in profilingLoggingInit() 395 Report("Failed to initialize preallocated memory buffers!"); in profilingLoggingInit() 411 Report("Failed to initialize preallocated memory buffers; error: %s", in profilingLoggingInit() 466 Report("XRay Profile flushed at exit."); in profilingLoggingInit() [all …]
|
| H A D | xray_x86_64.cpp | 37 Report("Read error; errno = %d\n", errno); in retryingReadSome() 81 Report("Unable to determine CPU frequency for TSC accounting.\n"); in getTSCFrequency() 99 Report("Unable to determine CPU frequency for TSC accounting.\n"); 151 Report("XRay Entry trampoline (%p) too far from sled (%p)\n", in patchFunctionEntry() 198 Report("XRay Exit trampoline (%p) too far from sled (%p)\n", in patchFunctionExit() 228 Report("XRay Tail Exit trampoline (%p) too far from sled (%p)\n", in patchFunctionTailExit() 321 Report("Missing rdtscp support.\n"); in probeRequiredCPUFeatures() 327 Report("Unable to determine CPU frequency.\n"); in probeRequiredCPUFeatures()
|
| H A D | xray_basic_logging.cpp | 129 Report("Not initializing TLD since ThreadBufferSize == 0.\n"); in getThreadLocalData() 141 Report("Not initializing the ShadowStack since MaxStackDepth == 0.\n"); in getThreadLocalData() 311 Report("clock_gettimg(2) return %d, errno=%d.", result, int(errno)); in basicLoggingHandleArg0EmulateTSC() 331 Report("clock_gettimg(2) return %d, errno=%d.", result, int(errno)); in basicLoggingHandleArg1EmulateTSC() 348 Report("Cleaned up log for TID: %llu\n", GetTid()); in TLDDestructor() 353 Report("Skipping buffer for TID: %llu; Offset = %zu\n", GetTid(), in TLDDestructor() 379 Report("Basic logging already initialized.\n"); in basicLoggingInit() 393 Report("WARNING: Required CPU features missing for XRay instrumentation, " in basicLoggingInit() 447 Report("Basic logging already finalized.\n"); in basicLoggingFinalize() 475 Report("Cannot register XRay Basic Mode to 'xray-basic'; error = %d\n", in basicLogDynamicInitializer() [all …]
|
| H A D | xray_allocator.h | 46 Report("XRay Profiling: Failed to create VMO of size %zu: %s\n", in allocate() 57 Report("XRay Profiling: Failed to map VMAR of size %zu: %s\n", sizeof(T), in allocate() 68 Report("XRay Profiling: Failed to allocate memory of size %zu; Error = " in allocate() 97 Report("XRay Profiling: Failed to create VMO of size %zu: %s\n", S, in allocateBuffer() 107 Report("XRay Profiling: Failed to map VMAR of size %zu: %s\n", S, in allocateBuffer() 117 Report("XRay Profiling: Failed to allocate memory of size %zu; Error = " in allocateBuffer() 186 Report("XRay Profiling: Failed to allocate memory for allocator\n"); in Alloc() 200 Report("XRay Profiling: Cannot obtain enough memory from " in Alloc()
|
| /src/contrib/llvm-project/clang/lib/Basic/ |
| H A D | Warnings.cpp | 38 Diags.Report(diag::warn_unknown_diag_option) in EmitUnknownDiagWarning() 80 for (unsigned Report = 0, ReportEnd = 2; Report != ReportEnd; ++Report) { in ProcessWarningOptions() local 81 bool SetDiagnostic = (Report == 0); in ProcessWarningOptions() 137 if (Report) in ProcessWarningOptions() 138 Diags.Report(diag::warn_unknown_warning_specifier) in ProcessWarningOptions() 165 if (Report) in ProcessWarningOptions() 166 Diags.Report(diag::warn_unknown_warning_specifier) in ProcessWarningOptions() 188 if (Report) { in ProcessWarningOptions() 216 if (Report) { in ProcessWarningOptions()
|
| /src/contrib/llvm-project/llvm/lib/DebugInfo/DWARF/ |
| H A D | DWARFVerifier.cpp | 181 ErrorCategory.Report( in verifyUnitHeader() 188 ErrorCategory.Report( in verifyUnitHeader() 194 ErrorCategory.Report( in verifyUnitHeader() 200 ErrorCategory.Report( in verifyUnitHeader() 209 ErrorCategory.Report("Unit Header Length: Address size is unsupported", in verifyUnitHeader() 231 ErrorCategory.Report( in verifyName() 277 ErrorCategory.Report("Compilation unit missing DIE", [&]() { in verifyUnitContents() 285 ErrorCategory.Report("Compilation unit root DIE is not a unit DIE", [&]() { in verifyUnitContents() 294 ErrorCategory.Report("Mismatched unit type", [&]() { in verifyUnitContents() 306 ErrorCategory.Report("Skeleton CU has children", [&]() { in verifyUnitContents() [all …]
|
| /src/contrib/llvm-project/clang/lib/Basic/Targets/ |
| H A D | Mips.cpp | 242 Diags.Report(diag::err_target_unsupported_cpu_for_micromips) << CPU; in validateTarget() 248 Diags.Report(diag::err_target_unsupported_abi) << ABI << CPU; in validateTarget() 254 Diags.Report(diag::err_unsupported_abi_for_opt) << "-mfpxx" << "o32"; in validateTarget() 261 Diags.Report(diag::err_opt_not_valid_with_opt) << "-mfpxx" << CPU; in validateTarget() 267 Diags.Report(diag::err_opt_not_valid_with_opt) << "-mfp32" << CPU; in validateTarget() 273 Diags.Report(diag::err_mips_fp64_req) << "-mfp64"; in validateTarget() 278 Diags.Report(diag::err_opt_not_valid_with_opt) << "-mfpxx" << CPU; in validateTarget() 283 Diags.Report(diag::err_opt_not_valid_with_opt) << "-msoft-float" in validateTarget() 290 Diags.Report(diag::err_mips_fp64_req) << "-mmsa"; in validateTarget() 295 Diags.Report(diag::err_opt_not_valid_with_opt) << "-mfpxx" in validateTarget() [all …]
|
| /src/contrib/llvm-project/clang/lib/InstallAPI/ |
| H A D | DylibVerifier.cpp | 249 Ctx.Diag->Report(SymCtx.FA->Loc, PrintAsWarning in compareObjCInterfaceSymbols() 256 Ctx.Diag->Report(SymCtx.FA->Loc, PrintAsWarning in compareObjCInterfaceSymbols() 305 Ctx.Diag->Report(SymCtx.FA->Loc, diag::err_library_missing_symbol) in compareVisibility() 312 Ctx.Diag->Report(SymCtx.FA->Loc, diag::err_library_hidden_symbol) in compareVisibility() 342 Ctx.Diag->Report(SymCtx.FA->Loc, ID) << getAnnotatedName(R, SymCtx); in compareVisibility() 367 Ctx.Diag->Report(SymCtx.FA->Loc, diag::warn_header_availability_mismatch) in compareAvailability() 373 Ctx.Diag->Report(SymCtx.FA->Loc, diag::err_header_availability_mismatch) in compareAvailability() 389 Ctx.Diag->Report(SymCtx.FA->Loc, diag::err_dylib_symbol_flags_mismatch) in compareSymbolFlags() 396 Ctx.Diag->Report(SymCtx.FA->Loc, diag::err_header_symbol_flags_mismatch) in compareSymbolFlags() 404 Ctx.Diag->Report(SymCtx.FA->Loc, diag::err_dylib_symbol_flags_mismatch) in compareSymbolFlags() [all …]
|
| /src/contrib/llvm-project/clang/lib/StaticAnalyzer/Checkers/ |
| H A D | ReturnPointerRangeChecker.cpp | 86 auto Report = std::make_unique<PathSensitiveBugReport>(BT, Msg, N); in checkPreStmt() local 87 Report->addRange(RetE->getSourceRange()); in checkPreStmt() 95 Report->addNote("Original object declared here", in checkPreStmt() 115 Report->addNote(SBuf, in checkPreStmt() 119 bugreporter::trackExpressionValue(N, RetE, *Report); in checkPreStmt() 121 C.emitReport(std::move(Report)); in checkPreStmt()
|
| H A D | MacOSKeychainAPIChecker.cpp | 237 auto Report = std::make_unique<PathSensitiveBugReport>(BT, os.str(), N); in generateDeallocatorMismatchReport() local 238 Report->addVisitor(std::make_unique<SecKeychainBugVisitor>(AP.first)); in generateDeallocatorMismatchReport() 239 Report->addRange(ArgExpr->getSourceRange()); in generateDeallocatorMismatchReport() 240 markInteresting(Report.get(), AP); in generateDeallocatorMismatchReport() 241 C.emitReport(std::move(Report)); in generateDeallocatorMismatchReport() 280 auto Report = std::make_unique<PathSensitiveBugReport>(BT, os.str(), N); in checkPreStmt() local 281 Report->addVisitor(std::make_unique<SecKeychainBugVisitor>(V)); in checkPreStmt() 282 Report->addRange(ArgExpr->getSourceRange()); in checkPreStmt() 283 Report->markInteresting(AS->Region); in checkPreStmt() 284 C.emitReport(std::move(Report)); in checkPreStmt() [all …]
|
| H A D | PutenvStackArrayChecker.cpp | 60 auto Report = std::make_unique<PathSensitiveBugReport>(BT, ErrorMsg, N); in checkPostCall() local 63 bugreporter::trackExpressionValue(Report->getErrorNode(), ArgExpr, *Report); in checkPostCall() 65 C.emitReport(std::move(Report)); in checkPostCall()
|
| H A D | StackAddrEscapeChecker.cpp | 204 auto Report = std::make_unique<PathSensitiveBugReport>( in checkAsyncExecutedBlockCaptures() local 207 Report->addRange(Range); in checkAsyncExecutedBlockCaptures() 208 C.emitReport(std::move(Report)); in checkAsyncExecutedBlockCaptures() 228 auto Report = std::make_unique<PathSensitiveBugReport>(*BT_capturedstackret, in checkReturnedBlockCaptures() local 231 Report->addRange(Range); in checkReturnedBlockCaptures() 232 C.emitReport(std::move(Report)); in checkReturnedBlockCaptures() 385 auto Report = in checkEndFunction() local 388 Report->addRange(Range); in checkEndFunction() 389 Ctx.emitReport(std::move(Report)); in checkEndFunction() 415 auto Report = in checkEndFunction() local [all …]
|
| /src/contrib/llvm-project/clang/lib/Lex/ |
| H A D | ModuleMap.cpp | 137 Diags.Report(Id[0].second, diag::err_mmap_missing_module_unqualified) in resolveModuleId() 148 Diags.Report(Id[I].second, diag::err_mmap_missing_module_qualified) in resolveModuleId() 245 Diags.Report(Header.FileNameLoc, in findHeader() 304 Diags.Report(Header.FileNameLoc, diag::err_mmap_umbrella_clash) in resolveHeader() 546 Diags.Report(FilenameLoc, diag::warn_use_of_private_header_outside_module) in diagnoseHeaderInclusion() 553 Diags.Report(FilenameLoc, diag::err_undeclared_use_of_module_indirect) in diagnoseHeaderInclusion() 565 Diags.Report(FilenameLoc, diag::err_undeclared_use_of_module) in diagnoseHeaderInclusion() 573 Diags.Report(FilenameLoc, DiagID) << RequestingModule->getFullModuleName() in diagnoseHeaderInclusion() 1683 Diags.Report(LToken.getLocation(), diag::err_invalid_string_udl); in consumeToken() 1716 Diags.Report(Tok.getLocation(), diag::err_mmap_unknown_token); in consumeToken() [all …]
|
| /src/sys/kern/ |
| H A D | kern_ubsan.c | 252 static void Report(bool isFatal, const char *pFormat, ...) __printflike(2, 3); 365 …Report(isFatal, "UBSan: Undefined Behavior in %s, %s integer overflow: %s %s %s cannot be represen… in HandleOverflow() 383 …Report(isFatal, "UBSan: Undefined Behavior in %s, negation of %s cannot be represented in type %s\… in HandleNegateOverflow() 399 Report(isFatal, "UBSan: Undefined Behavior in %s, calling __builtin_unreachable()\n", in HandleBuiltinUnreachable() 417 Report(isFatal, "UBSan: Undefined Behavior in %s, %s null pointer of type %s\n", in HandleTypeMismatch() 420 …Report(isFatal, "UBSan: Undefined Behavior in %s, %s misaligned address %p for type %s which requi… in HandleTypeMismatch() 423 …Report(isFatal, "UBSan: Undefined Behavior in %s, %s address %p with insufficient space for an obj… in HandleTypeMismatch() 442 Report(isFatal, "UBSan: Undefined Behavior in %s, variable length array bound value %s <= 0\n", in HandleVlaBoundNotPositive() 460 Report(isFatal, "UBSan: Undefined Behavior in %s, index %s is out of range for type %s\n", in HandleOutOfBounds() 481 Report(isFatal, "UBSan: Undefined Behavior in %s, shift exponent %s is negative\n", in HandleShiftOutOfBounds() [all …]
|
| /src/contrib/llvm-project/clang/tools/driver/ |
| H A D | cc1gen_reproducer_main.cpp | 135 Driver::CompilationDiagnosticReport Report; in generateReproducerForInvocationArguments() local 137 *C, *Cmd, generateReproducerMetaInfo(Info), &Report); in generateReproducerForInvocationArguments() 138 return Report; in generateReproducerForInvocationArguments() 150 const driver::Driver::CompilationDiagnosticReport &Report) { in printReproducerInformation() argument 154 for (const auto &File : llvm::enumerate(Report.TemporaryFiles)) { in printReproducerInformation() 190 std::optional<driver::Driver::CompilationDiagnosticReport> Report = in cc1gen_reproducer_main() local 196 if (Report) { in cc1gen_reproducer_main() 197 printReproducerInformation(llvm::outs(), InvocationInfo, *Report); in cc1gen_reproducer_main()
|
| /src/contrib/llvm-project/clang/lib/Frontend/ |
| H A D | CompilerInvocation.cpp | 414 Diags.Report(diag::err_drv_invalid_value) in normalizeSimpleEnum() 462 Diags.Report(diag::err_drv_invalid_int_value) in normalizeStringIntegral() 599 Diags.Report(diag::err_fe_invalid_exception_model) in FixupInvocation() 603 Diags.Report(diag::warn_c_kext); in FixupInvocation() 608 Diags.Report(diag::err_fe_invalid_alignment) in FixupInvocation() 618 Diags.Report(diag::warn_drv_fraw_string_literals_in_cxx11) in FixupInvocation() 628 Diags.Report(diag::err_drv_argument_not_allowed_with) << "-fsycl-is-device" in FixupInvocation() 632 Diags.Report(diag::err_drv_argument_not_allowed_with) in FixupInvocation() 636 Diags.Report(diag::err_drv_argument_not_allowed_with) in FixupInvocation() 640 Diags.Report(diag::warn_ignored_hip_only_option) in FixupInvocation() [all …]
|