|
reference, declaration → definition
definition → references, declarations, derived classes, virtual overrides
reference to multiple definitions → definitions
unreferenced
|
Declarations
projects/compiler-rt/lib/sanitizer_common/sanitizer_common.h 191 void Report(const char *format, ...);
References
projects/compiler-rt/lib/asan/asan_activation.cpp 80 Report(
98 VReport(1, "Deactivating ASan\n");
126 VReport(1, "Activating ASan\n");
138 Report("Activated with flags:\n");
projects/compiler-rt/lib/asan/asan_allocator.cpp 440 Report("WARNING: AddressSanitizer failed to allocate 0x%zx bytes\n",
projects/compiler-rt/lib/asan/asan_errors.cpp 49 Report(
65 Report(
98 Report(
106 Report(
127 Report("ERROR: AddressSanitizer: %s (%s vs %s) on %p\n",
137 Report(
145 Report(
158 Report(
171 Report(
184 Report(
197 Report(
211 Report(
225 Report("ERROR: AddressSanitizer: invalid alignment requested in "
244 Report(
258 Report(
272 Report(
284 Report(
298 Report(
315 Report("ERROR: AddressSanitizer: %s: (size=%zd)\n",
325 Report(
335 Report("ERROR: beg is not aligned by %d\n", granularity);
343 Report("ERROR: AddressSanitizer: %s (%p):\n", scariness.GetDescription(),
360 Report(
372 Report("ERROR: AddressSanitizer: %s: %p %p\n", scariness.GetDescription(),
577 Report("ERROR: AddressSanitizer: %s on address %p at pc %p bp %p sp %p\n",
projects/compiler-rt/lib/asan/asan_fake_stack.cpp 57 VReport(1, "T%d: FakeStack created: %p -- %p stack_size_log: %zd; "
72 Report("T%d: FakeStack destroyed: %s\n", tid, str.data());
projects/compiler-rt/lib/asan/asan_flags.cpp 143 Report("%s: detect_leaks is not supported on this platform.\n",
170 Report("%s: please use either 'quarantine_size' (deprecated) or "
192 Report("%s: thread_local_quarantine_size_kb can be set to 0 only when "
197 Report("WARNING: strlen interceptor is enabled even though replace_str=0. "
201 Report("WARNING: strchr* interceptors are enabled even though "
205 Report("WARNING: strndup* interceptors are enabled even though "
projects/compiler-rt/lib/asan/asan_globals.cpp 85 Report(
91 Report(" location (%p): name=%s[%p], %d %d\n", g.location,
204 Report("The following global variable is not properly aligned.\n");
205 Report("This may happen if another global with the same name\n");
206 Report("resides in another non-instrumented module.\n");
207 Report("Or the global comes from a C file built w/o -fno-common.\n");
208 Report("In either case this is likely an ODR violation bug,\n");
209 Report("but AddressSanitizer can not provide more details.\n");
projects/compiler-rt/lib/asan/asan_interceptors.cpp 273 Report("WARNING: ASan doesn't fully support makecontext/swapcontext "
636 ASAN_INTERCEPT_FUNC(strcat);
637 ASAN_INTERCEPT_FUNC(strcpy);
638 ASAN_INTERCEPT_FUNC(strncat);
639 ASAN_INTERCEPT_FUNC(strncpy);
640 ASAN_INTERCEPT_FUNC(strdup);
642 ASAN_INTERCEPT_FUNC(__strdup);
645 ASAN_INTERCEPT_FUNC(index);
648 ASAN_INTERCEPT_FUNC(atoi);
649 ASAN_INTERCEPT_FUNC(atol);
650 ASAN_INTERCEPT_FUNC(strtol);
652 ASAN_INTERCEPT_FUNC(atoll);
653 ASAN_INTERCEPT_FUNC(strtoll);
657 ASAN_INTERCEPT_FUNC(longjmp);
660 ASAN_INTERCEPT_FUNC(swapcontext);
663 ASAN_INTERCEPT_FUNC(_longjmp);
666 ASAN_INTERCEPT_FUNC(__longjmp_chk);
669 ASAN_INTERCEPT_FUNC(siglongjmp);
674 ASAN_INTERCEPT_FUNC(__cxa_throw);
677 ASAN_INTERCEPT_FUNC(__cxa_rethrow_primary_exception);
693 ASAN_INTERCEPT_FUNC(pthread_create);
695 ASAN_INTERCEPT_FUNC(pthread_join);
700 ASAN_INTERCEPT_FUNC(__cxa_atexit);
712 ASAN_INTERCEPT_FUNC(vfork);
717 VReport(1, "AddressSanitizer: libc interceptors initialized\n");
projects/compiler-rt/lib/asan/asan_linux.cpp 95 Report(
148 VReport(2, "info->dlpi_name = %s\tinfo->dlpi_addr = %p\n",
184 Report("Your application is linked against incompatible ASan runtimes.\n");
196 Report("ASan runtime does not come first in initial library list; "
221 Report("Your application is linked against "
projects/compiler-rt/lib/asan/asan_poisoning.cpp 286 Report("AddressSanitizer: loaded array cookie from free-d memory; "
345 VReport(1, "poisoning: %p %zx\n", (void *)addr, size);
350 VReport(1, "unpoisoning: %p %zx\n", (void *)addr, size);
projects/compiler-rt/lib/asan/asan_report.cpp 185 Report("ABORTING\n");
projects/compiler-rt/lib/asan/asan_rtl.cpp 50 Report("Sleeping for %d second(s)\n", flags()->sleep_before_dying);
66 Report("AddressSanitizer CHECK failed: %s:%d \"%s\" (0x%zx, 0x%zx)\n", file,
414 VReport(1, "AddressSanitizer init is being performed for dlopen().\n");
526 VReport(1, "AddressSanitizer Init done\n");
529 Report("Sleeping for %d second(s)\n", flags()->sleep_after_init);
587 Report("WARNING: ASan is ignoring requested __asan_handle_no_return: "
projects/compiler-rt/lib/asan/asan_shadow_setup.cpp 34 Report(
75 Report(
84 Report("This might be related to ELF_ET_DYN_BASE change in Linux 4.12.\n");
85 Report(
150 Report(
153 Report("ASan shadow was supposed to be located in the [%p-%p] range.\n",
projects/compiler-rt/lib/asan/asan_thread.cpp 94 VReport(1, "T%d TSDDtor\n", context->tid);
101 VReport(1, "T%d exited\n", tid);
120 Report("ERROR: starting fiber switch while in fiber switch\n");
142 Report("ERROR: finishing a fiber switch that has not started\n");
235 VReport(1, "T%d: stack [%p,%p) size 0x%zx; local=%p\n", tid(),
429 VReport(2, "SetCurrentThread: %p for thread %p\n", t->context(),
517 VReport(1, "__asan_start_switch_fiber called from unknown thread\n");
529 VReport(1, "__asan_finish_switch_fiber called from unknown thread\n");
projects/compiler-rt/lib/cfi/cfi.cpp 146 VReport(1, "CFI: shadow at %zx .. %zx\n", shadow_, shadow_ + GetShadowSize());
233 VReport(1, "Can not handle: symtab > strtab (%p > %zx)\n", symtab, strtab);
253 VReport(1, "Can not handle: symtab %p, strtab %zx\n", symtab, strtab);
277 VReport(1, "Module '%s' __cfi_check %zx\n", info->dlpi_name, cfi_check);
292 VReport(1, " %zx .. %zx\n", cur_beg, cur_end);
317 VReport(1, "CFI: VMA size %zx, shadow size %zx\n", vma, GetShadowSize());
344 VReport(3, "__cfi_slowpath: %llx, %p\n", CallSiteTypeId, Ptr);
347 VReport(1, "CFI: invalid memory region for a check target: %p\n", Ptr);
358 VReport(2, "CFI: unchecked call (shadow=FFFF): %p\n", Ptr);
362 VReport(2, "__cfi_check at %p\n", cfi_check);
projects/compiler-rt/lib/dfsan/dfsan.cpp 156 Report("FATAL: DataFlowSanitizer: out of labels\n");
224 Report("WARNING: DataFlowSanitizer: call to uninstrumented function %s\n",
233 Report("WARNING: DataFlowSanitizer: saw nonzero label\n");
240 Report("FATAL: DataFlowSanitizer: unsupported indirect call to vararg "
412 Report("WARNING: DataFlowSanitizer: unable to open output file %s\n",
417 Report("INFO: DataFlowSanitizer: dumping labels to %s\n",
projects/compiler-rt/lib/hwasan/hwasan.cpp 146 Report("HWAddressSanitizer CHECK failed: %s:%d \"%s\" (0x%zx, 0x%zx)\n", file,
260 Report("FATAL: HWAddressSanitizer: library size exceeds 2^32\n");
264 Report("FATAL: HWAddressSanitizer: library loaded above address 2^48\n");
557 Report(
574 Report(
projects/compiler-rt/lib/hwasan/hwasan_allocator.cpp 106 Report("WARNING: HWAddressSanitizer failed to allocate 0x%zx bytes\n",
projects/compiler-rt/lib/hwasan/hwasan_dynamic_shadow.cpp 35 Report("ERROR: %s failed to unmap 0x%zx (%zd) bytes at address %p\n",
projects/compiler-rt/lib/hwasan/hwasan_linux.cpp 66 Report(
94 Report(
projects/compiler-rt/lib/hwasan/hwasan_report.cpp 423 Report("ERROR: %s: %s on address %p at pc %p\n", SanitizerToolName, bug_type,
446 Report("ERROR: %s: %s; heap object [%p,%p) of size %zd\n", SanitizerToolName,
509 Report("ERROR: %s: %s on address %p at pc %p\n", SanitizerToolName, bug_type,
projects/compiler-rt/lib/lsan/lsan_allocator.cpp 72 Report("WARNING: LeakSanitizer failed to allocate 0x%zx bytes\n", size);
projects/compiler-rt/lib/lsan/lsan_common.cpp 39 Report("Unmatched call to __lsan_enable().\n");
161 LOG_POINTERS("Scanning %s range %p-%p.\n", region_type, begin, end);
177 LOG_POINTERS(
185 LOG_POINTERS("%p: found %p pointing into chunk %p-%p of size %zu.\n", pp, p,
223 LOG_THREADS("Processing thread %d.\n", os_id);
232 LOG_THREADS("Thread %d not found in registry.\n", os_id);
239 Report("Unable to get registers from thread %d.\n", os_id);
251 LOG_THREADS("Stack at %p-%p (SP = %p).\n", stack_begin, stack_end, sp);
256 LOG_THREADS("WARNING: stack pointer not in stack range.\n");
264 LOG_THREADS("Skipped %d guard page(s) to obtain stack %p-%p.\n",
277 LOG_THREADS("TLS at %p-%p.\n", tls_begin, tls_end);
297 LOG_THREADS("DTLS %zu at %p-%p.\n", j, dtls_beg, dtls_end);
305 LOG_THREADS("Thread %d has DTLS under destruction.\n", os_id);
316 LOG_POINTERS("Root region %p-%p intersects with mapped region %p-%p (%s)\n",
372 LOG_POINTERS("Ignored: chunk %p-%p of size %zu.\n",
462 LOG_POINTERS("Processing platform-specific allocations.\n");
468 LOG_POINTERS("Scanning leaked chunks.\n");
536 Report("Running thread %d was not suspended. False leaks are possible.\n",
576 Report("LeakSanitizer has encountered a fatal error.\n");
577 Report(
580 Report(
592 Report("ERROR: LeakSanitizer: detected memory leaks\n");
806 VReport(1, "__lsan_ignore_object(): no heap object found at %p", p);
808 VReport(1, "__lsan_ignore_object(): "
811 VReport(1, "__lsan_ignore_object(): ignoring heap object at %p\n", p);
822 VReport(1, "Registered root region at %p of size %llu\n", begin, size);
839 VReport(1, "Unregistered root region at %p of size %llu\n", begin, size);
844 Report(
projects/compiler-rt/lib/lsan/lsan_common_linux.cpp 64 VReport(1, "LeakSanitizer: Multiple modules match \"%s\". "
73 VReport(1, "LeakSanitizer: Dynamic linker not found. TLS and other "
projects/compiler-rt/lib/lsan/lsan_interceptors.cpp 317 Report("LeakSanitizer: failed to set thread key.\n");
412 Report("LeakSanitizer: failed to set thread key.\n");
514 Report("LeakSanitizer: failed to create thread key.\n");
projects/compiler-rt/lib/msan/msan.cpp 391 Report("MemorySanitizer CHECK failed: %s:%d \"%s\" (0x%zx, 0x%zx)\n", file,
projects/compiler-rt/lib/msan/msan_allocator.cpp 137 Report("WARNING: MemorySanitizer failed to allocate 0x%zx bytes\n", size);
projects/compiler-rt/lib/msan/msan_report.cpp 105 Report("WARNING: MemorySanitizer: use-of-uninitialized-value\n");
projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cpp 144 Report("FATAL: %s: internal allocator is out of memory trying to allocate "
176 Report(
187 Report("FATAL: %s: calloc parameters overflow: count * size (%zd * %zd) "
263 Report("HINT: if you don't care about these errors you may set "
projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator_combined.h 49 Report("WARNING: %s: CombinedAllocator allocation overflow: "
projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator_local_cache.h 256 Report("FATAL: Internal error: %s's allocator failed to allocate a "
projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator_primary64.h 123 Report("FATAL: Internal error: %s's allocator exhausted the free list "
projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator_report.cpp 47 Report("ERROR: %s: calloc parameters overflow: count * size (%zd * %zd) "
58 Report(
69 Report("ERROR: %s: pvalloc parameters overflow: size 0x%zx rounded up to "
80 Report("ERROR: %s: invalid allocation alignment: %zd, alignment must be a "
91 Report("ERROR: %s: invalid alignment requested in "
109 Report(
122 Report("ERROR: %s: requested allocation size 0x%zx exceeds maximum "
131 Report("ERROR: %s: allocator is out of memory trying to allocate 0x%zx "
projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator_secondary.h 92 Report("WARNING: %s: LargeMmapAllocator allocation overflow: "
projects/compiler-rt/lib/sanitizer_common/sanitizer_common.cpp 48 Report("ERROR: %s failed to "
projects/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors.inc 9632 INIT_MMAP;
9633 INIT_MMAP64;
9634 INIT_TEXTDOMAIN;
9635 INIT_STRLEN;
9636 INIT_STRNLEN;
9637 INIT_STRNDUP;
9638 INIT___STRNDUP;
9639 INIT_STRCMP;
9640 INIT_STRNCMP;
9641 INIT_STRCASECMP;
9642 INIT_STRNCASECMP;
9643 INIT_STRSTR;
9644 INIT_STRCASESTR;
9645 INIT_STRCHR;
9646 INIT_STRCHRNUL;
9647 INIT_STRRCHR;
9648 INIT_STRSPN;
9649 INIT_STRTOK;
9650 INIT_STRPBRK;
9651 INIT_STRXFRM;
9652 INIT___STRXFRM_L;
9653 INIT_MEMSET;
9654 INIT_MEMMOVE;
9656 INIT_MEMCHR;
9657 INIT_MEMCMP;
9658 INIT_BCMP;
9659 INIT_MEMRCHR;
9660 INIT_MEMMEM;
9661 INIT_READ;
9662 INIT_FREAD;
9663 INIT_PREAD;
9664 INIT_PREAD64;
9665 INIT_READV;
9666 INIT_PREADV;
9667 INIT_PREADV64;
9668 INIT_WRITE;
9669 INIT_FWRITE;
9670 INIT_PWRITE;
9671 INIT_PWRITE64;
9672 INIT_WRITEV;
9673 INIT_PWRITEV;
9674 INIT_PWRITEV64;
9675 INIT_FGETS;
9676 INIT_FPUTS;
9677 INIT_PUTS;
9678 INIT_PRCTL;
9679 INIT_LOCALTIME_AND_FRIENDS;
9680 INIT_STRPTIME;
9681 INIT_SCANF;
9682 INIT_ISOC99_SCANF;
9683 INIT_PRINTF;
9685 INIT_ISOC99_PRINTF;
9686 INIT_FREXP;
9687 INIT_FREXPF_FREXPL;
9688 INIT_GETPWNAM_AND_FRIENDS;
9689 INIT_GETPWNAM_R_AND_FRIENDS;
9690 INIT_GETPWENT;
9691 INIT_FGETPWENT;
9692 INIT_GETPWENT_R;
9693 INIT_FGETPWENT_R;
9694 INIT_FGETGRENT_R;
9695 INIT_SETPWENT;
9696 INIT_CLOCK_GETTIME;
9697 INIT_GETITIMER;
9698 INIT_TIME;
9699 INIT_GLOB;
9700 INIT_GLOB64;
9701 INIT_WAIT;
9702 INIT_WAIT4;
9703 INIT_INET;
9704 INIT_PTHREAD_GETSCHEDPARAM;
9705 INIT_GETADDRINFO;
9706 INIT_GETNAMEINFO;
9707 INIT_GETSOCKNAME;
9708 INIT_GETHOSTBYNAME;
9709 INIT_GETHOSTBYNAME2;
9710 INIT_GETHOSTBYNAME_R;
9711 INIT_GETHOSTBYNAME2_R;
9712 INIT_GETHOSTBYADDR_R;
9713 INIT_GETHOSTENT_R;
9714 INIT_GETSOCKOPT;
9715 INIT_ACCEPT;
9716 INIT_ACCEPT4;
9718 INIT_MODF;
9719 INIT_RECVMSG;
9720 INIT_SENDMSG;
9721 INIT_RECVMMSG;
9722 INIT_SENDMMSG;
9723 INIT_GETPEERNAME;
9724 INIT_IOCTL;
9725 INIT_INET_ATON;
9726 INIT_SYSINFO;
9727 INIT_READDIR;
9728 INIT_READDIR64;
9729 INIT_PTRACE;
9730 INIT_SETLOCALE;
9731 INIT_GETCWD;
9732 INIT_GET_CURRENT_DIR_NAME;
9733 INIT_STRTOIMAX;
9734 INIT_MBSTOWCS;
9735 INIT_MBSNRTOWCS;
9736 INIT_WCSTOMBS;
9737 INIT_WCSNRTOMBS;
9738 INIT_WCRTOMB;
9739 INIT_WCTOMB;
9740 INIT_TCGETATTR;
9741 INIT_REALPATH;
9742 INIT_CANONICALIZE_FILE_NAME;
9743 INIT_CONFSTR;
9744 INIT_SCHED_GETAFFINITY;
9745 INIT_SCHED_GETPARAM;
9746 INIT_STRERROR;
9747 INIT_STRERROR_R;
9748 INIT_XPG_STRERROR_R;
9749 INIT_SCANDIR;
9750 INIT_SCANDIR64;
9751 INIT_GETGROUPS;
9752 INIT_POLL;
9753 INIT_PPOLL;
9754 INIT_WORDEXP;
9755 INIT_SIGWAIT;
9756 INIT_SIGWAITINFO;
9757 INIT_SIGTIMEDWAIT;
9758 INIT_SIGSETOPS;
9759 INIT_SIGPENDING;
9760 INIT_SIGPROCMASK;
9761 INIT_PTHREAD_SIGMASK;
9762 INIT_BACKTRACE;
9763 INIT__EXIT;
9764 INIT_PTHREAD_MUTEX_LOCK;
9765 INIT_PTHREAD_MUTEX_UNLOCK;
9766 INIT___PTHREAD_MUTEX_LOCK;
9767 INIT___PTHREAD_MUTEX_UNLOCK;
9771 INIT_GETMNTENT;
9772 INIT_GETMNTENT_R;
9773 INIT_STATFS;
9774 INIT_STATFS64;
9775 INIT_STATVFS;
9776 INIT_STATVFS64;
9777 INIT_INITGROUPS;
9778 INIT_ETHER_NTOA_ATON;
9779 INIT_ETHER_HOST;
9780 INIT_ETHER_R;
9781 INIT_SHMCTL;
9782 INIT_RANDOM_R;
9783 INIT_PTHREAD_ATTR_GET;
9784 INIT_PTHREAD_ATTR_GET_SCHED;
9785 INIT_PTHREAD_ATTR_GETINHERITSCHED;
9786 INIT_PTHREAD_ATTR_GETAFFINITY_NP;
9787 INIT_PTHREAD_MUTEXATTR_GETPSHARED;
9788 INIT_PTHREAD_MUTEXATTR_GETTYPE;
9789 INIT_PTHREAD_MUTEXATTR_GETPROTOCOL;
9790 INIT_PTHREAD_MUTEXATTR_GETPRIOCEILING;
9791 INIT_PTHREAD_MUTEXATTR_GETROBUST;
9792 INIT_PTHREAD_MUTEXATTR_GETROBUST_NP;
9793 INIT_PTHREAD_RWLOCKATTR_GETPSHARED;
9794 INIT_PTHREAD_RWLOCKATTR_GETKIND_NP;
9795 INIT_PTHREAD_CONDATTR_GETPSHARED;
9796 INIT_PTHREAD_CONDATTR_GETCLOCK;
9797 INIT_PTHREAD_BARRIERATTR_GETPSHARED;
9798 INIT_TMPNAM;
9799 INIT_TMPNAM_R;
9800 INIT_TTYNAME;
9801 INIT_TTYNAME_R;
9802 INIT_TEMPNAM;
9803 INIT_PTHREAD_SETNAME_NP;
9804 INIT_PTHREAD_GETNAME_NP;
9805 INIT_SINCOS;
9806 INIT_REMQUO;
9807 INIT_REMQUOL;
9808 INIT_LGAMMA;
9809 INIT_LGAMMAL;
9810 INIT_LGAMMA_R;
9811 INIT_LGAMMAL_R;
9812 INIT_DRAND48_R;
9813 INIT_RAND_R;
9814 INIT_GETLINE;
9815 INIT_ICONV;
9816 INIT_TIMES;
9817 INIT_TLS_GET_ADDR;
9818 INIT_LISTXATTR;
9819 INIT_GETXATTR;
9820 INIT_GETRESID;
9821 INIT_GETIFADDRS;
9822 INIT_IF_INDEXTONAME;
9823 INIT_CAPGET;
9825 INIT___BZERO;
9826 INIT_BZERO;
9827 INIT_FTIME;
9828 INIT_XDR;
9829 INIT_TSEARCH;
9830 INIT_LIBIO_INTERNALS;
9831 INIT_FOPEN;
9832 INIT_FOPEN64;
9833 INIT_OPEN_MEMSTREAM;
9834 INIT_OBSTACK;
9835 INIT_FFLUSH;
9836 INIT_FCLOSE;
9837 INIT_DLOPEN_DLCLOSE;
9838 INIT_GETPASS;
9839 INIT_TIMERFD;
9840 INIT_MLOCKX;
9841 INIT_FOPENCOOKIE;
9842 INIT_SEM;
9843 INIT_PTHREAD_SETCANCEL;
9844 INIT_MINCORE;
9845 INIT_PROCESS_VM_READV;
9846 INIT_CTERMID;
9848 INIT_RECV_RECVFROM;
9849 INIT_SEND_SENDTO;
9851 INIT_EVENTFD_READ_WRITE;
9853 INIT___XSTAT;
9854 INIT___XSTAT64;
9855 INIT___LXSTAT;
9856 INIT___LXSTAT64;
9858 INIT_UTMP;
9859 INIT_UTMPX;
9860 INIT_GETLOADAVG;
9861 INIT_WCSLEN;
9862 INIT_WCSCAT;
9863 INIT_WCSDUP;
9864 INIT_WCSXFRM;
9865 INIT___WCSXFRM_L;
9875 INIT_READLINK;
9876 INIT_READLINKAT;
9877 INIT_NAME_TO_HANDLE_AT;
9878 INIT_OPEN_BY_HANDLE_AT;
9889 INIT_SETVBUF;
9891 INIT_REGEX;
9915 INIT_POPEN;
9917 INIT_PCLOSE;
9921 INIT_GETUSERSHELL;
9923 INIT_GETRANDOM;
9924 INIT_CRYPT;
9925 INIT_CRYPT_R;
9928 INIT___PRINTF_CHK;
projects/compiler-rt/lib/sanitizer_common/sanitizer_common_interceptors_format.inc 327 Report("%s: WARNING: unexpected format specifier in scanf interceptor: ",
511 SKIP_SCALAR_ARG(&aq, 'd', sizeof(int));
515 SKIP_SCALAR_ARG(&aq, 'd', sizeof(int));
524 Report(
557 SKIP_SCALAR_ARG(&aq, dir.convSpecifier, size);
projects/compiler-rt/lib/sanitizer_common/sanitizer_common_libcdep.cpp 65 Report("%s: hard rss limit exhausted (%zdMb vs %zdMb)\n",
73 Report("%s: soft rss limit exhausted (%zdMb vs %zdMb)\n",
projects/compiler-rt/lib/sanitizer_common/sanitizer_coverage_libcdep_new.cpp 34 Report("SanitizerCoverage: failed to open %s for writing (reason: %d)\n",
projects/compiler-rt/lib/sanitizer_common/sanitizer_file.cpp 76 Report("ERROR: Path is too long: %c%c%c%c%c%c%c%c...\n",
projects/compiler-rt/lib/sanitizer_common/sanitizer_libignore.cpp 27 Report("%s: too many ignored libraries (max: %d)\n", SanitizerToolName,
67 Report("%s: called_from_lib suppression '%s' is matched against"
75 VReport(1,
91 Report("%s: library '%s' that was matched against called_from_lib"
108 VReport(1, "Adding instrumented range %p-%p from library '%s'\n",
projects/compiler-rt/lib/sanitizer_common/sanitizer_linux.cpp 905 Report("Can't open /proc/%d/task for reading.\n", pid);
926 Report("Can't read directory entries from /proc/%d/task.\n", pid_);
1112 Report("WARNING: reading executable name failed with errno %d, "
2091 Report(
projects/compiler-rt/lib/sanitizer_common/sanitizer_posix.cpp 59 Report("ERROR: %s failed to deallocate 0x%zx (%zd) bytes at address %p\n",
247 Report("Process memory map follows:\n");
252 Report("End of process memory map.\n");
projects/compiler-rt/lib/sanitizer_common/sanitizer_posix_libcdep.cpp 99 Report("ERROR: %s getrlimit() failed %d\n", SanitizerToolName, errno);
104 Report("ERROR: %s setrlimit() failed %d\n", SanitizerToolName, errno);
211 VReport(1, "Installed the sigaction for signal %d\n", signum);
316 Report("ERROR: %s failed to "
447 Report("WARNING: failed to fork (errno %d)\n", rverrno);
484 VReport(1, "Waiting on the process failed (errno %d).\n", local_errno);
495 VReport(1, "Waiting on the process failed (errno %d).\n", local_errno);
projects/compiler-rt/lib/sanitizer_common/sanitizer_signal_interceptors.inc 84 INIT_SIGNAL;
85 INIT_SIGACTION;
projects/compiler-rt/lib/sanitizer_common/sanitizer_stacktrace_printer.cpp 196 Report("Unsupported specifier in stack frame format: %c (0x%zx)!\n", *p,
225 Report("Unsupported specifier in stack frame format: %c (0x%zx)!\n", *p,
projects/compiler-rt/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cpp 148 VReport(1, "Could not attach to thread %zu (errno %d).\n", (uptr)tid,
152 VReport(2, "Attached to thread %zu.\n", (uptr)tid);
170 VReport(1, "Waiting on thread %zu failed, detaching (errno %d).\n",
193 VReport(2, "Detached from thread %d.\n", tid);
198 VReport(1, "Could not detach from thread %d (errno %d).\n", tid, pterrno);
317 VReport(1, "Failed suspending threads.\n");
439 VReport(1, "Failed spawning a tracer thread (errno %d).\n", local_errno);
465 VReport(1, "Waiting on the tracer thread failed (errno %d).\n",
552 VReport(1, "Could not get registers from thread %d (errno %d).\n", tid,
projects/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_libcdep.cpp 442 Report("WARNING: Command buffer too small");
449 Report("WARNING: Command buffer too small");
481 Report("WARNING: Symbolizer was blocked from starting itself!\n");
492 Report("WARNING: Failed to use and restart external symbolizer!\n");
527 Report("WARNING: Can't read from symbolizer at fd %d\n", input_fd_);
534 Report("WARNING: Symbolizer buffer too small\n");
549 Report("WARNING: Can't write to symbolizer at fd %d\n", output_fd_);
projects/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_posix_libcdep.cpp 144 Report("WARNING: invalid path to external symbolizer!\n");
171 Report("WARNING: Can't create a socket pair to start "
194 Report("WARNING: external symbolizer didn't start up correctly!\n");
400 VReport(2, "External symbolizer is explicitly disabled.\n");
403 VReport(2, "Using llvm-symbolizer at user-specified path: %s\n", path);
410 Report("ERROR: Using `atos` is only supported on Darwin.\n");
414 VReport(2, "Using addr2line at user-specified path: %s\n", path);
417 Report("ERROR: External symbolizer path is set to '%s' which isn't "
432 VReport(2, "Using llvm-symbolizer found at: %s\n", found_path);
437 VReport(2, "Using addr2line found at: %s\n", found_path);
447 VReport(2, "Symbolizer is disabled.\n");
451 VReport(2, "Cannot use internal symbolizer: out of memory\n");
453 VReport(2, "Using internal symbolizer.\n");
458 VReport(2, "Using libbacktrace symbolizer.\n");
projects/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_report.cpp 114 Report("WARNING: %s: writable-executable page usage\n", SanitizerToolName);
137 Report("Hint: PC is at a non-executable region. Maybe a wild jump?\n");
162 Report("%s", str.data());
176 Report("ERROR: %s: %s on address %p (pc %p bp %p sp %p T%d)\n",
195 Report("ERROR: %s: %s on unknown address (pc %p bp %p sp %p T%d)\n",
199 Report("ERROR: %s: %s on unknown address %p (pc %p bp %p sp %p T%d)\n",
204 Report("Hint: pc points to the zero page.\n");
210 Report("The signal is caused by a %s memory access.\n", access_type);
212 Report("Hint: this fault was caused by a dereference of a high value "
216 Report("Hint: address points to the zero page.\n");
246 Report("ABORTING\n");
projects/compiler-rt/lib/sanitizer_common/sanitizer_termination.cpp 80 Report("Sanitizer CHECK failed: %s:%d %s (%lld, %lld)\n", file, line, cond,
projects/compiler-rt/lib/sanitizer_common/sanitizer_thread_registry.cpp 149 Report("%s: Thread limit (%u threads) exceeded. Dying.\n",
242 Report("%s: Detach of non-existent thread\n", SanitizerToolName);
263 Report("%s: Join of non-existent thread\n", SanitizerToolName);
projects/compiler-rt/lib/sanitizer_common/sanitizer_tls_get_addr.cpp 47 VReport(2, "__tls_get_addr: DTLS_Deallocate %p %zd\n", dtv, size);
60 VReport(2, "__tls_get_addr: DTLS_Resize %p %zd\n", &dtls, num_live_dtls);
74 VReport(2, "__tls_get_addr: DTLS_Destroy %p %zd\n", &dtls, dtls.dtv_size);
99 VReport(2, "__tls_get_addr: %p {%p,%p} => %p; tls_beg: %p; sp: %p "
105 VReport(2, "__tls_get_addr: glibc <=2.18 suspected; tls={%p,%p}\n",
110 VReport(2, "__tls_get_addr: static tls: %p\n", tls_beg);
117 VReport(2, "__tls_get_addr: glibc >=2.19 suspected; tls={%p %p}\n",
120 VReport(2, "__tls_get_addr: Can't guess glibc version\n");
131 VReport(2, "DTLS_on_libc_memalign: %p %p\n", ptr, size);
projects/compiler-rt/lib/stats/stats.cpp 50 Report("stats: failed to open %s for writing (reason: %d)\n", path.data(),
projects/compiler-rt/lib/tsan/rtl/tsan_interceptors_posix.cpp 968 Report("ThreadSanitizer: starting new threads after multi-threaded "
2605 Report("FATAL: ThreadSanitizer: unreachable called\n");
projects/compiler-rt/lib/tsan/rtl/tsan_platform_linux.cpp 272 VReport(1, "Program is run with unlimited stack size, which wouldn't "
281 Report("WARNING: Program is run with limited virtual address space,"
283 Report("Re-execing with unlimited virtual address space.\n");
projects/compiler-rt/lib/xray/xray_allocator.h 68 Report(
117 Report(
186 Report("XRay Profiling: Failed to allocate memory for allocator.\n");
200 Report("XRay Profiling: Cannot obtain enough memory from "
projects/compiler-rt/lib/xray/xray_basic_logging.cpp 129 Report("Not initializing TLD since ThreadBufferSize == 0.\n");
141 Report("Not initializing the ShadowStack since MaxStackDepth == 0.\n");
311 Report("clock_gettimg(2) return %d, errno=%d.", result, int(errno));
331 Report("clock_gettimg(2) return %d, errno=%d.", result, int(errno));
348 Report("Cleaned up log for TID: %d\n", GetTid());
353 Report("Skipping buffer for TID: %d; Offset = %llu\n", GetTid(),
379 Report("Basic logging already initialized.\n");
393 Report("WARNING: Required CPU features missing for XRay instrumentation, "
447 Report("Basic logging already finalized.\n");
475 Report("Cannot register XRay Basic Mode to 'xray-basic'; error = %d\n",
482 Report("Failed selecting XRay Basic Mode; error = %d\n", SelectResult);
494 Report("Failed initializing XRay Basic Mode; error = %d\n", InitResult);
projects/compiler-rt/lib/xray/xray_fdr_logging.cpp 198 Report(
283 Report("Not flushing log, implementation is not finalized.\n");
292 Report("Not flushing log, implementation is still finalizing.\n");
298 Report("Cannot flush when global buffer queue is null.\n");
325 Report("XRay FDR: Not flushing to file, 'no_file_flush=true'.\n");
393 Report("Cannot finalize log, implementation not initialized.\n");
401 Report("Attempting to finalize an uninitialized global buffer!\n");
435 Report("clock_gettime(2) return %d, errno=%d", result, int(errno));
571 Report("Custom event size too large; truncating to %d.\n",
601 Report("Typed event size too large; truncating to %d.\n",
624 Report("Cannot initialize already initialized implementation.\n");
629 Report("Initializing FDR mode with options: %s\n",
669 Report("BufferQueue init failed.\n");
675 Report("Failed to re-initialize global buffer queue. Init failed.\n");
698 Report("At thread exit, failed to release buffer at %p; "
723 Report("XRay FDR init successful.\n");
737 Report("Cannot register XRay FDR mode to 'xray-fdr'; error = %d\n",
747 Report("Cannot select XRay FDR mode as 'xray-fdr'; error = %d\n",
projects/compiler-rt/lib/xray/xray_init.cpp 79 Report("XRay instrumentation map missing. Not initializing XRay.\n");
projects/compiler-rt/lib/xray/xray_interface.cpp 172 Report("Unsupported sled kind '%d' @%04x\n", Sled.Address, int(Sled.Kind));
203 Report("Invalid function id provided: %d\n", FuncId);
220 Report("Failed patching any sled for function '%d'.", FuncId);
281 Report("System page size is not a power of two: %lld\n", PageSize);
291 Report("Failed mprotect: %d\n", errno);
323 Report("Invalid function id provided: %d\n", FuncId);
331 Report("Provided page size is not a power of two: %lld\n", PageSize);
356 Report("Failed mprotect: %d\n", errno);
projects/compiler-rt/lib/xray/xray_profiling.cpp 211 Report("Not flushing profiles, profiling not been finalized.\n");
218 Report("Cannot finalize properly inside a signal handler!\n");
230 Report("Not flushing profiles, implementation still flushing.\n");
242 Report("profiling: No data to flush.\n");
247 Report("profiling: Failed to flush to file, dropping data.\n");
321 Report("Cannot finalize profile, the profiling is not initialized.\n");
363 Report("Cannot initialize already initialised profiling "
398 Report("Failed to initialize preallocated memory buffers!");
414 Report("Failed to initialize preallocated memory buffers; error: %s",
469 Report("XRay Profile flushed at exit.");
480 Report("XRay Profiling init successful.\n");
506 Report("Cannot register XRay Profiling mode to 'xray-profiling'; error = "
projects/compiler-rt/lib/xray/xray_utils.cpp 143 Report("Failed to write; errno = %d\n", errno);
172 Report("XRay log file name too long (%d): %s\n", NeededLength, TmpFilename);
177 Report("XRay: Failed opening temporary file '%s'; not logging events.\n",
182 Report("XRay: Log file in '%s'\n", TmpFilename);
projects/compiler-rt/lib/xray/xray_x86_64.cpp 41 Report("Read error; errno = %d\n", errno);
85 Report("Unable to determine CPU frequency for TSC accounting.\n");
157 Report("XRay Entry trampoline (%p) too far from sled (%p)\n",
202 Report("XRay Exit trampoline (%p) too far from sled (%p)\n",
230 Report("XRay Tail Exit trampoline (%p) too far from sled (%p)\n",
340 Report("Missing rdtscp support.\n");
346 Report("Unable to determine CPU frequency.\n");