HomeSort by relevance Sort by last modified time
    Searched full:poisoned (Results 1 - 25 of 70) sorted by null

1 2 3

  /external/clang/test/Preprocessor/
pragma_poison.c 4 rindex(some_string, 'h'); // expected-error {{attempt to use a poisoned identifier}}
9 XYZW // expected-error {{attempt to use a poisoned identifier}}
12 // is poisoned.
macro_paste_bad.c 26 // When pasting creates poisoned identifiers, we error.
28 BLARG // expected-error {{attempt to use a poisoned identifier}}
30 XX // expected-error {{attempt to use a poisoned identifier}}
  /external/compiler-rt/lib/msan/tests/
msan_test.cc 307 x[2] = 1; // Init this here. Check that after realloc it is poisoned again.
319 EXPECT_NOT_POISONED(*x); // Should not be poisoned.
    [all...]
  /external/compiler-rt/lib/msan/lit_tests/
getaddrinfo.cc 20 // stack-allocated buffer, which is very likely to be poisoned. Test that we
  /external/compiler-rt/lib/asan/lit_tests/TestCases/Linux/
swapcontext_test.cc 35 char x[32] = {0}; // Stack gets poisoned.
39 // (b) Jump into the original function. Stack remains poisoned unless we do
clone_test.cc 17 char x[32] = {0}; // Stack gets poisoned.
  /external/chromium_org/sql/
recovery.h 23 // the original handle is poisoned so that operations on the stack do
88 // original database handle is poisoned, causing future calls
100 // database is razed, and the handle poisoned.
166 // poisoned.
recovery_unittest.cc 277 // Database handle has been poisoned.
352 // Database handle has been poisoned.
386 ASSERT_TRUE(Reopen()); // Handle was poisoned.
399 ASSERT_TRUE(Reopen()); // Handle was poisoned.
  /external/chromium_org/v8/test/mjsunit/regress/
regress-2564.js 74 // The rest are poisoned by the first strict mode function.
105 // The rest are poisoned by the first strict mode function.
  /external/compiler-rt/include/sanitizer/
asan_interface.h 33 // addresses in this region is allowed until this region is poisoned again.
53 // Returns true iff addr is poisoned (i.e. 1-byte read/write access to this
57 // If at least on byte in [beg, beg+size) is poisoned, return the address
msan_interface.h 51 /* Returns the offset of the first (at least partially) poisoned byte in the
  /external/chromium_org/v8/test/mjsunit/
proto-poison.js 28 // Check that the __proto__ accessor is properly poisoned when extracted
  /external/compiler-rt/lib/asan/
asan_poisoning.cc 82 // No need to re-poison memory if it is poisoned already.
163 // The fast check failed, so we have a poisoned byte somewhere.
168 UNREACHABLE("mem_is_zero returned false, but poisoned byte was not found");
222 // assumes that left border of region to be poisoned is properly aligned.
asan_flags.h 62 // If set, user may manually mark memory regions as poisoned or unpoisoned.
asan_globals.cc 194 // TU are poisoned. It simply unpoisons all dynamically initialized globals.
  /external/linux-tools-perf/util/include/linux/added/
poison.h 53 * Private mappings of hugetlb pages use this poisoned value for
  /external/bison/build-aux/snippet/
warn-on-use.h 31 compile merely because they included a header that poisoned the
  /external/chromium_org/third_party/WebKit/Source/core/loader/
CrossOriginPreflightResultCache.cpp 42 static const unsigned maxPreflightCacheTimeoutSeconds = 600; // Should be short enough to minimize the risk of using a poisoned cache after switching to a secure network.
  /external/compiler-rt/lib/msan/
msan_allocator.cc 76 // poisoned.
msan_interface_internal.h 66 // Returns the offset of the first (at least partially) poisoned byte,
  /external/llvm/test/Instrumentation/AddressSanitizer/
lifetime.ll 38 ; Memory is poisoned at every call to llvm.lifetime.end
  /external/chromium_org/v8/test/mjsunit/harmony/
iteration-semantics.js 158 throw "poisoned";
  /external/clang/include/clang/Basic/
IdentifierTable.h 60 bool IsPoisoned : 1; // True if identifier is poisoned.
230 /// setIsPoisoned - Mark this identifier as poisoned. After poisoning, the
240 /// isPoisoned - Return true if this token has been poisoned.
  /prebuilts/gcc/darwin-x86/arm/arm-eabi-4.6/lib/gcc/arm-eabi/4.6.x-google/plugin/include/
cpplib.h 564 like __LINE__ are flagged NODE_BUILTIN. Poisoned identifiers are
569 applies to __VA_ARGS__, poisoned identifiers, and -Wc++-compat
574 #define NODE_POISONED (1 << 1) /* Poisoned identifier. */
    [all...]
  /prebuilts/gcc/darwin-x86/arm/arm-linux-androideabi-4.6/lib/gcc/arm-linux-androideabi/4.6.x-google/plugin/include/
cpplib.h 564 like __LINE__ are flagged NODE_BUILTIN. Poisoned identifiers are
569 applies to __VA_ARGS__, poisoned identifiers, and -Wc++-compat
574 #define NODE_POISONED (1 << 1) /* Poisoned identifier. */
    [all...]

Completed in 595 milliseconds

1 2 3