OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:initialization
(Results
1 - 25
of
5503
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/art/test/084-class-init/
info.txt
1
Test class
initialization
edge cases and race conditions.
/external/compiler-rt/test/asan/TestCases/Helpers/
initialization-blacklist.txt
3
src:*
initialization
-blacklist-extra2.cc=init
/prebuilts/misc/common/swig/include/2.0.11/guile/
swigrun.i
7
/* Hook the runtime module
initialization
8
into the shared
initialization
function SWIG_Guile_Init. */
10
/* Hook the runtime module
initialization
11
into the shared
initialization
function SWIG_Guile_Init. */
/external/clang/test/CXX/dcl.decl/dcl.init/
p5.cpp
3
// A program that calls for default-
initialization
or value-
initialization
of
6
// zero-
initialization
, default-
initialization
, and value-
initialization
.
13
return S(); // expected-note {{in value-
initialization
of type 'S' here}}
17
: S { // expected-note 2{{in value-
initialization
of type 'S' here}}
19
T t = T(); // expected-note {{in value-
initialization
of type 'T' here}}
22
T t[3]; // expected-note {{in value-
initialization
of type 'T' here}}
24
U u = U(); // expected-note {{in value-
initialization
of type 'U' here}
[
all
...]
p6.cpp
5
// If a program calls for the default
initialization
of an object of a
13
const NoUserDefault x1; // expected-error{{default
initialization
of an object of const type 'const NoUserDefault' requires a user-provided default constructor}}
15
const int x3; // expected-error{{default
initialization
of an object of const type 'const int'}}
21
const struct s0 s1::foo; // expected-error{{default
initialization
of an object of const type 'const struct s0' requires a user-provided default constructor}}
/external/compiler-rt/test/asan/TestCases/
initialization-blacklist.cc
1
// Test for blacklist functionality of
initialization
-order checker.
3
// RUN: %clangxx_asan -O0 %s %p/Helpers/
initialization
-blacklist-extra.cc\
4
// RUN: %p/Helpers/
initialization
-blacklist-extra2.cc \
5
// RUN: -fsanitize-blacklist=%p/Helpers/
initialization
-blacklist.txt -o %t
7
// RUN: %clangxx_asan -O1 %s %p/Helpers/
initialization
-blacklist-extra.cc\
8
// RUN: %p/Helpers/
initialization
-blacklist-extra2.cc \
9
// RUN: -fsanitize-blacklist=%p/Helpers/
initialization
-blacklist.txt -o %t
11
// RUN: %clangxx_asan -O2 %s %p/Helpers/
initialization
-blacklist-extra.cc\
12
// RUN: %p/Helpers/
initialization
-blacklist-extra2.cc \
13
// RUN: -fsanitize-blacklist=%p/Helpers/
initialization
-blacklist.txt -o %
[
all
...]
initialization-constexpr.cc
3
// constructor can be accessed during dynamic
initialization
(as a constexpr
4
// constructor implies that it was initialized during constant
initialization
,
5
// not dynamic
initialization
).
7
// RUN: %clangxx_asan -O0 %s %p/Helpers/
initialization
-constexpr-extra.cc --std=c++11 -o %t
9
// RUN: %clangxx_asan -O1 %s %p/Helpers/
initialization
-constexpr-extra.cc --std=c++11 -o %t
11
// RUN: %clangxx_asan -O2 %s %p/Helpers/
initialization
-constexpr-extra.cc --std=c++11 -o %t
13
// RUN: %clangxx_asan -O3 %s %p/Helpers/
initialization
-constexpr-extra.cc --std=c++11 -o %t
initialization-bug.cc
1
// Test to make sure basic
initialization
order errors are caught.
3
// RUN: %clangxx_asan -O0 %s %p/Helpers/
initialization
-bug-extra2.cc -o %t
17
// Thus we shoud stably report
initialization
order fiasco independently of
27
// result is undefined behavior, which should be caught by
initialization
order
32
// CHECK: {{AddressSanitizer:
initialization
-order-fiasco}}
37
// This initializer begins our
initialization
order problems.
/external/clang/test/SemaObjC/
scope-check.m
9
@try { // expected-note {{jump bypasses
initialization
of @try block}}
11
} @catch (A *x) { // expected-note {{jump bypasses
initialization
of @catch block}}
15
} @finally {// expected-note {{jump bypasses
initialization
of @finally block}}
22
} @catch (C *c) { // expected-note {{jump bypasses
initialization
of @catch block}}
25
} @catch (B *c) { // expected-note {{jump bypasses
initialization
of @catch block}}
27
} @finally { // expected-note {{jump bypasses
initialization
of @finally block}}
32
@try { // expected-note 2 {{jump bypasses
initialization
of @try block}}
44
} @catch (C *c) { // expected-note {{jump bypasses
initialization
of @catch block}}
52
@synchronized // expected-note {{jump bypasses
initialization
of @synchronized block}}
83
} @catch (...) { // expected-note {{jump bypasses
initialization
of @catch block}
[
all
...]
/device/asus/fugu/sepolicy/
pvrsrvctl.te
10
# allow graphics driver
initialization
/external/chromium-libpac/test/js-unittest/
binding_from_global.js
2
// get exercised during
initialization
.
/external/chromium_org/net/data/proxy_resolver_v8_unittest/
binding_from_global.js
2
// get exercised during
initialization
.
/external/clang/include/clang/Sema/
Initialization.h
1
//===---
Initialization
.h - Semantic Analysis for Initializers --*- C++ -*-===//
10
// This file provides supporting data types for
initialization
of objects.
66
/// \brief The
initialization
is being done by a delegating constructor.
100
///
initialization
occurs.
163
/// \brief Create the
initialization
entity for a variable.
168
/// \brief Create the
initialization
entity for the result of a
179
/// \brief Create the
initialization
entity for a member subobject.
184
/// \brief Create the
initialization
entity for an array element.
188
/// \brief Create the
initialization
entity for a lambda capture.
198
/// \brief Create the
initialization
entity for a variable
[
all
...]
/external/compiler-rt/test/asan/TestCases/Linux/
initialization-bug-any-order.cc
1
// Test to make sure basic
initialization
order errors are caught.
2
// Check that on Linux
initialization
order bugs are caught
6
// RUN: %clangxx_asan -O0 %s %p/../Helpers/
initialization
-bug-extra.cc -o %t
8
// RUN: %clangxx_asan -O0 %p/../Helpers/
initialization
-bug-extra.cc %s -o %t
17
// result is undefined behavior, which should be caught by
initialization
order
22
// CHECK: {{AddressSanitizer:
initialization
-order-fiasco}}
24
// CHECK: {{#0 0x.* in .*initX.* .*
initialization
-bug-any-order.cc:}}[[@LINE-3]]
28
// This initializer begins our
initialization
order problems.
/external/qemu/distrib/sdl-1.2.15/docs/man3/
SDL_GetTicks.3
3
SDL_GetTicks \- Get the number of milliseconds since the SDL library
initialization
\&.
11
Get the number of milliseconds since the SDL library
initialization
\&. Note that this value wraps if the program runs for more than ~49 days\&.
/external/clang/test/Sema/
flexible-array-init.c
5
} x = {5, {1, 2, 3}}; // expected-warning{{flexible array
initialization
is a GNU extension}}
7
struct one x2 = { 5, 1, 2, 3 }; // expected-warning{{flexible array
initialization
is a GNU extension}}
10
struct one x3 = {5, {1, 2, 3}}; // expected-error{{
initialization
of flexible array member is not allowed}}
14
// expected-warning{{flexible array
initialization
is a GNU extension}} \
24
struct foo a = { 1, { 2, 3, 4 } }; // expected-warning{{flexible array
initialization
is a GNU extension}}
25
struct bar b = { { 1, { 2, 3, 4 } } }; // expected-error{{
initialization
of flexible array member is not allowed}}
26
struct bar c = { { 1, { } } }; // // expected-warning{{flexible array
initialization
is a GNU extension}} \
30
// expected-error{{
initialization
of flexible array member is not allowed}}
32
struct foo desig_foo = { .y = {2, 3, 4} }; // expected-warning{{flexible array
initialization
is a GNU extension}}
35
// expected-warning{{flexible array
initialization
is a GNU extension}
[
all
...]
scope-check.c
5
int a[x]; // expected-note {{jump bypasses
initialization
of variable length array}}
6
int b[x]; // expected-note {{jump bypasses
initialization
of variable length array}}
13
typedef int a[x]; // expected-note {{jump bypasses
initialization
of VLA typedef}}
22
int a __attribute((cleanup(test3clean))); // expected-note {{jump bypasses
initialization
of variable with __attribute__((cleanup))}}
29
int a[x]; // expected-note {{jump bypasses
initialization
of variable length array}}
52
int a[x]; // expected-note {{jump bypasses
initialization
of variable length array}}
62
for (int arr[x]; // expected-note {{jump bypasses
initialization
of variable length array}}
68
int Y = ({ int a[x]; // expected-note {{jump bypasses
initialization
of variable length array}}
73
int A[x], // expected-note {{jump bypasses
initialization
of variable length array}}
74
B[x]; // expected-note {{jump bypasses
initialization
of variable length array}
[
all
...]
/external/clang/test/SemaCXX/
class-base-member-init.cpp
10
b1(0), // expected-note {{previous
initialization
is here}}
13
S(), // expected-note {{previous
initialization
is here}}
34
B() : A<T>(), // expected-note {{previous
initialization
is here}}
41
A() : T(), // expected-note {{previous
initialization
is here}}
50
A() : t(1), // expected-note {{previous
initialization
is here}}
72
A(short _) : a(0), c(0) {} // expected-error {{initializing multiple members of union}} expected-note {{previous
initialization
is here}}
73
A(int _) : d(0), e(0) {} // expected-error {{initializing multiple members of union}} expected-note {{previous
initialization
is here}}
74
A(long _) : a(0), d(0) {} // expected-error {{initializing multiple members of union}} expected-note {{previous
initialization
is here}}
85
A(int) : Base(3), // expected-note {{previous
initialization
is here}}
96
X() : a(), // expected-note{{previous
initialization
is here}
[
all
...]
uninitialized.cpp
10
int a = a; // no-warning: used to signal intended lack of
initialization
.
11
int b = b + 1; // expected-warning {{variable 'b' is uninitialized when used within its own
initialization
}}
12
int c = (c + c); // expected-warning 2 {{variable 'c' is uninitialized when used within its own
initialization
}}
13
int e = static_cast<long>(e) + 1; // expected-warning {{variable 'e' is uninitialized when used within its own
initialization
}}
14
int f = foo(f); // expected-warning {{variable 'f' is uninitialized when used within its own
initialization
}}
24
int l = k ? l : l; // expected-warning 2{{variable 'l' is uninitialized when used within its own
initialization
}}
25
int m = 1 + (k ? m : m); // expected-warning 2{{variable 'm' is uninitialized when used within its own
initialization
}}
26
int n = -n; // expected-warning {{variable 'n' is uninitialized when used within its own
initialization
}}
29
int a = a; // no-warning: used to signal intended lack of
initialization
.
30
int b = b + 1; // expected-warning {{variable 'b' is uninitialized when used within its own
initialization
}}
[
all
...]
ref-init-ambiguous.cpp
17
const E2 &e2 = c; // expected-error {{reference
initialization
of type 'const E2 &' with initializer of type 'C' is ambiguous}}
23
foo(c); // expected-error {{reference
initialization
of type 'const E2 &' with initializer of type 'C' is ambiguous}}
25
return c; // expected-error {{reference
initialization
of type 'const E2 &' with initializer of type 'C' is ambiguous}}
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/
__init__.py
5
# This ensures that calling code can import
initialization
code from
7
#
Initialization
code can include things like version-checking code and
12
# allows different callers to choose different
initialization
code,
/external/chromium_org/net/proxy/
dhcpcsvc_init_win.h
9
//
Initialization
of the Dhcpcsvc library must happen before any of its
11
//
initialization
has been done, and that uninitialization is also
/external/clang/test/CXX/class/class.static/class.static.data/
p4.cpp
13
static const int i = 0; // expected-note{{previous
initialization
is here}}
18
static const int i = 0; // expected-note{{previous
initialization
is here}}
/external/chromium_org/content/app/mojo/
mojo_init.h
12
// Perform any necessary Mojo
initialization
.
/external/chromium_org/content/shell/android/shell_apk/res/values/
strings.xml
10
<string name="browser_process_initialization_failed">
Initialization
failed.</string>
Completed in 918 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>