HomeSort by relevance Sort by last modified time
    Searched full:initialization (Results 1 - 25 of 5503) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /art/test/084-class-init/
info.txt 1 Test class initialization edge cases and race conditions.
  /external/compiler-rt/test/asan/TestCases/Helpers/
initialization-blacklist.txt 3 src:*initialization-blacklist-extra2.cc=init
  /prebuilts/misc/common/swig/include/2.0.11/guile/
swigrun.i 7 /* Hook the runtime module initialization
8 into the shared initialization function SWIG_Guile_Init. */
10 /* Hook the runtime module initialization
11 into the shared initialization function SWIG_Guile_Init. */
  /external/clang/test/CXX/dcl.decl/dcl.init/
p5.cpp 3 // A program that calls for default-initialization or value-initialization of
6 // zero-initialization, default-initialization, and value-initialization.
13 return S(); // expected-note {{in value-initialization of type 'S' here}}
17 : S { // expected-note 2{{in value-initialization of type 'S' here}}
19 T t = T(); // expected-note {{in value-initialization of type 'T' here}}
22 T t[3]; // expected-note {{in value-initialization of type 'T' here}}
24 U u = U(); // expected-note {{in value-initialization of type 'U' here}
    [all...]
p6.cpp 5 // If a program calls for the default initialization of an object of a
13 const NoUserDefault x1; // expected-error{{default initialization of an object of const type 'const NoUserDefault' requires a user-provided default constructor}}
15 const int x3; // expected-error{{default initialization of an object of const type 'const int'}}
21 const struct s0 s1::foo; // expected-error{{default initialization of an object of const type 'const struct s0' requires a user-provided default constructor}}
  /external/compiler-rt/test/asan/TestCases/
initialization-blacklist.cc 1 // Test for blacklist functionality of initialization-order checker.
3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\
4 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
5 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
7 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\
8 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
9 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
11 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc\
12 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
13 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %
    [all...]
initialization-constexpr.cc 3 // constructor can be accessed during dynamic initialization (as a constexpr
4 // constructor implies that it was initialized during constant initialization,
5 // not dynamic initialization).
7 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
9 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
11 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
13 // RUN: %clangxx_asan -O3 %s %p/Helpers/initialization-constexpr-extra.cc --std=c++11 -o %t
initialization-bug.cc 1 // Test to make sure basic initialization order errors are caught.
3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-bug-extra2.cc -o %t
17 // Thus we shoud stably report initialization order fiasco independently of
27 // result is undefined behavior, which should be caught by initialization order
32 // CHECK: {{AddressSanitizer: initialization-order-fiasco}}
37 // This initializer begins our initialization order problems.
  /external/clang/test/SemaObjC/
scope-check.m 9 @try { // expected-note {{jump bypasses initialization of @try block}}
11 } @catch (A *x) { // expected-note {{jump bypasses initialization of @catch block}}
15 } @finally {// expected-note {{jump bypasses initialization of @finally block}}
22 } @catch (C *c) { // expected-note {{jump bypasses initialization of @catch block}}
25 } @catch (B *c) { // expected-note {{jump bypasses initialization of @catch block}}
27 } @finally { // expected-note {{jump bypasses initialization of @finally block}}
32 @try { // expected-note 2 {{jump bypasses initialization of @try block}}
44 } @catch (C *c) { // expected-note {{jump bypasses initialization of @catch block}}
52 @synchronized // expected-note {{jump bypasses initialization of @synchronized block}}
83 } @catch (...) { // expected-note {{jump bypasses initialization of @catch block}
    [all...]
  /device/asus/fugu/sepolicy/
pvrsrvctl.te 10 # allow graphics driver initialization
  /external/chromium-libpac/test/js-unittest/
binding_from_global.js 2 // get exercised during initialization.
  /external/chromium_org/net/data/proxy_resolver_v8_unittest/
binding_from_global.js 2 // get exercised during initialization.
  /external/clang/include/clang/Sema/
Initialization.h 1 //===--- Initialization.h - Semantic Analysis for Initializers --*- C++ -*-===//
10 // This file provides supporting data types for initialization of objects.
66 /// \brief The initialization is being done by a delegating constructor.
100 /// initialization occurs.
163 /// \brief Create the initialization entity for a variable.
168 /// \brief Create the initialization entity for the result of a
179 /// \brief Create the initialization entity for a member subobject.
184 /// \brief Create the initialization entity for an array element.
188 /// \brief Create the initialization entity for a lambda capture.
198 /// \brief Create the initialization entity for a variable
    [all...]
  /external/compiler-rt/test/asan/TestCases/Linux/
initialization-bug-any-order.cc 1 // Test to make sure basic initialization order errors are caught.
2 // Check that on Linux initialization order bugs are caught
6 // RUN: %clangxx_asan -O0 %s %p/../Helpers/initialization-bug-extra.cc -o %t
8 // RUN: %clangxx_asan -O0 %p/../Helpers/initialization-bug-extra.cc %s -o %t
17 // result is undefined behavior, which should be caught by initialization order
22 // CHECK: {{AddressSanitizer: initialization-order-fiasco}}
24 // CHECK: {{#0 0x.* in .*initX.* .*initialization-bug-any-order.cc:}}[[@LINE-3]]
28 // This initializer begins our initialization order problems.
  /external/qemu/distrib/sdl-1.2.15/docs/man3/
SDL_GetTicks.3 3 SDL_GetTicks \- Get the number of milliseconds since the SDL library initialization\&.
11 Get the number of milliseconds since the SDL library initialization\&. Note that this value wraps if the program runs for more than ~49 days\&.
  /external/clang/test/Sema/
flexible-array-init.c 5 } x = {5, {1, 2, 3}}; // expected-warning{{flexible array initialization is a GNU extension}}
7 struct one x2 = { 5, 1, 2, 3 }; // expected-warning{{flexible array initialization is a GNU extension}}
10 struct one x3 = {5, {1, 2, 3}}; // expected-error{{initialization of flexible array member is not allowed}}
14 // expected-warning{{flexible array initialization is a GNU extension}} \
24 struct foo a = { 1, { 2, 3, 4 } }; // expected-warning{{flexible array initialization is a GNU extension}}
25 struct bar b = { { 1, { 2, 3, 4 } } }; // expected-error{{initialization of flexible array member is not allowed}}
26 struct bar c = { { 1, { } } }; // // expected-warning{{flexible array initialization is a GNU extension}} \
30 // expected-error{{initialization of flexible array member is not allowed}}
32 struct foo desig_foo = { .y = {2, 3, 4} }; // expected-warning{{flexible array initialization is a GNU extension}}
35 // expected-warning{{flexible array initialization is a GNU extension}
    [all...]
scope-check.c 5 int a[x]; // expected-note {{jump bypasses initialization of variable length array}}
6 int b[x]; // expected-note {{jump bypasses initialization of variable length array}}
13 typedef int a[x]; // expected-note {{jump bypasses initialization of VLA typedef}}
22 int a __attribute((cleanup(test3clean))); // expected-note {{jump bypasses initialization of variable with __attribute__((cleanup))}}
29 int a[x]; // expected-note {{jump bypasses initialization of variable length array}}
52 int a[x]; // expected-note {{jump bypasses initialization of variable length array}}
62 for (int arr[x]; // expected-note {{jump bypasses initialization of variable length array}}
68 int Y = ({ int a[x]; // expected-note {{jump bypasses initialization of variable length array}}
73 int A[x], // expected-note {{jump bypasses initialization of variable length array}}
74 B[x]; // expected-note {{jump bypasses initialization of variable length array}
    [all...]
  /external/clang/test/SemaCXX/
class-base-member-init.cpp 10 b1(0), // expected-note {{previous initialization is here}}
13 S(), // expected-note {{previous initialization is here}}
34 B() : A<T>(), // expected-note {{previous initialization is here}}
41 A() : T(), // expected-note {{previous initialization is here}}
50 A() : t(1), // expected-note {{previous initialization is here}}
72 A(short _) : a(0), c(0) {} // expected-error {{initializing multiple members of union}} expected-note {{previous initialization is here}}
73 A(int _) : d(0), e(0) {} // expected-error {{initializing multiple members of union}} expected-note {{previous initialization is here}}
74 A(long _) : a(0), d(0) {} // expected-error {{initializing multiple members of union}} expected-note {{previous initialization is here}}
85 A(int) : Base(3), // expected-note {{previous initialization is here}}
96 X() : a(), // expected-note{{previous initialization is here}
    [all...]
uninitialized.cpp 10 int a = a; // no-warning: used to signal intended lack of initialization.
11 int b = b + 1; // expected-warning {{variable 'b' is uninitialized when used within its own initialization}}
12 int c = (c + c); // expected-warning 2 {{variable 'c' is uninitialized when used within its own initialization}}
13 int e = static_cast<long>(e) + 1; // expected-warning {{variable 'e' is uninitialized when used within its own initialization}}
14 int f = foo(f); // expected-warning {{variable 'f' is uninitialized when used within its own initialization}}
24 int l = k ? l : l; // expected-warning 2{{variable 'l' is uninitialized when used within its own initialization}}
25 int m = 1 + (k ? m : m); // expected-warning 2{{variable 'm' is uninitialized when used within its own initialization}}
26 int n = -n; // expected-warning {{variable 'n' is uninitialized when used within its own initialization}}
29 int a = a; // no-warning: used to signal intended lack of initialization.
30 int b = b + 1; // expected-warning {{variable 'b' is uninitialized when used within its own initialization}}
    [all...]
ref-init-ambiguous.cpp 17 const E2 &e2 = c; // expected-error {{reference initialization of type 'const E2 &' with initializer of type 'C' is ambiguous}}
23 foo(c); // expected-error {{reference initialization of type 'const E2 &' with initializer of type 'C' is ambiguous}}
25 return c; // expected-error {{reference initialization of type 'const E2 &' with initializer of type 'C' is ambiguous}}
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/
__init__.py 5 # This ensures that calling code can import initialization code from
7 # Initialization code can include things like version-checking code and
12 # allows different callers to choose different initialization code,
  /external/chromium_org/net/proxy/
dhcpcsvc_init_win.h 9 // Initialization of the Dhcpcsvc library must happen before any of its
11 // initialization has been done, and that uninitialization is also
  /external/clang/test/CXX/class/class.static/class.static.data/
p4.cpp 13 static const int i = 0; // expected-note{{previous initialization is here}}
18 static const int i = 0; // expected-note{{previous initialization is here}}
  /external/chromium_org/content/app/mojo/
mojo_init.h 12 // Perform any necessary Mojo initialization.
  /external/chromium_org/content/shell/android/shell_apk/res/values/
strings.xml 10 <string name="browser_process_initialization_failed">Initialization failed.</string>

Completed in 918 milliseconds

1 2 3 4 5 6 7 8 91011>>