/external/clang/test/Preprocessor/ |
pragma_poison.c | 4 rindex(some_string, 'h'); // expected-error {{attempt to use a poisoned identifier}} 9 XYZW // expected-error {{attempt to use a poisoned identifier}} 12 // is poisoned.
|
macro_paste_bad.c | 26 // When pasting creates poisoned identifiers, we error. 28 BLARG // expected-error {{attempt to use a poisoned identifier}} 30 XX // expected-error {{attempt to use a poisoned identifier}}
|
/external/compiler-rt/test/asan/TestCases/ |
throw_catch.cc | 32 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 35 fprintf(stderr, "After: %p poisoned: %d\n", &x, 44 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 51 fprintf(stderr, "After: %p poisoned: %d\n", &x, 63 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 67 fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
contiguous_container_crash.cc | 24 return (int)t[60 * one]; // Touches the poisoned memory.
|
/external/compiler-rt/lib/msan/tests/ |
msan_test.cc | 152 T Poisoned(T v = 0, T s = (T)(-1)) { 291 x[2] = 1; // Init this here. Check that after realloc it is poisoned again. 303 EXPECT_NOT_POISONED(*x); // Should not be poisoned. [all...] |
/external/compiler-rt/test/lsan/TestCases/ |
use_poisoned_asan.cc | 1 // ASan-poisoned memory should be ignored if use_poisoned is false.
|
/external/compiler-rt/test/msan/ |
getaddrinfo.cc | 20 // stack-allocated buffer, which is very likely to be poisoned. Test that we
|
signal_stress_test.cc | 14 void f(bool poisoned, int n, ...) { 19 if (!poisoned)
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
swapcontext_test.cc | 35 char x[32] = {0}; // Stack gets poisoned. 39 // (b) Jump into the original function. Stack remains poisoned unless we do
|
clone_test.cc | 18 char x[32] = {0}; // Stack gets poisoned.
|
/external/chromium_org/sql/ |
recovery.h | 23 // the original handle is poisoned so that operations on the stack do 88 // original database handle is poisoned, causing future calls 100 // database is razed, and the handle poisoned. 166 // poisoned.
|
recovery_unittest.cc | 277 // Database handle has been poisoned. 352 // Database handle has been poisoned. 386 ASSERT_TRUE(Reopen()); // Handle was poisoned. 399 ASSERT_TRUE(Reopen()); // Handle was poisoned.
|
/frameworks/testing/espresso/espresso-lib/src/main/java/com/google/android/apps/common/testing/ui/espresso/base/ |
AsyncTaskPoolMonitor.java | 106 private volatile boolean poisoned; field in class:AsyncTaskPoolMonitor.IdleMonitor 133 poisoned = true; 138 if (poisoned) { 157 while (!poisoned) {
|
/external/chromium_org/v8/test/mjsunit/regress/ |
regress-2564.js | 74 // The rest are poisoned by the first strict mode function. 105 // The rest are poisoned by the first strict mode function.
|
/external/compiler-rt/lib/msan/ |
msan_thread.cc | 59 // and we don't want it to have any poisoned stack.
|
/external/llvm/test/Instrumentation/AddressSanitizer/ |
lifetime-uar.ll | 24 ; Memory is poisoned at llvm.lifetime.end
|
/external/compiler-rt/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least on byte in [beg, beg+size) is poisoned, return the address
|
common_interface_defs.h | 108 // Returns true if the contiguous container [beg, end) ir properly poisoned
|
/external/compiler-rt/lib/lsan/ |
lsan_common.h | 73 // Consider pointers found in poisoned memory to be valid. 159 // Returns true if [addr, addr + sizeof(void *)) is poisoned.
|
/art/runtime/ |
globals.h | 105 // If true, references within the heap are poisoned (negated).
|
/external/chromium_org/v8/test/cctest/ |
test-mementos.cc | 78 // Force GC to test the poisoned memento handling
|
/external/compiler-rt/lib/asan/ |
asan_poisoning.cc | 92 // No need to re-poison memory if it is poisoned already. 172 // The fast check failed, so we have a poisoned byte somewhere. 177 UNREACHABLE("mem_is_zero returned false, but poisoned byte was not found"); 231 // assumes that left border of region to be poisoned is properly aligned.
|
/external/bison/build-aux/snippet/ |
warn-on-use.h | 31 compile merely because they included a header that poisoned the
|
/external/chromium_org/content/browser/compositor/ |
browser_compositor_view_mac.mm | 161 // factor or it was poisoned, remove the old layer and replace it.
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
CrossOriginPreflightResultCache.cpp | 40 static const unsigned maxPreflightCacheTimeoutSeconds = 600; // Should be short enough to minimize the risk of using a poisoned cache after switching to a secure network.
|