HomeSort by relevance Sort by last modified time
    Searched full:poisoned (Results 1 - 25 of 80) sorted by null

1 2 3 4

  /external/clang/test/Preprocessor/
pragma_poison.c 4 rindex(some_string, 'h'); // expected-error {{attempt to use a poisoned identifier}}
9 XYZW // expected-error {{attempt to use a poisoned identifier}}
12 // is poisoned.
macro_paste_bad.c 26 // When pasting creates poisoned identifiers, we error.
28 BLARG // expected-error {{attempt to use a poisoned identifier}}
30 XX // expected-error {{attempt to use a poisoned identifier}}
  /external/compiler-rt/test/asan/TestCases/
throw_catch.cc 32 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
35 fprintf(stderr, "After: %p poisoned: %d\n", &x,
44 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
51 fprintf(stderr, "After: %p poisoned: %d\n", &x,
63 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
67 fprintf(stderr, "After: %p poisoned: %d\n", &x,
contiguous_container_crash.cc 24 return (int)t[60 * one]; // Touches the poisoned memory.
  /external/compiler-rt/lib/msan/tests/
msan_test.cc 152 T Poisoned(T v = 0, T s = (T)(-1)) {
291 x[2] = 1; // Init this here. Check that after realloc it is poisoned again.
303 EXPECT_NOT_POISONED(*x); // Should not be poisoned.
    [all...]
  /external/compiler-rt/test/lsan/TestCases/
use_poisoned_asan.cc 1 // ASan-poisoned memory should be ignored if use_poisoned is false.
  /external/compiler-rt/test/msan/
getaddrinfo.cc 20 // stack-allocated buffer, which is very likely to be poisoned. Test that we
signal_stress_test.cc 14 void f(bool poisoned, int n, ...) {
19 if (!poisoned)
  /external/compiler-rt/test/asan/TestCases/Linux/
swapcontext_test.cc 35 char x[32] = {0}; // Stack gets poisoned.
39 // (b) Jump into the original function. Stack remains poisoned unless we do
clone_test.cc 18 char x[32] = {0}; // Stack gets poisoned.
  /external/chromium_org/sql/
recovery.h 23 // the original handle is poisoned so that operations on the stack do
88 // original database handle is poisoned, causing future calls
100 // database is razed, and the handle poisoned.
166 // poisoned.
recovery_unittest.cc 277 // Database handle has been poisoned.
352 // Database handle has been poisoned.
386 ASSERT_TRUE(Reopen()); // Handle was poisoned.
399 ASSERT_TRUE(Reopen()); // Handle was poisoned.
  /frameworks/testing/espresso/espresso-lib/src/main/java/com/google/android/apps/common/testing/ui/espresso/base/
AsyncTaskPoolMonitor.java 106 private volatile boolean poisoned; field in class:AsyncTaskPoolMonitor.IdleMonitor
133 poisoned = true;
138 if (poisoned) {
157 while (!poisoned) {
  /external/chromium_org/v8/test/mjsunit/regress/
regress-2564.js 74 // The rest are poisoned by the first strict mode function.
105 // The rest are poisoned by the first strict mode function.
  /external/compiler-rt/lib/msan/
msan_thread.cc 59 // and we don't want it to have any poisoned stack.
  /external/llvm/test/Instrumentation/AddressSanitizer/
lifetime-uar.ll 24 ; Memory is poisoned at llvm.lifetime.end
  /external/compiler-rt/include/sanitizer/
asan_interface.h 33 // addresses in this region is allowed until this region is poisoned again.
53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this
58 // If at least on byte in [beg, beg+size) is poisoned, return the address
common_interface_defs.h 108 // Returns true if the contiguous container [beg, end) ir properly poisoned
  /external/compiler-rt/lib/lsan/
lsan_common.h 73 // Consider pointers found in poisoned memory to be valid.
159 // Returns true if [addr, addr + sizeof(void *)) is poisoned.
  /art/runtime/
globals.h 105 // If true, references within the heap are poisoned (negated).
  /external/chromium_org/v8/test/cctest/
test-mementos.cc 78 // Force GC to test the poisoned memento handling
  /external/compiler-rt/lib/asan/
asan_poisoning.cc 92 // No need to re-poison memory if it is poisoned already.
172 // The fast check failed, so we have a poisoned byte somewhere.
177 UNREACHABLE("mem_is_zero returned false, but poisoned byte was not found");
231 // assumes that left border of region to be poisoned is properly aligned.
  /external/bison/build-aux/snippet/
warn-on-use.h 31 compile merely because they included a header that poisoned the
  /external/chromium_org/content/browser/compositor/
browser_compositor_view_mac.mm 161 // factor or it was poisoned, remove the old layer and replace it.
  /external/chromium_org/third_party/WebKit/Source/core/loader/
CrossOriginPreflightResultCache.cpp 40 static const unsigned maxPreflightCacheTimeoutSeconds = 600; // Should be short enough to minimize the risk of using a poisoned cache after switching to a secure network.

Completed in 993 milliseconds

1 2 3 4