HomeSort by relevance Sort by last modified time
    Searched full:poisoned (Results 1 - 25 of 80) sorted by null

1 2 3 4

  /external/clang/test/Preprocessor/
pragma_poison.c 4 rindex(some_string, 'h'); // expected-error {{attempt to use a poisoned identifier}}
9 XYZW // expected-error {{attempt to use a poisoned identifier}}
12 // is poisoned.
macro_paste_bad.c 26 // When pasting creates poisoned identifiers, we error.
28 BLARG // expected-error {{attempt to use a poisoned identifier}}
30 XX // expected-error {{attempt to use a poisoned identifier}}
  /external/compiler-rt/test/asan/TestCases/Windows/
longjmp.cc 16 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
21 fprintf(stderr, "After: %p poisoned: %d\n", &x,
throw_catch.cc 40 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
47 fprintf(stderr, "After: %p poisoned: %d\n", &x,
58 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
62 fprintf(stderr, "After: %p poisoned: %d\n", &x,
seh.cc 46 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
50 fprintf(stderr, "After: %p poisoned: %d\n", &x,
dll_seh.cc 49 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
53 fprintf(stderr, "After: %p poisoned: %d\n", &x,
  /external/compiler-rt/test/asan/TestCases/
longjmp.cc 13 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
18 fprintf(stderr, "After: %p poisoned: %d\n", &x,
throw_catch.cc 29 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
33 fprintf(stderr, "After: %p poisoned: %d\n", &x,
44 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
52 fprintf(stderr, "After: %p poisoned: %d\n", &x,
contiguous_container_crash.cc 26 return (int)t[60 * one]; // Touches the poisoned memory.
  /external/compiler-rt/lib/msan/tests/
msan_test.cc 200 T Poisoned(T v = 0, T s = (T)(-1)) {
338 x[2] = 1; // Init this here. Check that after realloc it is poisoned again.
350 EXPECT_NOT_POISONED(*x); // Should not be poisoned.
    [all...]
  /external/compiler-rt/test/lsan/TestCases/
use_poisoned_asan.cc 1 // ASan-poisoned memory should be ignored if use_poisoned is false.
  /external/compiler-rt/test/msan/
getaddrinfo.cc 20 // stack-allocated buffer, which is very likely to be poisoned. Test that we
param_tls_limit.cc 13 // This test passes poisoned values through function argument list.
16 // In case of no overflow, it is still poisoned.
signal_stress_test.cc 14 void f(bool poisoned, int n, ...) {
19 if (!poisoned)
  /external/compiler-rt/test/asan/TestCases/Linux/
swapcontext_test.cc 35 char x[32] = {0}; // Stack gets poisoned.
39 // (b) Jump into the original function. Stack remains poisoned unless we do
clone_test.cc 18 char x[32] = {0}; // Stack gets poisoned.
  /external/v8/test/mjsunit/regress/
regress-2564.js 74 // The rest are poisoned by the first strict mode function.
105 // The rest are poisoned by the first strict mode function.
  /external/compiler-rt/lib/msan/
msan_thread.cc 60 // and we don't want it to have any poisoned stack.
msan_poisoning.cc 49 // Copy left unaligned origin if that memory is poisoned.
63 // Copy right unaligned origin if that memory is poisoned.
  /external/llvm/test/Instrumentation/AddressSanitizer/
lifetime-uar.ll 24 ; Memory is poisoned at llvm.lifetime.end
  /external/compiler-rt/include/sanitizer/
asan_interface.h 33 // addresses in this region is allowed until this region is poisoned again.
53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this
58 // If at least one byte in [beg, beg+size) is poisoned, return the address
  /prebuilts/clang/linux-x86/host/3.6/lib/clang/3.6/include/sanitizer/
asan_interface.h 33 // addresses in this region is allowed until this region is poisoned again.
53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this
58 // If at least one byte in [beg, beg+size) is poisoned, return the address
  /external/compiler-rt/lib/lsan/
lsan_flags.inc 42 "Consider pointers found in poisoned memory to be valid.")
  /art/runtime/
globals.h 99 // If true, references within the heap are poisoned (negated).
  /external/compiler-rt/lib/asan/
asan_poisoning.cc 124 // No need to re-poison memory if it is poisoned already.
204 // The fast check failed, so we have a poisoned byte somewhere.
209 UNREACHABLE("mem_is_zero returned false, but poisoned byte was not found");
293 // assumes that left border of region to be poisoned is properly aligned.

Completed in 703 milliseconds

1 2 3 4