/external/clang/test/Preprocessor/ |
pragma_poison.c | 4 rindex(some_string, 'h'); // expected-error {{attempt to use a poisoned identifier}} 9 XYZW // expected-error {{attempt to use a poisoned identifier}} 12 // is poisoned.
|
macro_paste_bad.c | 26 // When pasting creates poisoned identifiers, we error. 28 BLARG // expected-error {{attempt to use a poisoned identifier}} 30 XX // expected-error {{attempt to use a poisoned identifier}}
|
/external/compiler-rt/test/asan/TestCases/Windows/ |
longjmp.cc | 16 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 21 fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
throw_catch.cc | 40 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 47 fprintf(stderr, "After: %p poisoned: %d\n", &x, 58 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 62 fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
seh.cc | 46 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 50 fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
dll_seh.cc | 49 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 53 fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
/external/compiler-rt/test/asan/TestCases/ |
longjmp.cc | 13 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 18 fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
throw_catch.cc | 29 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 33 fprintf(stderr, "After: %p poisoned: %d\n", &x, 44 fprintf(stderr, "Before: %p poisoned: %d\n", &x, 52 fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
contiguous_container_crash.cc | 26 return (int)t[60 * one]; // Touches the poisoned memory.
|
/external/compiler-rt/lib/msan/tests/ |
msan_test.cc | 200 T Poisoned(T v = 0, T s = (T)(-1)) { 338 x[2] = 1; // Init this here. Check that after realloc it is poisoned again. 350 EXPECT_NOT_POISONED(*x); // Should not be poisoned. [all...] |
/external/compiler-rt/test/lsan/TestCases/ |
use_poisoned_asan.cc | 1 // ASan-poisoned memory should be ignored if use_poisoned is false.
|
/external/compiler-rt/test/msan/ |
getaddrinfo.cc | 20 // stack-allocated buffer, which is very likely to be poisoned. Test that we
|
param_tls_limit.cc | 13 // This test passes poisoned values through function argument list. 16 // In case of no overflow, it is still poisoned.
|
signal_stress_test.cc | 14 void f(bool poisoned, int n, ...) { 19 if (!poisoned)
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
swapcontext_test.cc | 35 char x[32] = {0}; // Stack gets poisoned. 39 // (b) Jump into the original function. Stack remains poisoned unless we do
|
clone_test.cc | 18 char x[32] = {0}; // Stack gets poisoned.
|
/external/v8/test/mjsunit/regress/ |
regress-2564.js | 74 // The rest are poisoned by the first strict mode function. 105 // The rest are poisoned by the first strict mode function.
|
/external/compiler-rt/lib/msan/ |
msan_thread.cc | 60 // and we don't want it to have any poisoned stack.
|
msan_poisoning.cc | 49 // Copy left unaligned origin if that memory is poisoned. 63 // Copy right unaligned origin if that memory is poisoned.
|
/external/llvm/test/Instrumentation/AddressSanitizer/ |
lifetime-uar.ll | 24 ; Memory is poisoned at llvm.lifetime.end
|
/external/compiler-rt/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/prebuilts/clang/linux-x86/host/3.6/lib/clang/3.6/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/external/compiler-rt/lib/lsan/ |
lsan_flags.inc | 42 "Consider pointers found in poisoned memory to be valid.")
|
/art/runtime/ |
globals.h | 99 // If true, references within the heap are poisoned (negated).
|
/external/compiler-rt/lib/asan/ |
asan_poisoning.cc | 124 // No need to re-poison memory if it is poisoned already. 204 // The fast check failed, so we have a poisoned byte somewhere. 209 UNREACHABLE("mem_is_zero returned false, but poisoned byte was not found"); 293 // assumes that left border of region to be poisoned is properly aligned.
|