Searched
full:address (Results
1701 -
1725 of
19436) sorted by null
<<61626364656667686970>>
/external/clang/utils/CIndex/ |
completion_logger_server.py | 9 print "completion_logger_server.py <listen address> <listen port> <log file>" 17 # Create socket and bind to address
|
/external/cmockery/cmockery_0_1_2/src/example/ |
assert_macro_test.c | 28 assert_string_equal(get_status_code_string(0), "Address not found"); 34 assert_int_equal(string_to_status_code("Address not found"), 0);
|
/external/compiler-rt/ |
CREDITS.TXT | 7 beautification by scripts. The fields are: name (N), email (E), web-address 8 (W), PGP key ID and fingerprint (P), description (D), and snail-mail address
|
/external/compiler-rt/lib/builtins/i386/ |
chkstk2.S | 31 lea 4(%esp),%eax // load pointer to the return address into eax 34 push (%eax) // push return address onto the stack
|
/external/compiler-rt/lib/builtins/x86_64/ |
chkstk2.S | 33 lea 8(%rsp),%rax // load pointer to the return address into rax 36 push (%rax) // push return address onto the stack
|
/external/compiler-rt/test/asan/TestCases/Windows/ |
dll_intercept_memcpy.cc | 24 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 28 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
|
dll_intercept_memcpy_indirect.cc | 25 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 30 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
|
dll_intercept_memset.cc | 24 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 28 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
|
dll_intercept_strlen.cc | 19 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 25 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
|
dll_noreturn.cc | 12 // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] 18 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
|
dll_thread_stack_array_left_oob.cc | 12 // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] 16 // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset [[OFFSET:.*]] in frame
|
intercept_memcpy.cc | 23 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 28 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
|
intercept_strlen.cc | 18 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 23 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
|
operator_array_new_with_dtor_left_oob.cc | 12 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 18 // https://code.google.com/p/address-sanitizer/issues/detail?id=314
|
thread_stack_array_left_oob.cc | 10 // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]] 13 // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame
|
thread_stack_array_right_oob.cc | 10 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 13 // CHECK: Address [[ADDR]] is located in stack of thread T1 at offset {{.*}} in frame
|
/external/compiler-rt/test/lsan/TestCases/ |
do_leak_check_override.cc | 35 // CHECK-strict: SUMMARY: {{(Leak|Address)}}Sanitizer: 2003 byte(s) leaked in 2 allocation(s) 36 // CHECK-normal: SUMMARY: {{(Leak|Address)}}Sanitizer: 666 byte(s) leaked in 1 allocation(s)
|
leak_check_at_exit.cc | 20 // CHECK-do: SUMMARY: {{(Leak|Address)}}Sanitizer: 21 // CHECK-dont-NOT: SUMMARY: {{(Leak|Address)}}Sanitizer:
|
suppressions_file.cc | 30 // CHECK: SUMMARY: {{(Leak|Address)}}Sanitizer: 1337 byte(s) leaked in 1 allocation(s) 32 // NOSUPP: SUMMARY: {{(Leak|Address)}}Sanitizer: 2003 byte(s) leaked in 2 allocation(s).
|
/external/compiler-rt/test/msan/ |
allocator_mapping.cc | 24 // This address must be already mapped. Check that mmap() succeeds, but at a 25 // different address.
|
/external/curl/tests/data/ |
test1046 | 41 # --interface doesn't accept an address surrounded by [] so %CLIENT6IP is out 43 perl -e "print 'Test requires default test server host address' if ( '%CLIENT6IP' ne '[::1]' );"
|
/external/curl/tests/libtest/ |
lib1530.c | 29 struct curl_sockaddr *address) 32 (void)address;
|
/external/dbus/dbus/ |
dbus-server-socket.h | 34 const DBusString *address, 36 DBusServer* _dbus_server_new_for_autolaunch (const DBusString *address,
|
/external/dexmaker/src/dx/java/com/android/dx/dex/code/ |
CatchTable.java | 96 /** {@code >= 0;} start address */ 99 /** {@code > start;} end address (exclusive) */ 108 * @param start {@code >= 0;} start address 109 * @param end {@code > start;} end address (exclusive) 166 * Gets the start address. 168 * @return {@code >= 0;} the start address 175 * Gets the end address (exclusive). 177 * @return {@code > start;} the end address (exclusive)
|
/external/dnsmasq/contrib/dnslist/ |
dnslist.tt2 | 12 <th class="ip_addr">IP Address</th> 13 <th class="ether_addr">Ethernet Address</th>
|
Completed in 983 milliseconds
<<61626364656667686970>>