/external/clang/test/SemaObjCXX/ |
microsoft-abi-byval.mm | 13 - (void) my_method: (Foo)arg { // no error; MS ABI will call Foo's dtor, but we skip the access check.
|
/external/pdfium/third_party/ |
pdfiumbigint.mk | 11 LOCAL_CFLAGS += -Wno-non-virtual-dtor -Wall
|
/ndk/tests/device/test-stlport_shared-exception/jni/ |
eh29.cpp | 16 // printf("dtor %x\n", (int)this);
|
eh990323-1.cpp | 7 int dtor = 0; variable 13 ~A() {dtor++;} 73 if (!ctor || ctor != dtor)
|
/ndk/tests/device/test-stlport_static-exception/jni/ |
eh29.cpp | 16 // printf("dtor %x\n", (int)this);
|
eh990323-1.cpp | 7 int dtor = 0; variable 13 ~A() {dtor++;} 73 if (!ctor || ctor != dtor)
|
/external/clang/test/CodeGenCXX/ |
sanitize-dtor-repress-aliasing.cpp | 1 // Test -fsanitize-memory-use-after-dtor 2 // RUN: %clang_cc1 -fsanitize=memory -O1 -fsanitize-memory-use-after-dtor -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s 3 // RUN: %clang_cc1 -fsanitize=memory -O2 -fsanitize-memory-use-after-dtor -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s
|
sanitize-dtor-derived-class.cpp | 1 // RUN: %clang_cc1 -fsanitize=memory -fsanitize-memory-use-after-dtor -disable-llvm-optzns -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s 2 // RUN: %clang_cc1 -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -disable-llvm-optzns -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s 4 // Base dtor poisons members 5 // Complete dtor poisons vtable ptr after destroying members and
|
/external/compiler-rt/test/msan/ |
dtor-trivial.cpp | 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1 3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1 5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
|
use-after-dtor.cc | 1 // RUN: %clangxx_msan %s -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1 4 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1 7 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1 10 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -fsanitize-memory-track-origins -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1 38 // CHECK: {{#0 0x.* in main.*use-after-dtor.cc:}}[[@LINE-3]]
|
dtor-base-access.cc | 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1 3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1 5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
|
dtor-derived-class.cc | 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1 2 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1 3 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
|
dtor-bit-fields.cc | 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t 3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t 5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t 10 // TODO: remove empty dtors when msan use-after-dtor poisons
|
/external/ltrace/ |
vect.c | 55 void (*dtor)(void *elt, void *data), 63 assert(dtor == NULL); 67 assert(dtor != NULL); 80 if (dtor != NULL) 82 dtor(slot(target, i), data); 133 void (*dtor)(void *emt, void *data), void *data) 139 if (dtor != NULL) { 142 dtor(slot(vec, i), data); 153 void (*dtor)(void *emt, void *data), void *data) 156 vect_erase(vec, vect_size(vec)-1, vect_size(vec), dtor, data) [all...] |
/toolchain/binutils/binutils-2.25/ld/scripttempl/ |
armcoff.sc | 23 DTOR='.dtor : { 25 *(.dtor) 55 LONG (-1); *(.dtors); *(.dtor); LONG (0); } 75 ${CONSTRUCTING+${RELOCATING-$DTOR}}
|
i386go32.sc | 18 DTOR='.dtor : { 20 *(.dtor) 53 *(.dtor) 69 ${CONSTRUCTING+${RELOCATING-$DTOR}}
|
/external/google-breakpad/src/testing/gtest/test/ |
gtest-linked_ptr_test.cc | 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; } 60 ~B() { *history << "B" << mynum << " dtor\n"; } 142 "B2 dtor\n" 143 "A2 dtor\n" 148 "A0 dtor\n" 149 "A3 dtor\n" 150 "A1 dtor\n",
|
/external/gtest/test/ |
gtest-linked_ptr_test.cc | 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; } 60 ~B() { *history << "B" << mynum << " dtor\n"; } 142 "B2 dtor\n" 143 "A2 dtor\n" 148 "A0 dtor\n" 149 "A3 dtor\n" 150 "A1 dtor\n",
|
/external/protobuf/gtest/test/ |
gtest-linked_ptr_test.cc | 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; } 60 ~B() { *history << "B" << mynum << " dtor\n"; } 141 "B2 dtor\n" 142 "A2 dtor\n" 147 "A0 dtor\n" 148 "A3 dtor\n" 149 "A1 dtor\n",
|
/external/vulkan-validation-layers/tests/gtest-1.7.0/test/ |
gtest-linked_ptr_test.cc | 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; } 60 ~B() { *history << "B" << mynum << " dtor\n"; } 142 "B2 dtor\n" 143 "A2 dtor\n" 148 "A0 dtor\n" 149 "A3 dtor\n" 150 "A1 dtor\n",
|
/ndk/sources/third_party/googletest/googletest/test/ |
gtest-linked_ptr_test.cc | 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; } 60 ~B() { *history << "B" << mynum << " dtor\n"; } 142 "B2 dtor\n" 143 "A2 dtor\n" 148 "A0 dtor\n" 149 "A3 dtor\n" 150 "A1 dtor\n",
|
/external/clang/test/CXX/class/class.union/ |
p1.cpp | 34 class Dtor { 35 ~Dtor() { abort(); } // expected-note 2 {{because type 'Dtor' has a user-provided destructor}} expected-note 2{{here}} 46 Dtor dtor; // expected-error {{union member 'dtor' has a non-trivial destructor}} member in union:U1 70 Dtor dtor; // expected-note {{because field of type 'Dtor' has a user-provided destructor}} member in struct:U2::__anon8413 90 struct s6 : Dtor { // expected-note {{because base class of type 'Dtor' has a user-provided destructor} [all...] |
/external/clang/test/Analysis/ |
temporaries.cpp | 115 struct Dtor { 116 ~Dtor(); 119 extern bool check(const Dtor &); 124 if (coin() && (coin() || coin() || check(Dtor()))) { 125 Dtor(); 302 []() { check(NoReturnDtor()); } != nullptr || check(Dtor()); 328 // ~Dtor should run before ~NoReturnDtor() because construction order is 330 if (!value || check((NoReturnDtor(), Dtor())) || value) { 371 check(Dtor()) && 372 (check(NoReturnDtor()) || check(NoReturnDtor())) && check(Dtor()); [all...] |
/external/llvm/test/CodeGen/X86/ |
cleanuppad-realign.ll | 5 declare void @Dtor(i64* %o) 16 call void @Dtor(i64* %o) 21 call void @Dtor(i64* %o) [ "funclet"(token %0) ] 36 ; The last EH reg field is the state number, so dtor adjust is this +4. 39 ; X86-LABEL: "?dtor$2@?0?realigned_cleanup@4HA": 64 ; X64-LABEL: "?dtor$2@?0?realigned_cleanup@4HA":
|
/external/libchrome/base/ |
lazy_instance.cc | 42 void (*dtor)(void*)) { 49 if (dtor) 50 AtExitManager::RegisterCallback(dtor, lazy_instance);
|