HomeSort by relevance Sort by last modified time
    Searched full:dtor (Results 26 - 50 of 662) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/clang/test/SemaObjCXX/
microsoft-abi-byval.mm 13 - (void) my_method: (Foo)arg { // no error; MS ABI will call Foo's dtor, but we skip the access check.
  /external/pdfium/third_party/
pdfiumbigint.mk 11 LOCAL_CFLAGS += -Wno-non-virtual-dtor -Wall
  /ndk/tests/device/test-stlport_shared-exception/jni/
eh29.cpp 16 // printf("dtor %x\n", (int)this);
eh990323-1.cpp 7 int dtor = 0; variable
13 ~A() {dtor++;}
73 if (!ctor || ctor != dtor)
  /ndk/tests/device/test-stlport_static-exception/jni/
eh29.cpp 16 // printf("dtor %x\n", (int)this);
eh990323-1.cpp 7 int dtor = 0; variable
13 ~A() {dtor++;}
73 if (!ctor || ctor != dtor)
  /external/clang/test/CodeGenCXX/
sanitize-dtor-repress-aliasing.cpp 1 // Test -fsanitize-memory-use-after-dtor
2 // RUN: %clang_cc1 -fsanitize=memory -O1 -fsanitize-memory-use-after-dtor -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s
3 // RUN: %clang_cc1 -fsanitize=memory -O2 -fsanitize-memory-use-after-dtor -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s
sanitize-dtor-derived-class.cpp 1 // RUN: %clang_cc1 -fsanitize=memory -fsanitize-memory-use-after-dtor -disable-llvm-optzns -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s
2 // RUN: %clang_cc1 -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -disable-llvm-optzns -std=c++11 -triple=x86_64-pc-linux -emit-llvm -o - %s | FileCheck %s
4 // Base dtor poisons members
5 // Complete dtor poisons vtable ptr after destroying members and
  /external/compiler-rt/test/msan/
dtor-trivial.cpp 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
use-after-dtor.cc 1 // RUN: %clangxx_msan %s -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1
4 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1
7 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1
10 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -fsanitize-memory-track-origins -o %t && MSAN_OPTIONS=poison_in_dtor=1 not %run %t >%t.out 2>&1
38 // CHECK: {{#0 0x.* in main.*use-after-dtor.cc:}}[[@LINE-3]]
dtor-base-access.cc 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
dtor-derived-class.cc 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
2 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
3 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out 2>&1
dtor-bit-fields.cc 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t
10 // TODO: remove empty dtors when msan use-after-dtor poisons
  /external/ltrace/
vect.c 55 void (*dtor)(void *elt, void *data),
63 assert(dtor == NULL);
67 assert(dtor != NULL);
80 if (dtor != NULL)
82 dtor(slot(target, i), data);
133 void (*dtor)(void *emt, void *data), void *data)
139 if (dtor != NULL) {
142 dtor(slot(vec, i), data);
153 void (*dtor)(void *emt, void *data), void *data)
156 vect_erase(vec, vect_size(vec)-1, vect_size(vec), dtor, data)
    [all...]
  /toolchain/binutils/binutils-2.25/ld/scripttempl/
armcoff.sc 23 DTOR='.dtor : {
25 *(.dtor)
55 LONG (-1); *(.dtors); *(.dtor); LONG (0); }
75 ${CONSTRUCTING+${RELOCATING-$DTOR}}
i386go32.sc 18 DTOR='.dtor : {
20 *(.dtor)
53 *(.dtor)
69 ${CONSTRUCTING+${RELOCATING-$DTOR}}
  /external/google-breakpad/src/testing/gtest/test/
gtest-linked_ptr_test.cc 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; }
60 ~B() { *history << "B" << mynum << " dtor\n"; }
142 "B2 dtor\n"
143 "A2 dtor\n"
148 "A0 dtor\n"
149 "A3 dtor\n"
150 "A1 dtor\n",
  /external/gtest/test/
gtest-linked_ptr_test.cc 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; }
60 ~B() { *history << "B" << mynum << " dtor\n"; }
142 "B2 dtor\n"
143 "A2 dtor\n"
148 "A0 dtor\n"
149 "A3 dtor\n"
150 "A1 dtor\n",
  /external/protobuf/gtest/test/
gtest-linked_ptr_test.cc 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; }
60 ~B() { *history << "B" << mynum << " dtor\n"; }
141 "B2 dtor\n"
142 "A2 dtor\n"
147 "A0 dtor\n"
148 "A3 dtor\n"
149 "A1 dtor\n",
  /external/vulkan-validation-layers/tests/gtest-1.7.0/test/
gtest-linked_ptr_test.cc 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; }
60 ~B() { *history << "B" << mynum << " dtor\n"; }
142 "B2 dtor\n"
143 "A2 dtor\n"
148 "A0 dtor\n"
149 "A3 dtor\n"
150 "A1 dtor\n",
  /ndk/sources/third_party/googletest/googletest/test/
gtest-linked_ptr_test.cc 50 virtual ~A() { *history << "A" << mynum << " dtor\n"; }
60 ~B() { *history << "B" << mynum << " dtor\n"; }
142 "B2 dtor\n"
143 "A2 dtor\n"
148 "A0 dtor\n"
149 "A3 dtor\n"
150 "A1 dtor\n",
  /external/clang/test/CXX/class/class.union/
p1.cpp 34 class Dtor {
35 ~Dtor() { abort(); } // expected-note 2 {{because type 'Dtor' has a user-provided destructor}} expected-note 2{{here}}
46 Dtor dtor; // expected-error {{union member 'dtor' has a non-trivial destructor}} member in union:U1
70 Dtor dtor; // expected-note {{because field of type 'Dtor' has a user-provided destructor}} member in struct:U2::__anon8413
90 struct s6 : Dtor { // expected-note {{because base class of type 'Dtor' has a user-provided destructor}
    [all...]
  /external/clang/test/Analysis/
temporaries.cpp 115 struct Dtor {
116 ~Dtor();
119 extern bool check(const Dtor &);
124 if (coin() && (coin() || coin() || check(Dtor()))) {
125 Dtor();
302 []() { check(NoReturnDtor()); } != nullptr || check(Dtor());
328 // ~Dtor should run before ~NoReturnDtor() because construction order is
330 if (!value || check((NoReturnDtor(), Dtor())) || value) {
371 check(Dtor()) &&
372 (check(NoReturnDtor()) || check(NoReturnDtor())) && check(Dtor());
    [all...]
  /external/llvm/test/CodeGen/X86/
cleanuppad-realign.ll 5 declare void @Dtor(i64* %o)
16 call void @Dtor(i64* %o)
21 call void @Dtor(i64* %o) [ "funclet"(token %0) ]
36 ; The last EH reg field is the state number, so dtor adjust is this +4.
39 ; X86-LABEL: "?dtor$2@?0?realigned_cleanup@4HA":
64 ; X64-LABEL: "?dtor$2@?0?realigned_cleanup@4HA":
  /external/libchrome/base/
lazy_instance.cc 42 void (*dtor)(void*)) {
49 if (dtor)
50 AtExitManager::RegisterCallback(dtor, lazy_instance);

Completed in 753 milliseconds

12 3 4 5 6 7 8 91011>>