HomeSort by relevance Sort by last modified time
    Searched full:poison (Results 26 - 50 of 222) sorted by null

12 3 4 5 6 7 8 9

  /external/llvm/test/Instrumentation/AddressSanitizer/
stack-poisoning.ll 22 ; Then Block: poison the entire frame.
  /prebuilts/clang/host/darwin-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/clang/host/darwin-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/clang/host/darwin-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/clang/host/linux-x86/3.8/lib/clang/3.8/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/clang/host/linux-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/clang/host/linux-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/clang/host/linux-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/clang/linux-x86/host/3.6/lib/clang/3.6/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/asm-generic/
mman-common.h 37 #define MADV_HWPOISON 100 /* poison a page for testing */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/asm-generic/
mman-common.h 42 #define MADV_HWPOISON 100 /* poison a page for testing */
  /external/bison/build-aux/snippet/
warn-on-use.h 41 For an example, it is possible to poison 'getline' by:
52 It is not possible to directly poison global variables. But it is
53 possible to write a wrapper accessor function, and poison that
  /external/compiler-rt/test/asan/TestCases/
memset_test.cc 48 // CHECK-MEMSET: AddressSanitizer: use-after-poison on address
54 // CHECK-MEMCPY: AddressSanitizer: use-after-poison on address
59 // CHECK-MEMMOVE: AddressSanitizer: use-after-poison on address
  /external/llvm/test/Bitcode/
constantsTest.3.2.ll 66 ;poison
67 ; CHECK-NEXT: %poison = sub nuw i32 0, 1
68 %poison = sub nuw i32 0, 1
  /external/llvm/include/llvm/Analysis/
ValueTracking.h 363 /// full-poison (all bits poison) if at least one of its operands are
364 /// full-poison (all bits poison).
366 /// The exact rules for how poison propagates through instructions have
368 /// and only considers poison to be propagated in uncontroversial
370 /// poison.
374 /// undefined behavior if I is executed and that operand has a full-poison
375 /// value (all bits poison).
379 /// and yields a full-poison value (all bits poison), then that wil
    [all...]
  /external/llvm/test/Analysis/ScalarEvolution/
flags-from-poison.ll 4 ; reasoning about how a poison value from overflow would trigger
60 ; With no load to trigger UB from poison, we cannot infer nsw.
155 ; producer of poison and the load that consumes it.
177 ; Without inbounds, GEP does not propagate poison in the very
199 ; Multiplication by a non-zero constant propagates poison if there is
222 ; Multiplication by a non-constant should not propagate poison in the
245 ; Multiplication by a non-zero constant does not propagate poison
268 ; Division by poison triggers UB.
288 ; Remainder of poison by non-poison divisor does not trigger UB
    [all...]
  /external/compiler-rt/lib/asan/tests/
asan_interface_test.cc 154 static const char* kUseAfterPoisonErrorMessage = "use-after-poison";
164 // poison array[40..80)
182 // Poison [0..40) and [80..120)
188 // Poison whole array - [0..120)
243 // Poison [l1, l1+s1), [l2, l2+s2) and check result.
367 static const char *kInvalidPoisonMessage = "invalid-poison-memory-range";
380 // Try to poison not owned memory.
  /external/clang/lib/Lex/
Preprocessor.cpp 112 // "Poison" __VA_ARGS__, which can only appear in the expansion of a macro.
280 llvm::errs() << "\n Poison Reasons: "
576 void Preprocessor::PoisonSEHIdentifiers(bool Poison) {
579 Ident__exception_code->setIsPoisoned(Poison);
580 Ident___exception_code->setIsPoisoned(Poison);
581 Ident_GetExceptionCode->setIsPoisoned(Poison);
582 Ident__exception_info->setIsPoisoned(Poison);
583 Ident___exception_info->setIsPoisoned(Poison);
584 Ident_GetExceptionInfo->setIsPoisoned(Poison);
585 Ident__abnormal_termination->setIsPoisoned(Poison);
    [all...]
  /external/compiler-rt/lib/asan/
asan_flags.inc 89 "Poison (or not) the heap memory on [de]allocation. Zero value is useful "
92 "If true, poison partially addressable 8-byte aligned words "
96 "Poison (or not) the array cookie after operator new[].")
  /external/v8/src/
zone.cc 144 // Un-poison first so the zapping doesn't trigger ASan complaints.
162 // Un-poison so we can re-use the segment later.
188 // Un-poison first so the zapping doesn't trigger ASan complaints.
  /external/autotest/client/tests/scrashme/
scrashme.py 30 -P: poison buffers before calling syscall, and check afterwards.
  /external/bison/m4/
signal_h.m4 31 dnl Check for declarations of anything we want to poison if the
warn-on-use.m4 13 # See warn-on-use.h for some hints on how to poison function names, as
  /external/clang/test/Preprocessor/
macro_paste_bad.c 27 #pragma GCC poison BLARG
  /external/compiler-rt/test/asan/TestCases/Posix/
halt_on_error-signals.c 31 // CHECK-NO-COLLISION: AddressSanitizer: use-after-poison

Completed in 508 milliseconds

12 3 4 5 6 7 8 9