OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:poison
(Results
26 - 50
of
222
) sorted by null
1
2
3
4
5
6
7
8
9
/external/llvm/test/Instrumentation/AddressSanitizer/
stack-poisoning.ll
22
; Then Block:
poison
the entire frame.
/prebuilts/clang/host/darwin-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/clang/host/darwin-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/clang/host/darwin-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/clang/host/linux-x86/3.8/lib/clang/3.8/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/clang/host/linux-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/clang/host/linux-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/clang/host/linux-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/clang/linux-x86/host/3.6/lib/clang/3.6/include/sanitizer/
asan_interface.h
25
// this region is unpoisoned. This function is not guaranteed to
poison
26
// the whole region - it may
poison
only subregion of [addr, addr+size) due
29
// (un)
poison
memory in the same memory region simultaneously.
37
// (un)
poison
memory in the same memory region simultaneously.
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/asm-generic/
mman-common.h
37
#define MADV_HWPOISON 100 /*
poison
a page for testing */
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/asm-generic/
mman-common.h
42
#define MADV_HWPOISON 100 /*
poison
a page for testing */
/external/bison/build-aux/snippet/
warn-on-use.h
41
For an example, it is possible to
poison
'getline' by:
52
It is not possible to directly
poison
global variables. But it is
53
possible to write a wrapper accessor function, and
poison
that
/external/compiler-rt/test/asan/TestCases/
memset_test.cc
48
// CHECK-MEMSET: AddressSanitizer: use-after-
poison
on address
54
// CHECK-MEMCPY: AddressSanitizer: use-after-
poison
on address
59
// CHECK-MEMMOVE: AddressSanitizer: use-after-
poison
on address
/external/llvm/test/Bitcode/
constantsTest.3.2.ll
66
;
poison
67
; CHECK-NEXT: %
poison
= sub nuw i32 0, 1
68
%
poison
= sub nuw i32 0, 1
/external/llvm/include/llvm/Analysis/
ValueTracking.h
363
/// full-
poison
(all bits
poison
) if at least one of its operands are
364
/// full-
poison
(all bits
poison
).
366
/// The exact rules for how
poison
propagates through instructions have
368
/// and only considers
poison
to be propagated in uncontroversial
370
///
poison
.
374
/// undefined behavior if I is executed and that operand has a full-
poison
375
/// value (all bits
poison
).
379
/// and yields a full-
poison
value (all bits poison), then that wil
[
all
...]
/external/llvm/test/Analysis/ScalarEvolution/
flags-from-poison.ll
4
; reasoning about how a
poison
value from overflow would trigger
60
; With no load to trigger UB from
poison
, we cannot infer nsw.
155
; producer of
poison
and the load that consumes it.
177
; Without inbounds, GEP does not propagate
poison
in the very
199
; Multiplication by a non-zero constant propagates
poison
if there is
222
; Multiplication by a non-constant should not propagate
poison
in the
245
; Multiplication by a non-zero constant does not propagate
poison
268
; Division by
poison
triggers UB.
288
; Remainder of
poison
by non-
poison
divisor does not trigger UB
[
all
...]
/external/compiler-rt/lib/asan/tests/
asan_interface_test.cc
154
static const char* kUseAfterPoisonErrorMessage = "use-after-
poison
";
164
//
poison
array[40..80)
182
//
Poison
[0..40) and [80..120)
188
//
Poison
whole array - [0..120)
243
//
Poison
[l1, l1+s1), [l2, l2+s2) and check result.
367
static const char *kInvalidPoisonMessage = "invalid-
poison
-memory-range";
380
// Try to
poison
not owned memory.
/external/clang/lib/Lex/
Preprocessor.cpp
112
// "
Poison
" __VA_ARGS__, which can only appear in the expansion of a macro.
280
llvm::errs() << "\n
Poison
Reasons: "
576
void Preprocessor::PoisonSEHIdentifiers(bool
Poison
) {
579
Ident__exception_code->setIsPoisoned(
Poison
);
580
Ident___exception_code->setIsPoisoned(
Poison
);
581
Ident_GetExceptionCode->setIsPoisoned(
Poison
);
582
Ident__exception_info->setIsPoisoned(
Poison
);
583
Ident___exception_info->setIsPoisoned(
Poison
);
584
Ident_GetExceptionInfo->setIsPoisoned(
Poison
);
585
Ident__abnormal_termination->setIsPoisoned(
Poison
);
[
all
...]
/external/compiler-rt/lib/asan/
asan_flags.inc
89
"
Poison
(or not) the heap memory on [de]allocation. Zero value is useful "
92
"If true,
poison
partially addressable 8-byte aligned words "
96
"
Poison
(or not) the array cookie after operator new[].")
/external/v8/src/
zone.cc
144
// Un-
poison
first so the zapping doesn't trigger ASan complaints.
162
// Un-
poison
so we can re-use the segment later.
188
// Un-
poison
first so the zapping doesn't trigger ASan complaints.
/external/autotest/client/tests/scrashme/
scrashme.py
30
-P:
poison
buffers before calling syscall, and check afterwards.
/external/bison/m4/
signal_h.m4
31
dnl Check for declarations of anything we want to
poison
if the
warn-on-use.m4
13
# See warn-on-use.h for some hints on how to
poison
function names, as
/external/clang/test/Preprocessor/
macro_paste_bad.c
27
#pragma GCC
poison
BLARG
/external/compiler-rt/test/asan/TestCases/Posix/
halt_on_error-signals.c
31
// CHECK-NO-COLLISION: AddressSanitizer: use-after-
poison
Completed in 508 milliseconds
1
2
3
4
5
6
7
8
9