HomeSort by relevance Sort by last modified time
    Searched full:poison (Results 1 - 25 of 222) sorted by null

1 2 3 4 5 6 7 8 9

  /external/clang/test/Preprocessor/
pragma_poison.c 3 #pragma GCC poison rindex
6 #define BAR _Pragma ("GCC poison XYZW") XYZW /*NO ERROR*/
11 // Pragma poison shouldn't warn from macro expansions defined before the token
15 #pragma GCC poison rindex2
17 // Can poison multiple times.
18 #pragma GCC poison rindex2
  /external/v8/test/mjsunit/regress/
regress-builtinbust-5.js 7 function poison() { was_called = true; } function
8 a.hasOwnProperty = poison;
  /external/compiler-rt/test/asan/TestCases/
use-after-poison.cc 16 // CHECK: ERROR: AddressSanitizer: use-after-poison
17 // CHECK: main{{.*}}use-after-poison.cc:[[@LINE-2]]
  /prebuilts/go/darwin-x86/test/fixedbugs/
issue8155.go 34 func poison() uintptr { func
46 poison()
  /prebuilts/go/linux-x86/test/fixedbugs/
issue8155.go 34 func poison() uintptr { func
46 poison()
  /prebuilts/go/darwin-x86/test/
clearfat.go 26 calls.WriteString(strings.Replace("poison$()\n\tclearfat$()\n\t", "$", s, -1))
49 func poison$() {
50 // Grow and poison the stack space that will be used by clearfat$
  /prebuilts/go/linux-x86/test/
clearfat.go 26 calls.WriteString(strings.Replace("poison$()\n\tclearfat$()\n\t", "$", s, -1))
49 func poison$() {
50 // Grow and poison the stack space that will be used by clearfat$
  /external/clang/test/CodeGenCXX/
sanitize-dtor-nontrivial-virtual-base.cpp 61 // poison 2 ints
66 // poison int and double
71 // poison int, ignore vector, poison int
79 // poison int
sanitize-dtor-vtable.cpp 26 // After invoking base dtor and dtor for virtual base, poison vtable ptr.
36 // Since no virtual bases, poison vtable ptr here.
43 // Poison members
sanitize-dtor-derived-class.cpp 32 // Invoke base destructor. No vtable pointer to poison.
45 // Invokes base destructor, and poison vtable pointer.
58 // Poison members and vtable ptr.
65 // Poison members and destroy non-virtual base.
  /external/compiler-rt/test/asan/TestCases/Posix/
new_array_cookie_with_new_from_class.cc 1 // Test that we do not poison the array cookie if the operator new is defined
halt_on_error-torture.cc 7 // RUN: [ $(grep -c 'ERROR: AddressSanitizer: use-after-poison' 1.txt) -eq 10 ]
47 // CHECK: ERROR: AddressSanitizer: use-after-poison
  /external/libcxx/test/support/
user_defined_integral.hpp 13 // Poison the arithmetic and comparison operations
  /packages/apps/Camera2/src/com/android/camera/async/
ConcurrentBufferQueue.java 55 * An entry can either be a {@link T} or a special "poison-pill" marker
122 // Keep feeding any currently-waiting consumer threads "poison pill"
126 // Note that this also ensures that there is a poison pill in the
158 // Always keep a poison-pill in the queue to avoid a race condition
200 // Always keep a poison-pill in the queue to avoid a race
  /external/llvm/include/llvm/ADT/
Optional.h 153 /// \brief Poison comparison between two \c Optional objects. Clients needs to
181 /// \brief Poison comparison between two \c Optional objects. Clients needs to
190 /// \brief Poison comparison between two \c Optional objects. Clients needs to
199 /// \brief Poison comparison between two \c Optional objects. Clients needs to
208 /// \brief Poison comparison between two \c Optional objects. Clients needs to
217 /// \brief Poison comparison between two \c Optional objects. Clients needs to
  /external/bison/m4/
fcntl_h.m4 22 dnl Check for declarations of anything we want to poison if the
sys_wait_h.m4 17 dnl Check for declarations of anything we want to poison if the
  /external/compiler-rt/test/asan/TestCases/Windows/
dll_poison_unpoison.cc 25 // CHECK: AddressSanitizer: use-after-poison on address [[ADDR:0x[0-9a-f]+]]
  /external/conscrypt/src/test/resources/
README 8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/lib/gcc/x86_64-w64-mingw32/4.8.3/plugin/include/
system.h 738 /* As the last action in this file, we poison the identifiers that
763 system.h while doing so. Only poison these tokens if actually
769 #pragma GCC poison calloc strdup
774 #pragma GCC poison malloc realloc
781 #pragma GCC poison strerror
786 #pragma GCC poison loc_t
789 #pragma GCC poison ASM_OPEN_PAREN ASM_CLOSE_PAREN \
831 #pragma GCC poison DECLARE_LIBRARY_RENAMES LIBGCC2_GNU_PREFIX \
838 #pragma GCC poison INT_ASM_OP ASM_OUTPUT_EH_REGION_BEG CPP_PREDEFINES \
912 #pragma GCC poison LANG_HOOKS_FUNCTION_MARK LANG_HOOKS_FUNCTION_FREE
    [all...]
  /external/compiler-rt/lib/asan/
asan_poisoning.cc 75 void AsanPoisonOrUnpoisonIntraObjectRedzone(uptr ptr, uptr size, bool poison) {
79 poison ? "" : "un", ptr, end, size);
88 poison ? static_cast<u8>(ptr % SHADOW_GRANULARITY) : 0;
93 *(u8*)MemToShadow(ptr) = poison ? kAsanIntraObjectRedzone : 0;
107 // * if user asks to poison region [left, right), the program poisons
115 VPrintf(3, "Trying to poison memory region [%p, %p)\n", (void *)beg_addr,
123 // We can only poison memory if the byte in end.offset is unaddressable.
124 // No need to re-poison memory if it is poisoned already.
145 // Poison if byte in end.offset is unaddressable.
  /external/libopus/celt/
os_support.h 87 #pragma GCC poison printf sprintf
88 #pragma GCC poison malloc free realloc calloc
  /art/runtime/arch/arm64/
asm_support_arm64.S 58 // Macros to poison (negate) the reference for heap poisoning.
  /art/test/800-smali/smali/
b_21869691A.smali 22 # If we do this before a correct invoke-virtual C.a(), we poison the dex cache with an incorrect
  /external/compiler-rt/include/sanitizer/
asan_interface.h 25 // this region is unpoisoned. This function is not guaranteed to poison
26 // the whole region - it may poison only subregion of [addr, addr+size) due
29 // (un)poison memory in the same memory region simultaneously.
37 // (un)poison memory in the same memory region simultaneously.

Completed in 1203 milliseconds

1 2 3 4 5 6 7 8 9