/external/clang/test/Preprocessor/ |
pragma_poison.c | 3 #pragma GCC poison rindex 6 #define BAR _Pragma ("GCC poison XYZW") XYZW /*NO ERROR*/ 11 // Pragma poison shouldn't warn from macro expansions defined before the token 15 #pragma GCC poison rindex2 17 // Can poison multiple times. 18 #pragma GCC poison rindex2
|
/external/v8/test/mjsunit/regress/ |
regress-builtinbust-5.js | 7 function poison() { was_called = true; } function 8 a.hasOwnProperty = poison;
|
/external/compiler-rt/test/asan/TestCases/ |
use-after-poison.cc | 16 // CHECK: ERROR: AddressSanitizer: use-after-poison 17 // CHECK: main{{.*}}use-after-poison.cc:[[@LINE-2]]
|
/prebuilts/go/darwin-x86/test/fixedbugs/ |
issue8155.go | 34 func poison() uintptr { func 46 poison()
|
/prebuilts/go/linux-x86/test/fixedbugs/ |
issue8155.go | 34 func poison() uintptr { func 46 poison()
|
/prebuilts/go/darwin-x86/test/ |
clearfat.go | 26 calls.WriteString(strings.Replace("poison$()\n\tclearfat$()\n\t", "$", s, -1)) 49 func poison$() { 50 // Grow and poison the stack space that will be used by clearfat$
|
/prebuilts/go/linux-x86/test/ |
clearfat.go | 26 calls.WriteString(strings.Replace("poison$()\n\tclearfat$()\n\t", "$", s, -1)) 49 func poison$() { 50 // Grow and poison the stack space that will be used by clearfat$
|
/external/clang/test/CodeGenCXX/ |
sanitize-dtor-nontrivial-virtual-base.cpp | 61 // poison 2 ints 66 // poison int and double 71 // poison int, ignore vector, poison int 79 // poison int
|
sanitize-dtor-vtable.cpp | 26 // After invoking base dtor and dtor for virtual base, poison vtable ptr. 36 // Since no virtual bases, poison vtable ptr here. 43 // Poison members
|
sanitize-dtor-derived-class.cpp | 32 // Invoke base destructor. No vtable pointer to poison. 45 // Invokes base destructor, and poison vtable pointer. 58 // Poison members and vtable ptr. 65 // Poison members and destroy non-virtual base.
|
/external/compiler-rt/test/asan/TestCases/Posix/ |
new_array_cookie_with_new_from_class.cc | 1 // Test that we do not poison the array cookie if the operator new is defined
|
halt_on_error-torture.cc | 7 // RUN: [ $(grep -c 'ERROR: AddressSanitizer: use-after-poison' 1.txt) -eq 10 ] 47 // CHECK: ERROR: AddressSanitizer: use-after-poison
|
/external/libcxx/test/support/ |
user_defined_integral.hpp | 13 // Poison the arithmetic and comparison operations
|
/packages/apps/Camera2/src/com/android/camera/async/ |
ConcurrentBufferQueue.java | 55 * An entry can either be a {@link T} or a special "poison-pill" marker 122 // Keep feeding any currently-waiting consumer threads "poison pill" 126 // Note that this also ensures that there is a poison pill in the 158 // Always keep a poison-pill in the queue to avoid a race condition 200 // Always keep a poison-pill in the queue to avoid a race
|
/external/llvm/include/llvm/ADT/ |
Optional.h | 153 /// \brief Poison comparison between two \c Optional objects. Clients needs to 181 /// \brief Poison comparison between two \c Optional objects. Clients needs to 190 /// \brief Poison comparison between two \c Optional objects. Clients needs to 199 /// \brief Poison comparison between two \c Optional objects. Clients needs to 208 /// \brief Poison comparison between two \c Optional objects. Clients needs to 217 /// \brief Poison comparison between two \c Optional objects. Clients needs to
|
/external/bison/m4/ |
fcntl_h.m4 | 22 dnl Check for declarations of anything we want to poison if the
|
sys_wait_h.m4 | 17 dnl Check for declarations of anything we want to poison if the
|
/external/compiler-rt/test/asan/TestCases/Windows/ |
dll_poison_unpoison.cc | 25 // CHECK: AddressSanitizer: use-after-poison on address [[ADDR:0x[0-9a-f]+]]
|
/external/conscrypt/src/test/resources/ |
README | 8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/lib/gcc/x86_64-w64-mingw32/4.8.3/plugin/include/ |
system.h | 738 /* As the last action in this file, we poison the identifiers that 763 system.h while doing so. Only poison these tokens if actually 769 #pragma GCC poison calloc strdup 774 #pragma GCC poison malloc realloc 781 #pragma GCC poison strerror 786 #pragma GCC poison loc_t 789 #pragma GCC poison ASM_OPEN_PAREN ASM_CLOSE_PAREN \ 831 #pragma GCC poison DECLARE_LIBRARY_RENAMES LIBGCC2_GNU_PREFIX \ 838 #pragma GCC poison INT_ASM_OP ASM_OUTPUT_EH_REGION_BEG CPP_PREDEFINES \ 912 #pragma GCC poison LANG_HOOKS_FUNCTION_MARK LANG_HOOKS_FUNCTION_FREE [all...] |
/external/compiler-rt/lib/asan/ |
asan_poisoning.cc | 75 void AsanPoisonOrUnpoisonIntraObjectRedzone(uptr ptr, uptr size, bool poison) { 79 poison ? "" : "un", ptr, end, size); 88 poison ? static_cast<u8>(ptr % SHADOW_GRANULARITY) : 0; 93 *(u8*)MemToShadow(ptr) = poison ? kAsanIntraObjectRedzone : 0; 107 // * if user asks to poison region [left, right), the program poisons 115 VPrintf(3, "Trying to poison memory region [%p, %p)\n", (void *)beg_addr, 123 // We can only poison memory if the byte in end.offset is unaddressable. 124 // No need to re-poison memory if it is poisoned already. 145 // Poison if byte in end.offset is unaddressable.
|
/external/libopus/celt/ |
os_support.h | 87 #pragma GCC poison printf sprintf 88 #pragma GCC poison malloc free realloc calloc
|
/art/runtime/arch/arm64/ |
asm_support_arm64.S | 58 // Macros to poison (negate) the reference for heap poisoning.
|
/art/test/800-smali/smali/ |
b_21869691A.smali | 22 # If we do this before a correct invoke-virtual C.a(), we poison the dex cache with an incorrect
|
/external/compiler-rt/include/sanitizer/ |
asan_interface.h | 25 // this region is unpoisoned. This function is not guaranteed to poison 26 // the whole region - it may poison only subregion of [addr, addr+size) due 29 // (un)poison memory in the same memory region simultaneously. 37 // (un)poison memory in the same memory region simultaneously.
|