HomeSort by relevance Sort by last modified time
    Searched full:poison (Results 1 - 25 of 225) sorted by null

1 2 3 4 5 6 7 8 9

  /external/clang/test/Preprocessor/
pragma_poison.c 3 #pragma GCC poison rindex
6 #define BAR _Pragma ("GCC poison XYZW") XYZW /*NO ERROR*/
11 // Pragma poison shouldn't warn from macro expansions defined before the token
15 #pragma GCC poison rindex2
17 // Can poison multiple times.
18 #pragma GCC poison rindex2
  /external/v8/test/mjsunit/regress/
regress-builtinbust-5.js 7 function poison() { was_called = true; } function
8 a.hasOwnProperty = poison;
  /external/compiler-rt/test/asan/TestCases/
use-after-poison.cc 16 // CHECK: ERROR: AddressSanitizer: use-after-poison
17 // CHECK: main{{.*}}use-after-poison.cc:[[@LINE-2]]
  /prebuilts/go/darwin-x86/test/fixedbugs/
issue8155.go 34 func poison() uintptr {
46 poison()
  /prebuilts/go/linux-x86/test/fixedbugs/
issue8155.go 34 func poison() uintptr {
46 poison()
  /prebuilts/go/darwin-x86/test/
clearfat.go 26 calls.WriteString(strings.Replace("poison$()\n\tclearfat$()\n\t", "$", s, -1))
49 func poison$() {
50 // Grow and poison the stack space that will be used by clearfat$
  /prebuilts/go/linux-x86/test/
clearfat.go 26 calls.WriteString(strings.Replace("poison$()\n\tclearfat$()\n\t", "$", s, -1))
49 func poison$() {
50 // Grow and poison the stack space that will be used by clearfat$
  /external/clang/test/CodeGenCXX/
sanitize-dtor-nontrivial-virtual-base.cpp 61 // poison 2 ints
66 // poison int and double
71 // poison int, ignore vector, poison int
79 // poison int
sanitize-dtor-vtable.cpp 26 // After invoking base dtor and dtor for virtual base, poison vtable ptr.
36 // Since no virtual bases, poison vtable ptr here.
43 // Poison members
sanitize-dtor-derived-class.cpp 32 // Invoke base destructor. No vtable pointer to poison.
45 // Invokes base destructor, and poison vtable pointer.
58 // Poison members and vtable ptr.
65 // Poison members and destroy non-virtual base.
  /external/compiler-rt/test/asan/TestCases/Posix/
new_array_cookie_with_new_from_class.cc 1 // Test that we do not poison the array cookie if the operator new is defined
halt_on_error-torture.cc 7 // RUN: [ $(grep -c 'ERROR: AddressSanitizer: use-after-poison' 1.txt) -eq 10 ]
47 // CHECK: ERROR: AddressSanitizer: use-after-poison
  /external/libcxx/test/support/
user_defined_integral.hpp 13 // Poison the arithmetic and comparison operations
  /packages/apps/Camera2/src/com/android/camera/async/
ConcurrentBufferQueue.java 55 * An entry can either be a {@link T} or a special "poison-pill" marker
122 // Keep feeding any currently-waiting consumer threads "poison pill"
126 // Note that this also ensures that there is a poison pill in the
158 // Always keep a poison-pill in the queue to avoid a race condition
200 // Always keep a poison-pill in the queue to avoid a race
  /external/llvm/include/llvm/ADT/
Optional.h 153 /// \brief Poison comparison between two \c Optional objects. Clients needs to
181 /// \brief Poison comparison between two \c Optional objects. Clients needs to
190 /// \brief Poison comparison between two \c Optional objects. Clients needs to
199 /// \brief Poison comparison between two \c Optional objects. Clients needs to
208 /// \brief Poison comparison between two \c Optional objects. Clients needs to
217 /// \brief Poison comparison between two \c Optional objects. Clients needs to
  /external/bison/m4/
fcntl_h.m4 22 dnl Check for declarations of anything we want to poison if the
sys_wait_h.m4 17 dnl Check for declarations of anything we want to poison if the
  /external/compiler-rt/test/asan/TestCases/Windows/
dll_poison_unpoison.cc 25 // CHECK: AddressSanitizer: use-after-poison on address [[ADDR:0x[0-9a-f]+]]