HomeSort by relevance Sort by last modified time
    Searched full:poisoned (Results 1 - 25 of 159) sorted by null

1 2 3 4 5 6 7

  /external/clang/test/Preprocessor/
pragma_poison.c 4 rindex(some_string, 'h'); // expected-error {{attempt to use a poisoned identifier}}
9 XYZW // expected-error {{attempt to use a poisoned identifier}}
12 // is poisoned.
macro_paste_bad.c 26 // When pasting creates poisoned identifiers, we error.
28 BLARG // expected-error {{attempt to use a poisoned identifier}}
30 XX // expected-error {{attempt to use a poisoned identifier}}
  /external/compiler-rt/test/asan/TestCases/Windows/
longjmp.cc 16 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
21 fprintf(stderr, "After: %p poisoned: %d\n", &x,
throw_catch.cc 40 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
47 fprintf(stderr, "After: %p poisoned: %d\n", &x,
58 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
62 fprintf(stderr, "After: %p poisoned: %d\n", &x,
seh.cc 48 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
52 fprintf(stderr, "After: %p poisoned: %d\n", &x,
dll_seh.cc 49 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
53 fprintf(stderr, "After: %p poisoned: %d\n", &x,
  /external/compiler-rt/test/asan/TestCases/
longjmp.cc 13 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
18 fprintf(stderr, "After: %p poisoned: %d\n", &x,
throw_catch.cc 29 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
33 fprintf(stderr, "After: %p poisoned: %d\n", &x,
44 fprintf(stderr, "Before: %p poisoned: %d\n", &x,
52 fprintf(stderr, "After: %p poisoned: %d\n", &x,
alloca_vla_interact.cc 25 // This should be first poisoned address after loop.
contiguous_container_crash.cc 26 return (int)t[60 * one]; // Touches the poisoned memory.
  /external/compiler-rt/test/msan/
dtor-member.cc 41 printf("s is poisoned\n");
43 printf("s is not poisoned\n");
44 // CHECK: s is poisoned
45 // CHECK-NO-FLAG: s is not poisoned
getaddrinfo.cc 20 // stack-allocated buffer, which is very likely to be poisoned. Test that we
param_tls_limit.cc 17 // This test passes poisoned values through function argument list.
20 // In case of no overflow, it is still poisoned.
signal_stress_test.cc 14 void f(bool poisoned, int n, ...) {
19 if (!poisoned)
dtor-multiple-inheritance.cc 28 // Memory owned by subclasses is poisoned.
43 // Memory in sibling and subclass is poisoned.
59 // Memory in subclasses is poisoned.
  /external/compiler-rt/lib/msan/tests/
msan_test.cc 200 T Poisoned(T v = 0, T s = (T)(-1)) {
338 x[2] = 1; // Init this here. Check that after realloc it is poisoned again.
350 EXPECT_NOT_POISONED(*x); // Should not be poisoned.
    [all...]
  /external/compiler-rt/test/lsan/TestCases/
use_poisoned_asan.cc 1 // ASan-poisoned memory should be ignored if use_poisoned is false.
  /external/clang/test/CodeGenCXX/
sanitize-dtor-callback.cpp 12 // Simple internal member is poisoned by compiler-generated dtor
22 // Simple internal member is poisoned by compiler-generated dtor
sanitize-dtor-tail-call.cpp 16 // Simple internal member is poisoned by compiler-generated dtor
  /external/compiler-rt/test/asan/TestCases/Linux/
swapcontext_test.cc 35 char x[32] = {0}; // Stack gets poisoned.
39 // (b) Jump into the original function. Stack remains poisoned unless we do
clone_test.cc 18 char x[32] = {0}; // Stack gets poisoned.
  /external/conscrypt/src/test/resources/
README 8 - cert-ct-poisoned.pem: Same certificate as cert.pem, but with an extra CT Poison extension
  /external/conscrypt/src/test/java/org/conscrypt/
OpenSSLX509CertificateTest.java 94 OpenSSLX509Certificate certPoisoned = loadTestCertificate("cert-ct-poisoned.pem");
109 OpenSSLX509Certificate certPoisoned = loadTestCertificate("cert-ct-poisoned.pem");
  /external/v8/test/mjsunit/regress/
regress-2564.js 74 // The rest are poisoned by the first strict mode function.
105 // The rest are poisoned by the first strict mode function.
  /external/compiler-rt/lib/msan/
msan_thread.cc 60 // and we don't want it to have any poisoned stack.

Completed in 467 milliseconds

1 2 3 4 5 6 7