/prebuilts/clang/host/darwin-x86/clang-4579689/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/darwin-x86/clang-4630689/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/darwin-x86/clang-4639204/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/darwin-x86/clang-4691093/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/linux-x86/clang-4393122/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/linux-x86/clang-4479392/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/linux-x86/clang-4579689/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/linux-x86/clang-4630689/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/linux-x86/clang-4639204/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/prebuilts/clang/host/linux-x86/clang-4691093/include/llvm/IR/ |
ValueHandle.h | 462 /// A flag tracking whether this value has been poisoned. 468 bool Poisoned = false; 475 assert(!Poisoned && "Tried to delete an already poisoned handle!"); 476 Poisoned = true; 482 assert(!Poisoned && "Tried to RAUW an already poisoned handle!"); 483 Poisoned = true; 494 assert(!Poisoned && "Accessed a poisoned value handle!") [all...] |
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
OpenSSLX509CertificateTest.java | 102 OpenSSLX509Certificate certPoisoned = loadTestCertificate("cert-ct-poisoned.pem"); 117 OpenSSLX509Certificate certPoisoned = loadTestCertificate("cert-ct-poisoned.pem");
|
/external/ltp/testcases/kernel/syscalls/madvise/ |
madvise07.c | 79 tst_res(TFAIL, "Did not receive SIGBUS on accessing poisoned page"); 95 tst_res(TPASS, "Received SIGBUS after accessing poisoned page");
|
/external/compiler-rt/lib/msan/ |
msan_thread.cc | 60 // and we don't want it to have any poisoned stack.
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
clone_test.cc | 18 char x[32] = {0}; // Stack gets poisoned.
|
swapcontext_annotation.cc | 49 char x[32] = {0}; // Stack gets poisoned. 65 char x[32] = {0}; // Stack gets poisoned. 69 // (b) Jump into the original function. Stack remains poisoned unless we do
|
/external/compiler-rt/test/asan/TestCases/ |
contiguous_container_crash.cc | 27 return (int)t[60 * one]; // Touches the poisoned memory.
|
/external/compiler-rt/test/msan/Linux/ |
fopencookie.cc | 42 // Verify that PoisonStack has poisoned the stack - otherwise this test is not
|
/external/perfetto/src/ftrace_reader/test/data/android_walleye_OPM5.171019.017.A1_4.4.88/events/ras/aer_event/ |
format | 14 ", __get_str(dev_name), REC->severity == 2 ? "Corrected" : REC->severity == 1 ? "Fatal" : "Uncorrected, non-fatal", REC->severity == 2 ? __print_flags(REC->status, "|", {0x00000001, "Receiver Error"}, {0x00000040, "Bad TLP"}, {0x00000080, "Bad DLLP"}, {0x00000100, "RELAY_NUM Rollover"}, {0x00001000, "Replay Timer Timeout"}, {0x00002000, "Advisory Non-Fatal Error"}, {0x00004000, "Corrected Internal Error"}, {0x00008000, "Header Log Overflow"}) : __print_flags(REC->status, "|", {0x00000001, "Undefined"}, {0x00000010, "Data Link Protocol Error"}, {0x00000020, "Surprise Down Error"}, {0x00001000,"Poisoned TLP"}, {0x00002000, "Flow Control Protocol Error"}, {0x00004000, "Completion Timeout"}, {0x00008000,"Completer Abort"}, {0x00010000, "Unexpected Completion"}, {0x00020000, "Receiver Overflow"}, {0x00040000, "Malformed TLP"}, {0x00080000, "ECRC Error"}, {0x00100000, "Unsupported Request Error"}, {0x00200000, "ACS Violation"}, {0x00400000, "Uncorrectable Internal Error"}, {0x00800000, "MC Blocked TLP"}, {0x01000000, "AtomicOp Egress Blocked"}, {0x02000000, "TLP Prefix Blocked Error"})
|
/external/compiler-rt/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/prebuilts/clang/host/darwin-x86/clang-3289846/lib64/clang/3.8/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/prebuilts/clang/host/darwin-x86/clang-3859424/lib64/clang/4.0/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/prebuilts/clang/host/darwin-x86/clang-4053586/lib64/clang/5.0/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/prebuilts/clang/host/darwin-x86/clang-4053586/prebuilt_include/compiler-rt/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/prebuilts/clang/host/darwin-x86/clang-4393122/lib64/clang/5.0.1/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|
/prebuilts/clang/host/darwin-x86/clang-4479392/lib64/clang/5.0.2/include/sanitizer/ |
asan_interface.h | 33 // addresses in this region is allowed until this region is poisoned again. 53 // Returns 1 if addr is poisoned (i.e. 1-byte read/write access to this 58 // If at least one byte in [beg, beg+size) is poisoned, return the address
|