Home
last modified time | relevance | path

Searched refs:poison (Results 1 - 20 of 20) sorted by relevance

/third_party/mbedtls/tests/scripts/
H A Dgenerate_psa_wrappers.py116 poison: bool) -> None:
119 Write poisoning code if poison is true, unpoisoning code otherwise.
122 'POISON' if poison else 'UNPOISON',
128 poison: bool) -> None:
131 Write poisoning code if poison is true, unpoisoning code otherwise.
137 self._write_poison_buffer_parameter(out, param, poison)
H A Dall.sh1172 tests/scripts/run-metatests.sh any asan poison
2063 tests/scripts/run-metatests.sh any asan poison
/third_party/ltp/testcases/kernel/syscalls/ptrace/
H A Dptrace04.c50 void compare_registers(unsigned char poison) in compare_registers() argument
58 memset(&_pt_regs, poison, sizeof(_pt_regs)); in compare_registers()
94 "PTRACE PEEKUSER/GETREGS (poison 0x%02x)", poison); in compare_registers()
/third_party/libbpf/src/
H A Drelo_core.c877 * If instruction has to be poisoned, *poison will be set to true.
890 res->poison = false; in bpf_core_calc_relo()
928 * incorrect, so we poison relocated instruction. in bpf_core_calc_relo()
953 res->poison = true; in bpf_core_calc_relo()
1033 if (res->poison) { in bpf_core_patch_insn()
1034 poison: in bpf_core_patch_insn()
1035 /* poison second part of ldimm64 to avoid confusing error from in bpf_core_patch_insn()
1083 goto poison; in bpf_core_patch_insn()
1324 targ_res->poison = false; in bpf_core_calc_relo_insn()
1369 } else if (cand_res.poison ! in bpf_core_calc_relo_insn()
[all...]
H A Dstr_error.c8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
H A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
H A Dlibbpf_errno.c18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
H A Drelo_core.h52 /* relocation unsuccessful, poison instruction, but don't fail load */
53 bool poison; member
H A Dlibbpf_internal.h67 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
70 #pragma GCC poison reallocarray
/third_party/lzma/C/
H A Dwarn_clang_mac.mak1 CFLAGS_WARN = -Weverything -Wfatal-errors -Wno-poison-system-directories
/third_party/lzma/CPP/7zip/
H A Dwarn_clang_mac.mak1 CFLAGS_WARN = -Weverything -Wfatal-errors -Wno-poison-system-directories
/third_party/ltp/testcases/kernel/mce-test/hwpoison/
H A Dtinjpage.c2 * Test program for Linux poison memory error recovery.
3 * This injects poison into various mapping cases and triggers the poison
168 printf("Kernel doesn't support poison injection\n"); in inject_madvise()
229 void poison(char *msg, char *page, enum rmode mode) in poison() function
293 poison(msg, page, mode); in testmem()
326 snprintf(buf, sizeof buf, TMPDIR "~poison%d",tmpcount++); in tempfd()
339 snprintf(buf, PATHBUFLEN, TMPDIR "~poison%d", tmpcount++); in playfile()
445 optionalerr("explicit read after poison", read(fd, buf, sizeof buf) < 0); in do_file_dirty()
446 optionalerr("explicit write after poison", writ in do_file_dirty()
[all...]
H A DMakefile53 rm -f ~test* ~poison*
/third_party/ltp/testcases/kernel/mce-test/tsrc/
H A Dtinjpage.c2 * Test program for Linux poison memory error recovery.
3 * This injects poison into various mapping cases and triggers the poison
168 printf("Kernel doesn't support poison injection\n"); in inject_madvise()
229 void poison(char *msg, char *page, enum rmode mode) in poison() function
293 poison(msg, page, mode); in testmem()
326 snprintf(buf, sizeof buf, TMPDIR "~poison%d",tmpcount++); in tempfd()
339 snprintf(buf, PATHBUFLEN, TMPDIR "~poison%d", tmpcount++); in playfile()
445 optionalerr("explicit read after poison", read(fd, buf, sizeof buf) < 0); in do_file_dirty()
446 optionalerr("explicit write after poison", writ in do_file_dirty()
[all...]
H A DMakefile53 rm -f ~test* ~poison*
/third_party/skia/third_party/externals/imgui/examples/example_null/
H A DMakefile55 CXXFLAGS += -Weverything -Wno-reserved-id-macro -Wno-c++98-compat-pedantic -Wno-padded -Wno-c++11-long-long -Wno-poison-system-directories
/third_party/ltp/testcases/kernel/mce-test/stress/tools/page-poisoning/
H A Dpage-poisoning.c2 * Test program for Linux poison memory error recovery.
5 * This injects poison into various mapping cases and triggers the poison
234 static void poison(char *msg, char *page, enum rmode mode) in poison() function
242 result("failed: Kernel doesn't support poison injection\n"); in poison()
306 poison(msg, page, mode); in testmem()
490 optionalerr("explicit read after poison", read(fd, buf, sizeof buf) < 0); in do_file_dirty()
491 optionalerr("explicit write after poison", write(fd, "foobar", 6) < 0); in do_file_dirty()
/third_party/unity/test/
H A DMakefile13 CFLAGS += -Wno-poison-system-directories
/third_party/node/deps/v8/src/init/
H A Dbootstrapper.cc3982 Handle<JSFunction> poison = GetThrowTypeErrorIntrinsic(); in InitializeGlobal() local
3985 callee->set_getter(*poison); in InitializeGlobal()
3986 callee->set_setter(*poison); in InitializeGlobal()
/third_party/vixl/test/aarch64/
H A Dtest-assembler-neon-aarch64.cc9536 // registers with poison values in other lanes. The poison NaN avoids the in TEST()
9539 VRegister poison = v29; in TEST() local
9547 __ Mov(vm, poison); in TEST()

Completed in 37 milliseconds