/third_party/mbedtls/tests/scripts/ |
H A D | generate_psa_wrappers.py | 116 poison: bool) -> None: 119 Write poisoning code if poison is true, unpoisoning code otherwise. 122 'POISON' if poison else 'UNPOISON', 128 poison: bool) -> None: 131 Write poisoning code if poison is true, unpoisoning code otherwise. 137 self._write_poison_buffer_parameter(out, param, poison)
|
H A D | all.sh | 1172 tests/scripts/run-metatests.sh any asan poison 2063 tests/scripts/run-metatests.sh any asan poison
|
/third_party/ltp/testcases/kernel/syscalls/ptrace/ |
H A D | ptrace04.c | 50 void compare_registers(unsigned char poison) in compare_registers() argument 58 memset(&_pt_regs, poison, sizeof(_pt_regs)); in compare_registers() 94 "PTRACE PEEKUSER/GETREGS (poison 0x%02x)", poison); in compare_registers()
|
/third_party/libbpf/src/ |
H A D | relo_core.c | 877 * If instruction has to be poisoned, *poison will be set to true. 890 res->poison = false; in bpf_core_calc_relo() 928 * incorrect, so we poison relocated instruction. in bpf_core_calc_relo() 953 res->poison = true; in bpf_core_calc_relo() 1033 if (res->poison) { in bpf_core_patch_insn() 1034 poison: in bpf_core_patch_insn() 1035 /* poison second part of ldimm64 to avoid confusing error from in bpf_core_patch_insn() 1083 goto poison; in bpf_core_patch_insn() 1324 targ_res->poison = false; in bpf_core_calc_relo_insn() 1369 } else if (cand_res.poison ! in bpf_core_calc_relo_insn() [all...] |
H A D | str_error.c | 8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
H A D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
H A D | libbpf_errno.c | 18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
H A D | relo_core.h | 52 /* relocation unsuccessful, poison instruction, but don't fail load */ 53 bool poison; member
|
H A D | libbpf_internal.h | 67 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 70 #pragma GCC poison reallocarray
|
/third_party/lzma/C/ |
H A D | warn_clang_mac.mak | 1 CFLAGS_WARN = -Weverything -Wfatal-errors -Wno-poison-system-directories
|
/third_party/lzma/CPP/7zip/ |
H A D | warn_clang_mac.mak | 1 CFLAGS_WARN = -Weverything -Wfatal-errors -Wno-poison-system-directories
|
/third_party/ltp/testcases/kernel/mce-test/hwpoison/ |
H A D | tinjpage.c | 2 * Test program for Linux poison memory error recovery. 3 * This injects poison into various mapping cases and triggers the poison 168 printf("Kernel doesn't support poison injection\n"); in inject_madvise() 229 void poison(char *msg, char *page, enum rmode mode) in poison() function 293 poison(msg, page, mode); in testmem() 326 snprintf(buf, sizeof buf, TMPDIR "~poison%d",tmpcount++); in tempfd() 339 snprintf(buf, PATHBUFLEN, TMPDIR "~poison%d", tmpcount++); in playfile() 445 optionalerr("explicit read after poison", read(fd, buf, sizeof buf) < 0); in do_file_dirty() 446 optionalerr("explicit write after poison", writ in do_file_dirty() [all...] |
H A D | Makefile | 53 rm -f ~test* ~poison*
|
/third_party/ltp/testcases/kernel/mce-test/tsrc/ |
H A D | tinjpage.c | 2 * Test program for Linux poison memory error recovery. 3 * This injects poison into various mapping cases and triggers the poison 168 printf("Kernel doesn't support poison injection\n"); in inject_madvise() 229 void poison(char *msg, char *page, enum rmode mode) in poison() function 293 poison(msg, page, mode); in testmem() 326 snprintf(buf, sizeof buf, TMPDIR "~poison%d",tmpcount++); in tempfd() 339 snprintf(buf, PATHBUFLEN, TMPDIR "~poison%d", tmpcount++); in playfile() 445 optionalerr("explicit read after poison", read(fd, buf, sizeof buf) < 0); in do_file_dirty() 446 optionalerr("explicit write after poison", writ in do_file_dirty() [all...] |
H A D | Makefile | 53 rm -f ~test* ~poison*
|
/third_party/skia/third_party/externals/imgui/examples/example_null/ |
H A D | Makefile | 55 CXXFLAGS += -Weverything -Wno-reserved-id-macro -Wno-c++98-compat-pedantic -Wno-padded -Wno-c++11-long-long -Wno-poison-system-directories
|
/third_party/ltp/testcases/kernel/mce-test/stress/tools/page-poisoning/ |
H A D | page-poisoning.c | 2 * Test program for Linux poison memory error recovery. 5 * This injects poison into various mapping cases and triggers the poison 234 static void poison(char *msg, char *page, enum rmode mode) in poison() function 242 result("failed: Kernel doesn't support poison injection\n"); in poison() 306 poison(msg, page, mode); in testmem() 490 optionalerr("explicit read after poison", read(fd, buf, sizeof buf) < 0); in do_file_dirty() 491 optionalerr("explicit write after poison", write(fd, "foobar", 6) < 0); in do_file_dirty()
|
/third_party/unity/test/ |
H A D | Makefile | 13 CFLAGS += -Wno-poison-system-directories
|
/third_party/node/deps/v8/src/init/ |
H A D | bootstrapper.cc | 3982 Handle<JSFunction> poison = GetThrowTypeErrorIntrinsic(); in InitializeGlobal() local 3985 callee->set_getter(*poison); in InitializeGlobal() 3986 callee->set_setter(*poison); in InitializeGlobal()
|
/third_party/vixl/test/aarch64/ |
H A D | test-assembler-neon-aarch64.cc | 9536 // registers with poison values in other lanes. The poison NaN avoids the in TEST() 9539 VRegister poison = v29; in TEST() local 9547 __ Mov(vm, poison); in TEST()
|