OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
xsrc
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:violations
(Results
1 - 4
of
4
) sorted by relevancy
/src/external/bsd/libc++/dist/libcxxrt/test/
test_exception.cc
187
static int
violations
= 0;
variable
190
violations
++;
338
TEST(
violations
== 1, "Exactly one exception spec violation");
/src/external/gpl3/gcc/dist/libgcc/
unwind-dw2-fde.c
623
unsigned
violations
= 0;
638
violations
+= ptrs[j + 1] < ptrs[j];
645
if (!
violations
)
621
unsigned
violations
= 0;
local
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/scripts/
cpplint.py
1765
Additionally, check for constructor/destructor style
violations
and reference
/src/sys/external/isc/libsodium/dist/
configure
8717
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking whether segmentation
violations
can be caught when using the C compiler" >&5
8718
$as_echo_n "checking whether segmentation
violations
can be caught when using the C compiler... " >&6; }
8772
{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: On this platform, segmentation
violations
cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance." >&5
8773
$as_echo "$as_me: WARNING: On this platform, segmentation
violations
cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance." >&2;}
Completed in 32 milliseconds
Indexes created Sun Apr 05 00:22:41 UTC 2026