Searched refs:sanitizer (Results 1 – 25 of 54) sorted by relevance
123
2 sanitizer/allocator_interface.h3 sanitizer/asan_interface.h4 sanitizer/common_interface_defs.h5 sanitizer/coverage_interface.h6 sanitizer/dfsan_interface.h7 sanitizer/linux_syscall_hooks.h8 sanitizer/lsan_interface.h9 sanitizer/msan_interface.h10 sanitizer/tsan_interface_atomic.h)29 # Install sanitizer headers.[all …]
1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK02 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK13 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK24 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil…5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil…6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil…7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil…8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK49 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC…11 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 \[all …]
1 ; Test -sanitizer-coverage-experimental-tracing2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | …3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | …
1 ; Test -sanitizer-coverage-experimental-trace-compares=12 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-experimental-trace-compares…
195 jar cf out/staging/lib/owasp-java-html-sanitizer.jar -C out/classes org201 jar cf out/staging/lib/owasp-java-html-sanitizer-sources.jar -C out/staging/src/main org202 jar cf out/staging/lib/owasp-java-html-sanitizer-javadoc.jar -C out javadoc204 cp COPYING out/staging/lib/owasp-java-html-sanitizer-COPYING214 download: out/owasp-java-html-sanitizer.zip216 rm -f out/zip/owasp-java-html-sanitizer217 mkdir -p out/zip/owasp-java-html-sanitizer219 out/zip/owasp-java-html-sanitizer/221 out/owasp-java-html-sanitizer.zip: out/zip.tstamp222 jar cMf out/owasp-java-html-sanitizer.zip \[all …]
18 LOCAL_MODULE := owasp-html-sanitizer
172 RuntimeHeader: $(ResourceIncludeDir)/sanitizer180 $(ResourceIncludeDir)/sanitizer: $(ResourceIncludeDir)182 $(Verb) cp $(COMPILERRT_SRC_ROOT)/include/sanitizer/*.h $@241 $(PROJ_resources_include)/sanitizer: $(ResourceIncludeDir)/sanitizer $(PROJ_resources_include)244 $(Verb) $(DataInstall) $(ResourceIncludeDir)/sanitizer/* \245 $(PROJ_resources_include)/sanitizer247 RuntimeHeaderInstall: $(PROJ_resources_include)/sanitizer
318 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.329 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.370 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.388 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.406 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.653 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.666 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.679 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.692 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.736 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.[all …]
14 sanitizer=$130 export GYP_DEFINES="skia_sanitizer=$sanitizer ${GYP_DEFINES}"
10 # that need to be exported from sanitizer runtime "<name>". Function47 # Add target to check code style for sanitizer runtimes.55 COMMENT "Running lint check for sanitizer sources..."
12 sanitizer tools for certain source-level entities by providing a special18 User of sanitizer tools, such as :doc:`AddressSanitizer`, :doc:`ThreadSanitizer`60 source files and functions to special case list. Some sanitizer tools may78 # Specific sanitizer tools may introduce categories.
30 `https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer31 <https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer>`_
1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//23 // The first value is the name of the sanitizer as a string. The sanitizer can27 // sanitizer.
51 add_lit_testsuite(check-sanitizer "Running sanitizer_common tests"54 set_target_properties(check-sanitizer PROPERTIES FOLDER
8 ; https://code.google.com/p/memory-sanitizer/issues/detail?id=5623 ; https://code.google.com/p/memory-sanitizer/issues/detail?id=78
87 PolicyFactory sanitizer = Sanitizers.FORMATTING in testStylesAndFormatting() local92 String got = sanitizer.sanitize(input); in testStylesAndFormatting()
14 ninja check-sanitizer
6 …"${LIBFUZZER_FLAGS_BASE} -O0 -fno-sanitize=all -fsanitize=dataflow -mllvm -sanitizer-coverage-expe…
82 -p owasp-java-html-sanitizer -u mikesamuel \
2 # Disable the coverage and sanitizer instrumentation for the fuzzer itself.
2 // https://code.google.com/p/address-sanitizer/issues/detail?id=360.
2 // https://code.google.com/p/address-sanitizer/issues/detail?id=274.
1 // Regression test for https://code.google.com/p/address-sanitizer/issues/detail?id=368.
107 // https://code.google.com/p/address-sanitizer/issues/detail?id=131108 // https://code.google.com/p/address-sanitizer/issues/detail?id=309138 "See https://code.google.com/p/address-sanitizer/wiki/ContainerOverflow")
26 http://code.google.com/p/address-sanitizer/wiki/HowToBuild