Home
last modified time | relevance | path

Searched refs:sanitizer (Results 1 – 25 of 54) sorted by relevance

123

/external/compiler-rt/include/
DCMakeLists.txt2 sanitizer/allocator_interface.h
3 sanitizer/asan_interface.h
4 sanitizer/common_interface_defs.h
5 sanitizer/coverage_interface.h
6 sanitizer/dfsan_interface.h
7 sanitizer/linux_syscall_hooks.h
8 sanitizer/lsan_interface.h
9 sanitizer/msan_interface.h
10 sanitizer/tsan_interface_atomic.h)
29 # Install sanitizer headers.
[all …]
/external/llvm/test/Instrumentation/SanitizerCoverage/
Dcoverage.ll1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil…
5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil…
6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil…
7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil…
8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC…
11 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 \
[all …]
Dtracing.ll1 ; Test -sanitizer-coverage-experimental-tracing
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | …
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | …
Dcmp-tracing.ll1 ; Test -sanitizer-coverage-experimental-trace-compares=1
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-experimental-trace-compares…
/external/owasp/sanitizer/
DMakefile195 jar cf out/staging/lib/owasp-java-html-sanitizer.jar -C out/classes org
201 jar cf out/staging/lib/owasp-java-html-sanitizer-sources.jar -C out/staging/src/main org
202 jar cf out/staging/lib/owasp-java-html-sanitizer-javadoc.jar -C out javadoc
204 cp COPYING out/staging/lib/owasp-java-html-sanitizer-COPYING
214 download: out/owasp-java-html-sanitizer.zip
216 rm -f out/zip/owasp-java-html-sanitizer
217 mkdir -p out/zip/owasp-java-html-sanitizer
219 out/zip/owasp-java-html-sanitizer/
221 out/owasp-java-html-sanitizer.zip: out/zip.tstamp
222 jar cMf out/owasp-java-html-sanitizer.zip \
[all …]
DAndroid.mk18 LOCAL_MODULE := owasp-html-sanitizer
/external/clang/runtime/compiler-rt/
DMakefile172 RuntimeHeader: $(ResourceIncludeDir)/sanitizer
180 $(ResourceIncludeDir)/sanitizer: $(ResourceIncludeDir)
182 $(Verb) cp $(COMPILERRT_SRC_ROOT)/include/sanitizer/*.h $@
241 $(PROJ_resources_include)/sanitizer: $(ResourceIncludeDir)/sanitizer $(PROJ_resources_include)
244 $(Verb) $(DataInstall) $(ResourceIncludeDir)/sanitizer/* \
245 $(PROJ_resources_include)/sanitizer
247 RuntimeHeaderInstall: $(PROJ_resources_include)/sanitizer
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_common_interceptors.inc318 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
329 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
370 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
388 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
406 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
653 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
666 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
679 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
692 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
736 // https://code.google.com/p/address-sanitizer/issues/detail?id=321.
[all …]
/external/skia/tools/
Dxsan_build14 sanitizer=$1
30 export GYP_DEFINES="skia_sanitizer=$sanitizer ${GYP_DEFINES}"
/external/compiler-rt/cmake/Modules/
DSanitizerUtils.cmake10 # that need to be exported from sanitizer runtime "<name>". Function
47 # Add target to check code style for sanitizer runtimes.
55 COMMENT "Running lint check for sanitizer sources..."
/external/clang/docs/
DSanitizerSpecialCaseList.rst12 sanitizer tools for certain source-level entities by providing a special
18 User of sanitizer tools, such as :doc:`AddressSanitizer`, :doc:`ThreadSanitizer`
60 source files and functions to special case list. Some sanitizer tools may
78 # Specific sanitizer tools may introduce categories.
DLeakSanitizer.rst30 `https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer
31 <https://code.google.com/p/address-sanitizer/wiki/LeakSanitizer>`_
/external/clang/include/clang/Basic/
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
23 // The first value is the name of the sanitizer as a string. The sanitizer can
27 // sanitizer.
/external/compiler-rt/test/sanitizer_common/
DCMakeLists.txt51 add_lit_testsuite(check-sanitizer "Running sanitizer_common tests"
54 set_target_properties(check-sanitizer PROPERTIES FOLDER
/external/llvm/test/Instrumentation/MemorySanitizer/
Dmissing_origin.ll8 ; https://code.google.com/p/memory-sanitizer/issues/detail?id=56
23 ; https://code.google.com/p/memory-sanitizer/issues/detail?id=78
/external/owasp/sanitizer/src/tests/org/owasp/html/
DSanitizersTest.java87 PolicyFactory sanitizer = Sanitizers.FORMATTING in testStylesAndFormatting() local
92 String got = sanitizer.sanitize(input); in testStylesAndFormatting()
/external/compiler-rt/lib/tsan/
Dcheck_cmake.sh14 ninja check-sanitizer
/external/llvm/lib/Fuzzer/test/dfsan/
DCMakeLists.txt6 …"${LIBFUZZER_FLAGS_BASE} -O0 -fno-sanitize=all -fsanitize=dataflow -mllvm -sanitizer-coverage-expe…
/external/owasp/sanitizer/tools/
Dupload_jars_to_googlecode_downloads.sh82 -p owasp-java-html-sanitizer -u mikesamuel \
/external/llvm/lib/Fuzzer/
DCMakeLists.txt2 # Disable the coverage and sanitizer instrumentation for the fuzzer itself.
/external/compiler-rt/test/asan/TestCases/Darwin/
Dobjc-odr.mm2 // https://code.google.com/p/address-sanitizer/issues/detail?id=360.
Dcstring_literals_regtest.mm2 // https://code.google.com/p/address-sanitizer/issues/detail?id=274.
Daddress-range-limit.mm1 // Regression test for https://code.google.com/p/address-sanitizer/issues/detail?id=368.
/external/compiler-rt/lib/asan/
Dasan_flags.inc107 // https://code.google.com/p/address-sanitizer/issues/detail?id=131
108 // https://code.google.com/p/address-sanitizer/issues/detail?id=309
138 "See https://code.google.com/p/address-sanitizer/wiki/ContainerOverflow")
DREADME.txt26 http://code.google.com/p/address-sanitizer/wiki/HowToBuild

123