Home
last modified time | relevance | path

Searched refs:Sanitizer (Results 1 – 25 of 31) sorted by relevance

12

/external/harfbuzz_ng/src/
Dhb-ot-font.cc72 hb_blob_t *os2_blob = OT::Sanitizer<OT::os2>::sanitize (face->reference_table (os2_tag)); in init()
73 const OT::os2 *os2 = OT::Sanitizer<OT::os2>::lock_instance (os2_blob); in init()
85 hb_blob_t *_hea_blob = OT::Sanitizer<OT::_hea>::sanitize (face->reference_table (_hea_tag)); in init()
86 const OT::_hea *_hea = OT::Sanitizer<OT::_hea>::lock_instance (_hea_blob); in init()
99 this->blob = OT::Sanitizer<OT::hmtxvmtx>::sanitize (face->reference_table (_mtx_tag)); in init()
115 this->table = OT::Sanitizer<OT::hmtxvmtx>::lock_instance (this->blob); in init()
117 this->var_blob = OT::Sanitizer<OT::HVARVVAR>::sanitize (face->reference_table (_var_tag)); in init()
118 this->var = OT::Sanitizer<OT::HVARVVAR>::lock_instance (this->var_blob); in init()
158 … hb_blob_t *head_blob = OT::Sanitizer<OT::head>::sanitize (face->reference_table (HB_OT_TAG_head)); in init()
159 const OT::head *head = OT::Sanitizer<OT::head>::lock_instance (head_blob); in init()
[all …]
Dhb-face.cc135 …const OT::OpenTypeFontFile &ot_file = *OT::Sanitizer<OT::OpenTypeFontFile>::lock_instance (data->b… in _hb_face_for_data_reference_table()
165 …hb_face_for_data_closure_t *closure = _hb_face_for_data_closure_create (OT::Sanitizer<OT::OpenType… in hb_face_create()
425 hb_blob_t *head_blob = OT::Sanitizer<OT::head>::sanitize (reference_table (HB_OT_TAG_head)); in load_upem()
426 const OT::head *head_table = OT::Sanitizer<OT::head>::lock_instance (head_blob); in load_upem()
469 hb_blob_t *maxp_blob = OT::Sanitizer<OT::maxp>::sanitize (reference_table (HB_OT_TAG_maxp)); in load_num_glyphs()
470 const OT::maxp *maxp_table = OT::Sanitizer<OT::maxp>::lock_instance (maxp_blob); in load_num_glyphs()
Dhb-ot-layout.cc51 layout->gdef_blob = OT::Sanitizer<OT::GDEF>::sanitize (face->reference_table (HB_OT_TAG_GDEF)); in HB_SHAPER_DATA_ENSURE_DECLARE()
52 layout->gdef = OT::Sanitizer<OT::GDEF>::lock_instance (layout->gdef_blob); in HB_SHAPER_DATA_ENSURE_DECLARE()
54 layout->gsub_blob = OT::Sanitizer<OT::GSUB>::sanitize (face->reference_table (HB_OT_TAG_GSUB)); in HB_SHAPER_DATA_ENSURE_DECLARE()
55 layout->gsub = OT::Sanitizer<OT::GSUB>::lock_instance (layout->gsub_blob); in HB_SHAPER_DATA_ENSURE_DECLARE()
57 layout->gpos_blob = OT::Sanitizer<OT::GPOS>::sanitize (face->reference_table (HB_OT_TAG_GPOS)); in HB_SHAPER_DATA_ENSURE_DECLARE()
58 layout->gpos = OT::Sanitizer<OT::GPOS>::lock_instance (layout->gpos_blob); in HB_SHAPER_DATA_ENSURE_DECLARE()
Dhb-open-type-private.hh314 struct Sanitizer struct
1141 hb_blob_t *blob_ = OT::Sanitizer<T>::sanitize (face->reference_table (T::tableTag)); in get()
1142 p = const_cast<T *>(OT::Sanitizer<T>::lock_instance (blob_)); in get()
Dhb-uniscribe.cc353 blob = OT::Sanitizer<OT::OpenTypeFontFile>::sanitize (blob); in _hb_rename_font()
/external/autotest/client/site_tests/logging_AsanCrash/
Dcontrol7 PURPOSE = "Verify Address Sanitizer does catch memory errors."
18 This is a positive test for Address Sanitizer.
/external/mesa3d/src/mesa/drivers/x11/
DSConscript38 # Disallow undefined symbols, except with Address Sanitizer, since libasan
/external/llvm/lib/Fuzzer/
DFuzzerExtFunctions.def28 // Sanitizer functions
/external/libchrome/base/
Dbase.isolate10 # Sanitizer-instrumented third-party libraries (if enabled).
/external/llvm/docs/
DScudoHardenedAllocator.rst11 The Scudo Hardened Allocator is a user-mode allocator based on LLVM Sanitizer's
64 This feature is using the Sanitizer's Quarantine as its base, and the amount of
/external/compiler-rt/lib/sanitizer_common/tests/
DCMakeLists.txt162 set(SANITIZER_TEST_NAME "Sanitizer-${arch}-Test")
178 add_compiler_rt_test(SanitizerUnitTests "Sanitizer-${arch}-Test-Nolibc"
/external/mesa3d/src/gallium/targets/libgl-xlib/
DSConscript56 # Disallow undefined symbols, except with Address Sanitizer, since libasan
/external/clang/docs/
DSanitizerSpecialCaseList.rst2 Sanitizer special case list
DDataFlowSanitizer.rst18 Unlike other Sanitizer tools, this tool is not designed to detect a
DSanitizerCoverage.rst11 Sanitizer tools have a very simple code coverage tool built in. It allows to
319 These callbacks are not implemented in the Sanitizer run-time and should be defined
DDataFlowSanitizerDesign.rst5 dynamic data flow analysis. Unlike other Sanitizer tools, this tool is
/external/compiler-rt/lib/sanitizer_common/
DCMakeLists.txt1 # Build system for the common Sanitizer runtime support library components.
Dsanitizer_common_interceptors_format.inc10 // Scanf/printf implementation for use in *Sanitizer interceptors.
/external/libyuv/files/docs/
Ddeprecated_builds.md391 ### Running Thread Sanitizer (TSan)
399 ### Running Address Sanitizer (ASan)
/external/compiler-rt/test/
Dlit.common.cfg192 # Sanitizer tests tend to be flaky on Windows due to PR24554, so add some
/external/compiler-rt/
DCMakeLists.txt162 # Provide some common commmandline flags for Sanitizer runtimes.
/external/swiftshader/third_party/llvm-subzero/lib/Support/Unix/
DProgram.inc167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
/external/llvm/lib/Support/Unix/
DProgram.inc167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
/external/swiftshader/third_party/subzero/src/
DIceClFlags.def297 cl::desc("Instrument compiled code with Address Sanitizer"), \
/external/clang/lib/Frontend/
DCompilerInvocation.cpp371 for (const auto &Sanitizer : Sanitizers) { in parseSanitizerKinds() local
372 SanitizerMask K = parseSanitizerValue(Sanitizer, /*AllowGroups=*/false); in parseSanitizerKinds()
374 Diags.Report(diag::err_drv_invalid_value) << FlagName << Sanitizer; in parseSanitizerKinds()

12