/external/harfbuzz_ng/src/ |
D | hb-ot-font.cc | 72 hb_blob_t *os2_blob = OT::Sanitizer<OT::os2>::sanitize (face->reference_table (os2_tag)); in init() 73 const OT::os2 *os2 = OT::Sanitizer<OT::os2>::lock_instance (os2_blob); in init() 85 hb_blob_t *_hea_blob = OT::Sanitizer<OT::_hea>::sanitize (face->reference_table (_hea_tag)); in init() 86 const OT::_hea *_hea = OT::Sanitizer<OT::_hea>::lock_instance (_hea_blob); in init() 99 this->blob = OT::Sanitizer<OT::hmtxvmtx>::sanitize (face->reference_table (_mtx_tag)); in init() 115 this->table = OT::Sanitizer<OT::hmtxvmtx>::lock_instance (this->blob); in init() 117 this->var_blob = OT::Sanitizer<OT::HVARVVAR>::sanitize (face->reference_table (_var_tag)); in init() 118 this->var = OT::Sanitizer<OT::HVARVVAR>::lock_instance (this->var_blob); in init() 158 … hb_blob_t *head_blob = OT::Sanitizer<OT::head>::sanitize (face->reference_table (HB_OT_TAG_head)); in init() 159 const OT::head *head = OT::Sanitizer<OT::head>::lock_instance (head_blob); in init() [all …]
|
D | hb-face.cc | 135 …const OT::OpenTypeFontFile &ot_file = *OT::Sanitizer<OT::OpenTypeFontFile>::lock_instance (data->b… in _hb_face_for_data_reference_table() 165 …hb_face_for_data_closure_t *closure = _hb_face_for_data_closure_create (OT::Sanitizer<OT::OpenType… in hb_face_create() 425 hb_blob_t *head_blob = OT::Sanitizer<OT::head>::sanitize (reference_table (HB_OT_TAG_head)); in load_upem() 426 const OT::head *head_table = OT::Sanitizer<OT::head>::lock_instance (head_blob); in load_upem() 469 hb_blob_t *maxp_blob = OT::Sanitizer<OT::maxp>::sanitize (reference_table (HB_OT_TAG_maxp)); in load_num_glyphs() 470 const OT::maxp *maxp_table = OT::Sanitizer<OT::maxp>::lock_instance (maxp_blob); in load_num_glyphs()
|
D | hb-ot-layout.cc | 51 layout->gdef_blob = OT::Sanitizer<OT::GDEF>::sanitize (face->reference_table (HB_OT_TAG_GDEF)); in HB_SHAPER_DATA_ENSURE_DECLARE() 52 layout->gdef = OT::Sanitizer<OT::GDEF>::lock_instance (layout->gdef_blob); in HB_SHAPER_DATA_ENSURE_DECLARE() 54 layout->gsub_blob = OT::Sanitizer<OT::GSUB>::sanitize (face->reference_table (HB_OT_TAG_GSUB)); in HB_SHAPER_DATA_ENSURE_DECLARE() 55 layout->gsub = OT::Sanitizer<OT::GSUB>::lock_instance (layout->gsub_blob); in HB_SHAPER_DATA_ENSURE_DECLARE() 57 layout->gpos_blob = OT::Sanitizer<OT::GPOS>::sanitize (face->reference_table (HB_OT_TAG_GPOS)); in HB_SHAPER_DATA_ENSURE_DECLARE() 58 layout->gpos = OT::Sanitizer<OT::GPOS>::lock_instance (layout->gpos_blob); in HB_SHAPER_DATA_ENSURE_DECLARE()
|
D | hb-open-type-private.hh | 314 struct Sanitizer struct 1141 hb_blob_t *blob_ = OT::Sanitizer<T>::sanitize (face->reference_table (T::tableTag)); in get() 1142 p = const_cast<T *>(OT::Sanitizer<T>::lock_instance (blob_)); in get()
|
D | hb-uniscribe.cc | 353 blob = OT::Sanitizer<OT::OpenTypeFontFile>::sanitize (blob); in _hb_rename_font()
|
/external/autotest/client/site_tests/logging_AsanCrash/ |
D | control | 7 PURPOSE = "Verify Address Sanitizer does catch memory errors." 18 This is a positive test for Address Sanitizer.
|
/external/mesa3d/src/mesa/drivers/x11/ |
D | SConscript | 38 # Disallow undefined symbols, except with Address Sanitizer, since libasan
|
/external/llvm/lib/Fuzzer/ |
D | FuzzerExtFunctions.def | 28 // Sanitizer functions
|
/external/libchrome/base/ |
D | base.isolate | 10 # Sanitizer-instrumented third-party libraries (if enabled).
|
/external/llvm/docs/ |
D | ScudoHardenedAllocator.rst | 11 The Scudo Hardened Allocator is a user-mode allocator based on LLVM Sanitizer's 64 This feature is using the Sanitizer's Quarantine as its base, and the amount of
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
D | CMakeLists.txt | 162 set(SANITIZER_TEST_NAME "Sanitizer-${arch}-Test") 178 add_compiler_rt_test(SanitizerUnitTests "Sanitizer-${arch}-Test-Nolibc"
|
/external/mesa3d/src/gallium/targets/libgl-xlib/ |
D | SConscript | 56 # Disallow undefined symbols, except with Address Sanitizer, since libasan
|
/external/clang/docs/ |
D | SanitizerSpecialCaseList.rst | 2 Sanitizer special case list
|
D | DataFlowSanitizer.rst | 18 Unlike other Sanitizer tools, this tool is not designed to detect a
|
D | SanitizerCoverage.rst | 11 Sanitizer tools have a very simple code coverage tool built in. It allows to 319 These callbacks are not implemented in the Sanitizer run-time and should be defined
|
D | DataFlowSanitizerDesign.rst | 5 dynamic data flow analysis. Unlike other Sanitizer tools, this tool is
|
/external/compiler-rt/lib/sanitizer_common/ |
D | CMakeLists.txt | 1 # Build system for the common Sanitizer runtime support library components.
|
D | sanitizer_common_interceptors_format.inc | 10 // Scanf/printf implementation for use in *Sanitizer interceptors.
|
/external/libyuv/files/docs/ |
D | deprecated_builds.md | 391 ### Running Thread Sanitizer (TSan) 399 ### Running Address Sanitizer (ASan)
|
/external/compiler-rt/test/ |
D | lit.common.cfg | 192 # Sanitizer tests tend to be flaky on Windows due to PR24554, so add some
|
/external/compiler-rt/ |
D | CMakeLists.txt | 162 # Provide some common commmandline flags for Sanitizer runtimes.
|
/external/swiftshader/third_party/llvm-subzero/lib/Support/Unix/ |
D | Program.inc | 167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
|
/external/llvm/lib/Support/Unix/ |
D | Program.inc | 167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
|
/external/swiftshader/third_party/subzero/src/ |
D | IceClFlags.def | 297 cl::desc("Instrument compiled code with Address Sanitizer"), \
|
/external/clang/lib/Frontend/ |
D | CompilerInvocation.cpp | 371 for (const auto &Sanitizer : Sanitizers) { in parseSanitizerKinds() local 372 SanitizerMask K = parseSanitizerValue(Sanitizer, /*AllowGroups=*/false); in parseSanitizerKinds() 374 Diags.Report(diag::err_drv_invalid_value) << FlagName << Sanitizer; in parseSanitizerKinds()
|