HomeSort by relevance Sort by last modified time
    Searched full:sanitizer (Results 26 - 50 of 165) sorted by null

12 3 4 5 6 7

  /external/harfbuzz_ng/src/
hb-tt-font.cc 54 tt->hhea_blob = Sanitizer<hhea>::sanitize (font->face->reference_table (HB_OT_TAG_hhea));
55 tt->hhea = Sanitizer<hhea>::lock_instance (tt->hhea_blob);
  /external/clang/lib/Driver/
SanitizerArgs.h 1 //===--- SanitizerArgs.h - Arguments for sanitizer tools -------*- C++ -*-===//
24 /// Assign ordinals to sanitizer flags. We'll use the ordinal values as
27 #define SANITIZER(NAME, ID) SO_##ID,
34 #define SANITIZER(NAME, ID) ID = 1 << SO_##ID,
54 /// Parses the sanitizer arguments from an argument list.
81 #define SANITIZER(NAME, ID) \
111 #define SANITIZER(NAME, ID) .Case(NAME, ID)
139 /// -f*-sanitizer. Sets the masks defining required change of Kind value.
184 /// provides a sanitizer kind in \p Mask. For example, the argument list
185 /// "-fsanitize=thread,vptr -faddress-sanitizer" with mask \c NeedsUbsanR
    [all...]
  /external/chromium_org/third_party/harfbuzz-ng/src/
hb-face.cc 142 const OT::OpenTypeFontFile &ot_file = *OT::Sanitizer<OT::OpenTypeFontFile>::lock_instance (data->blob);
172 hb_face_for_data_closure_t *closure = _hb_face_for_data_closure_create (OT::Sanitizer<OT::OpenTypeFontFile>::sanitize (hb_blob_reference (blob)), index);
432 hb_blob_t *head_blob = OT::Sanitizer<OT::head>::sanitize (reference_table (HB_OT_TAG_head));
433 const OT::head *head_table = OT::Sanitizer<OT::head>::lock_instance (head_blob);
476 hb_blob_t *maxp_blob = OT::Sanitizer<OT::maxp>::sanitize (reference_table (HB_OT_TAG_maxp));
477 const OT::maxp *maxp_table = OT::Sanitizer<OT::maxp>::lock_instance (maxp_blob);
  /external/chromium_org/third_party/WebKit/Source/platform/fonts/mac/
FontCustomPlatformDataMac.cpp 54 OpenTypeSanitizer sanitizer(buffer);
55 RefPtr<SharedBuffer> transcodeBuffer = sanitizer.sanitize();
  /external/compiler-rt/include/sanitizer/
lsan_interface.h 1 //===-- sanitizer/lsan_interface.h ------------------------------*- C++ -*-===//
17 #include <sanitizer/common_interface_defs.h>
common_interface_defs.h 1 //===-- sanitizer/common_interface_defs.h -----------------------*- C++ -*-===//
10 // Common part of the public sanitizer interface.
  /external/compiler-rt/lib/sanitizer_common/
CMakeLists.txt 1 # Build system for the common Sanitizer runtime support library components.
97 # Unit tests for common sanitizer runtime.
  /external/chromium_org/base/debug/
leak_annotations.h 24 // Public LSan API from <sanitizer/lsan_interface.h>.
  /external/clang/test/CodeGen/
tbaa-for-vptr.cpp 9 // When -fthread-sanitizer is used TBAA should be generated at all opt levels
  /external/compiler-rt/
CMakeLists.txt 116 # Provide some common commmandline flags for Sanitizer runtimes.
130 # Build sanitizer runtimes with debug info.
146 # Sanitizer may not have libstdc++, so we can have problems with virtual
164 # Architectures supported by Sanitizer runtimes. Specific sanitizers may
  /external/compiler-rt/lib/asan/
README.txt 29 http://code.google.com/p/address-sanitizer/wiki/HowToBuild
  /external/compiler-rt/lib/asan/lit_tests/TestCases/Darwin/
reexec-insert-libraries-env.cc 3 // https://code.google.com/p/address-sanitizer/issues/detail?id=159
  /external/compiler-rt/lib/asan/lit_tests/TestCases/
allow_user_segv.cc 2 // https://code.google.com/p/address-sanitizer/issues/detail?id=180
init-order-dlopen.cc 2 // https://code.google.com/p/address-sanitizer/issues/detail?id=178
throw_call_test.cc 2 // http://code.google.com/p/address-sanitizer/issues/detail?id=147 (not fixed).
  /external/compiler-rt/lib/lsan/lit_tests/TestCases/
disabler_in_tsd_destructor.cc 11 #include "sanitizer/lsan_interface.h"
do_leak_check_override.cc 11 #include <sanitizer/lsan_interface.h>
ignore_object.cc 9 #include "sanitizer/lsan_interface.h"
leak_check_at_exit.cc 9 #include <sanitizer/lsan_interface.h>
  /external/compiler-rt/lib/ubsan/
CMakeLists.txt 1 # Build for the undefined behavior sanitizer runtime support library.
  /external/clang/test/Driver/
fsanitize.c 13 // RUN: %clang -target x86_64-linux-gnu -fsanitize=thread,undefined -fno-thread-sanitizer -fno-sanitize=float-cast-overflow,vptr,bool,enum %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-PARTIAL-UNDEFINED
59 // RUN: %clang -target x86_64-linux-gnu -faddress-sanitizer -fthread-sanitizer -fno-rtti %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-TSAN
60 // CHECK-ASAN-TSAN: '-faddress-sanitizer' not allowed with '-fthread-sanitizer'
95 // RUN: %clang -target x86_64-linux-gnu -fcatch-undefined-behavior -fthread-sanitizer -fno-thread-sanitizer -faddress-sanitizer -fno-address-sanitizer -fbounds-checking -### %s 2>&1 | FileCheck %s --check-prefix=CHECK-DEPRECATED
97 // CHECK-DEPRECATED: argument '-fthread-sanitizer' is deprecated, use '-fsanitize=thread' instea
    [all...]
  /external/chromium_org/third_party/WebKit/Source/platform/fonts/skia/
FontCustomPlatformDataSkia.cpp 89 OpenTypeSanitizer sanitizer(buffer);
90 RefPtr<SharedBuffer> transcodeBuffer = sanitizer.sanitize();
  /external/compiler-rt/lib/sanitizer_common/scripts/
check_lint.sh 43 ${CPPLINT} --filter=${LLVM_LINT_FILTER} lib/Transforms/Instrumentation/*Sanitizer.cpp \
49 SANITIZER_INCLUDES=${COMPILER_RT}/include/sanitizer
  /external/llvm/include/llvm/Support/
Valgrind.h 24 // tsan (Thread Sanitizer) is a valgrind-based tool that detects these exact
46 // Thread Sanitizer is a valgrind tool that finds races in code.
  /external/chromium_org/v8/src/
msan.h 42 # include <sanitizer/msan_interface.h>

Completed in 2132 milliseconds

12 3 4 5 6 7