HomeSort by relevance Sort by last modified time
    Searched full:blacklist (Results 1 - 25 of 277) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium-trace/catapult/devil/devil/android/
device_blacklist.py 12 class Blacklist(object):
19 """Reads the blacklist from the blacklist file.
29 blacklist = json.load(f)
30 if not isinstance(blacklist, dict):
32 self._path, blacklist)
33 blacklist = dict()
34 return blacklist
36 def Write(self, blacklist):
37 """Writes the provided blacklist to the blacklist file
    [all...]
  /external/compiler-rt/test/msan/
default_blacklist.cc 1 // Test that MSan uses the default blacklist from resource directory.
3 // CHECK: fsanitize-blacklist={{.*}}msan_blacklist.txt
  /external/compiler-rt/lib/msan/
msan_blacklist.txt 0 # Blacklist for MemorySanitizer. Turns off instrumentation of particular
2 # functions or sources. Use with care. You may set location of blacklist
3 # at compile-time using -fsanitize-blacklist=<path> flag.
  /external/webrtc/tools/ubsan/
blacklist.txt 2 # UBSan blacklist.
5 # This is a stripped down copy of Chromium's blacklist.txt, to enable
6 # adding WebRTC-specific blacklist entries.
  /external/compiler-rt/test/asan/TestCases/
initialization-blacklist.cc 1 // Test for blacklist functionality of initialization-order checker.
3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\
4 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
5 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
7 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\
8 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
9 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
11 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc
    [all...]
blacklist.cc 1 // Test the blacklist functionality of ASan
5 // RUN: echo "src:*blacklist-extra.cc" >> %tmp
6 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \
7 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
8 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \
9 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
10 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \
11 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
12 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \
13 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&
    [all...]
default_blacklist.cc 4 // Test that ASan uses the default blacklist from resource directory.
6 // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt
  /external/clang/test/Driver/
fsanitize-blacklist.c 1 // General blacklist usage.
15 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST
16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second
19 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST2
22 // Check that the default blacklist is not added as an extra dependency
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
blacklist.c 2 * wpa_supplicant - Temporary BSSID blacklist
13 #include "blacklist.h"
16 * wpa_blacklist_get - Get the blacklist entry for a BSSID
19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found
29 e = wpa_s->blacklist;
41 * wpa_blacklist_add - Add an BSSID to the blacklist
43 * @bssid: BSSID to be added to the blacklist
44 * Returns: Current blacklist count on success, -1 on failure
46 * This function adds the specified BSSID to the blacklist or increases the
47 * blacklist count if the BSSID was already listed. It should be called whe
    [all...]
  /external/compiler-rt/lib/asan/
asan_blacklist.txt 0 # Blacklist for AddressSanitizer. Turns off instrumentation of particular
2 # functions or sources. Use with care. You may set location of blacklist
3 # at compile-time using -fsanitize-blacklist=<path> flag.
  /external/compiler-rt/test/asan/TestCases/Helpers/
initialization-blacklist.txt 3 src:*initialization-blacklist-extra2.cc=init
  /external/clang/test/CodeGen/
sanitize-init-order.cpp 3 // Test blacklist functionality.
4 // RUN: echo "src:%s=init" > %t-file.blacklist
5 // RUN: echo "type:PODWithCtorAndDtor=init" > %t-type.blacklist
6 // RUN: echo "type:NS::PODWithCtor=init" >> %t-type.blacklist
7 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-file.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST
8 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-type.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST
    [all...]
ubsan-blacklist.c 2 // RUN: echo "fun:hash" > %t-func.blacklist
3 // RUN: echo "src:%s" > %t-file.blacklist
5 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC
6 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE
8 // FIXME: %t-file.blacklist contains DOSish paths.
asan-globals.cpp 2 // RUN: echo "global:*blacklisted_global*" > %t.blacklist
3 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist -emit-llvm -o - %s | FileCheck %s
4 // RUN: echo "src:%s" > %t.blacklist-src
5 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST-SRC
30 // BLACKLIST-SRC: !llvm.asan.globals = !{![[EXTRA_GLOBAL:[0-9]+]], ![[GLOBAL:[0-9]+]], ![[DYN_INIT_GLOBAL:[0-9]+]], ![[BLACKLISTED_GLOBAL:[0-9]+]], ![[STATIC_VAR:[0-9]+]], ![[LITERAL:[0-9]+]]}
31 // BLACKLIST-SRC: ![[EXTRA_GLOBAL]] = !{{{.*}} ![[EXTRA_GLOBAL_LOC:[0-9]+]], !"extra_global", i1 false, i1 false}
32 // BLACKLIST-SRC: ![[EXTRA_GLOBAL_LOC]] = !{!"{{.*}}extra-source.cpp", i32 1, i32 5
    [all...]
  /external/clang/test/Frontend/
print-header-includes.c 16 // RUN: echo "fun:foo" > %t.blacklist
17 // RUN: %clang_cc1 -fsanitize=address -fdepfile-entry=%t.blacklist -E --show-includes -o %t.out %s > %t.stdout
18 // RUN: FileCheck --check-prefix=MS-BLACKLIST < %t.stdout %s
19 // MS-BLACKLIST: Note: including file: {{.*\.blacklist}}
20 // MS-BLACKLIST: Note: including file: {{.*test.h}}
21 // MS-BLACKLIST: Note: including file: {{.*test2.h}}
22 // MS-BLACKLIST-NOT: Note
  /external/llvm/test/tools/sancov/
blacklist.test 2 RUN: sancov -obj %p/Inputs/test-linux_x86_64 -covered-functions -blacklist %p/Inputs/blacklist.txt %p/Inputs/test-linux_x86_64.sancov | FileCheck %s
  /frameworks/base/services/tests/servicestests/src/com/android/server/
CertBlacklisterTest.java 53 // read the contents of the pubkey blacklist
54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
56 assertEquals("", blacklist);
60 // build a new thing to blacklist
65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
67 assertEquals(badPubkey, blacklist);
75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
76 assertEquals(badPubkey, blacklist);
82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
83 assertEquals(badPubkey, blacklist);
89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
107 assertEquals(bl.toString(), blacklist); local
114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
167 assertEquals(bl.toString(), blacklist); local
    [all...]
  /external/compiler-rt/test/asan/TestCases/Windows/
iostream_sbo.cc 1 // First, check this works with the default blacklist:
5 // Then, make sure it still works when a user uses his own blacklist file:
6 // RUN: %clang_cl_asan -O0 %s -fsanitize-blacklist=%p/../Helpers/initialization-blacklist.txt -Fe%t2
  /external/compiler-rt/test/tsan/
blacklist.cc 1 // Test blacklist functionality for TSan.
3 // RUN: echo "fun:*Blacklisted_Thread2*" > %t.blacklist
4 // RUN: %clangxx_tsan -O1 %s -fsanitize-blacklist=%t.blacklist -o %t && %run %t 2>&1 | FileCheck %s
  /external/skia/tools/
xsan.blacklist 3 # This file must be a no-op C #include header, and a valid *SAN blacklist file.
4 # Luckily, anything starting with # is a comment to *SAN blacklist files,
  /external/webrtc/tools/msan/
blacklist.txt 7 # This is a stripped down copy of Chromium's blacklist.txt, to enable
8 # adding WebRTC-specific blacklist entries.
  /external/libcxx/utils/sym_check/
sym_match.py 14 '--blacklist', dest='blacklist',
24 if not args.regexes and args.blacklist is None:
25 sys.stderr.write('Either a regex or a blacklist must be specified.\n')
27 if args.blacklist:
28 search_list = util.read_blacklist(args.blacklist)
  /libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/
CertBlacklistTest.java 153 // set our blacklist path
166 // set our blacklist path
201 private void blacklistToFile(String blacklist) throws IOException {
203 out.write(blacklist.toString().getBytes());
235 // build the blacklist
238 // write the blacklist
249 // write that to the test blacklist
251 // set our blacklist path
262 // write that to the test blacklist
266 // set our blacklist pat
    [all...]
  /external/chromium-trace/catapult/devil/devil/android/tools/
script_common.py 11 blacklist = (device_blacklist.Blacklist(blacklist_file)
15 devices = device_utils.DeviceUtils.HealthyDevices(blacklist)
  /external/chromium-trace/catapult/telemetry/telemetry/internal/platform/
android_device.py 37 def GetAllConnectedDevices(cls, blacklist):
38 device_serials = GetDeviceSerials(blacklist)
50 def _ListSerialsOfHealthyOnlineDevices(blacklist):
52 for d in device_utils.DeviceUtils.HealthyDevices(blacklist)
56 def GetDeviceSerials(blacklist):
63 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist)
85 util.WaitFor(_ListSerialsOfHealthyOnlineDevices(blacklist), 600)
86 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist)
108 blacklist = device_blacklist.Blacklist(
    [all...]

Completed in 1620 milliseconds

1 2 3 4 5 6 7 8 91011>>