/external/chromium-trace/catapult/devil/devil/android/ |
device_blacklist.py | 12 class Blacklist(object): 19 """Reads the blacklist from the blacklist file. 29 blacklist = json.load(f) 30 if not isinstance(blacklist, dict): 32 self._path, blacklist) 33 blacklist = dict() 34 return blacklist 36 def Write(self, blacklist): 37 """Writes the provided blacklist to the blacklist file [all...] |
/external/compiler-rt/test/msan/ |
default_blacklist.cc | 1 // Test that MSan uses the default blacklist from resource directory. 3 // CHECK: fsanitize-blacklist={{.*}}msan_blacklist.txt
|
/external/compiler-rt/lib/msan/ |
msan_blacklist.txt | 0 # Blacklist for MemorySanitizer. Turns off instrumentation of particular 2 # functions or sources. Use with care. You may set location of blacklist 3 # at compile-time using -fsanitize-blacklist=<path> flag.
|
/external/webrtc/tools/ubsan/ |
blacklist.txt | 2 # UBSan blacklist. 5 # This is a stripped down copy of Chromium's blacklist.txt, to enable 6 # adding WebRTC-specific blacklist entries.
|
/external/compiler-rt/test/asan/TestCases/ |
initialization-blacklist.cc | 1 // Test for blacklist functionality of initialization-order checker. 3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\ 4 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \ 5 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t 7 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\ 8 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \ 9 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t 11 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc [all...] |
blacklist.cc | 1 // Test the blacklist functionality of ASan 5 // RUN: echo "src:*blacklist-extra.cc" >> %tmp 6 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \ 7 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 8 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \ 9 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 10 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \ 11 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 12 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \ 13 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>& [all...] |
default_blacklist.cc | 4 // Test that ASan uses the default blacklist from resource directory. 6 // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt
|
/external/clang/test/Driver/ |
fsanitize-blacklist.c | 1 // General blacklist usage. 15 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST 16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second 19 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST2 22 // Check that the default blacklist is not added as an extra dependency [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 2 * wpa_supplicant - Temporary BSSID blacklist 13 #include "blacklist.h" 16 * wpa_blacklist_get - Get the blacklist entry for a BSSID 19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found 29 e = wpa_s->blacklist; 41 * wpa_blacklist_add - Add an BSSID to the blacklist 43 * @bssid: BSSID to be added to the blacklist 44 * Returns: Current blacklist count on success, -1 on failure 46 * This function adds the specified BSSID to the blacklist or increases the 47 * blacklist count if the BSSID was already listed. It should be called whe [all...] |
/external/compiler-rt/lib/asan/ |
asan_blacklist.txt | 0 # Blacklist for AddressSanitizer. Turns off instrumentation of particular 2 # functions or sources. Use with care. You may set location of blacklist 3 # at compile-time using -fsanitize-blacklist=<path> flag.
|
/external/compiler-rt/test/asan/TestCases/Helpers/ |
initialization-blacklist.txt | 3 src:*initialization-blacklist-extra2.cc=init
|
/external/clang/test/CodeGen/ |
sanitize-init-order.cpp | 3 // Test blacklist functionality. 4 // RUN: echo "src:%s=init" > %t-file.blacklist 5 // RUN: echo "type:PODWithCtorAndDtor=init" > %t-type.blacklist 6 // RUN: echo "type:NS::PODWithCtor=init" >> %t-type.blacklist 7 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-file.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST 8 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-type.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST [all...] |
ubsan-blacklist.c | 2 // RUN: echo "fun:hash" > %t-func.blacklist 3 // RUN: echo "src:%s" > %t-file.blacklist 5 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC 6 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE 8 // FIXME: %t-file.blacklist contains DOSish paths.
|
asan-globals.cpp | 2 // RUN: echo "global:*blacklisted_global*" > %t.blacklist 3 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist -emit-llvm -o - %s | FileCheck %s 4 // RUN: echo "src:%s" > %t.blacklist-src 5 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST-SRC 30 // BLACKLIST-SRC: !llvm.asan.globals = !{![[EXTRA_GLOBAL:[0-9]+]], ![[GLOBAL:[0-9]+]], ![[DYN_INIT_GLOBAL:[0-9]+]], ![[BLACKLISTED_GLOBAL:[0-9]+]], ![[STATIC_VAR:[0-9]+]], ![[LITERAL:[0-9]+]]} 31 // BLACKLIST-SRC: ![[EXTRA_GLOBAL]] = !{{{.*}} ![[EXTRA_GLOBAL_LOC:[0-9]+]], !"extra_global", i1 false, i1 false} 32 // BLACKLIST-SRC: ![[EXTRA_GLOBAL_LOC]] = !{!"{{.*}}extra-source.cpp", i32 1, i32 5 [all...] |
/external/clang/test/Frontend/ |
print-header-includes.c | 16 // RUN: echo "fun:foo" > %t.blacklist 17 // RUN: %clang_cc1 -fsanitize=address -fdepfile-entry=%t.blacklist -E --show-includes -o %t.out %s > %t.stdout 18 // RUN: FileCheck --check-prefix=MS-BLACKLIST < %t.stdout %s 19 // MS-BLACKLIST: Note: including file: {{.*\.blacklist}} 20 // MS-BLACKLIST: Note: including file: {{.*test.h}} 21 // MS-BLACKLIST: Note: including file: {{.*test2.h}} 22 // MS-BLACKLIST-NOT: Note
|
/external/llvm/test/tools/sancov/ |
blacklist.test | 2 RUN: sancov -obj %p/Inputs/test-linux_x86_64 -covered-functions -blacklist %p/Inputs/blacklist.txt %p/Inputs/test-linux_x86_64.sancov | FileCheck %s
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
CertBlacklisterTest.java | 53 // read the contents of the pubkey blacklist 54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 56 assertEquals("", blacklist); 60 // build a new thing to blacklist 65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 67 assertEquals(badPubkey, blacklist); 75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 76 assertEquals(badPubkey, blacklist); 82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 83 assertEquals(badPubkey, blacklist); 89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 107 assertEquals(bl.toString(), blacklist); local 114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 167 assertEquals(bl.toString(), blacklist); local [all...] |
/external/compiler-rt/test/asan/TestCases/Windows/ |
iostream_sbo.cc | 1 // First, check this works with the default blacklist: 5 // Then, make sure it still works when a user uses his own blacklist file: 6 // RUN: %clang_cl_asan -O0 %s -fsanitize-blacklist=%p/../Helpers/initialization-blacklist.txt -Fe%t2
|
/external/compiler-rt/test/tsan/ |
blacklist.cc | 1 // Test blacklist functionality for TSan. 3 // RUN: echo "fun:*Blacklisted_Thread2*" > %t.blacklist 4 // RUN: %clangxx_tsan -O1 %s -fsanitize-blacklist=%t.blacklist -o %t && %run %t 2>&1 | FileCheck %s
|
/external/skia/tools/ |
xsan.blacklist | 3 # This file must be a no-op C #include header, and a valid *SAN blacklist file. 4 # Luckily, anything starting with # is a comment to *SAN blacklist files,
|
/external/webrtc/tools/msan/ |
blacklist.txt | 7 # This is a stripped down copy of Chromium's blacklist.txt, to enable 8 # adding WebRTC-specific blacklist entries.
|
/external/libcxx/utils/sym_check/ |
sym_match.py | 14 '--blacklist', dest='blacklist', 24 if not args.regexes and args.blacklist is None: 25 sys.stderr.write('Either a regex or a blacklist must be specified.\n') 27 if args.blacklist: 28 search_list = util.read_blacklist(args.blacklist)
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 153 // set our blacklist path 166 // set our blacklist path 201 private void blacklistToFile(String blacklist) throws IOException { 203 out.write(blacklist.toString().getBytes()); 235 // build the blacklist 238 // write the blacklist 249 // write that to the test blacklist 251 // set our blacklist path 262 // write that to the test blacklist 266 // set our blacklist pat [all...] |
/external/chromium-trace/catapult/devil/devil/android/tools/ |
script_common.py | 11 blacklist = (device_blacklist.Blacklist(blacklist_file) 15 devices = device_utils.DeviceUtils.HealthyDevices(blacklist)
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/ |
android_device.py | 37 def GetAllConnectedDevices(cls, blacklist): 38 device_serials = GetDeviceSerials(blacklist) 50 def _ListSerialsOfHealthyOnlineDevices(blacklist): 52 for d in device_utils.DeviceUtils.HealthyDevices(blacklist) 56 def GetDeviceSerials(blacklist): 63 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 85 util.WaitFor(_ListSerialsOfHealthyOnlineDevices(blacklist), 600) 86 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 108 blacklist = device_blacklist.Blacklist( [all...] |