HomeSort by relevance Sort by last modified time
    Searched full:blacklist (Results 1 - 25 of 409) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/kmod/testsuite/rootfs-pristine/test-blacklist/etc/modprobe.d/
modprobe.conf 0 blacklist floppy
2 blacklist pcspkr
  /external/chromium-trace/catapult/devil/devil/android/
device_blacklist.py 14 class Blacklist(object):
21 """Reads the blacklist from the blacklist file.
27 blacklist = dict()
29 return blacklist
33 blacklist = json.load(f)
35 logger.warning('Unable to read blacklist: %s', str(e))
38 if not isinstance(blacklist, dict):
40 self._path, blacklist)
41 blacklist = dict(
    [all...]
  /external/libmojo/third_party/catapult/devil/devil/android/
device_blacklist.py 12 class Blacklist(object):
19 """Reads the blacklist from the blacklist file.
29 blacklist = json.load(f)
30 if not isinstance(blacklist, dict):
32 self._path, blacklist)
33 blacklist = dict()
34 return blacklist
36 def Write(self, blacklist):
37 """Writes the provided blacklist to the blacklist file
    [all...]
  /external/compiler-rt/test/msan/
default_blacklist.cc 1 // Test that MSan uses the default blacklist from resource directory.
3 // CHECK: fsanitize-blacklist={{.*}}msan_blacklist.txt
  /external/compiler-rt/lib/msan/
msan_blacklist.txt 0 # Blacklist for MemorySanitizer. Turns off instrumentation of particular
2 # functions or sources. Use with care. You may set location of blacklist
3 # at compile-time using -fsanitize-blacklist=<path> flag.
  /external/libyuv/files/tools_libyuv/ubsan/
blacklist.txt 2 # UBSan blacklist.
5 # This is a stripped down copy of Chromium's blacklist.txt, to enable
6 # adding WebRTC-specific blacklist entries.
  /external/webrtc/tools/ubsan/
blacklist.txt 2 # UBSan blacklist.
5 # This is a stripped down copy of Chromium's blacklist.txt, to enable
6 # adding WebRTC-specific blacklist entries.
  /external/compiler-rt/test/asan/TestCases/
initialization-blacklist.cc 1 // Test for blacklist functionality of initialization-order checker.
3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\
4 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
5 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
7 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\
8 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
9 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
11 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc
    [all...]
blacklist.cc 1 // Test the blacklist functionality of ASan
5 // RUN: echo "src:*blacklist-extra.cc" >> %tmp
6 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \
7 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
8 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \
9 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
10 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \
11 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1
12 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \
13 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&
    [all...]
default_blacklist.cc 4 // Test that ASan uses the default blacklist from resource directory.
6 // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt
  /external/clang/test/Driver/
fsanitize-blacklist.c 1 // General blacklist usage.
15 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST
16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second
19 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST2
22 // Check that the default blacklist is not added as an extra dependency
    [all...]
  /external/skia/infra/bots/recipe_modules/sktest/
api.py 132 def blacklist(quad): function in function:dm_flags
138 blacklist('f16 _ _ dstreadshuffle')
139 blacklist('glsrgb image _ _')
140 blacklist('glessrgb image _ _')
146 blacklist('8888 image _ _')
149 blacklist('gbr-8888 image _ _')
150 blacklist('gbr-8888 colorImage _ _')
154 blacklist('pdf gm _ fontmgr_iter')
155 blacklist('pdf _ _ PANO_20121023_214540.jpg')
156 blacklist('pdf skp _ worldjournal'
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
blacklist.c 2 * wpa_supplicant - Temporary BSSID blacklist
13 #include "blacklist.h"
16 * wpa_blacklist_get - Get the blacklist entry for a BSSID
19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found
29 e = wpa_s->blacklist;
41 * wpa_blacklist_add - Add an BSSID to the blacklist
43 * @bssid: BSSID to be added to the blacklist
44 * Returns: Current blacklist count on success, -1 on failure
46 * This function adds the specified BSSID to the blacklist or increases the
47 * blacklist count if the BSSID was already listed. It should be called whe
    [all...]
  /external/compiler-rt/lib/asan/
asan_blacklist.txt 0 # Blacklist for AddressSanitizer. Turns off instrumentation of particular
2 # functions or sources. Use with care. You may set location of blacklist
3 # at compile-time using -fsanitize-blacklist=<path> flag.
  /external/compiler-rt/test/asan/TestCases/Helpers/
initialization-blacklist.txt 3 src:*initialization-blacklist-extra2.cc=init
  /external/clang/test/CodeGen/
sanitize-init-order.cpp 3 // Test blacklist functionality.
4 // RUN: echo "src:%s=init" > %t-file.blacklist
5 // RUN: echo "type:PODWithCtorAndDtor=init" > %t-type.blacklist
6 // RUN: echo "type:NS::PODWithCtor=init" >> %t-type.blacklist
7 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-file.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST
8 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-type.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST
    [all...]
ubsan-blacklist.c 2 // RUN: echo "fun:hash" > %t-func.blacklist
3 // RUN: echo "src:%s" > %t-file.blacklist
5 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC
6 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE
8 // FIXME: %t-file.blacklist contains DOSish paths.
  /frameworks/base/services/tests/servicestests/src/com/android/server/
CertBlacklisterTest.java 53 // read the contents of the pubkey blacklist
54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
56 assertEquals("", blacklist);
60 // build a new thing to blacklist
65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
67 assertEquals(badPubkey, blacklist);
75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
76 assertEquals(badPubkey, blacklist);
82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
83 assertEquals(badPubkey, blacklist);
89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
107 assertEquals(bl.toString(), blacklist); local
114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
167 assertEquals(bl.toString(), blacklist); local
    [all...]
  /external/chromium-trace/catapult/devil/docs/
device_blacklist.md 6 # Devil: Device Blacklist
10 The device blacklist is a per-run list of devices detected to be in a known bad
23 You can interact with the device blacklist via [devil.android.device\_blacklist](https://cs.chromium.org/chromium/src/third_party/catapult/devil/devil/android/device_blacklist.py).
24 This allows for any interaction you would need with a device blacklist:
35 blacklist = device_blacklist.Blacklist(blacklist_path)
36 blacklisted_devices = blacklist.Read()
39 blacklist.Reset()
41 blacklist.Write(new_blacklist)
42 blacklist.Extend([device_2, device_3], reason='Reason for blacklisting'
    [all...]
  /external/libmojo/third_party/catapult/devil/devil/android/tools/
device_recovery.py 54 def RecoverDevice(device, blacklist, should_reboot=lambda device: True):
56 blacklist):
80 if blacklist:
81 blacklist.Extend([device.adb.GetDeviceSerial()],
85 if blacklist:
86 blacklist.Extend([device.adb.GetDeviceSerial()],
93 if blacklist:
94 blacklist.Extend([device.adb.GetDeviceSerial()],
98 if blacklist:
99 blacklist.Extend([device.adb.GetDeviceSerial()]
    [all...]
  /external/compiler-rt/test/asan/TestCases/Windows/
iostream_sbo.cc 1 // First, check this works with the default blacklist:
5 // Then, make sure it still works when a user uses his own blacklist file:
6 // RUN: %clang_cl_asan -O0 %s -fsanitize-blacklist=%p/../Helpers/initialization-blacklist.txt -Fe%t2
  /external/compiler-rt/test/tsan/
blacklist.cc 1 // Test blacklist functionality for TSan.
3 // RUN: echo "fun:*Blacklisted_Thread2*" > %t.blacklist
4 // RUN: %clangxx_tsan -O1 %s -fsanitize-blacklist=%t.blacklist -o %t && %run %t 2>&1 | FileCheck %s
  /external/clang/test/Frontend/
print-header-includes.c 16 // RUN: echo "fun:foo" > %t.blacklist
17 // RUN: %clang_cc1 -I%S -fsanitize=address -fdepfile-entry=%t.blacklist -E --show-includes -o /dev/null %s | \
18 // RUN: FileCheck --strict-whitespace --check-prefix=MS-BLACKLIST %s
19 // MS-BLACKLIST: Note: including file: {{[^ ]*\.blacklist}}
20 // MS-BLACKLIST: Note: including file: {{[^ ]*test.h}}
21 // MS-BLACKLIST: Note: including file: {{[^ ]*test2.h}}
22 // MS-BLACKLIST-NOT: Note
  /external/libyuv/files/tools_libyuv/msan/
blacklist.txt 7 # This is a stripped down copy of Chromium's blacklist.txt, to enable
8 # adding libyuv-specific blacklist entries.
  /external/webrtc/tools/msan/
blacklist.txt 7 # This is a stripped down copy of Chromium's blacklist.txt, to enable
8 # adding WebRTC-specific blacklist entries.

Completed in 1546 milliseconds

1 2 3 4 5 6 7 8 91011>>