/external/kmod/testsuite/rootfs-pristine/test-blacklist/etc/modprobe.d/ |
modprobe.conf | 0 blacklist floppy 2 blacklist pcspkr
|
/external/chromium-trace/catapult/devil/devil/android/ |
device_blacklist.py | 14 class Blacklist(object): 21 """Reads the blacklist from the blacklist file. 27 blacklist = dict() 29 return blacklist 33 blacklist = json.load(f) 35 logger.warning('Unable to read blacklist: %s', str(e)) 38 if not isinstance(blacklist, dict): 40 self._path, blacklist) 41 blacklist = dict( [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/ |
device_blacklist.py | 12 class Blacklist(object): 19 """Reads the blacklist from the blacklist file. 29 blacklist = json.load(f) 30 if not isinstance(blacklist, dict): 32 self._path, blacklist) 33 blacklist = dict() 34 return blacklist 36 def Write(self, blacklist): 37 """Writes the provided blacklist to the blacklist file [all...] |
/external/compiler-rt/test/msan/ |
default_blacklist.cc | 1 // Test that MSan uses the default blacklist from resource directory. 3 // CHECK: fsanitize-blacklist={{.*}}msan_blacklist.txt
|
/external/compiler-rt/lib/msan/ |
msan_blacklist.txt | 0 # Blacklist for MemorySanitizer. Turns off instrumentation of particular 2 # functions or sources. Use with care. You may set location of blacklist 3 # at compile-time using -fsanitize-blacklist=<path> flag.
|
/external/libyuv/files/tools_libyuv/ubsan/ |
blacklist.txt | 2 # UBSan blacklist. 5 # This is a stripped down copy of Chromium's blacklist.txt, to enable 6 # adding WebRTC-specific blacklist entries.
|
/external/webrtc/tools/ubsan/ |
blacklist.txt | 2 # UBSan blacklist. 5 # This is a stripped down copy of Chromium's blacklist.txt, to enable 6 # adding WebRTC-specific blacklist entries.
|
/external/compiler-rt/test/asan/TestCases/ |
initialization-blacklist.cc | 1 // Test for blacklist functionality of initialization-order checker. 3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\ 4 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \ 5 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t 7 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\ 8 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \ 9 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t 11 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc [all...] |
blacklist.cc | 1 // Test the blacklist functionality of ASan 5 // RUN: echo "src:*blacklist-extra.cc" >> %tmp 6 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \ 7 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 8 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \ 9 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 10 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \ 11 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>&1 12 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \ 13 // RUN: %p/Helpers/blacklist-extra.cc && %run %t 2>& [all...] |
default_blacklist.cc | 4 // Test that ASan uses the default blacklist from resource directory. 6 // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt
|
/external/clang/test/Driver/ |
fsanitize-blacklist.c | 1 // General blacklist usage. 15 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST 16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second 19 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.second %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST2 22 // Check that the default blacklist is not added as an extra dependency [all...] |
/external/skia/infra/bots/recipe_modules/sktest/ |
api.py | 132 def blacklist(quad): function in function:dm_flags 138 blacklist('f16 _ _ dstreadshuffle') 139 blacklist('glsrgb image _ _') 140 blacklist('glessrgb image _ _') 146 blacklist('8888 image _ _') 149 blacklist('gbr-8888 image _ _') 150 blacklist('gbr-8888 colorImage _ _') 154 blacklist('pdf gm _ fontmgr_iter') 155 blacklist('pdf _ _ PANO_20121023_214540.jpg') 156 blacklist('pdf skp _ worldjournal' [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 2 * wpa_supplicant - Temporary BSSID blacklist 13 #include "blacklist.h" 16 * wpa_blacklist_get - Get the blacklist entry for a BSSID 19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found 29 e = wpa_s->blacklist; 41 * wpa_blacklist_add - Add an BSSID to the blacklist 43 * @bssid: BSSID to be added to the blacklist 44 * Returns: Current blacklist count on success, -1 on failure 46 * This function adds the specified BSSID to the blacklist or increases the 47 * blacklist count if the BSSID was already listed. It should be called whe [all...] |
/external/compiler-rt/lib/asan/ |
asan_blacklist.txt | 0 # Blacklist for AddressSanitizer. Turns off instrumentation of particular 2 # functions or sources. Use with care. You may set location of blacklist 3 # at compile-time using -fsanitize-blacklist=<path> flag.
|
/external/compiler-rt/test/asan/TestCases/Helpers/ |
initialization-blacklist.txt | 3 src:*initialization-blacklist-extra2.cc=init
|
/external/clang/test/CodeGen/ |
sanitize-init-order.cpp | 3 // Test blacklist functionality. 4 // RUN: echo "src:%s=init" > %t-file.blacklist 5 // RUN: echo "type:PODWithCtorAndDtor=init" > %t-type.blacklist 6 // RUN: echo "type:NS::PODWithCtor=init" >> %t-type.blacklist 7 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-file.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST 8 // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-type.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST [all...] |
ubsan-blacklist.c | 2 // RUN: echo "fun:hash" > %t-func.blacklist 3 // RUN: echo "src:%s" > %t-file.blacklist 5 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC 6 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE 8 // FIXME: %t-file.blacklist contains DOSish paths.
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
CertBlacklisterTest.java | 53 // read the contents of the pubkey blacklist 54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 56 assertEquals("", blacklist); 60 // build a new thing to blacklist 65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 67 assertEquals(badPubkey, blacklist); 75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 76 assertEquals(badPubkey, blacklist); 82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 83 assertEquals(badPubkey, blacklist); 89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 107 assertEquals(bl.toString(), blacklist); local 114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 167 assertEquals(bl.toString(), blacklist); local [all...] |
/external/chromium-trace/catapult/devil/docs/ |
device_blacklist.md | 6 # Devil: Device Blacklist 10 The device blacklist is a per-run list of devices detected to be in a known bad 23 You can interact with the device blacklist via [devil.android.device\_blacklist](https://cs.chromium.org/chromium/src/third_party/catapult/devil/devil/android/device_blacklist.py). 24 This allows for any interaction you would need with a device blacklist: 35 blacklist = device_blacklist.Blacklist(blacklist_path) 36 blacklisted_devices = blacklist.Read() 39 blacklist.Reset() 41 blacklist.Write(new_blacklist) 42 blacklist.Extend([device_2, device_3], reason='Reason for blacklisting' [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/tools/ |
device_recovery.py | 54 def RecoverDevice(device, blacklist, should_reboot=lambda device: True): 56 blacklist): 80 if blacklist: 81 blacklist.Extend([device.adb.GetDeviceSerial()], 85 if blacklist: 86 blacklist.Extend([device.adb.GetDeviceSerial()], 93 if blacklist: 94 blacklist.Extend([device.adb.GetDeviceSerial()], 98 if blacklist: 99 blacklist.Extend([device.adb.GetDeviceSerial()] [all...] |
/external/compiler-rt/test/asan/TestCases/Windows/ |
iostream_sbo.cc | 1 // First, check this works with the default blacklist: 5 // Then, make sure it still works when a user uses his own blacklist file: 6 // RUN: %clang_cl_asan -O0 %s -fsanitize-blacklist=%p/../Helpers/initialization-blacklist.txt -Fe%t2
|
/external/compiler-rt/test/tsan/ |
blacklist.cc | 1 // Test blacklist functionality for TSan. 3 // RUN: echo "fun:*Blacklisted_Thread2*" > %t.blacklist 4 // RUN: %clangxx_tsan -O1 %s -fsanitize-blacklist=%t.blacklist -o %t && %run %t 2>&1 | FileCheck %s
|
/external/clang/test/Frontend/ |
print-header-includes.c | 16 // RUN: echo "fun:foo" > %t.blacklist 17 // RUN: %clang_cc1 -I%S -fsanitize=address -fdepfile-entry=%t.blacklist -E --show-includes -o /dev/null %s | \ 18 // RUN: FileCheck --strict-whitespace --check-prefix=MS-BLACKLIST %s 19 // MS-BLACKLIST: Note: including file: {{[^ ]*\.blacklist}} 20 // MS-BLACKLIST: Note: including file: {{[^ ]*test.h}} 21 // MS-BLACKLIST: Note: including file: {{[^ ]*test2.h}} 22 // MS-BLACKLIST-NOT: Note
|
/external/libyuv/files/tools_libyuv/msan/ |
blacklist.txt | 7 # This is a stripped down copy of Chromium's blacklist.txt, to enable 8 # adding libyuv-specific blacklist entries.
|
/external/webrtc/tools/msan/ |
blacklist.txt | 7 # This is a stripped down copy of Chromium's blacklist.txt, to enable 8 # adding WebRTC-specific blacklist entries.
|