HomeSort by relevance Sort by last modified time
    Searched full:protector (Results 26 - 50 of 1265) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/compiler-rt/test/safestack/
canary.c 1 // RUN: %clang_safestack -fno-stack-protector -D_FORTIFY_SOURCE=0 -g %s -o %t.nossp
4 // RUN: %clang_safestack -fstack-protector-all -D_FORTIFY_SOURCE=0 -g %s -o %t.ssp
overflow.c 4 // RUN: %clang_nosafestack -fno-stack-protector %s -o %t
  /external/llvm/test/Transforms/SafeStack/
constant-gep-call.ll 11 ; a safe stack protector.
13 ; Requires no protector.
addr-taken.ll 7 ; Requires protector.
escape-addr-pointer.ll 8 ; Requires protector.
escape-bitcast-store2.ll 9 ; Requires protector.
escape-call.ll 7 ; Requires protector.
ret.ll 7 ; Requires protector.
  /external/tpm2/
Object_spt_fp.h 16 TPM_HANDLE protector, // IN: The protector's handle
43 TPM_HANDLE protectorHandle, // IN: the protector handle
59 TPM_HANDLE protector, // IN: The handle of the object that provides
86 TPM_HANDLE protector, // IN: The protector's handle
117 TPM_HANDLE protector, // IN: The handle of the object that provides
  /external/clang/test/Driver/
rewrite-legacy-objc.m 6 // TEST0: "-fmessage-length" "0" "-stack-protector" "1" "-fblocks" "-fobjc-runtime=macosx-fragile" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fexceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
12 // TEST1: "-fmessage-length" "0" "-stack-protector" "1" "-fblocks" "-fobjc-runtime=macosx-fragile" "-fobjc-subscripting-legacy-runtime" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
13 // TEST2: "-fmessage-length" "0" "-stack-protector" "1" "-fblocks" "-fobjc-runtime=macosx-fragile" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
rewrite-objc.m 6 // TEST0: "-fmessage-length" "0" "-stack-protector" "1" "-fblocks" "-fobjc-runtime=macosx" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fexceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
  /external/llvm/test/CodeGen/Mips/
mips16-hf-attr-2.ll 30 "no-nans-fp-math"="false" "stack-protector-buffer-size"="8"
37 "no-nans-fp-math"="false" "stack-protector-buffer-size"="8"
43 "no-nans-fp-math"="false" "stack-protector-buffer-size"="8"
mips16-hf-attr.ll 30 "no-nans-fp-math"="false" "stack-protector-buffer-size"="8"
37 "no-nans-fp-math"="false" "stack-protector-buffer-size"="8"
43 "no-nans-fp-math"="false" "stack-protector-buffer-size"="8"
  /external/autotest/client/site_tests/platform_ToolchainOptions/
control 13 1. -fstack-protector-all
  /external/avb/
Android.bp 32 "-fstack-protector-strong",
98 cflags: ["-fno-stack-protector"],
143 "-fno-stack-protector",
154 "-fno-stack-protector",
  /external/chromium-trace/catapult/systrace/atrace_helper/jni/
Android.mk 11 LOCAL_CPPFLAGS += -fPIE -fno-rtti -fno-exceptions -fstack-protector
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/lib/gcc/x86_64-linux/4.8/32/
crtfastmath.o 
crtprec32.o 
crtprec64.o 
crtprec80.o 
  /external/swiftshader/third_party/LLVM/lib/CodeGen/
StackProtector.cpp 1 //===-- StackProtector.cpp - Stack Protector Insertion --------------------===//
17 #define DEBUG_TYPE "stack-protector"
36 SSPBufferSize("stack-protector-buffer-size", cl::init(8),
59 /// CreateFailBB - Create a basic block to jump to when the stack protector
64 /// stack protector based upon the stack protector level.
85 INITIALIZE_PASS(StackProtector, "stack-protector",
103 /// protector based upon the stack protector level. The heuristic we use is to
232 // Generate the stack protector instructions in the old basic block
    [all...]
  /external/clang/cmake/caches/
Apple-stage2.cmake 26 set(CMAKE_C_FLAGS "-fno-stack-protector -fno-common -Wno-profile-instr-unprofiled" CACHE STRING "")
27 set(CMAKE_CXX_FLAGS "-fno-stack-protector -fno-common -Wno-profile-instr-unprofiled" CACHE STRING "")
  /external/llvm/test/CodeGen/X86/
dynamic-alloca-lifetime.ll 3 ; This test crashed in PEI because the stack protector was dead.
5 ; lifetimes being applied to the stack protector frame index.
  /system/iot/attestation/atap/
Android.mk 29 -fstack-protector-strong \
44 LOCAL_CFLAGS := $(atap_common_cflags) -fno-stack-protector -DATAP_ENABLE_DEBUG
  /external/llvm/lib/CodeGen/SelectionDAG/
SelectionDAGBuilder.h 363 /// stack protector check and signals to isel via its state being initialized
364 /// that a stack protector needs to be generated.
367 /// Protector Generation. The reason that it is placed here is for a lack of
370 /// High Level Overview of SelectionDAG Stack Protector Generation:
373 /// pre-SelectionDAG Codegen LLVM IR Pass "Stack Protector". This necessitated
383 /// the stack protector check until later in CodeGen after the sibling call
385 /// protector check!
389 /// 1. Preserve the architecture independence of stack protector generation.
391 /// 2. Preserve the normal IR level stack protector check for platforms like
392 /// OpenBSD for which we support platform-specific stack protector
    [all...]

Completed in 1048 milliseconds

12 3 4 5 6 7 8 91011>>