OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:protector
(Results
26 - 50
of
1265
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/compiler-rt/test/safestack/
canary.c
1
// RUN: %clang_safestack -fno-stack-
protector
-D_FORTIFY_SOURCE=0 -g %s -o %t.nossp
4
// RUN: %clang_safestack -fstack-
protector
-all -D_FORTIFY_SOURCE=0 -g %s -o %t.ssp
overflow.c
4
// RUN: %clang_nosafestack -fno-stack-
protector
%s -o %t
/external/llvm/test/Transforms/SafeStack/
constant-gep-call.ll
11
; a safe stack
protector
.
13
; Requires no
protector
.
addr-taken.ll
7
; Requires
protector
.
escape-addr-pointer.ll
8
; Requires
protector
.
escape-bitcast-store2.ll
9
; Requires
protector
.
escape-call.ll
7
; Requires
protector
.
ret.ll
7
; Requires
protector
.
/external/tpm2/
Object_spt_fp.h
16
TPM_HANDLE
protector
, // IN: The
protector
's handle
43
TPM_HANDLE protectorHandle, // IN: the
protector
handle
59
TPM_HANDLE
protector
, // IN: The handle of the object that provides
86
TPM_HANDLE
protector
, // IN: The
protector
's handle
117
TPM_HANDLE
protector
, // IN: The handle of the object that provides
/external/clang/test/Driver/
rewrite-legacy-objc.m
6
// TEST0: "-fmessage-length" "0" "-stack-
protector
" "1" "-fblocks" "-fobjc-runtime=macosx-fragile" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fexceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
12
// TEST1: "-fmessage-length" "0" "-stack-
protector
" "1" "-fblocks" "-fobjc-runtime=macosx-fragile" "-fobjc-subscripting-legacy-runtime" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
13
// TEST2: "-fmessage-length" "0" "-stack-
protector
" "1" "-fblocks" "-fobjc-runtime=macosx-fragile" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
rewrite-objc.m
6
// TEST0: "-fmessage-length" "0" "-stack-
protector
" "1" "-fblocks" "-fobjc-runtime=macosx" "-fencode-extended-block-signature" "-fno-objc-infer-related-result-type" "-fobjc-exceptions" "-fexceptions" "-fmax-type-align=16" "-fdiagnostics-show-option"
/external/llvm/test/CodeGen/Mips/
mips16-hf-attr-2.ll
30
"no-nans-fp-math"="false" "stack-
protector
-buffer-size"="8"
37
"no-nans-fp-math"="false" "stack-
protector
-buffer-size"="8"
43
"no-nans-fp-math"="false" "stack-
protector
-buffer-size"="8"
mips16-hf-attr.ll
30
"no-nans-fp-math"="false" "stack-
protector
-buffer-size"="8"
37
"no-nans-fp-math"="false" "stack-
protector
-buffer-size"="8"
43
"no-nans-fp-math"="false" "stack-
protector
-buffer-size"="8"
/external/autotest/client/site_tests/platform_ToolchainOptions/
control
13
1. -fstack-
protector
-all
/external/avb/
Android.bp
32
"-fstack-
protector
-strong",
98
cflags: ["-fno-stack-
protector
"],
143
"-fno-stack-
protector
",
154
"-fno-stack-
protector
",
/external/chromium-trace/catapult/systrace/atrace_helper/jni/
Android.mk
11
LOCAL_CPPFLAGS += -fPIE -fno-rtti -fno-exceptions -fstack-
protector
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/lib/gcc/x86_64-linux/4.8/32/
crtfastmath.o
crtprec32.o
crtprec64.o
crtprec80.o
/external/swiftshader/third_party/LLVM/lib/CodeGen/
StackProtector.cpp
1
//===-- StackProtector.cpp - Stack
Protector
Insertion --------------------===//
17
#define DEBUG_TYPE "stack-
protector
"
36
SSPBufferSize("stack-
protector
-buffer-size", cl::init(8),
59
/// CreateFailBB - Create a basic block to jump to when the stack
protector
64
/// stack
protector
based upon the stack
protector
level.
85
INITIALIZE_PASS(StackProtector, "stack-
protector
",
103
///
protector
based upon the stack
protector
level. The heuristic we use is to
232
// Generate the stack
protector
instructions in the old basic block
[
all
...]
/external/clang/cmake/caches/
Apple-stage2.cmake
26
set(CMAKE_C_FLAGS "-fno-stack-
protector
-fno-common -Wno-profile-instr-unprofiled" CACHE STRING "")
27
set(CMAKE_CXX_FLAGS "-fno-stack-
protector
-fno-common -Wno-profile-instr-unprofiled" CACHE STRING "")
/external/llvm/test/CodeGen/X86/
dynamic-alloca-lifetime.ll
3
; This test crashed in PEI because the stack
protector
was dead.
5
; lifetimes being applied to the stack
protector
frame index.
/system/iot/attestation/atap/
Android.mk
29
-fstack-
protector
-strong \
44
LOCAL_CFLAGS := $(atap_common_cflags) -fno-stack-
protector
-DATAP_ENABLE_DEBUG
/external/llvm/lib/CodeGen/SelectionDAG/
SelectionDAGBuilder.h
363
/// stack
protector
check and signals to isel via its state being initialized
364
/// that a stack
protector
needs to be generated.
367
///
Protector
Generation. The reason that it is placed here is for a lack of
370
/// High Level Overview of SelectionDAG Stack
Protector
Generation:
373
/// pre-SelectionDAG Codegen LLVM IR Pass "Stack
Protector
". This necessitated
383
/// the stack
protector
check until later in CodeGen after the sibling call
385
///
protector
check!
389
/// 1. Preserve the architecture independence of stack
protector
generation.
391
/// 2. Preserve the normal IR level stack
protector
check for platforms like
392
/// OpenBSD for which we support platform-specific stack
protector
[
all
...]
Completed in 1048 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>