Searched refs:Sanitizers (Results 1 – 24 of 24) sorted by relevance
39 assertEquals("", Sanitizers.FORMATTING.sanitize(null)); in testFormatting()40 assertEquals("", Sanitizers.FORMATTING.sanitize("")); in testFormatting()43 Sanitizers.FORMATTING.sanitize("Hello, World!")); in testFormatting()46 Sanitizers.FORMATTING.sanitize("Hello, <b>World</b>!")); in testFormatting()49 Sanitizers.FORMATTING.sanitize( in testFormatting()55 assertEquals("", Sanitizers.BLOCKS.sanitize(null)); in testBlockElements()58 Sanitizers.BLOCKS.sanitize("Hello, World!")); in testBlockElements()61 Sanitizers.BLOCKS.sanitize("Hello, <b>World</b>!")); in testBlockElements()64 Sanitizers.BLOCKS.sanitize( in testBlockElements()70 PolicyFactory s = Sanitizers.BLOCKS.and(Sanitizers.FORMATTING); in testBlockAndFormattingElements()[all …]
68 hcr.setPolicy(Sanitizers.FORMATTING.apply(hcr.getWrappedRenderer())); in testChangeReporting()
25 SanitizerSet Sanitizers; variable46 bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } in needsAsanRt()48 bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } in needsTsanRt()49 bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } in needsMsanRt()51 return Sanitizers.has(SanitizerKind::Leak) && in needsLsanRt()52 !Sanitizers.has(SanitizerKind::Address); in needsLsanRt()55 bool needsDfsanRt() const { return Sanitizers.has(SanitizerKind::DataFlow); } in needsDfsanRt()57 return Sanitizers.has(SanitizerKind::SafeStack); in needsSafeStackRt()63 return Sanitizers.hasOneOf(SanitizerKind::Efficiency); in needsEsanRt()
652 HelpText<"Specify the type of coverage instrumentation for Sanitizers">;657 "Sanitizers">;
82 static std::string toString(const clang::SanitizerSet &Sanitizers);162 return ((Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) || in needsUbsanRt()164 !Sanitizers.has(Address) && !Sanitizers.has(Memory) && in needsUbsanRt()165 !Sanitizers.has(Thread) && !Sanitizers.has(DataFlow) && !CfiCrossDso; in needsUbsanRt()169 return !(Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiRt()173 return (Sanitizers.Mask & CFI & ~TrapSanitizers.Mask) && CfiCrossDso; in needsCfiDiagRt()177 return NeedPIE || (Sanitizers.Mask & RequiresPIE); in requiresPIE()181 return Sanitizers.Mask & NeedsUnwindTables; in needsUnwindTables()574 Sanitizers.Mask |= Kinds; in SanitizerArgs()579 static std::string toString(const clang::SanitizerSet &Sanitizers) { in toString() argument[all …]
53 public final class Sanitizers { class110 private Sanitizers() { in Sanitizers() method in Sanitizers
82 Sanitizers.cpp
1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
1682 let Args = [VariadicStringArgument<"Sanitizers">];
278 ## Sanitizers section in Getting Started283 Sanitizers available: tsan, msan, asan, ubsan, lsan
359 Sanitizers available: TSan, MSan, ASan, UBSan, LSan
META-INF/ META-INF/MANIFEST.MF org/ org/owasp/ org/ ...
48 textual header "Basic/Sanitizers.def"
32 Scudo can be considered a Frontend to the Sanitizers' common allocator (later
197 ### Sanitizers subsection208 Sanitizers available vary by platform, target, and compiler. Consult your
97 # Sanitizers.
341 # Sanitizers.
531 # Sanitizers try to intercept new and delete.
451 # Sanitizers.
5217 std::vector<StringRef> Sanitizers; in handleNoSanitizeAttr() local5229 Sanitizers.push_back(SanitizerName); in handleNoSanitizeAttr()5233 Attr.getRange(), S.Context, Sanitizers.data(), Sanitizers.size(), in handleNoSanitizeAttr()
369 const std::vector<std::string> &Sanitizers, in parseSanitizerKinds() argument371 for (const auto &Sanitizer : Sanitizers) { in parseSanitizerKinds()
2165 Disable specified features of coverage instrumentation for Sanitizers2173 Specify the type of coverage instrumentation for Sanitizers
1455 Sanitizers subsection