/external/llvm-project/clang/include/clang/Basic/ |
D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 10 // enable. Users of this file must define the SANITIZER macro to make use of 16 #ifndef SANITIZER 17 #error "Define SANITIZER prior to including this file!" 20 // SANITIZER(NAME, ID) 22 // The first value is the name of the sanitizer as a string. The sanitizer can 26 // sanitizer. 31 // The first two values have the same semantics as the corresponding SANITIZER 41 SANITIZER("address", Address) 44 SANITIZER("pointer-compare", PointerCompare) [all …]
|
/external/clang/include/clang/Basic/ |
D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 11 // enable. Users of this file must define the SANITIZER macro to make use of 17 #ifndef SANITIZER 18 #error "Define SANITIZER prior to including this file!" 21 // SANITIZER(NAME, ID) 23 // The first value is the name of the sanitizer as a string. The sanitizer can 27 // sanitizer. 32 // The first two values have the same semantics as the corresponding SANITIZER 42 SANITIZER("address", Address) 45 SANITIZER("kernel-address", KernelAddress) [all …]
|
/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/ |
D | MethodSanitizerTest.java | 32 private MethodVisitor sanitizer; field in MethodSanitizerTest 38 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup() 45 sanitizer.visitCode(); in testLocalVariablePositive() 46 sanitizer.visitLabel(l1); in testLocalVariablePositive() 47 sanitizer.visitInsn(Opcodes.RETURN); in testLocalVariablePositive() 48 sanitizer.visitLabel(l2); in testLocalVariablePositive() 49 sanitizer.visitLocalVariable("x", "I", null, l1, l2, 0); in testLocalVariablePositive() 50 sanitizer.visitMaxs(0, 0); in testLocalVariablePositive() 51 sanitizer.visitEnd(); in testLocalVariablePositive() 69 sanitizer.visitCode(); in testLocalVariableNegative1() [all …]
|
/external/llvm-project/llvm/utils/gn/secondary/compiler-rt/include/ |
D | BUILD.gn | 7 "sanitizer/allocator_interface.h", 8 "sanitizer/asan_interface.h", 9 "sanitizer/common_interface_defs.h", 10 "sanitizer/coverage_interface.h", 11 "sanitizer/dfsan_interface.h", 12 "sanitizer/hwasan_interface.h", 13 "sanitizer/linux_syscall_hooks.h", 14 "sanitizer/lsan_interface.h", 15 "sanitizer/memprof_interface.h", 16 "sanitizer/msan_interface.h", [all …]
|
/external/llvm-project/llvm/test/Instrumentation/SanitizerCoverage/ |
D | pc-table.ll | 1 ; Test -sanitizer-coverage-pc-table=1 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -sanit… 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-inline-8bit-counters -sanit… 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-inline-bool-flag -sanitizer… 5 … %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard… 6 … %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-inline-8bit-co… 7 … < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-inline-bool-…
|
D | backedge-pruning.ll | 1 ; Test -sanitizer-coverage-trace-compares=1 and how it prunes backedge compares. 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compares=1 -sanitize… 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compares=1 -sanitize… 4 … < %s -passes='module(sancov-module)' -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compar… 5 … < %s -passes='module(sancov-module)' -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compar…
|
D | postdominator_check.ll | 1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -sanitizer-coverag… 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -sanitizer-coverag… 3 … opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc… 4 … opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc…
|
D | tracing.ll | 1 ; Test -sanitizer-coverage-experimental-tracing 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S -enable-new-pm… 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -S -enable-… 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -S -mtriple… 6 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra… 7 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra… 8 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
|
D | stack-depth.ll | 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 \ 3 ; RUN: -sanitizer-coverage-stack-depth -S -enable-new-pm=0 | FileCheck %s 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 \ 5 ; RUN: -sanitizer-coverage-stack-depth -sanitizer-coverage-trace-pc-guard \ 7 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=1 \ 8 ; RUN: -sanitizer-coverage-stack-depth -S | FileCheck %s 9 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 \ 10 ; RUN: -sanitizer-coverage-stack-depth -sanitizer-coverage-trace-pc-guard \
|
D | tracing-comdat.ll | 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc… 4 ; RUN: opt < %s -sancov -asan -asan-module -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc… 6 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra… 7 …n-globals-md>,sancov-module,asan-module),function(asan)' -sanitizer-coverage-level=3 -sanitizer-co…
|
D | interposable-symbol-nocomdat.ll | 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -mtriple x86… 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -mtriple x86… 4 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra… 5 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
|
/external/llvm-project/compiler-rt/include/ |
D | CMakeLists.txt | 3 sanitizer/allocator_interface.h 4 sanitizer/asan_interface.h 5 sanitizer/common_interface_defs.h 6 sanitizer/coverage_interface.h 7 sanitizer/dfsan_interface.h 8 sanitizer/hwasan_interface.h 9 sanitizer/linux_syscall_hooks.h 10 sanitizer/lsan_interface.h 11 sanitizer/msan_interface.h 12 sanitizer/netbsd_syscall_hooks.h [all …]
|
/external/oss-fuzz/infra/build/functions/ |
D | build_project.py | 44 'sanitizer-address': ['SANITIZER=address'], 45 'sanitizer-dataflow': ['SANITIZER=dataflow'], 46 'sanitizer-memory': ['SANITIZER=memory'], 47 'sanitizer-undefined': ['SANITIZER=undefined'], 85 def is_supported_configuration(fuzzing_engine, sanitizer, architecture): argument 88 if architecture == 'i386' and sanitizer != 'address': 90 return (sanitizer in fuzzing_engine_info.supported_sanitizers and 100 for sanitizer in sanitizers: 101 if isinstance(sanitizer, six.string_types): 102 processed_sanitizers.append(sanitizer) [all …]
|
/external/compiler-rt/include/ |
D | CMakeLists.txt | 2 sanitizer/allocator_interface.h 3 sanitizer/asan_interface.h 4 sanitizer/common_interface_defs.h 5 sanitizer/coverage_interface.h 6 sanitizer/dfsan_interface.h 7 sanitizer/esan_interface.h 8 sanitizer/linux_syscall_hooks.h 9 sanitizer/lsan_interface.h 10 sanitizer/msan_interface.h 11 sanitizer/tsan_interface_atomic.h) [all …]
|
/external/rust/crates/libfuzzer-sys/ci/ |
D | script.sh | 13 -Cllvm-args=-sanitizer-coverage-level=3 \ 14 -Cllvm-args=-sanitizer-coverage-trace-compares \ 15 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters \ 16 -Cllvm-args=-sanitizer-coverage-stack-depth \ 17 -Cllvm-args=-sanitizer-coverage-trace-geps \ 18 -Cllvm-args=-sanitizer-coverage-prune-blocks=0 \ 28 -Cllvm-args=-sanitizer-coverage-level=3 \ 29 -Cllvm-args=-sanitizer-coverage-trace-compares \ 30 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters \ 31 -Cllvm-args=-sanitizer-coverage-stack-depth \ [all …]
|
/external/llvm/test/Instrumentation/SanitizerCoverage/ |
D | coverage.ll | 1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil… 5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil… 6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil… 7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil… 8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4 9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s… 10 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC… [all …]
|
/external/libvpx/libvpx/tools/ |
D | set_analyzer_env.sh | 10 ## sanitizer builds and testing. 12 sanitizer="${1}" 14 case "${sanitizer}" in 31 echo "Usage: source set_analyzer_env.sh [<sanitizer>|clear]" 45 if [ "${sanitizer}" = "undefined" -o "${sanitizer}" = "integer" ]; then 46 echo "WARNING: When building the ${sanitizer} sanitizer for 32 bit targets" 52 if [ "${sanitizer}" = "undefined" ]; then 68 cflags="-fsanitize=${sanitizer}" 69 ldflags="-fsanitize=${sanitizer}" 78 if [ "${sanitizer}" = "cfi" ]; then [all …]
|
/external/llvm-project/clang/test/Modules/ |
D | check-for-sanitizer-feature.cpp | 6 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \ 7 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s 12 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \ 13 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s 18 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \ 19 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s 27 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \ 28 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s 34 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \ 35 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s [all …]
|
/external/oss-fuzz/infra/ci/ |
D | build.py | 83 def build_fuzzers(project, engine, sanitizer, architecture): argument 85 with |engine| and |sanitizer| for |architecture|.""" 87 'build_fuzzers', project, '--engine', engine, '--sanitizer', sanitizer, 92 def check_build(project, engine, sanitizer, architecture): argument 94 recently built with |engine| and |sanitizer| for |architecture|.""" 96 'check_build', project, '--engine', engine, '--sanitizer', sanitizer, 126 if os.getenv('SANITIZER') == 'coverage': 136 is_enabled('SANITIZER', 'sanitizers', DEFAULT_SANITIZERS) and 142 SANITIZER, ENGINE, and ARCHITECTURE.""" 153 sanitizer = os.getenv('SANITIZER') [all …]
|
/external/rust/crates/libz-sys/src/zlib-ng/cmake/ |
D | detect-sanitizer.cmake | 1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags 7 # Build list of supported sanitizer flags by incrementally trying compilation with 8 # known sanitizer checks 35 message(STATUS "Memory sanitizer is enabled") 38 message(STATUS "Memory sanitizer is not supported") 71 # Only check for leak sanitizer if not cross-compiling due to qemu crash 75 # Only check for alignment sanitizer flag if unaligned access is not supported 86 # Group sanitizer flag -fsanitize=undefined will automatically add alignment, even if 92 message(STATUS "Sanitizer checks are not supported")
|
/external/zstd/.github/workflows/ |
D | main.yml | 9 sanitizer: [address, undefined, memory] 11 - name: Build Fuzzers (${{ matrix.sanitizer }}) 17 sanitizer: ${{ matrix.sanitizer }} 18 - name: Run Fuzzers (${{ matrix.sanitizer }}) 24 sanitizer: ${{ matrix.sanitizer }} 29 name: ${{ matrix.sanitizer }}-artifacts
|
/external/oss-fuzz/.github/workflows/ |
D | project_tests.yml | 16 sanitizer: 25 sanitizer: address 28 sanitizer: address 31 sanitizer: address 34 sanitizer: address 37 sanitizer: dataflow 41 SANITIZER: ${{ matrix.sanitizer }}
|
/external/oss-fuzz/infra/base-images/base-builder/ |
D | compile | 20 if [ "$SANITIZER" = "dataflow" ] && [ "$FUZZING_ENGINE" != "dataflow" ]; then 21 echo "ERROR: 'dataflow' sanitizer can be used with 'dataflow' engine only." 30 if [ "$SANITIZER" != "address" ]; then 45 if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "undefined" ]; then 56 FLAGS_VAR="SANITIZER_FLAGS_${SANITIZER}" 86 COVERAGE_FLAGS_VAR="COVERAGE_FLAGS_${SANITIZER}" 101 if [ "$SANITIZER" != "undefined" ] && [ "$SANITIZER" != "coverage" ] && [ "$ARCHITECTURE" != 'i386'… 102 export RUSTFLAGS="--cfg fuzzing -Zsanitizer=${SANITIZER} -Cdebuginfo=1 -Cforce-frame-pointers" 106 if [ "$SANITIZER" = "coverage" ] 123 if [ "$SANITIZER" = "address" ]; then [all …]
|
/external/oss-fuzz/docs/reference/ |
D | glossary.md | 47 with a [sanitizer]. 69 [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer 74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable… 77 $ python infra/helper.py build_fuzzers --sanitizer undefined json 82 | Sanitizer | Description 84 …ddress` *(default)* | [Address Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitiz… 85 | `undefined` | [Undefined Behavior Sanitizer](http://clang.llvm.org/docs/UndefinedBehaviorSanitize… 86 …Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NOTE: It is critical t…
|
/external/oss-fuzz/infra/cifuzz/ |
D | build_fuzzers.py | 81 docker_args = get_common_docker_args(self.config.sanitizer, 93 if self.config.sanitizer == 'memory': 107 logging.info('Building with %s sanitizer.', self.config.sanitizer) 113 if self.config.sanitizer == 'memory': 172 sanitizer: The sanitizer the fuzzers should be built with. 189 def get_common_docker_args(sanitizer, language): argument 197 'SANITIZER=' + sanitizer, 208 sanitizer, argument 215 sanitizer: The sanitizer the fuzzers are built with. 227 command = get_common_docker_args(sanitizer, language)
|