Home
last modified time | relevance | path

Searched full:sanitizer (Results 1 – 25 of 1791) sorted by relevance

12345678910>>...72

/external/llvm-project/clang/include/clang/Basic/
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
10 // enable. Users of this file must define the SANITIZER macro to make use of
16 #ifndef SANITIZER
17 #error "Define SANITIZER prior to including this file!"
20 // SANITIZER(NAME, ID)
22 // The first value is the name of the sanitizer as a string. The sanitizer can
26 // sanitizer.
31 // The first two values have the same semantics as the corresponding SANITIZER
41 SANITIZER("address", Address)
44 SANITIZER("pointer-compare", PointerCompare)
[all …]
/external/clang/include/clang/Basic/
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
11 // enable. Users of this file must define the SANITIZER macro to make use of
17 #ifndef SANITIZER
18 #error "Define SANITIZER prior to including this file!"
21 // SANITIZER(NAME, ID)
23 // The first value is the name of the sanitizer as a string. The sanitizer can
27 // sanitizer.
32 // The first two values have the same semantics as the corresponding SANITIZER
42 SANITIZER("address", Address)
45 SANITIZER("kernel-address", KernelAddress)
[all …]
/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/
DMethodSanitizerTest.java32 private MethodVisitor sanitizer; field in MethodSanitizerTest
38 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup()
45 sanitizer.visitCode(); in testLocalVariablePositive()
46 sanitizer.visitLabel(l1); in testLocalVariablePositive()
47 sanitizer.visitInsn(Opcodes.RETURN); in testLocalVariablePositive()
48 sanitizer.visitLabel(l2); in testLocalVariablePositive()
49 sanitizer.visitLocalVariable("x", "I", null, l1, l2, 0); in testLocalVariablePositive()
50 sanitizer.visitMaxs(0, 0); in testLocalVariablePositive()
51 sanitizer.visitEnd(); in testLocalVariablePositive()
69 sanitizer.visitCode(); in testLocalVariableNegative1()
[all …]
/external/llvm-project/llvm/utils/gn/secondary/compiler-rt/include/
DBUILD.gn7 "sanitizer/allocator_interface.h",
8 "sanitizer/asan_interface.h",
9 "sanitizer/common_interface_defs.h",
10 "sanitizer/coverage_interface.h",
11 "sanitizer/dfsan_interface.h",
12 "sanitizer/hwasan_interface.h",
13 "sanitizer/linux_syscall_hooks.h",
14 "sanitizer/lsan_interface.h",
15 "sanitizer/memprof_interface.h",
16 "sanitizer/msan_interface.h",
[all …]
/external/llvm-project/llvm/test/Instrumentation/SanitizerCoverage/
Dpc-table.ll1 ; Test -sanitizer-coverage-pc-table=1
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -sanit…
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-inline-8bit-counters -sanit…
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-inline-bool-flag -sanitizer
5 … %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard…
6 … %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-inline-8bit-co…
7 … < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-inline-bool-…
Dbackedge-pruning.ll1 ; Test -sanitizer-coverage-trace-compares=1 and how it prunes backedge compares.
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compares=1 -sanitize…
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compares=1 -sanitize…
4 … < %s -passes='module(sancov-module)' -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compar…
5 … < %s -passes='module(sancov-module)' -sanitizer-coverage-level=1 -sanitizer-coverage-trace-compar…
Dpostdominator_check.ll1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -sanitizer-coverag…
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -sanitizer-coverag…
3 … opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc…
4 … opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc…
Dtracing.ll1 ; Test -sanitizer-coverage-experimental-tracing
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S -enable-new-pm…
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -S -enable-…
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -S -mtriple…
6 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
7 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
8 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
Dstack-depth.ll2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 \
3 ; RUN: -sanitizer-coverage-stack-depth -S -enable-new-pm=0 | FileCheck %s
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 \
5 ; RUN: -sanitizer-coverage-stack-depth -sanitizer-coverage-trace-pc-guard \
7 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=1 \
8 ; RUN: -sanitizer-coverage-stack-depth -S | FileCheck %s
9 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 \
10 ; RUN: -sanitizer-coverage-stack-depth -sanitizer-coverage-trace-pc-guard \
Dtracing-comdat.ll2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc…
4 ; RUN: opt < %s -sancov -asan -asan-module -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc…
6 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
7 …n-globals-md>,sancov-module,asan-module),function(asan)' -sanitizer-coverage-level=3 -sanitizer-co…
Dinterposable-symbol-nocomdat.ll2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -mtriple x86…
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc-guard -mtriple x86…
4 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
5 ; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-tra…
/external/llvm-project/compiler-rt/include/
DCMakeLists.txt3 sanitizer/allocator_interface.h
4 sanitizer/asan_interface.h
5 sanitizer/common_interface_defs.h
6 sanitizer/coverage_interface.h
7 sanitizer/dfsan_interface.h
8 sanitizer/hwasan_interface.h
9 sanitizer/linux_syscall_hooks.h
10 sanitizer/lsan_interface.h
11 sanitizer/msan_interface.h
12 sanitizer/netbsd_syscall_hooks.h
[all …]
/external/oss-fuzz/infra/build/functions/
Dbuild_project.py44 'sanitizer-address': ['SANITIZER=address'],
45 'sanitizer-dataflow': ['SANITIZER=dataflow'],
46 'sanitizer-memory': ['SANITIZER=memory'],
47 'sanitizer-undefined': ['SANITIZER=undefined'],
85 def is_supported_configuration(fuzzing_engine, sanitizer, architecture): argument
88 if architecture == 'i386' and sanitizer != 'address':
90 return (sanitizer in fuzzing_engine_info.supported_sanitizers and
100 for sanitizer in sanitizers:
101 if isinstance(sanitizer, six.string_types):
102 processed_sanitizers.append(sanitizer)
[all …]
/external/compiler-rt/include/
DCMakeLists.txt2 sanitizer/allocator_interface.h
3 sanitizer/asan_interface.h
4 sanitizer/common_interface_defs.h
5 sanitizer/coverage_interface.h
6 sanitizer/dfsan_interface.h
7 sanitizer/esan_interface.h
8 sanitizer/linux_syscall_hooks.h
9 sanitizer/lsan_interface.h
10 sanitizer/msan_interface.h
11 sanitizer/tsan_interface_atomic.h)
[all …]
/external/rust/crates/libfuzzer-sys/ci/
Dscript.sh13 -Cllvm-args=-sanitizer-coverage-level=3 \
14 -Cllvm-args=-sanitizer-coverage-trace-compares \
15 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters \
16 -Cllvm-args=-sanitizer-coverage-stack-depth \
17 -Cllvm-args=-sanitizer-coverage-trace-geps \
18 -Cllvm-args=-sanitizer-coverage-prune-blocks=0 \
28 -Cllvm-args=-sanitizer-coverage-level=3 \
29 -Cllvm-args=-sanitizer-coverage-trace-compares \
30 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters \
31 -Cllvm-args=-sanitizer-coverage-stack-depth \
[all …]
/external/llvm/test/Instrumentation/SanitizerCoverage/
Dcoverage.ll1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil…
5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil…
6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil…
7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil…
8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s…
10 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC…
[all …]
/external/libvpx/libvpx/tools/
Dset_analyzer_env.sh10 ## sanitizer builds and testing.
12 sanitizer="${1}"
14 case "${sanitizer}" in
31 echo "Usage: source set_analyzer_env.sh [<sanitizer>|clear]"
45 if [ "${sanitizer}" = "undefined" -o "${sanitizer}" = "integer" ]; then
46 echo "WARNING: When building the ${sanitizer} sanitizer for 32 bit targets"
52 if [ "${sanitizer}" = "undefined" ]; then
68 cflags="-fsanitize=${sanitizer}"
69 ldflags="-fsanitize=${sanitizer}"
78 if [ "${sanitizer}" = "cfi" ]; then
[all …]
/external/llvm-project/clang/test/Modules/
Dcheck-for-sanitizer-feature.cpp6 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
7 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s
12 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
13 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s
18 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
19 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s
27 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
28 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s
34 // RUN: -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
35 // RUN: -I %S/Inputs/check-for-sanitizer-feature -verify %s
[all …]
/external/oss-fuzz/infra/ci/
Dbuild.py83 def build_fuzzers(project, engine, sanitizer, architecture): argument
85 with |engine| and |sanitizer| for |architecture|."""
87 'build_fuzzers', project, '--engine', engine, '--sanitizer', sanitizer,
92 def check_build(project, engine, sanitizer, architecture): argument
94 recently built with |engine| and |sanitizer| for |architecture|."""
96 'check_build', project, '--engine', engine, '--sanitizer', sanitizer,
126 if os.getenv('SANITIZER') == 'coverage':
136 is_enabled('SANITIZER', 'sanitizers', DEFAULT_SANITIZERS) and
142 SANITIZER, ENGINE, and ARCHITECTURE."""
153 sanitizer = os.getenv('SANITIZER')
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/cmake/
Ddetect-sanitizer.cmake1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags
7 # Build list of supported sanitizer flags by incrementally trying compilation with
8 # known sanitizer checks
35 message(STATUS "Memory sanitizer is enabled")
38 message(STATUS "Memory sanitizer is not supported")
71 # Only check for leak sanitizer if not cross-compiling due to qemu crash
75 # Only check for alignment sanitizer flag if unaligned access is not supported
86 # Group sanitizer flag -fsanitize=undefined will automatically add alignment, even if
92 message(STATUS "Sanitizer checks are not supported")
/external/zstd/.github/workflows/
Dmain.yml9 sanitizer: [address, undefined, memory]
11 - name: Build Fuzzers (${{ matrix.sanitizer }})
17 sanitizer: ${{ matrix.sanitizer }}
18 - name: Run Fuzzers (${{ matrix.sanitizer }})
24 sanitizer: ${{ matrix.sanitizer }}
29 name: ${{ matrix.sanitizer }}-artifacts
/external/oss-fuzz/.github/workflows/
Dproject_tests.yml16 sanitizer:
25 sanitizer: address
28 sanitizer: address
31 sanitizer: address
34 sanitizer: address
37 sanitizer: dataflow
41 SANITIZER: ${{ matrix.sanitizer }}
/external/oss-fuzz/infra/base-images/base-builder/
Dcompile20 if [ "$SANITIZER" = "dataflow" ] && [ "$FUZZING_ENGINE" != "dataflow" ]; then
21 echo "ERROR: 'dataflow' sanitizer can be used with 'dataflow' engine only."
30 if [ "$SANITIZER" != "address" ]; then
45 if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "undefined" ]; then
56 FLAGS_VAR="SANITIZER_FLAGS_${SANITIZER}"
86 COVERAGE_FLAGS_VAR="COVERAGE_FLAGS_${SANITIZER}"
101 if [ "$SANITIZER" != "undefined" ] && [ "$SANITIZER" != "coverage" ] && [ "$ARCHITECTURE" != 'i386'…
102 export RUSTFLAGS="--cfg fuzzing -Zsanitizer=${SANITIZER} -Cdebuginfo=1 -Cforce-frame-pointers"
106 if [ "$SANITIZER" = "coverage" ]
123 if [ "$SANITIZER" = "address" ]; then
[all …]
/external/oss-fuzz/docs/reference/
Dglossary.md47 with a [sanitizer].
69 [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer
74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable…
77 $ python infra/helper.py build_fuzzers --sanitizer undefined json
82 | Sanitizer | Description
84 …ddress` *(default)* | [Address Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitiz…
85 | `undefined` | [Undefined Behavior Sanitizer](http://clang.llvm.org/docs/UndefinedBehaviorSanitize…
86Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NOTE: It is critical t…
/external/oss-fuzz/infra/cifuzz/
Dbuild_fuzzers.py81 docker_args = get_common_docker_args(self.config.sanitizer,
93 if self.config.sanitizer == 'memory':
107 logging.info('Building with %s sanitizer.', self.config.sanitizer)
113 if self.config.sanitizer == 'memory':
172 sanitizer: The sanitizer the fuzzers should be built with.
189 def get_common_docker_args(sanitizer, language): argument
197 'SANITIZER=' + sanitizer,
208 sanitizer, argument
215 sanitizer: The sanitizer the fuzzers are built with.
227 command = get_common_docker_args(sanitizer, language)

12345678910>>...72