Home
last modified time | relevance | path

Searched +full:bad +full:- +full:build +full:- +full:check (Results 1 – 25 of 1111) sorted by relevance

12345678910>>...45

/external/oss-fuzz/infra/base-images/base-runner/
Dbad_build_check1 #!/bin/bash -u
8 # http://www.apache.org/licenses/LICENSE-2.0
18 # A minimal number of runs to test fuzz target with a non-empty input.
34 # The value below can definitely be higher (like 500-1000), but avoid being too
35 # agressive here while still evaluating the DFT-based fuzzing approach.
44 # Usually, a non UBSan build (e.g. ASan) has 165 calls to UBSan runtime. The
46 # some very small targets that may have < 200 UBSan calls even in a UBSan build.
47 # Use the threshold value of 169 (slightly > 165) for UBSan build.
50 # It would be risky to use the threshold value close to 165 for non UBSan build,
52 # of calls to UBSan runtime even in ASan build. With that, we use the threshold
[all …]
/external/oss-fuzz/infra/cifuzz/external-actions/build_fuzzers/
Daction.yml2 name: 'build-fuzzers'
3 description: "Builds an OSS-Fuzz project's fuzzers."
9 dry-run:
12 allowed-broken-targets-percentage:
16 description: 'The sanitizer to build the fuzzers with.'
18 project-src-path:
21 bad-build-check:
22 description: "Whether or not OSS-Fuzz's check for bad builds should be done."
25 storage-repo:
29 storage-repo-branch:
[all …]
/external/wayland/
DMakefile.am5 ACLOCAL_AMFLAGS = -I m4 ${ACLOCAL_FLAGS}
8 -I$(top_builddir)/src \
9 -I$(top_srcdir)/src \
10 -I$(top_builddir)/protocol
15 dist_aclocal_DATA = wayland-scanner.m4
18 wayland-scanner.mk \
25 bin_PROGRAMS = wayland-scanner
27 wayland_scanner_CPPFLAGS = $(AM_CPPFLAGS) -include config.h
29 wayland_scanner_LDADD = $(EXPAT_LIBS) $(LIBXML_LIBS) libwayland-util.la
30 pkgconfig_DATA += src/wayland-scanner.pc
[all …]
/external/oss-fuzz/infra/cifuzz/actions/build_fuzzers/
Daction.yml2 name: 'build-fuzzers'
3 description: "Builds an OSS-Fuzz project's fuzzers."
5 oss-fuzz-project-name:
6 description: 'Name of the corresponding OSS-Fuzz project.'
12 dry-run:
15 allowed-broken-targets-percentage:
19 description: 'The sanitizer to build the fuzzers with.'
21 project-src-path:
24 bad-build-check:
25 description: "Whether or not OSS-Fuzz's check for bad builds should be done."
[all …]
/external/toolchain-utils/binary_search_tool/common/
Dhash_test.sh1 #!/bin/bash -u
7 # itself. It waits for the test setup script to build and install the
10 # otherwise it is 'bad'. This allows the rest of the bisecting tool
12 # dealing with a real 'bad' image).
18 # Make an md5sum of all the files you want to check. For example if you want
19 # file1, file2, and file3 to be found as bad items:
23 # (Make sure you are hashing the files from your good build and that the hashes
24 # from good to bad build differ)
27 # In this example, file1, file2, file3 will be found as the bad files
28 # because their hashes won't match when from the bad build tree. This is
[all …]
/external/toolchain-utils/binary_search_tool/android/
DREADME.android.md5 thing or thing(s) in the set is 'bad'. `binary_search_state.py` assumes
7 and one which contains at least one bad item. `binary_search_state.py`
8 then copies items from the good and bad sets into a working set and
9 tests the result (good or bad). `binary_search_state.py` requires that
13 …/sites.google.com/a/google.com/chromeos-toolchain-team-home2/home/team-tools-and-scripts/binary-se…
16 `binary_search_state.py` in order to find the bad object or set of
17 bad objects in an Android build. Furthermore, it can also help find
18 the bad compiler pass and transformation when building that bad object.
23 After setting up your 2 build trees (see Prerequisites section), do the
26 - Decide which test script to use (`boot_test.sh` or
[all …]
Dswitch_to_bad.sh1 #!/bin/bash -u
7 # symlinks a list of object files from the 'bad' build tree into the working
8 # build tree, for testing.
10 # It is highly recommended to not use --noincremental with these scripts. If the
11 # switch scripts are given non incremental sets of GOOD/BAD objects, make will
12 # not be able to do an incremental build and will take much longer to build.
20 # Symlink from BAD obj to working tree.
21 SWITCH_CMD="ln -sf ${BISECT_BAD_BUILD}/{} {}; touch {};"
25 # Check that number of arguments == 1
26 if [ $# -eq 1 ] ; then
[all …]
Dgenerate_cmd.sh1 #!/bin/bash -eu
4 # Use of this source code is governed by a BSD-style license that can be
7 # This script extracts command line options to build bad item.
15 # The item will be `-o relative-path-to-object `, which will be used
17 # We care about the `-o` at the beginning and ` ` at the end are necessary,
18 # so that we can get build command for exact this object file.
19 # Example: prebuilt/../clang++ -O3 -MF obj1.o.d -o obj.o obj.cpp
20 # We should count this command as one to build obj.o, not obj1.o.d.
21 real_path=$(realpath --relative-to="${BISECT_WORK_BUILD}" "${abs_path}")
22 item="-o $real_path "
[all …]
/external/toolchain-utils/binary_search_tool/full_bisect_test/
Drun-test-nowrapper.sh8 # It makes sure the good & bad object directories exist (soft links); checks
9 # to see if it needs to compile the good & bad sources & populate the
12 # Then it calls main-bisect-test, which runs the actual bisection tests. This
16 # toolchain-utils directory and the
17 # toolchain-utils/binary_search_tool directory for these testers to work.
24 if [[ ! -d "${DIR}" ]] ; then
26 echo "You need to run this from toolchain-utils/binary_search_tool ."
33 rm -f good-objects
34 rm -f bad-objects
36 ln -s good-objects-permanent good-objects
[all …]
/external/angle/build/config/clang/
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
5 import("//build/config/rust.gni")
9 import("//build/config/ios/config.gni") # For `target_environment`
19 "-Xclang",
20 "-add-plugin",
21 "-Xclang",
22 "find-bad-constructs",
24 "-Xclang",
25 "-plugin-arg-find-bad-constructs",
26 "-Xclang",
[all …]
/external/cronet/third_party/icu/source/
Dconfigure.ac1 # -*-autoconf-*-
3 # AC_COPYRIGHT([ Copyright (c) 1999-2015, International Business Machines Corporation and others. A…
9 # Check for autoconf version
14 …m4_esyscmd_s([sed -n 's/^[ ]*#[ ]*define[ ]*U_ICU_VERSION[ ]*"\([^"]*\)".*/\1/p' "./common/uni…
15 [http://icu-project.org/bugs],
17 [http://icu-project.org])
31 # for icu-config
32 # This may be removed later - mow (June 17, 2010)
34 case `/bin/sh -c "echo -n x"` in
35 -n*)
[all …]
/external/icu/icu4c/source/
Dconfigure.ac1 # -*-autoconf-*-
3 # AC_COPYRIGHT([ Copyright (c) 1999-2015, International Business Machines Corporation and others. A…
9 # Check for autoconf version
14 …m4_esyscmd_s([sed -n 's/^[ ]*#[ ]*define[ ]*U_ICU_VERSION[ ]*"\([^"]*\)".*/\1/p' "./common/uni…
15 [http://icu-project.org/bugs],
17 [http://icu-project.org])
31 # for icu-config
32 # This may be removed later - mow (June 17, 2010)
34 case `/bin/sh -c "echo -n x"` in
35 -n*)
[all …]
/external/golang-protobuf/
Dintegration_test.go2 // Use of this source code is governed by a BSD-style
5 //go:build ignore
6 // +build ignore
36 buildRelease = flag.Bool("buildRelease", false, "build release binaries")
50 golangLatest = golangVersions[len(golangVersions)-1]
60 // purgeTimeout determines the maximum age of unused sub-directories.
76 // Fail the test late, so we can test uncommitted changes with -failfast.
81 gitUntracked := mustRunCommand(t, "git", "ls-files", "--others", "--exclude-standard")
86 // Do the relatively fast checks up-front.
88 diff := mustRunCommand(t, "go", "run", "-tags", "protolegacy", "./internal/cmd/generate-types")
[all …]
/external/autotest/server/hosts/
Dcros_firmware.py3 # Use of this source code is governed by a BSD-style license that can be
11 fix problems by updating or re-installing the firmware.
16 to check for corruption, and supplies `FaftFirmwareRepair` to
17 re-install firmware of current faft stable_version via servo
22 firmware that is out-of-date from the designated version. This model
23 also supplys `GeneralFirmwareRepair` to re-install firmware that
28 * DUTs used for general testing. These DUTs automatically check for
30 * DUTs in pools used for FAFT testing. These check for bad firmware
32 `FirmwareRepair`. These DUTs don't check for or install the
39 # pylint: disable=missing-docstring
[all …]
/external/oss-fuzz/infra/base-images/base-builder/
Dbisect_clang.py8 # http://www.apache.org/licenses/LICENSE-2.0
34 stdout = stdout.decode('utf-8')
35 stderr = stderr.decode('utf-8')
48 culprit_regex = re.compile('([a-z0-9]{40}) is the first (good|bad) commit')
61 command = ['git', '-C', self.repo_dir] + git_subcommand
65 """Build LLVM at the currently checkedout commit, then run |test_command|.
66 If returncode is 0 run 'git bisect good' otherwise return 'git bisect bad'.
74 retcode, stdout, _ = self.do_bisect_command('bad')
78 """Do git bisect assuming |good_commit| is good, |bad_commit| is bad and
89 # Do bad commit first since it is more likely to be recent.
[all …]
/external/pigweed/pw_presubmit/py/pw_presubmit/
Dformat_code.py9 # https://www.apache.org/licenses/LICENSE-2.0
18 This uses clang-format, gn format, gofmt, and python -m yapf to format source
75 def _colorize_diff_line(line: str) -> str:
76 if line.startswith('--- ') or line.startswith('+++ '):
78 if line.startswith('-'):
87 def colorize_diff(lines: Iterable[str]) -> str:
95 def _diff(path, original: bytes, formatted: bytes) -> str:
109 def _diff_formatted(path, formatter: Formatter) -> Optional[str]:
119 def _check_files(files, formatter: Formatter) -> Dict[Path, str]:
130 def _clang_format(*args: Union[Path, str], **kwargs) -> bytes:
[all …]
/external/elfutils/tests/
Drun-lfs-symbols.sh18 . $srcdir/test-subr.sh
20 if ! grep -q -F '#define _FILE_OFFSET_BITS' ${abs_top_builddir}/config.h; then
32 # $ gcc -m32 -O2 nolfs.c -o testfile-nolfs
33 testfiles testfile-nolfs
37 /^\w/ && bad[$0]
40 /@@GLIBC_/ && $1 in bad { print $1 }'
42 LFS=$(printf "$LFS_FORMAT" "${abs_srcdir}/lfs-symbols")
45 make print-$1 -C $2 |& awk -F= "/^$1=/{ print \$2 }"
50 if [ -e "$1" ]; then
51 bad=$(testrun ${abs_top_builddir}/src/nm -u "$1" | awk "$LFS")
[all …]
/external/google-breakpad/
Dconfigure.ac33 AC_INIT(breakpad, 0.1, google-breakpad-dev@googlegroups.com)
34 dnl Sanity check: the argument is just a file that should exist.
40 AM_INIT_AUTOMAKE(subdir-objects tar-ustar 1.11.1)
54 AS_HELP_STRING([--enable-m32],
55 [Compile/build with -m32]
59 CFLAGS="${CFLAGS} -m32"
60 CXXFLAGS="${CXXFLAGS} -m32"
67 AC_MSG_ERROR(bad value ${enableval} for --enable-m32)
86 AX_CHECK_COMPILE_FLAG([-Werror=unknown-warning-option],[
87 ax_compiler_flags_test="-Werror=unknown-warning-option"
[all …]
/external/ltp/tools/sparse/
DREADME.md7 It is integrated with the LTP build system. Just run `make check` or
8 `make check-a_test01`, where `a_test01` is an arbitrary test
13 The bad news is you must get and build Sparse[^1]. The good news is
14 that this only takes a minute and the build system does it for
15 you. Just try running `make check` as described above.
29 $ git submodule update --init
32 ### Modifying CFLAGS and -m32
34 When compiling the LTP with `-m32` it may break building
35 `sparse-ltp`. We do not pass LTP's `CFLAGS` or `HOST_CFLAGS` to
39 To avoid issues with m32, just pre-build the checker with a non-m32
[all …]
/external/toolchain-utils/binary_search_tool/cros_pkg/
Dsetup.sh1 #!/bin/bash -u
7 # the three necessary build tree directories (see the prerequisites section of
15 # This script sets up a soft link definining /build/${board} to point
16 # to the working build tree, for the binary search triags process. In
29 GOOD_BUILD=/build/${BOARD}.good
30 BAD_BUILD=/build/${BOARD}.bad
31 WORK_BUILD=/build/${BOARD}.work
37 if [[ ! -d ${GOOD_BUILD} ]] ; then
42 if [[ ! -d ${BAD_BUILD} ]] ; then
47 if [[ ! -d ${WORK_BUILD} ]] ; then
[all …]
/external/curl/docs/libcurl/
Dlibcurl-errors.321 .\" * SPDX-License-Identifier: curl
25 .TH libcurl-errors 3 "23 Nov 2021" "libcurl 7.81.0" "libcurl errors"
27 libcurl-errors \- error codes in libcurl
44 support. The support might be a compile-time option that you did not use, it
54 A requested feature, protocol or option was not found built-in in this libcurl
55 due to a build-time decision. This means that a feature or option was not
83 FTP servers return a 227-line as a response to a PASV command. If libcurl
123 Operation timeout. The specified time-out period was reached according to the
150 path does not identify an existing file. Did you check file permissions?
162 A function was called with a bad parameter.
[all …]
/external/clang/test/Modules/
Dexplicit-build.cpp1 // RUN: rm -rf %t
3 // -------------------------------
4 // Build chained modules A, B, and C
5 // RUN: %clang_cc1 -x c++ -std=c++11 -fmodules -fimplicit-module-maps -fmodules-cache-path=%t -Rmod…
6 // RUN: -fmodule-name=a -emit-module %S/Inputs/explicit-build/module.modulemap -o %t/a.p…
7 // RUN: 2>&1 | FileCheck --check-prefix=CHECK-NO-IMPLICIT-BUILD %s --allow-empty
9 // RUN: %clang_cc1 -x c++ -std=c++11 -fmodules -fimplicit-module-maps -fmodules-cache-path=%t -Rmod…
10 // RUN: -fmodule-file=%t/a.pcm \
11 // RUN: -fmodule-name=b -emit-module %S/Inputs/explicit-build/module.modulemap -o %t/b.p…
12 // RUN: 2>&1 | FileCheck --check-prefix=CHECK-NO-IMPLICIT-BUILD %s --allow-empty
[all …]
/external/python/cpython3/Doc/library/
Ddevmode.rst13 It can be enabled using the :option:`-X dev <-X>` command line option or by
16 See also :ref:`Python debug build <debug-build>`.
24 PYTHONMALLOC=debug PYTHONASYNCIODEBUG=1 python3 -W default -X faulthandler
28 * Add ``default`` :ref:`warning filter <describing-warning-filters>`. The
37 filters <describing-warning-filters>`.
39 It behaves as if the :option:`-W default <-W>` command line option is used.
41 Use the :option:`-W error <-W>` command line option or set the
45 * Install debug hooks on memory allocators to check for:
65 It behaves as if the :option:`-X faulthandler <-X>` command line option is
69 * Enable :ref:`asyncio debug mode <asyncio-debug-mode>`. For example,
[all …]
/external/autotest/test_suites/
Dcontrol.calibration2 # Use of this source code is governed by a BSD-style license that can be
5 AUTHOR = 'chromeos-lab-infrastructure'
7 PURPOSE = 'Calibration check run in buildbot to ensure the build will not break duts'
15 This suite is intended to be run by buildbot as a calibration check of the build.
17 on the safety checks built into the provisioning code to identify bad builds.
Dcontrol.sanity2 # Use of this source code is governed by a BSD-style license that can be
5 AUTHOR = 'chromeos-lab-infrastructure'
7 PURPOSE = 'Sanity check run in buildbot to ensure the build will not break duts'
15 This suite is intended to be run by buildbot as a sanity check of the build.
17 on the safety checks built into the provisioning code to identify bad builds.

12345678910>>...45