Home
last modified time | relevance | path

Searched full:sanitizer (Results 1 – 25 of 1349) sorted by relevance

12345678910>>...54

/external/clang/include/clang/Basic/
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
11 // enable. Users of this file must define the SANITIZER macro to make use of
17 #ifndef SANITIZER
18 #error "Define SANITIZER prior to including this file!"
21 // SANITIZER(NAME, ID)
23 // The first value is the name of the sanitizer as a string. The sanitizer can
27 // sanitizer.
32 // The first two values have the same semantics as the corresponding SANITIZER
42 SANITIZER("address", Address)
45 SANITIZER("kernel-address", KernelAddress)
[all …]
DSanitizers.h31 #define SANITIZER(NAME, ID) SO_##ID, macro
37 // Define the set of sanitizer kinds, as well as the set of sanitizers each
38 // sanitizer group expands into.
39 #define SANITIZER(NAME, ID) \ macro
49 /// \brief Check if a certain (single) sanitizer is enabled.
58 /// \brief Enable or disable a certain (single) sanitizer.
67 /// \brief Returns true if at least one sanitizer is enabled.
78 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/
DMethodSanitizerTest.java33 private MethodVisitor sanitizer; field in MethodSanitizerTest
39 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup()
46 sanitizer.visitCode(); in testLocalVariablePositive()
47 sanitizer.visitLabel(l1); in testLocalVariablePositive()
48 sanitizer.visitInsn(Opcodes.RETURN); in testLocalVariablePositive()
49 sanitizer.visitLabel(l2); in testLocalVariablePositive()
50 sanitizer.visitLocalVariable("x", "I", null, l1, l2, 0); in testLocalVariablePositive()
51 sanitizer.visitMaxs(0, 0); in testLocalVariablePositive()
52 sanitizer.visitEnd(); in testLocalVariablePositive()
70 sanitizer.visitCode(); in testLocalVariableNegative1()
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/cmake/
Ddetect-sanitizer.cmake1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags
23 # Build list of supported sanitizer flags by incrementally trying compilation with
24 # known sanitizer checks
57 message(STATUS "Address sanitizer is enabled: ${supported_checks}")
62 message(STATUS "Address sanitizer is not supported")
66 # Only check for leak sanitizer if not cross-compiling due to qemu crash
67 message(WARNING "Leak sanitizer is not supported when cross compiling")
69 # Leak sanitizer requires address sanitizer
72 message(STATUS "Leak sanitizer is enabled: ${supported_checks}")
77 message(STATUS "Leak sanitizer is not supported")
[all …]
/external/compiler-rt/include/
DCMakeLists.txt2 sanitizer/allocator_interface.h
3 sanitizer/asan_interface.h
4 sanitizer/common_interface_defs.h
5 sanitizer/coverage_interface.h
6 sanitizer/dfsan_interface.h
7 sanitizer/esan_interface.h
8 sanitizer/linux_syscall_hooks.h
9 sanitizer/lsan_interface.h
10 sanitizer/msan_interface.h
11 sanitizer/tsan_interface_atomic.h)
[all …]
/external/llvm/test/Instrumentation/SanitizerCoverage/
Dcoverage.ll1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil…
5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil…
6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil…
7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil…
8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s…
10 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC…
[all …]
Dtracing.ll1 ; Test -sanitizer-coverage-experimental-tracing
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | …
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | …
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S | FileCheck %s…
/external/oss-fuzz/infra/base-images/base-builder/
Dcompile20 if [ "$SANITIZER" = "dataflow" ] && [ "$FUZZING_ENGINE" != "dataflow" ]; then
21 echo "ERROR: 'dataflow' sanitizer can be used with 'dataflow' engine only."
30 …if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "coverage" ] && [ "$SANITIZER" != "undefined…
45 if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "undefined" ]; then
56 FLAGS_VAR="SANITIZER_FLAGS_${SANITIZER}"
80 COVERAGE_FLAGS_VAR="COVERAGE_FLAGS_${SANITIZER}"
95 if [ "$SANITIZER" != "undefined" ] && [ "$SANITIZER" != "coverage" ] && [ "$ARCHITECTURE" != 'i386'…
96 export RUSTFLAGS="--cfg fuzzing -Zsanitizer=${SANITIZER} -Cdebuginfo=1 -Cforce-frame-pointers"
100 if [ "$SANITIZER" = "coverage" ]
117 if [ "$SANITIZER" = "address" ]; then
[all …]
/external/libvpx/tools/
Dset_analyzer_env.sh10 ## sanitizer builds and testing.
12 sanitizer="${1}"
14 case "${sanitizer}" in
31 echo "Usage: source set_analyzer_env.sh [<sanitizer>|clear]"
45 if [ "${sanitizer}" = "undefined" -o "${sanitizer}" = "integer" ]; then
46 echo "WARNING: When building the ${sanitizer} sanitizer for 32 bit targets"
52 if [ "${sanitizer}" = "undefined" ]; then
68 cflags="-fsanitize=${sanitizer}"
69 ldflags="-fsanitize=${sanitizer}"
78 if [ "${sanitizer}" = "cfi" ]; then
[all …]
/external/oss-fuzz/infra/ci/
Dbuild.py85 def build_fuzzers(project, engine, sanitizer, architecture): argument
87 with |engine| and |sanitizer| for |architecture|."""
89 'build_fuzzers', project, '--engine', engine, '--sanitizer', sanitizer,
94 def check_build(project, engine, sanitizer, architecture): argument
96 recently built with |engine| and |sanitizer| for |architecture|."""
98 'check_build', project, '--engine', engine, '--sanitizer', sanitizer,
128 if os.getenv('SANITIZER') == 'coverage':
138 is_enabled('SANITIZER', 'sanitizers', DEFAULT_SANITIZERS) and
144 SANITIZER, ENGINE, and ARCHITECTURE."""
155 sanitizer = os.getenv('SANITIZER')
[all …]
/external/flac/.github/workflows/
Dcifuzz.yml14 sanitizer: [address, undefined, memory]
16 - name: Build Fuzzers (${{ matrix.sanitizer }})
22 sanitizer: ${{ matrix.sanitizer }}
23 - name: Run Fuzzers (${{ matrix.sanitizer }})
29 sanitizer: ${{ matrix.sanitizer }}
34 name: ${{ matrix.sanitizer }}-artifacts
/external/oss-fuzz/infra/build/functions/
Dbuild_project.py69 def __init__(self, fuzzing_engine, sanitizer, architecture): argument
71 self.sanitizer = sanitizer
74 self.sanitizer)
81 f'{self.fuzzing_engine}-{self.sanitizer}-{self.architecture}')
125 for sanitizer in self._sanitizers:
126 if isinstance(sanitizer, six.string_types):
127 processed_sanitizers.append(sanitizer)
128 elif isinstance(sanitizer, dict):
129 for key in sanitizer.keys():
159 if build.architecture == 'i386' and build.sanitizer != 'address':
[all …]
/external/selinux/.github/workflows/
Dcifuzz.yml17 sanitizer: [address, undefined, memory]
19 - name: Build Fuzzers (${{ matrix.sanitizer }})
26 sanitizer: ${{ matrix.sanitizer }}
27 - name: Run Fuzzers (${{ matrix.sanitizer }})
34 sanitizer: ${{ matrix.sanitizer }}
39 name: ${{ matrix.sanitizer }}-artifacts
/external/oss-fuzz/infra/cifuzz/
Ddocker_test.py27 SANITIZER = 'example-sanitizer' variable
65 WORKSPACE, SANITIZER, LANGUAGE)
78 f'SANITIZER={SANITIZER}',
93 WORKSPACE, SANITIZER, LANGUAGE)
98 f'SANITIZER={SANITIZER}', '-e', f'FUZZING_LANGUAGE={LANGUAGE}', '-e',
113 WORKSPACE, SANITIZER, LANGUAGE)
118 'CIFUZZ=True', '-e', f'SANITIZER={SANITIZER}', '-e',
Dconfig_utils_test.py50 os.environ['SANITIZER'] = 'coverage'
55 os.environ['SANITIZER'] = 'address'
83 os.environ['SANITIZER'] = 'invalid-sanitizer'
86 mock_error.assert_called_with('Invalid SANITIZER: %s. Must be one of: %s.',
87 os.environ['SANITIZER'],
140 os.environ['SANITIZER'] = 'coverage'
146 os.environ['SANITIZER'] = 'address'
210 self.sanitizer = 'memory'
218 os.environ['SANITIZER'] = self.sanitizer
219 self.assertEqual(config_utils._get_sanitizer(), self.sanitizer)
[all …]
/external/libbpf/.github/workflows/
Dcifuzz.yml18 sanitizer: [address, undefined, memory]
20 - name: Build Fuzzers (${{ matrix.sanitizer }})
27 sanitizer: ${{ matrix.sanitizer }}
28 - name: Run Fuzzers (${{ matrix.sanitizer }})
34 sanitizer: ${{ matrix.sanitizer }}
39 name: ${{ matrix.sanitizer }}-artifacts
/external/cronet/buildtools/third_party/libc++/trunk/utils/libcxx/test/
Dparams.py148 help="An optional sanitizer to enable when building and running the test suite.",
149 actions=lambda sanitizer: filter(None, [
150 AddFlag('-g -fno-omit-frame-pointer') if sanitizer else None,
152 …fined -fno-sanitize=float-divide-by-zero -fno-sanitize-recover=all') if sanitizer == 'Undefined' e…
153 … if sanitizer == 'Undefined' e…
155 AddFlag('-fsanitize=address') if sanitizer == 'Address' else None,
156 AddFeature('asan') if sanitizer == 'Address' else None,
158 AddFlag('-fsanitize=hwaddress') if sanitizer == 'HWAddress' else None,
159 AddFeature('hwasan') if sanitizer == 'HWAddress' else None,
161 …AddFlag('-fsanitize=memory') if sanitizer in ['Memory', 'MemoryWithOrigins'] else No…
[all …]
/external/oss-fuzz/.github/workflows/
Dproject_tests.yml16 sanitizer:
25 sanitizer: address
28 sanitizer: address
31 sanitizer: address
34 sanitizer: address
37 sanitizer: dataflow
41 SANITIZER: ${{ matrix.sanitizer }}
/external/oss-fuzz/infra/build/functions/test_data/
Dexpected_build_steps.json42 "SANITIZER=address"
47 …per.py build_image test-project\npython infra/helper.py build_fuzzers --sanitizer address --engine…
59 "SANITIZER=address"
64 ….py build_fuzzers --sanitizer address --engine afl --architecture x86_64 test-project\npython infr…
76 "SANITIZER=address"
141 "SANITIZER=address"
146 …per.py build_image test-project\npython infra/helper.py build_fuzzers --sanitizer address --engine…
158 "SANITIZER=address"
163 … build_fuzzers --sanitizer address --engine honggfuzz --architecture x86_64 test-project\npython i…
175 "SANITIZER=address"
[all …]
/external/oss-fuzz/docs/reference/
Dglossary.md47 with a [sanitizer].
69 [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer
74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable…
77 $ python infra/helper.py build_fuzzers --sanitizer undefined json
82 | Sanitizer | Description
84 …ddress` *(default)* | [Address Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitiz…
85 | `undefined` | [Undefined Behavior Sanitizer](http://clang.llvm.org/docs/UndefinedBehaviorSanitize…
86Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NOTE: It is critical t…
/external/angle/build/config/sanitizers/
Dsanitizers.gni13 # Compile for Address Sanitizer to find memory bugs.
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
21 # Compile for Leak Sanitizer to find leaks.
24 # Compile for Memory Sanitizer to find uninitialized reads.
27 # Compile for Thread Sanitizer to find threading bugs.
30 # Compile for Undefined Behaviour Sanitizer to find various types of
103 # When enabled, only relevant sanitizer defines are set, but compilation
111 # When true, sanitizer warnings will cause test case failures.
121 # Compile for Undefined Behaviour Sanitizer's vptr checks.
129 # the prebuilt Rust stdlib which has no sanitizer support with it.
[all …]
/external/jazzer-api/
DCHANGELOG.md7 * Feature: Add sanitizer for context lookups
8 * Feature: Add sanitizer for OS command injection
9 * Feature: Add sanitizer for regex injection
10 * Feature: Add sanitizer for LDAP injections
11 * Feature: Add sanitizer for arbitrary class loading
36 * Feature: Add sanitizer for insecure deserialization
37 * Feature: Add sanitizer for arbitrary reflective calls
38 * Feature: Add sanitizer for expression language injection
/external/cronet/build/config/sanitizers/
Dsanitizers.gni13 # Compile for Address Sanitizer to find memory bugs.
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
21 # Compile for Leak Sanitizer to find leaks.
24 # Compile for Memory Sanitizer to find uninitialized reads.
27 # Compile for Thread Sanitizer to find threading bugs.
30 # Compile for Undefined Behaviour Sanitizer to find various types of
103 # When enabled, only relevant sanitizer defines are set, but compilation
118 # Compile for Undefined Behaviour Sanitizer's vptr checks.
210 # Whether we are linking against a sanitizer runtime library. Among other
212 # prepare to create stack traces "live" using the sanitizer runtime.
[all …]
/external/oss-fuzz/docs/getting-started/
Dcontinuous_integration.md118 `sanitizer`: Determines a sanitizer to build and run fuzz targets with. The choices are `'address'`,
120 and the `Run Fuzzers` sanitizer field needs to be the same. To specify a list of sanitizers
122 can be used. To use a sanitizer add it to the list of sanitizers in the matrix field below:
134 sanitizer: [address, undefined, memory]
136 - name: Build Fuzzers (${{ matrix.sanitizer }})
142 sanitizer: ${{ matrix.sanitizer }}
143 - name: Run Fuzzers (${{ matrix.sanitizer }})
149 sanitizer: ${{ matrix.sanitizer }}
154 name: ${{ matrix.sanitizer }}-artifacts
228 * The sanitizer stack trace of the crash.
/external/oss-fuzz/projects/libra/
Dbuild.sh62 RUSTFLAGS="$RUSTFLAGS -Zsanitizer=address" # address sanitizer (ASAN)
68 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-level=4"
69 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-trace-compares"
70 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-inline-8bit-counters"
71 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-trace-geps"
72 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-prune-blocks=0"
73 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-pc-table"
75 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-stack-depth"

12345678910>>...54