| /external/clang/include/clang/Basic/ |
| D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 11 // enable. Users of this file must define the SANITIZER macro to make use of 17 #ifndef SANITIZER 18 #error "Define SANITIZER prior to including this file!" 21 // SANITIZER(NAME, ID) 23 // The first value is the name of the sanitizer as a string. The sanitizer can 27 // sanitizer. 32 // The first two values have the same semantics as the corresponding SANITIZER 42 SANITIZER("address", Address) 45 SANITIZER("kernel-address", KernelAddress) [all …]
|
| D | Sanitizers.h | 31 #define SANITIZER(NAME, ID) SO_##ID, macro 37 // Define the set of sanitizer kinds, as well as the set of sanitizers each 38 // sanitizer group expands into. 39 #define SANITIZER(NAME, ID) \ macro 49 /// \brief Check if a certain (single) sanitizer is enabled. 58 /// \brief Enable or disable a certain (single) sanitizer. 67 /// \brief Returns true if at least one sanitizer is enabled. 78 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
|
| /external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/ |
| D | MethodSanitizerTest.java | 33 private MethodVisitor sanitizer; field in MethodSanitizerTest 39 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup() 46 sanitizer.visitCode(); in testLocalVariablePositive() 47 sanitizer.visitLabel(l1); in testLocalVariablePositive() 48 sanitizer.visitInsn(Opcodes.RETURN); in testLocalVariablePositive() 49 sanitizer.visitLabel(l2); in testLocalVariablePositive() 50 sanitizer.visitLocalVariable("x", "I", null, l1, l2, 0); in testLocalVariablePositive() 51 sanitizer.visitMaxs(0, 0); in testLocalVariablePositive() 52 sanitizer.visitEnd(); in testLocalVariablePositive() 70 sanitizer.visitCode(); in testLocalVariableNegative1() [all …]
|
| /external/rust/crates/libz-sys/src/zlib-ng/cmake/ |
| D | detect-sanitizer.cmake | 1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags 23 # Build list of supported sanitizer flags by incrementally trying compilation with 24 # known sanitizer checks 57 message(STATUS "Address sanitizer is enabled: ${supported_checks}") 62 message(STATUS "Address sanitizer is not supported") 66 # Only check for leak sanitizer if not cross-compiling due to qemu crash 67 message(WARNING "Leak sanitizer is not supported when cross compiling") 69 # Leak sanitizer requires address sanitizer 72 message(STATUS "Leak sanitizer is enabled: ${supported_checks}") 77 message(STATUS "Leak sanitizer is not supported") [all …]
|
| /external/compiler-rt/include/ |
| D | CMakeLists.txt | 2 sanitizer/allocator_interface.h 3 sanitizer/asan_interface.h 4 sanitizer/common_interface_defs.h 5 sanitizer/coverage_interface.h 6 sanitizer/dfsan_interface.h 7 sanitizer/esan_interface.h 8 sanitizer/linux_syscall_hooks.h 9 sanitizer/lsan_interface.h 10 sanitizer/msan_interface.h 11 sanitizer/tsan_interface_atomic.h) [all …]
|
| /external/llvm/test/Instrumentation/SanitizerCoverage/ |
| D | coverage.ll | 1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil… 5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil… 6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil… 7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil… 8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4 9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s… 10 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC… [all …]
|
| D | tracing.ll | 1 ; Test -sanitizer-coverage-experimental-tracing 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | … 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | … 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S | FileCheck %s…
|
| /external/oss-fuzz/infra/base-images/base-builder/ |
| D | compile | 20 if [ "$SANITIZER" = "dataflow" ] && [ "$FUZZING_ENGINE" != "dataflow" ]; then 21 echo "ERROR: 'dataflow' sanitizer can be used with 'dataflow' engine only." 30 …if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "coverage" ] && [ "$SANITIZER" != "undefined… 45 if [ "$SANITIZER" != "address" ] && [ "$SANITIZER" != "undefined" ]; then 56 FLAGS_VAR="SANITIZER_FLAGS_${SANITIZER}" 80 COVERAGE_FLAGS_VAR="COVERAGE_FLAGS_${SANITIZER}" 95 if [ "$SANITIZER" != "undefined" ] && [ "$SANITIZER" != "coverage" ] && [ "$ARCHITECTURE" != 'i386'… 96 export RUSTFLAGS="--cfg fuzzing -Zsanitizer=${SANITIZER} -Cdebuginfo=1 -Cforce-frame-pointers" 100 if [ "$SANITIZER" = "coverage" ] 117 if [ "$SANITIZER" = "address" ]; then [all …]
|
| /external/libvpx/tools/ |
| D | set_analyzer_env.sh | 10 ## sanitizer builds and testing. 12 sanitizer="${1}" 14 case "${sanitizer}" in 31 echo "Usage: source set_analyzer_env.sh [<sanitizer>|clear]" 45 if [ "${sanitizer}" = "undefined" -o "${sanitizer}" = "integer" ]; then 46 echo "WARNING: When building the ${sanitizer} sanitizer for 32 bit targets" 52 if [ "${sanitizer}" = "undefined" ]; then 68 cflags="-fsanitize=${sanitizer}" 69 ldflags="-fsanitize=${sanitizer}" 78 if [ "${sanitizer}" = "cfi" ]; then [all …]
|
| /external/oss-fuzz/infra/ci/ |
| D | build.py | 85 def build_fuzzers(project, engine, sanitizer, architecture): argument 87 with |engine| and |sanitizer| for |architecture|.""" 89 'build_fuzzers', project, '--engine', engine, '--sanitizer', sanitizer, 94 def check_build(project, engine, sanitizer, architecture): argument 96 recently built with |engine| and |sanitizer| for |architecture|.""" 98 'check_build', project, '--engine', engine, '--sanitizer', sanitizer, 128 if os.getenv('SANITIZER') == 'coverage': 138 is_enabled('SANITIZER', 'sanitizers', DEFAULT_SANITIZERS) and 144 SANITIZER, ENGINE, and ARCHITECTURE.""" 155 sanitizer = os.getenv('SANITIZER') [all …]
|
| /external/flac/.github/workflows/ |
| D | cifuzz.yml | 14 sanitizer: [address, undefined, memory] 16 - name: Build Fuzzers (${{ matrix.sanitizer }}) 22 sanitizer: ${{ matrix.sanitizer }} 23 - name: Run Fuzzers (${{ matrix.sanitizer }}) 29 sanitizer: ${{ matrix.sanitizer }} 34 name: ${{ matrix.sanitizer }}-artifacts
|
| /external/oss-fuzz/infra/build/functions/ |
| D | build_project.py | 69 def __init__(self, fuzzing_engine, sanitizer, architecture): argument 71 self.sanitizer = sanitizer 74 self.sanitizer) 81 f'{self.fuzzing_engine}-{self.sanitizer}-{self.architecture}') 125 for sanitizer in self._sanitizers: 126 if isinstance(sanitizer, six.string_types): 127 processed_sanitizers.append(sanitizer) 128 elif isinstance(sanitizer, dict): 129 for key in sanitizer.keys(): 159 if build.architecture == 'i386' and build.sanitizer != 'address': [all …]
|
| /external/selinux/.github/workflows/ |
| D | cifuzz.yml | 17 sanitizer: [address, undefined, memory] 19 - name: Build Fuzzers (${{ matrix.sanitizer }}) 26 sanitizer: ${{ matrix.sanitizer }} 27 - name: Run Fuzzers (${{ matrix.sanitizer }}) 34 sanitizer: ${{ matrix.sanitizer }} 39 name: ${{ matrix.sanitizer }}-artifacts
|
| /external/oss-fuzz/infra/cifuzz/ |
| D | docker_test.py | 27 SANITIZER = 'example-sanitizer' variable 65 WORKSPACE, SANITIZER, LANGUAGE) 78 f'SANITIZER={SANITIZER}', 93 WORKSPACE, SANITIZER, LANGUAGE) 98 f'SANITIZER={SANITIZER}', '-e', f'FUZZING_LANGUAGE={LANGUAGE}', '-e', 113 WORKSPACE, SANITIZER, LANGUAGE) 118 'CIFUZZ=True', '-e', f'SANITIZER={SANITIZER}', '-e',
|
| D | config_utils_test.py | 50 os.environ['SANITIZER'] = 'coverage' 55 os.environ['SANITIZER'] = 'address' 83 os.environ['SANITIZER'] = 'invalid-sanitizer' 86 mock_error.assert_called_with('Invalid SANITIZER: %s. Must be one of: %s.', 87 os.environ['SANITIZER'], 140 os.environ['SANITIZER'] = 'coverage' 146 os.environ['SANITIZER'] = 'address' 210 self.sanitizer = 'memory' 218 os.environ['SANITIZER'] = self.sanitizer 219 self.assertEqual(config_utils._get_sanitizer(), self.sanitizer) [all …]
|
| /external/libbpf/.github/workflows/ |
| D | cifuzz.yml | 18 sanitizer: [address, undefined, memory] 20 - name: Build Fuzzers (${{ matrix.sanitizer }}) 27 sanitizer: ${{ matrix.sanitizer }} 28 - name: Run Fuzzers (${{ matrix.sanitizer }}) 34 sanitizer: ${{ matrix.sanitizer }} 39 name: ${{ matrix.sanitizer }}-artifacts
|
| /external/cronet/buildtools/third_party/libc++/trunk/utils/libcxx/test/ |
| D | params.py | 148 help="An optional sanitizer to enable when building and running the test suite.", 149 actions=lambda sanitizer: filter(None, [ 150 AddFlag('-g -fno-omit-frame-pointer') if sanitizer else None, 152 …fined -fno-sanitize=float-divide-by-zero -fno-sanitize-recover=all') if sanitizer == 'Undefined' e… 153 … if sanitizer == 'Undefined' e… 155 AddFlag('-fsanitize=address') if sanitizer == 'Address' else None, 156 AddFeature('asan') if sanitizer == 'Address' else None, 158 AddFlag('-fsanitize=hwaddress') if sanitizer == 'HWAddress' else None, 159 AddFeature('hwasan') if sanitizer == 'HWAddress' else None, 161 …AddFlag('-fsanitize=memory') if sanitizer in ['Memory', 'MemoryWithOrigins'] else No… [all …]
|
| /external/oss-fuzz/.github/workflows/ |
| D | project_tests.yml | 16 sanitizer: 25 sanitizer: address 28 sanitizer: address 31 sanitizer: address 34 sanitizer: address 37 sanitizer: dataflow 41 SANITIZER: ${{ matrix.sanitizer }}
|
| /external/oss-fuzz/infra/build/functions/test_data/ |
| D | expected_build_steps.json | 42 "SANITIZER=address" 47 …per.py build_image test-project\npython infra/helper.py build_fuzzers --sanitizer address --engine… 59 "SANITIZER=address" 64 ….py build_fuzzers --sanitizer address --engine afl --architecture x86_64 test-project\npython infr… 76 "SANITIZER=address" 141 "SANITIZER=address" 146 …per.py build_image test-project\npython infra/helper.py build_fuzzers --sanitizer address --engine… 158 "SANITIZER=address" 163 … build_fuzzers --sanitizer address --engine honggfuzz --architecture x86_64 test-project\npython i… 175 "SANITIZER=address" [all …]
|
| /external/oss-fuzz/docs/reference/ |
| D | glossary.md | 47 with a [sanitizer]. 69 [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer 74 Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enable… 77 $ python infra/helper.py build_fuzzers --sanitizer undefined json 82 | Sanitizer | Description 84 …ddress` *(default)* | [Address Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitiz… 85 | `undefined` | [Undefined Behavior Sanitizer](http://clang.llvm.org/docs/UndefinedBehaviorSanitize… 86 …Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NOTE: It is critical t…
|
| /external/angle/build/config/sanitizers/ |
| D | sanitizers.gni | 13 # Compile for Address Sanitizer to find memory bugs. 16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs 21 # Compile for Leak Sanitizer to find leaks. 24 # Compile for Memory Sanitizer to find uninitialized reads. 27 # Compile for Thread Sanitizer to find threading bugs. 30 # Compile for Undefined Behaviour Sanitizer to find various types of 103 # When enabled, only relevant sanitizer defines are set, but compilation 111 # When true, sanitizer warnings will cause test case failures. 121 # Compile for Undefined Behaviour Sanitizer's vptr checks. 129 # the prebuilt Rust stdlib which has no sanitizer support with it. [all …]
|
| /external/jazzer-api/ |
| D | CHANGELOG.md | 7 * Feature: Add sanitizer for context lookups 8 * Feature: Add sanitizer for OS command injection 9 * Feature: Add sanitizer for regex injection 10 * Feature: Add sanitizer for LDAP injections 11 * Feature: Add sanitizer for arbitrary class loading 36 * Feature: Add sanitizer for insecure deserialization 37 * Feature: Add sanitizer for arbitrary reflective calls 38 * Feature: Add sanitizer for expression language injection
|
| /external/cronet/build/config/sanitizers/ |
| D | sanitizers.gni | 13 # Compile for Address Sanitizer to find memory bugs. 16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs 21 # Compile for Leak Sanitizer to find leaks. 24 # Compile for Memory Sanitizer to find uninitialized reads. 27 # Compile for Thread Sanitizer to find threading bugs. 30 # Compile for Undefined Behaviour Sanitizer to find various types of 103 # When enabled, only relevant sanitizer defines are set, but compilation 118 # Compile for Undefined Behaviour Sanitizer's vptr checks. 210 # Whether we are linking against a sanitizer runtime library. Among other 212 # prepare to create stack traces "live" using the sanitizer runtime. [all …]
|
| /external/oss-fuzz/docs/getting-started/ |
| D | continuous_integration.md | 118 `sanitizer`: Determines a sanitizer to build and run fuzz targets with. The choices are `'address'`, 120 and the `Run Fuzzers` sanitizer field needs to be the same. To specify a list of sanitizers 122 can be used. To use a sanitizer add it to the list of sanitizers in the matrix field below: 134 sanitizer: [address, undefined, memory] 136 - name: Build Fuzzers (${{ matrix.sanitizer }}) 142 sanitizer: ${{ matrix.sanitizer }} 143 - name: Run Fuzzers (${{ matrix.sanitizer }}) 149 sanitizer: ${{ matrix.sanitizer }} 154 name: ${{ matrix.sanitizer }}-artifacts 228 * The sanitizer stack trace of the crash.
|
| /external/oss-fuzz/projects/libra/ |
| D | build.sh | 62 RUSTFLAGS="$RUSTFLAGS -Zsanitizer=address" # address sanitizer (ASAN) 68 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-level=4" 69 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-trace-compares" 70 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-inline-8bit-counters" 71 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-trace-geps" 72 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-prune-blocks=0" 73 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-pc-table" 75 RUSTFLAGS="$RUSTFLAGS -Cllvm-args=-sanitizer-coverage-stack-depth"
|