Home
last modified time | relevance | path

Searched refs:sanitizer (Results 1 – 25 of 295) sorted by relevance

12345678910>>...12

/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/
DMethodSanitizerTest.java33 private MethodVisitor sanitizer; field in MethodSanitizerTest
39 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup()
46 sanitizer.visitCode(); in testLocalVariablePositive()
47 sanitizer.visitLabel(l1); in testLocalVariablePositive()
48 sanitizer.visitInsn(Opcodes.RETURN); in testLocalVariablePositive()
49 sanitizer.visitLabel(l2); in testLocalVariablePositive()
50 sanitizer.visitLocalVariable("x", "I", null, l1, l2, 0); in testLocalVariablePositive()
51 sanitizer.visitMaxs(0, 0); in testLocalVariablePositive()
52 sanitizer.visitEnd(); in testLocalVariablePositive()
70 sanitizer.visitCode(); in testLocalVariableNegative1()
[all …]
/external/compiler-rt/include/
DCMakeLists.txt2 sanitizer/allocator_interface.h
3 sanitizer/asan_interface.h
4 sanitizer/common_interface_defs.h
5 sanitizer/coverage_interface.h
6 sanitizer/dfsan_interface.h
7 sanitizer/esan_interface.h
8 sanitizer/linux_syscall_hooks.h
9 sanitizer/lsan_interface.h
10 sanitizer/msan_interface.h
11 sanitizer/tsan_interface_atomic.h)
[all …]
/external/cronet/buildtools/third_party/libc++/trunk/utils/libcxx/test/
Dparams.py149 actions=lambda sanitizer: filter(None, [
150 AddFlag('-g -fno-omit-frame-pointer') if sanitizer else None,
152 …fined -fno-sanitize=float-divide-by-zero -fno-sanitize-recover=all') if sanitizer == 'Undefined' e…
153 … if sanitizer == 'Undefined' e…
155 AddFlag('-fsanitize=address') if sanitizer == 'Address' else None,
156 AddFeature('asan') if sanitizer == 'Address' else None,
158 AddFlag('-fsanitize=hwaddress') if sanitizer == 'HWAddress' else None,
159 AddFeature('hwasan') if sanitizer == 'HWAddress' else None,
161 …AddFlag('-fsanitize=memory') if sanitizer in ['Memory', 'MemoryWithOrigins'] else No…
162 …AddFeature('msan') if sanitizer in ['Memory', 'MemoryWithOrigins'] else No…
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/cmake/
Ddetect-sanitizer.cmake1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags
23 # Build list of supported sanitizer flags by incrementally trying compilation with
24 # known sanitizer checks
57 message(STATUS "Address sanitizer is enabled: ${supported_checks}")
62 message(STATUS "Address sanitizer is not supported")
66 # Only check for leak sanitizer if not cross-compiling due to qemu crash
67 message(WARNING "Leak sanitizer is not supported when cross compiling")
69 # Leak sanitizer requires address sanitizer
72 message(STATUS "Leak sanitizer is enabled: ${supported_checks}")
77 message(STATUS "Leak sanitizer is not supported")
[all …]
/external/libvpx/tools/
Dset_analyzer_env.sh12 sanitizer="${1}"
14 case "${sanitizer}" in
45 if [ "${sanitizer}" = "undefined" -o "${sanitizer}" = "integer" ]; then
46 echo "WARNING: When building the ${sanitizer} sanitizer for 32 bit targets"
52 if [ "${sanitizer}" = "undefined" ]; then
68 cflags="-fsanitize=${sanitizer}"
69 ldflags="-fsanitize=${sanitizer}"
78 if [ "${sanitizer}" = "cfi" ]; then
103 case "${sanitizer}" in
/external/llvm/test/Instrumentation/SanitizerCoverage/
Dcoverage.ll1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil…
5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil…
6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil…
7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil…
8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s…
10 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC…
[all …]
Dtracing.ll1 ; Test -sanitizer-coverage-experimental-tracing
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | …
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | …
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S | FileCheck %s…
Dcmp-tracing.ll1 ; Test -sanitizer-coverage-experimental-trace-compares=1
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-experimental-trace-compares…
Dseh.ll1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | File…
/external/oss-fuzz/infra/build/functions/
Dbuild_project.py69 def __init__(self, fuzzing_engine, sanitizer, architecture): argument
71 self.sanitizer = sanitizer
74 self.sanitizer)
125 for sanitizer in self._sanitizers:
126 if isinstance(sanitizer, six.string_types):
127 processed_sanitizers.append(sanitizer)
128 elif isinstance(sanitizer, dict):
129 for key in sanitizer.keys():
159 if build.architecture == 'i386' and build.sanitizer != 'address':
161 return (build.sanitizer in fuzzing_engine_info.supported_sanitizers and
[all …]
Dbuild_lib.py74 def get_targets_list_filename(sanitizer): argument
76 return TARGETS_LIST_BASENAME + '.' + sanitizer
79 def get_targets_list_url(bucket, project, sanitizer): argument
81 filename = get_targets_list_filename(sanitizer)
/external/oss-fuzz/infra/ci/
Dbuild.py85 def build_fuzzers(project, engine, sanitizer, architecture): argument
89 'build_fuzzers', project, '--engine', engine, '--sanitizer', sanitizer,
94 def check_build(project, engine, sanitizer, architecture): argument
98 'check_build', project, '--engine', engine, '--sanitizer', sanitizer,
155 sanitizer = os.getenv('SANITIZER')
161 engine, sanitizer, architecture, project))
166 build_fuzzers(project, engine, sanitizer, architecture)
168 if engine != 'none' and sanitizer != 'coverage':
169 check_build(project, engine, sanitizer, architecture)
/external/jazzer-api/
DCHANGELOG.md7 * Feature: Add sanitizer for context lookups
8 * Feature: Add sanitizer for OS command injection
9 * Feature: Add sanitizer for regex injection
10 * Feature: Add sanitizer for LDAP injections
11 * Feature: Add sanitizer for arbitrary class loading
36 * Feature: Add sanitizer for insecure deserialization
37 * Feature: Add sanitizer for arbitrary reflective calls
38 * Feature: Add sanitizer for expression language injection
/external/oss-fuzz/infra/cifuzz/
Ddocker.py71 sanitizer=constants.DEFAULT_SANITIZER, argument
78 'SANITIZER': sanitizer,
95 sanitizer=constants.DEFAULT_SANITIZER, argument
101 workspace, sanitizer, language, docker_in_docker=docker_in_docker)
Dbuild_fuzzers_test.py105 sanitizer=self.SANITIZER,
298 sanitizer=self.SANITIZER,
345 def _create_config(cls, tmp_dir, sanitizer): argument
351 sanitizer=sanitizer)
354 def test_valid_project_curl(self, sanitizer): argument
358 build_fuzzers.build_fuzzers(self._create_config(tmp_dir, sanitizer)))
Dconfig_utils_test.py210 self.sanitizer = 'memory'
218 os.environ['SANITIZER'] = self.sanitizer
219 self.assertEqual(config_utils._get_sanitizer(), self.sanitizer)
223 os.environ['SANITIZER'] = self.sanitizer.upper()
224 self.assertEqual(config_utils._get_sanitizer(), self.sanitizer)
Dconfig_utils.py200 self.sanitizer = _get_sanitizer()
227 if self.sanitizer not in SANITIZERS:
229 self.sanitizer, SANITIZERS)
260 return self.sanitizer == 'coverage'
352 if self.sanitizer == 'coverage':
/external/rust/crates/libfuzzer-sys/
DREADME.md7 libFuzzer relies on LLVM sanitizer support. The Rust compiler has built-in support for LLVM sanitiz…
53 -C llvm-args='-sanitizer-coverage-level=3' \
54 -C llvm-args='-sanitizer-coverage-inline-8bit-counters' \
55 -Z sanitizer=address
/external/jazzer-api/bazel/
Dfuzz_target.bzl21 sanitizer = None,
56 if sanitizer == None:
58 elif sanitizer == "address":
60 elif sanitizer == "undefined":
63 fail("Invalid sanitizer: " + sanitizer)
/external/pigweed/pw_toolchain/host_clang/
Dtoolchains.gni20 # Sets the sanitizer to pass to clang. Valid values are "address", "memory",
89 foreach(sanitizer, pw_toolchain_SANITIZERS) {
91 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
105 foreach(sanitizer, pw_toolchain_SANITIZERS) {
107 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
121 foreach(sanitizer, pw_toolchain_SANITIZERS) {
123 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
150 foreach(sanitizer, pw_toolchain_SANITIZERS) {
152 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
/external/oss-fuzz/docs/getting-started/
Dcontinuous_integration.md118 `sanitizer`: Determines a sanitizer to build and run fuzz targets with. The choices are `'address'`,
120 and the `Run Fuzzers` sanitizer field needs to be the same. To specify a list of sanitizers
122 can be used. To use a sanitizer add it to the list of sanitizers in the matrix field below:
134 sanitizer: [address, undefined, memory]
136 - name: Build Fuzzers (${{ matrix.sanitizer }})
142 sanitizer: ${{ matrix.sanitizer }}
143 - name: Run Fuzzers (${{ matrix.sanitizer }})
149 sanitizer: ${{ matrix.sanitizer }}
154 name: ${{ matrix.sanitizer }}-artifacts
228 * The sanitizer stack trace of the crash.
/external/rust/crates/grpcio-sys/grpc/tools/remote_build/
Drbe_common.bazelrc52 # address sanitizer: most settings are already in %workspace%/.bazelrc
55 # use double the default value for "moderate" and "long" timeout as sanitizer
60 # memory sanitizer: most settings are already in %workspace%/.bazelrc
75 # thread sanitizer: most settings are already in %workspace%/.bazelrc
78 # use double the default value for "moderate" and "long" timeout as sanitizer
84 # undefined behavior sanitizer: most settings are already in %workspace%/.bazelrc
87 # use double the default value for "moderate" and "long" timeout as sanitizer
/external/python/pybind11/tests/
Dconftest.py130 def __init__(self, sanitizer): argument
131 self.sanitizer = sanitizer
136 self.string = self.sanitizer(thing)
/external/harfbuzz_ng/src/
Dhb-aat-layout-kerx-table.hh56 if (unlikely (!c->sanitizer.check_array (pv, tupleCount))) return 0; in kerxTupleKern()
257 if (!c->sanitizer.check_array (actions, depth, tuple_count)) in transition()
383 unsigned int num_glyphs = c->sanitizer.get_num_glyphs (); in get_kerning()
391 if (unlikely (!v->sanitize (&c->sanitizer))) return 0; in get_kerning()
511 if (!c->sanitizer.check_array (data, 2)) return; in transition()
539 if (!c->sanitizer.check_array (data, 2)) return; in transition()
544 c->sanitizer.get_num_glyphs ()); in transition()
547 c->sanitizer.get_num_glyphs ()); in transition()
559 if (!c->sanitizer.check_array (data, 4)) return; in transition()
631 unsigned int num_glyphs = c->sanitizer.get_num_glyphs (); in get_kerning()
[all …]
/external/oss-fuzz/docs/advanced-topics/
Dreproducing.md46 with the appropriate [sanitizer](https://github.com/google/sanitizers)
75 $ python infra/helper.py build_fuzzers --sanitizer <address/memory/undefined> \
79 The `sanitizer` used in the report is the value in the
109 $ python infra/helper.py build_fuzzers --sanitizer undefined libxml2
119 --sanitizer <address/memory/undefined> $PROJECT_NAME <source_path>
142 $ python infra/helper.py build_fuzzers --sanitizer <address/memory/undefined> \
144 $ python infra/helper.py check_build --sanitizer <address/memory/undefined> \

12345678910>>...12