/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/ |
D | MethodSanitizerTest.java | 33 private MethodVisitor sanitizer; field in MethodSanitizerTest 39 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup() 46 sanitizer.visitCode(); in testLocalVariablePositive() 47 sanitizer.visitLabel(l1); in testLocalVariablePositive() 48 sanitizer.visitInsn(Opcodes.RETURN); in testLocalVariablePositive() 49 sanitizer.visitLabel(l2); in testLocalVariablePositive() 50 sanitizer.visitLocalVariable("x", "I", null, l1, l2, 0); in testLocalVariablePositive() 51 sanitizer.visitMaxs(0, 0); in testLocalVariablePositive() 52 sanitizer.visitEnd(); in testLocalVariablePositive() 70 sanitizer.visitCode(); in testLocalVariableNegative1() [all …]
|
/external/compiler-rt/include/ |
D | CMakeLists.txt | 2 sanitizer/allocator_interface.h 3 sanitizer/asan_interface.h 4 sanitizer/common_interface_defs.h 5 sanitizer/coverage_interface.h 6 sanitizer/dfsan_interface.h 7 sanitizer/esan_interface.h 8 sanitizer/linux_syscall_hooks.h 9 sanitizer/lsan_interface.h 10 sanitizer/msan_interface.h 11 sanitizer/tsan_interface_atomic.h) [all …]
|
/external/cronet/buildtools/third_party/libc++/trunk/utils/libcxx/test/ |
D | params.py | 149 actions=lambda sanitizer: filter(None, [ 150 AddFlag('-g -fno-omit-frame-pointer') if sanitizer else None, 152 …fined -fno-sanitize=float-divide-by-zero -fno-sanitize-recover=all') if sanitizer == 'Undefined' e… 153 … if sanitizer == 'Undefined' e… 155 AddFlag('-fsanitize=address') if sanitizer == 'Address' else None, 156 AddFeature('asan') if sanitizer == 'Address' else None, 158 AddFlag('-fsanitize=hwaddress') if sanitizer == 'HWAddress' else None, 159 AddFeature('hwasan') if sanitizer == 'HWAddress' else None, 161 …AddFlag('-fsanitize=memory') if sanitizer in ['Memory', 'MemoryWithOrigins'] else No… 162 …AddFeature('msan') if sanitizer in ['Memory', 'MemoryWithOrigins'] else No… [all …]
|
/external/rust/crates/libz-sys/src/zlib-ng/cmake/ |
D | detect-sanitizer.cmake | 1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags 23 # Build list of supported sanitizer flags by incrementally trying compilation with 24 # known sanitizer checks 57 message(STATUS "Address sanitizer is enabled: ${supported_checks}") 62 message(STATUS "Address sanitizer is not supported") 66 # Only check for leak sanitizer if not cross-compiling due to qemu crash 67 message(WARNING "Leak sanitizer is not supported when cross compiling") 69 # Leak sanitizer requires address sanitizer 72 message(STATUS "Leak sanitizer is enabled: ${supported_checks}") 77 message(STATUS "Leak sanitizer is not supported") [all …]
|
/external/libvpx/tools/ |
D | set_analyzer_env.sh | 12 sanitizer="${1}" 14 case "${sanitizer}" in 45 if [ "${sanitizer}" = "undefined" -o "${sanitizer}" = "integer" ]; then 46 echo "WARNING: When building the ${sanitizer} sanitizer for 32 bit targets" 52 if [ "${sanitizer}" = "undefined" ]; then 68 cflags="-fsanitize=${sanitizer}" 69 ldflags="-fsanitize=${sanitizer}" 78 if [ "${sanitizer}" = "cfi" ]; then 103 case "${sanitizer}" in
|
/external/llvm/test/Instrumentation/SanitizerCoverage/ |
D | coverage.ll | 1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil… 5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil… 6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil… 7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil… 8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4 9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s… 10 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC… [all …]
|
D | tracing.ll | 1 ; Test -sanitizer-coverage-experimental-tracing 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | … 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | … 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S | FileCheck %s…
|
D | cmp-tracing.ll | 1 ; Test -sanitizer-coverage-experimental-trace-compares=1 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -sanitizer-coverage-experimental-trace-compares…
|
D | seh.ll | 1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | File…
|
/external/oss-fuzz/infra/build/functions/ |
D | build_project.py | 69 def __init__(self, fuzzing_engine, sanitizer, architecture): argument 71 self.sanitizer = sanitizer 74 self.sanitizer) 125 for sanitizer in self._sanitizers: 126 if isinstance(sanitizer, six.string_types): 127 processed_sanitizers.append(sanitizer) 128 elif isinstance(sanitizer, dict): 129 for key in sanitizer.keys(): 159 if build.architecture == 'i386' and build.sanitizer != 'address': 161 return (build.sanitizer in fuzzing_engine_info.supported_sanitizers and [all …]
|
D | build_lib.py | 74 def get_targets_list_filename(sanitizer): argument 76 return TARGETS_LIST_BASENAME + '.' + sanitizer 79 def get_targets_list_url(bucket, project, sanitizer): argument 81 filename = get_targets_list_filename(sanitizer)
|
/external/oss-fuzz/infra/ci/ |
D | build.py | 85 def build_fuzzers(project, engine, sanitizer, architecture): argument 89 'build_fuzzers', project, '--engine', engine, '--sanitizer', sanitizer, 94 def check_build(project, engine, sanitizer, architecture): argument 98 'check_build', project, '--engine', engine, '--sanitizer', sanitizer, 155 sanitizer = os.getenv('SANITIZER') 161 engine, sanitizer, architecture, project)) 166 build_fuzzers(project, engine, sanitizer, architecture) 168 if engine != 'none' and sanitizer != 'coverage': 169 check_build(project, engine, sanitizer, architecture)
|
/external/jazzer-api/ |
D | CHANGELOG.md | 7 * Feature: Add sanitizer for context lookups 8 * Feature: Add sanitizer for OS command injection 9 * Feature: Add sanitizer for regex injection 10 * Feature: Add sanitizer for LDAP injections 11 * Feature: Add sanitizer for arbitrary class loading 36 * Feature: Add sanitizer for insecure deserialization 37 * Feature: Add sanitizer for arbitrary reflective calls 38 * Feature: Add sanitizer for expression language injection
|
/external/oss-fuzz/infra/cifuzz/ |
D | docker.py | 71 sanitizer=constants.DEFAULT_SANITIZER, argument 78 'SANITIZER': sanitizer, 95 sanitizer=constants.DEFAULT_SANITIZER, argument 101 workspace, sanitizer, language, docker_in_docker=docker_in_docker)
|
D | build_fuzzers_test.py | 105 sanitizer=self.SANITIZER, 298 sanitizer=self.SANITIZER, 345 def _create_config(cls, tmp_dir, sanitizer): argument 351 sanitizer=sanitizer) 354 def test_valid_project_curl(self, sanitizer): argument 358 build_fuzzers.build_fuzzers(self._create_config(tmp_dir, sanitizer)))
|
D | config_utils_test.py | 210 self.sanitizer = 'memory' 218 os.environ['SANITIZER'] = self.sanitizer 219 self.assertEqual(config_utils._get_sanitizer(), self.sanitizer) 223 os.environ['SANITIZER'] = self.sanitizer.upper() 224 self.assertEqual(config_utils._get_sanitizer(), self.sanitizer)
|
D | config_utils.py | 200 self.sanitizer = _get_sanitizer() 227 if self.sanitizer not in SANITIZERS: 229 self.sanitizer, SANITIZERS) 260 return self.sanitizer == 'coverage' 352 if self.sanitizer == 'coverage':
|
/external/rust/crates/libfuzzer-sys/ |
D | README.md | 7 libFuzzer relies on LLVM sanitizer support. The Rust compiler has built-in support for LLVM sanitiz… 53 -C llvm-args='-sanitizer-coverage-level=3' \ 54 -C llvm-args='-sanitizer-coverage-inline-8bit-counters' \ 55 -Z sanitizer=address
|
/external/jazzer-api/bazel/ |
D | fuzz_target.bzl | 21 sanitizer = None, 56 if sanitizer == None: 58 elif sanitizer == "address": 60 elif sanitizer == "undefined": 63 fail("Invalid sanitizer: " + sanitizer)
|
/external/pigweed/pw_toolchain/host_clang/ |
D | toolchains.gni | 20 # Sets the sanitizer to pass to clang. Valid values are "address", "memory", 89 foreach(sanitizer, pw_toolchain_SANITIZERS) { 91 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ] 105 foreach(sanitizer, pw_toolchain_SANITIZERS) { 107 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ] 121 foreach(sanitizer, pw_toolchain_SANITIZERS) { 123 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ] 150 foreach(sanitizer, pw_toolchain_SANITIZERS) { 152 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
|
/external/oss-fuzz/docs/getting-started/ |
D | continuous_integration.md | 118 `sanitizer`: Determines a sanitizer to build and run fuzz targets with. The choices are `'address'`, 120 and the `Run Fuzzers` sanitizer field needs to be the same. To specify a list of sanitizers 122 can be used. To use a sanitizer add it to the list of sanitizers in the matrix field below: 134 sanitizer: [address, undefined, memory] 136 - name: Build Fuzzers (${{ matrix.sanitizer }}) 142 sanitizer: ${{ matrix.sanitizer }} 143 - name: Run Fuzzers (${{ matrix.sanitizer }}) 149 sanitizer: ${{ matrix.sanitizer }} 154 name: ${{ matrix.sanitizer }}-artifacts 228 * The sanitizer stack trace of the crash.
|
/external/rust/crates/grpcio-sys/grpc/tools/remote_build/ |
D | rbe_common.bazelrc | 52 # address sanitizer: most settings are already in %workspace%/.bazelrc 55 # use double the default value for "moderate" and "long" timeout as sanitizer 60 # memory sanitizer: most settings are already in %workspace%/.bazelrc 75 # thread sanitizer: most settings are already in %workspace%/.bazelrc 78 # use double the default value for "moderate" and "long" timeout as sanitizer 84 # undefined behavior sanitizer: most settings are already in %workspace%/.bazelrc 87 # use double the default value for "moderate" and "long" timeout as sanitizer
|
/external/python/pybind11/tests/ |
D | conftest.py | 130 def __init__(self, sanitizer): argument 131 self.sanitizer = sanitizer 136 self.string = self.sanitizer(thing)
|
/external/harfbuzz_ng/src/ |
D | hb-aat-layout-kerx-table.hh | 56 if (unlikely (!c->sanitizer.check_array (pv, tupleCount))) return 0; in kerxTupleKern() 257 if (!c->sanitizer.check_array (actions, depth, tuple_count)) in transition() 383 unsigned int num_glyphs = c->sanitizer.get_num_glyphs (); in get_kerning() 391 if (unlikely (!v->sanitize (&c->sanitizer))) return 0; in get_kerning() 511 if (!c->sanitizer.check_array (data, 2)) return; in transition() 539 if (!c->sanitizer.check_array (data, 2)) return; in transition() 544 c->sanitizer.get_num_glyphs ()); in transition() 547 c->sanitizer.get_num_glyphs ()); in transition() 559 if (!c->sanitizer.check_array (data, 4)) return; in transition() 631 unsigned int num_glyphs = c->sanitizer.get_num_glyphs (); in get_kerning() [all …]
|
/external/oss-fuzz/docs/advanced-topics/ |
D | reproducing.md | 46 with the appropriate [sanitizer](https://github.com/google/sanitizers) 75 $ python infra/helper.py build_fuzzers --sanitizer <address/memory/undefined> \ 79 The `sanitizer` used in the report is the value in the 109 $ python infra/helper.py build_fuzzers --sanitizer undefined libxml2 119 --sanitizer <address/memory/undefined> $PROJECT_NAME <source_path> 142 $ python infra/helper.py build_fuzzers --sanitizer <address/memory/undefined> \ 144 $ python infra/helper.py check_build --sanitizer <address/memory/undefined> \
|