Home
last modified time | relevance | path

Searched +full:asan +full:- +full:trace +full:- +full:cmp (Results 1 – 25 of 37) sorted by relevance

12

/external/grpc-grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
21 asan:
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
[all …]
/external/rust/crates/grpcio-sys/grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
21 asan:
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
[all …]
/external/grpc-grpc/tools/run_tests/generated/
Dconfigs.json3 "config": "asan",
10 "config": "asan-noleaks",
16 "config": "asan-trace-cmp",
23 "config": "c++-compat"
35 "--tool=helgrind"
45 "--tool=memcheck",
46 "--leak-check=full"
/external/rust/crates/grpcio-sys/grpc/tools/
Dfuzztest.bazelrc9 # try-import %workspace%/fuzztest.bazelrc
16 # Compile and link with Address Sanitizer (ASAN).
17 build:fuzztest-common --linkopt=-fsanitize=address
18 build:fuzztest-common --copt=-fsanitize=address
20 # Standard define for "ifdef-ing" any fuzz test specific code.
21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
24 build:fuzztest-common --copt=-UNDEBUG
27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode
28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1
33 # Use with: --config=fuzztest
[all …]
Dbazel.rc3 # for platform-appropriate cxxopts
4 common --enable_platform_specific_config
6 build:windows --cxxopt='/std:c++14'
7 build:windows --host_cxxopt='/std:c++14'
8 build:linux --cxxopt='-std=c++14'
9 build:linux --host_cxxopt='-std=c++14'
10 build:macos --cxxopt='-std=c++14'
11 build:macos --host_cxxopt='-std=c++14'
12 build:freebsd --cxxopt='-std=c++14'
13 build:freebsd --host_cxxopt='-std=c++14'
[all …]
/external/pigweed/third_party/fuzztest/
Dfuzztest.bazelrc9 # try-import %workspace%/fuzztest.bazelrc
16 # Compile and link with Address Sanitizer (ASAN).
17 build:fuzztest-common --linkopt=-fsanitize=address
18 build:fuzztest-common --copt=-fsanitize=address
20 # Standard define for "ifdef-ing" any fuzz test specific code.
21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
24 build:fuzztest-common --copt=-UNDEBUG
27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode
28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1
33 # Use with: --config=fuzztest
[all …]
/external/grpc-grpc/tools/
Dfuzztest.bazelrc9 # try-import %workspace%/fuzztest.bazelrc
16 # Compile and link with Address Sanitizer (ASAN).
17 build:fuzztest-common --linkopt=-fsanitize=address
18 build:fuzztest-common --copt=-fsanitize=address
20 # Standard define for "ifdef-ing" any fuzz test specific code.
21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
24 build:fuzztest-common --copt=-UNDEBUG
27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode
28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1
33 # Use with: --config=fuzztest
[all …]
Dbazel.rc5 common --enable_bzlmod=false
7 # for platform-appropriate cxxopts
8 common --enable_platform_specific_config
10 build:windows --cxxopt='/std:c++14'
11 build:windows --host_cxxopt='/std:c++14'
12 build:linux --cxxopt='-std=c++14'
13 build:linux --host_cxxopt='-std=c++14'
14 build:macos --cxxopt='-std=c++14'
15 build:macos --host_cxxopt='-std=c++14'
16 build:freebsd --cxxopt='-std=c++14'
[all …]
/external/cronet/build/config/sanitizers/
Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
89 # Value for -fsanitize-coverage flag. Setting this causes
92 # -fsanitize=fuzzer-no-link
94 # trace-pc-guard
96 # trace-pc-guard,indirect-calls
130 # --fuzz= argument, which requires some sanitizer coverage.
136 # Also be sure not to enable this on non-Chromium builds where
152 …zer. When libfuzzer is enabled, fuzztest executables automatically support --fuzz but provide outp…
[all …]
/external/angle/build/config/sanitizers/
Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
42 # Enables "param-retval" mode, which finds more uses of uninitialized data and
101 # Value for -fsanitize-coverage flag. Setting this causes
104 # -fsanitize=fuzzer-no-link
106 # trace-pc-guard
108 # trace-pc-guard,indirect-calls
129 # can change the behaviour for the false case, and only build the non high-end
147 # --fuzz= argument, which requires some sanitizer coverage.
[all …]
/external/jazzer-api/docs/
Dadvanced.md3 * [Passing JVM arguments](#passing-jvm-arguments)
4 * [Coverage instrumentation](#coverage-instrumentation)
5 * [Trace instrumentation](#trace-instrumentation)
6 * [Value profile](#value-profile)
7 * [Custom hooks](#custom-hooks)
8 * [Suppressing stack traces](#suppressing-stack-traces)
9 * [Export coverage information](#export-coverage-information)
10 * [Native libraries](#native-libraries)
11 * [Fuzzing mutators](#fuzzing-mutators)
13 <!-- Created by https://github.com/ekalinin/github-markdown-toc -->
[all …]
/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/driver/
DOpt.java8 * http://www.apache.org/licenses/LICENSE-2.0
42 * <p>Each option corresponds to a command-line argument of the driver of the same name.
69 "asan", false, "Allow fuzzing of native libraries compiled with '-fsanitize=address'");
71 "ubsan", false, "Allow fuzzing of native libraries compiled with '-fsanitize=undefined'");
73 …"Allow fuzzing of native libraries compiled with '-fsanitize=fuzzer' (implied by --asan and --ubsa…
81 "Fully qualified reference (optionally with a Javadoc-style signature) to a "
87 "Path to write a JaCoCo .exec file to when the fuzzer exits (if non-empty)");
89 "Path to write a human-readable coverage report to when the fuzzer exits (if non-empty)");
93 "Names of classes from which hooks (custom or built-in) should not be loaded from");
95 "dump_classes_dir", "", "Directory to dump instrumented .class files into (if non-empty)");
[all …]
/external/AFLplusplus/
DChangelog.md7 - afl-fuzz:
8 - default power schedule is now EXPLORE, due a fix in fast schedules
10 - fixed minor issues in the mutation engine, thanks to @futhewo for
12 - better deterministic fuzzing is now available, benchmarks have shown
13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR!
14 - afl-cc:
15 - large rewrite by @SonicStark which fixes a few corner cases, thanks!
16 - LTO mode now requires llvm 12+
17 - workaround for ASAN with gcc_plugin mode
18 - instrumentation:
[all …]
DGNUmakefile2 # american fuzzy lop++ - makefile
3 # -----------------------------
13 # https://www.apache.org/licenses/LICENSE-2.0
30 VERSION = $(shell grep '^$(HASH)define VERSION ' ../config.h | cut -d '"' -f2)
32 # PROGS intentionally omit afl-as, which gets installed elsewhere.
34 PROGS = afl-fuzz afl-showmap afl-tmin afl-gotcpu afl-analyze
35 SH_PROGS = afl-plot afl-cmin afl-cmin.bash afl-whatsup afl-addseeds afl-system-config afl-persis…
36 MANPAGES=$(foreach p, $(PROGS) $(SH_PROGS), $(p).8) afl-as.8
39 SYS = $(shell uname -s)
40 ARCH = $(shell uname -m)
[all …]
/external/AFLplusplus/docs/
DChangelog.md7 - afl-fuzz:
8 - default power schedule is now EXPLORE, due a fix in fast schedules
10 - fixed minor issues in the mutation engine, thanks to @futhewo for
12 - better deterministic fuzzing is now available, benchmarks have shown
13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR!
14 - afl-cc:
15 - large rewrite by @SonicStark which fixes a few corner cases, thanks!
16 - LTO mode now requires llvm 12+
17 - workaround for ASAN with gcc_plugin mode
18 - instrumentation:
[all …]
/external/clang/docs/
DSanitizerCoverage.rst12 get function-level, basic-block-level, and edge-level coverage at a very low
21 following compile-time flags:
23 * ``-fsanitize-coverage=func`` for function-level coverage (very fast).
24 * ``-fsanitize-coverage=bb`` for basic-block-level coverage (may add up to 30%
26 * ``-fsanitize-coverage=edge`` for edge-level coverage (up to 40% slowdown).
28 You may also specify ``-fsanitize-coverage=indirect-calls`` for
29 additional `caller-callee coverage`_.
35 To get `Coverage counters`_, add ``-fsanitize-coverage=8bit-counters``
36 to one of the above compile-time flags. At runtime, use
41 .. code-block:: console
[all …]
/external/clang/lib/Driver/
DSanitizerArgs.cpp1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
8 //===----------------------------------------------------------------------===//
56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
68 /// would produce "-fsanitize=vptr".
75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
76 /// "-fsanitize=alignment".
80 /// Produce a string containing comma-separated names of sanitizers in \p
129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs()
[all …]
/external/zstd/tests/fuzz/
Dfuzz.py7 # This source code is licensed under both the BSD-style license (found in the
10 # You may select, at your option, one of the above-listed licenses.
79 CFLAGS = os.environ.get('CFLAGS', '-O3')
82 MFLAGS = os.environ.get('MFLAGS', '-j')
87 AFL_FUZZ = os.environ.get('AFL_FUZZ', 'afl-fuzz')
155 san_flags = ','.join(re.findall('-fsanitize=((?:[a-z]+,?)+)', flags))
156 nosan_flags = ','.join(re.findall('-fno-sanitize=((?:[a-z]+,?)+)', flags))
160 raise RuntimeError('-fno-sanitize={s} and -fsanitize={s} passed'.
171 args.asan = set_sanitizer('address', args.asan, san, nosan)
175 args.sanitize = args.asan or args.msan or args.ubsan
[all …]
/external/rust/crates/libfuzzer-sys/libfuzzer/
DFuzzerFlags.def1 //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 //===----------------------------------------------------------------------===//
14 FUZZER_FLAG_INT(runs, -1,
15 "Number of individual test runs (-1 for infinite runs).")
23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
25 "the name of a file containing the comma-separated list.")
61 FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group "
63 "and each sub-process will randomly select seeds from different "
[all …]
/external/compiler-rt/lib/asan/
Dasan_report.cc1 //===-- asan_report.cc ----------------------------------------------------===//
8 //===----------------------------------------------------------------------===//
13 //===----------------------------------------------------------------------===//
30 // -------------------- User-specified callbacks ----------------- {{{1
60 uptr remaining = kErrorMessageBufferSize - error_message_buffer_pos; in AppendToErrorMessageBuffer()
63 error_message_buffer[kErrorMessageBufferSize - 1] = '\0'; in AppendToErrorMessageBuffer()
68 // ---------------------- Decorator ------------------------------ {{{1
118 // ---------------------- Helper functions ----------------------- {{{1
123 str->append("%s%s%x%x%s%s", before, in PrintMemoryByte()
137 if (before) str->append("%s%p:", before, bytes); in PrintShadowBytes()
[all …]
/external/AFLplusplus/instrumentation/
DSanitizerCoverageLTO.so.cc1 /* SanitizeCoverage.cpp ported to AFL++ LTO :-) */
66 #include "afl-llvm-common.h"
82 "lto-coverage-level",
87 static cl::opt<bool> ClTracePC("lto-coverage-trace-pc",
91 static cl::opt<bool> ClTracePCGuard("lto-coverage-trace-pc-guard",
99 // at run-time. Works with trace-pc-guard, inline-8bit-counters, and
100 // inline-bool-flag.
101 static cl::opt<bool> ClCreatePCTable("lto-coverage-pc-table",
106 "lto-coverage-inline-8bit-counters",
107 cl::desc("increments 8-bit counter for every edge"), cl::Hidden,
[all …]
DSanitizerCoveragePCGUARD.so.cc1 //===-- SanitizerCoverage.cpp - coverage instrumentation for sanitizers ---===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 //===----------------------------------------------------------------------===//
76 #include "afl-llvm-common.h"
165 I->setMetadata(LLVMContext::MD_nosanitize, MDNode::get(*C, std::nullopt)); in SetNoSanitizeMetadata()
167 I->setMetadata(I->getModule()->getMDKindID("nosanitize"), in SetNoSanitizeMetadata()
189 GlobalVariable *FunctionGuardArray; // for trace-pc-guard.
190 GlobalVariable *Function8bitCounterArray; // for inline-8bit-counters.
191 GlobalVariable *FunctionBoolArray; // for inline-bool-flag.
[all …]
/external/llvm/docs/
DLibFuzzer.rst2 libFuzzer – a library for coverage-guided fuzz testing.
11 LibFuzzer is a library for in-process, coverage-guided, evolutionary fuzzing
15 all of its fuzzing inside a single process. This in-process fuzzing can be more
17 for process start-up.
34 (If `building Clang from trunk`_ is too time-consuming or difficult, then
38 .. code-block:: console
47 ``./third_party/llvm-build/Release+Asserts/bin/clang``)
65 --------
70 .. code-block:: c++
75 return 0; // Non-zero return values are reserved for future use.
[all …]
/external/llvm/cmake/modules/
DHandleLLVMOptions.cmake16 if (CMAKE_LINKER MATCHES "lld-link.exe")
27 add_definitions( -D_DEBUG )
29 # On non-Debug builds cmake automatically defines NDEBUG, so we
32 add_definitions( -UNDEBUG )
41 string (REGEX REPLACE "(^| )[/-]D *NDEBUG($| )" " "
48 add_definitions(-DEXPENSIVE_CHECKS)
49 add_definitions(-D_GLIBCXX_DEBUG)
99 # Darwin-specific linker flags for loadable modules.
100 …set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-flat_namespace -Wl,-undefined -Wl…
103 # Pass -Wl,-z,defs. This makes sure all symbols are defined. Otherwise a DSO
[all …]
/external/mesa3d/docs/relnotes/
D21.1.0.rst1 Mesa 21.1.0 Release Notes / 2021-05-05
20 ---------------
24 0128f10e22970d3aed3d1034003731f94623015cd9797c07151417649c1b1ff8 mesa-21.1.0.tar.xz
28 ------------
30 - VK_KHR_workgroup_memory_explicit_layout on Intel, RADV
32 - DRM format modifiers for AMD.
34 - VK_KHR_zero_initialize_workgroup_memory on Intel, RADV
36 - Zink exposes GL 4.6 and ES 3.1
38 - GL_EXT_depth_bounds_test on softpipe, zink
40 - GL_EXT_texture_filter_minmax on nvc0 (gm200+)
[all …]

12