Searched +full:asan +full:- +full:trace +full:- +full:cmp (Results 1 – 25 of 37) sorted by relevance
12
| /external/grpc-grpc/ |
| D | build_handwritten.yaml | 8 '#04': not listed in doc/g_stands_for.md - and update that document to list the 11 '#07': Master always has a "-dev" suffix 12 '#08': Use "-preN" suffixes to identify pre-release versions 13 '#09': Per-language overrides are possible with (eg) ruby_version tag here 21 asan: 23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer 24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 27 LDFLAGS: -fsanitize=address 33 asan-noleaks: 35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer [all …]
|
| /external/rust/crates/grpcio-sys/grpc/ |
| D | build_handwritten.yaml | 8 '#04': not listed in doc/g_stands_for.md - and update that document to list the 11 '#07': Master always has a "-dev" suffix 12 '#08': Use "-preN" suffixes to identify pre-release versions 13 '#09': Per-language overrides are possible with (eg) ruby_version tag here 21 asan: 23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer 24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS 27 LDFLAGS: -fsanitize=address 33 asan-noleaks: 35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer [all …]
|
| /external/grpc-grpc/tools/run_tests/generated/ |
| D | configs.json | 3 "config": "asan", 10 "config": "asan-noleaks", 16 "config": "asan-trace-cmp", 23 "config": "c++-compat" 35 "--tool=helgrind" 45 "--tool=memcheck", 46 "--leak-check=full"
|
| /external/rust/crates/grpcio-sys/grpc/tools/ |
| D | fuzztest.bazelrc | 9 # try-import %workspace%/fuzztest.bazelrc 16 # Compile and link with Address Sanitizer (ASAN). 17 build:fuzztest-common --linkopt=-fsanitize=address 18 build:fuzztest-common --copt=-fsanitize=address 20 # Standard define for "ifdef-ing" any fuzz test specific code. 21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION 24 build:fuzztest-common --copt=-UNDEBUG 27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode 28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1 33 # Use with: --config=fuzztest [all …]
|
| D | bazel.rc | 3 # for platform-appropriate cxxopts 4 common --enable_platform_specific_config 6 build:windows --cxxopt='/std:c++14' 7 build:windows --host_cxxopt='/std:c++14' 8 build:linux --cxxopt='-std=c++14' 9 build:linux --host_cxxopt='-std=c++14' 10 build:macos --cxxopt='-std=c++14' 11 build:macos --host_cxxopt='-std=c++14' 12 build:freebsd --cxxopt='-std=c++14' 13 build:freebsd --host_cxxopt='-std=c++14' [all …]
|
| /external/pigweed/third_party/fuzztest/ |
| D | fuzztest.bazelrc | 9 # try-import %workspace%/fuzztest.bazelrc 16 # Compile and link with Address Sanitizer (ASAN). 17 build:fuzztest-common --linkopt=-fsanitize=address 18 build:fuzztest-common --copt=-fsanitize=address 20 # Standard define for "ifdef-ing" any fuzz test specific code. 21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION 24 build:fuzztest-common --copt=-UNDEBUG 27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode 28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1 33 # Use with: --config=fuzztest [all …]
|
| /external/grpc-grpc/tools/ |
| D | fuzztest.bazelrc | 9 # try-import %workspace%/fuzztest.bazelrc 16 # Compile and link with Address Sanitizer (ASAN). 17 build:fuzztest-common --linkopt=-fsanitize=address 18 build:fuzztest-common --copt=-fsanitize=address 20 # Standard define for "ifdef-ing" any fuzz test specific code. 21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION 24 build:fuzztest-common --copt=-UNDEBUG 27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode 28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1 33 # Use with: --config=fuzztest [all …]
|
| D | bazel.rc | 5 common --enable_bzlmod=false 7 # for platform-appropriate cxxopts 8 common --enable_platform_specific_config 10 build:windows --cxxopt='/std:c++14' 11 build:windows --host_cxxopt='/std:c++14' 12 build:linux --cxxopt='-std=c++14' 13 build:linux --host_cxxopt='-std=c++14' 14 build:macos --cxxopt='-std=c++14' 15 build:macos --host_cxxopt='-std=c++14' 16 build:freebsd --cxxopt='-std=c++14' [all …]
|
| /external/cronet/build/config/sanitizers/ |
| D | sanitizers.gni | 2 # Use of this source code is governed by a BSD-style license that can be 16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs 38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the 89 # Value for -fsanitize-coverage flag. Setting this causes 92 # -fsanitize=fuzzer-no-link 94 # trace-pc-guard 96 # trace-pc-guard,indirect-calls 130 # --fuzz= argument, which requires some sanitizer coverage. 136 # Also be sure not to enable this on non-Chromium builds where 152 …zer. When libfuzzer is enabled, fuzztest executables automatically support --fuzz but provide outp… [all …]
|
| /external/angle/build/config/sanitizers/ |
| D | sanitizers.gni | 2 # Use of this source code is governed by a BSD-style license that can be 16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs 38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the 42 # Enables "param-retval" mode, which finds more uses of uninitialized data and 101 # Value for -fsanitize-coverage flag. Setting this causes 104 # -fsanitize=fuzzer-no-link 106 # trace-pc-guard 108 # trace-pc-guard,indirect-calls 129 # can change the behaviour for the false case, and only build the non high-end 147 # --fuzz= argument, which requires some sanitizer coverage. [all …]
|
| /external/jazzer-api/docs/ |
| D | advanced.md | 3 * [Passing JVM arguments](#passing-jvm-arguments) 4 * [Coverage instrumentation](#coverage-instrumentation) 5 * [Trace instrumentation](#trace-instrumentation) 6 * [Value profile](#value-profile) 7 * [Custom hooks](#custom-hooks) 8 * [Suppressing stack traces](#suppressing-stack-traces) 9 * [Export coverage information](#export-coverage-information) 10 * [Native libraries](#native-libraries) 11 * [Fuzzing mutators](#fuzzing-mutators) 13 <!-- Created by https://github.com/ekalinin/github-markdown-toc --> [all …]
|
| /external/jazzer-api/src/main/java/com/code_intelligence/jazzer/driver/ |
| D | Opt.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 42 * <p>Each option corresponds to a command-line argument of the driver of the same name. 69 "asan", false, "Allow fuzzing of native libraries compiled with '-fsanitize=address'"); 71 "ubsan", false, "Allow fuzzing of native libraries compiled with '-fsanitize=undefined'"); 73 …"Allow fuzzing of native libraries compiled with '-fsanitize=fuzzer' (implied by --asan and --ubsa… 81 "Fully qualified reference (optionally with a Javadoc-style signature) to a " 87 "Path to write a JaCoCo .exec file to when the fuzzer exits (if non-empty)"); 89 "Path to write a human-readable coverage report to when the fuzzer exits (if non-empty)"); 93 "Names of classes from which hooks (custom or built-in) should not be loaded from"); 95 "dump_classes_dir", "", "Directory to dump instrumented .class files into (if non-empty)"); [all …]
|
| /external/AFLplusplus/ |
| D | Changelog.md | 7 - afl-fuzz: 8 - default power schedule is now EXPLORE, due a fix in fast schedules 10 - fixed minor issues in the mutation engine, thanks to @futhewo for 12 - better deterministic fuzzing is now available, benchmarks have shown 13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR! 14 - afl-cc: 15 - large rewrite by @SonicStark which fixes a few corner cases, thanks! 16 - LTO mode now requires llvm 12+ 17 - workaround for ASAN with gcc_plugin mode 18 - instrumentation: [all …]
|
| D | GNUmakefile | 2 # american fuzzy lop++ - makefile 3 # ----------------------------- 13 # https://www.apache.org/licenses/LICENSE-2.0 30 VERSION = $(shell grep '^$(HASH)define VERSION ' ../config.h | cut -d '"' -f2) 32 # PROGS intentionally omit afl-as, which gets installed elsewhere. 34 PROGS = afl-fuzz afl-showmap afl-tmin afl-gotcpu afl-analyze 35 SH_PROGS = afl-plot afl-cmin afl-cmin.bash afl-whatsup afl-addseeds afl-system-config afl-persis… 36 MANPAGES=$(foreach p, $(PROGS) $(SH_PROGS), $(p).8) afl-as.8 39 SYS = $(shell uname -s) 40 ARCH = $(shell uname -m) [all …]
|
| /external/AFLplusplus/docs/ |
| D | Changelog.md | 7 - afl-fuzz: 8 - default power schedule is now EXPLORE, due a fix in fast schedules 10 - fixed minor issues in the mutation engine, thanks to @futhewo for 12 - better deterministic fuzzing is now available, benchmarks have shown 13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR! 14 - afl-cc: 15 - large rewrite by @SonicStark which fixes a few corner cases, thanks! 16 - LTO mode now requires llvm 12+ 17 - workaround for ASAN with gcc_plugin mode 18 - instrumentation: [all …]
|
| /external/clang/docs/ |
| D | SanitizerCoverage.rst | 12 get function-level, basic-block-level, and edge-level coverage at a very low 21 following compile-time flags: 23 * ``-fsanitize-coverage=func`` for function-level coverage (very fast). 24 * ``-fsanitize-coverage=bb`` for basic-block-level coverage (may add up to 30% 26 * ``-fsanitize-coverage=edge`` for edge-level coverage (up to 40% slowdown). 28 You may also specify ``-fsanitize-coverage=indirect-calls`` for 29 additional `caller-callee coverage`_. 35 To get `Coverage counters`_, add ``-fsanitize-coverage=8bit-counters`` 36 to one of the above compile-time flags. At runtime, use 41 .. code-block:: console [all …]
|
| /external/clang/lib/Driver/ |
| D | SanitizerArgs.cpp | 1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===// 8 //===----------------------------------------------------------------------===// 56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any 61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid 67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt 68 /// would produce "-fsanitize=vptr". 75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce 76 /// "-fsanitize=alignment". 80 /// Produce a string containing comma-separated names of sanitizers in \p 129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs() [all …]
|
| /external/zstd/tests/fuzz/ |
| D | fuzz.py | 7 # This source code is licensed under both the BSD-style license (found in the 10 # You may select, at your option, one of the above-listed licenses. 79 CFLAGS = os.environ.get('CFLAGS', '-O3') 82 MFLAGS = os.environ.get('MFLAGS', '-j') 87 AFL_FUZZ = os.environ.get('AFL_FUZZ', 'afl-fuzz') 155 san_flags = ','.join(re.findall('-fsanitize=((?:[a-z]+,?)+)', flags)) 156 nosan_flags = ','.join(re.findall('-fno-sanitize=((?:[a-z]+,?)+)', flags)) 160 raise RuntimeError('-fno-sanitize={s} and -fsanitize={s} passed'. 171 args.asan = set_sanitizer('address', args.asan, san, nosan) 175 args.sanitize = args.asan or args.msan or args.ubsan [all …]
|
| /external/rust/crates/libfuzzer-sys/libfuzzer/ |
| D | FuzzerFlags.def | 1 //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 11 //===----------------------------------------------------------------------===// 14 FUZZER_FLAG_INT(runs, -1, 15 "Number of individual test runs (-1 for infinite runs).") 23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files " 25 "the name of a file containing the comma-separated list.") 61 FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group " 63 "and each sub-process will randomly select seeds from different " [all …]
|
| /external/compiler-rt/lib/asan/ |
| D | asan_report.cc | 1 //===-- asan_report.cc ----------------------------------------------------===// 8 //===----------------------------------------------------------------------===// 13 //===----------------------------------------------------------------------===// 30 // -------------------- User-specified callbacks ----------------- {{{1 60 uptr remaining = kErrorMessageBufferSize - error_message_buffer_pos; in AppendToErrorMessageBuffer() 63 error_message_buffer[kErrorMessageBufferSize - 1] = '\0'; in AppendToErrorMessageBuffer() 68 // ---------------------- Decorator ------------------------------ {{{1 118 // ---------------------- Helper functions ----------------------- {{{1 123 str->append("%s%s%x%x%s%s", before, in PrintMemoryByte() 137 if (before) str->append("%s%p:", before, bytes); in PrintShadowBytes() [all …]
|
| /external/AFLplusplus/instrumentation/ |
| D | SanitizerCoverageLTO.so.cc | 1 /* SanitizeCoverage.cpp ported to AFL++ LTO :-) */ 66 #include "afl-llvm-common.h" 82 "lto-coverage-level", 87 static cl::opt<bool> ClTracePC("lto-coverage-trace-pc", 91 static cl::opt<bool> ClTracePCGuard("lto-coverage-trace-pc-guard", 99 // at run-time. Works with trace-pc-guard, inline-8bit-counters, and 100 // inline-bool-flag. 101 static cl::opt<bool> ClCreatePCTable("lto-coverage-pc-table", 106 "lto-coverage-inline-8bit-counters", 107 cl::desc("increments 8-bit counter for every edge"), cl::Hidden, [all …]
|
| D | SanitizerCoveragePCGUARD.so.cc | 1 //===-- SanitizerCoverage.cpp - coverage instrumentation for sanitizers ---===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 11 //===----------------------------------------------------------------------===// 76 #include "afl-llvm-common.h" 165 I->setMetadata(LLVMContext::MD_nosanitize, MDNode::get(*C, std::nullopt)); in SetNoSanitizeMetadata() 167 I->setMetadata(I->getModule()->getMDKindID("nosanitize"), in SetNoSanitizeMetadata() 189 GlobalVariable *FunctionGuardArray; // for trace-pc-guard. 190 GlobalVariable *Function8bitCounterArray; // for inline-8bit-counters. 191 GlobalVariable *FunctionBoolArray; // for inline-bool-flag. [all …]
|
| /external/llvm/docs/ |
| D | LibFuzzer.rst | 2 libFuzzer – a library for coverage-guided fuzz testing. 11 LibFuzzer is a library for in-process, coverage-guided, evolutionary fuzzing 15 all of its fuzzing inside a single process. This in-process fuzzing can be more 17 for process start-up. 34 (If `building Clang from trunk`_ is too time-consuming or difficult, then 38 .. code-block:: console 47 ``./third_party/llvm-build/Release+Asserts/bin/clang``) 65 -------- 70 .. code-block:: c++ 75 return 0; // Non-zero return values are reserved for future use. [all …]
|
| /external/llvm/cmake/modules/ |
| D | HandleLLVMOptions.cmake | 16 if (CMAKE_LINKER MATCHES "lld-link.exe") 27 add_definitions( -D_DEBUG ) 29 # On non-Debug builds cmake automatically defines NDEBUG, so we 32 add_definitions( -UNDEBUG ) 41 string (REGEX REPLACE "(^| )[/-]D *NDEBUG($| )" " " 48 add_definitions(-DEXPENSIVE_CHECKS) 49 add_definitions(-D_GLIBCXX_DEBUG) 99 # Darwin-specific linker flags for loadable modules. 100 …set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-flat_namespace -Wl,-undefined -Wl… 103 # Pass -Wl,-z,defs. This makes sure all symbols are defined. Otherwise a DSO [all …]
|
| /external/mesa3d/docs/relnotes/ |
| D | 21.1.0.rst | 1 Mesa 21.1.0 Release Notes / 2021-05-05 20 --------------- 24 0128f10e22970d3aed3d1034003731f94623015cd9797c07151417649c1b1ff8 mesa-21.1.0.tar.xz 28 ------------ 30 - VK_KHR_workgroup_memory_explicit_layout on Intel, RADV 32 - DRM format modifiers for AMD. 34 - VK_KHR_zero_initialize_workgroup_memory on Intel, RADV 36 - Zink exposes GL 4.6 and ES 3.1 38 - GL_EXT_depth_bounds_test on softpipe, zink 40 - GL_EXT_texture_filter_minmax on nvc0 (gm200+) [all …]
|
12