Searched +full:clang +full:- +full:ubsan +full:- +full:regression (Results 1 – 25 of 43) sorted by relevance
12
| /external/zstd/.github/workflows/ |
| D | dev-long-tests.yml | 1 name: dev-long-tests 5 group: long-${{ github.ref }} 6 cancel-in-progress: true 12 permissions: read-all 15 make-all: 16 runs-on: ubuntu-latest 18 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # tag=v4.1.1 19 - name: make all 23 make-test: 24 runs-on: ubuntu-latest [all …]
|
| /external/zstd/tests/fuzz/ |
| D | README.md | 16 Run `./fuzz.py -h` for the commands and run `./fuzz.py COMMAND -h` for 24 make -C ../tests decodecorpus 28 By default it outputs 100 samples, each at most 8KB into `corpora/TARGET-seed`, 29 but that can be configured with the `--number`, `--max-size-log` and `--seed` 35 `--cc`, `--cflags`, etc. 37 `--lib-fuzzing-engine`, the default is `libregression.a`. 38 Alternatively, you can use Clang's built in fuzzing engine with 39 `--enable-fuzzer`. 40 It has flags that can easily set up sanitizers `--enable-{a,ub,m}san`, and 41 coverage instrumentation `--enable-coverage`. [all …]
|
| D | fuzz.py | 7 # This source code is licensed under both the BSD-style license (found in the 10 # You may select, at your option, one of the above-listed licenses. 79 CFLAGS = os.environ.get('CFLAGS', '-O3') 82 MFLAGS = os.environ.get('MFLAGS', '-j') 87 AFL_FUZZ = os.environ.get('AFL_FUZZ', 'afl-fuzz') 155 san_flags = ','.join(re.findall('-fsanitize=((?:[a-z]+,?)+)', flags)) 156 nosan_flags = ','.join(re.findall('-fno-sanitize=((?:[a-z]+,?)+)', flags)) 160 raise RuntimeError('-fno-sanitize={s} and -fsanitize={s} passed'. 173 args.ubsan = set_sanitizer('undefined', args.ubsan, san, nosan) 175 args.sanitize = args.asan or args.msan or args.ubsan [all …]
|
| /external/compiler-rt/test/ |
| D | CMakeLists.txt | 23 # Use LLVM utils and Clang from the same build tree. 25 clang clang-headers FileCheck count not llvm-config llvm-nm llvm-objdump 26 llvm-symbolizer compiler-rt-headers sancov) 39 # Run sanitizer tests only if we're sure that clang would produce 64 add_subdirectory(ubsan) 66 # CFI tests require diagnostic mode, which is implemented in UBSan. 86 add_lit_target(check-all 87 "Running all regression tests"
|
| /external/expat/.github/workflows/ |
| D | fuzzing.yml | 30 name: Run fuzzing regression tests 36 - cron: '0 2 * * 5' # Every Friday at 2am 44 name: Run fuzzing regression tests 45 runs-on: ubuntu-22.04 47 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 49 - name: Install Clang 18 50 run: |- 51 set -x 52 source /etc/os-release 53 wget -O - https://apt.llvm.org/llvm-snapshot.gpg.key | sudo apt-key add - [all …]
|
| /external/python/cpython3/Misc/NEWS.d/ |
| D | 3.7.0b4.rst | 2 .. date: 2018-04-26-22-48-28 4 .. release date: 2018-05-02 13 .. date: 2018-04-24-22-31-04 23 .. date: 2018-04-19-08-30-07 27 Fixed clang ubsan (undefined behavior sanitizer) warnings in dictobject.c by 34 .. date: 2018-04-05-22-20-44 43 .. date: 2018-04-03-00-58-41 55 .. date: 2018-04-03-00-30-25 60 ``__aexit__()`` return non-awaitable object. 65 .. date: 2018-04-02-09-32-40 [all …]
|
| D | 3.10.0a3.rst | 2 .. date: 2020-05-28-06-06-47 4 .. release date: 2020-12-07 8 making constant-time-defeating optimizations less likely. 13 .. date: 2020-12-05-22-34-47 25 .. date: 2020-12-02-20-23-31 29 Several built-in and standard library types now ensure that their internal 33 - :meth:`collections.OrderedDict.items() <collections.OrderedDict>` 35 - :meth:`dict.items` 37 - :func:`enumerate` 39 - :func:`functools.reduce` [all …]
|
| /external/zstd/ |
| D | Makefile | 5 # This source code is licensed under both the BSD-style license (found in the 8 # You may select, at your option, one of the above-listed licenses. 24 # When cross-compiling from linux to windows, you might 28 # Note: mingw-w64 build from linux to windows does not 40 ## default: Build lib-release and zstd-release 42 default: lib-release zstd-release 53 $(Q)$(MAKE) -C $(PRGDIR) all 54 $(Q)$(MAKE) -C $(TESTDIR) all 58 $(MAKE) -C $(PRGDIR) zstd32 59 $(MAKE) -C $(TESTDIR) all32 [all …]
|
| D | CHANGELOG | 6 lib: reduce binary size with selective built-time exclusion, by @felixhandte 11 lib: fix zdict prototype mismatch in static_only mode, by @ldv-alt 12 lib: fix several bugs in magicless-format decoding, by @embg 13 cli: add common compressed file types to `--exclude-compressed`` by @daniellerozenblit 14 cli: fix mixing `-c` and `-o` commands with `--rm`, by @Cyan4973 15 cli: fix erroneous exclusion of hidden files with `--output-dir-mirror` by @felixhandte 20 …rovements by @terrelln, @sighingnow, @gjasny, @JohanMabille, @Saverio976, @gruenich, @teo-tsirpanis 22 build: fix cross-compiling for AArch64 with lld by @jcelerier 31 port: risc-v support validation in CI, by @Cyan4973 34 port: HP-UX compatibility, by @likema [all …]
|
| /external/llvm/docs/ |
| D | LibFuzzer.rst | 2 libFuzzer – a library for coverage-guided fuzz testing. 11 LibFuzzer is a library for in-process, coverage-guided, evolutionary fuzzing 15 all of its fuzzing inside a single process. This in-process fuzzing can be more 17 for process start-up. 32 version of Clang is the only supported variant. 34 (If `building Clang from trunk`_ is too time-consuming or difficult, then 35 the Clang binaries that the Chromium developers build are likely to be 38 .. code-block:: console 42 git clone https://chromium.googlesource.com/chromium/src/tools/clang 44 TMP_CLANG/clang/scripts/update.py [all …]
|
| /external/expat/expat/ |
| D | Changes | 14 !! - <blink>fixing a complex non-public security issue</blink>, !! 15 !! - teaming up on researching and fixing future security reports and !! 16 !! ClusterFuzz findings with few-days-max response times in communication !! 19 !! - implementing and auto-testing XML 1.0r5 support !! 21 !! - smart ideas on fixing the Autotools CMake files generation issue !! 23 !! - the Windows binaries topic (needs requirements engineering first), !! 24 !! - pushing migration from `int` to `size_t` further !! 25 !! including edge-cases test coverage (needs discussion before anything). !! 27 !! For details, please reach out via e-mail to sebastian@pipping.org so we !! 30 !! THANK YOU! Sebastian Pipping -- Berlin, 2024-03-09 !! [all …]
|
| /external/cronet/third_party/libc++/src/utils/ci/ |
| D | run-buildbot | 2 #===----------------------------------------------------------------------===## 6 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 8 #===----------------------------------------------------------------------===## 10 set -ex 11 set -o pipefail 23 [-h|--help] Display this help and exit. 25 --llvm-root <DIR> Path to the root of the LLVM monorepo. By default, we try 28 --build-dir <DIR> The directory to use for building the library. By default, 29 this is '<llvm-root>/build/<builder>'. 31 --osx-roots <DIR> Path to pre-downloaded macOS dylibs. By default, we download [all …]
|
| /external/cronet/third_party/protobuf/src/google/protobuf/ |
| D | port_def.inc | 1 // Protocol Buffers - Google's data interchange format 3 // https://developers.google.com/protocol-buffers/ 51 // The definitions in this file are intended to be portable across Clang, 52 // GCC, and MSVC. Function-like macros are usable without an #ifdef guard. 57 // - https://en.cppreference.com/w/c/error/assert 58 // - https://docs.microsoft.com/en-us/cpp/preprocessor/predefined-macros#microsoft-specific-predefi… 61 // - Standard: https://en.cppreference.com/w/cpp/preprocessor/replace 62 // - Clang: https://clang.llvm.org/docs/LanguageExtensions.html 64 // - GCC: https://gcc.gnu.org/onlinedocs/cpp/Predefined-Macros.html 65 // - MSVC: https://docs.microsoft.com/en-us/cpp/preprocessor/predefined-macros [all …]
|
| /external/protobuf/src/google/protobuf/ |
| D | port_def.inc | 1 // Protocol Buffers - Google's data interchange format 3 // https://developers.google.com/protocol-buffers/ 51 // The definitions in this file are intended to be portable across Clang, 52 // GCC, and MSVC. Function-like macros are usable without an #ifdef guard. 57 // - https://en.cppreference.com/w/c/error/assert 58 // - https://docs.microsoft.com/en-us/cpp/preprocessor/predefined-macros#microsoft-specific-predefi… 61 // - Standard: https://en.cppreference.com/w/cpp/preprocessor/replace 62 // - Clang: https://clang.llvm.org/docs/LanguageExtensions.html 64 // - GCC: https://gcc.gnu.org/onlinedocs/cpp/Predefined-Macros.html 65 // - MSVC: https://docs.microsoft.com/en-us/cpp/preprocessor/predefined-macros [all …]
|
| /external/expat/expat/tests/ |
| D | misc_tests.c | 9 Copyright (c) 2001-2006 Fred L. Drake, Jr. <fdrake@users.sourceforge.net> 11 Copyright (c) 2005-2007 Steven Solie <steven@solie.ca> 12 Copyright (c) 2005-2012 Karl Waclawek <karl@waclawek.net> 13 Copyright (c) 2016-2024 Sebastian Pipping <sebastian@pipping.org> 14 Copyright (c) 2017-2022 Rhodri James <rhodri@wildebeest.org.uk> 17 Copyright (c) 2018 Marco Maggi <marco.maggi-ipsu@poste.it> 91 g_parser = XML_ParserCreate_MM(XCS("us-ascii"), &memsuite, NULL); in START_TEST() 120 /* Test that XML_ErrorString rejects out-of-range codes */ 122 #if ! EXPAT_TESTS_UBSAN // because this would trigger UBSan in START_TEST() 128 assert_true(sizeof(enum XML_Error) == sizeof(int)); // self-test in START_TEST() [all …]
|
| /external/libxml2/ |
| D | NEWS | 12 - xmlCtxtSetErrorHandler 13 - xmlXPathSetErrorHandler 14 - xmlXIncludeSetErrorHandler 16 This makes it possible to register per-context error handlers without 29 to be enabled by passing --with-zlib, --with-lzma or --with-html to 30 configure. In legacy mode (--with-legacy) these options are enabled 42 - htmlDefaultSAXHandler 43 - oldXMLWDcompatibility 44 - xmlDefaultSAXHandler 45 - xmlDefaultSAXLocator [all …]
|
| /external/webp/ |
| D | ChangeLog | 2 cf7c5a5d provide a way to opt-out/override WEBP_NODISCARD 3 cc34288a update ChangeLog (tag: v1.4.0-rc1) 11 07216886 webp-container-spec: fix VP8 chunk ref ('VP8'->'VP8 ') 14 d537cd37 cmake: fix vwebp_sdl compile w/libsdl-org release 16 7b0bc235 man/cwebp.1: add more detail to -partition_limit 21 1bf46358 man/cwebp.1: clarify -pass > 1 behavior w/o -size/-psnr 22 eba03acb webp-container-spec: replace 'above' with 'earlier' 23 a16d30cb webp-container-spec: clarify chunk order requirements 24 8a7e9112 Merge "CMakeLists.txt: apply cmake-format" into main 28 fba7d62e CMakeLists.txt: apply cmake-format [all …]
|
| /external/cronet/third_party/libxml/src/ |
| D | NEWS | 11 Starting with this release, it should be enough to add the --with-legacy 16 libxml2 will now store global variables in thread-local storage if supported 43 - threads: Fix --with-thread-alloc 44 - xinclude: Fix 'last' pointer in xmlXIncludeCopyNode 48 - globals: Deprecate xmlLastError 49 - parser: Deprecate global parser options 50 - win32: Deprecate old Windows build system 54 - parser: Stop switching to ISO-8859-1 on encoding errors 55 - parser: Support encoded external PEs in entity values 56 - string: Fix UTF-8 validation in xmlGetUTF8Char [all …]
|
| /external/mesa3d/docs/relnotes/ |
| D | 22.0.0.rst | 1 Mesa 22.0.0 Release Notes / 2022-03-09 20 --------------- 24 e6c41928b5b9917485bd67cec22d15e62cad7a358bf4c711a647979987601250 mesa-22.0.0.tar.xz 28 ------------ 30 - lavapipe,radv,anv KHR_dynamic_rendering 31 - radv EXT_image_view_min_lod 32 - VK_KHR_synchronization2 on RADV. 33 - OpenSWR has been moved to the Amber branch 34 - radeonsi, zink ARB_sparse_texture 35 - d3d12 GLES3.1 (shader storage buffers, images, compute, indirect draw, draw params, ARB_framebuff… [all …]
|
| D | 23.3.0.rst | 1 Mesa 23.3.0 Release Notes / 2023-11-29 20 --------------- 24 50f729dd60ed6335b989095baad81ef5edf7cfdd4b4b48b9b955917cb07d69c5 mesa-23.3.0.tar.xz 28 ----------- 29 - NVK: A Vulkan driver for Nvidia hardware 32 ------------ 33 - VK_EXT_pipeline_robustness on ANV 34 - VK_KHR_maintenance5 on RADV 35 - OpenGL ES 3.1 on Asahi 36 - GL_ARB_compute_shader on Asahi [all …]
|
| D | 21.3.0.rst | 1 Mesa 21.3.0 Release Notes / 2021-11-17 20 --------------- 24 a2753c09deef0ba14d35ae8a2ceff3fe5cd13698928c7bb62c2ec8736eb09ce1 mesa-21.3.0.tar.xz 28 ------------ 30 - VK_EXT_color_write_enable on lavapipe 31 - GL_ARB_texture_filter_anisotropic in llvmpipe 32 - Anisotropic texture filtering in lavapipe 33 - VK_EXT_shader_atomic_float2 on Intel and RADV. 34 - VK_EXT_vertex_input_dynamic_state on RADV. 35 - VK_KHR_timeline_semaphore on lavapipe [all …]
|
| D | 22.3.0.rst | 1 Mesa 22.3.0 Release Notes / 2022-12-02 20 --------------- 24 644bf936584548c2b88762111ad58b4aa3e4688874200e5a4eb74e53ce301746 mesa-22.3.0.tar.xz 28 ------------ 30 - GL_ARB_shader_clock on llvmpipe 31 - VK_KHR_shader_clock on lavapipe 32 - Mesa-DB, the new single file cache type 33 - VK_EXT_attachment_feedback_loop_layout on RADV, lavapipe 34 - VK_KHR_global_priority on RADV 35 - GL_KHR_blend_equation_advanced_coherent on zink [all …]
|
| /external/mbedtls/tests/scripts/ |
| D | all.sh | 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 15 # ------- 20 # --------------- 32 # * Basic Unix tools (Windows users note: a Unix-style find must be before 37 # * GCC and Clang (recent enough for using ASan with gcc and MemSan with clang, or valgrind) 39 # * arm-gcc and mingw-gcc 40 # * ArmCC 5 and ArmCC 6, unless invoked with --no-armcc 50 # The behavior on an error depends on whether --keep-going (alias -k) 52 # * Without --keep-going: the script stops on the first error without 55 # * With --keep-going: the script runs all requested components and [all …]
|
| /external/AFLplusplus/ |
| D | Changelog.md | 7 - afl-fuzz: 8 - default power schedule is now EXPLORE, due a fix in fast schedules 10 - fixed minor issues in the mutation engine, thanks to @futhewo for 12 - better deterministic fuzzing is now available, benchmarks have shown 13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR! 14 - afl-cc: 15 - large rewrite by @SonicStark which fixes a few corner cases, thanks! 16 - LTO mode now requires llvm 12+ 17 - workaround for ASAN with gcc_plugin mode 18 - instrumentation: [all …]
|
| /external/AFLplusplus/docs/ |
| D | Changelog.md | 7 - afl-fuzz: 8 - default power schedule is now EXPLORE, due a fix in fast schedules 10 - fixed minor issues in the mutation engine, thanks to @futhewo for 12 - better deterministic fuzzing is now available, benchmarks have shown 13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR! 14 - afl-cc: 15 - large rewrite by @SonicStark which fixes a few corner cases, thanks! 16 - LTO mode now requires llvm 12+ 17 - workaround for ASAN with gcc_plugin mode 18 - instrumentation: [all …]
|
12