Home
last modified time | relevance | path

Searched +full:msan +full:- +full:fuzztest (Results 1 – 14 of 14) sorted by relevance

/external/zstd/.github/workflows/
Ddev-long-tests.yml1 name: dev-long-tests
5 group: long-${{ github.ref }}
6 cancel-in-progress: true
12 permissions: read-all
15 make-all:
16 runs-on: ubuntu-latest
18 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # tag=v4.1.1
19 - name: make all
23 make-test:
24 runs-on: ubuntu-latest
[all …]
/external/cronet/build/config/sanitizers/
Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
89 # Value for -fsanitize-coverage flag. Setting this causes
92 # -fsanitize=fuzzer-no-link
94 # trace-pc-guard
96 # trace-pc-guard,indirect-calls
110 # The fuzztest library builds only on some platforms, so for now,
111 # all targets depending on fuzztest need to be configured according
129 # Builds fuzztest test executables such that they support the
[all …]
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
36 "$clang_base_path/bin/llvm-symbolizer${exe}",
64 deps += [ "//third_party/fuzztest:centipede_weak_sancov_stubs" ]
69 "ASan is only supported in 64-bit builds on Windows.")
77 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll"
96 "code-sign-file",
97 "--identity=" + ios_code_signing_identity,
98 "--output=" + rebase_path(outputs[0], root_build_dir),
115 ldflags = [ "-Wl,-u,__sanitizer_options_link_helper" ]
117 ldflags = [ "-Wl,-u_sanitizer_options_link_helper" ]
[all …]
/external/angle/build/config/sanitizers/
Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
42 # Enables "param-retval" mode, which finds more uses of uninitialized data and
101 # Value for -fsanitize-coverage flag. Setting this causes
104 # -fsanitize=fuzzer-no-link
106 # trace-pc-guard
108 # trace-pc-guard,indirect-calls
129 # can change the behaviour for the false case, and only build the non high-end
146 # Builds fuzztest test executables such that they support the
[all …]
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
20 # since that's the only platform we use these large fuzzers - in the future
43 "$clang_base_path/bin/llvm-symbolizer${exe}",
71 deps += [ "//third_party/fuzztest:centipede_weak_sancov_stubs" ]
76 "ASan is only supported in 64-bit builds on Windows.")
96 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll"
99 _clang_rt_dso_path = "windows/clang_rt.ubsan_dynamic-x86_64.dll"
119 "code-sign-file",
120 "--identity=" + ios_code_signing_identity,
121 "--output=" + rebase_path(outputs[0], root_build_dir),
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/
Dbazel.rc3 # for platform-appropriate cxxopts
4 common --enable_platform_specific_config
6 build:windows --cxxopt='/std:c++14'
7 build:windows --host_cxxopt='/std:c++14'
8 build:linux --cxxopt='-std=c++14'
9 build:linux --host_cxxopt='-std=c++14'
10 build:macos --cxxopt='-std=c++14'
11 build:macos --host_cxxopt='-std=c++14'
12 build:freebsd --cxxopt='-std=c++14'
13 build:freebsd --host_cxxopt='-std=c++14'
[all …]
/external/grpc-grpc/tools/
Dbazel.rc5 common --enable_bzlmod=false
7 # for platform-appropriate cxxopts
8 common --enable_platform_specific_config
10 build:windows --cxxopt='/std:c++14'
11 build:windows --host_cxxopt='/std:c++14'
12 build:linux --cxxopt='-std=c++14'
13 build:linux --host_cxxopt='-std=c++14'
14 build:macos --cxxopt='-std=c++14'
15 build:macos --host_cxxopt='-std=c++14'
16 build:freebsd --cxxopt='-std=c++14'
[all …]
/external/pigweed/
DBUILD.gn7 # https://www.apache.org/licenses/LICENSE-2.0
28 import("$dir_pw_third_party/fuzztest/fuzztest.gni")
73 pw_C_OPTIMIZATION_LEVELS + pw_toolchain_SUPPORTED_C_OPTIMIZATION_LEVELS -
86 [ pw_DEFAULT_C_OPTIMIZATION_LEVEL ] -
118 # micro-ecc
160 "Pigweed's top-level BUILD.gn may only be used when building upstream " +
162 "\$dir_pigweed/modules.gni and create a top-level pw_test_group " +
187 # Warns if PIGWEED_MODULES is not up-to-date and sorted.
192 "--mode=WARN",
193 "--stamp",
[all …]
/external/zstd/
DMakefile5 # This source code is licensed under both the BSD-style license (found in the
8 # You may select, at your option, one of the above-listed licenses.
24 # When cross-compiling from linux to windows, you might
28 # Note: mingw-w64 build from linux to windows does not
40 ## default: Build lib-release and zstd-release
42 default: lib-release zstd-release
53 $(Q)$(MAKE) -C $(PRGDIR) all
54 $(Q)$(MAKE) -C $(TESTDIR) all
58 $(MAKE) -C $(PRGDIR) zstd32
59 $(MAKE) -C $(TESTDIR) all32
[all …]
/external/pigweed/pw_presubmit/py/pw_presubmit/
Dpigweed_presubmit.py9 # https://www.apache.org/licenses/LICENSE-2.0
91 """Add Pigweed-specific defaults to GnGenNinja."""
94 """Add project-specific default GN args to 'args'."""
98 def build_bazel(*args, **kwargs) -> None:
122 # TODO: b/234876100 - msan will not work until the C++ standard library
123 # included in the sysroot has a variant built with msan.
126 # clang-tidy doesn't run on Windows.
132 # TODO: b/244604080 - For the pw::InlineString tests, qemu_clang_debug
138 # TODO: b/240982565 - SocketStream currently requires Linux.
156 def _gn_combined_build_check_targets() -> Sequence[str]:
[all …]
/external/pigweed/targets/host/
Dtarget_toolchains.gni7 # https://www.apache.org/licenses/LICENSE-2.0
35 # Use logging-based test output on host.
38 # Used to configure logging-based perftest on host
112 # Linux-specific target configuration.
119 # macOS-specific target configuration.
125 # Windows-specific target configuration.
209 # Always use the FuzzTest wrappers around gtest and gtest_main.
253 _toolchain_base = pw_toolchain_host_clang.msan
347 # TODO: b/241565082 - Enable NC testing in GN Windows when it is fixed.
402 # Always use the FuzzTest wrapper around gtest_main.
/external/cronet/testing/libfuzzer/
Dgetting_started_with_libfuzzer.md3 Our current best advice on how to start fuzzing is by using FuzzTest, which
5 probably because you've run into limitations of FuzzTest and want to create
7 Chrome, but it still works well - read on.
23 a case-insensitive pattern that matches file names containing the
135 that you run the meta-builder tool using [GN config] that corresponds to the
141 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer
143 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/libfuzzer
145 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer
147 python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\libfuzzer
155 tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Local Linux ASan' out/libfuzzer
[all …]
/external/cronet/testing/
Dtest.gni2 # Use of this source code is governed by a BSD-style license that can be
26 # specified. Cross-platform targets that include `test` targets in their
44 import("//third_party/fuchsia-gn-sdk/src/cmc.gni")
45 import("//third_party/fuchsia-gn-sdk/src/component.gni")
46 import("//third_party/fuchsia-gn-sdk/src/package.gni")
88 # internally-generated targets. However, rust_target requires a strict
97 # if `rs_sources` is non-empty. But we don't automatically provide
204 "//third_party/fuzztest",
208 # -fuzz= argument. It's possible that in future we would want more
216 "--config",
[all …]
/external/pigweed/docs/
Dchangelog.rst3 .. _docs-changelog:
9 --------------------------------
11 --------------------------------
12 .. pigweed-live::
14 .. _docs-changelog-latest:
16 ------------
18 ------------
23 * **Clock management**: The new :ref:`module-pw_clock_tree` module manages
26 * **GitHub Actions**: The new :ref:`docs-github` guide shows you
27 how to set up GitHub Actions to build and test a Bazel-based Pigweed
[all …]