| /external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/ |
| D | MethodSanitizerTest.java | 5 * http://www.eclipse.org/legal/epl-2.0 7 * SPDX-License-Identifier: EPL-2.0 10 * Marc R. Hoffmann - initial API and implementation 19 import org.junit.Test; 33 private MethodVisitor sanitizer; field in MethodSanitizerTest 37 actual = new MethodNode(0, "test", "()V", null, null); in setup() 38 expected = new MethodNode(0, "test", "()V", null, null); in setup() 39 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup() 42 @Test 46 sanitizer.visitCode(); in testLocalVariablePositive() [all …]
|
| /external/oss-fuzz/infra/build/functions/test_data/ |
| D | expected_build_steps.json | 5 "https://github.com/google/oss-fuzz.git", 6 "--depth", 9 "name": "gcr.io/cloud-builders/git" 12 "name": "gcr.io/cloud-builders/docker", 15 "-t", 16 "gcr.io/oss-fuzz/test-project", 19 "dir": "oss-fuzz/projects/test-project" 22 "name": "gcr.io/oss-fuzz/test-project", 25 "-c", 35 "name": "gcr.io/oss-fuzz/test-project", [all …]
|
| /external/cronet/third_party/libc++/src/utils/libcxx/test/ |
| D | params.py | 1 # ===----------------------------------------------------------------------===## 5 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 # ===----------------------------------------------------------------------===## 13 from libcxx.test.dsl import * 14 from libcxx.test.features import _isMSVC 18 "-Werror", 19 "-Wall", 20 "-Wctad-maybe-unsupported", 21 "-Wextra", 22 "-Wshadow", [all …]
|
| /external/rust/crates/bytemuck/.github/workflows/ |
| D | rust.yml | 11 test: 12 name: Test Rust ${{ matrix.rust }} on ${{ matrix.os }} 13 runs-on: ${{ matrix.os }} 17 # our `--feature` config here, but doing so will be very slow, as the 20 # versions (all on linux-x86_64) 21 - { rust: 1.34.0, os: ubuntu-latest } 22 - { rust: stable, os: ubuntu-latest } 23 - { rust: beta, os: ubuntu-latest } 24 - { rust: nightly, os: ubuntu-latest } 25 # non-linux platforms (ones which don't require `cross`) [all …]
|
| /external/zstd/.github/workflows/ |
| D | dev-long-tests.yml | 1 name: dev-long-tests 5 group: long-${{ github.ref }} 6 cancel-in-progress: true 12 permissions: read-all 15 make-all: 16 runs-on: ubuntu-latest 18 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # tag=v4.1.1 19 - name: make all 23 make-test: 24 runs-on: ubuntu-latest [all …]
|
| /external/rust/crates/bytes/ci/ |
| D | tsan.sh | 3 set -ex 7 # Run address sanitizer 8 RUSTFLAGS="-Z sanitizer=address" \ 9 cargo test --target x86_64-unknown-linux-gnu --test test_bytes --test test_buf --test test_buf_mut 11 # Run thread sanitizer 12 RUSTFLAGS="-Z sanitizer=thread" \ 13 cargo -Zbuild-std test --target x86_64-unknown-linux-gnu --test test_bytes --test test_buf --test t…
|
| /external/oss-fuzz/infra/cifuzz/ |
| D | config_utils_test.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 23 # pylint: disable=no-self-use,protected-access 49 # Test it is set when it is supposed to be. 50 os.environ['SANITIZER'] = 'coverage' 54 # Test it is not set when it is not supposed to be. 55 os.environ['SANITIZER'] = 'address' 72 os.environ['LANGUAGE'] = 'invalid-language' 83 os.environ['SANITIZER'] = 'invalid-sanitizer' 86 mock_error.assert_called_with('Invalid SANITIZER: %s. Must be one of: %s.', 87 os.environ['SANITIZER'], [all …]
|
| D | build_fuzzers_test.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 24 # pylint: disable=wrong-import-position 35 # NOTE: This integration test relies on 36 # https://github.com/google/oss-fuzz/tree/master/projects/example project. 56 # pylint: disable=no-self-use,protected-access,too-few-public-methods,unused-argument 85 if element == env_var_arg and command[idx - 1] == '-e': 93 """Tests for building OSS-Fuzz projects on GitHub actions.""" 95 SANITIZER = 'address' variable in InternalGithubBuildTest 105 sanitizer=self.SANITIZER, 135 """Test upload build (disabled).""" [all …]
|
| /external/oss-fuzz/docs/reference/ |
| D | glossary.md | 1 --- 7 --- 16 - TOC 18 --- 20 ## OSS-Fuzz specific terms 24 A scalable fuzzing infrastructure that is used for OSS-Fuzz backend. 28 [page]: {{ site.baseurl }}/further-reading/clusterfuzz 34 [general definition](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target), 35 in OSS-Fuzz a fuzz target can be used to 36 [reproduce bug reports]({{ site.baseurl }}/advanced-topics/reproducing/). [all …]
|
| /external/angle/build/config/sanitizers/ |
| D | sanitizers.gni | 2 # Use of this source code is governed by a BSD-style license that can be 13 # Compile for Address Sanitizer to find memory bugs. 16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs 21 # Compile for Leak Sanitizer to find leaks. 24 # Compile for Memory Sanitizer to find uninitialized reads. 27 # Compile for Thread Sanitizer to find threading bugs. 30 # Compile for Undefined Behaviour Sanitizer to find various types of 38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the 42 # Enables "param-retval" mode, which finds more uses of uninitialized data and 101 # Value for -fsanitize-coverage flag. Setting this causes [all …]
|
| /external/sandboxed-api/sandboxed_api/sandbox2/ |
| D | sanitizer_test.cc | 7 // https://www.apache.org/licenses/LICENSE-2.0 15 #include "sandboxed_api/sandbox2/sanitizer.h" 81 // Test that marking file descriptors as close-on-exec works. 82 TEST(SanitizerTest, TestMarkFDsAsCOE) { in TEST() function 83 // Open a few file descriptors in non-close-on-exec mode. in TEST() 85 ASSERT_THAT(socketpair(AF_UNIX, SOCK_STREAM, 0, sock_fd), Ne(-1)); in TEST() 86 ASSERT_THAT(open("/dev/full", O_RDONLY), Ne(-1)); in TEST() 88 ASSERT_THAT(null_fd, Ne(-1)); in TEST() 92 ASSERT_THAT(sanitizer::MarkAllFDsAsCOEExcept(keep), sapi::IsOk()); in TEST() 94 const std::string path = GetTestSourcePath("sandbox2/testcases/sanitizer"); in TEST() [all …]
|
| /external/cronet/testing/ |
| D | test_env.py | 3 # Use of this source code is governed by a BSD-style license that can be 6 """Sets environment variables needed to run a chromium unit test.""" 24 sanitizers = ['asan', 'lsan', 'msan', 'tsan', 'coverage-continuous-mode', 25 'skip-set-lpac-acls'] 26 internal_flags = frozenset('--%s=%d' % (name, value) 43 """Returns the environment flags needed for sanitizer tools.""" 47 # Instruct GTK to use malloc while running sanitizer-instrumented tests. 48 extra_env['G_SLICE'] = 'always-malloc' 54 # https://code.google.com/p/address-sanitizer/issues/detail?id=134 is fixed. 56 'third_party', 'llvm-build', 'Release+Asserts', 'bin', 'llvm-symbolizer') [all …]
|
| /external/mbedtls/programs/fuzz/ |
| D | README.md | 2 ------ 6 They are used with a so-called fuzz driver, which will generate inputs, try to process them with th… 8 These targets were meant to be used with oss-fuzz but can be used in other contexts. 13 ------ 15 To run the fuzz targets like oss-fuzz: 17 git clone https://github.com/google/oss-fuzz 18 cd oss-fuzz 20 python infra/helper.py build_fuzzers --sanitizer address mbedtls 23 You can use `undefined` sanitizer as well as `address` sanitizer. 26 To run the fuzz targets without oss-fuzz, you first need to install one libFuzzingEngine (libFuzzer… [all …]
|
| /external/openthread/third_party/mbedtls/repo/programs/fuzz/ |
| D | README.md | 2 ------ 6 They are used with a so-called fuzz driver, which will generate inputs, try to process them with th… 8 These targets were meant to be used with oss-fuzz but can be used in other contexts. 13 ------ 15 To run the fuzz targets like oss-fuzz: 17 git clone https://github.com/google/oss-fuzz 18 cd oss-fuzz 20 python infra/helper.py build_fuzzers --sanitizer address mbedtls 23 You can use `undefined` sanitizer as well as `address` sanitizer. 26 To run the fuzz targets without oss-fuzz, you first need to install one libFuzzingEngine (libFuzzer… [all …]
|
| /external/oss-fuzz/docs/getting-started/ |
| D | continuous_integration.md | 1 --- 6 permalink: /getting-started/continuous-integration/ 7 --- 11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets 21 input available for download and the CI test fails (red X). 23 If CIFuzz doesn't find a crash during the allotted time, the CI test passes 26 * The crash does not occur on older OSS-Fuzz builds. (If the crash does occur 30 If your project supports [OSS-Fuzz's code coverage]({{ site.baseurl }}/advanced-topics/code-coverag… 35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes 40 1. Your project must be integrated with OSS-Fuzz. [all …]
|
| /external/cronet/build/config/sanitizers/ |
| D | sanitizers.gni | 2 # Use of this source code is governed by a BSD-style license that can be 13 # Compile for Address Sanitizer to find memory bugs. 16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs 21 # Compile for Leak Sanitizer to find leaks. 24 # Compile for Memory Sanitizer to find uninitialized reads. 27 # Compile for Thread Sanitizer to find threading bugs. 30 # Compile for Undefined Behaviour Sanitizer to find various types of 38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the 89 # Value for -fsanitize-coverage flag. Setting this causes 92 # -fsanitize=fuzzer-no-link [all …]
|
| /external/cronet/testing/libfuzzer/ |
| D | reference.md | 3 ## Additional Sanitizer Configuration 7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not 11 run MSan-instrumented code in docker. 33 |---------|-------------| 34 |Linux ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer` | 35 |Linux ASan (x86) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux32 ASan' out/lib… 36 |Linux ASan Debug | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan Debug' out… 37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l… 38 |Linux UBSan[*](#UBSan)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux UBSan' out… 39 |Chrome OS ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/lib… [all …]
|
| /external/oss-fuzz/infra/build/functions/ |
| D | build_project.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 43 GCB_LOGS_BUCKET = 'oss-fuzz-gcb-logs' 66 class Build: # pylint: disable=too-few-public-methods 69 def __init__(self, fuzzing_engine, sanitizer, architecture): argument 71 self.sanitizer = sanitizer 74 self.sanitizer) 81 f'{self.fuzzing_engine}-{self.sanitizer}-{self.architecture}') 102 class Project: # pylint: disable=too-many-instance-attributes 103 """Class representing an OSS-Fuzz project.""" 125 for sanitizer in self._sanitizers: [all …]
|
| /external/compiler-rt/test/lsan/TestCases/ |
| D | recoverable_leak_check.cc | 1 // Test for on-demand leak checking. 3 // RUN: %clangxx_lsan %s -o %t 11 #include <sanitizer/lsan_interface.h> 20 fprintf(stderr, "Test alloc: %p.\n", malloc(1337)); in main() 21 // CHECK: Test alloc: in main() 24 // CHECK: SUMMARY: {{(Leak|Address)}}Sanitizer: 1337 byte in main() 26 // Test that we correctly reset chunk tags. in main() 29 // CHECK: SUMMARY: {{(Leak|Address)}}Sanitizer: 1360 byte in main()
|
| D | do_leak_check_override.cc | 1 // Test for __lsan_do_leak_check(). We test it by making the leak check run 5 // RUN: %clangxx_lsan %s -o %t 6 // RUN: LSAN_OPTIONS=$LSAN_BASE not %run %t 2>&1 | FileCheck --check-prefix=CHECK-strict %s 7 // RUN: LSAN_OPTIONS=$LSAN_BASE not %run %t foo 2>&1 | FileCheck --check-prefix=CHECK-normal %s 11 #include <sanitizer/lsan_interface.h> 30 printf("Test alloc: %p\n", p); in main() 31 printf("Test alloc in leaky global: %p\n", leaky_global.p); in main() 35 // CHECK-strict: SUMMARY: {{(Leak|Address)}}Sanitizer: 2003 byte(s) leaked in 2 allocation(s) 36 // CHECK-normal: SUMMARY: {{(Leak|Address)}}Sanitizer: 666 byte(s) leaked in 1 allocation(s)
|
| /external/llvm/test/Instrumentation/SanitizerCoverage/ |
| D | tracing.ll | 1 ; Test -sanitizer-coverage-experimental-tracing 2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | … 3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | … 4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S | FileCheck %s… 6 …alayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-… 7 target triple = "x86_64-unknown-linux-gnu" 21 ; CHECK1-LABEL: define void @foo 24 ; CHECK1-NOT: call void @__sanitizer_cov_trace_basic_block 27 ; CHECK3-LABEL: define void @foo 31 ; CHECK3-NOT: call void @__sanitizer_cov_trace_basic_block [all …]
|
| /external/rust/crates/hashlink/.circleci/ |
| D | config.yml | 6 - image: circleci/rust:latest 8 - checkout 9 - run: 13 rustup toolchain install nightly -c miri rust-src rustfmt 14 - run: 17 rustc --version 18 cargo --version 19 rustc +nightly --version 20 cargo +nightly --version 21 rustup --version [all …]
|
| /external/google-benchmark/.github/workflows/ |
| D | sanitizer.yml | 1 name: sanitizer 12 name: ${{ matrix.sanitizer }}.${{ matrix.build_type }} 13 runs-on: ubuntu-latest 15 fail-fast: false 18 sanitizer: ['asan', 'ubsan', 'tsan', 'msan'] 21 - uses: actions/checkout@v3 23 - name: configure msan env 24 if: matrix.sanitizer == 'msan' 26 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins… 29 - name: configure ubsan env [all …]
|
| /external/cronet/third_party/google_benchmark/src/.github/workflows/ |
| D | sanitizer.yml | 1 name: sanitizer 12 name: ${{ matrix.sanitizer }}.${{ matrix.build_type }}.${{ matrix.compiler }} 13 runs-on: ubuntu-latest 15 fail-fast: false 18 sanitizer: ['asan', 'ubsan', 'tsan'] 22 - uses: actions/checkout@v3 24 - name: configure msan env 25 if: matrix.sanitizer == 'msan' 27 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins… 30 - name: configure ubsan env [all …]
|
| /external/rust/crates/arc-swap/.github/workflows/ |
| D | test.yaml | 1 name: test 12 test: 13 name: Build & test 15 fail-fast: false 18 - ubuntu-latest 19 - macos-latest 20 - windows-latest 22 - stable 23 - beta 24 - nightly [all …]
|