Home
last modified time | relevance | path

Searched +full:sanitizer +full:- +full:test (Results 1 – 25 of 733) sorted by relevance

12345678910>>...30

/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/
DMethodSanitizerTest.java5 * http://www.eclipse.org/legal/epl-2.0
7 * SPDX-License-Identifier: EPL-2.0
10 * Marc R. Hoffmann - initial API and implementation
19 import org.junit.Test;
33 private MethodVisitor sanitizer; field in MethodSanitizerTest
37 actual = new MethodNode(0, "test", "()V", null, null); in setup()
38 expected = new MethodNode(0, "test", "()V", null, null); in setup()
39 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup()
42 @Test
46 sanitizer.visitCode(); in testLocalVariablePositive()
[all …]
/external/oss-fuzz/infra/build/functions/test_data/
Dexpected_build_steps.json5 "https://github.com/google/oss-fuzz.git",
6 "--depth",
9 "name": "gcr.io/cloud-builders/git"
12 "name": "gcr.io/cloud-builders/docker",
15 "-t",
16 "gcr.io/oss-fuzz/test-project",
19 "dir": "oss-fuzz/projects/test-project"
22 "name": "gcr.io/oss-fuzz/test-project",
25 "-c",
35 "name": "gcr.io/oss-fuzz/test-project",
[all …]
/external/cronet/third_party/libc++/src/utils/libcxx/test/
Dparams.py1 # ===----------------------------------------------------------------------===##
5 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 # ===----------------------------------------------------------------------===##
13 from libcxx.test.dsl import *
14 from libcxx.test.features import _isMSVC
18 "-Werror",
19 "-Wall",
20 "-Wctad-maybe-unsupported",
21 "-Wextra",
22 "-Wshadow",
[all …]
/external/rust/crates/bytemuck/.github/workflows/
Drust.yml11 test:
12 name: Test Rust ${{ matrix.rust }} on ${{ matrix.os }}
13 runs-on: ${{ matrix.os }}
17 # our `--feature` config here, but doing so will be very slow, as the
20 # versions (all on linux-x86_64)
21 - { rust: 1.34.0, os: ubuntu-latest }
22 - { rust: stable, os: ubuntu-latest }
23 - { rust: beta, os: ubuntu-latest }
24 - { rust: nightly, os: ubuntu-latest }
25 # non-linux platforms (ones which don't require `cross`)
[all …]
/external/zstd/.github/workflows/
Ddev-long-tests.yml1 name: dev-long-tests
5 group: long-${{ github.ref }}
6 cancel-in-progress: true
12 permissions: read-all
15 make-all:
16 runs-on: ubuntu-latest
18 - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # tag=v4.1.1
19 - name: make all
23 make-test:
24 runs-on: ubuntu-latest
[all …]
/external/rust/crates/bytes/ci/
Dtsan.sh3 set -ex
7 # Run address sanitizer
8 RUSTFLAGS="-Z sanitizer=address" \
9 cargo test --target x86_64-unknown-linux-gnu --test test_bytes --test test_buf --test test_buf_mut
11 # Run thread sanitizer
12 RUSTFLAGS="-Z sanitizer=thread" \
13 cargo -Zbuild-std test --target x86_64-unknown-linux-gnu --test test_bytes --test test_buf --test t…
/external/oss-fuzz/infra/cifuzz/
Dconfig_utils_test.py7 # http://www.apache.org/licenses/LICENSE-2.0
23 # pylint: disable=no-self-use,protected-access
49 # Test it is set when it is supposed to be.
50 os.environ['SANITIZER'] = 'coverage'
54 # Test it is not set when it is not supposed to be.
55 os.environ['SANITIZER'] = 'address'
72 os.environ['LANGUAGE'] = 'invalid-language'
83 os.environ['SANITIZER'] = 'invalid-sanitizer'
86 mock_error.assert_called_with('Invalid SANITIZER: %s. Must be one of: %s.',
87 os.environ['SANITIZER'],
[all …]
Dbuild_fuzzers_test.py7 # http://www.apache.org/licenses/LICENSE-2.0
24 # pylint: disable=wrong-import-position
35 # NOTE: This integration test relies on
36 # https://github.com/google/oss-fuzz/tree/master/projects/example project.
56 # pylint: disable=no-self-use,protected-access,too-few-public-methods,unused-argument
85 if element == env_var_arg and command[idx - 1] == '-e':
93 """Tests for building OSS-Fuzz projects on GitHub actions."""
95 SANITIZER = 'address' variable in InternalGithubBuildTest
105 sanitizer=self.SANITIZER,
135 """Test upload build (disabled)."""
[all …]
/external/oss-fuzz/docs/reference/
Dglossary.md1 ---
7 ---
16 - TOC
18 ---
20 ## OSS-Fuzz specific terms
24 A scalable fuzzing infrastructure that is used for OSS-Fuzz backend.
28 [page]: {{ site.baseurl }}/further-reading/clusterfuzz
34 [general definition](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target),
35 in OSS-Fuzz a fuzz target can be used to
36 [reproduce bug reports]({{ site.baseurl }}/advanced-topics/reproducing/).
[all …]
/external/angle/build/config/sanitizers/
Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
13 # Compile for Address Sanitizer to find memory bugs.
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
21 # Compile for Leak Sanitizer to find leaks.
24 # Compile for Memory Sanitizer to find uninitialized reads.
27 # Compile for Thread Sanitizer to find threading bugs.
30 # Compile for Undefined Behaviour Sanitizer to find various types of
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
42 # Enables "param-retval" mode, which finds more uses of uninitialized data and
101 # Value for -fsanitize-coverage flag. Setting this causes
[all …]
/external/sandboxed-api/sandboxed_api/sandbox2/
Dsanitizer_test.cc7 // https://www.apache.org/licenses/LICENSE-2.0
15 #include "sandboxed_api/sandbox2/sanitizer.h"
81 // Test that marking file descriptors as close-on-exec works.
82 TEST(SanitizerTest, TestMarkFDsAsCOE) { in TEST() function
83 // Open a few file descriptors in non-close-on-exec mode. in TEST()
85 ASSERT_THAT(socketpair(AF_UNIX, SOCK_STREAM, 0, sock_fd), Ne(-1)); in TEST()
86 ASSERT_THAT(open("/dev/full", O_RDONLY), Ne(-1)); in TEST()
88 ASSERT_THAT(null_fd, Ne(-1)); in TEST()
92 ASSERT_THAT(sanitizer::MarkAllFDsAsCOEExcept(keep), sapi::IsOk()); in TEST()
94 const std::string path = GetTestSourcePath("sandbox2/testcases/sanitizer"); in TEST()
[all …]
/external/cronet/testing/
Dtest_env.py3 # Use of this source code is governed by a BSD-style license that can be
6 """Sets environment variables needed to run a chromium unit test."""
24 sanitizers = ['asan', 'lsan', 'msan', 'tsan', 'coverage-continuous-mode',
25 'skip-set-lpac-acls']
26 internal_flags = frozenset('--%s=%d' % (name, value)
43 """Returns the environment flags needed for sanitizer tools."""
47 # Instruct GTK to use malloc while running sanitizer-instrumented tests.
48 extra_env['G_SLICE'] = 'always-malloc'
54 # https://code.google.com/p/address-sanitizer/issues/detail?id=134 is fixed.
56 'third_party', 'llvm-build', 'Release+Asserts', 'bin', 'llvm-symbolizer')
[all …]
/external/mbedtls/programs/fuzz/
DREADME.md2 ------
6 They are used with a so-called fuzz driver, which will generate inputs, try to process them with th…
8 These targets were meant to be used with oss-fuzz but can be used in other contexts.
13 ------
15 To run the fuzz targets like oss-fuzz:
17 git clone https://github.com/google/oss-fuzz
18 cd oss-fuzz
20 python infra/helper.py build_fuzzers --sanitizer address mbedtls
23 You can use `undefined` sanitizer as well as `address` sanitizer.
26 To run the fuzz targets without oss-fuzz, you first need to install one libFuzzingEngine (libFuzzer…
[all …]
/external/openthread/third_party/mbedtls/repo/programs/fuzz/
DREADME.md2 ------
6 They are used with a so-called fuzz driver, which will generate inputs, try to process them with th…
8 These targets were meant to be used with oss-fuzz but can be used in other contexts.
13 ------
15 To run the fuzz targets like oss-fuzz:
17 git clone https://github.com/google/oss-fuzz
18 cd oss-fuzz
20 python infra/helper.py build_fuzzers --sanitizer address mbedtls
23 You can use `undefined` sanitizer as well as `address` sanitizer.
26 To run the fuzz targets without oss-fuzz, you first need to install one libFuzzingEngine (libFuzzer…
[all …]
/external/oss-fuzz/docs/getting-started/
Dcontinuous_integration.md1 ---
6 permalink: /getting-started/continuous-integration/
7 ---
11 OSS-Fuzz offers **CIFuzz**, a GitHub action/CI job that runs your fuzz targets
21 input available for download and the CI test fails (red X).
23 If CIFuzz doesn't find a crash during the allotted time, the CI test passes
26 * The crash does not occur on older OSS-Fuzz builds. (If the crash does occur
30 If your project supports [OSS-Fuzz's code coverage]({{ site.baseurl }}/advanced-topics/code-coverag…
35 CIFuzz uses 30 day old/public regressions and corpora from OSS-Fuzz. This makes
40 1. Your project must be integrated with OSS-Fuzz.
[all …]
/external/cronet/build/config/sanitizers/
Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
13 # Compile for Address Sanitizer to find memory bugs.
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
21 # Compile for Leak Sanitizer to find leaks.
24 # Compile for Memory Sanitizer to find uninitialized reads.
27 # Compile for Thread Sanitizer to find threading bugs.
30 # Compile for Undefined Behaviour Sanitizer to find various types of
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
89 # Value for -fsanitize-coverage flag. Setting this causes
92 # -fsanitize=fuzzer-no-link
[all …]
/external/cronet/testing/libfuzzer/
Dreference.md3 ## Additional Sanitizer Configuration
7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not
11 run MSan-instrumented code in docker.
33 |---------|-------------|
34 |Linux ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer` |
35 |Linux ASan (x86) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux32 ASan' out/lib…
36 |Linux ASan Debug | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan Debug' out…
37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l…
38 |Linux UBSan[*](#UBSan)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux UBSan' out…
39 |Chrome OS ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/lib…
[all …]
/external/oss-fuzz/infra/build/functions/
Dbuild_project.py7 # http://www.apache.org/licenses/LICENSE-2.0
43 GCB_LOGS_BUCKET = 'oss-fuzz-gcb-logs'
66 class Build: # pylint: disable=too-few-public-methods
69 def __init__(self, fuzzing_engine, sanitizer, architecture): argument
71 self.sanitizer = sanitizer
74 self.sanitizer)
81 f'{self.fuzzing_engine}-{self.sanitizer}-{self.architecture}')
102 class Project: # pylint: disable=too-many-instance-attributes
103 """Class representing an OSS-Fuzz project."""
125 for sanitizer in self._sanitizers:
[all …]
/external/compiler-rt/test/lsan/TestCases/
Drecoverable_leak_check.cc1 // Test for on-demand leak checking.
3 // RUN: %clangxx_lsan %s -o %t
11 #include <sanitizer/lsan_interface.h>
20 fprintf(stderr, "Test alloc: %p.\n", malloc(1337)); in main()
21 // CHECK: Test alloc: in main()
24 // CHECK: SUMMARY: {{(Leak|Address)}}Sanitizer: 1337 byte in main()
26 // Test that we correctly reset chunk tags. in main()
29 // CHECK: SUMMARY: {{(Leak|Address)}}Sanitizer: 1360 byte in main()
Ddo_leak_check_override.cc1 // Test for __lsan_do_leak_check(). We test it by making the leak check run
5 // RUN: %clangxx_lsan %s -o %t
6 // RUN: LSAN_OPTIONS=$LSAN_BASE not %run %t 2>&1 | FileCheck --check-prefix=CHECK-strict %s
7 // RUN: LSAN_OPTIONS=$LSAN_BASE not %run %t foo 2>&1 | FileCheck --check-prefix=CHECK-normal %s
11 #include <sanitizer/lsan_interface.h>
30 printf("Test alloc: %p\n", p); in main()
31 printf("Test alloc in leaky global: %p\n", leaky_global.p); in main()
35 // CHECK-strict: SUMMARY: {{(Leak|Address)}}Sanitizer: 2003 byte(s) leaked in 2 allocation(s)
36 // CHECK-normal: SUMMARY: {{(Leak|Address)}}Sanitizer: 666 byte(s) leaked in 1 allocation(s)
/external/llvm/test/Instrumentation/SanitizerCoverage/
Dtracing.ll1 ; Test -sanitizer-coverage-experimental-tracing
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | …
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | …
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S | FileCheck %s…
6 …alayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-
7 target triple = "x86_64-unknown-linux-gnu"
21 ; CHECK1-LABEL: define void @foo
24 ; CHECK1-NOT: call void @__sanitizer_cov_trace_basic_block
27 ; CHECK3-LABEL: define void @foo
31 ; CHECK3-NOT: call void @__sanitizer_cov_trace_basic_block
[all …]
/external/rust/crates/hashlink/.circleci/
Dconfig.yml6 - image: circleci/rust:latest
8 - checkout
9 - run:
13 rustup toolchain install nightly -c miri rust-src rustfmt
14 - run:
17 rustc --version
18 cargo --version
19 rustc +nightly --version
20 cargo +nightly --version
21 rustup --version
[all …]
/external/google-benchmark/.github/workflows/
Dsanitizer.yml1 name: sanitizer
12 name: ${{ matrix.sanitizer }}.${{ matrix.build_type }}
13 runs-on: ubuntu-latest
15 fail-fast: false
18 sanitizer: ['asan', 'ubsan', 'tsan', 'msan']
21 - uses: actions/checkout@v3
23 - name: configure msan env
24 if: matrix.sanitizer == 'msan'
26 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins…
29 - name: configure ubsan env
[all …]
/external/cronet/third_party/google_benchmark/src/.github/workflows/
Dsanitizer.yml1 name: sanitizer
12 name: ${{ matrix.sanitizer }}.${{ matrix.build_type }}.${{ matrix.compiler }}
13 runs-on: ubuntu-latest
15 fail-fast: false
18 sanitizer: ['asan', 'ubsan', 'tsan']
22 - uses: actions/checkout@v3
24 - name: configure msan env
25 if: matrix.sanitizer == 'msan'
27 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins…
30 - name: configure ubsan env
[all …]
/external/rust/crates/arc-swap/.github/workflows/
Dtest.yaml1 name: test
12 test:
13 name: Build & test
15 fail-fast: false
18 - ubuntu-latest
19 - macos-latest
20 - windows-latest
22 - stable
23 - beta
24 - nightly
[all …]

12345678910>>...30