Home
last modified time | relevance | path

Searched full:sanitizer (Results 1 – 25 of 1621) sorted by relevance

12345678910>>...65

/external/clang/include/clang/Basic/
DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
11 // enable. Users of this file must define the SANITIZER macro to make use of
17 #ifndef SANITIZER
18 #error "Define SANITIZER prior to including this file!"
21 // SANITIZER(NAME, ID)
23 // The first value is the name of the sanitizer as a string. The sanitizer can
27 // sanitizer.
32 // The first two values have the same semantics as the corresponding SANITIZER
42 SANITIZER("address", Address)
45 SANITIZER("kernel-address", KernelAddress)
[all …]
DSanitizers.h31 #define SANITIZER(NAME, ID) SO_##ID, macro
37 // Define the set of sanitizer kinds, as well as the set of sanitizers each
38 // sanitizer group expands into.
39 #define SANITIZER(NAME, ID) \ macro
49 /// \brief Check if a certain (single) sanitizer is enabled.
58 /// \brief Enable or disable a certain (single) sanitizer.
67 /// \brief Returns true if at least one sanitizer is enabled.
78 /// For each sanitizer group bit set in \p Kinds, set the bits for sanitizers
/external/jacoco/org.jacoco.core.test/src/org/jacoco/core/internal/flow/
DMethodSanitizerTest.java33 private MethodVisitor sanitizer; field in MethodSanitizerTest
39 sanitizer = new MethodSanitizer(actual, 0, "test", "()V", null, null); in setup()
46 sanitizer.visitCode(); in testLocalVariablePositive()
47 sanitizer.visitLabel(l1); in testLocalVariablePositive()
48 sanitizer.visitInsn(Opcodes.RETURN); in testLocalVariablePositive()
49 sanitizer.visitLabel(l2); in testLocalVariablePositive()
50 sanitizer.visitLocalVariable("x", "I", null, l1, l2, 0); in testLocalVariablePositive()
51 sanitizer.visitMaxs(0, 0); in testLocalVariablePositive()
52 sanitizer.visitEnd(); in testLocalVariablePositive()
70 sanitizer.visitCode(); in testLocalVariableNegative1()
[all …]
/external/compiler-rt/include/
DCMakeLists.txt2 sanitizer/allocator_interface.h
3 sanitizer/asan_interface.h
4 sanitizer/common_interface_defs.h
5 sanitizer/coverage_interface.h
6 sanitizer/dfsan_interface.h
7 sanitizer/esan_interface.h
8 sanitizer/linux_syscall_hooks.h
9 sanitizer/lsan_interface.h
10 sanitizer/msan_interface.h
11 sanitizer/tsan_interface_atomic.h)
[all …]
/external/llvm/test/Instrumentation/SanitizerCoverage/
Dcoverage.ll1 ; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | Fil…
5 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | Fil…
6 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | Fil…
7 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | Fil…
8 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
9 ; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s…
10 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileC…
[all …]
Dtracing.ll1 ; Test -sanitizer-coverage-experimental-tracing
2 ; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-experimental-tracing -S | …
3 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-experimental-tracing -S | …
4 ; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-trace-pc -S | FileCheck %s…
/external/libvpx/tools/
Dset_analyzer_env.sh10 ## sanitizer builds and testing.
12 sanitizer="${1}"
14 case "${sanitizer}" in
31 echo "Usage: source set_analyzer_env.sh [<sanitizer>|clear]"
45 if [ "${sanitizer}" = "undefined" -o "${sanitizer}" = "integer" ]; then
46 echo "WARNING: When building the ${sanitizer} sanitizer for 32 bit targets"
52 if [ "${sanitizer}" = "undefined" ]; then
68 cflags="-fsanitize=${sanitizer}"
69 ldflags="-fsanitize=${sanitizer}"
76 if [ "${sanitizer}" = "cfi" ]; then
[all …]
/external/pytorch/cmake/Modules/
DFindSanitizer.cmake4 # Sanitizer::address
5 # Sanitizer::thread
6 # Sanitizer::undefined
7 # Sanitizer::leak
8 # Sanitizer::memory
27 if(TARGET Sanitizer::${sanitizer_name})
75 add_library(Sanitizer::${sanitizer_name} INTERFACE IMPORTED GLOBAL)
77 Sanitizer::${sanitizer_name}
85 Sanitizer::${sanitizer_name}
92 Sanitizer::${sanitizer_name}
[all …]
/external/flac/.github/workflows/
Dcifuzz.yml14 sanitizer: [address, undefined, memory]
16 - name: Build Fuzzers (${{ matrix.sanitizer }})
22 sanitizer: ${{ matrix.sanitizer }}
23 - name: Run Fuzzers (${{ matrix.sanitizer }})
29 sanitizer: ${{ matrix.sanitizer }}
34 name: ${{ matrix.sanitizer }}-artifacts
/external/selinux/.github/workflows/
Dcifuzz.yml17 sanitizer: [address, undefined, memory]
19 - name: Build Fuzzers (${{ matrix.sanitizer }})
26 sanitizer: ${{ matrix.sanitizer }}
27 - name: Run Fuzzers (${{ matrix.sanitizer }})
34 sanitizer: ${{ matrix.sanitizer }}
39 name: ${{ matrix.sanitizer }}-artifacts
/external/libbpf/.github/workflows/
Dcifuzz.yml18 sanitizer: [address, undefined, memory]
20 - name: Build Fuzzers (${{ matrix.sanitizer }})
27 sanitizer: ${{ matrix.sanitizer }}
28 - name: Run Fuzzers (${{ matrix.sanitizer }})
34 sanitizer: ${{ matrix.sanitizer }}
39 name: ${{ matrix.sanitizer }}-artifacts
/external/jazzer-api/src/main/java/jaz/
DZer.java56 // A byte representing the relevant sanitizer for a given jaz.Zer instance. It is used to check
57 // whether the corresponding sanitizer is disabled and jaz.Zer will not report a finding in this
58 // case. Each sanitizer which relies on this class must set this byte accordingly. We choose a
59 // single byte to represent the sanitizer in order to keep the serialized version of jaz.Zer
64 private byte sanitizer = REFLECTIVE_CALL_SANITIZER_ID; field in Zer
79 public Zer(byte sanitizer) { in Zer() argument
80 this.sanitizer = sanitizer; in Zer()
84 // A special static method that is called by the expression language injection sanitizer. We
85 // choose a parameterless method to keep the string that the sanitizer guides the fuzzer to
94 if (isSanitizerEnabled(sanitizer)) { in reportFindingIfEnabled()
[all …]
/external/angle/build/config/sanitizers/
Dsanitizers.gni13 # Compile for Address Sanitizer to find memory bugs.
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
21 # Compile for Leak Sanitizer to find leaks.
24 # Compile for Memory Sanitizer to find uninitialized reads.
27 # Compile for Thread Sanitizer to find threading bugs.
30 # Compile for Undefined Behaviour Sanitizer to find various types of
111 # A sanitizer coverage allowlist, specifying exactly which
115 # When enabled, only relevant sanitizer defines are set, but compilation
138 # Compile for Undefined Behaviour Sanitizer's vptr checks.
159 # --fuzz= argument, which requires some sanitizer coverage.
[all …]
/external/google-benchmark/.github/workflows/
Dsanitizer.yml1 name: sanitizer
12 name: ${{ matrix.sanitizer }}.${{ matrix.build_type }}
18 sanitizer: ['asan', 'ubsan', 'tsan', 'msan']
24 if: matrix.sanitizer == 'msan'
30 if: matrix.sanitizer == 'ubsan'
36 if: matrix.sanitizer == 'asan'
42 if: matrix.sanitizer == 'tsan'
49 if: matrix.sanitizer == 'asan'
65 if: matrix.sanitizer != 'asan'
/external/jazzer-api/
DCHANGELOG.md11 * Feature: Added sanitizer for SQL injections
23 * Feature: Add sanitizer for context lookups
24 * Feature: Add sanitizer for OS command injection
25 * Feature: Add sanitizer for regex injection
26 * Feature: Add sanitizer for LDAP injections
27 * Feature: Add sanitizer for arbitrary class loading
52 * Feature: Add sanitizer for insecure deserialization
53 * Feature: Add sanitizer for arbitrary reflective calls
54 * Feature: Add sanitizer for expression language injection
/external/perfetto/gn/standalone/sanitizers/
Dvars.gni16 # Address Sanitizer: memory bugs (e.g., UAF).
19 # Leak Sanitizer: memory leaks.
22 # Memory Sanitizer: uninitialized reads.
25 # Thread Sanitizer: threading bugs.
28 # Undefined Behaviour Sanitizer.
34 # When enabled, only relevant sanitizer defines are set, but compilation
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/remote_build/
Dlinux.bazelrc40 # address sanitizer: most settings are already in %workspace%/.bazelrc
43 # use double the default value for "moderate" and "long" timeout as sanitizer
48 # memory sanitizer: most settings are already in %workspace%/.bazelrc
62 # thread sanitizer: most settings are already in %workspace%/.bazelrc
65 # use double the default value for "moderate" and "long" timeout as sanitizer
70 # undefined behavior sanitizer: most settings are already in %workspace%/.bazelrc
73 # use double the default value for "moderate" and "long" timeout as sanitizer
78 # TODO(jtattermusch): disable memory sanitizer for ubsan build as soon as possible.
/external/grpc-grpc/tools/remote_build/
Dlinux.bazelrc40 # address sanitizer: most settings are already in %workspace%/.bazelrc
43 # use double the default value for "moderate" and "long" timeout as sanitizer
48 # memory sanitizer: most settings are already in %workspace%/.bazelrc
62 # thread sanitizer: most settings are already in %workspace%/.bazelrc
65 # use double the default value for "moderate" and "long" timeout as sanitizer
70 # undefined behavior sanitizer: most settings are already in %workspace%/.bazelrc
73 # use double the default value for "moderate" and "long" timeout as sanitizer
78 # TODO(jtattermusch): disable memory sanitizer for ubsan build as soon as possible.
/external/pigweed/pw_toolchain/host_clang/
Dtoolchains.gni21 # Sets the sanitizer to pass to clang. Valid values are "address", "memory",
86 foreach(sanitizer, pw_toolchain_SANITIZERS) {
88 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
99 foreach(sanitizer, pw_toolchain_SANITIZERS) {
101 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
112 foreach(sanitizer, pw_toolchain_SANITIZERS) {
114 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
159 foreach(sanitizer, pw_toolchain_SANITIZERS) {
161 [ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
/external/cronet/tot/third_party/libc++/src/utils/libcxx/test/
Dparams.py314 help="An optional sanitizer to enable when building and running the test suite.",
315 actions=lambda sanitizer: filter(
318 AddFlag("-g -fno-omit-frame-pointer") if sanitizer else None,
320 …fined -fno-sanitize=float-divide-by-zero -fno-sanitize-recover=all") if sanitizer == "Undefined" e…
321 … if sanitizer == "Undefined" e…
323 AddFlag("-fsanitize=address") if sanitizer == "Address" else None,
324 AddFeature("asan") if sanitizer == "Address" else None,
326 AddFlag("-fsanitize=hwaddress") if sanitizer == "HWAddress" else None,
327 AddFeature("hwasan") if sanitizer == "HWAddress" else None,
329 …AddFlag("-fsanitize=memory") if sanitizer in ["Memory", "MemoryWithOrigins"] else No…
[all …]
/external/cronet/stable/third_party/libc++/src/utils/libcxx/test/
Dparams.py314 help="An optional sanitizer to enable when building and running the test suite.",
315 actions=lambda sanitizer: filter(
318 AddFlag("-g -fno-omit-frame-pointer") if sanitizer else None,
320 …fined -fno-sanitize=float-divide-by-zero -fno-sanitize-recover=all") if sanitizer == "Undefined" e…
321 … if sanitizer == "Undefined" e…
323 AddFlag("-fsanitize=address") if sanitizer == "Address" else None,
324 AddFeature("asan") if sanitizer == "Address" else None,
326 AddFlag("-fsanitize=hwaddress") if sanitizer == "HWAddress" else None,
327 AddFeature("hwasan") if sanitizer == "HWAddress" else None,
329 …AddFlag("-fsanitize=memory") if sanitizer in ["Memory", "MemoryWithOrigins"] else No…
[all …]
/external/sandboxed-api/sandboxed_api/sandbox2/
Dsanitizer.h15 // The sandbox2::sanitizer namespace provides functions which bring a process
26 namespace sanitizer {
44 // When running under a sanitizer, it may spawn a background threads. This is
48 // already notified the sanitizer. This function does nothing if not running
49 // under a sanitizer.
61 } // namespace sanitizer
/external/cronet/tot/testing/libfuzzer/
Dreference.md3 ## Additional Sanitizer Configuration
7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not
49 Linux is fully supported by libFuzzer and ClusterFuzz with following sanitizer
54 | is_asan=true | enables [Address Sanitizer] to catch problems like buffer overruns. |
55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan…
56 | is_ubsan_security=true | enables [Undefined Behavior Sanitizer] to catch undefined behavior like …
61 # With address sanitizer
192 [Address Sanitizer]: http://clang.llvm.org/docs/AddressSanitizer.html
193 [Memory Sanitizer]: http://clang.llvm.org/docs/MemorySanitizer.html
194 [Undefined Behavior Sanitizer]: http://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html
/external/cronet/stable/testing/libfuzzer/
Dreference.md3 ## Additional Sanitizer Configuration
7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not
49 Linux is fully supported by libFuzzer and ClusterFuzz with following sanitizer
54 | is_asan=true | enables [Address Sanitizer] to catch problems like buffer overruns. |
55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan…
56 | is_ubsan_security=true | enables [Undefined Behavior Sanitizer] to catch undefined behavior like …
61 # With address sanitizer
192 [Address Sanitizer]: http://clang.llvm.org/docs/AddressSanitizer.html
193 [Memory Sanitizer]: http://clang.llvm.org/docs/MemorySanitizer.html
194 [Undefined Behavior Sanitizer]: http://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/bytes-1.8.0/ci/
Dtsan.sh7 # Run address sanitizer
8 RUSTFLAGS="-Z sanitizer=address" \
11 # Run thread sanitizer
12 RUSTFLAGS="-Z sanitizer=thread" \

12345678910>>...65