Home
last modified time | relevance | path

Searched +full:asan +full:- +full:trace +full:- +full:cmp (Results 1 – 25 of 97) sorted by relevance

1234

/aosp_15_r20/external/grpc-grpc/
H A Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
21 asan:
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
21 asan:
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
[all …]
/aosp_15_r20/external/cronet/build/config/sanitizers/
H A Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
42 # Enables "param-retval" mode, which finds more uses of uninitialized data and
95 # Value for -fsanitize-coverage flag. Setting this causes
98 # -fsanitize=fuzzer-no-link
100 # trace-pc-guard
102 # trace-pc-guard,indirect-calls
123 # can change the behaviour for the false case, and only build the non high-end
141 # --fuzz= argument, which requires some sanitizer coverage.
[all …]
/aosp_15_r20/external/angle/build/config/sanitizers/
H A Dsanitizers.gni2 # Use of this source code is governed by a BSD-style license that can be
16 # Compile for Hardware-Assisted Address Sanitizer to find memory bugs
38 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
42 # Enables "param-retval" mode, which finds more uses of uninitialized data and
101 # Value for -fsanitize-coverage flag. Setting this causes
104 # -fsanitize=fuzzer-no-link
106 # trace-pc-guard
108 # trace-pc-guard,indirect-calls
126 # can change the behaviour for the false case, and only build the non high-end
154 # --fuzz= argument, which requires some sanitizer coverage.
[all …]
/aosp_15_r20/external/AFLplusplus/docs/
H A DChangelog.md7 - afl-fuzz:
8 - default power schedule is now EXPLORE, due a fix in fast schedules
10 - fixed minor issues in the mutation engine, thanks to @futhewo for
12 - better deterministic fuzzing is now available, benchmarks have shown
13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR!
14 - afl-cc:
15 - large rewrite by @SonicStark which fixes a few corner cases, thanks!
16 - LTO mode now requires llvm 12+
17 - workaround for ASAN with gcc_plugin mode
18 - instrumentation:
[all …]
/aosp_15_r20/external/AFLplusplus/
H A DChangelog.md7 - afl-fuzz:
8 - default power schedule is now EXPLORE, due a fix in fast schedules
10 - fixed minor issues in the mutation engine, thanks to @futhewo for
12 - better deterministic fuzzing is now available, benchmarks have shown
13 to improve fuzzing. Enable with -D. Thanks to @kdsjZh for the PR!
14 - afl-cc:
15 - large rewrite by @SonicStark which fixes a few corner cases, thanks!
16 - LTO mode now requires llvm 12+
17 - workaround for ASAN with gcc_plugin mode
18 - instrumentation:
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/
Dbazel.rc3 # for platform-appropriate cxxopts
4 common --enable_platform_specific_config
6 build:windows --cxxopt='/std:c++14'
7 build:windows --host_cxxopt='/std:c++14'
8 build:linux --cxxopt='-std=c++14'
9 build:linux --host_cxxopt='-std=c++14'
10 build:macos --cxxopt='-std=c++14'
11 build:macos --host_cxxopt='-std=c++14'
12 build:freebsd --cxxopt='-std=c++14'
13 build:freebsd --host_cxxopt='-std=c++14'
[all …]
Dfuzztest.bazelrc9 # try-import %workspace%/fuzztest.bazelrc
16 # Compile and link with Address Sanitizer (ASAN).
17 build:fuzztest-common --linkopt=-fsanitize=address
18 build:fuzztest-common --copt=-fsanitize=address
20 # Standard define for "ifdef-ing" any fuzz test specific code.
21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
24 build:fuzztest-common --copt=-UNDEBUG
27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode
28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1
33 # Use with: --config=fuzztest
[all …]
/aosp_15_r20/external/grpc-grpc/tools/
H A Dbazel.rc5 common --enable_bzlmod=false
7 # for platform-appropriate cxxopts
8 common --enable_platform_specific_config
10 build:windows --cxxopt='/std:c++14'
11 build:windows --host_cxxopt='/std:c++14'
12 build:linux --cxxopt='-std=c++14'
13 build:linux --host_cxxopt='-std=c++14'
14 build:macos --cxxopt='-std=c++14'
15 build:macos --host_cxxopt='-std=c++14'
16 build:freebsd --cxxopt='-std=c++14'
[all …]
H A Dfuzztest.bazelrc9 # try-import %workspace%/fuzztest.bazelrc
16 # Compile and link with Address Sanitizer (ASAN).
17 build:fuzztest-common --linkopt=-fsanitize=address
18 build:fuzztest-common --copt=-fsanitize=address
20 # Standard define for "ifdef-ing" any fuzz test specific code.
21 build:fuzztest-common --copt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
24 build:fuzztest-common --copt=-UNDEBUG
27 # See https://libcxx.llvm.org/UsingLibcxx.html#enabling-the-safe-libc-mode
28 build:fuzztest-common --copt=-D_LIBCPP_ENABLE_ASSERTIONS=1
33 # Use with: --config=fuzztest
[all …]
/aosp_15_r20/external/grpc-grpc/tools/run_tests/generated/
H A Dconfigs.json3 "config": "asan",
10 "config": "asan-noleaks",
16 "config": "asan-trace-cmp",
23 "config": "c++-compat"
35 "--tool=helgrind"
45 "--tool=memcheck",
46 "--leak-check=full"
/aosp_15_r20/prebuilts/go/linux-x86/src/go/build/
Ddeps_test.go2 // Use of this source code is governed by a BSD-style
6 // some low-level packages do not have new dependencies added.
37 // All-caps names are pseudo-names for specific points
43 < cmp,
61 internal/trace/traceviewer/format,
71 # RUNTIME is the core runtime group of packages, all of them very light-weight.
95 < internal/asan
104 cmp, internal/race, math/bits
234 runtime/trace,
334 # that is low-enough level to be used by go/types.
[all …]
/aosp_15_r20/external/jazzer-api/docs/
H A Dadvanced.md3 * [Passing JVM arguments](#passing-jvm-arguments)
4 * [Coverage instrumentation](#coverage-instrumentation)
5 * [Trace instrumentation](#trace-instrumentation)
6 * [Value profile](#value-profile)
7 * [Custom hooks](#custom-hooks)
8 * [Suppressing stack traces](#suppressing-stack-traces)
9 * [Export coverage information](#export-coverage-information)
10 * [Native libraries](#native-libraries)
11 * [Fuzzing mutators](#fuzzing-mutators)
13 <!-- Created by https://github.com/ekalinin/github-markdown-toc -->
[all …]
/aosp_15_r20/art/test/
H A Dknownfailures.json3 "tests": "626-checker-arm64-scratch-register",
4 "description": ["Disable 626-checker until we assses whether to keep it"]
7 "tests": "132-daemon-locks-shutdown",
8 …on": ["This test seems to fail occasionally on redefine-stress for unknown reasons without stack-t…
9 "variant": "redefine-stress",
13 "tests": "579-inline-infinite",
14 "description": ["This test seems to fail often on redefine-stress for unknown reasons"],
15 "variant": "redefine-stress",
19 "tests": "080-oom-fragmentation",
20 "description": ["Disable 080-oom-fragmentation for CC collector in debug mode",
[all …]
/aosp_15_r20/external/jazzer-api/src/main/java/com/code_intelligence/jazzer/driver/
H A DOpt.java8 * http://www.apache.org/licenses/LICENSE-2.0
42 * <p>Each option corresponds to a command-line argument of the driver of the same name.
69 "asan", false, "Allow fuzzing of native libraries compiled with '-fsanitize=address'");
71 "ubsan", false, "Allow fuzzing of native libraries compiled with '-fsanitize=undefined'");
73 …"Allow fuzzing of native libraries compiled with '-fsanitize=fuzzer' (implied by --asan and --ubsa…
81 "Fully qualified reference (optionally with a Javadoc-style signature) to a "
87 "Path to write a JaCoCo .exec file to when the fuzzer exits (if non-empty)");
89 "Path to write a human-readable coverage report to when the fuzzer exits (if non-empty)");
93 "Names of classes from which hooks (custom or built-in) should not be loaded from");
95 "dump_classes_dir", "", "Directory to dump instrumented .class files into (if non-empty)");
[all …]
/aosp_15_r20/external/compiler-rt/lib/asan/
H A Dasan_report.cc1 //===-- asan_report.cc ----------------------------------------------------===//
8 //===----------------------------------------------------------------------===//
13 //===----------------------------------------------------------------------===//
30 // -------------------- User-specified callbacks ----------------- {{{1
60 uptr remaining = kErrorMessageBufferSize - error_message_buffer_pos; in AppendToErrorMessageBuffer()
63 error_message_buffer[kErrorMessageBufferSize - 1] = '\0'; in AppendToErrorMessageBuffer()
68 // ---------------------- Decorator ------------------------------ {{{1
118 // ---------------------- Helper functions ----------------------- {{{1
123 str->append("%s%s%x%x%s%s", before, in PrintMemoryByte()
137 if (before) str->append("%s%p:", before, bytes); in PrintShadowBytes()
[all …]
/aosp_15_r20/external/clang/docs/
H A DSanitizerCoverage.rst12 get function-level, basic-block-level, and edge-level coverage at a very low
21 following compile-time flags:
23 * ``-fsanitize-coverage=func`` for function-level coverage (very fast).
24 * ``-fsanitize-coverage=bb`` for basic-block-level coverage (may add up to 30%
26 * ``-fsanitize-coverage=edge`` for edge-level coverage (up to 40% slowdown).
28 You may also specify ``-fsanitize-coverage=indirect-calls`` for
29 additional `caller-callee coverage`_.
35 To get `Coverage counters`_, add ``-fsanitize-coverage=8bit-counters``
36 to one of the above compile-time flags. At runtime, use
41 .. code-block:: console
[all …]
/aosp_15_r20/external/clang/lib/Driver/
H A DSanitizerArgs.cpp1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
8 //===----------------------------------------------------------------------===//
56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
68 /// would produce "-fsanitize=vptr".
75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
76 /// "-fsanitize=alignment".
80 /// Produce a string containing comma-separated names of sanitizers in \p
129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs()
[all …]
/aosp_15_r20/external/zstd/tests/fuzz/
H A Dfuzz.py7 # This source code is licensed under both the BSD-style license (found in the
10 # You may select, at your option, one of the above-listed licenses.
79 CFLAGS = os.environ.get('CFLAGS', '-O3')
82 MFLAGS = os.environ.get('MFLAGS', '-j')
87 AFL_FUZZ = os.environ.get('AFL_FUZZ', 'afl-fuzz')
155 san_flags = ','.join(re.findall('-fsanitize=((?:[a-z]+,?)+)', flags))
156 nosan_flags = ','.join(re.findall('-fno-sanitize=((?:[a-z]+,?)+)', flags))
160 raise RuntimeError('-fno-sanitize={s} and -fsanitize={s} passed'.
171 args.asan = set_sanitizer('address', args.asan, san, nosan)
175 args.sanitize = args.asan or args.msan or args.ubsan
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-3289846/lib64/clang/3.8/lib/linux/
Dlibclang_rt.asan-i686-android.so ... __cxa_finalize LIBC libc.so libclang_rt.asan-i686-android.so __cxa_atexit __stack_chk_fail _ZN11__sanitizer11CheckFailedEPKciS1_yy pthread_once __sanitizer_free_hook __sanitizer_get_allocated_size __sanitizer_get_estimated_allocated_size ...
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r530567/prebuilt_include/llvm/lib/Fuzzer/
DFuzzerFlags.def1 //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 //===----------------------------------------------------------------------===//
14 FUZZER_FLAG_INT(runs, -1,
15 "Number of individual test runs (-1 for infinite runs).")
23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
25 "the name of a file containing the comma-separated list.")
61 FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group "
63 "and each sub-process will randomly select seeds from different "
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/libfuzzer-sys/libfuzzer/
DFuzzerFlags.def1 //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 //===----------------------------------------------------------------------===//
14 FUZZER_FLAG_INT(runs, -1,
15 "Number of individual test runs (-1 for infinite runs).")
23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
25 "the name of a file containing the comma-separated list.")
61 FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group "
63 "and each sub-process will randomly select seeds from different "
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r522817/prebuilt_include/llvm/lib/Fuzzer/
DFuzzerFlags.def1 //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 //===----------------------------------------------------------------------===//
14 FUZZER_FLAG_INT(runs, -1,
15 "Number of individual test runs (-1 for infinite runs).")
23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
25 "the name of a file containing the comma-separated list.")
61 FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group "
63 "and each sub-process will randomly select seeds from different "
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r536225/prebuilt_include/llvm/lib/Fuzzer/
DFuzzerFlags.def1 //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 //===----------------------------------------------------------------------===//
14 FUZZER_FLAG_INT(runs, -1,
15 "Number of individual test runs (-1 for infinite runs).")
23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
25 "the name of a file containing the comma-separated list.")
61 FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group "
63 "and each sub-process will randomly select seeds from different "
[all …]
/aosp_15_r20/prebuilts/clang/host/linux-x86/clang-r530567b/prebuilt_include/llvm/lib/Fuzzer/
DFuzzerFlags.def1 //===- FuzzerFlags.def - Run-time flags -------------------------*- C++ -* ===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 //===----------------------------------------------------------------------===//
14 FUZZER_FLAG_INT(runs, -1,
15 "Number of individual test runs (-1 for infinite runs).")
23 FUZZER_FLAG_STRING(seed_inputs, "A comma-separated list of input files "
25 "the name of a file containing the comma-separated list.")
61 FUZZER_FLAG_INT(fork_corpus_groups, 0, "For fork mode, enable the corpus-group "
63 "and each sub-process will randomly select seeds from different "
[all …]

1234