/external/clang/test/Modules/ |
D | crash-vfs-path-traversal.m | 1 // REQUIRES: crash-recovery, shell, non-ms-sdk, non-ps4-sdk 5 // FIXME: This XFAIL is cargo-culted from crash-report.c. Do we need it? 12 // RUN: %clang -fsyntax-only %s -I %S/Inputs/crash-recovery -isysroot %/t/i/ \ 15 // RUN: FileCheck --check-prefix=CHECKSRC %s -input-file %t/crash-vfs-*.m 16 // RUN: FileCheck --check-prefix=CHECKSH %s -input-file %t/crash-vfs-*.sh 18 // RUN: %t/crash-vfs-*.cache/vfs/vfs.yaml 19 // RUN: find %t/crash-vfs-*.cache/vfs | \ 20 // RUN: grep "Inputs/crash-recovery/usr/include/stdio.h" | count 1 36 // CHECKSH: "crash-vfs-{{[^ ]*}}.m" 37 // CHECKSH: "-ivfsoverlay" "crash-vfs-{{[^ ]*}}.cache/vfs/vfs.yaml" [all …]
|
D | crash-vfs-relative-overlay.m | 1 // REQUIRES: crash-recovery, shell 3 // FIXME: This XFAIL is cargo-culted from crash-report.c. Do we need it? 11 // RUN: -I %S/Inputs/crash-recovery/usr/include -isysroot %/t/i/ \ 14 // RUN: FileCheck --check-prefix=CHECKSRC %s -input-file %t/crash-vfs-*.m 15 // RUN: FileCheck --check-prefix=CHECKSH %s -input-file %t/crash-vfs-*.sh 17 // RUN: %t/crash-vfs-*.cache/vfs/vfs.yaml 18 // RUN: find %t/crash-vfs-*.cache/vfs | \ 19 // RUN: grep "Inputs/crash-recovery/usr/include/stdio.h" | count 1 35 // CHECKSH: "crash-vfs-{{[^ ]*}}.m" 36 // CHECKSH: "-ivfsoverlay" "crash-vfs-{{[^ ]*}}.cache/vfs/vfs.yaml" [all …]
|
D | crash-vfs-run-reproducer.m | 1 // REQUIRES: crash-recovery, shell, system-darwin 8 // RUN: -I %S/Inputs/crash-recovery/usr/include -isysroot %/t/i/ \ 11 // RUN: FileCheck --check-prefix=CHECKSRC %s -input-file %t/crash-vfs-*.m 12 // RUN: FileCheck --check-prefix=CHECKSH %s -input-file %t/crash-vfs-*.sh 14 // RUN: %t/crash-vfs-*.cache/vfs/vfs.yaml 15 // RUN: find %t/crash-vfs-*.cache/vfs | \ 16 // RUN: grep "Inputs/crash-recovery/usr/include/stdio.h" | count 1 32 // CHECKSH: "crash-vfs-{{[^ ]*}}.m" 33 // CHECKSH: "-ivfsoverlay" "crash-vfs-{{[^ ]*}}.cache/vfs/vfs.yaml" 34 // CHECKSH: "-fmodules-cache-path=crash-vfs-{{[^ ]*}}.cache/modules" [all …]
|
D | crash-vfs-path-emptydir-entries.m | 1 // REQUIRES: crash-recovery, shell 3 // FIXME: This XFAIL is cargo-culted from crash-report.c. Do we need it? 7 // crash reproducer if there's a symbolic link header file used in a module. 11 // RUN: cp -a %S/Inputs/crash-recovery/usr %t/i/ 17 // RUN: FileCheck --check-prefix=CHECKSRC %s -input-file %t/crash-vfs-*.m 18 // RUN: FileCheck --check-prefix=CHECKSH %s -input-file %t/crash-vfs-*.sh 20 // RUN: %t/crash-vfs-*.cache/vfs/vfs.yaml 21 // RUN: find %t/crash-vfs-*.cache/vfs | \ 38 // CHECKSH: "crash-vfs-{{[^ ]*}}.m" 39 // CHECKSH: "-ivfsoverlay" "crash-vfs-{{[^ ]*}}.cache/vfs/vfs.yaml" [all …]
|
D | crash-vfs-path-symlink-topheader.m | 1 // REQUIRES: crash-recovery, shell 3 // FIXME: This XFAIL is cargo-culted from crash-report.c. Do we need it? 7 // crash reproducer if there's a symbolic link header file used in a module. 11 // RUN: cp -a %S/Inputs/crash-recovery/usr %t/i/ 19 // RUN: FileCheck --check-prefix=CHECKSRC %s -input-file %t/crash-vfs-*.m 20 // RUN: FileCheck --check-prefix=CHECKSH %s -input-file %t/crash-vfs-*.sh 22 // RUN: %t/crash-vfs-*.cache/vfs/vfs.yaml 23 // RUN: find %t/crash-vfs-*.cache/vfs | \ 40 // CHECKSH: "crash-vfs-{{[^ ]*}}.m" 41 // CHECKSH: "-ivfsoverlay" "crash-vfs-{{[^ ]*}}.cache/vfs/vfs.yaml" [all …]
|
D | crash-vfs-path-symlink-component.m | 1 // REQUIRES: crash-recovery, shell 3 // FIXME: This XFAIL is cargo-culted from crash-report.c. Do we need it? 7 // crash reproducer if there's a symbolic link component in the path. 11 // RUN: cp -a %S/Inputs/crash-recovery/usr %t/i/ 18 // RUN: FileCheck --check-prefix=CHECKSRC %s -input-file %t/crash-vfs-*.m 19 // RUN: FileCheck --check-prefix=CHECKSH %s -input-file %t/crash-vfs-*.sh 21 // RUN: %t/crash-vfs-*.cache/vfs/vfs.yaml 22 // RUN: find %t/crash-vfs-*.cache/vfs | \ 39 // CHECKSH: "crash-vfs-{{[^ ]*}}.m" 40 // CHECKSH: "-ivfsoverlay" "crash-vfs-{{[^ ]*}}.cache/vfs/vfs.yaml" [all …]
|
D | signal.m | 1 // REQUIRES: crash-recovery,shell 5 // RUN: not --crash %clang_cc1 -fmodules -fimplicit-module-maps -fmodules-cache-path=%t -I%S/Inputs… 8 // RUN: find %t -name "crash-*.pcm.lock" | count 1 9 // RUN: find %t -name "crash-*.pcm.lock-*" | count 0 11 @import crash;
|
D | crash-vfs-umbrella-frameworks.m | 1 // REQUIRES: crash-recovery, shell 3 // FIXME: This XFAIL is cargo-culted from crash-report.c. Do we need it? 8 // RUN: cp -a %S/Inputs/crash-recovery/Frameworks %t/i/ 18 // RUN: %t/crash-vfs-*.cache/vfs/vfs.yaml 19 // RUN: find %t/crash-vfs-*.cache/vfs | \ 53 // RUN: rm -rf crash-vfs-umbrella-*.cache/modules/* 54 // RUN: chmod 755 crash-vfs-*.sh 55 // RUN: ./crash-vfs-*.sh
|
/external/syzkaller/syz-manager/ |
D | manager.go | 291 crash *Crash member 331 for crash := range pendingRepro { 332 if reproducing[crash.Title] { 335 delete(pendingRepro, crash) 336 if !mgr.needRepro(crash) { 339 log.Logf(1, "loop: add to repro queue '%v'", crash.Title) 340 reproducing[crash.Title] = true 341 reproQueue = append(reproQueue, crash) 356 crash := reproQueue[last] 363 log.Logf(1, "loop: starting repro of '%v' on instances %+v", crash.Title, vmIndexes) [all …]
|
/external/syzkaller/dashboard/app/ |
D | access_test.go | 76 crash, _, err := findCrashForBug(c.ctx, bug) 99 ref: fmt.Sprint(crash.Log), 100 url: fmt.Sprintf("/text?tag=CrashLog&id=%v", crash.Log), 104 ref: fmt.Sprint(crash.Log), 106 strconv.FormatUint(uint64(crash.Log), 16)), 110 ref: fmt.Sprint(crash.Report), 111 url: fmt.Sprintf("/text?tag=CrashReport&id=%v", crash.Report), 115 ref: fmt.Sprint(crash.Report), 117 strconv.FormatUint(uint64(crash.Report), 16)), 121 ref: fmt.Sprint(crash.ReproC), [all …]
|
D | email_test.go | 23 crash := testCrash(build, 1) 24 crash.Maintainers = []string{`"Foo Bar" <foo@bar.com>`, `bar@foo.com`} 25 c.client2.ReportCrash(crash) 46 c.expectEQ(msg.Subject, crash.Title) 50 syzbot found the following crash on: 60 Unfortunately, I don't have any reproducer for this crash yet. 78 c.checkURLContents(crashLogLink, crash.Log) 119 crash.ReproOpts = []byte("repro opts") 120 crash.ReproSyz = []byte("getpid()") 121 syzRepro := []byte(fmt.Sprintf("%s#%s\n%s", syzReproPrefix, crash.ReproOpts, crash.ReproSyz)) [all …]
|
D | app_test.go | 208 crash := testCrash(build, id) 209 crash.ReproOpts = []byte(fmt.Sprintf("repro opts %v", id)) 210 crash.ReproSyz = []byte(fmt.Sprintf("syncfs(%v)", id)) 211 crash.ReproC = []byte(fmt.Sprintf("int main() { return %v; }", id)) 212 return crash 215 func testCrashID(crash *dashapi.Crash) *dashapi.CrashID { 217 BuildID: crash.BuildID, 218 Title: crash.Title, 254 crash := testCrash(build, 3) 255 crash.Log = []byte(fmt.Sprintf("log%v", i)) [all …]
|
D | jobs_test.go | 32 crash := testCrash(build, 1) 33 crash.Maintainers = []string{"maintainer@kernel.org"} 34 c.client2.ReportCrash(crash) 57 crash.ReproOpts = []byte("repro opts") 58 crash.ReproSyz = []byte("repro syz") 59 crash.ReproC = []byte("repro C") 60 c.client2.ReportCrash(crash) 137 c.expectEQ(msg.Subject, "Re: "+crash.Title) 141 syzbot has tested the proposed patch but the reproducer still triggered crash: 142 test crash title [all …]
|
D | reporting.go | 72 reporting, bugReporting, crash, crashKey, _, _, _, err := needReport(c, typ, state, bug) 76 rep, err := createBugReport(c, bug, crash, crashKey, bugReporting, reporting.Config) 85 reporting *Reporting, bugReporting *BugReporting, crash *Crash, 122 crash, crashKey, err = findCrashForBug(c, bug) 128 if reporting.Config.NeedMaintainers() && len(crash.Maintainers) == 0 { 193 func createBugReport(c context.Context, bug *Bug, crash *Crash, crashKey *datastore.Key, 199 crashLog, _, err := getText(c, textCrashLog, crash.Log) 206 report, _, err := getText(c, textCrashReport, crash.Report) 213 reproC, _, err := getText(c, textReproC, crash.ReproC) 217 reproSyz, _, err := getText(c, textReproSyz, crash.ReproSyz) [all …]
|
D | jobs.go | 79 crash, crashKey, err := findCrashForBug(c, bug) 83 if reason := checkTestJob(c, bug, bugReporting, crash, repo, branch); reason != "" { 87 manager := crash.Manager 166 func checkTestJob(c context.Context, bug *Bug, bugReporting *BugReporting, crash *Crash, 169 case crash.ReproC == 0 && crash.ReproSyz == 0: 175 case crash.ReproC == 0 && crash.ReproSyz == 0: 202 crash := new(Crash) 203 if err := datastore.Get(c, crashKey, crash); err != nil { 207 build, err := loadBuild(c, job.Namespace, crash.BuildID) 216 reproC, _, err := getText(c, textReproC, crash.ReproC) [all …]
|
D | access.go | 82 crash, err := checkCrashTextAccess(c, r, "Log", id) 84 return crash, err 88 crash, err := checkCrashTextAccess(c, r, "Report", id) 90 return crash, err 112 crash := crashes[0] 118 return crash, checkAccessLevel(c, r, bugLevel)
|
/external/syzkaller/docs/ |
D | reproducing_crashes.md | 5 …efore a crash. In parallel execution mode (when `procs` parameter in manager config is set to valu… 6 The are two tools that can help you identify and minimize the program that causes a crash: `tools/s… 8 …crash log in a loop to check that at least one of them indeed crashes kernel: `./syz-execprog -exe… 12 Once you have a single program that causes the crash, try to minimize it by removing individual sys… 14 Now that you have a minimized program, check if the crash still reproduces with `./syz-execprog -th… 16 …ou executable C source. If the crash reproduces with -threaded/collide=0 flags, then this C progra… 18 If the crash id not reproducible with -threaded/collide=0 flags, then you need this last step. You … 20 …degree in the `syz-repro` utility. You need to give it your manager config and a crash report file: 22 ./syz-repro -config my.cfg crash-qemu-1-1455745459265726910
|
D | usage.md | 16 …ce syzkaller detected a kernel crash in one of the VMs, it will automatically start the process of… 17 By default it will use 4 VMs to reproduce the crash and then minimize the program that caused it. 20 The process of reproducing one crash may take from a few minutes up to an hour depending on whether… 21 Since this process is not perfect, there's a way to try to manually reproduce the crash, as describ… 25 … there's [a way to execute them](reproducing_crashes.md) to reproduce and debug the crash manually.
|
D | internals.md | 14 It is responsible for persistent corpus and crash storage. 32 The directory contains one subdirectory per unique crash type. 33 Each subdirectory contains a `description` file with a unique string identifying the crash (intende… 34 and up to 100 `logN` and `reportN` files, one pair per test machine crash: 54 …w `syzkaller` logs and include kernel console output as well as programs executed before the crash. 55 These logs can be fed to `syz-repro` tool for [crash location and minimization](reproducing_crashes… 57 `reportN` files contain post-processed and symbolized kernel crash reports (e.g. a KASAN report). 59 …p to 100 of them for the case when the crash is poorly reproducible, or if you just want to look a…
|
/external/perfetto/tools/ |
D | run_all_fuzzers | 32 for crash in $(ls fuzz_out/$fuzzer/artifacts/crash-* 2> /dev/null); do 33 if "$OUTDIR/$fuzzer" "$crash"; then 34 rm $crash; 36 echo "$crash still exists"
|
/external/clang/test/Driver/ |
D | crash-report-modules.m | 8 // RUN: FileCheck --check-prefix=CHECKSRC %s -input-file %t/crash-report-*.m 9 // RUN: FileCheck --check-prefix=CHECKSH %s -input-file %t/crash-report-*.sh 10 // REQUIRES: crash-recovery 15 // FIXME: This XFAIL is cargo-culted from crash-report.c. Do we need it? 36 // CHECKSH: "crash-report-modules-{{[^ ]*}}.m" 37 // CHECKSH: "-ivfsoverlay" "crash-report-modules-{{[^ ]*}}.cache/vfs/vfs.yaml"
|
/external/clang/test/Index/ |
D | crash-recovery-modules.m | 4 // Parse the file, such that building the module will cause Clang to crash. 7 // CHECK-CRASH: crash-recovery-modules.m:16:9:{16:2-16:14}: fatal error: could not build module 'Cr… 13 // REQUIRES: crash-recovery 19 #pragma clang __debug crash 28 // Check that libclang crash-recovery works; both with a module building crash... 34 // CHECK-LIBCLANG-CRASH: libclang: crash detected during parsing
|
/external/syzkaller/prog/ |
D | minimization.go | 14 func Minimize(p0 *Prog, callIndex0 int, crash bool, pred0 func(*Prog, int) bool) (*Prog, int) { 31 p0, callIndex0 = removeCalls(p0, callIndex0, crash, pred) 39 crash: crash, 62 func removeCalls(p0 *Prog, callIndex0 int, crash bool, pred func(*Prog, int) bool) (*Prog, int) { 88 crash bool member 138 if !ctx.crash && !ctx.triedPaths[elemPath] && 173 if ctx.crash { 192 if ctx.crash { 229 if ctx.crash {
|
/external/clang/test/CodeGenObjC/ |
D | class-getter-dotsyntax.m | 4 + (Test *)crash; class 15 Test *crash = Test.crash; 18 + (Test *)crash{ return 0; } class
|
/external/autotest/client/site_tests/logging_CrashSender/ |
D | control | 7 PURPOSE = "Verify crash sender works." 10 - crash log messages are incorrect 11 - crash is sent without user consent 21 Test that crash sender works correctly.
|