Searched +full:- +full:fsanitize (Results 1 – 25 of 179) sorted by relevance
12345678
/third_party/boost/libs/regex/test/de_fuzz/ |
D | Jamfile.v2 | 12 -dict=dictionary.txt -workers=3 corpus -runs=5000 13 : # test-files 15 <toolset>clang <cxxflags>-fsanitize-coverage=trace-pc-guard 16 <cxxflags>-fsanitize=address <cxxflags>-fsanitize=undefined 17 <cxxflags>-fno-sanitize-recover=undefined <cxxflags>-fno-optimize-sibling-calls 18 <cxxflags>-fno-omit-frame-pointer 20 <linkflags>-fsanitize=address <linkflags>-fsanitize=undefined 26 -dict=dictionary.txt -workers=3 corpus -runs=5000 27 : # test-files 29 <toolset>clang <cxxflags>-fsanitize-coverage=trace-pc-guard [all …]
|
/third_party/grpc/tools/ |
D | bazel.rc | 3 build --client_env=CC=clang 4 build --copt=-DGRPC_BAZEL_BUILD 5 build --action_env=GRPC_BAZEL_RUNTIME=1 6 build --define=use_fast_cpp_protos=true 8 build:opt --compilation_mode=opt 9 build:opt --copt=-Wframe-larger-than=16384 11 build:dbg --compilation_mode=dbg 13 build:windows_opt --compilation_mode=opt 14 build:windows_dbg --compilation_mode=dbg 16 build:asan --strip=never [all …]
|
/third_party/grpc/ |
D | build_handwritten.yaml | 8 '#04': not listed in doc/g_stands_for.md - and update that document to list the 11 '#07': Master always has a "-dev" suffix 12 '#08': Use "-preN" suffixes to identify pre-release versions 13 '#09': Per-language overrides are possible with (eg) ruby_version tag here 20 - name: check_epollexclusive 24 - test/build/check_epollexclusive.c 26 - grpc 27 - gpr 28 - name: gen_hpack_tables 32 - tools/codegen/core/gen_hpack_tables.cc [all …]
|
/third_party/nghttp2/fuzz/ |
D | README.rst | 5 nghttp2 into `oss-fuzz <https://github.com/google/oss-fuzz>`_. 10 The file name of initial data under corpus is the lower-cased hex 11 string of SHA-256 hash of its own content. 24 .. code-block:: text 26 CPPFLAGS="-fsanitize-coverage=edge -fsanitize=address" 27 LDFLAGS="-fsanitize-coverage=edge -fsanitize=address" 31 .. code-block:: text 33 … -fsanitize-coverage=edge -fsanitize=address -I../lib/includes -std=c++11 fuzz_target.cc ../lib/.l…
|
/third_party/grpc/third_party/upb/ |
D | .bazelrc | 1 # Use our custom-configured c++ toolchain. 3 build:m32 --copt=-m32 --linkopt=-m32 4 build:asan --copt=-fsanitize=address --linkopt=-fsanitize=address 5 build:valgrind --run_under='valgrind --leak-check=full --error-exitcode=1' 7 build:ubsan --copt=-fsanitize=undefined --linkopt=-fsanitize=undefined --action_env=UBSAN_OPTIONS=h… 9 # https://github.com/bazelbuild/bazel/issues/11122#issuecomment-613746748 10 build:ubsan --copt=-fno-sanitize=function --copt=-fno-sanitize=vptr 12 build:Werror --copt=-Werror 13 build:Werror --per_file_copt=json/parser@-Wno-error 14 build:Werror --per_file_copt=com_google_protobuf@-Wno-error [all …]
|
D | CMakeLists.txt | 17 # Prevent CMake from setting -rdynamic on Linux (!!). 31 CHECK_CXX_COMPILER_FLAG(-fdiagnostics-color=always SUPPORTS_COLOR_ALWAYS) 33 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fdiagnostics-color=always") 38 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address") 39 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address") 40 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fsanitize=address") 41 set(CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -fsanitize=address") 45 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=undefined") 46 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address") 47 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fsanitize=address") [all …]
|
/third_party/flutter/skia/third_party/externals/harfbuzz/.circleci/ |
D | config.yml | 5 macos-10.12.6-aat-fonts: 9 - checkout 10 …- run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget autoconf automake libtool pkg-config ragel free… 11 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo 12 - run: make -j4 13 - run: make check || .ci/fail.sh 15 macos-10.13.6-aat-fonts: 19 - checkout 20 …- run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget autoconf automake libtool pkg-config ragel free… 21 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo [all …]
|
/third_party/boost/libs/gil/test/ |
D | Jamfile | 1 # Boost.GIL (Generic Image Library) - tests 3 # Copyright (c) 2013-2017 Vinnie Falco (vinnie dot falco at gmail dot com) 4 # Copyright (c) 2018-2019 Mateusz Loskot <mateusz@loskot.net> 6 # Copyright (c) 2007-2015 Andrey Semashev 23 <toolset>msvc:<cxxflags>"-W4" 24 …toolset>gcc:<cxxflags>"-pedantic -Wextra -Wcast-align -Wconversion -Wfloat-equal -Wshadow -Wsign-p… 25 …ug:<cxxflags>"-pedantic -Wextra -Wcast-align -Wconversion -Wfloat-equal -Wshadow -Wsign-promo -Wst… 26 …se:<cxxflags>"-pedantic -Wextra -Wcast-align -Wconversion -Wfloat-equal -Wshadow -Wsign-promo -Wst… 27 …lset>darwin:<cxxflags>"-pedantic -Wextra -Wcast-align -Wconversion -Wfloat-equal -Wshadow -Wsign-p… 33 <toolset>msvc:<cxxflags>"-W1" [all …]
|
/third_party/boringssl/src/ |
D | CMakeLists.txt | 17 # This is a dummy target which all other targets depend on (manually - see other 23 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be 39 pkg_check_modules(LIBUNWIND libunwind-generic) 41 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 59 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME) 66 add_definitions(-DBORINGSSL_DISPATCH_TEST) 68 # command-line, but not add_definitions. 69 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_DISPATCH_TEST") 76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) [all …]
|
/third_party/boost/libs/stl_interfaces/ |
D | CMakeLists.txt | 15 message("-- Using -std=c++${CXX_STD}") 21 set(USE_ASAN false CACHE BOOL "Set to true to enable -fsanitize=address when building tests.") 22 set(USE_UBSAN false CACHE BOOL "Set to true to enable -fsanitize=undefined when building tests.") 26 set(compile_flags -fsanitize=address) 27 set(link_flags -fsanitize=address) 28 message("-- Using -fsanitize=address") 30 set(compile_flags -fsanitize=undefined) 31 set(link_flags -fsanitize=undefined) 32 message("-- Using -fsanitize=undefined") 42 message("-- Building for code coverage; disabling any sanitizers") [all …]
|
/third_party/grpc/third_party/upb/cmake/ |
D | CMakeLists.txt | 18 # Prevent CMake from setting -rdynamic on Linux (!!). 32 CHECK_CXX_COMPILER_FLAG(-fdiagnostics-color=always SUPPORTS_COLOR_ALWAYS) 34 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fdiagnostics-color=always") 39 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address") 40 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address") 41 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fsanitize=address") 42 set(CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -fsanitize=address") 46 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=undefined") 47 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address") 48 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fsanitize=address") [all …]
|
D | make_cmakelists.py | 3 """TODO(haberman): DO NOT SUBMIT without one-line documentation for make_cmakelists. 63 # Header-only library, have to do a couple things differently. 65 # http://mariobadr.com/creating-a-header-only-library-with-cmake.html 90 # COMMAND ${CMAKE_COMMAND} -E copy 221 # Prevent CMake from setting -rdynamic on Linux (!!). 235 CHECK_CXX_COMPILER_FLAG(-fdiagnostics-color=always SUPPORTS_COLOR_ALWAYS) 237 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fdiagnostics-color=always") 242 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address") 243 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address") 244 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fsanitize=address") [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/subzero/docs/ |
D | ASAN.rst | 4 AddressSanitizer is a powerful compile-time tool used to detect and report 7 <https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf>`_. 18 Furthermore, pnacl-clang automatically inlines some calls to calloc(), 20 sz-clang.py and sz-clang++.py, that normally just pass their arguments 21 through to pnacl-clang or pnacl-clang++, but add instrumentation to 23 -fsanitize-address. 27 sz-clang.py -fsanitize-address -o hello.nonfinal.pexe hello.c 28 pnacl-finalize --no-strip-syms -o hello.pexe hello.nonfinal.pexe 29 pnacl-sz -fsanitize-address -filetype=obj -o hello.o hello.pexe 31 The resulting object file must be linked with the Subzero-specific [all …]
|
/third_party/boost/libs/yap/ |
D | CMakeLists.txt | 14 COMPILE_DEFINITIONS ${std_flag} -DCHECK_CONSTEXPR_IF=1 24 COMPILE_DEFINITIONS ${std_flag} -DCHECK_CONSTEXPR_IF=0 27 message("-- Checking compiler flag ${std_flag} -- success") 31 set(constexpr_if_define -DBOOST_NO_CONSTEXPR_IF=0 PARENT_SCOPE) 32 message("-- Checking constexpr if support -- success") 34 set(constexpr_if_define -DBOOST_NO_CONSTEXPR_IF=1 PARENT_SCOPE) 35 message("-- Checking constexpr if support -- failed to compile") 38 message("-- Checking compiler flag ${std_flag} -- failed to compile") 42 try_std_flag(-std=c++17) 44 try_std_flag(-std=c++1z) [all …]
|
/third_party/libxml2/fuzz/ |
D | Makefile.am | 1 AUTOMAKE_OPTIONS = -Wno-syntax 7 AM_CPPFLAGS = -I$(top_srcdir)/include 26 .PHONY: tests corpus clean-corpus 34 clean-corpus: 35 rm -rf seed/html.stamp seed/html 36 rm -rf seed/schema.stamp seed/schema 37 rm -rf seed/xml.stamp seed/xml 38 rm -rf seed/xpath.stamp seed/xpath 47 @mkdir -p seed/xml 52 xml_LDFLAGS = -fsanitize=fuzzer [all …]
|
/third_party/boost/libs/histogram/ |
D | Jamfile | 2 # Copyright Klemens David Morgenstern, Hans P. Dembinski 2016-2017 11 # Test without exceptions and rtti: b2 cxxstd=latest exception-handling=off rtti=off test//minim… 18 <implicit-dependency>/boost//headers 20 <toolset>clang:<cxxflags>"-pedantic -Wextra -Wsign-compare -Wstrict-aliasing -fstrict-aliasing" 21 <toolset>gcc:<cxxflags>"-pedantic -Wextra -Wsign-compare -Wstrict-aliasing -fstrict-aliasing" 23 <toolset>intel-win:<cxxflags>"/bigobj" 24 : default-build 28 path-constant THIS_PATH : . ; 30 # only works with clang because of -fsanitize-blacklist 32 …<cxxflags>"-fno-omit-frame-pointer -O0 -fno-inline -fsanitize=address,leak,undefined -fno-sanitize… [all …]
|
/third_party/grpc/third_party/upb/tools/ |
D | make_cmakelists.py | 3 """TODO(haberman): DO NOT SUBMIT without one-line documentation for make_cmakelists. 63 # Header-only library, have to do a couple things differently. 65 # http://mariobadr.com/creating-a-header-only-library-with-cmake.html 90 # COMMAND ${CMAKE_COMMAND} -E copy 208 # Prevent CMake from setting -rdynamic on Linux (!!). 222 CHECK_CXX_COMPILER_FLAG(-fdiagnostics-color=always SUPPORTS_COLOR_ALWAYS) 224 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fdiagnostics-color=always") 229 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address") 230 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address") 231 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fsanitize=address") [all …]
|
/third_party/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_asan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [ -z ${ABSEIL_ROOT:-} ]; then 27 if [ -z ${STD:-} ]; then 31 if [ -z ${COMPILATION_MODE:-} ]; then 35 if [ -z ${EXCEPTIONS_MODE:-} ]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 39 readonly DOCKER_CONTAINER="gcr.io/google.com/absl-177019/linux_clang-latest:20200102" 43 if [ ${USE_BAZEL_CACHE:-0} -ne 0 ]; then [all …]
|
/third_party/mbedtls/ |
D | CMakeLists.txt | 8 option(USE_PKCS11_HELPER_LIBRARY "Build mbed TLS with the pkcs11-helper library." OFF) 27 # Warning string - created as a list for compatibility with CMake 2.8 40 set(CTR_DRBG_128_BIT_KEY_WARN_L2 "**** Using 128-bit keys for CTR_DRBG limits the security of gene… 41 …BIT_KEY_WARN_L3 "**** keys and operations that use random values generated to 128-bit security\n") 53 # If 128-bit keys are configured for CTR_DRBG, display an appropriate warning 54 …execute_process(COMMAND ${PERL_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/config.pl -f ${CMAK… 61 …execute_process(COMMAND ${PERL_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/config.pl -f ${CMAK… 73 To confirm you want to build with this option, re-run cmake with the \ 75 cmake -DUNSAFE_BUILD=ON ") 101 set(command ln -s ${target} ${link}) [all …]
|
/third_party/skia/third_party/externals/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_asan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC… [all …]
|
/third_party/libpsl/fuzz/ |
D | README.md | 4 be used to run on Google's OSS-Fuzz (https://github.com/google/oss-fuzz/). 9 Crash reproducers from OSS-Fuzz are put into $NAME.repro directory for 10 regression testing with top dir 'make check' or 'make check-valgrind'. 21 export CC=clang-5.0 22 …-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsaniti… 23 ./configure --enable-static --disable-gtk-doc --enable-runtime=libidn2 --enable-builtin=libidn2 25 make -j$(nproc) 29 ./run-clang.sh libpsl_fuzzer 38 $ CC=afl-clang-fast ./configure --disable-gtk-doc --enable-runtime=libidn2 --enable-builtin=libidn2 39 $ make -j$(nproc) clean all [all …]
|
/third_party/cJSON/ |
D | CMakeLists.txt | 23 -std=c89 24 -pedantic 25 -Wall 26 -Wextra 27 -Werror 28 -Wstrict-prototypes 29 -Wwrite-strings 30 -Wshadow 31 -Winit-self 32 -Wcast-align [all …]
|
/third_party/skia/third_party/externals/libpng/scripts/ |
D | travis.sh | 3 set -e 6 LOCAL_CMAKE_EXTRA_ARGS="-DCMAKE_C_FLAGS=-fsanitize=$ENABLE_SANITIZERS" 7 … LOCAL_MAKE_EXTRA_ARGS="CFLAGS=-fsanitize=$ENABLE_SANITIZERS LDFLAGS=-fsanitize=$ENABLE_SANITIZERS" 12 mkdir build-cmake 13 cd build-cmake 21 mkdir build-configure 22 cd build-configure 33 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS 34 [[ $DISABLE_TESTS ]] || make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS test 35 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS clean
|
/third_party/flutter/skia/third_party/externals/libpng/scripts/ |
D | travis.sh | 3 set -e 6 LOCAL_CMAKE_EXTRA_ARGS="-DCMAKE_C_FLAGS=-fsanitize=$ENABLE_SANITIZERS" 7 … LOCAL_MAKE_EXTRA_ARGS="CFLAGS=-fsanitize=$ENABLE_SANITIZERS LDFLAGS=-fsanitize=$ENABLE_SANITIZERS" 12 mkdir build-cmake 13 cd build-cmake 21 mkdir build-configure 22 cd build-configure 33 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS 34 [[ $DISABLE_TESTS ]] || make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS test 35 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS clean
|
/third_party/skia/third_party/externals/expat/expat/ |
D | qa.sh | 9 # Copyright (c) 2016-2021 Sebastian Pipping <sebastian@pipping.org> 33 set -e 34 set -o nounset 41 echo -e -n "${open}" >&2 42 echo -n "# $*" >&2 43 echo -e "${close}" >&2 51 echo -e -n "${open}" >&2 52 echo -n "WARNING: $*" >&2 53 echo -e "${close}" >&2 79 : ${BASE_COMPILE_FLAGS:="-pipe -Wall -Wextra -pedantic -Wno-overlength-strings -Wno-long-long"} [all …]
|
12345678