Home
last modified time | relevance | path

Searched +full:- +full:fsanitize (Results 1 – 25 of 185) sorted by relevance

12345678

/third_party/musl/ndk-test/sanitize/ubsan/src/
Dshift.cpp1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %…
2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru…
3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %…
4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %…
5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run …
6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run …
7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %…
8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run …
9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run …
10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run …
[all …]
Dalignment-assumption-attribute-align_value-on-lvalue.cpp1-x c -fsanitize=alignment -O0 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
2-x c -fsanitize=alignment -O1 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
3-x c -fsanitize=alignment -O2 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
4-x c -fsanitize=alignment -O3 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
6-x c++ -fsanitize=alignment -O0 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
7-x c++ -fsanitize=alignment -O1 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
8-x c++ -fsanitize=alignment -O2 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
9-x c++ -fsanitize=alignment -O3 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass…
20 return x->a; in load_from_ac_struct()
29 …// CHECK: {{.*}}alignment-assumption-{{.*}}.cpp:[[@LINE-9]]:13: runtime error: assumption of 32768… in main()
[all …]
Ddiv-zero.cpp1 // RUN: %clangxx -fsanitize=integer-divide-by-zero -DDIVIDEND=0 %s -o %t && %run %t 2>&1 | FileChec…
2 // RUN: %clangxx -fsanitize=integer-divide-by-zero -DDIVIDEND=1U %s -o %t && %run %t 2>&1 | FileChe…
3 // RUN: %clangxx -fsanitize=integer-divide-by-zero -DDIVIDEND='intmax(123)' %s -o %t && %run %t 2>&…
4 // RUN: %clangxx -fsanitize=float-divide-by-zero -DDIVIDEND=1.5 %s -o %t && %run %t 2>&1 | FileChec…
13 // CHECK: div-zero.cpp:[[@LINE+1]]:12: runtime error: division by zero in main()
Denum.cpp1 // RUN: %clangxx -fsanitize=enum %s -O3 -o %t && %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-P…
2 // RUN: %clangxx -fsanitize=enum -std=c++11 -DE="class E" %s -O3 -o %t && %run %t
3 // RUN: %clangxx -fsanitize=enum -std=c++11 -DE="class E : bool" %s -O3 -o %t && not %run %t 2>&1 |…
7 // XFAIL: windows-msvc
17 // CHECK-PLAIN: error: load of value 4294967295, which is not a valid value for type 'enum E' in main()
19 // CHECK-BOOL: error: load of value <unknown>, which is not a valid value for type 'enum E' in main()
20 return (int)e != -1; in main()
Dadd-overflow.cpp1 // RUN: %clangxx -DADD_I32 -fsanitize=signed-integer-overflow %s -o %t1 && %run %t1 2>&1 | FileChec…
2 // RUN: %clangxx -DADD_I64 -fsanitize=signed-integer-overflow %s -o %t2 && %run %t2 2>&1 | FileChec…
3 // RUN: %clangxx -DADD_I128 -fsanitize=signed-integer-overflow %s -o %t3 && %run %t3 2>&1 | FileChe…
16 …// CHECK-ADD_I32: add-overflow.cpp:[[@LINE-1]]:5: runtime error: signed integer overflow: 30541989… in main()
21 …// CHECK-ADD_I64: 8000000000000000000 + 2000000000000000000 cannot be represented in type '{{long(… in main()
30 …// CHECK-ADD_I128: {{0x40000000000000000000000000000000 \+ 0x40000000000000000000000000000000 cann… in main()
Duadd-overflow.cpp1 // RUN: %clangxx -DADD_I32 -fsanitize=unsigned-integer-overflow %s -o %t1 && %run %t1 2>&1 | FileCh…
2 // RUN: %clangxx -DADD_I64 -fsanitize=unsigned-integer-overflow %s -o %t2 && %run %t2 2>&1 | FileCh…
3 // RUN: %clangxx -DADD_I128 -fsanitize=unsigned-integer-overflow %s -o %t3 && %run %t3 2>&1 | FileC…
16 …// CHECK-ADD_I32: uadd-overflow.cpp:[[@LINE-1]]:5: runtime error: unsigned integer overflow: 22715… in main()
21 …// CHECK-ADD_I64: 10000000000000000000 + 9000000000000000000 cannot be represented in type 'unsign… in main()
30 …// CHECK-ADD_I128: {{0x80000000000000000000000000000000 \+ 0x80000000000000000000000000000000 cann… in main()
/third_party/vulkan-loader/tests/framework/
DCMakeLists.txt9 # http://www.apache.org/licenses/LICENSE-2.0
27 target_compile_options(testing_framework_util PUBLIC -fPIC)
34 target_compile_options(testing_framework_util PUBLIC -fsanitize=address)
35 target_link_options(testing_framework_util PUBLIC -fsanitize=address)
36 target_compile_options(vulkan PUBLIC -fsanitize=address)
37 target_link_options(vulkan PUBLIC -fsanitize=address)
40 target_compile_options(testing_framework_util PUBLIC -fsanitize=thread)
41 target_link_options(testing_framework_util PUBLIC -fsanitize=thread)
42 target_compile_options(vulkan PUBLIC -fsanitize=thread)
43 target_link_options(vulkan PUBLIC -fsanitize=thread)
[all …]
/third_party/flutter/skia/third_party/externals/harfbuzz/.circleci/
Dconfig.yml5 macos-10.12.6-aat-fonts:
9 - checkout
10- run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget autoconf automake libtool pkg-config ragel free…
11 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo
12 - run: make -j4
13 - run: make check || .ci/fail.sh
15 macos-10.13.6-aat-fonts:
19 - checkout
20- run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget autoconf automake libtool pkg-config ragel free…
21 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo
[all …]
/third_party/flatbuffers/tests/fuzzer/
DCMakeLists.txt17 # Usage '-fsanitize=address' doesn't allowed with '-fsanitize=memory'.
18 # MemorySanitizer will not work out-of-the-box, and will instead report false
19 # positives coming from uninstrumented code. Need to re-build both C++ standard
23 option(OSS_FUZZ "Set this option to use flags by oss-fuzz" OFF)
26 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fuse-ld=lld")
28 # add_link_options(-stdlib=libc++)
31 # -stdlib=libc++ # Use Clang libc++ instead of GNU.
32 -std=c++17
33 -Wall
34 -pedantic
[all …]
/third_party/nghttp2/fuzz/
DREADME.rst5 nghttp2 into `oss-fuzz <https://github.com/google/oss-fuzz>`_.
10 The file name of initial data under corpus is the lower-cased hex
11 string of SHA-256 hash of its own content.
24 .. code-block:: text
26 CPPFLAGS="-fsanitize-coverage=edge -fsanitize=address"
27 LDFLAGS="-fsanitize-coverage=edge -fsanitize=address"
31 .. code-block:: text
33-fsanitize-coverage=edge -fsanitize=address -I../lib/includes -std=c++11 fuzz_target.cc ../lib/.l…
/third_party/musl/ndk-test/sanitize/ubsan/
DCMakeLists.txt12 set(CMAKE_CXX_FLAGS "-fsanitize=undefined")
14 if (${testname} STREQUAL "add-overflow")
15 add_executable(add-overflow-32 ${srcfile})
16 target_compile_definitions(add-overflow-32 PRIVATE ADD_I32)
17 add_executable(add-overflow-64 ${srcfile})
18 target_compile_definitions(add-overflow-64 PRIVATE ADD_I64)
19 add_executable(add-overflow-128 ${srcfile})
20 target_compile_definitions(add-overflow-128 PRIVATE ADD_I128)
21 elseif(${testname} STREQUAL "div-zero")
22 add_executable(div-zero-0 ${srcfile})
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/subzero/docs/
DASAN.rst4 AddressSanitizer is a powerful compile-time tool used to detect and report
7 <https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf>`_.
18 Furthermore, pnacl-clang automatically inlines some calls to calloc(),
20 sz-clang.py and sz-clang++.py, that normally just pass their arguments
21 through to pnacl-clang or pnacl-clang++, but add instrumentation to
23 -fsanitize-address.
27 sz-clang.py -fsanitize-address -o hello.nonfinal.pexe hello.c
28 pnacl-finalize --no-strip-syms -o hello.pexe hello.nonfinal.pexe
29 pnacl-sz -fsanitize-address -filetype=obj -o hello.o hello.pexe
31 The resulting object file must be linked with the Subzero-specific
[all …]
/third_party/libxml2/fuzz/
DMakefile.am1 AUTOMAKE_OPTIONS = -Wno-syntax
7 AM_CPPFLAGS = -I$(top_srcdir)/include -I$(top_builddir)/include
26 .PHONY: tests corpus clean-corpus
35 clean-corpus:
36 rm -rf seed
38 clean-local: clean-corpus
47 @mkdir -p seed/xml
52 xml_LDFLAGS = -fsanitize=fuzzer
54 fuzz-xml: xml$(EXEEXT) seed/xml.stamp
55 @mkdir -p corpus/xml
[all …]
/third_party/benchmark/.github/workflows/
Dsanitizer.yml13 runs-on: ubuntu-latest
15 fail-fast: false
22 - uses: actions/checkout@v2
24 - name: configure msan env
27 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins…
30 - name: configure ubsan env
33 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=undefined -fno-sanitize-recover=all" >…
36 - name: configure asan env
39 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=address -fno-sanitize-recover=all" >> …
42 - name: configure tsan env
[all …]
/third_party/mbedtls/
DCMakeLists.txt4 # - Include directories:
13 # - MBEDTLS_TARGET_PREFIX: CMake targets are designed to be alterable by calling
50 option(GEN_FILES "Generate the auto-generated files as needed" OFF)
52 option(GEN_FILES "Generate the auto-generated files as needed" ON)
67 # Warning string - created as a list for compatibility with CMake 2.8
69 set(CTR_DRBG_128_BIT_KEY_WARN_L2 "**** Using 128-bit keys for CTR_DRBG limits the security of gene…
70 …BIT_KEY_WARN_L3 "**** keys and operations that use random values generated to 128-bit security\n")
93 # If 128-bit keys are configured for CTR_DRBG, display an appropriate warning
94 … ${MBEDTLS_PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/config.py -f ${CMAKE_CURRENT_SOU…
124 set(command ln -s ${target} ${link})
[all …]
/third_party/skia/third_party/externals/abseil-cpp/ci/
Dlinux_clang-latest_libcxx_asan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [[ -z ${ABSEIL_ROOT:-} ]]; then
27 if [[ -z ${STD:-} ]]; then
31 if [[ -z ${COMPILATION_MODE:-} ]]; then
35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then
45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC…
[all …]
/third_party/cJSON/
DCMakeLists.txt23 -std=c89
24 -pedantic
25 -Wall
26 -Wextra
27 -Werror
28 -Wstrict-prototypes
29 -Wwrite-strings
30 -Wshadow
31 -Winit-self
32 -Wcast-align
[all …]
/third_party/skia/third_party/externals/expat/expat/
Dqa.sh9 # Copyright (c) 2016-2021 Sebastian Pipping <sebastian@pipping.org>
33 set -e
34 set -o nounset
41 echo -e -n "${open}" >&2
42 echo -n "# $*" >&2
43 echo -e "${close}" >&2
51 echo -e -n "${open}" >&2
52 echo -n "WARNING: $*" >&2
53 echo -e "${close}" >&2
79 : ${BASE_COMPILE_FLAGS:="-pipe -Wall -Wextra -pedantic -Wno-overlength-strings -Wno-long-long"}
[all …]
/third_party/flutter/skia/third_party/externals/libpng/scripts/
Dtravis.sh3 set -e
6 LOCAL_CMAKE_EXTRA_ARGS="-DCMAKE_C_FLAGS=-fsanitize=$ENABLE_SANITIZERS"
7 … LOCAL_MAKE_EXTRA_ARGS="CFLAGS=-fsanitize=$ENABLE_SANITIZERS LDFLAGS=-fsanitize=$ENABLE_SANITIZERS"
12 mkdir build-cmake
13 cd build-cmake
21 mkdir build-configure
22 cd build-configure
33 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS
34 [[ $DISABLE_TESTS ]] || make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS test
35 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS clean
/third_party/skia/third_party/externals/libpng/scripts/
Dtravis.sh3 set -e
6 LOCAL_CMAKE_EXTRA_ARGS="-DCMAKE_C_FLAGS=-fsanitize=$ENABLE_SANITIZERS"
7 … LOCAL_MAKE_EXTRA_ARGS="CFLAGS=-fsanitize=$ENABLE_SANITIZERS LDFLAGS=-fsanitize=$ENABLE_SANITIZERS"
12 mkdir build-cmake
13 cd build-cmake
21 mkdir build-configure
22 cd build-configure
33 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS
34 [[ $DISABLE_TESTS ]] || make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS test
35 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS clean
/third_party/skia/third_party/externals/libwebp/tests/fuzzer/
Dmakefile.unix3 # Note a clang 6+ toolchain is assumed for use of -fsanitize=fuzzer.
7 CFLAGS = -fsanitize=fuzzer -I../../src -I../.. -Wall -Wextra
9 LDFLAGS = -fsanitize=fuzzer
/third_party/libabigail/
Dconfigure.ac1 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
39 AC_CONFIG_AUX_DIR([build-aux])
47 dnl http://www.gnu.org/software/autoconf-archive
50 m4_include([autoconf-archive/ax_check_python_modules.m4])
53 m4_include([autoconf-archive/ax_compare_version.m4])
54 m4_include([autoconf-archive/ax_prog_python_version.m4])
56 dnl This one is to be able to run "make check-valgrind"
58 m4_include([autoconf-archive/ax_valgrind_check.m4])
60 AM_INIT_AUTOMAKE([1.11.1 foreign subdir-objects dist-xz tar-ustar parallel-tests])
91 dnl $ configure VERSION_SUFFIX="-dev"
[all …]
/third_party/libbpf/scripts/
Dbuild-fuzzers.sh2 set -eux
4 SANITIZER=${SANITIZER:-address}
5 flags="-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITI…
7 export CC=${CC:-clang}
8 export CFLAGS=${CFLAGS:-$flags}
10 export CXX=${CXX:-clang++}
11 export CXXFLAGS=${CXXFLAGS:-$flags}
13 cd "$(dirname -- "$0")/.."
15 export OUT=${OUT:-"$(pwd)/out"}
16 mkdir -p "$OUT"
[all …]
/third_party/benchmark/
D.travis.yml7 - compiler: gcc
11 - lcov
13 - compiler: gcc
17 - g++-multilib
18 - libc6:i386
20 - COMPILER=g++
21 - C_COMPILER=gcc
22 - BUILD_TYPE=Debug
23 - BUILD_32_BITS=ON
24 - EXTRA_FLAGS="-m32"
[all …]
/third_party/lz4/tests/
Dtest-lz4-abi.py5 # Copyright (C) 2011-present, Takayuki Matsuoka
20 env_flags = ' ' # '-j MOREFLAGS="-g -O0 -fsanitize=address"'
46 env["MOREFLAGS"] = "-fsanitize=address"
47 return proc([make_cmd] + ['-j'] + ['V=1'] + args, pipe, env)
54 stdout, stderr = git(['tag', '-l', 'v[1-9].[0-9].[0-9]'])
55 tags = stdout.decode('utf-8').split()
84 for march in ['-m64', '-m32', '-mx32']:
101 git(['--work-tree=' + r_dir, 'checkout', tag, '--', '.'])
109 build_env["MOREFLAGS"] = "-fsanitize=address"
120 build_env["LDFLAGS"] = "-L../lib"
[all …]

12345678