Searched +full:- +full:fsanitize (Results 1 – 25 of 185) sorted by relevance
12345678
/third_party/musl/ndk-test/sanitize/ubsan/src/ |
D | shift.cpp | 1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %… 2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru… 3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %… 4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %… 5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run … 6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run … 7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %… 8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run … 9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run … 10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run … [all …]
|
D | alignment-assumption-attribute-align_value-on-lvalue.cpp | 1 …-x c -fsanitize=alignment -O0 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 2 …-x c -fsanitize=alignment -O1 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 3 …-x c -fsanitize=alignment -O2 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 4 …-x c -fsanitize=alignment -O3 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 6 …-x c++ -fsanitize=alignment -O0 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 7 …-x c++ -fsanitize=alignment -O1 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 8 …-x c++ -fsanitize=alignment -O2 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 9 …-x c++ -fsanitize=alignment -O3 %s -o %t && %run %t 2>&1 | FileCheck %s --implicit-check-not=" ass… 20 return x->a; in load_from_ac_struct() 29 …// CHECK: {{.*}}alignment-assumption-{{.*}}.cpp:[[@LINE-9]]:13: runtime error: assumption of 32768… in main() [all …]
|
D | div-zero.cpp | 1 // RUN: %clangxx -fsanitize=integer-divide-by-zero -DDIVIDEND=0 %s -o %t && %run %t 2>&1 | FileChec… 2 // RUN: %clangxx -fsanitize=integer-divide-by-zero -DDIVIDEND=1U %s -o %t && %run %t 2>&1 | FileChe… 3 // RUN: %clangxx -fsanitize=integer-divide-by-zero -DDIVIDEND='intmax(123)' %s -o %t && %run %t 2>&… 4 // RUN: %clangxx -fsanitize=float-divide-by-zero -DDIVIDEND=1.5 %s -o %t && %run %t 2>&1 | FileChec… 13 // CHECK: div-zero.cpp:[[@LINE+1]]:12: runtime error: division by zero in main()
|
D | enum.cpp | 1 // RUN: %clangxx -fsanitize=enum %s -O3 -o %t && %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-P… 2 // RUN: %clangxx -fsanitize=enum -std=c++11 -DE="class E" %s -O3 -o %t && %run %t 3 // RUN: %clangxx -fsanitize=enum -std=c++11 -DE="class E : bool" %s -O3 -o %t && not %run %t 2>&1 |… 7 // XFAIL: windows-msvc 17 // CHECK-PLAIN: error: load of value 4294967295, which is not a valid value for type 'enum E' in main() 19 // CHECK-BOOL: error: load of value <unknown>, which is not a valid value for type 'enum E' in main() 20 return (int)e != -1; in main()
|
D | add-overflow.cpp | 1 // RUN: %clangxx -DADD_I32 -fsanitize=signed-integer-overflow %s -o %t1 && %run %t1 2>&1 | FileChec… 2 // RUN: %clangxx -DADD_I64 -fsanitize=signed-integer-overflow %s -o %t2 && %run %t2 2>&1 | FileChec… 3 // RUN: %clangxx -DADD_I128 -fsanitize=signed-integer-overflow %s -o %t3 && %run %t3 2>&1 | FileChe… 16 …// CHECK-ADD_I32: add-overflow.cpp:[[@LINE-1]]:5: runtime error: signed integer overflow: 30541989… in main() 21 …// CHECK-ADD_I64: 8000000000000000000 + 2000000000000000000 cannot be represented in type '{{long(… in main() 30 …// CHECK-ADD_I128: {{0x40000000000000000000000000000000 \+ 0x40000000000000000000000000000000 cann… in main()
|
D | uadd-overflow.cpp | 1 // RUN: %clangxx -DADD_I32 -fsanitize=unsigned-integer-overflow %s -o %t1 && %run %t1 2>&1 | FileCh… 2 // RUN: %clangxx -DADD_I64 -fsanitize=unsigned-integer-overflow %s -o %t2 && %run %t2 2>&1 | FileCh… 3 // RUN: %clangxx -DADD_I128 -fsanitize=unsigned-integer-overflow %s -o %t3 && %run %t3 2>&1 | FileC… 16 …// CHECK-ADD_I32: uadd-overflow.cpp:[[@LINE-1]]:5: runtime error: unsigned integer overflow: 22715… in main() 21 …// CHECK-ADD_I64: 10000000000000000000 + 9000000000000000000 cannot be represented in type 'unsign… in main() 30 …// CHECK-ADD_I128: {{0x80000000000000000000000000000000 \+ 0x80000000000000000000000000000000 cann… in main()
|
/third_party/vulkan-loader/tests/framework/ |
D | CMakeLists.txt | 9 # http://www.apache.org/licenses/LICENSE-2.0 27 target_compile_options(testing_framework_util PUBLIC -fPIC) 34 target_compile_options(testing_framework_util PUBLIC -fsanitize=address) 35 target_link_options(testing_framework_util PUBLIC -fsanitize=address) 36 target_compile_options(vulkan PUBLIC -fsanitize=address) 37 target_link_options(vulkan PUBLIC -fsanitize=address) 40 target_compile_options(testing_framework_util PUBLIC -fsanitize=thread) 41 target_link_options(testing_framework_util PUBLIC -fsanitize=thread) 42 target_compile_options(vulkan PUBLIC -fsanitize=thread) 43 target_link_options(vulkan PUBLIC -fsanitize=thread) [all …]
|
/third_party/flutter/skia/third_party/externals/harfbuzz/.circleci/ |
D | config.yml | 5 macos-10.12.6-aat-fonts: 9 - checkout 10 …- run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget autoconf automake libtool pkg-config ragel free… 11 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo 12 - run: make -j4 13 - run: make check || .ci/fail.sh 15 macos-10.13.6-aat-fonts: 19 - checkout 20 …- run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget autoconf automake libtool pkg-config ragel free… 21 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo [all …]
|
/third_party/flatbuffers/tests/fuzzer/ |
D | CMakeLists.txt | 17 # Usage '-fsanitize=address' doesn't allowed with '-fsanitize=memory'. 18 # MemorySanitizer will not work out-of-the-box, and will instead report false 19 # positives coming from uninstrumented code. Need to re-build both C++ standard 23 option(OSS_FUZZ "Set this option to use flags by oss-fuzz" OFF) 26 set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fuse-ld=lld") 28 # add_link_options(-stdlib=libc++) 31 # -stdlib=libc++ # Use Clang libc++ instead of GNU. 32 -std=c++17 33 -Wall 34 -pedantic [all …]
|
/third_party/nghttp2/fuzz/ |
D | README.rst | 5 nghttp2 into `oss-fuzz <https://github.com/google/oss-fuzz>`_. 10 The file name of initial data under corpus is the lower-cased hex 11 string of SHA-256 hash of its own content. 24 .. code-block:: text 26 CPPFLAGS="-fsanitize-coverage=edge -fsanitize=address" 27 LDFLAGS="-fsanitize-coverage=edge -fsanitize=address" 31 .. code-block:: text 33 … -fsanitize-coverage=edge -fsanitize=address -I../lib/includes -std=c++11 fuzz_target.cc ../lib/.l…
|
/third_party/musl/ndk-test/sanitize/ubsan/ |
D | CMakeLists.txt | 12 set(CMAKE_CXX_FLAGS "-fsanitize=undefined") 14 if (${testname} STREQUAL "add-overflow") 15 add_executable(add-overflow-32 ${srcfile}) 16 target_compile_definitions(add-overflow-32 PRIVATE ADD_I32) 17 add_executable(add-overflow-64 ${srcfile}) 18 target_compile_definitions(add-overflow-64 PRIVATE ADD_I64) 19 add_executable(add-overflow-128 ${srcfile}) 20 target_compile_definitions(add-overflow-128 PRIVATE ADD_I128) 21 elseif(${testname} STREQUAL "div-zero") 22 add_executable(div-zero-0 ${srcfile}) [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/subzero/docs/ |
D | ASAN.rst | 4 AddressSanitizer is a powerful compile-time tool used to detect and report 7 <https://www.usenix.org/system/files/conference/atc12/atc12-final39.pdf>`_. 18 Furthermore, pnacl-clang automatically inlines some calls to calloc(), 20 sz-clang.py and sz-clang++.py, that normally just pass their arguments 21 through to pnacl-clang or pnacl-clang++, but add instrumentation to 23 -fsanitize-address. 27 sz-clang.py -fsanitize-address -o hello.nonfinal.pexe hello.c 28 pnacl-finalize --no-strip-syms -o hello.pexe hello.nonfinal.pexe 29 pnacl-sz -fsanitize-address -filetype=obj -o hello.o hello.pexe 31 The resulting object file must be linked with the Subzero-specific [all …]
|
/third_party/libxml2/fuzz/ |
D | Makefile.am | 1 AUTOMAKE_OPTIONS = -Wno-syntax 7 AM_CPPFLAGS = -I$(top_srcdir)/include -I$(top_builddir)/include 26 .PHONY: tests corpus clean-corpus 35 clean-corpus: 36 rm -rf seed 38 clean-local: clean-corpus 47 @mkdir -p seed/xml 52 xml_LDFLAGS = -fsanitize=fuzzer 54 fuzz-xml: xml$(EXEEXT) seed/xml.stamp 55 @mkdir -p corpus/xml [all …]
|
/third_party/benchmark/.github/workflows/ |
D | sanitizer.yml | 13 runs-on: ubuntu-latest 15 fail-fast: false 22 - uses: actions/checkout@v2 24 - name: configure msan env 27 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins… 30 - name: configure ubsan env 33 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=undefined -fno-sanitize-recover=all" >… 36 - name: configure asan env 39 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=address -fno-sanitize-recover=all" >> … 42 - name: configure tsan env [all …]
|
/third_party/mbedtls/ |
D | CMakeLists.txt | 4 # - Include directories: 13 # - MBEDTLS_TARGET_PREFIX: CMake targets are designed to be alterable by calling 50 option(GEN_FILES "Generate the auto-generated files as needed" OFF) 52 option(GEN_FILES "Generate the auto-generated files as needed" ON) 67 # Warning string - created as a list for compatibility with CMake 2.8 69 set(CTR_DRBG_128_BIT_KEY_WARN_L2 "**** Using 128-bit keys for CTR_DRBG limits the security of gene… 70 …BIT_KEY_WARN_L3 "**** keys and operations that use random values generated to 128-bit security\n") 93 # If 128-bit keys are configured for CTR_DRBG, display an appropriate warning 94 … ${MBEDTLS_PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/config.py -f ${CMAKE_CURRENT_SOU… 124 set(command ln -s ${target} ${link}) [all …]
|
/third_party/skia/third_party/externals/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_asan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC… [all …]
|
/third_party/cJSON/ |
D | CMakeLists.txt | 23 -std=c89 24 -pedantic 25 -Wall 26 -Wextra 27 -Werror 28 -Wstrict-prototypes 29 -Wwrite-strings 30 -Wshadow 31 -Winit-self 32 -Wcast-align [all …]
|
/third_party/skia/third_party/externals/expat/expat/ |
D | qa.sh | 9 # Copyright (c) 2016-2021 Sebastian Pipping <sebastian@pipping.org> 33 set -e 34 set -o nounset 41 echo -e -n "${open}" >&2 42 echo -n "# $*" >&2 43 echo -e "${close}" >&2 51 echo -e -n "${open}" >&2 52 echo -n "WARNING: $*" >&2 53 echo -e "${close}" >&2 79 : ${BASE_COMPILE_FLAGS:="-pipe -Wall -Wextra -pedantic -Wno-overlength-strings -Wno-long-long"} [all …]
|
/third_party/flutter/skia/third_party/externals/libpng/scripts/ |
D | travis.sh | 3 set -e 6 LOCAL_CMAKE_EXTRA_ARGS="-DCMAKE_C_FLAGS=-fsanitize=$ENABLE_SANITIZERS" 7 … LOCAL_MAKE_EXTRA_ARGS="CFLAGS=-fsanitize=$ENABLE_SANITIZERS LDFLAGS=-fsanitize=$ENABLE_SANITIZERS" 12 mkdir build-cmake 13 cd build-cmake 21 mkdir build-configure 22 cd build-configure 33 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS 34 [[ $DISABLE_TESTS ]] || make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS test 35 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS clean
|
/third_party/skia/third_party/externals/libpng/scripts/ |
D | travis.sh | 3 set -e 6 LOCAL_CMAKE_EXTRA_ARGS="-DCMAKE_C_FLAGS=-fsanitize=$ENABLE_SANITIZERS" 7 … LOCAL_MAKE_EXTRA_ARGS="CFLAGS=-fsanitize=$ENABLE_SANITIZERS LDFLAGS=-fsanitize=$ENABLE_SANITIZERS" 12 mkdir build-cmake 13 cd build-cmake 21 mkdir build-configure 22 cd build-configure 33 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS 34 [[ $DISABLE_TESTS ]] || make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS test 35 make -f scripts/makefile.$CC $LOCAL_MAKE_EXTRA_ARGS $EXTRA_ARGS clean
|
/third_party/skia/third_party/externals/libwebp/tests/fuzzer/ |
D | makefile.unix | 3 # Note a clang 6+ toolchain is assumed for use of -fsanitize=fuzzer. 7 CFLAGS = -fsanitize=fuzzer -I../../src -I../.. -Wall -Wextra 9 LDFLAGS = -fsanitize=fuzzer
|
/third_party/libabigail/ |
D | configure.ac | 1 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 39 AC_CONFIG_AUX_DIR([build-aux]) 47 dnl http://www.gnu.org/software/autoconf-archive 50 m4_include([autoconf-archive/ax_check_python_modules.m4]) 53 m4_include([autoconf-archive/ax_compare_version.m4]) 54 m4_include([autoconf-archive/ax_prog_python_version.m4]) 56 dnl This one is to be able to run "make check-valgrind" 58 m4_include([autoconf-archive/ax_valgrind_check.m4]) 60 AM_INIT_AUTOMAKE([1.11.1 foreign subdir-objects dist-xz tar-ustar parallel-tests]) 91 dnl $ configure VERSION_SUFFIX="-dev" [all …]
|
/third_party/libbpf/scripts/ |
D | build-fuzzers.sh | 2 set -eux 4 SANITIZER=${SANITIZER:-address} 5 flags="-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITI… 7 export CC=${CC:-clang} 8 export CFLAGS=${CFLAGS:-$flags} 10 export CXX=${CXX:-clang++} 11 export CXXFLAGS=${CXXFLAGS:-$flags} 13 cd "$(dirname -- "$0")/.." 15 export OUT=${OUT:-"$(pwd)/out"} 16 mkdir -p "$OUT" [all …]
|
/third_party/benchmark/ |
D | .travis.yml | 7 - compiler: gcc 11 - lcov 13 - compiler: gcc 17 - g++-multilib 18 - libc6:i386 20 - COMPILER=g++ 21 - C_COMPILER=gcc 22 - BUILD_TYPE=Debug 23 - BUILD_32_BITS=ON 24 - EXTRA_FLAGS="-m32" [all …]
|
/third_party/lz4/tests/ |
D | test-lz4-abi.py | 5 # Copyright (C) 2011-present, Takayuki Matsuoka 20 env_flags = ' ' # '-j MOREFLAGS="-g -O0 -fsanitize=address"' 46 env["MOREFLAGS"] = "-fsanitize=address" 47 return proc([make_cmd] + ['-j'] + ['V=1'] + args, pipe, env) 54 stdout, stderr = git(['tag', '-l', 'v[1-9].[0-9].[0-9]']) 55 tags = stdout.decode('utf-8').split() 84 for march in ['-m64', '-m32', '-mx32']: 101 git(['--work-tree=' + r_dir, 'checkout', tag, '--', '.']) 109 build_env["MOREFLAGS"] = "-fsanitize=address" 120 build_env["LDFLAGS"] = "-L../lib" [all …]
|
12345678