Searched +full:- +full:fno +full:- +full:sanitize (Results 1 – 25 of 91) sorted by relevance
1234
/external/compiler-rt/test/ubsan/TestCases/Integer/ |
D | shift.cpp | 1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %… 2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru… 3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %… 4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %… 5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run … 6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run … 7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %… 8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run … 9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run … 10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run … [all …]
|
D | no-recover.cpp | 1 // RUN: %clangxx -fsanitize=unsigned-integer-overflow %s -o %t && %run %t 2>&1 | FileCheck %s --che… 2 …-fsanitize=unsigned-integer-overflow -fno-sanitize-recover=all -fsanitize-recover=unsigned-integer… 3 …clangxx -fsanitize=unsigned-integer-overflow -fno-sanitize-recover=unsigned-integer-overflow %s -o… 11 // RECOVER-NOT: runtime error in main() 12 // ABORT-NOT: runtime error in main() 16 …// RECOVER: no-recover.cpp:[[@LINE-1]]:5: runtime error: unsigned integer overflow: 2271560481 + 3… in main() 17 …// ABORT: no-recover.cpp:[[@LINE-2]]:5: runtime error: unsigned integer overflow: 2271560481 + 398… in main() 21 // ABORT-NOT: runtime error in main()
|
/external/clang/test/Driver/ |
D | fsanitize.c | 1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | … 2 …-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-… 3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&… 4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### … 5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### … 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
D | fsanitize-blacklist.c | 4 // REQUIRES: clang-driver, shell 6 // Make sure we don't match the -NOT lines with the linker invocation. 15 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s… 16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second 18 // Now, check for -fdepfile-entry flags. 19 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s… 20 // CHECK-BLACKLIST2: -fdepfile-entry={{.*}}.good" "-fdepfile-entry={{.*}}.second 23 …-target x86_64-linux-gnu -fsanitize=address -resource-dir=%S/Inputs/resource_dir %s -### 2>&1 | Fi… 24 // CHECK-DEFAULT-BLACKLIST: -fsanitize-blacklist={{.*}}asan_blacklist.txt 26 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag. [all …]
|
D | fsanitize-coverage.c | 1 …N: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileChe… 2 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -###… 3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-pref… 4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type 5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address 7 … %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCh… 8 …: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCh… 9 …N: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileChe… 10 …%clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileC… 11 …N: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileChe… [all …]
|
/external/skia/gn/ |
D | BUILD.gn | 3 # Use of this source code is governed by a BSD-style license that can be 44 "/utf-8", # Set Source and Executable character sets to UTF-8. 47 cflags += [ "-fms-compatibility-version=19" ] # 2015 71 "-imsvc", 95 "-fstrict-aliasing", 96 "-fPIC", 98 cflags_cc += [ "-std=c++14" ] 101 # These would make stack traces worse on Linux, so we don't just set them willy-nilly. 103 cflags += [ "-fvisibility=hidden" ] 104 cflags_cc += [ "-fvisibility-inlines-hidden" ] [all …]
|
/external/libaom/libaom/build/cmake/ |
D | sanitizers.cmake | 16 if(MSVC OR NOT SANITIZE) 22 string(TOLOWER ${SANITIZE} SANITIZE) 25 require_linker_flag("-fsanitize=${SANITIZE}") 26 require_compiler_flag("-fsanitize=${SANITIZE}" YES) 29 require_compiler_flag("-fno-omit-frame-pointer -fno-optimize-sibling-calls" YES) 31 # Fix link errors due to missing rt compiler lib in 32-bit builds. 34 if(${CMAKE_SIZEOF_VOID_P} EQUAL 4 AND "${SANITIZE}" MATCHES 36 require_linker_flag("--rtlib=compiler-rt -lgcc_s")
|
/external/skqp/gn/ |
D | BUILD.gn | 3 # Use of this source code is governed by a BSD-style license that can be 44 "/utf-8", # Set Source and Executable character sets to UTF-8. 47 cflags += [ "-fms-compatibility-version=19" ] # 2015 71 "-imsvc", 95 "-fstrict-aliasing", 96 "-fPIC", 98 cflags_cc += [ "-std=c++14" ] 101 # These would make stack traces worse on Linux, so we don't just set them willy-nilly. 103 cflags += [ "-fvisibility=hidden" ] 104 cflags_cc += [ "-fvisibility-inlines-hidden" ] [all …]
|
/external/libprotobuf-mutator/ |
D | CMakeLists.txt | 7 # http://www.apache.org/licenses/LICENSE-2.0 47 set(CMAKE_REQUIRED_FLAGS "-fsanitize=address") 48 check_cxx_compiler_flag(-fsanitize=address LIB_PROTO_MUTATOR_HAS_SANITIZE_ADDRESS) 49 check_cxx_compiler_flag("-fsanitize=address -fsanitize-address-use-after-scope" 53 set(CMAKE_REQUIRED_FLAGS "-fsanitize-coverage=0") 54 check_cxx_compiler_flag(-fsanitize-coverage= LIB_PROTO_MUTATOR_HAS_NO_COVERAGE) 57 set(CMAKE_REQUIRED_FLAGS "-fsanitize=fuzzer-no-link") 58 check_cxx_compiler_flag(-fsanitize=fuzzer-no-link LIB_PROTO_MUTATOR_HAS_SANITIZE_FUZZER) 61 set(CMAKE_REQUIRED_FLAGS "-fno-sanitize=fuzzer") 62 check_cxx_compiler_flag(-fno-sanitize=fuzzer LIB_PROTO_MUTATOR_HAS_NO_SANITIZE_FUZZER) [all …]
|
/external/compiler-rt/lib/asan/ |
D | Android.bp | 8 // http://www.apache.org/licenses/LICENSE-2.0 48 "-fvisibility=hidden", 49 "-fno-exceptions", 50 "-DASAN_LOW_MEMORY=1", 51 "-DASAN_NEEDS_SEGV=" + ASAN_NEEDS_SEGV, 52 "-DASAN_HAS_EXCEPTIONS=" + ASAN_HAS_EXCEPTIONS, 53 "-DASAN_FLEXIBLE_MAPPING_AND_OFFSET=" + ASAN_FLEXIBLE_MAPPING_AND_OFFSET, 54 "-Wall", 55 "-Werror", 56 "-Wno-covered-switch-default", [all …]
|
/external/libxml2/ |
D | .travis.yml | 7 w3c-sgml-lib 12 - compiler: gcc 13 env: CFLAGS="-O2 -std=c89 -D_XOPEN_SOURCE=700 -Werror -Wno-error=unused-function" 15 - compiler: clang 17 env: CONFIG="--without-python" 18 …-O2 -g -fno-omit-frame-pointer -fsanitize=address,undefined -fno-sanitize=float-divide-by-zero,poi… 20 script: sh autogen.sh $CONFIG && make -j2 V=1 && make check
|
/external/compiler-rt/lib/ubsan/ |
D | Android.bp | 8 // http://www.apache.org/licenses/LICENSE-2.0 34 "-Wall", 35 "-Werror", 39 "-fvisibility=hidden", 40 "-fno-exceptions", 41 "-std=c++11", 42 "-Wno-unused-parameter", 43 "-Wno-non-virtual-dtor", 44 "-DUBSAN_CAN_USE_CXXABI", 47 ubsan_rtl_c_includes = ["external/compiler-rt/lib"] [all …]
|
/external/llvm/lib/Fuzzer/test/uninstrumented/ |
D | CMakeLists.txt | 5 …"${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8b… 12 add_libfuzzer_test(${Test}-Uninstrumented SOURCES ../${Test}.cpp)
|
/external/compiler-rt/lib/tsan/ |
D | Android.bp | 8 // http://www.apache.org/licenses/LICENSE-2.0 19 "-Wall", 20 "-Werror", 24 "-std=c++11", 25 "-Wno-unused-parameter", 26 "-Wno-non-virtual-dtor", 27 "-fno-rtti", 28 "-fno-builtin", 34 include_dirs: ["external/compiler-rt/lib"], 42 sanitize: { [all …]
|
/external/compiler-rt/test/ubsan/TestCases/TypeCheck/ |
D | vptr-non-unique-typeinfo.cpp | 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -fPIC -shared… 2 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -O3 -o %t %t-…
|
/external/libcxxabi/cmake/ |
D | config-ix.cmake | 10 # libc++abi is built with -nodefaultlibs, so we want all our checks to also 13 # performed without -nodefaultlibs) and the flags that are actually 14 # required during compilation (which has the -nodefaultlibs). libc is 17 check_c_compiler_flag(-nodefaultlibs LIBCXXABI_HAS_NODEFAULTLIBS_FLAG) 19 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -nodefaultlibs") 24 list(APPEND CMAKE_REQUIRED_FLAGS -rtlib=compiler-rt) 32 # programs to link successfully with -nodefaultlibs. 43 if (CMAKE_C_FLAGS MATCHES -fsanitize OR CMAKE_CXX_FLAGS MATCHES -fsanitize) 44 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize=all") 46 if (CMAKE_C_FLAGS MATCHES -fsanitize-coverage OR CMAKE_CXX_FLAGS MATCHES -fsanitize-coverage) [all …]
|
/external/llvm/lib/Fuzzer/ |
D | CMakeLists.txt | 3 …X_FLAGS "${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fno-sanitize-coverage=edge,trace-cmp,indirect-…
|
/external/libunwind_llvm/cmake/ |
D | config-ix.cmake | 13 # libunwind is built with -nodefaultlibs, so we want all our checks to also 16 # performed without -nodefaultlibs) and the flags that are actually 17 # required during compilation (which has the -nodefaultlibs). libc is 20 check_c_compiler_flag(-nodefaultlibs LIBUNWIND_HAS_NODEFAULTLIBS_FLAG) 22 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -nodefaultlibs") 39 # programs to link successfully with -nodefaultlibs. 50 if (CMAKE_C_FLAGS MATCHES -fsanitize OR CMAKE_CXX_FLAGS MATCHES -fsanitize) 51 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize=all") 53 if (CMAKE_C_FLAGS MATCHES -fsanitize-coverage OR CMAKE_CXX_FLAGS MATCHES -fsanitize-coverage) 54 …(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize-coverage=edge,trace-cmp,indirect-call… [all …]
|
/external/compiler-rt/test/tsan/ |
D | ignore_lib2.cc | 1 // RUN: %clangxx_tsan -O1 %s -DLIB -fPIC -fno-sanitize=thread -shared -o %T/libignore_lib2_0.so 2 // RUN: %clangxx_tsan -O1 %s -DLIB -fPIC -fno-sanitize=thread -shared -o %T/libignore_lib2_1.so 3 // RUN: %clangxx_tsan -O1 %s -o %t 32 // CHECK-NOT: OK
|
/external/boringssl/src/ |
D | CMakeLists.txt | 23 # This is a dummy target which all other targets depend on (manually - see other 29 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be 45 pkg_check_modules(LIBUNWIND libunwind-generic) 47 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 65 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME) 70 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DNDEBUG") 76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) 82 # CMake automatically connects include_directories to the NASM command-line, 84 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}") [all …]
|
/external/compiler-rt/test/cfi/cross-dso/icall/ |
D | diag.cpp | 1 // Cross-DSO diagnostics. 5 // * -fsanitize-trap on the caller side overrides everything. 8 // Full-recover. 9 // RUN: %clangxx_cfi_dso_diag -g -DSHARED_LIB %s -fPIC -shared -o %t-so.so 10 // RUN: %clangxx_cfi_dso_diag -g %s -o %t %t-so.so 12 // RUN: %t icv 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-DIAG \ 13 // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER 15 // RUN: %t i_v 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-NODIAG \ 16 // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER 18 // RUN: %t _cv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-DIAG \ [all …]
|
/external/libcxx/cmake/Modules/ |
D | CheckLibcxxAtomic.cmake | 4 # the platform doesn't support lock-free atomics. 6 # We could modify LLVM's CheckAtomic module and have it check for 64-bit 7 # atomics instead. However, we would like to avoid careless uses of 64-bit 8 # atomics inside LLVM over time on 32-bit platforms. 12 …set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -nodefaultlibs -std=c++11 -nostdinc++ -isystem $… 14 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} --gcc-toolchain=${LIBCXX_GCC_TOOLCHAIN}") 16 if (CMAKE_C_FLAGS MATCHES -fsanitize OR CMAKE_CXX_FLAGS MATCHES -fsanitize) 17 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize=all") 19 if (CMAKE_C_FLAGS MATCHES -fsanitize-coverage OR CMAKE_CXX_FLAGS MATCHES -fsanitize-coverage) 20 …(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize-coverage=edge,trace-cmp,indirect-call…
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
D | Android.bp | 8 // http://www.apache.org/licenses/LICENSE-2.0 22 "-Wall", 23 "-Werror", 26 "-fvisibility=hidden", 27 "-fno-exceptions", 28 "-fno-rtti", 29 "-std=c++11", 30 "-Wno-unused-parameter", 31 "-Wno-non-virtual-dtor", 32 "-Wno-format", [all …]
|
/external/libcxx/cmake/ |
D | config-ix.cmake | 21 # libc++ is built with -nodefaultlibs, so we want all our checks to also 24 # performed without -nodefaultlibs) and the flags that are actually 25 # required during compilation (which has the -nodefaultlibs). libc is 28 check_c_compiler_flag(-nodefaultlibs LIBCXX_SUPPORTS_NODEFAULTLIBS_FLAG) 30 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -nodefaultlibs") 35 list(APPEND CMAKE_REQUIRED_FLAGS -rtlib=compiler-rt) 43 # programs to link successfully with -nodefaultlibs. 54 if (CMAKE_C_FLAGS MATCHES -fsanitize OR CMAKE_CXX_FLAGS MATCHES -fsanitize) 55 set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fno-sanitize=all") 57 if (CMAKE_C_FLAGS MATCHES -fsanitize-coverage OR CMAKE_CXX_FLAGS MATCHES -fsanitize-coverage) [all …]
|
/external/libcxx/utils/google-benchmark/ |
D | .travis.yml | 7 - /usr/local/bin:$PATH 11 - compiler: gcc 15 - lcov 17 - compiler: gcc 19 - compiler: gcc 21 - compiler: gcc 25 - g++-multilib 27 - compiler: gcc 31 - g++-multilib 33 - compiler: gcc [all …]
|
1234