Home
last modified time | relevance | path

Searched +full:- +full:fsanitize (Results 1 – 25 of 684) sorted by relevance

12345678910>>...28

/external/clang/test/Driver/
Dfsanitize-coverage.c1 …N: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileChe…
2-target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -###…
3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-pref…
4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type
5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address
7 … %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCh…
8 …: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCh…
9 …N: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileChe…
10 …%clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileC…
11 …N: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileChe…
[all …]
Dfsanitize.c1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | …
2-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-
3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&…
4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### …
5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### …
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
Dfsanitize-blacklist.c4 // REQUIRES: clang-driver, shell
6 // Make sure we don't match the -NOT lines with the linker invocation.
15-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s…
16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second
18 // Now, check for -fdepfile-entry flags.
19-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s…
20 // CHECK-BLACKLIST2: -fdepfile-entry={{.*}}.good" "-fdepfile-entry={{.*}}.second
23-target x86_64-linux-gnu -fsanitize=address -resource-dir=%S/Inputs/resource_dir %s -### 2>&1 | Fi…
24 // CHECK-DEFAULT-BLACKLIST: -fsanitize-blacklist={{.*}}asan_blacklist.txt
26 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag.
[all …]
Dmsan.c1 // RUN: %clang -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
2 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
3 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
4 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
5 // RUN: %clang -target mips64-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCheck %s
6 // RUN: %clang -target mips64el-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileChe…
7 // RUN: %clang -target powerpc64-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCh…
8 // RUN: %clang -target powerpc64le-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | File…
9 // Verify that -fsanitize=memory invokes msan instrumentation.
Desan.c1 // RUN: %clang -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
2 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
3 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
4 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
5 // RUN: %clang -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
6 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
7 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
8 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
9 // Verify that -fsanitize=efficiency-* invokes esan instrumentation.
Dasan.c1 // RUN: %clang -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck …
2 // RUN: %clang -O1 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck …
3 // RUN: %clang -O2 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck …
4 // RUN: %clang -O3 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck …
5 // RUN: %clang -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil…
6 // RUN: %clang -O1 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil…
7 // RUN: %clang -O2 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil…
8 // RUN: %clang -O3 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil…
9 // Verify that -fsanitize={address,kernel-address} invoke ASan and KASan instrumentation.
12 // CHECK-ASAN: __asan_init
[all …]
/external/perfetto/gn/standalone/sanitizers/
DBUILD.gn7 # http://www.apache.org/licenses/LICENSE-2.0
47 "-fno-omit-frame-pointer",
48 "-fsanitize-ignorelist=$ignorelist_path_",
53 cflags += [ "-fsanitize=address" ]
57 cflags += [ "-fsanitize=leak" ]
61 cflags += [ "-fsanitize=thread" ]
69 "-fsanitize=memory",
70 "-fsanitize-memory-track-origins=2",
76 "-fsanitize=bounds",
77 "-fsanitize=float-divide-by-zero",
[all …]
/external/angle/build/config/sanitizers/
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
28 # However the linker does not necessarily support `-wrap` on all POSIX
31 # noticed a need for it as the known-affected large fuzzers only run on Linux.
54 "$clang_base_path/bin/llvm-symbolizer${exe}",
86 "ASan is only supported in 64-bit builds on Windows.")
109 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll"
112 _clang_rt_dso_path = "windows/clang_rt.ubsan_dynamic-x86_64.dll"
132 "code-sign-file",
133 "--identity=" + ios_code_signing_identity,
134 "--output=" + rebase_path(outputs[0], root_build_dir),
[all …]
/external/clang/docs/
DUndefinedBehaviorSanitizer.rst12 UBSan modifies the program at compile-time to catch various kinds of undefined
17 * Conversion to, from, or between floating-point types which would
20 See the full list of available :ref:`checks <ubsan-checks>` below.
22 UBSan has an optional run-time library which provides better error reporting.
33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined``
38 .. code-block:: console
46 % clang++ -fsanitize=undefined test.cc
50 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan,
55 * execute a trap instruction (doesn't require UBSan run-time support).
59 .. code-block:: console
[all …]
DControlFlowIntegrity.rst22 To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``.
23 You can also enable a subset of available :ref:`schemes <cfi-schemes>`.
24 As currently implemented, all schemes rely on link-time optimization (LTO);
25 so it is required to specify ``-flto``, and the linker used must support LTO,
38 The ``-fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}`` flags
39 require that a ``-fvisibility=`` flag also be specified. This is because the
40 default visibility setting is ``-fvisibility=default``, which would disable
42 to specify ``-fvisibility=hidden``, which enables CFI checks for such classes.
44 Experimental support for :ref:`cross-DSO control flow integrity
45 <cfi-cross-dso>` exists that does not require classes to have hidden LTO
[all …]
/external/compiler-rt/test/msan/
Ddtor-vtable.cc1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
7 // RUN: %clangxx_msan %s -DVPTRA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
9 // RUN: %clangxx_msan %s -DVPTRCA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
11 // RUN: %clangxx_msan %s -DVPTRCB=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
13 // RUN: %clangxx_msan %s -DVPTRC=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
45 a->~A(); in main()
49 a->A_Foo(); in main()
53 c->~C(); in main()
[all …]
Ddtor-vtable-multiple-inheritance.cc1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
7 // RUN: %clangxx_msan %s -DCVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
9 // RUN: %clangxx_msan %s -DEAVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
11 // RUN: %clangxx_msan %s -DEDVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
21 this->A_Foo(); in ~A()
56 c->~C(); in main()
59 c->A_Foo(); in main()
64 e->~E(); in main()
[all …]
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/
Dbazel.rc3 # for platform-appropriate cxxopts
4 common --enable_platform_specific_config
6 build:windows --cxxopt='/std:c++14'
7 build:windows --host_cxxopt='/std:c++14'
8 build:linux --cxxopt='-std=c++14'
9 build:linux --host_cxxopt='-std=c++14'
10 build:macos --cxxopt='-std=c++14'
11 build:macos --host_cxxopt='-std=c++14'
12 build:freebsd --cxxopt='-std=c++14'
13 build:freebsd --host_cxxopt='-std=c++14'
[all …]
/external/grpc-grpc/tools/
Dbazel.rc5 common --enable_bzlmod=false
7 # for platform-appropriate cxxopts
8 common --enable_platform_specific_config
10 build:windows --cxxopt='/std:c++14'
11 build:windows --host_cxxopt='/std:c++14'
12 build:linux --cxxopt='-std=c++14'
13 build:linux --host_cxxopt='-std=c++14'
14 build:macos --cxxopt='-std=c++14'
15 build:macos --host_cxxopt='-std=c++14'
16 build:freebsd --cxxopt='-std=c++14'
[all …]
/external/clang/test/CodeGen/
Dsanitize-address-field-padding.cpp1 // Test -fsanitize-address-field-padding
2 // RUN: echo 'type:SomeNamespace::BlacklistedByName=field-padding' > %t.type.blacklist
3 // RUN: echo 'src:*sanitize-address-field-padding.cpp=field-padding' > %t.file.blacklist
4-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
5-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
6-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
7 // RUN: %clang_cc1 -fsanitize=address -emit-llvm -o - %s 2>&1 | FileCheck %s --check-prefix=NO_PADD…
8 // Try to emulate -save-temps option and make sure -disable-llvm-passes will not run sanitize instr…
9 …ang_cc1 -fsanitize=address -emit-llvm -disable-llvm-passes -o - %s | %clang_cc1 -fsanitize=address…
14 // CHECK: -fsanitize-address-field-padding applied to Positive1
[all …]
Dubsan-strip-path-components.cpp1 // RUN: %clang_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - | FileCheck %…
2-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
3-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
6 …_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip
7 …%s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path
10 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
11 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
13 …REGULAR: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{.*test(.|\…
16 …/ REMOVE-FIRST-TWO: @[[STR:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{(.:|…
17 // REMOVE-FIRST-TWO: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"[[REST…
[all …]
/external/compiler-rt/test/ubsan/TestCases/Integer/
Dshift.cpp1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %…
2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru…
3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %…
4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %…
5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run …
6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run …
7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %…
8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run …
9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run …
10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run …
[all …]
/external/grpc-grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
[all …]
/external/rust/android-crates-io/crates/grpcio-sys/grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
[all …]
/external/sdv/vsomeip/third_party/boost/regex/test/de_fuzz/
DJamfile.v212 -dict=dictionary.txt -workers=3 corpus -runs=5000
13 : # test-files
15 <toolset>clang <cxxflags>-fsanitize-coverage=trace-pc-guard
16 <cxxflags>-fsanitize=address <cxxflags>-fsanitize=undefined
17 <cxxflags>-fno-sanitize-recover=undefined <cxxflags>-fno-optimize-sibling-calls
18 <cxxflags>-fno-omit-frame-pointer
20 <linkflags>-fsanitize=address <linkflags>-fsanitize=undefined
26 -dict=dictionary.txt -workers=3 corpus -runs=5000
27 : # test-files
29 <toolset>clang <cxxflags>-fsanitize-coverage=trace-pc-guard
[all …]
/external/clang/lib/Driver/
DSanitizerArgs.cpp1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
8 //===----------------------------------------------------------------------===//
56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
68 /// would produce "-fsanitize=vptr".
75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
76 /// "-fsanitize=alignment".
80 /// Produce a string containing comma-separated names of sanitizers in \p
129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs()
[all …]
/external/compiler-rt/test/ubsan/TestCases/Misc/
Dcoverage-levels.cc6 // RUN: rm -rf %T/coverage-levels && mkdir %T/coverage-levels
7 // RUN: %clangxx -fsanitize=shift -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun…
8 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
9 // RUN: %clangxx -fsanitize=undefined -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun…
10 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
13 …N: %clangxx -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=func %…
14 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
16 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=func %s -o %t
17 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
18 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=bb %s -o %t
[all …]
/external/libhevc/cmake/
Dutils.cmake6 add_compile_options(-march=armv8-a)
8 add_compile_options(-march=armv7-a -mfpu=neon)
10 add_compile_options(-msse4.2 -mno-avx)
13 set(CMAKE_REQUIRED_FLAGS -fsanitize=fuzzer-no-link)
14 check_cxx_compiler_flag(-fsanitize=fuzzer-no-link
19 set(CMAKE_REQUIRED_FLAGS -fsanitize=${SANITIZE})
20 check_cxx_compiler_flag(-fsanitize=${SANITIZE} COMPILER_HAS_SANITIZER)
25 FATAL_ERROR "ERROR: Compiler doesn't support -fsanitize=${SANITIZE}")
28 add_compile_options(-fno-omit-frame-pointer -fsanitize=${SANITIZE})
36 add_definitions(-DARMV8 -DDEFAULT_ARCH=D_ARCH_ARMV8_GENERIC -DENABLE_NEON)
[all …]
/external/libmpeg2/cmake/
Dutils.cmake6 add_compile_options(-march=armv8-a)
8 add_compile_options(-march=armv7-a -mfpu=neon)
10 add_compile_options(-msse4.2 -mno-avx)
13 set(CMAKE_REQUIRED_FLAGS -fsanitize=fuzzer-no-link)
14 check_cxx_compiler_flag(-fsanitize=fuzzer-no-link
19 set(CMAKE_REQUIRED_FLAGS -fsanitize=${SANITIZE})
20 check_cxx_compiler_flag(-fsanitize=${SANITIZE} COMPILER_HAS_SANITIZER)
25 FATAL_ERROR "ERROR: Compiler doesn't support -fsanitize=${SANITIZE}")
28 add_compile_options(-fno-omit-frame-pointer -fsanitize=${SANITIZE})
36 add_definitions(-DARMV8 -DDEFAULT_ARCH=D_ARCH_ARMV8_GENERIC -DENABLE_NEON)
[all …]
/external/libprotobuf-mutator/
DCMakeLists.txt7 # http://www.apache.org/licenses/LICENSE-2.0
64 set(CMAKE_REQUIRED_FLAGS "-fsanitize=address")
65 check_cxx_compiler_flag(-fsanitize=address LIB_PROTO_MUTATOR_HAS_SANITIZE_ADDRESS)
66 check_cxx_compiler_flag("-fsanitize=address -fsanitize-address-use-after-scope"
70 set(CMAKE_REQUIRED_FLAGS "-fsanitize-coverage=0")
71 check_cxx_compiler_flag(-fsanitize-coverage= LIB_PROTO_MUTATOR_HAS_NO_COVERAGE)
74 set(CMAKE_REQUIRED_FLAGS "-fsanitize=fuzzer-no-link")
75 check_cxx_compiler_flag(-fsanitize=fuzzer-no-link LIB_PROTO_MUTATOR_HAS_SANITIZE_FUZZER)
78 set(CMAKE_REQUIRED_FLAGS "-fno-sanitize=fuzzer")
79 check_cxx_compiler_flag(-fno-sanitize=fuzzer LIB_PROTO_MUTATOR_HAS_NO_SANITIZE_FUZZER)
[all …]

12345678910>>...28