Searched +full:- +full:fno +full:- +full:sanitize (Results 1 – 25 of 52) sorted by relevance
123
| /third_party/musl/ndk-test/sanitize/ubsan/src/ |
| D | shift.cpp | 1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %… 2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru… 3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %… 4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %… 5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run … 6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run … 7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %… 8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run … 9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run … 10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run … [all …]
|
| D | nonnull.cpp | 1 // RUN: %clangxx -fsanitize=returns-nonnull-attribute -w %s -O3 -o %t 2 // RUN: %run %t foo 2>&1 | FileCheck %s --check-prefix=NOERROR --allow-empty --implicit-check-not='… 4 // RUN: %clangxx -fsanitize=returns-nonnull-attribute -fno-sanitize-recover=returns-nonnull-attribu… 11 // CHECK-NEXT: nonnull.cpp:[[@LINE-4]]:16: note: returns_nonnull attribute specified here in foo() 18 // CHECK-NEXT: nonnull.cpp:[[@LINE-3]]:16: note: returns_nonnull attribute specified here in bar() 22 // CHECK-NEXT: nonnull.cpp:[[@LINE-7]]:16: note: returns_nonnull attribute specified here in bar() 38 // CHECK-NOT: runtime error in main() 44 // NOERROR-NOT: runtime error
|
| /third_party/benchmark/.github/workflows/ |
| D | sanitizer.yml | 13 runs-on: ubuntu-latest 15 fail-fast: false 22 - uses: actions/checkout@v2 24 - name: configure msan env 27 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins… 30 - name: configure ubsan env 33 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=undefined -fno-sanitize-recover=all" >… 36 - name: configure asan env 39 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=address -fno-sanitize-recover=all" >> … 42 - name: configure tsan env [all …]
|
| /third_party/flutter/skia/gn/ |
| D | BUILD.gn | 3 # Use of this source code is governed by a BSD-style license that can be 44 cflags += [ "-Werror" ] 50 cflags += [ "--target=arm64-windows" ] 54 "/utf-8", # Set Source and Executable character sets to UTF-8. 57 cflags += [ "-fms-compatibility-version=19" ] # 2015 77 "-imsvc", 92 "-fstrict-aliasing", 93 "-fPIC", 95 cflags_cc += [ "-std=c++14" ] 98 # These would make stack traces worse on Linux, so we don't just set them willy-nilly. [all …]
|
| /third_party/json/test/thirdparty/Fuzzer/test/uninstrumented/ |
| D | CMakeLists.txt | 5 …"${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8b… 12 add_libfuzzer_test(${Test}-Uninstrumented SOURCES ../${Test}.cpp)
|
| /third_party/mbedtls/ |
| D | CMakeLists.txt | 4 # - Include directories: 13 # - MBEDTLS_TARGET_PREFIX: CMake targets are designed to be alterable by calling 50 option(GEN_FILES "Generate the auto-generated files as needed" OFF) 52 option(GEN_FILES "Generate the auto-generated files as needed" ON) 67 # Warning string - created as a list for compatibility with CMake 2.8 69 set(CTR_DRBG_128_BIT_KEY_WARN_L2 "**** Using 128-bit keys for CTR_DRBG limits the security of gene… 70 …BIT_KEY_WARN_L3 "**** keys and operations that use random values generated to 128-bit security\n") 93 # If 128-bit keys are configured for CTR_DRBG, display an appropriate warning 94 … ${MBEDTLS_PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/config.py -f ${CMAKE_CURRENT_SOU… 124 set(command ln -s ${target} ${link}) [all …]
|
| /third_party/pcre2/pcre2/maint/ |
| D | ManyConfigTests | 13 # -noasan skip the test that uses -fsanitize=address 14 # -nousan skip the test that uses -fsanitize=undefined 15 # -nodebug skip the test that uses --enable-debug 16 # -nojit skip all JIT tests 17 # -nojitmain skip non-valgrind JIT tests 18 # -nojitvalgrind skip JIT tests with valgrind 19 # -nomain skip all the main (non-JIT) set of tests 20 # -nomainvalgrind skip the main (non-JIT) valgrind tests 21 # -notmp skip the test in a temporary directory 22 # -novalgrind skip all the valgrind tests [all …]
|
| /third_party/cJSON/ |
| D | CMakeLists.txt | 23 -std=c89 24 -pedantic 25 -Wall 26 -Wextra 27 -Werror 28 -Wstrict-prototypes 29 -Wwrite-strings 30 -Wshadow 31 -Winit-self 32 -Wcast-align [all …]
|
| /third_party/benchmark/ |
| D | .travis.yml | 7 - compiler: gcc 11 - lcov 13 - compiler: gcc 17 - g++-multilib 18 - libc6:i386 20 - COMPILER=g++ 21 - C_COMPILER=gcc 22 - BUILD_TYPE=Debug 23 - BUILD_32_BITS=ON 24 - EXTRA_FLAGS="-m32" [all …]
|
| /third_party/openssl/fuzz/ |
| D | README.md | 7 --------- 13 ----------------------------------- 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 18 sudo apt-get install clang 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 25 CC=clang ./config enable-fuzz-libfuzzer \ 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 27 -DPEDANTIC enable-asan enable-ubsan no-shared \ 28 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \ 29 -fsanitize=fuzzer-no-link \ [all …]
|
| /third_party/cJSON/tests/ |
| D | CMakeLists.txt | 4 # Disable -Werror for Unity 7 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wno-error") 9 target_compile_options(unity PRIVATE "-Wno-error") 12 # Disable -fvisibility=hidden for Unity 15 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fvisibility=default") 17 target_compile_options(unity PRIVATE "-fvisibility=default") 20 …# Disable -fsanitize=float-divide-by-zero for Unity (GCC bug on x86 https://gcc.gnu.org/bugzilla/s… 23 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fno-sanitize=float-divide-by-zero") 25 target_compile_options(unity PRIVATE "-fno-sanitize=float-divide-by-zero") 28 # Disable -Wswitch-enum for Unity [all …]
|
| /third_party/libbpf/scripts/ |
| D | build-fuzzers.sh | 2 set -eux 4 SANITIZER=${SANITIZER:-address} 5 flags="-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITI… 7 export CC=${CC:-clang} 8 export CFLAGS=${CFLAGS:-$flags} 10 export CXX=${CXX:-clang++} 11 export CXXFLAGS=${CXXFLAGS:-$flags} 13 cd "$(dirname -- "$0")/.." 15 export OUT=${OUT:-"$(pwd)/out"} 16 mkdir -p "$OUT" [all …]
|
| /third_party/fsverity-utils/scripts/ |
| D | run-tests.sh | 2 # SPDX-License-Identifier: MIT 5 # Use of this source code is governed by an MIT-style 10 # Test script for fsverity-utils. Runs 'make check' in lots of configurations, 14 # fsverity-utils into a kvm-xfstests test appliance and run 15 # 'kvm-xfstests -c ext4,f2fs -g verity' 17 set -e -u -o pipefail 31 TMPDIR=$(mktemp -d -t libfsverity_test.XXXXXXXXX) 32 trap 'rm -r "$TMPDIR"' EXIT 36 echo "Starting fsverity-utils tests. See run-tests.log for full output." 37 rm -f run-tests.log [all …]
|
| /third_party/json/test/thirdparty/Fuzzer/test/ubsan/ |
| D | CMakeLists.txt | 1 # These tests are instrumented with ubsan in non-recovery mode. 4 "${LIBFUZZER_FLAGS_BASE} -fsanitize=undefined -fno-sanitize-recover=all") 11 add_libfuzzer_test(${Test}-Ubsan SOURCES ../${Test}.cpp)
|
| /third_party/libxml2/fuzz/ |
| D | README | 7 export CFLAGS="-g -fsanitize=fuzzer-no-link,address,undefined \ 8 -fno-sanitize-recover=all \ 9 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION" 13 ./configure --without-python 18 make -C fuzz fuzz-xml
|
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/kokoro/scripts/linux/ |
| D | build-docker.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 21 set -x 26 using clang-10.0.0 28 using gcc-9 36 if [[ ! -d "$dir" ]]; then 43 if [[ -d "$dir" ]]; then 44 rm -fr "$dir" 49 clone_if_missing https://github.com/KhronosGroup/SPIRV-Headers external/spirv-headers --depth=1 51 pushd external/googletest; git reset --hard 1fb1bb23bb8418dc73a5a9a82bbed31dc610fec7; popd [all …]
|
| /third_party/skia/third_party/externals/spirv-tools/kokoro/scripts/linux/ |
| D | build-docker.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 21 set -x 26 using clang-10.0.0 28 using gcc-9 36 if [[ ! -d "$dir" ]]; then 43 if [[ -d "$dir" ]]; then 44 rm -fr "$dir" 49 clone_if_missing https://github.com/KhronosGroup/SPIRV-Headers external/spirv-headers --depth=1 51 pushd external/googletest; git reset --hard 1fb1bb23bb8418dc73a5a9a82bbed31dc610fec7; popd [all …]
|
| /third_party/json/test/thirdparty/Fuzzer/ |
| D | CMakeLists.txt | 3 …CXX_FLAGS "${LIBFUZZER_FLAGS_BASE} -fno-sanitize-coverage=trace-pc-guard,edge,trace-cmp,indirect-c…
|
| /third_party/openssl/.github/workflows/ |
| D | run-checker-merge.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 8 name: Run-checker merge 16 run-checker: 18 fail-fast: false 21 enable-asan no-shared no-asm -DOPENSSL_SMALL_FOOTPRINT, 22 no-dgram, 23 no-dso, 24 no-dynamic-engine, 25 no-engine no-shared, 26 no-err, [all …]
|
| D | fuzz-checker.yml | 1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved. 8 name: Fuzz-checker CI 16 fuzz-checker: 18 fail-fast: false 23 config: enable-fuzz-afl no-module, 24 install: afl++-clang, 25 cc: afl-clang-fast 28 config: enable-fuzz-libfuzzer enable-asan enable-ubsan, 29 …libs: --with-fuzzer-lib=/usr/lib/llvm-12/lib/libFuzzer.a --with-fuzzer-include=/usr/lib/llvm-12/bu… 30 install: libfuzzer-12-dev, [all …]
|
| /third_party/json/test/thirdparty/Fuzzer/test/no-coverage/ |
| D | CMakeLists.txt | 5 …"${LIBFUZZER_FLAGS_BASE} -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8bit-counters,trace-… 12 add_libfuzzer_test(${Test}-NoCoverage SOURCES ../${Test}.cpp)
|
| /third_party/skia/third_party/externals/abseil-cpp/ci/ |
| D | linux_clang-latest_libcxx_tsan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC… [all …]
|
| D | linux_clang-latest_libcxx_asan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC… [all …]
|
| /third_party/elfutils/ |
| D | configure.ac | 2 dnl Configure input file for elfutils. -*-autoconf-*- 4 dnl Copyright (C) 1996-2019 Red Hat, Inc. 32 # We want eu- as default program prefix if none was given by the user. 33 # But if the user explicitly provided --program-prefix="" then pretend 38 AC_MSG_NOTICE([No --program-prefix given, using "eu-"]) 39 program_prefix="eu-" 41 AC_MSG_NOTICE([Using no program-prefix]) 48 AC_COPYRIGHT([Copyright (C) 1996-2022 The elfutils developers.]) 51 dnl We use GNU make extensions; automake 1.10 defaults to -Wportability. 52 AM_INIT_AUTOMAKE([gnits 1.11 -Wno-portability dist-bzip2 no-dist-gzip parallel-tests]) [all …]
|
| /third_party/nghttp2/.github/workflows/ |
| D | build.yml | 9 os: [ubuntu-22.04, macos-11] 12 http3: [http3, no-http3] 15 - os: macos-11 17 - http3: no-http3 19 - os: macos-11 21 - # disable macos cmake because of include path issue 22 os: macos-11 24 - os: macos-11 26 - openssl: boringssl 28 - openssl: boringssl [all …]
|
123