Home
last modified time | relevance | path

Searched +full:- +full:fno +full:- +full:sanitize (Results 1 – 25 of 52) sorted by relevance

123

/third_party/musl/ndk-test/sanitize/ubsan/src/
Dshift.cpp1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %…
2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru…
3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %…
4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %…
5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run …
6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run …
7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %…
8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run …
9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run …
10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run …
[all …]
Dnonnull.cpp1 // RUN: %clangxx -fsanitize=returns-nonnull-attribute -w %s -O3 -o %t
2 // RUN: %run %t foo 2>&1 | FileCheck %s --check-prefix=NOERROR --allow-empty --implicit-check-not='…
4 // RUN: %clangxx -fsanitize=returns-nonnull-attribute -fno-sanitize-recover=returns-nonnull-attribu…
11 // CHECK-NEXT: nonnull.cpp:[[@LINE-4]]:16: note: returns_nonnull attribute specified here in foo()
18 // CHECK-NEXT: nonnull.cpp:[[@LINE-3]]:16: note: returns_nonnull attribute specified here in bar()
22 // CHECK-NEXT: nonnull.cpp:[[@LINE-7]]:16: note: returns_nonnull attribute specified here in bar()
38 // CHECK-NOT: runtime error in main()
44 // NOERROR-NOT: runtime error
/third_party/benchmark/.github/workflows/
Dsanitizer.yml13 runs-on: ubuntu-latest
15 fail-fast: false
22 - uses: actions/checkout@v2
24 - name: configure msan env
27 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins…
30 - name: configure ubsan env
33 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=undefined -fno-sanitize-recover=all" >…
36 - name: configure asan env
39 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=address -fno-sanitize-recover=all" >> …
42 - name: configure tsan env
[all …]
/third_party/flutter/skia/gn/
DBUILD.gn3 # Use of this source code is governed by a BSD-style license that can be
44 cflags += [ "-Werror" ]
50 cflags += [ "--target=arm64-windows" ]
54 "/utf-8", # Set Source and Executable character sets to UTF-8.
57 cflags += [ "-fms-compatibility-version=19" ] # 2015
77 "-imsvc",
92 "-fstrict-aliasing",
93 "-fPIC",
95 cflags_cc += [ "-std=c++14" ]
98 # These would make stack traces worse on Linux, so we don't just set them willy-nilly.
[all …]
/third_party/json/test/thirdparty/Fuzzer/test/uninstrumented/
DCMakeLists.txt5 …"${LIBFUZZER_FLAGS_BASE} -fno-sanitize=all -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8b…
12 add_libfuzzer_test(${Test}-Uninstrumented SOURCES ../${Test}.cpp)
/third_party/mbedtls/
DCMakeLists.txt4 # - Include directories:
13 # - MBEDTLS_TARGET_PREFIX: CMake targets are designed to be alterable by calling
50 option(GEN_FILES "Generate the auto-generated files as needed" OFF)
52 option(GEN_FILES "Generate the auto-generated files as needed" ON)
67 # Warning string - created as a list for compatibility with CMake 2.8
69 set(CTR_DRBG_128_BIT_KEY_WARN_L2 "**** Using 128-bit keys for CTR_DRBG limits the security of gene…
70 …BIT_KEY_WARN_L3 "**** keys and operations that use random values generated to 128-bit security\n")
93 # If 128-bit keys are configured for CTR_DRBG, display an appropriate warning
94 … ${MBEDTLS_PYTHON_EXECUTABLE} ${CMAKE_CURRENT_SOURCE_DIR}/scripts/config.py -f ${CMAKE_CURRENT_SOU…
124 set(command ln -s ${target} ${link})
[all …]
/third_party/pcre2/pcre2/maint/
DManyConfigTests13 # -noasan skip the test that uses -fsanitize=address
14 # -nousan skip the test that uses -fsanitize=undefined
15 # -nodebug skip the test that uses --enable-debug
16 # -nojit skip all JIT tests
17 # -nojitmain skip non-valgrind JIT tests
18 # -nojitvalgrind skip JIT tests with valgrind
19 # -nomain skip all the main (non-JIT) set of tests
20 # -nomainvalgrind skip the main (non-JIT) valgrind tests
21 # -notmp skip the test in a temporary directory
22 # -novalgrind skip all the valgrind tests
[all …]
/third_party/cJSON/
DCMakeLists.txt23 -std=c89
24 -pedantic
25 -Wall
26 -Wextra
27 -Werror
28 -Wstrict-prototypes
29 -Wwrite-strings
30 -Wshadow
31 -Winit-self
32 -Wcast-align
[all …]
/third_party/benchmark/
D.travis.yml7 - compiler: gcc
11 - lcov
13 - compiler: gcc
17 - g++-multilib
18 - libc6:i386
20 - COMPILER=g++
21 - C_COMPILER=gcc
22 - BUILD_TYPE=Debug
23 - BUILD_32_BITS=ON
24 - EXTRA_FLAGS="-m32"
[all …]
/third_party/openssl/fuzz/
DREADME.md7 ---------
13 -----------------------------------
15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage)
18 sudo apt-get install clang
23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`.
25 CC=clang ./config enable-fuzz-libfuzzer \
26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
27 -DPEDANTIC enable-asan enable-ubsan no-shared \
28 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \
29 -fsanitize=fuzzer-no-link \
[all …]
/third_party/cJSON/tests/
DCMakeLists.txt4 # Disable -Werror for Unity
7 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wno-error")
9 target_compile_options(unity PRIVATE "-Wno-error")
12 # Disable -fvisibility=hidden for Unity
15 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fvisibility=default")
17 target_compile_options(unity PRIVATE "-fvisibility=default")
20 …# Disable -fsanitize=float-divide-by-zero for Unity (GCC bug on x86 https://gcc.gnu.org/bugzilla/s…
23 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fno-sanitize=float-divide-by-zero")
25 target_compile_options(unity PRIVATE "-fno-sanitize=float-divide-by-zero")
28 # Disable -Wswitch-enum for Unity
[all …]
/third_party/libbpf/scripts/
Dbuild-fuzzers.sh2 set -eux
4 SANITIZER=${SANITIZER:-address}
5 flags="-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITI…
7 export CC=${CC:-clang}
8 export CFLAGS=${CFLAGS:-$flags}
10 export CXX=${CXX:-clang++}
11 export CXXFLAGS=${CXXFLAGS:-$flags}
13 cd "$(dirname -- "$0")/.."
15 export OUT=${OUT:-"$(pwd)/out"}
16 mkdir -p "$OUT"
[all …]
/third_party/fsverity-utils/scripts/
Drun-tests.sh2 # SPDX-License-Identifier: MIT
5 # Use of this source code is governed by an MIT-style
10 # Test script for fsverity-utils. Runs 'make check' in lots of configurations,
14 # fsverity-utils into a kvm-xfstests test appliance and run
15 # 'kvm-xfstests -c ext4,f2fs -g verity'
17 set -e -u -o pipefail
31 TMPDIR=$(mktemp -d -t libfsverity_test.XXXXXXXXX)
32 trap 'rm -r "$TMPDIR"' EXIT
36 echo "Starting fsverity-utils tests. See run-tests.log for full output."
37 rm -f run-tests.log
[all …]
/third_party/json/test/thirdparty/Fuzzer/test/ubsan/
DCMakeLists.txt1 # These tests are instrumented with ubsan in non-recovery mode.
4 "${LIBFUZZER_FLAGS_BASE} -fsanitize=undefined -fno-sanitize-recover=all")
11 add_libfuzzer_test(${Test}-Ubsan SOURCES ../${Test}.cpp)
/third_party/libxml2/fuzz/
DREADME7 export CFLAGS="-g -fsanitize=fuzzer-no-link,address,undefined \
8 -fno-sanitize-recover=all \
9 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION"
13 ./configure --without-python
18 make -C fuzz fuzz-xml
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/kokoro/scripts/linux/
Dbuild-docker.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
21 set -x
26 using clang-10.0.0
28 using gcc-9
36 if [[ ! -d "$dir" ]]; then
43 if [[ -d "$dir" ]]; then
44 rm -fr "$dir"
49 clone_if_missing https://github.com/KhronosGroup/SPIRV-Headers external/spirv-headers --depth=1
51 pushd external/googletest; git reset --hard 1fb1bb23bb8418dc73a5a9a82bbed31dc610fec7; popd
[all …]
/third_party/skia/third_party/externals/spirv-tools/kokoro/scripts/linux/
Dbuild-docker.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
21 set -x
26 using clang-10.0.0
28 using gcc-9
36 if [[ ! -d "$dir" ]]; then
43 if [[ -d "$dir" ]]; then
44 rm -fr "$dir"
49 clone_if_missing https://github.com/KhronosGroup/SPIRV-Headers external/spirv-headers --depth=1
51 pushd external/googletest; git reset --hard 1fb1bb23bb8418dc73a5a9a82bbed31dc610fec7; popd
[all …]
/third_party/json/test/thirdparty/Fuzzer/
DCMakeLists.txt3 …CXX_FLAGS "${LIBFUZZER_FLAGS_BASE} -fno-sanitize-coverage=trace-pc-guard,edge,trace-cmp,indirect-c…
/third_party/openssl/.github/workflows/
Drun-checker-merge.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
8 name: Run-checker merge
16 run-checker:
18 fail-fast: false
21 enable-asan no-shared no-asm -DOPENSSL_SMALL_FOOTPRINT,
22 no-dgram,
23 no-dso,
24 no-dynamic-engine,
25 no-engine no-shared,
26 no-err,
[all …]
Dfuzz-checker.yml1 # Copyright 2021-2022 The OpenSSL Project Authors. All Rights Reserved.
8 name: Fuzz-checker CI
16 fuzz-checker:
18 fail-fast: false
23 config: enable-fuzz-afl no-module,
24 install: afl++-clang,
25 cc: afl-clang-fast
28 config: enable-fuzz-libfuzzer enable-asan enable-ubsan,
29 …libs: --with-fuzzer-lib=/usr/lib/llvm-12/lib/libFuzzer.a --with-fuzzer-include=/usr/lib/llvm-12/bu…
30 install: libfuzzer-12-dev,
[all …]
/third_party/json/test/thirdparty/Fuzzer/test/no-coverage/
DCMakeLists.txt5 …"${LIBFUZZER_FLAGS_BASE} -fno-sanitize-coverage=edge,trace-cmp,indirect-calls,8bit-counters,trace-
12 add_libfuzzer_test(${Test}-NoCoverage SOURCES ../${Test}.cpp)
/third_party/skia/third_party/externals/abseil-cpp/ci/
Dlinux_clang-latest_libcxx_tsan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [[ -z ${ABSEIL_ROOT:-} ]]; then
27 if [[ -z ${STD:-} ]]; then
31 if [[ -z ${COMPILATION_MODE:-} ]]; then
35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then
45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC…
[all …]
Dlinux_clang-latest_libcxx_asan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [[ -z ${ABSEIL_ROOT:-} ]]; then
27 if [[ -z ${STD:-} ]]; then
31 if [[ -z ${COMPILATION_MODE:-} ]]; then
35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then
45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC…
[all …]
/third_party/elfutils/
Dconfigure.ac2 dnl Configure input file for elfutils. -*-autoconf-*-
4 dnl Copyright (C) 1996-2019 Red Hat, Inc.
32 # We want eu- as default program prefix if none was given by the user.
33 # But if the user explicitly provided --program-prefix="" then pretend
38 AC_MSG_NOTICE([No --program-prefix given, using "eu-"])
39 program_prefix="eu-"
41 AC_MSG_NOTICE([Using no program-prefix])
48 AC_COPYRIGHT([Copyright (C) 1996-2022 The elfutils developers.])
51 dnl We use GNU make extensions; automake 1.10 defaults to -Wportability.
52 AM_INIT_AUTOMAKE([gnits 1.11 -Wno-portability dist-bzip2 no-dist-gzip parallel-tests])
[all …]
/third_party/nghttp2/.github/workflows/
Dbuild.yml9 os: [ubuntu-22.04, macos-11]
12 http3: [http3, no-http3]
15 - os: macos-11
17 - http3: no-http3
19 - os: macos-11
21 - # disable macos cmake because of include path issue
22 os: macos-11
24 - os: macos-11
26 - openssl: boringssl
28 - openssl: boringssl
[all …]

123