HomeSort by: relevance | last modified time | path
    Searched refs:violations (Results 1 - 3 of 3) sorted by relevancy

  /src/sys/external/isc/libsodium/dist/m4/
ax_check_catchable_segv.m4 7 # Check whether segmentation violations can be caught using signal handlers.
14 AC_CACHE_CHECK([whether segmentation violations can be caught when using the _AC_LANG compiler], CACHEVAR, [
38 [AC_DEFINE([HAVE_CATCHABLE_SEGV], [1], [Define if segmentation violations can be caught using signal handlers])],
39 [AC_MSG_WARN([On this platform, segmentation violations cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance.])]
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/scripts/
cpplint.py 1765 Additionally, check for constructor/destructor style violations and reference
  /src/sys/external/isc/libsodium/dist/
configure 8717 { $as_echo "$as_me:${as_lineno-$LINENO}: checking whether segmentation violations can be caught when using the C compiler" >&5
8718 $as_echo_n "checking whether segmentation violations can be caught when using the C compiler... " >&6; }
8772 { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: On this platform, segmentation violations cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance." >&5
8773 $as_echo "$as_me: WARNING: On this platform, segmentation violations cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance." >&2;}

Completed in 31 milliseconds