OpenGrok
Home
Sort by:
relevance
|
last modified time
|
path
Full Search
in project(s):
src
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:violations
(Results
1 - 3
of
3
) sorted by relevancy
/src/sys/external/isc/libsodium/dist/m4/
ax_check_catchable_segv.m4
7
# Check whether segmentation
violations
can be caught using signal handlers.
14
AC_CACHE_CHECK([whether segmentation
violations
can be caught when using the _AC_LANG compiler], CACHEVAR, [
38
[AC_DEFINE([HAVE_CATCHABLE_SEGV], [1], [Define if segmentation
violations
can be caught using signal handlers])],
39
[AC_MSG_WARN([On this platform, segmentation
violations
cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance.])]
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/scripts/
cpplint.py
1765
Additionally, check for constructor/destructor style
violations
and reference
/src/sys/external/isc/libsodium/dist/
configure
8717
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking whether segmentation
violations
can be caught when using the C compiler" >&5
8718
$as_echo_n "checking whether segmentation
violations
can be caught when using the C compiler... " >&6; }
8772
{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: On this platform, segmentation
violations
cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance." >&5
8773
$as_echo "$as_me: WARNING: On this platform, segmentation
violations
cannot be caught using signal handlers. This is expected if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Address Sanitizer may also significantly reduce performance." >&2;}
Completed in 31 milliseconds
Indexes created Fri Oct 17 17:09:57 GMT 2025