@ -95,6 +95,16 @@ LDXX_opt = $(DEFAULT_CXX)
CPPFLAGS_opt = -O2
DEFINES_opt = NDEBUG
VALID_CONFIG_asan-trace-cmp = 1
REQUIRE_CUSTOM_LIBRARIES_asan-trace-cmp = 1
CC_asan-trace-cmp = clang
CXX_asan-trace-cmp = clang++
LD_asan-trace-cmp = clang
LDXX_asan-trace-cmp = clang++
CPPFLAGS_asan-trace-cmp = -O0 -fsanitize-coverage= edge -fsanitize-coverage= trace-cmp -fsanitize= address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
LDFLAGS_asan-trace-cmp = -fsanitize= address
DEFINES_asan-trace-cmp += GRPC_TEST_SLOWDOWN_BUILD_FACTOR = 3
VALID_CONFIG_dbg = 1
CC_dbg = $( DEFAULT_CC)
CXX_dbg = $( DEFAULT_CXX)
@ -109,7 +119,7 @@ CC_easan = clang
CXX_easan = clang++
LD_easan = clang
LDXX_easan = clang++
CPPFLAGS_easan = -O0 -fsanitize= address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
CPPFLAGS_easan = -O0 -fsanitize-coverage= edge -fsanitize = address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
LDFLAGS_easan = -fsanitize= address
DEFINES_easan = _DEBUG DEBUG GRPC_EXECUTION_CONTEXT_SANITIZER
DEFINES_easan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR = 3
@ -120,7 +130,7 @@ CC_asan = clang
CXX_asan = clang++
LD_asan = clang
LDXX_asan = clang++
CPPFLAGS_asan = -O0 -fsanitize= address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
CPPFLAGS_asan = -O0 -fsanitize-coverage= edge -fsanitize = address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
LDFLAGS_asan = -fsanitize= address
DEFINES_asan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR = 3
@ -130,7 +140,7 @@ CC_msan = clang
CXX_msan = clang++
LD_msan = clang
LDXX_msan = clang++
CPPFLAGS_msan = -O0 -fsanitize= memory -fsanitize-memory-track-origins -fno-omit-frame-pointer -DGTEST_HAS_TR1_TUPLE= 0 -DGTEST_USE_OWN_TR1_TUPLE= 1 -Wno-unused-command-line-argument -fPIE -pie -DGPR_NO_DIRECT_SYSCALLS
CPPFLAGS_msan = -O0 -fsanitize-coverage= edge -fsanitize = memory -fsanitize-memory-track-origins -fno-omit-frame-pointer -DGTEST_HAS_TR1_TUPLE= 0 -DGTEST_USE_OWN_TR1_TUPLE= 1 -Wno-unused-command-line-argument -fPIE -pie -DGPR_NO_DIRECT_SYSCALLS
LDFLAGS_msan = -fsanitize= memory -DGTEST_HAS_TR1_TUPLE= 0 -DGTEST_USE_OWN_TR1_TUPLE= 1 -fPIE -pie $( if $( JENKINS_BUILD) ,-Wl$( comma) -Ttext-segment= 0x7e0000000000,)
DEFINES_msan = NDEBUG
DEFINES_msan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR = 4
@ -159,7 +169,7 @@ CC_asan-noleaks = clang
CXX_asan-noleaks = clang++
LD_asan-noleaks = clang
LDXX_asan-noleaks = clang++
CPPFLAGS_asan-noleaks = -O0 -fsanitize= address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
CPPFLAGS_asan-noleaks = -O0 -fsanitize-coverage= edge -fsanitize = address -fno-omit-frame-pointer -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
LDFLAGS_asan-noleaks = -fsanitize= address
DEFINES_asan-noleaks += GRPC_TEST_SLOWDOWN_BUILD_FACTOR = 3
@ -177,7 +187,7 @@ CC_ubsan = clang
CXX_ubsan = clang++
LD_ubsan = clang
LDXX_ubsan = clang++
CPPFLAGS_ubsan = -O1 -fsanitize= undefined -fno-omit-frame-pointer -Wno-unused-command-line-argument
CPPFLAGS_ubsan = -O1 -fsanitize-coverage= edge -fsanitize = undefined -fno-omit-frame-pointer -Wno-unused-command-line-argument
LDFLAGS_ubsan = -fsanitize= undefined
DEFINES_ubsan = NDEBUG
DEFINES_ubsan += GRPC_TEST_SLOWDOWN_BUILD_FACTOR = 1.5
@ -925,14 +935,17 @@ grpc_jwt_verifier_test: $(BINDIR)/$(CONFIG)/grpc_jwt_verifier_test
grpc_print_google_default_creds_token : $( BINDIR ) /$( CONFIG ) /grpc_print_google_default_creds_token
grpc_security_connector_test : $( BINDIR ) /$( CONFIG ) /grpc_security_connector_test
grpc_verify_jwt : $( BINDIR ) /$( CONFIG ) /grpc_verify_jwt
hpack_parser_fuzzer_test : $( BINDIR ) /$( CONFIG ) /hpack_parser_fuzzer_test
hpack_parser_test : $( BINDIR ) /$( CONFIG ) /hpack_parser_test
hpack_table_test : $( BINDIR ) /$( CONFIG ) /hpack_table_test
http_fuzzer_test : $( BINDIR ) /$( CONFIG ) /http_fuzzer_test
http_parser_test : $( BINDIR ) /$( CONFIG ) /http_parser_test
httpcli_format_request_test : $( BINDIR ) /$( CONFIG ) /httpcli_format_request_test
httpcli_test : $( BINDIR ) /$( CONFIG ) /httpcli_test
httpscli_test : $( BINDIR ) /$( CONFIG ) /httpscli_test
init_test : $( BINDIR ) /$( CONFIG ) /init_test
invalid_call_argument_test : $( BINDIR ) /$( CONFIG ) /invalid_call_argument_test
json_fuzzer_test : $( BINDIR ) /$( CONFIG ) /json_fuzzer_test
json_rewrite : $( BINDIR ) /$( CONFIG ) /json_rewrite
json_rewrite_test : $( BINDIR ) /$( CONFIG ) /json_rewrite_test
json_stream_error_test : $( BINDIR ) /$( CONFIG ) /json_stream_error_test
@ -966,6 +979,7 @@ transport_connectivity_state_test: $(BINDIR)/$(CONFIG)/transport_connectivity_st
transport_metadata_test : $( BINDIR ) /$( CONFIG ) /transport_metadata_test
transport_security_test : $( BINDIR ) /$( CONFIG ) /transport_security_test
udp_server_test : $( BINDIR ) /$( CONFIG ) /udp_server_test
uri_fuzzer_test : $( BINDIR ) /$( CONFIG ) /uri_fuzzer_test
uri_parser_test : $( BINDIR ) /$( CONFIG ) /uri_parser_test
workqueue_test : $( BINDIR ) /$( CONFIG ) /workqueue_test
alarm_cpp_test : $( BINDIR ) /$( CONFIG ) /alarm_cpp_test
@ -7786,6 +7800,38 @@ endif
e n d i f
HPACK_PARSER_FUZZER_TEST_SRC = \
test/core/transport/chttp2/hpack_parser_fuzzer_test.c \
HPACK_PARSER_FUZZER_TEST_OBJS = $( addprefix $( OBJDIR) /$( CONFIG) /, $( addsuffix .o, $( basename $( HPACK_PARSER_FUZZER_TEST_SRC) ) ) )
i f e q ( $( NO_SECURE ) , t r u e )
# You can't build secure targets if you don't have OpenSSL.
$(BINDIR)/$(CONFIG)/hpack_parser_fuzzer_test : openssl_dep_error
e l s e
$(BINDIR)/$(CONFIG)/hpack_parser_fuzzer_test : $( HPACK_PARSER_FUZZER_TEST_OBJS ) $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
$( E) " [LD] Linking $@ "
$( Q) mkdir -p ` dirname $@ `
$( Q) $( LDXX) $( LDFLAGS) $( HPACK_PARSER_FUZZER_TEST_OBJS) $( LIBDIR) /$( CONFIG) /libgrpc_test_util.a $( LIBDIR) /$( CONFIG) /libgrpc.a $( LIBDIR) /$( CONFIG) /libgpr_test_util.a $( LIBDIR) /$( CONFIG) /libgpr.a $( LDLIBS) $( LDLIBS_SECURE) -lFuzzer -o $( BINDIR) /$( CONFIG) /hpack_parser_fuzzer_test
e n d i f
$(OBJDIR)/$(CONFIG)/test/core/transport/chttp2/hpack_parser_fuzzer_test.o : $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
deps_hpack_parser_fuzzer_test : $( HPACK_PARSER_FUZZER_TEST_OBJS :.o =.dep )
i f n e q ( $( NO_SECURE ) , t r u e )
i f n e q ( $( NO_DEPS ) , t r u e )
-include $(HPACK_PARSER_FUZZER_TEST_OBJS : .o =.dep )
e n d i f
e n d i f
HPACK_PARSER_TEST_SRC = \
test/core/transport/chttp2/hpack_parser_test.c \
@ -7850,6 +7896,38 @@ endif
e n d i f
HTTP_FUZZER_TEST_SRC = \
test/core/http/fuzzer.c \
HTTP_FUZZER_TEST_OBJS = $( addprefix $( OBJDIR) /$( CONFIG) /, $( addsuffix .o, $( basename $( HTTP_FUZZER_TEST_SRC) ) ) )
i f e q ( $( NO_SECURE ) , t r u e )
# You can't build secure targets if you don't have OpenSSL.
$(BINDIR)/$(CONFIG)/http_fuzzer_test : openssl_dep_error
e l s e
$(BINDIR)/$(CONFIG)/http_fuzzer_test : $( HTTP_FUZZER_TEST_OBJS ) $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
$( E) " [LD] Linking $@ "
$( Q) mkdir -p ` dirname $@ `
$( Q) $( LDXX) $( LDFLAGS) $( HTTP_FUZZER_TEST_OBJS) $( LIBDIR) /$( CONFIG) /libgrpc_test_util.a $( LIBDIR) /$( CONFIG) /libgrpc.a $( LIBDIR) /$( CONFIG) /libgpr_test_util.a $( LIBDIR) /$( CONFIG) /libgpr.a $( LDLIBS) $( LDLIBS_SECURE) -lFuzzer -o $( BINDIR) /$( CONFIG) /http_fuzzer_test
e n d i f
$(OBJDIR)/$(CONFIG)/test/core/http/fuzzer.o : $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
deps_http_fuzzer_test : $( HTTP_FUZZER_TEST_OBJS :.o =.dep )
i f n e q ( $( NO_SECURE ) , t r u e )
i f n e q ( $( NO_DEPS ) , t r u e )
-include $(HTTP_FUZZER_TEST_OBJS : .o =.dep )
e n d i f
e n d i f
HTTP_PARSER_TEST_SRC = \
test/core/http/parser_test.c \
@ -8042,6 +8120,38 @@ endif
e n d i f
JSON_FUZZER_TEST_SRC = \
test/core/json/fuzzer.c \
JSON_FUZZER_TEST_OBJS = $( addprefix $( OBJDIR) /$( CONFIG) /, $( addsuffix .o, $( basename $( JSON_FUZZER_TEST_SRC) ) ) )
i f e q ( $( NO_SECURE ) , t r u e )
# You can't build secure targets if you don't have OpenSSL.
$(BINDIR)/$(CONFIG)/json_fuzzer_test : openssl_dep_error
e l s e
$(BINDIR)/$(CONFIG)/json_fuzzer_test : $( JSON_FUZZER_TEST_OBJS ) $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
$( E) " [LD] Linking $@ "
$( Q) mkdir -p ` dirname $@ `
$( Q) $( LDXX) $( LDFLAGS) $( JSON_FUZZER_TEST_OBJS) $( LIBDIR) /$( CONFIG) /libgrpc_test_util.a $( LIBDIR) /$( CONFIG) /libgrpc.a $( LIBDIR) /$( CONFIG) /libgpr_test_util.a $( LIBDIR) /$( CONFIG) /libgpr.a $( LDLIBS) $( LDLIBS_SECURE) -lFuzzer -o $( BINDIR) /$( CONFIG) /json_fuzzer_test
e n d i f
$(OBJDIR)/$(CONFIG)/test/core/json/fuzzer.o : $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
deps_json_fuzzer_test : $( JSON_FUZZER_TEST_OBJS :.o =.dep )
i f n e q ( $( NO_SECURE ) , t r u e )
i f n e q ( $( NO_DEPS ) , t r u e )
-include $(JSON_FUZZER_TEST_OBJS : .o =.dep )
e n d i f
e n d i f
JSON_REWRITE_SRC = \
test/core/json/json_rewrite.c \
@ -9098,6 +9208,38 @@ endif
e n d i f
URI_FUZZER_TEST_SRC = \
test/core/client_config/uri_fuzzer_test.c \
URI_FUZZER_TEST_OBJS = $( addprefix $( OBJDIR) /$( CONFIG) /, $( addsuffix .o, $( basename $( URI_FUZZER_TEST_SRC) ) ) )
i f e q ( $( NO_SECURE ) , t r u e )
# You can't build secure targets if you don't have OpenSSL.
$(BINDIR)/$(CONFIG)/uri_fuzzer_test : openssl_dep_error
e l s e
$(BINDIR)/$(CONFIG)/uri_fuzzer_test : $( URI_FUZZER_TEST_OBJS ) $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
$( E) " [LD] Linking $@ "
$( Q) mkdir -p ` dirname $@ `
$( Q) $( LDXX) $( LDFLAGS) $( URI_FUZZER_TEST_OBJS) $( LIBDIR) /$( CONFIG) /libgrpc_test_util.a $( LIBDIR) /$( CONFIG) /libgrpc.a $( LIBDIR) /$( CONFIG) /libgpr_test_util.a $( LIBDIR) /$( CONFIG) /libgpr.a $( LDLIBS) $( LDLIBS_SECURE) -lFuzzer -o $( BINDIR) /$( CONFIG) /uri_fuzzer_test
e n d i f
$(OBJDIR)/$(CONFIG)/test/core/client_config/uri_fuzzer_test.o : $( LIBDIR ) /$( CONFIG ) /libgrpc_test_util .a $( LIBDIR ) /$( CONFIG ) /libgrpc .a $( LIBDIR ) /$( CONFIG ) /libgpr_test_util .a $( LIBDIR ) /$( CONFIG ) /libgpr .a
deps_uri_fuzzer_test : $( URI_FUZZER_TEST_OBJS :.o =.dep )
i f n e q ( $( NO_SECURE ) , t r u e )
i f n e q ( $( NO_DEPS ) , t r u e )
-include $(URI_FUZZER_TEST_OBJS : .o =.dep )
e n d i f
e n d i f
URI_PARSER_TEST_SRC = \
test/core/client_config/uri_parser_test.c \