/external/clang/test/Driver/ |
D | fsanitize-coverage.c | 1 …N: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileChe… 2 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -###… 3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-pref… 4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type 5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address 7 … %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCh… 8 …: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCh… 9 …N: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileChe… 10 …%clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileC… 11 …N: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileChe… [all …]
|
D | fsanitize.c | 1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | … 2 …-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-… 3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&… 4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### … 5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### … 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
D | fsanitize-blacklist.c | 4 // REQUIRES: clang-driver, shell 6 // Make sure we don't match the -NOT lines with the linker invocation. 15 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s… 16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second 18 // Now, check for -fdepfile-entry flags. 19 …-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s… 20 // CHECK-BLACKLIST2: -fdepfile-entry={{.*}}.good" "-fdepfile-entry={{.*}}.second 23 …-target x86_64-linux-gnu -fsanitize=address -resource-dir=%S/Inputs/resource_dir %s -### 2>&1 | Fi… 24 // CHECK-DEFAULT-BLACKLIST: -fsanitize-blacklist={{.*}}asan_blacklist.txt 26 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag. [all …]
|
D | sanitizer-ld.c | 3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \ 4 // RUN: -target i386-unknown-linux -fsanitize=address \ 5 // RUN: -resource-dir=%S/Inputs/resource_dir \ 6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \ 7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s 9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 10 // CHECK-ASAN-LINUX-NOT: "-lc" 11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a" 12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic" 13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms" [all …]
|
D | msan.c | 1 // RUN: %clang -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 2 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 3 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 4 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 5 // RUN: %clang -target mips64-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCheck %s 6 // RUN: %clang -target mips64el-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileChe… 7 // RUN: %clang -target powerpc64-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCh… 8 // RUN: %clang -target powerpc64le-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | File… 9 // Verify that -fsanitize=memory invokes msan instrumentation.
|
D | esan.c | 1 // RUN: %clang -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -… 2 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -… 3 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -… 4 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -… 5 // RUN: %clang -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm … 6 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm … 7 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm … 8 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm … 9 // Verify that -fsanitize=efficiency-* invokes esan instrumentation.
|
D | asan.c | 1 // RUN: %clang -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 2 // RUN: %clang -O1 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 3 // RUN: %clang -O2 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 4 // RUN: %clang -O3 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 5 // RUN: %clang -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 6 // RUN: %clang -O1 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 7 // RUN: %clang -O2 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 8 // RUN: %clang -O3 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 9 // Verify that -fsanitize={address,kernel-address} invoke ASan and KASan instrumentation. 12 // CHECK-ASAN: __asan_init [all …]
|
D | sanitize_unwind_tables.c | 4 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s 5 // RUN: %clang -target i686-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s 6 // RUN: %clang -target arm-linux-androideabi -fsanitize=address %s -### 2>&1 | FileCheck %s 7 // RUN: %clang -target x86_64-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s 8 // RUN: %clang -target x86_64-linux-gnu -fsanitize=thread %s -### 2>&1 | FileCheck %s 9 // RUN: %clang -target x86_64-linux-gnu -fsanitize=dataflow %s -### 2>&1 | FileCheck %s 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=efficiency-cache-frag %s -### 2>&1 | FileCheck … 11 // RUN: %clang -target x86_64-linux-gnu -fsanitize=efficiency-working-set %s -### 2>&1 | FileCheck… 13 // CHECK: -munwind-tables
|
D | rtti-options.cpp | 4 // the vptr sanitizer with -fno-rtti 6 // Special cases: -fcxx-exceptions in C code should warn about unused arguments 7 // We should also not have any rtti-related arguments 8 …g -x c -### -target x86_64-scei-ps4 -c -fcxx-exceptions %s 2>&1 | FileCheck -check-prefix=CHECK-UN… 9 …-x c -### -target x86_64-unknown-unknown -c -fcxx-exceptions %s 2>&1 | FileCheck -check-prefix=CHE… 11 // Make sure we keep the last -frtti/-fno-rtti argument 12 // RUN: %clang -### -c -fno-rtti -frtti %s 2>&1 | FileCheck -check-prefix=CHECK-RTTI %s 13 // RUN: %clang -### -c -frtti -fno-rtti %s 2>&1 | FileCheck -check-prefix=CHECK-NO-RTTI %s 15 // -fsanitize=vptr 17 // undefined and have -fno-rtti [all …]
|
/external/perfetto/gn/standalone/sanitizers/ |
D | BUILD.gn | 7 # http://www.apache.org/licenses/LICENSE-2.0 47 "-fno-omit-frame-pointer", 48 "-fsanitize-blacklist=$blacklist_path_", 53 cflags += [ "-fsanitize=address" ] 57 cflags += [ "-fsanitize=leak" ] 61 cflags += [ "-fsanitize=thread" ] 69 "-fsanitize=memory", 70 "-fsanitize-memory-track-origins=2", 76 "-fsanitize=bounds", 77 "-fsanitize=float-divide-by-zero", [all …]
|
/external/clang/docs/ |
D | UndefinedBehaviorSanitizer.rst | 12 UBSan modifies the program at compile-time to catch various kinds of undefined 17 * Conversion to, from, or between floating-point types which would 20 See the full list of available :ref:`checks <ubsan-checks>` below. 22 UBSan has an optional run-time library which provides better error reporting. 33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined`` 38 .. code-block:: console 46 % clang++ -fsanitize=undefined test.cc 50 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan, 55 * execute a trap instruction (doesn't require UBSan run-time support). 59 .. code-block:: console [all …]
|
D | ControlFlowIntegrity.rst | 22 To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``. 23 You can also enable a subset of available :ref:`schemes <cfi-schemes>`. 24 As currently implemented, all schemes rely on link-time optimization (LTO); 25 so it is required to specify ``-flto``, and the linker used must support LTO, 38 The ``-fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}`` flags 39 require that a ``-fvisibility=`` flag also be specified. This is because the 40 default visibility setting is ``-fvisibility=default``, which would disable 42 to specify ``-fvisibility=hidden``, which enables CFI checks for such classes. 44 Experimental support for :ref:`cross-DSO control flow integrity 45 <cfi-cross-dso>` exists that does not require classes to have hidden LTO [all …]
|
/external/compiler-rt/test/msan/ |
D | dtor-vtable.cc | 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 7 // RUN: %clangxx_msan %s -DVPTRA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && … 9 // RUN: %clangxx_msan %s -DVPTRCA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&… 11 // RUN: %clangxx_msan %s -DVPTRCB=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&… 13 // RUN: %clangxx_msan %s -DVPTRC=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && … 45 a->~A(); in main() 49 a->A_Foo(); in main() 53 c->~C(); in main() [all …]
|
D | dtor-vtable-multiple-inheritance.cc | 1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 7 // RUN: %clangxx_msan %s -DCVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && … 9 // RUN: %clangxx_msan %s -DEAVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&… 11 // RUN: %clangxx_msan %s -DEDVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&… 21 this->A_Foo(); in ~A() 56 c->~C(); in main() 59 c->A_Foo(); in main() 64 e->~E(); in main() [all …]
|
D | use-after-dtor.cc | 1 // RUN: %clangxx_msan %s -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=p… 4 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 7 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 10 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -fsanitize-memory-t… 11 // RUN: FileCheck %s --check-prefix=CHECK-ORIGINS < %t.out 33 s->~Simple(); in main() 35 return s->x_; in main() 37 // CHECK: WARNING: MemorySanitizer: use-of-uninitialized-value in main() 38 // CHECK: {{#0 0x.* in main.*use-after-dtor.cc:}}[[@LINE-3]] in main() 40 // CHECK-ORIGINS: Memory was marked as uninitialized in main() [all …]
|
D | dtor-member.cc | 1 // RUN: %clangxx_msan %s -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIONS=p… 4 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 7 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO… 10 // RUN: %clangxx_msan %s -fsanitize=memory -o %t && MSAN_OPTIONS=poison_in_dtor=1 %run %t >%t.out … 11 // RUN: FileCheck %s --check-prefix=CHECK-NO-FLAG < %t.out 13 // RUN: %clangxx_msan -fsanitize=memory -fsanitize-memory-use-after-dtor %s -o %t && MSAN_OPTIONS=p… 14 // RUN: FileCheck %s --check-prefix=CHECK-NO-FLAG < %t.out 38 s->~Simple(); in main() 40 if (__msan_test_shadow(s, sizeof(*s)) != -1) in main() 45 // CHECK-NO-FLAG: s is not poisoned in main()
|
/external/clang/test/CodeGen/ |
D | sanitize-address-field-padding.cpp | 1 // Test -fsanitize-address-field-padding 2 // RUN: echo 'type:SomeNamespace::BlacklistedByName=field-padding' > %t.type.blacklist 3 // RUN: echo 'src:*sanitize-address-field-padding.cpp=field-padding' > %t.file.blacklist 4 …-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl… 5 …-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl… 6 …-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl… 7 // RUN: %clang_cc1 -fsanitize=address -emit-llvm -o - %s 2>&1 | FileCheck %s --check-prefix=NO_PADD… 8 // Try to emulate -save-temps option and make sure -disable-llvm-passes will not run sanitize instr… 9 …ang_cc1 -fsanitize=address -emit-llvm -disable-llvm-passes -o - %s | %clang_cc1 -fsanitize=address… 14 // CHECK: -fsanitize-address-field-padding applied to Positive1 [all …]
|
D | ubsan-strip-path-components.cpp | 1 // RUN: %clang_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - | FileCheck %… 2 …-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co… 3 …-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co… 6 …_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip… 7 …%s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path… 10 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat… 11 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat… 13 …REGULAR: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{.*test(.|\… 16 …/ REMOVE-FIRST-TWO: @[[STR:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{(.:|… 17 // REMOVE-FIRST-TWO: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"[[REST… [all …]
|
/external/grpc-grpc/tools/ |
D | bazel.rc | 1 build --client_env=CC=clang 2 build --copt -DGRPC_BAZEL_BUILD 4 build:opt --copt -Wframe-larger-than=16384 6 build:asan --strip=never 7 build:asan --copt -fsanitize-coverage=edge 8 build:asan --copt -fsanitize=address 9 build:asan --copt -O0 10 build:asan --copt -fno-omit-frame-pointer 11 build:asan --copt -DGPR_NO_DIRECT_SYSCALLS 12 build:asan --linkopt -fsanitize=address [all …]
|
/external/compiler-rt/test/ubsan/TestCases/Integer/ |
D | shift.cpp | 1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %… 2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru… 3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %… 4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %… 5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run … 6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run … 7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %… 8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run … 9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run … 10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run … [all …]
|
/external/libprotobuf-mutator/ |
D | CMakeLists.txt | 7 # http://www.apache.org/licenses/LICENSE-2.0 47 set(CMAKE_REQUIRED_FLAGS "-fsanitize=address") 48 check_cxx_compiler_flag(-fsanitize=address LIB_PROTO_MUTATOR_HAS_SANITIZE_ADDRESS) 49 check_cxx_compiler_flag("-fsanitize=address -fsanitize-address-use-after-scope" 53 set(CMAKE_REQUIRED_FLAGS "-fsanitize-coverage=0") 54 check_cxx_compiler_flag(-fsanitize-coverage= LIB_PROTO_MUTATOR_HAS_NO_COVERAGE) 57 set(CMAKE_REQUIRED_FLAGS "-fsanitize=fuzzer-no-link") 58 check_cxx_compiler_flag(-fsanitize=fuzzer-no-link LIB_PROTO_MUTATOR_HAS_SANITIZE_FUZZER) 61 set(CMAKE_REQUIRED_FLAGS "-fno-sanitize=fuzzer") 62 check_cxx_compiler_flag(-fno-sanitize=fuzzer LIB_PROTO_MUTATOR_HAS_NO_SANITIZE_FUZZER) [all …]
|
/external/clang/lib/Driver/ |
D | SanitizerArgs.cpp | 1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===// 8 //===----------------------------------------------------------------------===// 56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any 61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid 67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt 68 /// would produce "-fsanitize=vptr". 75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce 76 /// "-fsanitize=alignment". 80 /// Produce a string containing comma-separated names of sanitizers in \p 129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs() [all …]
|
/external/compiler-rt/test/ubsan/TestCases/Misc/ |
D | coverage-levels.cc | 6 // RUN: rm -rf %T/coverage-levels && mkdir %T/coverage-levels 7 // RUN: %clangxx -fsanitize=shift -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun… 8 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 9 // RUN: %clangxx -fsanitize=undefined -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun… 10 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 13 …N: %clangxx -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=func %… 14 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 16 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=func %s -o %t 17 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 18 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=bb %s -o %t [all …]
|
/external/swiftshader/third_party/subzero/tests_lit/asan_tests/ |
D | errors.ll | 6 ; RUN: llvm-as %s -o - | pnacl-freeze > %t.pexe && %S/../../pydir/szbuild.py \ 7 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 8 ; RUN: %t.pexe -o %t && %t 2>&1 | FileCheck --check-prefix=LOCAL-LOAD %s 9 ; RUN: llvm-as %s -o - | pnacl-freeze > %t.pexe && %S/../../pydir/szbuild.py \ 10 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ 11 ; RUN: %t.pexe -o %t && %t 2>&1 | FileCheck --check-prefix=LOCAL-LOAD %s 14 ; RUN: llvm-as %s -o - | pnacl-freeze > %t.pexe && %S/../../pydir/szbuild.py \ 15 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 16 ; RUN: %t.pexe -o %t && %t 1 2>&1 | FileCheck --check-prefix=LOCAL-LOAD %s 17 ; RUN: llvm-as %s -o - | pnacl-freeze > %t.pexe && %S/../../pydir/szbuild.py \ [all …]
|
/external/harfbuzz_ng/.circleci/ |
D | config.yml | 5 macos-10.12.6-aat-fonts: 9 - checkout 10 … - run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget pkg-config libtool ragel freetype glib cairo 11 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo 12 - run: make -j4 13 - run: make check || .ci/fail.sh 15 macos-10.13.6-aat-fonts: 19 - checkout 20 … - run: HOMEBREW_NO_AUTO_UPDATE=1 brew install wget pkg-config libtool ragel freetype glib cairo 21 - run: ./autogen.sh --with-freetype --with-glib --with-gobject --with-cairo [all …]
|