Home
last modified time | relevance | path

Searched +full:- +full:fno +full:- +full:sanitize +full:- +full:recover (Results 1 – 25 of 38) sorted by relevance

12

/external/compiler-rt/test/ubsan/TestCases/Integer/
Dshift.cpp1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %…
2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru…
3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %…
4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %…
5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run …
6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run …
7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %…
8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run …
9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run …
10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run …
[all …]
Dno-recover.cpp1 // RUN: %clangxx -fsanitize=unsigned-integer-overflow %s -o %t && %run %t 2>&1 | FileCheck %s --che…
2-fsanitize=unsigned-integer-overflow -fno-sanitize-recover=all -fsanitize-recover=unsigned-integer
3 …clangxx -fsanitize=unsigned-integer-overflow -fno-sanitize-recover=unsigned-integer-overflow %s -o…
11 // RECOVER-NOT: runtime error in main()
12 // ABORT-NOT: runtime error in main()
16 …// RECOVER: no-recover.cpp:[[@LINE-1]]:5: runtime error: unsigned integer overflow: 2271560481 + 3… in main()
17 …// ABORT: no-recover.cpp:[[@LINE-2]]:5: runtime error: unsigned integer overflow: 2271560481 + 398… in main()
20 …// RECOVER: 10000000000000000000 + 9000000000000000000 cannot be represented in type 'unsigned {{l… in main()
21 // ABORT-NOT: runtime error in main()
Dsuppressions.cpp1 // RUN: %clangxx -fsanitize=integer -g0 %s -o %t
3 // Suppression by symbol name (unsigned-integer-overflow:do_overflow below)
4 // requires the compiler-rt runtime to be able to symbolize stack addresses.
5 // REQUIRES: can-symbolize
10 // RUN: echo "signed-integer-overflow:%t" > %t.wrong-supp
11 // RUN: %env_ubsan_opts=halt_on_error=1:suppressions='"%t.wrong-supp"' not %run %t 2>&1 | FileCheck…
13 // RUN: echo "unsigned-integer-overflow:do_overflow" > %t.func-supp
14 // RUN: %env_ubsan_opts=halt_on_error=1:suppressions='"%t.func-supp"' %run %t
15 // RUN: echo "unsigned-integer-overflow:%t" > %t.module-supp
16 // RUN: %env_ubsan_opts=halt_on_error=1:suppressions='"%t.module-supp"' %run %t
[all …]
/external/clang/test/Driver/
Dfsanitize.c1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | …
2-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-
3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&…
4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### …
5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### …
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
/external/compiler-rt/test/cfi/cross-dso/icall/
Ddiag.cpp1 // Cross-DSO diagnostics.
5 // * -fsanitize-trap on the caller side overrides everything.
6 // * otherwise, the callee decides between trap/recover/norecover.
8 // Full-recover.
9 // RUN: %clangxx_cfi_dso_diag -g -DSHARED_LIB %s -fPIC -shared -o %t-so.so
10 // RUN: %clangxx_cfi_dso_diag -g %s -o %t %t-so.so
12 // RUN: %t icv 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-DIAG \
13 // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER
15 // RUN: %t i_v 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-NODIAG \
16 // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER
[all …]
/external/compiler-rt/test/ubsan/TestCases/TypeCheck/
Dvptr-non-unique-typeinfo.cpp1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -fPIC -shared…
2 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -O3 -o %t %t-
Dvptr-virtual-base-construction.cpp1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr %s -o %t
Dvptr-virtual-base.cpp1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -g %s -O3 -o %t
15 …// CHECK: vptr-virtual-base.cpp:[[@LINE-1]]:10: runtime error: cast to virtual base of address [[P… in main()
16 // CHECK-NEXT: [[PTR]]: note: object is of type 'Foo' in main()
17 return s->f(); in main()
Dvptr-corrupted-vtable-itanium.cpp1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -g %s -O3 -o %t
2 // RUN: not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-CORRUPTED-VTABLE --strict-whitespace
5 // REQUIRES: stable-runtime, cxxabi
28 *reinterpret_cast<void**>(Ptr)) - 1; in main()
32 Prefix[0].TypeInfo = RealPrefix->TypeInfo; in main()
37 …// CHECK-CORRUPTED-VTABLE: vptr-corrupted-vtable-itanium.cpp:[[@LINE+3]]:16: runtime error: member… in main()
38 …// CHECK-CORRUPTED-VTABLE-NEXT: [[PTR]]: note: object has a possibly invalid vptr: abs(offset to t… in main()
40 return Ptr2->v(); in main()
/external/libxml2/
D.travis.yml7 w3c-sgml-lib
12 - compiler: gcc
13 env: CFLAGS="-O2 -std=c89 -D_XOPEN_SOURCE=700 -Werror -Wno-error=unused-function"
15 - compiler: clang
17 env: CONFIG="--without-python"
18-O2 -g -fno-omit-frame-pointer -fsanitize=address,undefined -fno-sanitize=float-divide-by-zero,poi…
20 script: sh autogen.sh $CONFIG && make -j2 V=1 && make check
/external/libcxx/utils/google-benchmark/
D.travis.yml7 - /usr/local/bin:$PATH
11 - compiler: gcc
15 - lcov
17 - compiler: gcc
19 - compiler: gcc
21 - compiler: gcc
25 - g++-multilib
27 - compiler: gcc
31 - g++-multilib
33 - compiler: gcc
[all …]
/external/google-benchmark/
D.travis.yml7 - /usr/local/bin:$PATH
11 - compiler: gcc
15 - lcov
17 - compiler: gcc
19 - compiler: gcc
21 - compiler: gcc
25 - g++-multilib
27 - compiler: gcc
31 - g++-multilib
33 - compiler: gcc
[all …]
/external/clang/lib/Driver/
DSanitizerArgs.cpp1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
8 //===----------------------------------------------------------------------===//
56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
68 /// would produce "-fsanitize=vptr".
75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
76 /// "-fsanitize=alignment".
80 /// Produce a string containing comma-separated names of sanitizers in \p
129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs()
[all …]
/external/boringssl/src/
DCMakeLists.txt23 # This is a dummy target which all other targets depend on (manually - see other
29 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be
45 pkg_check_modules(LIBUNWIND libunwind-generic)
47 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND)
65 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME)
70 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DNDEBUG")
76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS"
81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX})
82 # CMake automatically connects include_directories to the NASM command-line,
84 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}")
[all …]
/external/skia/gn/
DBUILD.gn3 # Use of this source code is governed by a BSD-style license that can be
44 "/utf-8", # Set Source and Executable character sets to UTF-8.
47 cflags += [ "-fms-compatibility-version=19" ] # 2015
71 "-imsvc",
95 "-fstrict-aliasing",
96 "-fPIC",
98 cflags_cc += [ "-std=c++14" ]
101 # These would make stack traces worse on Linux, so we don't just set them willy-nilly.
103 cflags += [ "-fvisibility=hidden" ]
104 cflags_cc += [ "-fvisibility-inlines-hidden" ]
[all …]
/external/epid-sdk/
DSConstruct2 # Copyright 2016-2017 Intel Corporation
8 # http://www.apache.org/licenses/LICENSE-2.0
17 """use scons -k to invoke all builds regardless of unit test failures
51 ' | $CXX $CCFLAGS -xc++ -Wl,--verbose -')
54 ' | $CXX $CCFLAGS -xc++ -Wl,--verbose -')
58 ' | $CXX $CCFLAGS -xc++ -Wl,--verbose -')
61 ' | $CC $CCFLAGS -xc -Wl,--verbose -')
65 defaultlib_regexp = r'[\n(](/.*\.so[-.\da-fA-F]*).*'
149 'epid/common-testhelper/common-testhelper.parts']
197 'internal-test',
[all …]
/external/skqp/gn/
DBUILD.gn3 # Use of this source code is governed by a BSD-style license that can be
44 "/utf-8", # Set Source and Executable character sets to UTF-8.
47 cflags += [ "-fms-compatibility-version=19" ] # 2015
71 "-imsvc",
95 "-fstrict-aliasing",
96 "-fPIC",
98 cflags_cc += [ "-std=c++14" ]
101 # These would make stack traces worse on Linux, so we don't just set them willy-nilly.
103 cflags += [ "-fvisibility=hidden" ]
104 cflags_cc += [ "-fvisibility-inlines-hidden" ]
[all …]
/external/llvm/lib/Fuzzer/test/ubsan/
DCMakeLists.txt1 # These tests are instrumented with ubsan in non-recovery mode.
4 "${LIBFUZZER_FLAGS_BASE} -fsanitize=undefined -fno-sanitize-recover=all")
11 add_libfuzzer_test(${Test}-Ubsan SOURCES ../${Test}.cpp)
/external/compiler-rt/test/cfi/
Dlit.cfg13 …clang_cfi = ' '.join(config.lto_launch + [config.clang] + config.lto_flags + ['-flto -fsanitize=cf…
17 clang_cfi += '-fwhole-program-vtables '
23 diag = '-fno-sanitize-trap=cfi -fsanitize-recover=cfi '
24 non_dso = '-fvisibility=hidden '
25 dso = '-fsanitize-cfi-cross-dso -fvisibility=default '
/external/llvm/cmake/modules/
DHandleLLVMOptions.cmake16 if (CMAKE_LINKER MATCHES "lld-link.exe")
27 add_definitions( -D_DEBUG )
29 # On non-Debug builds cmake automatically defines NDEBUG, so we
32 add_definitions( -UNDEBUG )
41 string (REGEX REPLACE "(^| )[/-]D *NDEBUG($| )" " "
48 add_definitions(-DEXPENSIVE_CHECKS)
49 add_definitions(-D_GLIBCXX_DEBUG)
99 # Darwin-specific linker flags for loadable modules.
100 …set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-flat_namespace -Wl,-undefined -Wl…
103 # Pass -Wl,-z,defs. This makes sure all symbols are defined. Otherwise a DSO
[all …]
/external/clang/docs/
DControlFlowIntegrity.rst22 To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``.
23 You can also enable a subset of available :ref:`schemes <cfi-schemes>`.
24 As currently implemented, all schemes rely on link-time optimization (LTO);
25 so it is required to specify ``-flto``, and the linker used must support LTO,
38 The ``-fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}`` flags
39 require that a ``-fvisibility=`` flag also be specified. This is because the
40 default visibility setting is ``-fvisibility=default``, which would disable
42 to specify ``-fvisibility=hidden``, which enables CFI checks for such classes.
44 Experimental support for :ref:`cross-DSO control flow integrity
45 <cfi-cross-dso>` exists that does not require classes to have hidden LTO
[all …]
DUsersManual.rst11 The Clang Compiler is an open-source compiler for the C family of
14 allowing it to provide high-quality optimization and code generation
20 for an end-user, documenting the supported features, command line
23 `Clang Static Analyzer <http://clang-analyzer.llvm.org>`_, please see its web
27 which includes :ref:`C <c>`, :ref:`Objective-C <objc>`, :ref:`C++ <cxx>`, and
28 :ref:`Objective-C++ <objcxx>` as well as many dialects of those. For
29 language-specific information, please see the corresponding language
32 - :ref:`C Language <c>`: K&R C, ANSI C89, ISO C90, ISO C94 (C89+AMD1), ISO
34 - :ref:`Objective-C Language <objc>`: ObjC 1, ObjC 2, ObjC 2.1, plus
36 - :ref:`C++ Language <cxx>`
[all …]
/external/compiler-rt/test/ubsan/TestCases/Misc/
Dcoverage-levels.cc6 // RUN: rm -rf %T/coverage-levels && mkdir %T/coverage-levels
7 // RUN: %clangxx -fsanitize=shift -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun…
8 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
9 // RUN: %clangxx -fsanitize=undefined -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun…
10 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
13 …N: %clangxx -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=func %…
14 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
16 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=func %s -o %t
17 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE…
18 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=bb %s -o %t
[all …]
Dnonnull-arg.cpp1 // RUN: %clangxx -fsanitize=nonnull-attribute -fno-sanitize-recover=all %s -O3 -o %t
6 // RUN: not %run %t 0c 2>&1 | FileCheck %s --check-prefix=CTOR
7 // RUN: not %run %t 0m 2>&1 | FileCheck %s --check-prefix=METHOD
8 // RUN: not %run %t 0f 2>&1 | FileCheck %s --check-prefix=FUNC
9 // RUN: not %run %t 0v 2>&1 | FileCheck %s --check-prefix=VARIADIC
12 // REQUIRES: stable-runtime
45 …// CTOR: {{.*}}nonnull-arg.cpp:[[@LINE-1]]:21: runtime error: null pointer passed as argument 2, w… in main()
46 // CTOR-NEXT: {{.*}}nonnull-arg.cpp:19:31: note: nonnull attribute specified here in main()
49 …// METHOD: {{.*}}nonnull-arg.cpp:[[@LINE-1]]:36: runtime error: null pointer passed as argument 1,… in main()
50 // METHOD-NEXT: {{.*}}nonnull-arg.cpp:22:54: note: nonnull attribute specified here in main()
[all …]
/external/swiftshader/third_party/llvm-7.0/llvm/cmake/modules/
DHandleLLVMOptions.cmake14 if(CMAKE_LINKER MATCHES "lld-link.exe" OR (WIN32 AND LLVM_USE_LINKER STREQUAL "lld"))
40 message(STATUS "ThinLTO provides its own parallel linking - limiting parallel link jobs to 2.")
54 add_definitions( -D_DEBUG )
56 # On non-Debug builds cmake automatically defines NDEBUG, so we
59 add_definitions( -UNDEBUG )
68 string (REGEX REPLACE "(^| )[/-]D *NDEBUG($| )" " "
75 add_definitions(-DEXPENSIVE_CHECKS)
76 add_definitions(-D_GLIBCXX_DEBUG)
133 # Darwin-specific linker flags for loadable modules.
134 …set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-flat_namespace -Wl,-undefined -Wl…
[all …]

12