Home
last modified time | relevance | path

Searched +full:clang +full:- +full:ubsan (Results 1 – 25 of 76) sorted by relevance

1234

/external/google-fruit/extras/scripts/
Dtravis_yml_generator.py8 # http://www.apache.org/licenses/LICENSE-2.0
11 # distributed under the License is distributed on an "AS-IS" BASIS,
25 elif compiler.startswith('clang'):
26 return 'clang'
30 def determine_tests(asan, ubsan, smoke_tests, use_precompiled_headers_in_tests, exclude_tests, argument
37 if ubsan:
41 if ubsan and not asan:
42 raise Exception('Enabling UBSan but not ASan is not currently supported.')
48 excessive_excluded_tests = set(exclude_tests) - set(tests)
70 def add_ubuntu_tests(ubuntu_version, compiler, os='linux', stl=None, asan=True, ubsan=True, argument
[all …]
/external/clang/test/Driver/
Dsanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \
4 // RUN: -target i386-unknown-linux -fsanitize=address \
5 // RUN: -resource-dir=%S/Inputs/resource_dir \
6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \
7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
[all …]
Ddarwin-sanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes -### -target x86_64-darwin \
4 // RUN: -stdlib=platform -fsanitize=address %s -o %t.o 2>&1 \
5 // RUN: | FileCheck --check-prefix=CHECK-ASAN %s
7 // CHECK-ASAN: "{{.*}}ld{{(.exe)?}}"
8 // CHECK-ASAN-NOT: "-lstdc++"
9 // CHECK-ASAN-NOT: "-lc++"
10 // CHECK-ASAN: libclang_rt.asan_osx_dynamic.dylib"
11 // CHECK-ASAN: "-rpath" "@executable_path"
12 // CHECK-ASAN: "-rpath" "{{.*}}lib{{.*}}darwin"
14 // RUN: %clang -no-canonical-prefixes -### -target x86_64-darwin \
[all …]
Dfsanitize.c1 …/ RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1…
2clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=s…
3 …: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### …
4 …%clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -#…
5 …%clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -#…
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
/external/compiler-rt/test/ubsan/
Dlit.common.cfg1 # -*- Python -*-
18 # Choose between standalone and UBSan+ASan modes.
21 config.name = 'UBSan-Standalone-' + config.target_arch
22 config.available_features.add("ubsan-standalone")
25 config.name = 'UBSan-ASan-' + config.target_arch
26 config.available_features.add("ubsan-asan")
27 clang_ubsan_cflags = ["-fsanitize=address"]
30 config.name = 'UBSan-MSan-' + config.target_arch
31 config.available_features.add("ubsan-msan")
32 clang_ubsan_cflags = ["-fsanitize=memory"]
[all …]
/external/clang/docs/
DUndefinedBehaviorSanitizer.rst11 UndefinedBehaviorSanitizer (UBSan) is a fast undefined behavior detector.
12 UBSan modifies the program at compile-time to catch various kinds of undefined
17 * Conversion to, from, or between floating-point types which would
20 See the full list of available :ref:`checks <ubsan-checks>` below.
22 UBSan has an optional run-time library which provides better error reporting.
28 Build LLVM/Clang with `CMake <http://llvm.org/docs/CMake.html>`_.
33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined``
34 flag. Make sure to use ``clang++`` (not ``ld``) as a linker, so that your
35 executable is linked with proper UBSan runtime libraries. You can use ``clang``
36 instead of ``clang++`` if you're compiling/linking C code.
[all …]
/external/grpc-grpc/tools/
Dbazel.rc1 build --client_env=CC=clang
2 build --copt -DGRPC_BAZEL_BUILD
4 build:opt --copt -Wframe-larger-than=16384
6 build:asan --strip=never
7 build:asan --copt -fsanitize-coverage=edge
8 build:asan --copt -fsanitize=address
9 build:asan --copt -O0
10 build:asan --copt -fno-omit-frame-pointer
11 build:asan --copt -DGPR_NO_DIRECT_SYSCALLS
12 build:asan --linkopt -fsanitize=address
[all …]
/external/compiler-rt/test/
DCMakeLists.txt23 # Use LLVM utils and Clang from the same build tree.
25 clang clang-headers FileCheck count not llvm-config llvm-nm llvm-objdump
26 llvm-symbolizer compiler-rt-headers sancov)
39 # Run sanitizer tests only if we're sure that clang would produce
64 add_subdirectory(ubsan)
66 # CFI tests require diagnostic mode, which is implemented in UBSan.
86 add_lit_target(check-all
/external/skia/site/dev/testing/
Dxsan.md6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
8 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific.
9 - ASAN works on Linux, Mac, Android.
10 - TSAN works on Linux and Mac.
11 - MSAN works on Linux[1].
14 with the system-provided C++ standard library, which is usually libstdc++.
18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed.
20 of Clang and the instrumented libc++, located in /msan.
22 Downloading Clang binaries (Googlers Only)
23 ------------------------------------------
[all …]
/external/skqp/site/dev/testing/
Dxsan.md6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
8 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific.
9 - ASAN works on Linux, Mac, Android.
10 - TSAN works on Linux and Mac.
11 - MSAN works on Linux[1].
14 with the system-provided C++ standard library, which is usually libstdc++.
18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed.
20 of Clang and the instrumented libc++, located in /msan.
22 Downloading Clang binaries (Googlers Only)
23 ------------------------------------------
[all …]
/external/perfetto/
D.travis.yml7 # http://www.apache.org/licenses/LICENSE-2.0
20 # The |CFG| variable name is hooked up by the perfetto-ci.appspot.com frontend.
21 # Please keep infra/perfetto-ci.appspot.com/ updated when adding/removing
27 # - os: osx
29 # compiler: clang
30 # env: CFG=mac-clang-x86_64-release GN_ARGS="is_debug=false"
31 # - os: osx
33 # compiler: clang
34 # env: CFG=mac-clang-x86_64-debug GN_ARGS="is_debug=true"
35 # - os: osx
[all …]
/external/clang/runtime/
DCMakeLists.txt20 set(${out_var} ${CMAKE_COMMAND} --build . --target ${target}
21 --config $<CONFIGURATION> PARENT_SCOPE)
25 set(COMPILER_RT_SRC_ROOT ${LLVM_MAIN_SRC_DIR}/projects/compiler-rt)
38 # Add compiler-rt as an external project.
39 set(COMPILER_RT_PREFIX ${CMAKE_BINARY_DIR}/projects/compiler-rt)
41 set(STAMP_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-stamps/)
42 set(BINARY_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-bins/)
44 add_custom_target(compiler-rt-clear
45 COMMAND ${CMAKE_COMMAND} -E remove_directory ${BINARY_DIR}
46 COMMAND ${CMAKE_COMMAND} -E remove_directory ${STAMP_DIR}
[all …]
/external/libyuv/files/docs/
Ddeprecated_builds.md5 ## Pre-requisites
7 …need to have depot tools installed: https://www.chromium.org/developers/how-tos/install-depot-tools
77 call python gyp_libyuv -fninja -G msvs_version=2013
78 ninja -j7 -C out\Release
79 ninja -j7 -C out\Debug
82 call python gyp_libyuv -fninja -G msvs_version=2013
83 ninja -C out\Debug_x64
84 ninja -C out\Release_x64
87 set GYP_DEFINES=clang=1 target_arch=ia32
88 call python tools\clang\scripts\update.py
[all …]
/external/libyuv/files/build_overrides/
Dbuild.gni3 # Use of this source code is governed by a BSD-style license
12 # 10.11 min SDK but those targets are only used in non-Chromium builds. We can
17 # Some non-Chromium builds don't use Chromium's third_party/binutils.
24 # Some non-Chromium builds don't support building java targets.
35 rebase_path("//tools_libyuv/ubsan/blacklist.txt", root_build_dir)
37 rebase_path("//tools_libyuv/ubsan/vptr_blacklist.txt", root_build_dir)
39 # For Chromium, Android 32-bit non-component, non-clang builds hit a 4GiB size
/external/v8/tools/clang/scripts/
Dpackage.py3 # Use of this source code is governed by a BSD-style license that can be
6 """This script will check out llvm and clang, and then package the results up
24 LLVM_BOOTSTRAP_DIR = os.path.join(THIRD_PARTY_DIR, 'llvm-bootstrap')
26 'llvm-bootstrap-install')
27 LLVM_BUILD_DIR = os.path.join(THIRD_PARTY_DIR, 'llvm-build')
29 EU_STRIP = os.path.join(THIRD_PARTY_DIR, 'eu-strip', 'bin', 'eu-strip')
65 '--print-revision']
78 'http://dev.chromium.org/developers/how-tos/install-depot-tools'
90 gsutil_args = ['-q', 'stat',
91 'gs://chromium-browser-clang-staging/%s/%s.tgz' %
[all …]
/external/skqp/infra/bots/
Djobs.json2 "Build-Debian9-Clang-arm-Debug-Android",
3 "Build-Debian9-Clang-arm-Debug-Android_Vulkan",
4 "Build-Debian9-Clang-arm-Debug-Chromebook_GLES",
5 "Build-Debian9-Clang-arm-Debug-Chromecast",
6 "Build-Debian9-Clang-arm-Release-Android",
7 "Build-Debian9-Clang-arm-Release-Android_API26",
8 "Build-Debian9-Clang-arm-Release-Android_ASAN",
9 "Build-Debian9-Clang-arm-Release-Android_ASAN_Vulkan",
10 "Build-Debian9-Clang-arm-Release-Android_Vulkan",
11 "Build-Debian9-Clang-arm-Release-Chromebook_GLES",
[all …]
/external/skia/infra/bots/
Djobs.json2 "Build-Debian9-Clang-arm-Debug-Android",
3 "Build-Debian9-Clang-arm-Debug-Android_Vulkan",
4 "Build-Debian9-Clang-arm-Debug-Chromebook_GLES",
5 "Build-Debian9-Clang-arm-Debug-Chromecast",
6 "Build-Debian9-Clang-arm-Release-Android",
7 "Build-Debian9-Clang-arm-Release-Android_API26",
8 "Build-Debian9-Clang-arm-Release-Android_ASAN",
9 "Build-Debian9-Clang-arm-Release-Android_ASAN_Vulkan",
10 "Build-Debian9-Clang-arm-Release-Android_Vulkan",
11 "Build-Debian9-Clang-arm-Release-Chromebook_GLES",
[all …]
/external/honggfuzz/
Dsanitizers.c20 * All clang sanitizers, except ASan, can be activated for target binaries
25 * UBSan, without the runtime libraries. As such, their default ftrap is activated
26 * which is for most cases a SIGABRT. For these cases end-user needs to enable
36 * For cases where clang runtime library linking is not an option, SIGABRT should
63 /* --{ ASan }-- */
83 /* --{ UBSan }-- */
86 /* --{ MSan }-- */
103 * memory-mapped file as soon as it collected. Non-Android targets can disable
109 const char* abortFlag = hfuzz->cfg.monitorSIGABRT ? kABORT_ENABLED : kABORT_DISABLED; in sanitizers_AddFlag()
115 if (!hfuzz->sanitizer.enable) { in sanitizers_AddFlag()
[all …]
/external/flatbuffers/include/flatbuffers/
Dbase.h4 // clang-format off
14 // Replace operator new by trace-enabled version.
58 // Note the __clang__ check is needed, because clang presents itself
60 // Clang 3.3 and later implement all of the ISO C++ 2011 standard.
61 // Clang 3.4 and later implement all of the ISO C++ 2014 standard.
62 // http://clang.llvm.org/cxx_status.html
67 // This value should be correct starting from MSVC2017-15.7-Preview-3.
68 // The '__cplusplus' will be valid only if MSVC2017-15.7-P3 and the `/Zc:__cplusplus` switch is set.
99 // and constexpr keywords. Note the __clang__ check is needed, because clang
200 // Check for std::experimental::string_view (in c++14, compiler-dependent)
[all …]
/external/skqp/infra/bots/recipes/
Dperf.py2 # Use of this source code is governed by a BSD-style license that can be
37 'UBSAN',
47 args = ['--pre_log']
50 args.append('--images')
51 args.extend(['--gpuStatsDump', 'true'])
53 args.extend(['--scales', '1.0', '1.1'])
56 args.extend(['--skps', 'ignore_skps'])
60 args.append('--nogpu')
73 args.append('--nocpu')
126 # Just run GLES for now - maybe add gles_msaa4 in the future
[all …]
/external/libcxx/utils/google-benchmark/
D.travis.yml7 - /usr/local/bin:$PATH
11 - compiler: gcc
15 - lcov
17 - compiler: gcc
19 - compiler: gcc
21 - compiler: gcc
25 - g++-multilib
27 - compiler: gcc
31 - g++-multilib
33 - compiler: gcc
[all …]
/external/google-benchmark/
D.travis.yml7 - /usr/local/bin:$PATH
11 - compiler: gcc
15 - lcov
17 - compiler: gcc
19 - compiler: gcc
21 - compiler: gcc
25 - g++-multilib
27 - compiler: gcc
31 - g++-multilib
33 - compiler: gcc
[all …]
/external/honggfuzz/examples/openssl/
DREADME.md6 * clang-4.0, or newer (5.0/6.0 work as well)
8 …* libressl/boringssl/openssl-1.0.2 work as well, though they might require specific building instr…
16 $ git clone --depth=1 https://github.com/openssl/openssl.git
17 $ mv openssl openssl-master
23 $ cd openssl-master
24 …c/honggfuzz/examples/openssl/compile_hfuzz_openssl_master.sh [enable-asan|enable-msan|enable-ubsan]
38 make.sh <directory-with-open/libre/boring-ssl> [address|memory|undefined]
43 $ /home/jagger/src/honggfuzz/examples/openssl/make.sh openssl-master address
49 $ /home/jagger/src/honggfuzz/honggfuzz -f corpus_server/ -P -- ./openssl-master.address.server
50 $ /home/jagger/src/honggfuzz/honggfuzz -f corpus_client/ -P -- ./openssl-master.address.client
[all …]
/external/skia/infra/bots/recipes/
Dperf.py2 # Use of this source code is governed by a BSD-style license that can be
37 'UBSAN',
47 args = ['--pre_log']
50 args.append('--images')
51 args.extend(['--gpuStatsDump', 'true'])
53 args.extend(['--scales', '1.0', '1.1'])
56 args.extend(['--skps', 'ignore_skps'])
60 args.append('--nogpu')
73 args.append('--nocpu')
126 # Just run GLES for now - maybe add gles_msaa4 in the future
[all …]
/external/v8/infra/mb/
Dmb_config.pyl2 # Use of this source code is governed by a BSD-style license that can be
6 # This is a map of buildbot master names -> buildbot builder names ->
59 'linux-v8-dr': 'release_x64',
63 'V8 Linux - builder': 'release_x86_gcmole',
64 'V8 Linux - debug builder': 'debug_x86',
65 'V8 Linux - nosnap builder': 'release_x86_no_snap',
66 'V8 Linux - nosnap debug builder': 'debug_x86_no_snap',
67 'V8 Linux - shared': 'release_x86_shared_verify_heap',
68 'V8 Linux - noi18n - debug': 'debug_x86_no_i18n',
69 'V8 Linux - verify csa': 'release_x86_verify_csa',
[all …]

1234