Searched +full:- +full:fno +full:- +full:sanitize +full:- +full:recover (Results 1 – 25 of 38) sorted by relevance
12
/external/compiler-rt/test/ubsan/TestCases/Integer/ |
D | shift.cpp | 1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %… 2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru… 3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %… 4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %… 5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run … 6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run … 7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %… 8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run … 9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run … 10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run … [all …]
|
D | no-recover.cpp | 1 // RUN: %clangxx -fsanitize=unsigned-integer-overflow %s -o %t && %run %t 2>&1 | FileCheck %s --che… 2 …-fsanitize=unsigned-integer-overflow -fno-sanitize-recover=all -fsanitize-recover=unsigned-integer… 3 …clangxx -fsanitize=unsigned-integer-overflow -fno-sanitize-recover=unsigned-integer-overflow %s -o… 11 // RECOVER-NOT: runtime error in main() 12 // ABORT-NOT: runtime error in main() 16 …// RECOVER: no-recover.cpp:[[@LINE-1]]:5: runtime error: unsigned integer overflow: 2271560481 + 3… in main() 17 …// ABORT: no-recover.cpp:[[@LINE-2]]:5: runtime error: unsigned integer overflow: 2271560481 + 398… in main() 20 …// RECOVER: 10000000000000000000 + 9000000000000000000 cannot be represented in type 'unsigned {{l… in main() 21 // ABORT-NOT: runtime error in main()
|
D | suppressions.cpp | 1 // RUN: %clangxx -fsanitize=integer -g0 %s -o %t 3 // Suppression by symbol name (unsigned-integer-overflow:do_overflow below) 4 // requires the compiler-rt runtime to be able to symbolize stack addresses. 5 // REQUIRES: can-symbolize 10 // RUN: echo "signed-integer-overflow:%t" > %t.wrong-supp 11 // RUN: %env_ubsan_opts=halt_on_error=1:suppressions='"%t.wrong-supp"' not %run %t 2>&1 | FileCheck… 13 // RUN: echo "unsigned-integer-overflow:do_overflow" > %t.func-supp 14 // RUN: %env_ubsan_opts=halt_on_error=1:suppressions='"%t.func-supp"' %run %t 15 // RUN: echo "unsigned-integer-overflow:%t" > %t.module-supp 16 // RUN: %env_ubsan_opts=halt_on_error=1:suppressions='"%t.module-supp"' %run %t [all …]
|
/external/clang/test/Driver/ |
D | fsanitize.c | 1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | … 2 …-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-… 3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&… 4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### … 5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### … 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
/external/compiler-rt/test/cfi/cross-dso/icall/ |
D | diag.cpp | 1 // Cross-DSO diagnostics. 5 // * -fsanitize-trap on the caller side overrides everything. 6 // * otherwise, the callee decides between trap/recover/norecover. 8 // Full-recover. 9 // RUN: %clangxx_cfi_dso_diag -g -DSHARED_LIB %s -fPIC -shared -o %t-so.so 10 // RUN: %clangxx_cfi_dso_diag -g %s -o %t %t-so.so 12 // RUN: %t icv 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-DIAG \ 13 // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER 15 // RUN: %t i_v 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-NODIAG \ 16 // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER [all …]
|
/external/compiler-rt/test/ubsan/TestCases/TypeCheck/ |
D | vptr-non-unique-typeinfo.cpp | 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -fPIC -shared… 2 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -I%p/Helpers -g %s -O3 -o %t %t-…
|
D | vptr-virtual-base-construction.cpp | 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr %s -o %t
|
D | vptr-virtual-base.cpp | 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -g %s -O3 -o %t 15 …// CHECK: vptr-virtual-base.cpp:[[@LINE-1]]:10: runtime error: cast to virtual base of address [[P… in main() 16 // CHECK-NEXT: [[PTR]]: note: object is of type 'Foo' in main() 17 return s->f(); in main()
|
D | vptr-corrupted-vtable-itanium.cpp | 1 // RUN: %clangxx -frtti -fsanitize=vptr -fno-sanitize-recover=vptr -g %s -O3 -o %t 2 // RUN: not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-CORRUPTED-VTABLE --strict-whitespace 5 // REQUIRES: stable-runtime, cxxabi 28 *reinterpret_cast<void**>(Ptr)) - 1; in main() 32 Prefix[0].TypeInfo = RealPrefix->TypeInfo; in main() 37 …// CHECK-CORRUPTED-VTABLE: vptr-corrupted-vtable-itanium.cpp:[[@LINE+3]]:16: runtime error: member… in main() 38 …// CHECK-CORRUPTED-VTABLE-NEXT: [[PTR]]: note: object has a possibly invalid vptr: abs(offset to t… in main() 40 return Ptr2->v(); in main()
|
/external/libxml2/ |
D | .travis.yml | 7 w3c-sgml-lib 12 - compiler: gcc 13 env: CFLAGS="-O2 -std=c89 -D_XOPEN_SOURCE=700 -Werror -Wno-error=unused-function" 15 - compiler: clang 17 env: CONFIG="--without-python" 18 …-O2 -g -fno-omit-frame-pointer -fsanitize=address,undefined -fno-sanitize=float-divide-by-zero,poi… 20 script: sh autogen.sh $CONFIG && make -j2 V=1 && make check
|
/external/libcxx/utils/google-benchmark/ |
D | .travis.yml | 7 - /usr/local/bin:$PATH 11 - compiler: gcc 15 - lcov 17 - compiler: gcc 19 - compiler: gcc 21 - compiler: gcc 25 - g++-multilib 27 - compiler: gcc 31 - g++-multilib 33 - compiler: gcc [all …]
|
/external/google-benchmark/ |
D | .travis.yml | 7 - /usr/local/bin:$PATH 11 - compiler: gcc 15 - lcov 17 - compiler: gcc 19 - compiler: gcc 21 - compiler: gcc 25 - g++-multilib 27 - compiler: gcc 31 - g++-multilib 33 - compiler: gcc [all …]
|
/external/clang/lib/Driver/ |
D | SanitizerArgs.cpp | 1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===// 8 //===----------------------------------------------------------------------===// 56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any 61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid 67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt 68 /// would produce "-fsanitize=vptr". 75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce 76 /// "-fsanitize=alignment". 80 /// Produce a string containing comma-separated names of sanitizers in \p 129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs() [all …]
|
/external/boringssl/src/ |
D | CMakeLists.txt | 23 # This is a dummy target which all other targets depend on (manually - see other 29 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be 45 pkg_check_modules(LIBUNWIND libunwind-generic) 47 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 65 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME) 70 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DNDEBUG") 76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) 82 # CMake automatically connects include_directories to the NASM command-line, 84 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}") [all …]
|
/external/skia/gn/ |
D | BUILD.gn | 3 # Use of this source code is governed by a BSD-style license that can be 44 "/utf-8", # Set Source and Executable character sets to UTF-8. 47 cflags += [ "-fms-compatibility-version=19" ] # 2015 71 "-imsvc", 95 "-fstrict-aliasing", 96 "-fPIC", 98 cflags_cc += [ "-std=c++14" ] 101 # These would make stack traces worse on Linux, so we don't just set them willy-nilly. 103 cflags += [ "-fvisibility=hidden" ] 104 cflags_cc += [ "-fvisibility-inlines-hidden" ] [all …]
|
/external/epid-sdk/ |
D | SConstruct | 2 # Copyright 2016-2017 Intel Corporation 8 # http://www.apache.org/licenses/LICENSE-2.0 17 """use scons -k to invoke all builds regardless of unit test failures 51 ' | $CXX $CCFLAGS -xc++ -Wl,--verbose -') 54 ' | $CXX $CCFLAGS -xc++ -Wl,--verbose -') 58 ' | $CXX $CCFLAGS -xc++ -Wl,--verbose -') 61 ' | $CC $CCFLAGS -xc -Wl,--verbose -') 65 defaultlib_regexp = r'[\n(](/.*\.so[-.\da-fA-F]*).*' 149 'epid/common-testhelper/common-testhelper.parts'] 197 'internal-test', [all …]
|
/external/skqp/gn/ |
D | BUILD.gn | 3 # Use of this source code is governed by a BSD-style license that can be 44 "/utf-8", # Set Source and Executable character sets to UTF-8. 47 cflags += [ "-fms-compatibility-version=19" ] # 2015 71 "-imsvc", 95 "-fstrict-aliasing", 96 "-fPIC", 98 cflags_cc += [ "-std=c++14" ] 101 # These would make stack traces worse on Linux, so we don't just set them willy-nilly. 103 cflags += [ "-fvisibility=hidden" ] 104 cflags_cc += [ "-fvisibility-inlines-hidden" ] [all …]
|
/external/llvm/lib/Fuzzer/test/ubsan/ |
D | CMakeLists.txt | 1 # These tests are instrumented with ubsan in non-recovery mode. 4 "${LIBFUZZER_FLAGS_BASE} -fsanitize=undefined -fno-sanitize-recover=all") 11 add_libfuzzer_test(${Test}-Ubsan SOURCES ../${Test}.cpp)
|
/external/compiler-rt/test/cfi/ |
D | lit.cfg | 13 …clang_cfi = ' '.join(config.lto_launch + [config.clang] + config.lto_flags + ['-flto -fsanitize=cf… 17 clang_cfi += '-fwhole-program-vtables ' 23 diag = '-fno-sanitize-trap=cfi -fsanitize-recover=cfi ' 24 non_dso = '-fvisibility=hidden ' 25 dso = '-fsanitize-cfi-cross-dso -fvisibility=default '
|
/external/llvm/cmake/modules/ |
D | HandleLLVMOptions.cmake | 16 if (CMAKE_LINKER MATCHES "lld-link.exe") 27 add_definitions( -D_DEBUG ) 29 # On non-Debug builds cmake automatically defines NDEBUG, so we 32 add_definitions( -UNDEBUG ) 41 string (REGEX REPLACE "(^| )[/-]D *NDEBUG($| )" " " 48 add_definitions(-DEXPENSIVE_CHECKS) 49 add_definitions(-D_GLIBCXX_DEBUG) 99 # Darwin-specific linker flags for loadable modules. 100 …set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-flat_namespace -Wl,-undefined -Wl… 103 # Pass -Wl,-z,defs. This makes sure all symbols are defined. Otherwise a DSO [all …]
|
/external/clang/docs/ |
D | ControlFlowIntegrity.rst | 22 To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``. 23 You can also enable a subset of available :ref:`schemes <cfi-schemes>`. 24 As currently implemented, all schemes rely on link-time optimization (LTO); 25 so it is required to specify ``-flto``, and the linker used must support LTO, 38 The ``-fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}`` flags 39 require that a ``-fvisibility=`` flag also be specified. This is because the 40 default visibility setting is ``-fvisibility=default``, which would disable 42 to specify ``-fvisibility=hidden``, which enables CFI checks for such classes. 44 Experimental support for :ref:`cross-DSO control flow integrity 45 <cfi-cross-dso>` exists that does not require classes to have hidden LTO [all …]
|
D | UsersManual.rst | 11 The Clang Compiler is an open-source compiler for the C family of 14 allowing it to provide high-quality optimization and code generation 20 for an end-user, documenting the supported features, command line 23 `Clang Static Analyzer <http://clang-analyzer.llvm.org>`_, please see its web 27 which includes :ref:`C <c>`, :ref:`Objective-C <objc>`, :ref:`C++ <cxx>`, and 28 :ref:`Objective-C++ <objcxx>` as well as many dialects of those. For 29 language-specific information, please see the corresponding language 32 - :ref:`C Language <c>`: K&R C, ANSI C89, ISO C90, ISO C94 (C89+AMD1), ISO 34 - :ref:`Objective-C Language <objc>`: ObjC 1, ObjC 2, ObjC 2.1, plus 36 - :ref:`C++ Language <cxx>` [all …]
|
/external/compiler-rt/test/ubsan/TestCases/Misc/ |
D | coverage-levels.cc | 6 // RUN: rm -rf %T/coverage-levels && mkdir %T/coverage-levels 7 // RUN: %clangxx -fsanitize=shift -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun… 8 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 9 // RUN: %clangxx -fsanitize=undefined -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=fun… 10 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 13 …N: %clangxx -DGOOD_SHIFT=1 -O1 -fsanitize-coverage=func %… 14 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 16 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=func %s -o %t 17 …e=1:verbosity=1:coverage_dir='"%T/coverage-levels"' %run %t 2>&1 | FileCheck %s --check-prefix=CHE… 18 // RUN: %clangxx -fsanitize=shift -O1 -fsanitize-coverage=bb %s -o %t [all …]
|
D | nonnull-arg.cpp | 1 // RUN: %clangxx -fsanitize=nonnull-attribute -fno-sanitize-recover=all %s -O3 -o %t 6 // RUN: not %run %t 0c 2>&1 | FileCheck %s --check-prefix=CTOR 7 // RUN: not %run %t 0m 2>&1 | FileCheck %s --check-prefix=METHOD 8 // RUN: not %run %t 0f 2>&1 | FileCheck %s --check-prefix=FUNC 9 // RUN: not %run %t 0v 2>&1 | FileCheck %s --check-prefix=VARIADIC 12 // REQUIRES: stable-runtime 45 …// CTOR: {{.*}}nonnull-arg.cpp:[[@LINE-1]]:21: runtime error: null pointer passed as argument 2, w… in main() 46 // CTOR-NEXT: {{.*}}nonnull-arg.cpp:19:31: note: nonnull attribute specified here in main() 49 …// METHOD: {{.*}}nonnull-arg.cpp:[[@LINE-1]]:36: runtime error: null pointer passed as argument 1,… in main() 50 // METHOD-NEXT: {{.*}}nonnull-arg.cpp:22:54: note: nonnull attribute specified here in main() [all …]
|
/external/swiftshader/third_party/llvm-7.0/llvm/cmake/modules/ |
D | HandleLLVMOptions.cmake | 14 if(CMAKE_LINKER MATCHES "lld-link.exe" OR (WIN32 AND LLVM_USE_LINKER STREQUAL "lld")) 40 message(STATUS "ThinLTO provides its own parallel linking - limiting parallel link jobs to 2.") 54 add_definitions( -D_DEBUG ) 56 # On non-Debug builds cmake automatically defines NDEBUG, so we 59 add_definitions( -UNDEBUG ) 68 string (REGEX REPLACE "(^| )[/-]D *NDEBUG($| )" " " 75 add_definitions(-DEXPENSIVE_CHECKS) 76 add_definitions(-D_GLIBCXX_DEBUG) 133 # Darwin-specific linker flags for loadable modules. 134 …set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-flat_namespace -Wl,-undefined -Wl… [all …]
|
12