/external/skia/site/dev/testing/ |
D | xsan.md | 1 MSAN, ASAN, & TSAN 6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 8 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific. 9 - ASAN works on Linux, Mac, Android. 10 - TSAN works on Linux and Mac. 11 - MSAN works on Linux[1]. 14 with the system-provided C++ standard library, which is usually libstdc++. 18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed. 20 of Clang and the instrumented libc++, located in /msan. 22 Downloading Clang binaries (Googlers Only) [all …]
|
/external/skqp/site/dev/testing/ |
D | xsan.md | 1 MSAN, ASAN, & TSAN 6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 8 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific. 9 - ASAN works on Linux, Mac, Android. 10 - TSAN works on Linux and Mac. 11 - MSAN works on Linux[1]. 14 with the system-provided C++ standard library, which is usually libstdc++. 18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed. 20 of Clang and the instrumented libc++, located in /msan. 22 Downloading Clang binaries (Googlers Only) [all …]
|
/external/clang/test/Driver/ |
D | sanitizer-ld.c | 3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \ 4 // RUN: -target i386-unknown-linux -fsanitize=address \ 5 // RUN: -resource-dir=%S/Inputs/resource_dir \ 6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \ 7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s 9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 10 // CHECK-ASAN-LINUX-NOT: "-lc" 11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a" 12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic" 13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms" [all …]
|
D | fsanitize.c | 1 …/ RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1… 2 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=s… 3 …: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### … 4 …%clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -#… 5 …%clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -#… 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
D | msan.c | 1 // RUN: %clang -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 2 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 3 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 4 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck… 5 // RUN: %clang -target mips64-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCheck %s 6 // RUN: %clang -target mips64el-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileChe… 7 // RUN: %clang -target powerpc64-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCh… 8 // RUN: %clang -target powerpc64le-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | File… 9 // Verify that -fsanitize=memory invokes msan instrumentation.
|
/external/skqp/infra/bots/recipe_modules/build/examples/full.expected/ |
D | Build-Debian9-Clang-x86_64-Debug-MSAN.json | 5 "-u", 7 "--json-output", 19 "-u", 20 "[START_DIR]/cache/work/skia/bin/fetch-gn" 28 "name": "fetch-gn" 34 "[START_DIR]/cache/work/skia/out/Build-Debian9-Clang-x86_64-Debug-MSAN/Debug", 35 …--args=cc=\"[START_DIR]/clang_linux/bin/clang\" cxx=\"[START_DIR]/clang_linux/bin/clang++\" extra_… 47 "-C", 48 "[START_DIR]/cache/work/skia/out/Build-Debian9-Clang-x86_64-Debug-MSAN/Debug" 60 "-u", [all …]
|
/external/skia/infra/bots/recipe_modules/build/examples/full.expected/ |
D | Build-Debian9-Clang-x86_64-Debug-MSAN.json | 5 "-u", 7 "--json-output", 19 "-u", 20 "[START_DIR]/cache/work/skia/bin/fetch-gn" 28 "name": "fetch-gn" 34 "[START_DIR]/cache/work/skia/out/Build-Debian9-Clang-x86_64-Debug-MSAN/Debug", 35 …--args=cc=\"[START_DIR]/clang_linux/bin/clang\" cxx=\"[START_DIR]/clang_linux/bin/clang++\" extra_… 47 "-C", 48 "[START_DIR]/cache/work/skia/out/Build-Debian9-Clang-x86_64-Debug-MSAN/Debug" 60 "-u", [all …]
|
/external/compiler-rt/lib/msan/ |
D | CMakeLists.txt | 5 msan.cc 21 append_list_if(COMPILER_RT_HAS_FPIE_FLAG -fPIE MSAN_RTL_CFLAGS) 22 # Prevent clang from generating libc calls. 23 append_list_if(COMPILER_RT_HAS_FFREESTANDING_FLAG -ffreestanding MSAN_RTL_CFLAGS) 28 add_custom_target(msan) target 29 set_target_properties(msan PROPERTIES FOLDER "Compiler-RT Misc") 32 add_compiler_rt_runtime(clang_rt.msan 41 PARENT_TARGET msan) 48 PARENT_TARGET msan) 49 list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.msan-${arch} [all …]
|
/external/grpc-grpc/tools/ |
D | bazel.rc | 1 build --client_env=CC=clang 2 build --copt -DGRPC_BAZEL_BUILD 4 build:opt --copt -Wframe-larger-than=16384 6 build:asan --strip=never 7 build:asan --copt -fsanitize-coverage=edge 8 build:asan --copt -fsanitize=address 9 build:asan --copt -O0 10 build:asan --copt -fno-omit-frame-pointer 11 build:asan --copt -DGPR_NO_DIRECT_SYSCALLS 12 build:asan --linkopt -fsanitize=address [all …]
|
/external/boringssl/src/ |
D | CMakeLists.txt | 3 # Report AppleClang separately from Clang. Their version numbers are different. 23 # This is a dummy target which all other targets depend on (manually - see other 29 # Android-NDK CMake files reconfigure the path and so Go and Perl won't be 45 pkg_check_modules(LIBUNWIND libunwind-generic) 47 add_definitions(-DBORINGSSL_HAVE_LIBUNWIND) 65 add_definitions(-DBORINGSSL_ALLOW_CXX_RUNTIME) 70 set(CMAKE_ASM_NASM_FLAGS "${CMAKE_ASM_NASM_FLAGS} -DNDEBUG") 76 string(REGEX REPLACE "(^| )[/-]DNDEBUG( |$)" " " "${VAR}_RELWITHASSERTS" 81 add_definitions(-DBORINGSSL_PREFIX=${BORINGSSL_PREFIX}) 82 # CMake automatically connects include_directories to the NASM command-line, [all …]
|
/external/llvm/test/Instrumentation/MemorySanitizer/ |
D | store-origin.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref… 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref… 4 …t = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:1… 5 target triple = "x86_64-unknown-linux-gnu" 23 …-precise-fpmad"="false" "no-frame-pointer-elim"="false" "no-infs-fp-math"="false" "no-nans-fp-math… 30 !0 = distinct !DICompileUnit(language: DW_LANG_C99, producer: "clang version 3.5.0 (204220)", isOpt… 44 !15 = !{!"clang version 3.5.0 (204220)"} 54 ; CHECK-LABEL: @Store 56 ; CHECK: [[ORIGIN:%[01-9a-z]+]] = load {{.*}} @__msan_param_origin_tls 57 ; CHECK: store {{.*}}!dbg ![[DBG:[01-9]+]] [all …]
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/Instrumentation/MemorySanitizer/ |
D | store-origin.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref… 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref… 4 …t = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:1… 5 target triple = "x86_64-unknown-linux-gnu" 23 …-precise-fpmad"="false" "no-frame-pointer-elim"="false" "no-infs-fp-math"="false" "no-nans-fp-math… 30 !0 = distinct !DICompileUnit(language: DW_LANG_C99, producer: "clang version 3.5.0 (204220)", isOpt… 44 !15 = !{!"clang version 3.5.0 (204220)"} 54 ; CHECK-LABEL: @Store 56 ; CHECK: [[ORIGIN:%[01-9a-z]+]] = load {{.*}} @__msan_param_origin_tls 57 ; CHECK: store {{.*}}!dbg ![[DBG:[01-9]+]] [all …]
|
/external/skqp/infra/bots/assets/clang_linux/ |
D | create.py | 5 # Use of this source code is governed by a BSD-style license that can be 9 """Create a Clang toolchain for Linux hosts.""" 24 # Build Clang, lld, compiler-rt (sanitizer support) and libc++. 26 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 29 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 30 BRANCH, REPO + "clang"]) 31 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 33 os.chdir("clang/tools") 34 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 35 BRANCH, REPO + "clang-tools-extra", "extra"]) [all …]
|
/external/skia/infra/bots/assets/clang_linux/ |
D | create.py | 5 # Use of this source code is governed by a BSD-style license that can be 9 """Create a Clang toolchain for Linux hosts.""" 24 # Build Clang, lld, compiler-rt (sanitizer support) and libc++. 26 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 29 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 30 BRANCH, REPO + "clang"]) 31 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 33 os.chdir("clang/tools") 34 subprocess.check_call(["git", "clone", "--depth", "1", "-b", 35 BRANCH, REPO + "clang-tools-extra", "extra"]) [all …]
|
/external/clang/docs/ |
D | MemorySanitizer.rst | 12 compiler instrumentation module and a run-time library. 19 Build LLVM/Clang with `CMake <http://llvm.org/docs/CMake.html>`_. 24 Simply compile and link your program with ``-fsanitize=memory`` flag. 25 The MemorySanitizer run-time library should be linked to the final 26 executable, so make sure to use ``clang`` (not ``ld``) for the final 27 link step. When linking shared libraries, the MemorySanitizer run-time 28 is not linked, so ``-Wl,-z,defs`` may cause link errors (don't use it 29 with MemorySanitizer). To get a reasonable performance add ``-O1`` or 31 ``-fno-omit-frame-pointer``. To get perfect stack traces you may need 32 to disable inlining (just use ``-O1``) and tail call elimination [all …]
|
/external/compiler-rt/test/ubsan/ |
D | lit.common.cfg | 1 # -*- Python -*- 21 config.name = 'UBSan-Standalone-' + config.target_arch 22 config.available_features.add("ubsan-standalone") 25 config.name = 'UBSan-ASan-' + config.target_arch 26 config.available_features.add("ubsan-asan") 27 clang_ubsan_cflags = ["-fsanitize=address"] 30 config.name = 'UBSan-MSan-' + config.target_arch 31 config.available_features.add("ubsan-msan") 32 clang_ubsan_cflags = ["-fsanitize=memory"] 34 config.name = 'UBSan-TSan-' + config.target_arch [all …]
|
/external/clang/runtime/ |
D | CMakeLists.txt | 20 set(${out_var} ${CMAKE_COMMAND} --build . --target ${target} 21 --config $<CONFIGURATION> PARENT_SCOPE) 25 set(COMPILER_RT_SRC_ROOT ${LLVM_MAIN_SRC_DIR}/projects/compiler-rt) 38 # Add compiler-rt as an external project. 39 set(COMPILER_RT_PREFIX ${CMAKE_BINARY_DIR}/projects/compiler-rt) 41 set(STAMP_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-stamps/) 42 set(BINARY_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-bins/) 44 add_custom_target(compiler-rt-clear 45 COMMAND ${CMAKE_COMMAND} -E remove_directory ${BINARY_DIR} 46 COMMAND ${CMAKE_COMMAND} -E remove_directory ${STAMP_DIR} [all …]
|
/external/libcxx/utils/google-benchmark/ |
D | .travis.yml | 7 - /usr/local/bin:$PATH 11 - compiler: gcc 15 - lcov 17 - compiler: gcc 19 - compiler: gcc 21 - compiler: gcc 25 - g++-multilib 27 - compiler: gcc 31 - g++-multilib 33 - compiler: gcc [all …]
|
/external/google-benchmark/ |
D | .travis.yml | 7 - /usr/local/bin:$PATH 11 - compiler: gcc 15 - lcov 17 - compiler: gcc 19 - compiler: gcc 21 - compiler: gcc 25 - g++-multilib 27 - compiler: gcc 31 - g++-multilib 33 - compiler: gcc [all …]
|
/external/perfetto/infra/perfetto-ci.appspot.com/static/ |
D | index.html | 3 <!-- 10 http://www.apache.org/licenses/LICENSE-2.0 17 --> 19 <meta charset="utf-8"> 25 …html { font-family: 'Source Sans Pro', sans-serif; font-size: 13px; font-weight: 300; padding: 0; … 27 …header { background: rgb(212, 233, 169); width: 100%; padding: 0 20px; box-sizing: border-box; ove… 28 #travis-badge { float: right; line-height: 80px; } 29 …-size: 32px; font-weight: 300; padding-left: 60px; line-height: 50px; background-image: url('stati… 30 h2 { margin: 20px; font-size: 20px; font-weight: 400; color: #333; } 32 table tbody td:first-child { padding-left: 20px !important; } [all …]
|
/external/skia/infra/bots/recipe_modules/build/ |
D | default.py | 2 # Use of this source code is governed by a BSD-style license that can be 21 '--chrome-dir', chrome_dir, 22 '--output-dir', out, 23 '--no-sync', '--no-hooks', '--make-output-dir']) 46 cmd=['cmake', '-DBUILD_TESTS=OFF', swiftshader_root, '-GNinja']) 48 cmd=['ninja', '-C', out, 'libEGL.so', 'libGLESv2.so']) 71 '-DDUMMY_xcode_build_version=%s' % XCODE_BUILD_VERSION) 84 # (Build-Mac-Clang-x64-Release-iOS). 85 '-kind', 'ios', 86 '-xcode-version', XCODE_BUILD_VERSION, [all …]
|
/external/skqp/infra/bots/recipe_modules/build/ |
D | default.py | 2 # Use of this source code is governed by a BSD-style license that can be 21 '--chrome-dir', chrome_dir, 22 '--output-dir', out, 23 '--no-sync', '--no-hooks', '--make-output-dir']) 46 cmd=['cmake', '-DBUILD_TESTS=OFF', swiftshader_root, '-GNinja']) 48 cmd=['ninja', '-C', out, 'libEGL.so', 'libGLESv2.so']) 71 '-DDUMMY_xcode_build_version=%s' % XCODE_BUILD_VERSION) 84 # (Build-Mac-Clang-x64-Release-iOS). 85 '-kind', 'ios', 86 '-xcode-version', XCODE_BUILD_VERSION, [all …]
|
/external/pdfium/ |
D | DEPS | 101 'third_party/yasm/source/patched-yasm': 102 Var('chromium_git') + '/chromium/deps/yasm/patched-yasm.git@' + 105 "tools/clang": 106 Var('chromium_git') + "/chromium/src/tools/clang@" + Var('clang_revision'), 127 "/external/github.com/catapult-project/catapult.git@" + 159 '--no_resume', 160 '--platform=win32', 161 '--no_auth', 162 '--bucket', 'chromium-gn', 163 '-s', 'pdfium/buildtools/win/gn.exe.sha1', [all …]
|
/external/v8/gypfiles/ |
D | standalone.gypi | 28 # Definitions to be used when building stand-alone V8 binaries. 31 # We need to include toolchain.gypi here for third-party sources that don't 38 # slowest: 0 - no tracking, 1 - track only the initial allocation site, 2 39 # - track the chain of stores leading from allocation site to use site. 81 'base_dir%': '<!(cd <(DEPTH) && python -c "import os; print os.getcwd()")', 84 # files. Uses gcov if clang=0 is set explicitly. Otherwise, 96 'sysroot%': '<!(cd <(DEPTH) && pwd -P)/build/linux/debian_wheezy_arm-sysroot', 99 'sysroot%': '<!(cd <(DEPTH) && pwd -P)/build/linux/debian_wheezy_amd64-sysroot', 102 'sysroot%': '<!(cd <(DEPTH) && pwd -P)/build/linux/debian_wheezy_i386-sysroot', 105 'sysroot%': '<!(cd <(DEPTH) && pwd -P)/build/linux/debian_wheezy_mips-sysroot', [all …]
|
/external/compiler-rt/lib/tsan/ |
D | check_cmake.sh | 2 set -u 3 set -e 6 if [ -d "$ROOT/llvm-build" ]; then 7 cd $ROOT/llvm-build 9 mkdir -p $ROOT/llvm-build 10 cd $ROOT/llvm-build 11 …CC=clang CXX=clang++ cmake -G Ninja -DLLVM_ENABLE_WERROR=ON -DCMAKE_BUILD_TYPE=Release -DLLVM_ENAB… 14 ninja check-sanitizer 15 ninja check-tsan 16 ninja check-asan [all …]
|