Home
last modified time | relevance | path

Searched +full:- +full:fno +full:- +full:rtti (Results 1 – 25 of 410) sorted by relevance

12345678910>>...17

/external/clang/test/Driver/
Drtti-options.cpp2 // exceptions, rtti, and vptr sanitizer flags when targetting the PS4.
4 // the vptr sanitizer with -fno-rtti
6 // Special cases: -fcxx-exceptions in C code should warn about unused arguments
7 // We should also not have any rtti-related arguments
8-x c -### -target x86_64-scei-ps4 -c -fcxx-exceptions %s 2>&1 | FileCheck -check-prefix=CHECK-UNUS…
9-x c -### -target x86_64-unknown-unknown -c -fcxx-exceptions %s 2>&1 | FileCheck -check-prefix=CHE…
11 // Make sure we keep the last -frtti/-fno-rtti argument
12 // RUN: %clang -### -c -fno-rtti -frtti %s 2>&1 | FileCheck -check-prefix=CHECK-RTTI %s
13 // RUN: %clang -### -c -frtti -fno-rtti %s 2>&1 | FileCheck -check-prefix=CHECK-NO-RTTI %s
15 // -fsanitize=vptr
[all …]
Dapple-kext-mkernel.c1 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only %s 2>&1 | FileCheck --chec…
2 …lang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fno-builtin -fcommon -fn…
4 // CHECK-X86: "-disable-red-zone"
5 // CHECK-X86: "-fno-builtin"
6 // CHECK-X86: "-fno-rtti"
7 // CHECK-X86: "-fno-common"
9 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fcommon %s 2>&1…
11 // CHECK-X86-2: "-disable-red-zone"
12 // CHECK-X86-2-NOT: "-fno-builtin"
13 // CHECK-X86-2: "-fno-rtti"
[all …]
Dfsanitize.c1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | …
2-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-
3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&…
4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### …
5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### …
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
Dcl-options.c1 // Note: %s must be preceded by --, otherwise it may be interpreted as a
2 // command-line option, e.g. on Mac where %s is commonly under /Users.
7 // RUN: %clang_cl /c -### -- %s 2>&1 | FileCheck -check-prefix=c %s
8 // c: -c
10 // RUN: %clang_cl /C -### -- %s 2>&1 | FileCheck -check-prefix=C %s
11 // C: error: invalid argument '-C' only allowed with '/E, /P or /EP'
13 // RUN: %clang_cl /C /P -### -- %s 2>&1 | FileCheck -check-prefix=C_P %s
14 // C_P: "-E"
15 // C_P: "-C"
18 // RUN: -### -- %s 2>&1 | FileCheck -check-prefix=D %s
[all …]
/external/llvm-project/clang/test/Driver/
Drtti-options.cpp2 // exceptions, rtti, and vptr sanitizer flags for generic (unknown) x86 linux,
3 // and for PS4 when its behaviour differs from the generic x86-linux.
5 // the vptr sanitizer with -fno-rtti
7 // Special cases: -fcxx-exceptions in C code should warn about unused arguments
8 // We should also not have any rtti-related arguments
9 …N: %clang -x c -### -target x86_64-unknown-unknown -c -fcxx-exceptions %s 2>&1 | FileCheck -check-
11 // Make sure we keep the last -frtti/-fno-rtti argument
12 // RUN: %clang -### -c -fno-rtti -frtti %s 2>&1 | FileCheck -check-prefix=CHECK-RTTI %s
13 // RUN: %clang -### -c -frtti -fno-rtti %s 2>&1 | FileCheck -check-prefix=CHECK-NO-RTTI %s
15 // -fsanitize=vptr
[all …]
Dapple-kext-mkernel.c1 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only %s 2>&1 | FileCheck --chec…
2 …lang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fno-builtin -fcommon -fn…
4 // CHECK-X86: "-disable-red-zone"
5 // CHECK-X86: "-fno-builtin"
6 // CHECK-X86: "-fno-rtti"
7 // CHECK-X86-NOT: "-fcommon"
9 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fcommon %s 2>&1…
11 // CHECK-X86-2: "-disable-red-zone"
12 // CHECK-X86-2-NOT: "-fno-builtin"
13 // CHECK-X86-2: "-fno-rtti"
[all …]
Dfsanitize.c1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | …
2-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-
3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&…
4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### …
5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### …
6 … RUN: %clang -target x86_64-linux-gnu -fsanitize-trap -fsanitize=undefined-trap %s -### 2>&1 | Fil…
7 // CHECK-UNDEFINED-TRAP-NOT: -fsanitize-recover
8-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-e…
9-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fun…
10-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fu…
[all …]
/external/llvm-project/clang/test/SemaCXX/
Dno-rtti-data.cpp1 // RUN: %clang_cc1 %s -triple x86_64-unknown-linux -fno-rtti-data -fsyntax-only -verify
18 … = dynamic_cast<D1 *>(b); // expected-warning{{dynamic_cast will not work since RTTI data is disab… in f()
23 …(void)typeid(*b); // expected-warning{{typeid will not work since RTTI data is disabled by -fno-rt… in f()
26 …(void)typeid(*&b2); // expected-warning{{typeid will not work since RTTI data is disabled by -fno-… in f()
30 …(void)typeid(br); // expected-warning{{typeid will not work since RTTI data is disabled by -fno-rt… in f()
/external/llvm-project/compiler-rt/test/asan/TestCases/Linux/
Dodr-vtable.cpp2 // XFAIL: !compiler-rt-optimized && !riscv64
5 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared -mllvm -asan-use-private-alias=0 %s -o %d…
6 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared -mllvm -asan-use-private-alias=0 %s -o %d…
7 // RUN: %clangxx_asan -fno-rtti %s %ld_flags_rpath_exe1 %ld_flags_rpath_exe2 -o %t
10 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared -mllvm -asan-use-odr-indicator=1 %s -o %d…
11 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared -mllvm -asan-use-odr-indicator=1 %s -o %d…
15 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared %s -o %dynamiclib1
16 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared %s -o %dynamiclib2
37 // CHECK: AddressSanitizer: odr-violation
38 // CHECK-NEXT: 'vtable for XYZ'
[all …]
/external/google-fruit/extras/benchmark/suites/
Ddebug.yml7 # http://www.apache.org/licenses/LICENSE-2.0
10 # distributed under the License is distributed on an "AS-IS" BASIS,
25 - "g++-9"
26 - "clang++-10"
28 - "g++-9"
30 - "clang++-10"
33 - name: "fruit_single_file_compile_time"
35 - 20
39 - []
41 - []
[all …]
Dfruit_full.yml7 # http://www.apache.org/licenses/LICENSE-2.0
10 # distributed under the License is distributed on an "AS-IS" BASIS,
22 - "g++-9"
23 - "clang++-10"
25 - 100
26 - 250
27 - 1000
30 - name: "fruit_single_file_compile_time"
32 - 20
33 - 80
[all …]
/external/google-fruit/extras/benchmark/tables/
Dfruit_internal.yml20 - new_delete_run_time
21 - fruit_single_file_compile_time
24 - total_max_ram_usage
30 - name: "Compile time (Clang)"
34 compiler: "clang++-10"
56 - name: "Compile time (GCC)"
60 compiler: "g++-9"
82 - name: "Incremental compile time (Clang)"
86 compiler: "clang++-10"
108 - name: "Incremental compile time (GCC)"
[all …]
/external/clang/test/CodeGenCXX/
Dexceptions-no-rtti.cpp1 // RUN: %clang_cc1 -fno-rtti -fcxx-exceptions -fexceptions %s -triple=x86_64-apple-darwin10 -emit-l…
21 // These classes have key functions defined out-of-line. Under
22 // normal circumstances, we wouldn't generate RTTI for them; under
23 // -fno-rtti, we generate RTTI only when required by EH. But
25 // users are also compiled under -fno-rtti and therefore will be
26 // emitting RTTI regardless of key function.
Ddynamic_cast-no-rtti.cpp1 // RUN: %clang_cc1 -emit-llvm %s -verify -fno-rtti -triple %itanium_abi_triple -o - | FileCheck %s
2 // expected-no-diagnostics
12 // An upcast can be resolved statically and can be used with -fno-rtti, iff it
16 // CHECK-LABEL: define {{.*}}%struct.A* @_Z6upcastP1B in upcast()
17 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in upcast()
20 // A NoOp dynamic_cast can be used with -fno-rtti iff it does not use
24 // CHECK-LABEL: define {{.*}}%struct.B* @_Z8samecastP1B in samecast()
25 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in samecast()
Dmicrosoft-abi-try-throw.cpp1 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept…
2 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept…
4 // THROW-DAG: @"\01??_R0H@8" = linkonce_odr global %rtti.TypeDescriptor2 { i8** @"\01??_7type_info@…
5-DAG: @"_CT??_R0H@84" = linkonce_odr unnamed_addr constant %eh.CatchableType { i32 1, i8* bitcast …
6 // THROW-DAG: @_CTA1H = linkonce_odr unnamed_addr constant %eh.CatchableTypeArray.1 { i32 1, [1 x %…
7 // THROW-DAG: @_TI1H = linkonce_odr unnamed_addr constant %eh.ThrowInfo { i32 0, i8* null, i8* null…
22 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor2* @"\01??_R0H@8", i32 0, i8* null] in main()
36 // TRY-LABEL: define void @"\01?qual_catch@@YAXXZ"
42 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor4* @"\01??_R0PAH@8", i32 1, i8* null] in qual_catch()
/external/llvm-project/clang/test/CodeGenCXX/
Dexceptions-no-rtti.cpp1 // RUN: %clang_cc1 -fno-rtti -fcxx-exceptions -fexceptions %s -triple=x86_64-apple-darwin10 -emit-l…
21 // These classes have key functions defined out-of-line. Under
22 // normal circumstances, we wouldn't generate RTTI for them; under
23 // -fno-rtti, we generate RTTI only when required by EH. But
25 // users are also compiled under -fno-rtti and therefore will be
26 // emitting RTTI regardless of key function.
Ddynamic_cast-no-rtti.cpp1 // RUN: %clang_cc1 -emit-llvm %s -verify -fno-rtti -triple %itanium_abi_triple -o - | FileCheck %s
2 // expected-no-diagnostics
12 // An upcast can be resolved statically and can be used with -fno-rtti, iff it
16 // CHECK-LABEL: define {{.*}}%struct.A* @_Z6upcastP1B in upcast()
17 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in upcast()
20 // A NoOp dynamic_cast can be used with -fno-rtti iff it does not use
24 // CHECK-LABEL: define {{.*}}%struct.B* @_Z8samecastP1B in samecast()
25 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in samecast()
Dmicrosoft-abi-try-throw.cpp1 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept…
2 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept…
4 // THROW-DAG: @"??_R0H@8" = linkonce_odr global %rtti.TypeDescriptor2 { i8** @"??_7type_info@@6B@",…
5-DAG: @"_CT??_R0H@84" = linkonce_odr unnamed_addr constant %eh.CatchableType { i32 1, i8* bitcast …
6 // THROW-DAG: @_CTA1H = linkonce_odr unnamed_addr constant %eh.CatchableTypeArray.1 { i32 1, [1 x %…
7 // THROW-DAG: @_TI1H = linkonce_odr unnamed_addr constant %eh.ThrowInfo { i32 0, i8* null, i8* null…
22 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor2* @"??_R0H@8", i32 0, i8* null] in main()
36 // TRY-LABEL: define dso_local void @"?qual_catch@@YAXXZ"
42 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor4* @"??_R0PAH@8", i32 1, i8* null] in qual_catch()
/external/clang/test/SemaCXX/
Dno-rtti.cpp1 // RUN: %clang_cc1 -fsyntax-only -verify -fno-rtti %s
9 (void)typeid(int); // expected-error {{cannot use typeid with -fno-rtti}} in f()
23 return dynamic_cast<B *>(a) != 0; // expected-error {{cannot use dynamic_cast with -fno-rtti}} in isa_B()
27 // This cast does not use RTTI. in getMostDerived()
/external/clang/test/Lexer/
Dhas_feature_rtti.cpp1 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-RTTI %s
2 // RUN: %clang_cc1 -E -fno-rtti %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s
3 // RUN: %clang_cc1 -E -fno-rtti-data %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s
11 // CHECK-RTTI: foo
12 // CHECK-NO-RTTI: bar
/external/llvm-project/clang/test/Lexer/
Dhas_feature_rtti.cpp1 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-RTTI %s
2 // RUN: %clang_cc1 -E -fno-rtti %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s
3 // RUN: %clang_cc1 -E -fno-rtti-data %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s
11 // CHECK-RTTI: foo
12 // CHECK-NO-RTTI: bar
/external/tensorflow/tensorflow/lite/tools/make/targets/
Dstm32f7_makefile.inc4 TARGET_TOOLCHAIN_PREFIX := arm-none-eabi-
7 -DGEMMLOWP_ALLOW_SLOW_SCALAR_FALLBACK \
8 -DTFLITE_MCU \
9 -fno-rtti \
10 -fmessage-length=0 \
11 -fno-exceptions \
12 -fno-builtin \
13 -ffunction-sections \
14 -fdata-sections \
15 -funsigned-char \
[all …]
/external/llvm-project/polly/
DCMakeLists.txt20 execute_process(COMMAND "${LLVM_TOOLS_BINARY_DIR}/llvm-config" --src-root
38 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fPIC")
41 # Set directory for polly-isl-test.
61 # FIXME: Turn off exceptions, RTTI:
62 # -fno-exceptions -fno-rtti
63 …MAKE_CXX_FLAGS} -fno-common -Woverloaded-virtual -Wno-long-long -Wall -W -Wno-unused-parameter -Ww…
65 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} /EHs-c-")
66 add_definitions("-D_HAS_EXCEPTIONS=0")
68 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fno-exceptions -fno-rtti")
93 add_definitions(-DHAS_LIBCUDART)
[all …]
/external/toolchain-utils/binary_search_tool/ndk/
DPATCH13 Date: Tue, 9 Aug 2016 09:38:41 -0700
10 ---
11 Teapot/app/build.gradle | 7 ++++++-
12 1 file changed, 6 insertions(+), 1 deletion(-)
14 diff --git a/Teapot/app/build.gradle b/Teapot/app/build.gradle
16 --- a/Teapot/app/build.gradle
18 @@ -29,7 +29,7 @@ model {
19 cppFlags.addAll(['-I' + "${ndkDir}/sources/android/cpufeatures",
20 '-I' + file('src/main/jni/ndk_helper')])
21 cppFlags.addAll(['-std=c++11', '-Wall',
[all …]
/external/llvm-project/lldb/test/Shell/Breakpoint/
Dsplit-dwarf5-debug-stroffsets.test1 # RUN: rm -rf %t.dir
4 # RUN: yaml2obj %p/Inputs/split-dwarf5-debug-stroffsets-file1.dwo.yaml -o %t.dir/file1.dwo
5 # RUN: yaml2obj %p/Inputs/split-dwarf5-debug-stroffsets-file2.dwo.yaml -o %t.dir/file2.dwo
6 # RUN: yaml2obj %p/Inputs/split-dwarf5-debug-stroffsets-main.yaml -o %t.dir/test
7 # RUN: lldb-test breakpoints %t.dir/test %s | FileCheck %s
14 # split-dwarf5-debug-stroffsets-file1.dwo.yaml, split-dwarf5-debug-stroffsets-file2.dwo.yaml
15 # and split-dwarf5-debug-stroffsets-main.yaml are reduced yaml files produces
74 # clang++ file1.cpp -o file1.o -g -fno-rtti -c -gdwarf-5 -gsplit-dwarf -ffunction-sections
75 # clang++ file2.cpp -o file2.o -g -fno-rtti -c -gdwarf-5 -gsplit-dwarf -ffunction-sections
76 # clang++ file1.o file2.o -g -fno-rtti -gdwarf-5 -o test -gsplit-dwarf -ffunction-sections
[all …]

12345678910>>...17