/external/clang/test/Driver/ |
D | rtti-options.cpp | 2 // exceptions, rtti, and vptr sanitizer flags when targetting the PS4. 4 // the vptr sanitizer with -fno-rtti 6 // Special cases: -fcxx-exceptions in C code should warn about unused arguments 7 // We should also not have any rtti-related arguments 8 …-x c -### -target x86_64-scei-ps4 -c -fcxx-exceptions %s 2>&1 | FileCheck -check-prefix=CHECK-UNUS… 9 …-x c -### -target x86_64-unknown-unknown -c -fcxx-exceptions %s 2>&1 | FileCheck -check-prefix=CHE… 11 // Make sure we keep the last -frtti/-fno-rtti argument 12 // RUN: %clang -### -c -fno-rtti -frtti %s 2>&1 | FileCheck -check-prefix=CHECK-RTTI %s 13 // RUN: %clang -### -c -frtti -fno-rtti %s 2>&1 | FileCheck -check-prefix=CHECK-NO-RTTI %s 15 // -fsanitize=vptr [all …]
|
D | apple-kext-mkernel.c | 1 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only %s 2>&1 | FileCheck --chec… 2 …lang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fno-builtin -fcommon -fn… 4 // CHECK-X86: "-disable-red-zone" 5 // CHECK-X86: "-fno-builtin" 6 // CHECK-X86: "-fno-rtti" 7 // CHECK-X86: "-fno-common" 9 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fcommon %s 2>&1… 11 // CHECK-X86-2: "-disable-red-zone" 12 // CHECK-X86-2-NOT: "-fno-builtin" 13 // CHECK-X86-2: "-fno-rtti" [all …]
|
D | fsanitize.c | 1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | … 2 …-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-… 3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&… 4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### … 5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### … 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
D | cl-options.c | 1 // Note: %s must be preceded by --, otherwise it may be interpreted as a 2 // command-line option, e.g. on Mac where %s is commonly under /Users. 7 // RUN: %clang_cl /c -### -- %s 2>&1 | FileCheck -check-prefix=c %s 8 // c: -c 10 // RUN: %clang_cl /C -### -- %s 2>&1 | FileCheck -check-prefix=C %s 11 // C: error: invalid argument '-C' only allowed with '/E, /P or /EP' 13 // RUN: %clang_cl /C /P -### -- %s 2>&1 | FileCheck -check-prefix=C_P %s 14 // C_P: "-E" 15 // C_P: "-C" 18 // RUN: -### -- %s 2>&1 | FileCheck -check-prefix=D %s [all …]
|
/external/llvm-project/clang/test/Driver/ |
D | rtti-options.cpp | 2 // exceptions, rtti, and vptr sanitizer flags for generic (unknown) x86 linux, 3 // and for PS4 when its behaviour differs from the generic x86-linux. 5 // the vptr sanitizer with -fno-rtti 7 // Special cases: -fcxx-exceptions in C code should warn about unused arguments 8 // We should also not have any rtti-related arguments 9 …N: %clang -x c -### -target x86_64-unknown-unknown -c -fcxx-exceptions %s 2>&1 | FileCheck -check-… 11 // Make sure we keep the last -frtti/-fno-rtti argument 12 // RUN: %clang -### -c -fno-rtti -frtti %s 2>&1 | FileCheck -check-prefix=CHECK-RTTI %s 13 // RUN: %clang -### -c -frtti -fno-rtti %s 2>&1 | FileCheck -check-prefix=CHECK-NO-RTTI %s 15 // -fsanitize=vptr [all …]
|
D | apple-kext-mkernel.c | 1 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only %s 2>&1 | FileCheck --chec… 2 …lang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fno-builtin -fcommon -fn… 4 // CHECK-X86: "-disable-red-zone" 5 // CHECK-X86: "-fno-builtin" 6 // CHECK-X86: "-fno-rtti" 7 // CHECK-X86-NOT: "-fcommon" 9 // RUN: %clang -target x86_64-apple-darwin10 -mkernel -### -fsyntax-only -fbuiltin -fcommon %s 2>&1… 11 // CHECK-X86-2: "-disable-red-zone" 12 // CHECK-X86-2-NOT: "-fno-builtin" 13 // CHECK-X86-2: "-fno-rtti" [all …]
|
D | fsanitize.c | 1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | … 2 …-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-… 3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&… 4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### … 5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### … 6 … RUN: %clang -target x86_64-linux-gnu -fsanitize-trap -fsanitize=undefined-trap %s -### 2>&1 | Fil… 7 // CHECK-UNDEFINED-TRAP-NOT: -fsanitize-recover 8 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-e… 9 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fun… 10 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fu… [all …]
|
/external/llvm-project/clang/test/SemaCXX/ |
D | no-rtti-data.cpp | 1 // RUN: %clang_cc1 %s -triple x86_64-unknown-linux -fno-rtti-data -fsyntax-only -verify 18 … = dynamic_cast<D1 *>(b); // expected-warning{{dynamic_cast will not work since RTTI data is disab… in f() 23 …(void)typeid(*b); // expected-warning{{typeid will not work since RTTI data is disabled by -fno-rt… in f() 26 …(void)typeid(*&b2); // expected-warning{{typeid will not work since RTTI data is disabled by -fno-… in f() 30 …(void)typeid(br); // expected-warning{{typeid will not work since RTTI data is disabled by -fno-rt… in f()
|
/external/llvm-project/compiler-rt/test/asan/TestCases/Linux/ |
D | odr-vtable.cpp | 2 // XFAIL: !compiler-rt-optimized && !riscv64 5 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared -mllvm -asan-use-private-alias=0 %s -o %d… 6 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared -mllvm -asan-use-private-alias=0 %s -o %d… 7 // RUN: %clangxx_asan -fno-rtti %s %ld_flags_rpath_exe1 %ld_flags_rpath_exe2 -o %t 10 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared -mllvm -asan-use-odr-indicator=1 %s -o %d… 11 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared -mllvm -asan-use-odr-indicator=1 %s -o %d… 15 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared %s -o %dynamiclib1 16 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared %s -o %dynamiclib2 37 // CHECK: AddressSanitizer: odr-violation 38 // CHECK-NEXT: 'vtable for XYZ' [all …]
|
/external/google-fruit/extras/benchmark/suites/ |
D | debug.yml | 7 # http://www.apache.org/licenses/LICENSE-2.0 10 # distributed under the License is distributed on an "AS-IS" BASIS, 25 - "g++-9" 26 - "clang++-10" 28 - "g++-9" 30 - "clang++-10" 33 - name: "fruit_single_file_compile_time" 35 - 20 39 - [] 41 - [] [all …]
|
D | fruit_full.yml | 7 # http://www.apache.org/licenses/LICENSE-2.0 10 # distributed under the License is distributed on an "AS-IS" BASIS, 22 - "g++-9" 23 - "clang++-10" 25 - 100 26 - 250 27 - 1000 30 - name: "fruit_single_file_compile_time" 32 - 20 33 - 80 [all …]
|
/external/google-fruit/extras/benchmark/tables/ |
D | fruit_internal.yml | 20 - new_delete_run_time 21 - fruit_single_file_compile_time 24 - total_max_ram_usage 30 - name: "Compile time (Clang)" 34 compiler: "clang++-10" 56 - name: "Compile time (GCC)" 60 compiler: "g++-9" 82 - name: "Incremental compile time (Clang)" 86 compiler: "clang++-10" 108 - name: "Incremental compile time (GCC)" [all …]
|
/external/clang/test/CodeGenCXX/ |
D | exceptions-no-rtti.cpp | 1 // RUN: %clang_cc1 -fno-rtti -fcxx-exceptions -fexceptions %s -triple=x86_64-apple-darwin10 -emit-l… 21 // These classes have key functions defined out-of-line. Under 22 // normal circumstances, we wouldn't generate RTTI for them; under 23 // -fno-rtti, we generate RTTI only when required by EH. But 25 // users are also compiled under -fno-rtti and therefore will be 26 // emitting RTTI regardless of key function.
|
D | dynamic_cast-no-rtti.cpp | 1 // RUN: %clang_cc1 -emit-llvm %s -verify -fno-rtti -triple %itanium_abi_triple -o - | FileCheck %s 2 // expected-no-diagnostics 12 // An upcast can be resolved statically and can be used with -fno-rtti, iff it 16 // CHECK-LABEL: define {{.*}}%struct.A* @_Z6upcastP1B in upcast() 17 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in upcast() 20 // A NoOp dynamic_cast can be used with -fno-rtti iff it does not use 24 // CHECK-LABEL: define {{.*}}%struct.B* @_Z8samecastP1B in samecast() 25 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in samecast()
|
D | microsoft-abi-try-throw.cpp | 1 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept… 2 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept… 4 // THROW-DAG: @"\01??_R0H@8" = linkonce_odr global %rtti.TypeDescriptor2 { i8** @"\01??_7type_info@… 5 …-DAG: @"_CT??_R0H@84" = linkonce_odr unnamed_addr constant %eh.CatchableType { i32 1, i8* bitcast … 6 // THROW-DAG: @_CTA1H = linkonce_odr unnamed_addr constant %eh.CatchableTypeArray.1 { i32 1, [1 x %… 7 // THROW-DAG: @_TI1H = linkonce_odr unnamed_addr constant %eh.ThrowInfo { i32 0, i8* null, i8* null… 22 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor2* @"\01??_R0H@8", i32 0, i8* null] in main() 36 // TRY-LABEL: define void @"\01?qual_catch@@YAXXZ" 42 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor4* @"\01??_R0PAH@8", i32 1, i8* null] in qual_catch()
|
/external/llvm-project/clang/test/CodeGenCXX/ |
D | exceptions-no-rtti.cpp | 1 // RUN: %clang_cc1 -fno-rtti -fcxx-exceptions -fexceptions %s -triple=x86_64-apple-darwin10 -emit-l… 21 // These classes have key functions defined out-of-line. Under 22 // normal circumstances, we wouldn't generate RTTI for them; under 23 // -fno-rtti, we generate RTTI only when required by EH. But 25 // users are also compiled under -fno-rtti and therefore will be 26 // emitting RTTI regardless of key function.
|
D | dynamic_cast-no-rtti.cpp | 1 // RUN: %clang_cc1 -emit-llvm %s -verify -fno-rtti -triple %itanium_abi_triple -o - | FileCheck %s 2 // expected-no-diagnostics 12 // An upcast can be resolved statically and can be used with -fno-rtti, iff it 16 // CHECK-LABEL: define {{.*}}%struct.A* @_Z6upcastP1B in upcast() 17 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in upcast() 20 // A NoOp dynamic_cast can be used with -fno-rtti iff it does not use 24 // CHECK-LABEL: define {{.*}}%struct.B* @_Z8samecastP1B in samecast() 25 // CHECK-NOT: call {{.*}}i8* @__dynamic_cast in samecast()
|
D | microsoft-abi-try-throw.cpp | 1 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept… 2 …clang_cc1 -emit-llvm %s -o - -triple=i386-pc-win32 -mconstructor-aliases -fcxx-exceptions -fexcept… 4 // THROW-DAG: @"??_R0H@8" = linkonce_odr global %rtti.TypeDescriptor2 { i8** @"??_7type_info@@6B@",… 5 …-DAG: @"_CT??_R0H@84" = linkonce_odr unnamed_addr constant %eh.CatchableType { i32 1, i8* bitcast … 6 // THROW-DAG: @_CTA1H = linkonce_odr unnamed_addr constant %eh.CatchableTypeArray.1 { i32 1, [1 x %… 7 // THROW-DAG: @_TI1H = linkonce_odr unnamed_addr constant %eh.ThrowInfo { i32 0, i8* null, i8* null… 22 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor2* @"??_R0H@8", i32 0, i8* null] in main() 36 // TRY-LABEL: define dso_local void @"?qual_catch@@YAXXZ" 42 // TRY: catchpad within {{.*}} [%rtti.TypeDescriptor4* @"??_R0PAH@8", i32 1, i8* null] in qual_catch()
|
/external/clang/test/SemaCXX/ |
D | no-rtti.cpp | 1 // RUN: %clang_cc1 -fsyntax-only -verify -fno-rtti %s 9 (void)typeid(int); // expected-error {{cannot use typeid with -fno-rtti}} in f() 23 return dynamic_cast<B *>(a) != 0; // expected-error {{cannot use dynamic_cast with -fno-rtti}} in isa_B() 27 // This cast does not use RTTI. in getMostDerived()
|
/external/clang/test/Lexer/ |
D | has_feature_rtti.cpp | 1 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-RTTI %s 2 // RUN: %clang_cc1 -E -fno-rtti %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s 3 // RUN: %clang_cc1 -E -fno-rtti-data %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s 11 // CHECK-RTTI: foo 12 // CHECK-NO-RTTI: bar
|
/external/llvm-project/clang/test/Lexer/ |
D | has_feature_rtti.cpp | 1 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-RTTI %s 2 // RUN: %clang_cc1 -E -fno-rtti %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s 3 // RUN: %clang_cc1 -E -fno-rtti-data %s -o - | FileCheck --check-prefix=CHECK-NO-RTTI %s 11 // CHECK-RTTI: foo 12 // CHECK-NO-RTTI: bar
|
/external/tensorflow/tensorflow/lite/tools/make/targets/ |
D | stm32f7_makefile.inc | 4 TARGET_TOOLCHAIN_PREFIX := arm-none-eabi- 7 -DGEMMLOWP_ALLOW_SLOW_SCALAR_FALLBACK \ 8 -DTFLITE_MCU \ 9 -fno-rtti \ 10 -fmessage-length=0 \ 11 -fno-exceptions \ 12 -fno-builtin \ 13 -ffunction-sections \ 14 -fdata-sections \ 15 -funsigned-char \ [all …]
|
/external/llvm-project/polly/ |
D | CMakeLists.txt | 20 execute_process(COMMAND "${LLVM_TOOLS_BINARY_DIR}/llvm-config" --src-root 38 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fPIC") 41 # Set directory for polly-isl-test. 61 # FIXME: Turn off exceptions, RTTI: 62 # -fno-exceptions -fno-rtti 63 …MAKE_CXX_FLAGS} -fno-common -Woverloaded-virtual -Wno-long-long -Wall -W -Wno-unused-parameter -Ww… 65 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} /EHs-c-") 66 add_definitions("-D_HAS_EXCEPTIONS=0") 68 set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fno-exceptions -fno-rtti") 93 add_definitions(-DHAS_LIBCUDART) [all …]
|
/external/toolchain-utils/binary_search_tool/ndk/ |
D | PATCH1 | 3 Date: Tue, 9 Aug 2016 09:38:41 -0700 10 --- 11 Teapot/app/build.gradle | 7 ++++++- 12 1 file changed, 6 insertions(+), 1 deletion(-) 14 diff --git a/Teapot/app/build.gradle b/Teapot/app/build.gradle 16 --- a/Teapot/app/build.gradle 18 @@ -29,7 +29,7 @@ model { 19 cppFlags.addAll(['-I' + "${ndkDir}/sources/android/cpufeatures", 20 '-I' + file('src/main/jni/ndk_helper')]) 21 cppFlags.addAll(['-std=c++11', '-Wall', [all …]
|
/external/llvm-project/lldb/test/Shell/Breakpoint/ |
D | split-dwarf5-debug-stroffsets.test | 1 # RUN: rm -rf %t.dir 4 # RUN: yaml2obj %p/Inputs/split-dwarf5-debug-stroffsets-file1.dwo.yaml -o %t.dir/file1.dwo 5 # RUN: yaml2obj %p/Inputs/split-dwarf5-debug-stroffsets-file2.dwo.yaml -o %t.dir/file2.dwo 6 # RUN: yaml2obj %p/Inputs/split-dwarf5-debug-stroffsets-main.yaml -o %t.dir/test 7 # RUN: lldb-test breakpoints %t.dir/test %s | FileCheck %s 14 # split-dwarf5-debug-stroffsets-file1.dwo.yaml, split-dwarf5-debug-stroffsets-file2.dwo.yaml 15 # and split-dwarf5-debug-stroffsets-main.yaml are reduced yaml files produces 74 # clang++ file1.cpp -o file1.o -g -fno-rtti -c -gdwarf-5 -gsplit-dwarf -ffunction-sections 75 # clang++ file2.cpp -o file2.o -g -fno-rtti -c -gdwarf-5 -gsplit-dwarf -ffunction-sections 76 # clang++ file1.o file2.o -g -fno-rtti -gdwarf-5 -o test -gsplit-dwarf -ffunction-sections [all …]
|