Home
last modified time | relevance | path

Searched +full:clang +full:- +full:tsan (Results 1 – 25 of 169) sorted by relevance

1234567

/external/skia/site/docs/dev/testing/
Dxsan.md2 ---
3 title: "MSAN, ASAN, & TSAN"
4 linkTitle: "MSAN, ASAN, & TSAN"
6 ---
11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
13 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific.
14 - ASAN works on Linux, Mac, Android, and Windows.
15 - TSAN works on Linux and Mac.
16 - MSAN works on Linux[1].
19 with the system-provided C++ standard library, which is usually libstdc++.
[all …]
/external/skqp/site/dev/testing/
Dxsan.md1 MSAN, ASAN, & TSAN
6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
8 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific.
9 - ASAN works on Linux, Mac, Android.
10 - TSAN works on Linux and Mac.
11 - MSAN works on Linux[1].
14 with the system-provided C++ standard library, which is usually libstdc++.
18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed.
20 of Clang and the instrumented libc++, located in /msan.
22 Downloading Clang binaries (Googlers Only)
[all …]
/external/compiler-rt/lib/tsan/
DCMakeLists.txt6 # SANITIZER_COMMON_CFLAGS contains -fPIC, but it's performance-critical for
7 # TSan runtime to be built with -fPIE to reduce the number of register spills.
8 append_list_if(COMPILER_RT_HAS_FPIE_FLAG -fPIE TSAN_CFLAGS)
12 # Add extra debug information to TSan runtime. This configuration is rarely
14 list(APPEND TSAN_CFLAGS -DTSAN_COLLECT_STATS=1
15 -DTSAN_DEBUG_OUTPUT=2)
19 append_list_if(COMPILER_RT_HAS_MSSE3_FLAG -msse3 TSAN_RTL_CFLAGS)
20 append_list_if(SANITIZER_LIMIT_FRAME_SIZE -Wframe-larger-than=512
22 append_list_if(COMPILER_RT_HAS_WGLOBAL_CONSTRUCTORS_FLAG -Wglobal-constructors
99 add_custom_target(tsan) target
[all …]
/external/llvm-project/clang/test/Driver/
Dfsanitize.c1 …/ RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1…
2clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=s…
3 …: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### …
4 …%clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -#…
5 …%clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -#…
6 // RUN: %clang -target x86_64-linux-gnu -fsanitize-trap -fsanitize=undefined-trap %s -### 2>&1 | Fi…
7 // CHECK-UNDEFINED-TRAP-NOT: -fsanitize-recover
8-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-e…
9-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fun…
10-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fu…
[all …]
Dsanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \
4 // RUN: -target i386-unknown-linux -fuse-ld=ld -fsanitize=address \
5 // RUN: -resource-dir=%S/Inputs/resource_dir \
6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \
7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "--export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
[all …]
Dwindows-cross.c1clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/…
2 // RUN: | FileCheck %s --check-prefix CHECK-BASIC-LIBCXX
4-BASIC-LIBCXX: {{[/\\]}}ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdynamic" …
6clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/…
7 // RUN: | FileCheck %s --check-prefix CHECK-STATIC
9-STATIC: {{[/\\]}}ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bstatic" "--entr…
11clang -### -target armv7-windows-itanium --sysroot %s/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/…
12 // RUN: | FileCheck %s --check-prefix CHECK-RTLIB
14-RTLIB: {{[/\\]}}ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdynamic" "--entr…
16clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/…
[all …]
/external/llvm-project/compiler-rt/lib/tsan/
DCMakeLists.txt6 # SANITIZER_COMMON_CFLAGS contains -fPIC, but it's performance-critical for
7 # TSan runtime to be built with -fPIE to reduce the number of register spills.
10 append_list_if(COMPILER_RT_HAS_FPIE_FLAG -fPIE TSAN_CFLAGS)
15 # Add extra debug information to TSan runtime. This configuration is rarely
17 list(APPEND TSAN_CFLAGS -DTSAN_COLLECT_STATS=1
18 -DTSAN_DEBUG_OUTPUT=2)
22 append_list_if(COMPILER_RT_HAS_MSSE3_FLAG -msse3 TSAN_RTL_CFLAGS)
23 append_list_if(SANITIZER_LIMIT_FRAME_SIZE -Wframe-larger-than=530
25 append_list_if(COMPILER_RT_HAS_WGLOBAL_CONSTRUCTORS_FLAG -Wglobal-constructors
114 add_compiler_rt_component(tsan)
[all …]
/external/clang/test/Driver/
Dsanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \
4 // RUN: -target i386-unknown-linux -fsanitize=address \
5 // RUN: -resource-dir=%S/Inputs/resource_dir \
6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \
7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
[all …]
Dfsanitize.c1 …/ RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1…
2clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=s…
3 …: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### …
4 …%clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -#…
5 …%clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -#…
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
Dwindows-cross.c1 // RUN: %clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/…
2 // RUN: | FileCheck %s --check-prefix CHECK-BASIC
4-BASIC: armv7-windows-itanium-ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdyn…
6clang -### -target armv7-windows-itanium --sysroot %s/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/…
7 // RUN: | FileCheck %s --check-prefix CHECK-RTLIB
9-RTLIB: armv7-windows-itanium-ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdyn…
11 … %clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Window…
12 // RUN: | FileCheck %s --check-prefix CHECK-C-LIBCXX
14-C-LIBCXX: armv7-windows-itanium-ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-B…
16 …ngxx -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/A…
[all …]
/external/skia/infra/bots/recipe_modules/build/examples/full.expected/
DBuild-Debian10-Clang-x86_64-Debug-SwiftShader_TSAN.json5 "-u",
7 "--json-output",
23 "-u",
25 "--json-output",
27 "ensure-directory",
28 "--mode",
30 …"[START_DIR]/cache/work/skia/out/Build-Debian10-Clang-x86_64-Debug-SwiftShader_TSAN/Debug/swiftsha…
38 "-DSWIFTSHADER_BUILD_TESTS=OFF",
39 "-DSWIFTSHADER_WARNINGS_AS_ERRORS=OFF",
40 "-DREACTOR_ENABLE_MEMORY_SANITIZER_INSTRUMENTATION=OFF",
[all …]
DBuild-Debian10-Clang-x86_64-Debug-TSAN.json5 "-u",
7 "--json-output",
23 "-u",
24 "[START_DIR]/cache/work/skia/bin/fetch-gn"
32 "name": "fetch-gn"
37 "-s"
48 "name": "ccache stats-start"
54 "[START_DIR]/cache/work/skia/out/Build-Debian10-Clang-x86_64-Debug-TSAN/Debug",
55--args=cc=\"[START_DIR]/clang_linux/bin/clang\" cc_wrapper=\"[START_DIR]/ccache_linux/bin/ccache\"…
71 "-C",
[all …]
/external/zstd/.github/workflows/
Dgeneric-release.yml1 name: generic-release
20 runs-on: macos-10.15
22 - uses: actions/checkout@v2
23 - name: OS-X
26 # make -c lib all (need to fix. not working right now)
29 runs-on: ubuntu-16.04
31 - uses: actions/checkout@v2
32 - name: zbuff test
34 make -C tests test-zbuff
36 tsan:
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/
Dbazel.rc3 build --client_env=CC=clang
4 build --copt=-DGRPC_BAZEL_BUILD
5 build --action_env=GRPC_BAZEL_RUNTIME=1
6 build --define=use_fast_cpp_protos=true
8 build:opt --compilation_mode=opt
9 build:opt --copt=-Wframe-larger-than=16384
11 build:dbg --compilation_mode=dbg
13 build:windows_opt --compilation_mode=opt
14 build:windows_dbg --compilation_mode=dbg
16 build:asan --strip=never
[all …]
/external/skia/infra/bots/recipe_modules/build/
Ddefault.py2 # Use of this source code is governed by a BSD-style license that can be
13 '--chrome-dir', chrome_dir,
14 '--output-dir', out,
15 '--extra-gn-args', 'mac_sdk_min="10.13"',
16 '--no-sync', '--no-hooks', '--make-output-dir'])
31 '-DSWIFTSHADER_BUILD_TESTS=OFF',
32 '-DSWIFTSHADER_WARNINGS_AS_ERRORS=OFF',
33 '-DREACTOR_ENABLE_MEMORY_SANITIZER_INSTRUMENTATION=OFF', # Way too slow.
40 # We arrange our MSAN/TSAN prebuilts a little differently than
43 # CMakeLists.txt at a harmless non-existent path.
[all …]
/external/llvm-project/clang/test/CodeGen/
Dsanitize-coverage.c1 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize-cover…
2 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=address -fsanitize-cover…
3 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=bounds -fsanitize-cover…
4 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=memory -fsanitize-cover…
5clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=thread -fsanitize-coverage=…
6 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=undefined -fsanitize-cover…
13 // CHECK-LABEL: define dso_local void @foo(
15 // CHECK-DAG: call void @__sanitizer_cov_trace_pc in foo()
16 // CHECK-DAG: call void @__sanitizer_cov_trace_const_cmp in foo()
17 // ASAN-DAG: call void @__asan_report_store in foo()
[all …]
/external/grpc-grpc/tools/
Dbazel.rc1 build --client_env=CC=clang
2 build --copt -DGRPC_BAZEL_BUILD
4 build:opt --copt -Wframe-larger-than=16384
6 build:asan --strip=never
7 build:asan --copt -fsanitize-coverage=edge
8 build:asan --copt -fsanitize=address
9 build:asan --copt -O0
10 build:asan --copt -fno-omit-frame-pointer
11 build:asan --copt -DGPR_NO_DIRECT_SYSCALLS
12 build:asan --linkopt -fsanitize=address
[all …]
/external/skia/infra/bots/assets/clang_linux/
Dcreate.py5 # Use of this source code is governed by a BSD-style license that can be
9 """Create a Clang toolchain for Linux hosts."""
23 # Build Clang, lld, compiler-rt (sanitizer support) and libc++.
25 subprocess.check_call(["git", "clone", "--depth", "1", "-b", BRANCH,
26 "https://llvm.googlesource.com/llvm-project"])
27 os.chdir("llvm-project")
30 subprocess.check_call(["cmake", "../llvm", "-G", "Ninja",
31 "-DCMAKE_BUILD_TYPE=MinSizeRel",
32 "-DCMAKE_INSTALL_PREFIX=" + target_dir,
33 "-DLLVM_ENABLE_PROJECTS=clang;clang-tools-extra;" +
[all …]
/external/libyuv/files/
D.gitignore2 pin-log.txt
17 /sde-avx-sse-transition-out.txt
21 /third_party/appurify-python
32 /third_party/jsr-305
38 /third_party/llvm-build
48 /tools/clang
63 /tools/valgrind-libyuv/libyuv_tests.bat
64 /tools/valgrind-libyuv/libyuv_tests.py
65 /tools/valgrind-libyuv/libyuv_tests.sh
66 /tools/valgrind-libyuv/memcheck/OWNERS
[all …]
/external/webrtc/third_party/abseil-cpp/ci/
Dlinux_clang-latest_libcxx_tsan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [ -z ${ABSEIL_ROOT:-} ]; then
27 if [ -z ${STD:-} ]; then
31 if [ -z ${COMPILATION_MODE:-} ]; then
35 if [ -z ${EXCEPTIONS_MODE:-} ]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
39 readonly DOCKER_CONTAINER="gcr.io/google.com/absl-177019/linux_clang-latest:20200102"
43 if [ ${USE_BAZEL_CACHE:-0} -ne 0 ]; then
[all …]
/external/abseil-cpp/ci/
Dlinux_clang-latest_libcxx_tsan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [ -z ${ABSEIL_ROOT:-} ]; then
27 if [ -z ${STD:-} ]; then
31 if [ -z ${COMPILATION_MODE:-} ]; then
35 if [ -z ${EXCEPTIONS_MODE:-} ]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
39 readonly DOCKER_CONTAINER="gcr.io/google.com/absl-177019/linux_clang-latest:20200102"
43 if [ ${USE_BAZEL_CACHE:-0} -ne 0 ]; then
[all …]
/external/rust/crates/grpcio-sys/grpc/third_party/abseil-cpp/ci/
Dlinux_clang-latest_libcxx_tsan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [[ -z ${ABSEIL_ROOT:-} ]]; then
27 if [[ -z ${STD:-} ]]; then
31 if [[ -z ${COMPILATION_MODE:-} ]]; then
35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then
45 DOCKER_EXTRA_ARGS="--volume=${KOKORO_KEYSTORE_DIR}:/keystore:ro ${DOCKER_EXTRA_ARGS:-}"
[all …]
/external/libtextclassifier/abseil-cpp/ci/
Dlinux_clang-latest_libcxx_tsan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [[ -z ${ABSEIL_ROOT:-} ]]; then
27 if [[ -z ${STD:-} ]]; then
31 if [[ -z ${COMPILATION_MODE:-} ]]; then
35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then
45 DOCKER_EXTRA_ARGS="--volume=${KOKORO_KEYSTORE_DIR}:/keystore:ro ${DOCKER_EXTRA_ARGS:-}"
[all …]
/external/angle/third_party/abseil-cpp/ci/
Dlinux_clang-latest_libcxx_tsan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [[ -z ${ABSEIL_ROOT:-} ]]; then
27 if [[ -z ${STD:-} ]]; then
31 if [[ -z ${COMPILATION_MODE:-} ]]; then
35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then
45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC…
[all …]
/external/openscreen/third_party/abseil/src/ci/
Dlinux_clang-latest_libcxx_tsan_bazel.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 # This script that can be invoked to test abseil-cpp in a hermetic environment
21 set -euox pipefail
23 if [[ -z ${ABSEIL_ROOT:-} ]]; then
27 if [[ -z ${STD:-} ]]; then
31 if [[ -z ${COMPILATION_MODE:-} ]]; then
35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then
36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions"
44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then
45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC…
[all …]

1234567