/external/skia/site/docs/dev/testing/ |
D | xsan.md | 2 --- 3 title: "MSAN, ASAN, & TSAN" 4 linkTitle: "MSAN, ASAN, & TSAN" 6 --- 11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 13 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific. 14 - ASAN works on Linux, Mac, Android, and Windows. 15 - TSAN works on Linux and Mac. 16 - MSAN works on Linux[1]. 19 with the system-provided C++ standard library, which is usually libstdc++. [all …]
|
/external/skqp/site/dev/testing/ |
D | xsan.md | 1 MSAN, ASAN, & TSAN 6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 8 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific. 9 - ASAN works on Linux, Mac, Android. 10 - TSAN works on Linux and Mac. 11 - MSAN works on Linux[1]. 14 with the system-provided C++ standard library, which is usually libstdc++. 18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed. 20 of Clang and the instrumented libc++, located in /msan. 22 Downloading Clang binaries (Googlers Only) [all …]
|
/external/compiler-rt/lib/tsan/ |
D | CMakeLists.txt | 6 # SANITIZER_COMMON_CFLAGS contains -fPIC, but it's performance-critical for 7 # TSan runtime to be built with -fPIE to reduce the number of register spills. 8 append_list_if(COMPILER_RT_HAS_FPIE_FLAG -fPIE TSAN_CFLAGS) 12 # Add extra debug information to TSan runtime. This configuration is rarely 14 list(APPEND TSAN_CFLAGS -DTSAN_COLLECT_STATS=1 15 -DTSAN_DEBUG_OUTPUT=2) 19 append_list_if(COMPILER_RT_HAS_MSSE3_FLAG -msse3 TSAN_RTL_CFLAGS) 20 append_list_if(SANITIZER_LIMIT_FRAME_SIZE -Wframe-larger-than=512 22 append_list_if(COMPILER_RT_HAS_WGLOBAL_CONSTRUCTORS_FLAG -Wglobal-constructors 99 add_custom_target(tsan) target [all …]
|
/external/llvm-project/clang/test/Driver/ |
D | fsanitize.c | 1 …/ RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1… 2 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=s… 3 …: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### … 4 …%clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -#… 5 …%clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -#… 6 // RUN: %clang -target x86_64-linux-gnu -fsanitize-trap -fsanitize=undefined-trap %s -### 2>&1 | Fi… 7 // CHECK-UNDEFINED-TRAP-NOT: -fsanitize-recover 8 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-e… 9 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fun… 10 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fu… [all …]
|
D | sanitizer-ld.c | 3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \ 4 // RUN: -target i386-unknown-linux -fuse-ld=ld -fsanitize=address \ 5 // RUN: -resource-dir=%S/Inputs/resource_dir \ 6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \ 7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s 9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 10 // CHECK-ASAN-LINUX-NOT: "-lc" 11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a" 12 // CHECK-ASAN-LINUX-NOT: "--export-dynamic" 13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms" [all …]
|
D | windows-cross.c | 1 …clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/… 2 // RUN: | FileCheck %s --check-prefix CHECK-BASIC-LIBCXX 4 …-BASIC-LIBCXX: {{[/\\]}}ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdynamic" … 6 …clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/… 7 // RUN: | FileCheck %s --check-prefix CHECK-STATIC 9 …-STATIC: {{[/\\]}}ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bstatic" "--entr… 11 …clang -### -target armv7-windows-itanium --sysroot %s/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/… 12 // RUN: | FileCheck %s --check-prefix CHECK-RTLIB 14 …-RTLIB: {{[/\\]}}ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdynamic" "--entr… 16 …clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/… [all …]
|
/external/llvm-project/compiler-rt/lib/tsan/ |
D | CMakeLists.txt | 6 # SANITIZER_COMMON_CFLAGS contains -fPIC, but it's performance-critical for 7 # TSan runtime to be built with -fPIE to reduce the number of register spills. 10 append_list_if(COMPILER_RT_HAS_FPIE_FLAG -fPIE TSAN_CFLAGS) 15 # Add extra debug information to TSan runtime. This configuration is rarely 17 list(APPEND TSAN_CFLAGS -DTSAN_COLLECT_STATS=1 18 -DTSAN_DEBUG_OUTPUT=2) 22 append_list_if(COMPILER_RT_HAS_MSSE3_FLAG -msse3 TSAN_RTL_CFLAGS) 23 append_list_if(SANITIZER_LIMIT_FRAME_SIZE -Wframe-larger-than=530 25 append_list_if(COMPILER_RT_HAS_WGLOBAL_CONSTRUCTORS_FLAG -Wglobal-constructors 114 add_compiler_rt_component(tsan) [all …]
|
/external/clang/test/Driver/ |
D | sanitizer-ld.c | 3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \ 4 // RUN: -target i386-unknown-linux -fsanitize=address \ 5 // RUN: -resource-dir=%S/Inputs/resource_dir \ 6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \ 7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s 9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 10 // CHECK-ASAN-LINUX-NOT: "-lc" 11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a" 12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic" 13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms" [all …]
|
D | fsanitize.c | 1 …/ RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1… 2 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=s… 3 …: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### … 4 …%clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -#… 5 …%clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -#… 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
D | windows-cross.c | 1 // RUN: %clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/… 2 // RUN: | FileCheck %s --check-prefix CHECK-BASIC 4 …-BASIC: armv7-windows-itanium-ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdyn… 6 …clang -### -target armv7-windows-itanium --sysroot %s/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/… 7 // RUN: | FileCheck %s --check-prefix CHECK-RTLIB 9 …-RTLIB: armv7-windows-itanium-ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-Bdyn… 11 … %clang -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Window… 12 // RUN: | FileCheck %s --check-prefix CHECK-C-LIBCXX 14 …-C-LIBCXX: armv7-windows-itanium-ld" "--sysroot={{.*}}/Inputs/Windows/ARM/8.1" "-m" "thumb2pe" "-B… 16 …ngxx -### -target armv7-windows-itanium --sysroot %S/Inputs/Windows/ARM/8.1 -B %S/Inputs/Windows/A… [all …]
|
/external/skia/infra/bots/recipe_modules/build/examples/full.expected/ |
D | Build-Debian10-Clang-x86_64-Debug-SwiftShader_TSAN.json | 5 "-u", 7 "--json-output", 23 "-u", 25 "--json-output", 27 "ensure-directory", 28 "--mode", 30 …"[START_DIR]/cache/work/skia/out/Build-Debian10-Clang-x86_64-Debug-SwiftShader_TSAN/Debug/swiftsha… 38 "-DSWIFTSHADER_BUILD_TESTS=OFF", 39 "-DSWIFTSHADER_WARNINGS_AS_ERRORS=OFF", 40 "-DREACTOR_ENABLE_MEMORY_SANITIZER_INSTRUMENTATION=OFF", [all …]
|
D | Build-Debian10-Clang-x86_64-Debug-TSAN.json | 5 "-u", 7 "--json-output", 23 "-u", 24 "[START_DIR]/cache/work/skia/bin/fetch-gn" 32 "name": "fetch-gn" 37 "-s" 48 "name": "ccache stats-start" 54 "[START_DIR]/cache/work/skia/out/Build-Debian10-Clang-x86_64-Debug-TSAN/Debug", 55 …--args=cc=\"[START_DIR]/clang_linux/bin/clang\" cc_wrapper=\"[START_DIR]/ccache_linux/bin/ccache\"… 71 "-C", [all …]
|
/external/zstd/.github/workflows/ |
D | generic-release.yml | 1 name: generic-release 20 runs-on: macos-10.15 22 - uses: actions/checkout@v2 23 - name: OS-X 26 # make -c lib all (need to fix. not working right now) 29 runs-on: ubuntu-16.04 31 - uses: actions/checkout@v2 32 - name: zbuff test 34 make -C tests test-zbuff 36 tsan: [all …]
|
/external/rust/crates/grpcio-sys/grpc/tools/ |
D | bazel.rc | 3 build --client_env=CC=clang 4 build --copt=-DGRPC_BAZEL_BUILD 5 build --action_env=GRPC_BAZEL_RUNTIME=1 6 build --define=use_fast_cpp_protos=true 8 build:opt --compilation_mode=opt 9 build:opt --copt=-Wframe-larger-than=16384 11 build:dbg --compilation_mode=dbg 13 build:windows_opt --compilation_mode=opt 14 build:windows_dbg --compilation_mode=dbg 16 build:asan --strip=never [all …]
|
/external/skia/infra/bots/recipe_modules/build/ |
D | default.py | 2 # Use of this source code is governed by a BSD-style license that can be 13 '--chrome-dir', chrome_dir, 14 '--output-dir', out, 15 '--extra-gn-args', 'mac_sdk_min="10.13"', 16 '--no-sync', '--no-hooks', '--make-output-dir']) 31 '-DSWIFTSHADER_BUILD_TESTS=OFF', 32 '-DSWIFTSHADER_WARNINGS_AS_ERRORS=OFF', 33 '-DREACTOR_ENABLE_MEMORY_SANITIZER_INSTRUMENTATION=OFF', # Way too slow. 40 # We arrange our MSAN/TSAN prebuilts a little differently than 43 # CMakeLists.txt at a harmless non-existent path. [all …]
|
/external/llvm-project/clang/test/CodeGen/ |
D | sanitize-coverage.c | 1 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize-cover… 2 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=address -fsanitize-cover… 3 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=bounds -fsanitize-cover… 4 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=memory -fsanitize-cover… 5 …clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=thread -fsanitize-coverage=… 6 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=undefined -fsanitize-cover… 13 // CHECK-LABEL: define dso_local void @foo( 15 // CHECK-DAG: call void @__sanitizer_cov_trace_pc in foo() 16 // CHECK-DAG: call void @__sanitizer_cov_trace_const_cmp in foo() 17 // ASAN-DAG: call void @__asan_report_store in foo() [all …]
|
/external/grpc-grpc/tools/ |
D | bazel.rc | 1 build --client_env=CC=clang 2 build --copt -DGRPC_BAZEL_BUILD 4 build:opt --copt -Wframe-larger-than=16384 6 build:asan --strip=never 7 build:asan --copt -fsanitize-coverage=edge 8 build:asan --copt -fsanitize=address 9 build:asan --copt -O0 10 build:asan --copt -fno-omit-frame-pointer 11 build:asan --copt -DGPR_NO_DIRECT_SYSCALLS 12 build:asan --linkopt -fsanitize=address [all …]
|
/external/skia/infra/bots/assets/clang_linux/ |
D | create.py | 5 # Use of this source code is governed by a BSD-style license that can be 9 """Create a Clang toolchain for Linux hosts.""" 23 # Build Clang, lld, compiler-rt (sanitizer support) and libc++. 25 subprocess.check_call(["git", "clone", "--depth", "1", "-b", BRANCH, 26 "https://llvm.googlesource.com/llvm-project"]) 27 os.chdir("llvm-project") 30 subprocess.check_call(["cmake", "../llvm", "-G", "Ninja", 31 "-DCMAKE_BUILD_TYPE=MinSizeRel", 32 "-DCMAKE_INSTALL_PREFIX=" + target_dir, 33 "-DLLVM_ENABLE_PROJECTS=clang;clang-tools-extra;" + [all …]
|
/external/libyuv/files/ |
D | .gitignore | 2 pin-log.txt 17 /sde-avx-sse-transition-out.txt 21 /third_party/appurify-python 32 /third_party/jsr-305 38 /third_party/llvm-build 48 /tools/clang 63 /tools/valgrind-libyuv/libyuv_tests.bat 64 /tools/valgrind-libyuv/libyuv_tests.py 65 /tools/valgrind-libyuv/libyuv_tests.sh 66 /tools/valgrind-libyuv/memcheck/OWNERS [all …]
|
/external/webrtc/third_party/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_tsan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [ -z ${ABSEIL_ROOT:-} ]; then 27 if [ -z ${STD:-} ]; then 31 if [ -z ${COMPILATION_MODE:-} ]; then 35 if [ -z ${EXCEPTIONS_MODE:-} ]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 39 readonly DOCKER_CONTAINER="gcr.io/google.com/absl-177019/linux_clang-latest:20200102" 43 if [ ${USE_BAZEL_CACHE:-0} -ne 0 ]; then [all …]
|
/external/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_tsan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [ -z ${ABSEIL_ROOT:-} ]; then 27 if [ -z ${STD:-} ]; then 31 if [ -z ${COMPILATION_MODE:-} ]; then 35 if [ -z ${EXCEPTIONS_MODE:-} ]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 39 readonly DOCKER_CONTAINER="gcr.io/google.com/absl-177019/linux_clang-latest:20200102" 43 if [ ${USE_BAZEL_CACHE:-0} -ne 0 ]; then [all …]
|
/external/rust/crates/grpcio-sys/grpc/third_party/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_tsan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 DOCKER_EXTRA_ARGS="--volume=${KOKORO_KEYSTORE_DIR}:/keystore:ro ${DOCKER_EXTRA_ARGS:-}" [all …]
|
/external/libtextclassifier/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_tsan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 DOCKER_EXTRA_ARGS="--volume=${KOKORO_KEYSTORE_DIR}:/keystore:ro ${DOCKER_EXTRA_ARGS:-}" [all …]
|
/external/angle/third_party/abseil-cpp/ci/ |
D | linux_clang-latest_libcxx_tsan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC… [all …]
|
/external/openscreen/third_party/abseil/src/ci/ |
D | linux_clang-latest_libcxx_tsan_bazel.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 # This script that can be invoked to test abseil-cpp in a hermetic environment 21 set -euox pipefail 23 if [[ -z ${ABSEIL_ROOT:-} ]]; then 27 if [[ -z ${STD:-} ]]; then 31 if [[ -z ${COMPILATION_MODE:-} ]]; then 35 if [[ -z ${EXCEPTIONS_MODE:-} ]]; then 36 EXCEPTIONS_MODE="-fno-exceptions -fexceptions" 44 if [[ ${USE_BAZEL_CACHE:-0} -ne 0 ]]; then 45 …DOCKER_EXTRA_ARGS="--mount type=bind,source=${KOKORO_KEYSTORE_DIR},target=/keystore,readonly ${DOC… [all …]
|