Home
last modified time | relevance | path

Searched +full:clang +full:- +full:ubsan (Results 1 – 25 of 164) sorted by relevance

1234567

/external/google-fruit/extras/scripts/
Dtravis_yml_generator.py8 # http://www.apache.org/licenses/LICENSE-2.0
11 # distributed under the License is distributed on an "AS-IS" BASIS,
26 elif compiler.startswith('clang'):
27 return 'clang'
32 def determine_tests(asan, ubsan, clang_tidy, smoke_tests, use_precompiled_headers_in_tests, exclude… argument
39 if ubsan:
43 if ubsan and not asan:
44 raise Exception('Enabling UBSan but not ASan is not currently supported.')
50 excessive_excluded_tests = set(exclude_tests) - set(tests)
77 def add_ubuntu_tests(ubuntu_version, compiler, os='linux', stl=None, asan=True, ubsan=True, clang_t… argument
[all …]
/external/clang/test/Driver/
Dsanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \
4 // RUN: -target i386-unknown-linux -fsanitize=address \
5 // RUN: -resource-dir=%S/Inputs/resource_dir \
6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \
7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
[all …]
Ddarwin-sanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes -### -target x86_64-darwin \
4 // RUN: -stdlib=platform -fsanitize=address %s -o %t.o 2>&1 \
5 // RUN: | FileCheck --check-prefix=CHECK-ASAN %s
7 // CHECK-ASAN: "{{.*}}ld{{(.exe)?}}"
8 // CHECK-ASAN-NOT: "-lstdc++"
9 // CHECK-ASAN-NOT: "-lc++"
10 // CHECK-ASAN: libclang_rt.asan_osx_dynamic.dylib"
11 // CHECK-ASAN: "-rpath" "@executable_path"
12 // CHECK-ASAN: "-rpath" "{{.*}}lib{{.*}}darwin"
14 // RUN: %clang -no-canonical-prefixes -### -target x86_64-darwin \
[all …]
/external/llvm-project/clang/test/Driver/
Dsanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \
4 // RUN: -target i386-unknown-linux -fuse-ld=ld -fsanitize=address \
5 // RUN: -resource-dir=%S/Inputs/resource_dir \
6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \
7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "--export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
[all …]
Ddarwin-sanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes -### -target x86_64-darwin \
4 // RUN: -stdlib=platform -fsanitize=address %s -o %t.o 2>&1 \
5 // RUN: | FileCheck --check-prefix=CHECK-ASAN %s
7 // CHECK-ASAN: "{{.*}}ld{{(.exe)?}}"
8 // CHECK-ASAN-NOT: "-lstdc++"
9 // CHECK-ASAN-NOT: "-lc++"
10 // CHECK-ASAN: libclang_rt.asan_osx_dynamic.dylib"
11 // CHECK-ASAN: "-rpath" "@executable_path"
12 // CHECK-ASAN: "-rpath" "{{.*}}lib{{.*}}darwin"
14 // RUN: %clang -no-canonical-prefixes -### -target x86_64-darwin \
[all …]
Dfsanitize-blacklist.c4 // REQUIRES: clang-driver
6 // Make sure we don't match the -NOT lines with the linker invocation.
9 // DELIMITERS: {{^ (\(in-process\)|")}}
15clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklis…
16clang -target aarch64-linux-gnu -fsanitize=hwaddress -fsanitize-blacklist=%t.good -fsanitize-black…
17 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second
20clang -target x86_64-linux-gnu -fsanitize=address -resource-dir=%S/Inputs/resource_dir %s -### 2>&…
21 // CHECK-DEFAULT-BLACKLIST-ASAN: -fsanitize-system-blacklist={{.*[^w]}}asan_blacklist.txt
22clang -target x86_64-linux-gnu -fsanitize=hwaddress -resource-dir=%S/Inputs/resource_dir %s -### 2…
23 // CHECK-DEFAULT-BLACKLIST-HWASAN: -fsanitize-system-blacklist={{.*}}hwasan_blacklist.txt
[all …]
Dfsanitize.c1 …/ RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1…
2clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=s…
3 …: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### …
4 …%clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -#…
5 …%clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -#…
6 // RUN: %clang -target x86_64-linux-gnu -fsanitize-trap -fsanitize=undefined-trap %s -### 2>&1 | Fi…
7 // CHECK-UNDEFINED-TRAP-NOT: -fsanitize-recover
8-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-e…
9-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fun…
10-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,builtin,enum,float-cast-overflow,fu…
[all …]
/external/zstd/.github/workflows/
Dgeneric-dev.yml1 name: generic-dev
11 # icc (need self-hosted)
14 # staticAnalyze (need trusty so need self-hosted)
15 # pcc-fuzz: (need trusty so need self-hosted)
16 # min-decomp-macros (flakey)
18 # setting up self-hosted is pretty straightforward, but
26 runs-on: ubuntu-latest
28 - uses: actions/checkout@v2
29 - name: make benchmarking
33 runs-on: ubuntu-latest
[all …]
/external/compiler-rt/test/ubsan/
Dlit.common.cfg1 # -*- Python -*-
18 # Choose between standalone and UBSan+ASan modes.
21 config.name = 'UBSan-Standalone-' + config.target_arch
22 config.available_features.add("ubsan-standalone")
25 config.name = 'UBSan-ASan-' + config.target_arch
26 config.available_features.add("ubsan-asan")
27 clang_ubsan_cflags = ["-fsanitize=address"]
30 config.name = 'UBSan-MSan-' + config.target_arch
31 config.available_features.add("ubsan-msan")
32 clang_ubsan_cflags = ["-fsanitize=memory"]
[all …]
/external/zstd/tests/fuzz/
DREADME.md16 Run `./fuzz.py -h` for the commands and run `./fuzz.py COMMAND -h` for
24 make -C ../tests decodecorpus
28 By default it outputs 100 samples, each at most 8KB into `corpora/TARGET-seed`,
29 but that can be configured with the `--number`, `--max-size-log` and `--seed`
35 `--cc`, `--cflags`, etc.
37 `--lib-fuzzing-engine`, the default is `libregression.a`.
38 Alternatively, you can use Clang's built in fuzzing engine with
39 `--enable-fuzzer`.
40 It has flags that can easily set up sanitizers `--enable-{a,ub,m}san`, and
41 coverage instrumentation `--enable-coverage`.
[all …]
/external/clang/docs/
DUndefinedBehaviorSanitizer.rst11 UndefinedBehaviorSanitizer (UBSan) is a fast undefined behavior detector.
12 UBSan modifies the program at compile-time to catch various kinds of undefined
17 * Conversion to, from, or between floating-point types which would
20 See the full list of available :ref:`checks <ubsan-checks>` below.
22 UBSan has an optional run-time library which provides better error reporting.
28 Build LLVM/Clang with `CMake <http://llvm.org/docs/CMake.html>`_.
33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined``
34 flag. Make sure to use ``clang++`` (not ``ld``) as a linker, so that your
35 executable is linked with proper UBSan runtime libraries. You can use ``clang``
36 instead of ``clang++`` if you're compiling/linking C code.
[all …]
/external/llvm-project/compiler-rt/test/ubsan/
Dlit.common.cfg.py1 # -*- Python -*-
15 config.name = 'UBSan-' + config.name_suffix
21 # Choose between standalone and UBSan+ASan modes.
24 config.available_features.add("ubsan-standalone")
27 config.available_features.add("ubsan-standalone-static")
28 clang_ubsan_cflags = ['-static-libsan']
30 config.available_features.add("ubsan-asan")
31 clang_ubsan_cflags = ["-fsanitize=address"]
34 config.available_features.add("ubsan-msan")
35 clang_ubsan_cflags = ["-fsanitize=memory"]
[all …]
/external/llvm-project/clang/docs/
DUndefinedBehaviorSanitizer.rst11 UndefinedBehaviorSanitizer (UBSan) is a fast undefined behavior detector.
12 UBSan modifies the program at compile-time to catch various kinds of undefined
17 * Conversion to, from, or between floating-point types which would
20 See the full list of available :ref:`checks <ubsan-checks>` below.
22 UBSan has an optional run-time library which provides better error reporting.
28 Build LLVM/Clang with `CMake <https://llvm.org/docs/CMake.html>`_.
33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined``
34 flag. Make sure to use ``clang++`` (not ``ld``) as a linker, so that your
35 executable is linked with proper UBSan runtime libraries. You can use ``clang``
36 instead of ``clang++`` if you're compiling/linking C code.
[all …]
/external/llvm-project/clang/test/Lexer/
Dhas_feature_undefined_behavior_sanitizer.cpp1 // RUN: %clang -E -fsanitize=undefined %s -o - | FileCheck --check-prefix=CHECK-UBSAN %s
2 // RUN: %clang -E -fsanitize=alignment %s -o - | FileCheck --check-prefix=CHECK-ALIGNMENT %s
3 // RUN: %clang -E %s -o - | FileCheck --check-prefix=CHECK-NO-UBSAN %s
11 // CHECK-UBSAN: UBSanEnabled
12 // CHECK-ALIGNMENT: UBSanEnabled
13 // CHECK-NO-UBSAN: UBSanDisabled
/external/llvm-project/clang/runtime/
DCMakeLists.txt20 set(${out_var} ${CMAKE_COMMAND} --build . --target ${target}
21 --config $<CONFIG> PARENT_SCOPE)
25 set(COMPILER_RT_SRC_ROOT ${LLVM_MAIN_SRC_DIR}/projects/compiler-rt)
38 # Add compiler-rt as an external project.
39 set(COMPILER_RT_PREFIX ${CMAKE_BINARY_DIR}/projects/compiler-rt)
41 set(STAMP_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-stamps/)
42 set(BINARY_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-bins/)
44 add_custom_target(compiler-rt-clear
45 COMMAND ${CMAKE_COMMAND} -E remove_directory ${BINARY_DIR}
46 COMMAND ${CMAKE_COMMAND} -E remove_directory ${STAMP_DIR}
[all …]
/external/zstd/
D.travis.yml10 - dev
11 - master
12 - travisTest
20 - FUZZERTEST=-T2mn
21 ZSTREAM_TESTTIME=-T2mn
22 DECODECORPUS_TESTTIME=-T1mn
28 - name: arm64 # ~2.5 mn
32 - make check
34 - name: make benchmarking
36 - make benchmarking
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/
Dbazel.rc3 build --client_env=CC=clang
4 build --copt=-DGRPC_BAZEL_BUILD
5 build --action_env=GRPC_BAZEL_RUNTIME=1
6 build --define=use_fast_cpp_protos=true
8 build:opt --compilation_mode=opt
9 build:opt --copt=-Wframe-larger-than=16384
11 build:dbg --compilation_mode=dbg
13 build:windows_opt --compilation_mode=opt
14 build:windows_dbg --compilation_mode=dbg
16 build:asan --strip=never
[all …]
/external/llvm-project/compiler-rt/test/
DCMakeLists.txt22 # Use LLVM utils and Clang from the same build tree.
24 clang clang-resource-headers FileCheck count not llvm-config llvm-nm llvm-objdump
25 llvm-readobj llvm-symbolizer compiler-rt-headers sancov)
42 # Run sanitizer tests only if we're sure that clang would produce
52 # CFI tests require diagnostic mode, which is implemented in UBSan.
53 compiler_rt_test_runtime(ubsan cfi)
62 # cfi testing is gated on ubsan
80 # ShadowCallStack does not yet provide a runtime with compiler-rt, the tests
90 add_lit_target(check-compiler-rt
94 if(NOT TARGET check-all)
[all …]
/external/tensorflow/tensorflow/lite/micro/tools/ci_build/
Dtest_bazel.sh8 # http://www.apache.org/licenses/LICENSE-2.0
25 set -e
35 readable_run rm -f tensorflow/BUILD
36 readable_run rm -f tensorflow/tensorflow.bzl
37 readable_run rm -f tensorflow/workspace.bzl
38 readable_run rm -f tensorflow/workspace0.bzl
39 readable_run rm -f tensorflow/workspace1.bzl
40 readable_run rm -f tensorflow/workspace2.bzl
41 readable_run rm -f WORKSPACE
51 CC=clang readable_run bazel test tensorflow/lite/micro/... \
[all …]
/external/grpc-grpc/tools/
Dbazel.rc1 build --client_env=CC=clang
2 build --copt -DGRPC_BAZEL_BUILD
4 build:opt --copt -Wframe-larger-than=16384
6 build:asan --strip=never
7 build:asan --copt -fsanitize-coverage=edge
8 build:asan --copt -fsanitize=address
9 build:asan --copt -O0
10 build:asan --copt -fno-omit-frame-pointer
11 build:asan --copt -DGPR_NO_DIRECT_SYSCALLS
12 build:asan --linkopt -fsanitize=address
[all …]
/external/rust/crates/grpcio-sys/grpc/third_party/upb/kokoro/ubuntu/
Dbuild.sh3 set -ex
6 if [ -x "$(command -v use_bazel.sh)" ]; then
12 ls -l `which cmake`
13 cmake --version
22 gcc --version
23 CC=gcc bazel test -c opt --test_output=errors ... -- -benchmarks:benchmark
25 CC=gcc bazel test --test_output=errors ...
26 …CC=gcc bazel test --test_output=errors ... --//:fasttable_enabled=true -- -cmake:test_generated_fi…
29 # if gcc -fanalyzer -x c /dev/null -c -o /dev/null; then
30 # CC=gcc bazel test --copt=-fanalyzer --test_output=errors ...
[all …]
/external/llvm-project/compiler-rt/lib/ubsan/
DCMakeLists.txt45 append_list_if(SANITIZER_CAN_USE_CXXABI -DUBSAN_CAN_USE_CXXABI UBSAN_CFLAGS)
49 append_list_if(SANITIZER_CAN_USE_CXXABI -DUBSAN_CAN_USE_CXXABI UBSAN_STANDALONE_CFLAGS)
53 append_list_if(SANITIZER_CAN_USE_CXXABI -DUBSAN_CAN_USE_CXXABI UBSAN_CXXFLAGS)
64 add_compiler_rt_component(ubsan)
72 # Common parts of UBSan runtime.
81 # Initializer of standalone UBSan runtime.
89 add_weak_symbols("ubsan" WEAK_SYMBOL_LINK_FLAGS)
92 add_compiler_rt_runtime(clang_rt.ubsan
104 PARENT_TARGET ubsan)
106 add_compiler_rt_runtime(clang_rt.ubsan
[all …]
/external/llvm-project/clang/test/CodeGen/
Dsanitize-coverage.c1 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize-cover…
2 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=address -fsanitize-cover…
3 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=bounds -fsanitize-cover…
4 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=memory -fsanitize-cover…
5 …N: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=thread -fsanitize-cover…
6clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=undefined -fsanitize-coverage=…
13 // CHECK-LABEL: define dso_local void @foo(
15 // CHECK-DAG: call void @__sanitizer_cov_trace_pc in foo()
16 // CHECK-DAG: call void @__sanitizer_cov_trace_const_cmp in foo()
17 // ASAN-DAG: call void @__asan_report_store in foo()
[all …]
/external/rust/crates/grpcio-sys/grpc/third_party/cares/cares/
D.travis.yml7 - ubuntu-toolchain-r-test
8 - llvm-toolchain-trusty-5.0
10 - cmake3
11 - lcov
12 - clang-5.0
13 - clang-tools-5.0
14 - valgrind
17 - os: linux
20 - os: linux
21 compiler: clang
[all …]
/external/compiler-rt/test/
DCMakeLists.txt23 # Use LLVM utils and Clang from the same build tree.
25 clang clang-headers FileCheck count not llvm-config llvm-nm llvm-objdump
26 llvm-symbolizer compiler-rt-headers sancov)
39 # Run sanitizer tests only if we're sure that clang would produce
64 add_subdirectory(ubsan)
66 # CFI tests require diagnostic mode, which is implemented in UBSan.
86 add_lit_target(check-all

1234567