Home
last modified time | relevance | path

Searched +full:- +full:fsanitize (Results 1 – 25 of 702) sorted by relevance

12345678910>>...29

/external/clang/test/Driver/
Dfsanitize-coverage.c1 …N: %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=0 %s -### 2>&1 | FileChe…
2-target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=edge -fsanitize-coverage=0 %s -###…
3 // RUN: %clang -target x86_64-linux-gnu -fsanitize=address %s -### 2>&1 | FileCheck %s --check-pref…
4 // CHECK-SANITIZE-COVERAGE-0-NOT: fsanitize-coverage-type
5 // CHECK-SANITIZE-COVERAGE-0: -fsanitize=address
7 … %clang -target x86_64-linux-gnu -fsanitize=address -fsanitize-coverage=func %s -### 2>&1 | FileCh…
8 …: %clang -target x86_64-linux-gnu -fsanitize=memory -fsanitize-coverage=func %s -### 2>&1 | FileCh…
9 …N: %clang -target x86_64-linux-gnu -fsanitize=leak -fsanitize-coverage=func %s -### 2>&1 | FileChe…
10 …%clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-coverage=func %s -### 2>&1 | FileC…
11 …N: %clang -target x86_64-linux-gnu -fsanitize=bool -fsanitize-coverage=func %s -### 2>&1 | FileChe…
[all …]
Dfsanitize.c1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | …
2-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-
3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&…
4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### …
5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### …
6-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze…
7-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid…
8-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi…
10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr…
11-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu…
[all …]
Dfsanitize-blacklist.c4 // REQUIRES: clang-driver, shell
6 // Make sure we don't match the -NOT lines with the linker invocation.
15-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s…
16 // CHECK-BLACKLIST: -fsanitize-blacklist={{.*}}.good" "-fsanitize-blacklist={{.*}}.second
18 // Now, check for -fdepfile-entry flags.
19-target x86_64-linux-gnu -fsanitize=address -fsanitize-blacklist=%t.good -fsanitize-blacklist=%t.s…
20 // CHECK-BLACKLIST2: -fdepfile-entry={{.*}}.good" "-fdepfile-entry={{.*}}.second
23-target x86_64-linux-gnu -fsanitize=address -resource-dir=%S/Inputs/resource_dir %s -### 2>&1 | Fi…
24 // CHECK-DEFAULT-BLACKLIST: -fsanitize-blacklist={{.*}}asan_blacklist.txt
26 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag.
[all …]
Dmsan.c1 // RUN: %clang -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
2 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
3 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
4 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=memory %s -S -emit-llvm -o - | FileCheck…
5 // RUN: %clang -target mips64-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCheck %s
6 // RUN: %clang -target mips64el-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileChe…
7 // RUN: %clang -target powerpc64-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | FileCh…
8 // RUN: %clang -target powerpc64le-unknown-linux-gnu -fsanitize=memory %s -S -emit-llvm -o - | File…
9 // Verify that -fsanitize=memory invokes msan instrumentation.
Dsanitizer-ld.c3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \
4 // RUN: -target i386-unknown-linux -fsanitize=address \
5 // RUN: -resource-dir=%S/Inputs/resource_dir \
6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \
7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
[all …]
Desan.c1 // RUN: %clang -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
2 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
3 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
4 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=efficiency-cache-frag %s -S -emit-llvm -
5 // RUN: %clang -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
6 // RUN: %clang -O1 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
7 // RUN: %clang -O2 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
8 // RUN: %clang -O3 -target x86_64-unknown-linux -fsanitize=efficiency-working-set %s -S -emit-llvm
9 // Verify that -fsanitize=efficiency-* invokes esan instrumentation.
/external/perfetto/gn/standalone/sanitizers/
DBUILD.gn7 # http://www.apache.org/licenses/LICENSE-2.0
47 "-fno-omit-frame-pointer",
48 "-fsanitize-ignorelist=$ignorelist_path_",
53 cflags += [ "-fsanitize=address" ]
57 cflags += [ "-fsanitize=leak" ]
61 cflags += [ "-fsanitize=thread" ]
69 "-fsanitize=memory",
70 "-fsanitize-memory-track-origins=2",
76 "-fsanitize=bounds",
77 "-fsanitize=float-divide-by-zero",
[all …]
/external/cronet/build/config/sanitizers/
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
36 "$clang_base_path/bin/llvm-symbolizer${exe}",
69 "ASan is only supported in 64-bit builds on Windows.")
77 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll"
96 "code-sign-file",
97 "--identity=" + ios_code_signing_identity,
98 "--output=" + rebase_path(outputs[0], root_build_dir),
115 ldflags = [ "-Wl,-u,__sanitizer_options_link_helper" ]
117 ldflags = [ "-Wl,-u_sanitizer_options_link_helper" ]
133 configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ]
[all …]
/external/angle/build/config/sanitizers/
DBUILD.gn2 # Use of this source code is governed by a BSD-style license that can be
20 # since that's the only platform we use these large fuzzers - in the future
43 "$clang_base_path/bin/llvm-symbolizer${exe}",
76 "ASan is only supported in 64-bit builds on Windows.")
96 _clang_rt_dso_path = "windows/clang_rt.asan_dynamic-x86_64.dll"
99 _clang_rt_dso_path = "windows/clang_rt.ubsan_dynamic-x86_64.dll"
119 "code-sign-file",
120 "--identity=" + ios_code_signing_identity,
121 "--output=" + rebase_path(outputs[0], root_build_dir),
138 ldflags = [ "-Wl,-u,__sanitizer_options_link_helper" ]
[all …]
/external/clang/docs/
DUndefinedBehaviorSanitizer.rst12 UBSan modifies the program at compile-time to catch various kinds of undefined
17 * Conversion to, from, or between floating-point types which would
20 See the full list of available :ref:`checks <ubsan-checks>` below.
22 UBSan has an optional run-time library which provides better error reporting.
33 Use ``clang++`` to compile and link your program with ``-fsanitize=undefined``
38 .. code-block:: console
46 % clang++ -fsanitize=undefined test.cc
50 You can enable only a subset of :ref:`checks <ubsan-checks>` offered by UBSan,
55 * execute a trap instruction (doesn't require UBSan run-time support).
59 .. code-block:: console
[all …]
DControlFlowIntegrity.rst22 To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``.
23 You can also enable a subset of available :ref:`schemes <cfi-schemes>`.
24 As currently implemented, all schemes rely on link-time optimization (LTO);
25 so it is required to specify ``-flto``, and the linker used must support LTO,
38 The ``-fsanitize=cfi-{vcall,nvcall,derived-cast,unrelated-cast}`` flags
39 require that a ``-fvisibility=`` flag also be specified. This is because the
40 default visibility setting is ``-fvisibility=default``, which would disable
42 to specify ``-fvisibility=hidden``, which enables CFI checks for such classes.
44 Experimental support for :ref:`cross-DSO control flow integrity
45 <cfi-cross-dso>` exists that does not require classes to have hidden LTO
[all …]
/external/compiler-rt/test/msan/
Ddtor-vtable.cc1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
7 // RUN: %clangxx_msan %s -DVPTRA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
9 // RUN: %clangxx_msan %s -DVPTRCA=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
11 // RUN: %clangxx_msan %s -DVPTRCB=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
13 // RUN: %clangxx_msan %s -DVPTRC=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
45 a->~A(); in main()
49 a->A_Foo(); in main()
53 c->~C(); in main()
[all …]
Ddtor-vtable-multiple-inheritance.cc1 // RUN: %clangxx_msan %s -O0 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
3 // RUN: %clangxx_msan %s -O1 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
5 // RUN: %clangxx_msan %s -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && MSAN_OPTIO…
7 // RUN: %clangxx_msan %s -DCVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t && …
9 // RUN: %clangxx_msan %s -DEAVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
11 // RUN: %clangxx_msan %s -DEDVPTR=1 -O2 -fsanitize=memory -fsanitize-memory-use-after-dtor -o %t &&…
21 this->A_Foo(); in ~A()
56 c->~C(); in main()
59 c->A_Foo(); in main()
64 e->~E(); in main()
[all …]
/external/rust/crates/grpcio-sys/grpc/tools/
Dbazel.rc3 # for platform-appropriate cxxopts
4 common --enable_platform_specific_config
6 build:windows --cxxopt='/std:c++14'
7 build:windows --host_cxxopt='/std:c++14'
8 build:linux --cxxopt='-std=c++14'
9 build:linux --host_cxxopt='-std=c++14'
10 build:macos --cxxopt='-std=c++14'
11 build:macos --host_cxxopt='-std=c++14'
12 build:freebsd --cxxopt='-std=c++14'
13 build:freebsd --host_cxxopt='-std=c++14'
[all …]
/external/grpc-grpc/tools/
Dbazel.rc5 common --enable_bzlmod=false
7 # for platform-appropriate cxxopts
8 common --enable_platform_specific_config
10 build:windows --cxxopt='/std:c++14'
11 build:windows --host_cxxopt='/std:c++14'
12 build:linux --cxxopt='-std=c++14'
13 build:linux --host_cxxopt='-std=c++14'
14 build:macos --cxxopt='-std=c++14'
15 build:macos --host_cxxopt='-std=c++14'
16 build:freebsd --cxxopt='-std=c++14'
[all …]
/external/ot-br-posix/third_party/Simple-web-server/repo/tests/
DCMakeLists.txt2 add_compile_options(-fno-access-control)
4 add_compile_options(-Wno-thread-safety)
9 target_link_libraries(sws_io_test simple-web-server)
13 target_link_libraries(sws_parse_test simple-web-server)
20 target_link_libraries(sws_crypto_test simple-web-server)
26 target_link_libraries(status_code_test simple-web-server)
32 target_compile_options(percent_decode PRIVATE -fsanitize=address,fuzzer)
33 target_link_options(percent_decode PRIVATE -fsanitize=address,fuzzer)
34 target_link_libraries(percent_decode simple-web-server)
37 target_compile_options(query_string_parse PRIVATE -fsanitize=address,fuzzer)
[all …]
/external/oss-fuzz/projects/envoy/
Dbuild.sh1 #!/bin/bash -eu
8 # http://www.apache.org/licenses/LICENSE-2.0
18 declare -r FUZZ_TARGET_QUERY='
20 $all_fuzz_tests - attr(tags, "no_fuzz", $all_fuzz_tests)
22 declare -r OSS_FUZZ_TARGETS="$(bazel query "${FUZZ_TARGET_QUERY}" | sed 's/$/_oss_fuzz/')"
24 declare -r EXTRA_BAZEL_FLAGS="$(
29 …echo "--linkopt=\"$(find $(llvm-config --libdir) -name libclang_rt.ubsan_standalone_cxx-x86_64.a |…
32 echo "--copt=-D__SANITIZE_ADDRESS__" "--copt=-DADDRESS_SANITIZER=1" "--linkopt=-fsanitize=address"
43 # The following disables both coverage-instrumentation and other sanitizer instrumentation.
57 # libprotobuf-mutator
[all …]
/external/clang/test/CodeGen/
Dsanitize-address-field-padding.cpp1 // Test -fsanitize-address-field-padding
2 // RUN: echo 'type:SomeNamespace::BlacklistedByName=field-padding' > %t.type.blacklist
3 // RUN: echo 'src:*sanitize-address-field-padding.cpp=field-padding' > %t.file.blacklist
4-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
5-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
6-triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-bl…
7 // RUN: %clang_cc1 -fsanitize=address -emit-llvm -o - %s 2>&1 | FileCheck %s --check-prefix=NO_PADD…
8 // Try to emulate -save-temps option and make sure -disable-llvm-passes will not run sanitize instr…
9 …ang_cc1 -fsanitize=address -emit-llvm -disable-llvm-passes -o - %s | %clang_cc1 -fsanitize=address…
14 // CHECK: -fsanitize-address-field-padding applied to Positive1
[all …]
Dubsan-strip-path-components.cpp1 // RUN: %clang_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - | FileCheck %…
2-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
3-triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path-co…
6 …_cc1 %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip
7 …%s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-path
10 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
11 … %s -triple=x86_64-linux-gnu -emit-llvm -fsanitize=unreachable -o - -fsanitize-undefined-strip-pat…
13 …REGULAR: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{.*test(.|\…
16 …/ REMOVE-FIRST-TWO: @[[STR:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"{{(.:|…
17 // REMOVE-FIRST-TWO: @[[SRC:[0-9.a-zA-Z_]+]] = private unnamed_addr constant [{{.*}} x i8] c"[[REST…
[all …]
/external/compiler-rt/test/ubsan/TestCases/Integer/
Dshift.cpp1 …ngxx -DLSH_OVERFLOW -DOP='<<' -fsanitize=shift-base -fno-sanitize-recover=shift %s -o %t1 && not %…
2 …langxx -DLSH_OVERFLOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t2 && not %ru…
3 …angxx -DTOO_LOW -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t3 && not %…
4 … %clangxx -DTOO_LOW -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t4 && not %run %…
5 … %clangxx -DTOO_LOW -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t5 && not %run …
6 … %clangxx -DTOO_LOW -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t6 && not %run …
7 …ngxx -DTOO_HIGH -DOP='<<' -fsanitize=shift-exponent -fno-sanitize-recover=shift %s -o %t7 && not %…
8 … %clangxx -DTOO_HIGH -DOP='>>' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t8 && not %run …
9 …%clangxx -DTOO_HIGH -DOP='<<=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t9 && not %run …
10 …clangxx -DTOO_HIGH -DOP='>>=' -fsanitize=shift -fno-sanitize-recover=shift %s -o %t10 && not %run …
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/cmake/
Ddetect-sanitizer.cmake1 # detect-sanitizer.cmake -- Detect supported compiler sanitizer flags
6 add_compile_options(-g3)
8 check_c_compiler_flag(-fno-omit-frame-pointer HAVE_NO_OMIT_FRAME_POINTER)
10 add_compile_options(-fno-omit-frame-pointer)
11 add_link_options(-fno-omit-frame-pointer)
13 check_c_compiler_flag(-fno-optimize-sibling-calls HAVE_NO_OPTIMIZE_SIBLING_CALLS)
15 add_compile_options(-fno-optimize-sibling-calls)
16 add_link_options(-fno-optimize-sibling-calls)
33 set(CMAKE_REQUIRED_FLAGS -fsanitize=${compile_checks})
51 pointer-compare
[all …]
/external/grpc-grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
[all …]
/external/rust/crates/grpcio-sys/grpc/
Dbuild_handwritten.yaml8 '#04': not listed in doc/g_stands_for.md - and update that document to list the
11 '#07': Master always has a "-dev" suffix
12 '#08': Use "-preN" suffixes to identify pre-release versions
13 '#09': Per-language overrides are possible with (eg) ruby_version tag here
23 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
24 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
27 LDFLAGS: -fsanitize=address
33 asan-noleaks:
35 CPPFLAGS: -O0 -fsanitize-coverage=edge,trace-pc-guard -fsanitize=address -fno-omit-frame-pointer
36 -Wno-unused-command-line-argument -DGPR_NO_DIRECT_SYSCALLS
[all …]
/external/sdv/vsomeip/third_party/boost/regex/test/de_fuzz/
DJamfile.v212 -dict=dictionary.txt -workers=3 corpus -runs=5000
13 : # test-files
15 <toolset>clang <cxxflags>-fsanitize-coverage=trace-pc-guard
16 <cxxflags>-fsanitize=address <cxxflags>-fsanitize=undefined
17 <cxxflags>-fno-sanitize-recover=undefined <cxxflags>-fno-optimize-sibling-calls
18 <cxxflags>-fno-omit-frame-pointer
20 <linkflags>-fsanitize=address <linkflags>-fsanitize=undefined
26 -dict=dictionary.txt -workers=3 corpus -runs=5000
27 : # test-files
29 <toolset>clang <cxxflags>-fsanitize-coverage=trace-pc-guard
[all …]
/external/clang/lib/Driver/
DSanitizerArgs.cpp1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
8 //===----------------------------------------------------------------------===//
56 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
61 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
67 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
68 /// would produce "-fsanitize=vptr".
75 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
76 /// "-fsanitize=alignment".
80 /// Produce a string containing comma-separated names of sanitizers in \p
129 if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) { in parseSanitizeTrapArgs()
[all …]

12345678910>>...29