| /external/compiler-rt/lib/tsan/ |
| D | CMakeLists.txt | 7 # TSan runtime to be built with -fPIE to reduce the number of register spills. 12 # Add extra debug information to TSan runtime. This configuration is rarely 99 add_custom_target(tsan) target 100 set_target_properties(tsan PROPERTIES FOLDER "Compiler-RT Misc") 111 add_compiler_rt_runtime(clang_rt.tsan 121 PARENT_TARGET tsan) 133 DEPENDS tsan ${BUILDGO_SCRIPT} 135 COMMENT "Checking TSan Go runtime..." 149 DEPENDS clang_rt.tsan-${arch} ${BUILDGO_SCRIPT} 151 COMMENT "Checking TSan Go runtime..." [all …]
|
| /external/clang/test/CodeGen/ |
| D | sanitize-thread-attr.cpp | 2 … -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=thread | FileCheck -check-prefix=TSAN %s 14 // TSAN: NoTSAN1{{.*}}) [[NOATTR:#[0-9]+]] 20 // TSAN: NoTSAN2{{.*}}) [[NOATTR]] 27 // TSAN: NoTSAN3{{.*}}) [[NOATTR:#[0-9]+]] 33 // TSAN: TSANOk{{.*}}) [[WITH:#[0-9]+]] 38 // TSAN: TemplateTSANOk{{.*}}) [[WITH]] 44 // TSAN: TemplateNoTSAN{{.*}}) [[NOATTR]] 57 // TSAN: @__cxx_global_var_init{{.*}}[[WITH:#[0-9]+]] 63 // TSAN: attributes [[NOATTR]] = { nounwind{{.*}} } 64 // TSAN: attributes [[WITH]] = { nounwind sanitize_thread{{.*}} }
|
| /external/skia/site/docs/dev/testing/ |
| D | xsan.md | 3 title: "MSAN, ASAN, & TSAN" 4 linkTitle: "MSAN, ASAN, & TSAN" 11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 15 - TSAN works on Linux and Mac. 87 Configure and Compile Skia with TSAN 93 mkdir -p out/tsan 94 cat > out/tsan/args.gn <<- EOF 97 sanitize = "TSAN" 102 bin/gn gen out/tsan 103 ninja -C out/tsan
|
| /external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
| D | decorate_proc_maps.cc | 53 // CHECK-tsan: rw-p {{.*}} [shadow] 54 // CHECK-tsan: rw-p {{.*}} [meta shadow] 55 // CHECK-tsan: rw-p {{.*}} [trace 0] 56 // CHECK-tsan: rw-p {{.*}} [trace header 0] 57 // CHECK-tsan: rw-p {{.*}} [trace 1] 58 // CHECK-tsan: rw-p {{.*}} [trace header 1]
|
| /external/clang/test/Lexer/ |
| D | has_feature_thread_sanitizer.cpp | 1 // RUN: %clang_cc1 -E -fsanitize=thread %s -o - | FileCheck --check-prefix=CHECK-TSAN %s 2 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-NO-TSAN %s 10 // CHECK-TSAN: ThreadSanitizerEnabled 11 // CHECK-NO-TSAN: ThreadSanitizerDisabled
|
| /external/zstd/contrib/pzstd/ |
| D | Makefile | 88 .PHONY: test-pzstd-tsan 89 test-pzstd-tsan: LDFLAGS=-fuse-ld=gold 90 test-pzstd-tsan: TESTFLAGS=--gtest_filter=-*ExtremelyLarge* 91 test-pzstd-tsan: clean googletest tsan check 128 .PHONY: tsan 129 tsan: PZSTD_CCXXFLAGS += -fsanitize=thread -fPIC target 130 tsan: PZSTD_LDFLAGS += -fsanitize=thread target 131 tsan: debug target 155 tsan32: tsan
|
| /external/cronet/third_party/libc++/src/test/std/atomics/atomics.general/ |
| D | replace_failure_order_codegen.sh.cpp | 12 // they don't support tsan), and causes other sanitizer builds to fail (e.g. 13 // asan and tsan don't mix). Instead, require the tsan feature. 14 // REQUIRES: tsan 27 // TSAN-instrumented tests.
|
| /external/compiler-rt/lib/tsan/tests/ |
| D | CMakeLists.txt | 5 FOLDER "TSan unittests") 12 -I${COMPILER_RT_SOURCE_DIR}/lib/tsan/rtl 27 list(APPEND COMPILE_DEPS gtest tsan) 50 list(APPEND TEST_DEPS tsan) 53 # FIXME: Looks like we should link TSan with just-built runtime,
|
| /external/rust/crates/grpcio-sys/grpc/tools/ |
| D | bazel.rc | 102 build:tsan --strip=never 103 build:tsan --copt=-fsanitize=thread 104 build:tsan --copt=-fno-omit-frame-pointer 105 build:tsan --copt=-DGPR_NO_DIRECT_SYSCALLS 106 build:tsan --copt=-DGRPC_TSAN 107 build:tsan --linkopt=-fsanitize=thread 108 build:tsan --action_env=TSAN_OPTIONS=suppressions=test/core/util/tsan_suppressions.txt:halt_on_erro… 110 # a TSAN build that tries to create new threads whenever possible
|
| /external/grpc-grpc/templates/tools/dockerfile/test/rbe_ubuntu2004/ |
| D | Dockerfile.template | 35 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++ 45 …ng-ubuntu20_04/libcxx-tsan_r<%text>${LLVM_LATEST}</%text>.tar.gz -O /tmp/libcxx-tsan.tar.gz ${'\\'} 46 …&& mkdir -p /usr/local/libcxx-tsan && tar -xzf /tmp/libcxx-tsan.tar.gz -C /usr/local/libcxx-tsan &…
|
| /external/grpc-grpc/tools/ |
| D | bazel.rc | 111 build:tsan --strip=never 112 build:tsan --copt=-fsanitize=thread 113 build:tsan --copt=-fno-omit-frame-pointer 114 build:tsan --copt=-DGPR_NO_DIRECT_SYSCALLS 115 build:tsan --copt=-DGRPC_TSAN 116 build:tsan --linkopt=-fsanitize=thread 117 build:tsan --action_env=TSAN_OPTIONS=suppressions=test/core/util/tsan_suppressions.txt:halt_on_erro… 119 # a TSAN build that tries to create new threads whenever possible
|
| /external/grpc-grpc/tools/dockerfile/test/rbe_ubuntu2004/ |
| D | Dockerfile | 57 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++ 67 …ang-builds-stable/clang-ubuntu20_04/libcxx-tsan_r${LLVM_LATEST}.tar.gz -O /tmp/libcxx-tsan.tar.gz \ 68 …&& mkdir -p /usr/local/libcxx-tsan && tar -xzf /tmp/libcxx-tsan.tar.gz -C /usr/local/libcxx-tsan &…
|
| /external/rust/crates/grpcio-sys/grpc/tools/dockerfile/test/rbe_ubuntu2004/ |
| D | Dockerfile | 57 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++ 67 …ang-builds-stable/clang-ubuntu20_04/libcxx-tsan_r${LLVM_LATEST}.tar.gz -O /tmp/libcxx-tsan.tar.gz \ 68 …&& mkdir -p /usr/local/libcxx-tsan && tar -xzf /tmp/libcxx-tsan.tar.gz -C /usr/local/libcxx-tsan &…
|
| /external/skia/infra/bots/recipe_modules/build/examples/full.expected/ |
| D | Build-Debian10-Clang-x86_64-Debug-TSAN.json | 66 "[START_DIR]/cache/work/skia/out/Build-Debian10-Clang-x86_64-Debug-TSAN/Debug", 67 …ux/bin\", \"-fuse-ld=lld\", \"-L[START_DIR]/clang_linux/tsan\"] link_pool_depth=2 sanitize=\"TSAN\… 84 "[START_DIR]/cache/work/skia/out/Build-Debian10-Clang-x86_64-Debug-TSAN/Debug" 117 "[START_DIR]/cache/work/skia/out/Build-Debian10-Clang-x86_64-Debug-TSAN/Debug",
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/signature/ |
| D | RsaSsaPssSignKeyManagerTest.java | 194 // factory.createKey is too slow in Tsan. in createSmallKeyUsingParameters_works() 220 // factory.createKey is too slow in Tsan. in createKey_largeKey() 233 // factory.createKey is too slow in Tsan. in createKey_alwaysNewElement() 253 // factory.createKey is too slow in Tsan. in getPublicKey_correctValues() 265 // factory.createKey is too slow in Tsan. in createPrimitive() 294 return; // too slow for tsan. in createCorruptedModulusPrimitive_throws() 388 return; // too slow for tsan in testRsa3072PssSha256F4TemplateWithManager() 396 return; // too slow for tsan in testRawRsa3072PssSha256F4TemplateWithManager() 404 return; // too slow for tsan in testRsa4096PssSha512F4TemplateWithManager() 412 return; // too slow for tsan in testRawRsa4096PssSha512F4TemplateWithManager() [all …]
|
| /external/rust/crates/bytes/.github/workflows/ |
| D | ci.yml | 115 tsan: 116 name: tsan 124 - name: ASAN / TSAN 125 run: . ci/tsan.sh 154 - tsan
|
| /external/cronet/testing/ |
| D | test_env.py | 24 sanitizers = ['asan', 'lsan', 'msan', 'tsan', 'coverage-continuous-mode', 42 def get_sanitizer_env(asan, lsan, msan, tsan, cfi_diag): argument 58 if lsan or tsan: 108 if tsan: 351 tsan = '--tsan=1' in cmd 361 use_symbolization_script = (asan or msan or cfi_diag or lsan or tsan) 363 if asan or lsan or msan or tsan or cfi_diag: 364 extra_env.update(get_sanitizer_env(asan, lsan, msan, tsan, cfi_diag)) 366 if lsan or tsan: 367 # LSan and TSan are not sandbox-friendly.
|
| /external/llvm/test/Instrumentation/ThreadSanitizer/ |
| D | tsan_basic.ll | 1 ; RUN: opt < %s -tsan -S | FileCheck %s 12 ; CHECK: @llvm.global_ctors = {{.*}}@tsan.module_ctor 28 ; Check that tsan converts mem intrinsics back to function calls. 57 ; CHECK: define internal void @tsan.module_ctor()
|
| D | tsan-vs-gvn.ll | 1 ; RUN: opt < %s -basicaa -gvn -tsan -S | FileCheck %s 2 ; TSAN conflicts with load widening. Make sure the load widening is off with -tsan.
|
| /external/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Instrumentation/ |
| D | ThreadSanitizer.cpp | 53 #define DEBUG_TYPE "tsan" 56 "tsan-instrument-memory-accesses", cl::init(true), 59 "tsan-instrument-func-entry-exit", cl::init(true), 62 "tsan-handle-cxx-exceptions", cl::init(true), 66 "tsan-instrument-atomics", cl::init(true), 69 "tsan-instrument-memintrinsics", cl::init(true), 84 static const char *const kTsanModuleCtorName = "tsan.module_ctor"; 91 /// Instantiating ThreadSanitizer inserts the tsan runtime library API function 141 Optional<ThreadSanitizer> TSan; member 157 ThreadSanitizer TSan; in run() local [all …]
|
| /external/compiler-rt/test/tsan/ |
| D | CMakeLists.txt | 6 list(APPEND TSAN_TEST_DEPS tsan) 54 add_lit_testsuite(check-tsan "Running ThreadSanitizer tests" 57 set_target_properties(check-tsan PROPERTIES FOLDER "Compiler-RT Tests")
|
| /external/clang/test/Driver/ |
| D | sanitizer-ld.c | 159 // RUN: | FileCheck --check-prefix=CHECK-TSAN-LINUX-CXX %s 161 // CHECK-TSAN-LINUX-CXX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 162 // CHECK-TSAN-LINUX-CXX-NOT: stdc++ 163 // CHECK-TSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.tsan-x86_64.a" "-no-whole-archive" 164 // CHECK-TSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.tsan-x86_64.a.syms" 165 // CHECK-TSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.tsan_cxx-x86_64.a" "-no-whole-archive" 166 // CHECK-TSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.tsan_cxx-x86_64.a.syms" 167 // CHECK-TSAN-LINUX-CXX-NOT: "-export-dynamic" 168 // CHECK-TSAN-LINUX-CXX: stdc++ 169 // CHECK-TSAN-LINUX-CXX: "-lpthread" [all …]
|
| /external/zstd/ |
| D | TESTING.md | 24 - `tests/zstreamtest.c` under Tsan (streaming mode, including multithreaded mode) 38 - Streaming mode fuzzer with Tsan (for the `zstdmt` testing) 41 - `pzstd` with asan and tsan, as well as in 32-bits mode
|
| /external/swiftshader/third_party/llvm-16.0/llvm/include/llvm/Transforms/Instrumentation/ |
| D | ThreadSanitizer.h | 1 //===- Transforms/Instrumentation/ThreadSanitizer.h - TSan Pass -----------===// 22 /// A function pass for tsan instrumentation. 32 /// A module pass for tsan instrumentation.
|
| /external/swiftshader/third_party/llvm-16.0/llvm/lib/Transforms/Instrumentation/ |
| D | ThreadSanitizer.cpp | 53 #define DEBUG_TYPE "tsan" 56 "tsan-instrument-memory-accesses", cl::init(true), 59 ClInstrumentFuncEntryExit("tsan-instrument-func-entry-exit", cl::init(true), 63 "tsan-handle-cxx-exceptions", cl::init(true), 66 static cl::opt<bool> ClInstrumentAtomics("tsan-instrument-atomics", 71 "tsan-instrument-memintrinsics", cl::init(true), 74 "tsan-distinguish-volatile", cl::init(false), 78 "tsan-instrument-read-before-write", cl::init(false), 82 "tsan-compound-read-before-write", cl::init(false), 98 const char kTsanModuleCtorName[] = "tsan.module_ctor"; [all …]
|