<div dir="ltr">On Wed, Oct 23, 2013 at 2:58 PM, Nuno Lopes <span dir="ltr"><<a href="mailto:nunoplopes@sapo.pt" target="_blank">nunoplopes@sapo.pt</a>></span> wrote:<br><div class="gmail_extra"><div class="gmail_quote">
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Let me disagree with this change:<br>
- I do not agree that '-fsanitize=local-bounds' is not a good compromise. It can detect overflows on globals, heap, and stack, including arbitrary pointer arithmetic, and therefore it subsumes '-fsanitize=array-bounds'. The advantage of the latter is that it produces nice diagnostics, while the former simply crashes the program when it detects an overflow. Therefore, I think there's value in keeping *both* instrumentations in -fsanitize=undefined.</blockquote>
<div><br></div><div>Yes, there is value in keeping both. But that doesn't argue for keeping this check in -fsanitize=undefined specifically -- all the other checks in -fsanitize=undefined are pure frontend checks that check source language rules and give nice diagnostics. It doesn't fit there. And if you run with "-fsanitize=address,undefined", this particular check provides no value. (-fsanitize=array-bounds does provide in such a configuration value, because it checks the language model for pointer arithmetic, not the LLVM IR rules, and so can detect some issues that ASan misses; -fsanitize=local-bounds is a pure subset of ASan.)</div>
<div><br></div><div>Another issue is that local-bounds works by inserting a pass, which means that it does not work with LTO or in any other flow where the optimization passes are separated from IR emission.</div><div> </div>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">  BTW, '-fsanitize=local-bounds' properly inserts debug information in the trap, and therefore you can use a debugger to pinpoint the offending program statement.<br>

- '-fsanitize=local-bounds' does not have false positives by design. PR17653 is a bug which I'll fix soon.  This pass was designed to have zero false positives.<br>
- Also, I don't recall any previous discussion on this change..</blockquote><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Nuno<br>
<br>
----- Original Message ----- From: "Richard Smith" <<a href="mailto:richard-llvm@metafoo.co.uk" target="_blank">richard-llvm@metafoo.co.uk</a>><br>
Sent: Tuesday, October 22, 2013 11:51 PM<br>
Subject: r193205 - Split -fsanitize=bounds to -fsanitize=array-bounds (for thefrontend-inserted<div class="HOEnZb"><div class="h5"><br>
<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Author: rsmith<br>
Date: Tue Oct 22 17:51:04 2013<br>
New Revision: 193205<br>
<br>
URL: <a href="http://llvm.org/viewvc/llvm-project?rev=193205&view=rev" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project?rev=193205&view=rev</a><br>
Log:<br>
Split -fsanitize=bounds to -fsanitize=array-bounds (for the frontend-inserted<br>
check using the ubsan runtime) and -fsanitize=local-bounds (for the middle-end<br>
check which inserts traps).<br>
<br>
Remove -fsanitize=local-bounds from -fsanitize=undefined. It does not produce<br>
useful diagnostics and has false positives (PR17635), and is not a good<br>
compromise position between UBSan's checks and ASan's checks.<br>
<br>
Map -fbounds-checking to -fsanitize=local-bounds to restore Clang's historical<br>
behavior for that flag.<br>
<br>
Modified:<br>
   cfe/trunk/include/clang/Basic/<u></u>Sanitizers.def<br>
   cfe/trunk/lib/CodeGen/<u></u>BackendUtil.cpp<br>
   cfe/trunk/lib/CodeGen/CGExpr.<u></u>cpp<br>
   cfe/trunk/lib/CodeGen/<u></u>CGExprScalar.cpp<br>
   cfe/trunk/lib/Driver/<u></u>SanitizerArgs.cpp<br>
   cfe/trunk/test/CodeGen/bounds-<u></u>checking.c<br>
   cfe/trunk/test/CodeGenCXX/<u></u>catch-undef-behavior.cpp<br>
   cfe/trunk/test/Driver/bounds-<u></u>checking.c<br>
   cfe/trunk/test/Driver/<u></u>fsanitize.c<br>
<br>
Modified: cfe/trunk/include/clang/Basic/<u></u>Sanitizers.def<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/include/clang/Basic/Sanitizers.def?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/include/<u></u>clang/Basic/Sanitizers.def?<u></u>rev=193205&r1=193204&r2=<u></u>193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/include/clang/Basic/<u></u>Sanitizers.def (original)<br>
+++ cfe/trunk/include/clang/Basic/<u></u>Sanitizers.def Tue Oct 22 17:51:04 2013<br>
@@ -59,8 +59,8 @@ SANITIZER("leak", Leak)<br>
<br>
// UndefinedBehaviorSanitizer<br>
SANITIZER("alignment", Alignment)<br>
+SANITIZER("array-bounds", ArrayBounds)<br>
SANITIZER("bool", Bool)<br>
-SANITIZER("bounds", Bounds)<br>
SANITIZER("enum", Enum)<br>
SANITIZER("float-cast-<u></u>overflow", FloatCastOverflow)<br>
SANITIZER("float-divide-by-<u></u>zero", FloatDivideByZero)<br>
@@ -84,7 +84,7 @@ SANITIZER("dataflow", DataFlow)<br>
// -fsanitize=undefined includes all the sanitizers which have low overhead, no<br>
// ABI or address space layout implications, and only catch undefined behavior.<br>
SANITIZER_GROUP("undefined", Undefined,<br>
-                Alignment | Bool | Bounds | Enum | FloatCastOverflow |<br>
+                Alignment | Bool | ArrayBounds | Enum | FloatCastOverflow |<br>
                FloatDivideByZero | Function | IntegerDivideByZero | Null |<br>
                ObjectSize | Return | Shift | SignedIntegerOverflow |<br>
                Unreachable | VLABound | Vptr)<br>
@@ -94,7 +94,7 @@ SANITIZER_GROUP("undefined", Undefined,<br>
// runtime support.  This group is generally used in conjunction with the<br>
// -fsanitize-undefined-trap-on-<u></u>error flag.<br>
SANITIZER_GROUP("undefined-<u></u>trap", UndefinedTrap,<br>
-                Alignment | Bool | Bounds | Enum | FloatCastOverflow |<br>
+                Alignment | Bool | ArrayBounds | Enum | FloatCastOverflow |<br>
                FloatDivideByZero | IntegerDivideByZero | Null | ObjectSize |<br>
                Return | Shift | SignedIntegerOverflow | Unreachable |<br>
                VLABound)<br>
@@ -103,5 +103,9 @@ SANITIZER_GROUP("integer", Integer,<br>
                SignedIntegerOverflow | UnsignedIntegerOverflow | Shift |<br>
                IntegerDivideByZero)<br>
<br>
+// -fbounds-checking<br>
+SANITIZER("local-bounds", LocalBounds)<br>
+SANITIZER_GROUP("bounds", Bounds, ArrayBounds | LocalBounds)<br>
+<br>
#undef SANITIZER<br>
#undef SANITIZER_GROUP<br>
<br>
Modified: cfe/trunk/lib/CodeGen/<u></u>BackendUtil.cpp<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/BackendUtil.cpp?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/lib/CodeGen/<u></u>BackendUtil.cpp?rev=193205&r1=<u></u>193204&r2=193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/lib/CodeGen/<u></u>BackendUtil.cpp (original)<br>
+++ cfe/trunk/lib/CodeGen/<u></u>BackendUtil.cpp Tue Oct 22 17:51:04 2013<br>
@@ -245,7 +245,7 @@ void EmitAssemblyHelper::<u></u>CreatePasses(Ta<br>
                           addObjCARCOptPass);<br>
  }<br>
<br>
-  if (LangOpts.Sanitize.Bounds) {<br>
+  if (LangOpts.Sanitize.<u></u>LocalBounds) {<br>
    PMBuilder.addExtension(<u></u>PassManagerBuilder::EP_<u></u>ScalarOptimizerLate,<br>
                           addBoundsCheckingPass);<br>
    PMBuilder.addExtension(<u></u>PassManagerBuilder::EP_<u></u>EnabledOnOptLevel0,<br>
<br>
Modified: cfe/trunk/lib/CodeGen/CGExpr.<u></u>cpp<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CGExpr.cpp?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/lib/CodeGen/<u></u>CGExpr.cpp?rev=193205&r1=<u></u>193204&r2=193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/lib/CodeGen/CGExpr.<u></u>cpp (original)<br>
+++ cfe/trunk/lib/CodeGen/CGExpr.<u></u>cpp Tue Oct 22 17:51:04 2013<br>
@@ -641,7 +641,8 @@ static llvm::Value *getArrayIndexingBoun<br>
void CodeGenFunction::<u></u>EmitBoundsCheck(const Expr *E, const Expr *Base,<br>
                                      llvm::Value *Index, QualType IndexType,<br>
                                      bool Accessed) {<br>
-  assert(SanOpts->Bounds && "should not be called unless adding bounds checks");<br>
+  assert(SanOpts->ArrayBounds &&<br>
+         "should not be called unless adding bounds checks");<br>
<br>
  QualType IndexedType;<br>
  llvm::Value *Bound = getArrayIndexingBound(*this, Base, IndexedType);<br>
@@ -742,7 +743,7 @@ LValue CodeGenFunction::<u></u>EmitUnsupportedL<br>
<br>
LValue CodeGenFunction::<u></u>EmitCheckedLValue(const Expr *E, TypeCheckKind TCK) {<br>
  LValue LV;<br>
-  if (SanOpts->Bounds && isa<ArraySubscriptExpr>(E))<br>
+  if (SanOpts->ArrayBounds && isa<ArraySubscriptExpr>(E))<br>
    LV = EmitArraySubscriptExpr(cast<<u></u>ArraySubscriptExpr>(E), /*Accessed*/true);<br>
  else<br>
    LV = EmitLValue(E);<br>
@@ -2233,7 +2234,7 @@ LValue CodeGenFunction::<u></u>EmitArraySubscri<br>
  QualType IdxTy  = E->getIdx()->getType();<br>
  bool IdxSigned = IdxTy-><u></u>isSignedIntegerOrEnumerationTy<u></u>pe();<br>
<br>
-  if (SanOpts->Bounds)<br>
+  if (SanOpts->ArrayBounds)<br>
    EmitBoundsCheck(E, E->getBase(), Idx, IdxTy, Accessed);<br>
<br>
  // If the base is a vector type, then we are forming a vector element lvalue<br>
<br>
Modified: cfe/trunk/lib/CodeGen/<u></u>CGExprScalar.cpp<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/CodeGen/CGExprScalar.cpp?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/lib/CodeGen/<u></u>CGExprScalar.cpp?rev=193205&<u></u>r1=193204&r2=193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/lib/CodeGen/<u></u>CGExprScalar.cpp (original)<br>
+++ cfe/trunk/lib/CodeGen/<u></u>CGExprScalar.cpp Tue Oct 22 17:51:04 2013<br>
@@ -1073,7 +1073,7 @@ Value *ScalarExprEmitter::<u></u>VisitArraySubs<br>
  Value *Idx  = Visit(E->getIdx());<br>
  QualType IdxTy = E->getIdx()->getType();<br>
<br>
-  if (CGF.SanOpts->Bounds)<br>
+  if (CGF.SanOpts->ArrayBounds)<br>
    CGF.EmitBoundsCheck(E, E->getBase(), Idx, IdxTy, /*Accessed*/true);<br>
<br>
  bool IdxSigned = IdxTy-><u></u>isSignedIntegerOrEnumerationTy<u></u>pe();<br>
@@ -2314,7 +2314,7 @@ static Value *emitPointerArithmetic(Code<br>
  if (isSubtraction)<br>
    index = CGF.Builder.CreateNeg(index, "idx.neg");<br>
<br>
-  if (CGF.SanOpts->Bounds)<br>
+  if (CGF.SanOpts->ArrayBounds)<br>
    CGF.EmitBoundsCheck(op.E, pointerOperand, index, indexOperand->getType(),<br>
                        /*Accessed*/ false);<br>
<br>
<br>
Modified: cfe/trunk/lib/Driver/<u></u>SanitizerArgs.cpp<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/lib/Driver/SanitizerArgs.cpp?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/lib/Driver/<u></u>SanitizerArgs.cpp?rev=193205&<u></u>r1=193204&r2=193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/lib/Driver/<u></u>SanitizerArgs.cpp (original)<br>
+++ cfe/trunk/lib/Driver/<u></u>SanitizerArgs.cpp Tue Oct 22 17:51:04 2013<br>
@@ -256,8 +256,8 @@ bool SanitizerArgs::parse(const Driver &<br>
      "-fsanitize=undefined-trap -fsanitize-undefined-trap-on-<u></u>error";<br>
  } else if (A->getOption().matches(<u></u>options::OPT_fbounds_checking) ||<br>
             A->getOption().matches(<u></u>options::OPT_fbounds_checking_<u></u>EQ)) {<br>
-    Add = Bounds;<br>
-    DeprecatedReplacement = "-fsanitize=bounds";<br>
+    Add = LocalBounds;<br>
+    DeprecatedReplacement = "-fsanitize=local-bounds";<br>
  } else if (A->getOption().matches(<u></u>options::OPT_fsanitize_EQ)) {<br>
    Add = parse(D, A, DiagnoseErrors);<br>
  } else if (A->getOption().matches(<u></u>options::OPT_fno_sanitize_EQ)) {<br>
<br>
Modified: cfe/trunk/test/CodeGen/bounds-<u></u>checking.c<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGen/bounds-checking.c?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/test/<u></u>CodeGen/bounds-checking.c?rev=<u></u>193205&r1=193204&r2=193205&<u></u>view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/test/CodeGen/bounds-<u></u>checking.c (original)<br>
+++ cfe/trunk/test/CodeGen/bounds-<u></u>checking.c Tue Oct 22 17:51:04 2013<br>
@@ -1,26 +1,29 @@<br>
-// RUN: %clang_cc1 -fsanitize=bounds -emit-llvm -triple x86_64-apple-darwin10 < %s | FileCheck %s<br>
+// RUN: %clang_cc1 -fsanitize=local-bounds -emit-llvm -triple x86_64-apple-darwin10 %s -o - | FileCheck %s<br>
+// RUN: %clang_cc1 -fsanitize=array-bounds -O -fsanitize-undefined-trap-on-<u></u>error -emit-llvm  -triple x86_64-apple-darwin10 -DNO_DYNAMIC %s -o - | FileCheck %s<br>
<br>
-// CHECK: @f<br>
+// CHECK-LABEL: @f<br>
double f(int b, int i) {<br>
  double a[b];<br>
-  // CHECK: trap<br>
+  // CHECK: call {{.*}} @llvm.trap<br>
  return a[i];<br>
}<br>
<br>
-// CHECK: @f2<br>
+// CHECK-LABEL: @f2<br>
void f2() {<br>
  // everything is constant; no trap possible<br>
-  // CHECK-NOT: trap<br>
+  // CHECK-NOT: call {{.*}} @llvm.trap<br>
  int a[2];<br>
  a[1] = 42;<br>
-<br>
+<br>
+#ifndef NO_DYNAMIC<br>
  short *b = malloc(64);<br>
  b[5] = *a + a[1] + 2;<br>
+#endif<br>
}<br>
<br>
-// CHECK: @f3<br>
+// CHECK-LABEL: @f3<br>
void f3() {<br>
  int a[1];<br>
-  // CHECK: trap<br>
+  // CHECK: call {{.*}} @llvm.trap<br>
  a[2] = 1;<br>
}<br>
<br>
Modified: cfe/trunk/test/CodeGenCXX/<u></u>catch-undef-behavior.cpp<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGenCXX/catch-undef-behavior.cpp?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/test/<u></u>CodeGenCXX/catch-undef-<u></u>behavior.cpp?rev=193205&r1=<u></u>193204&r2=193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/test/CodeGenCXX/<u></u>catch-undef-behavior.cpp (original)<br>
+++ cfe/trunk/test/CodeGenCXX/<u></u>catch-undef-behavior.cpp Tue Oct 22 17:51:04 2013<br>
@@ -1,4 +1,4 @@<br>
-// RUN: %clang_cc1 -std=c++11 -fsanitize=signed-integer-<u></u>overflow,integer-divide-by-<u></u>zero,float-divide-by-zero,<u></u>shift,unreachable,return,vla-<u></u>bound,alignment,null,vptr,<u></u>object-size,float-cast-<u></u>overflow,bool,enum,bounds,<u></u>function  -emit-llvm %s -o - -triple x86_64-linux-gnu | FileCheck %s<br>

+// RUN: %clang_cc1 -std=c++11 -fsanitize=signed-integer-<u></u>overflow,integer-divide-by-<u></u>zero,float-divide-by-zero,<u></u>shift,unreachable,return,vla-<u></u>bound,alignment,null,vptr,<u></u>object-size,float-cast-<u></u>overflow,bool,enum,array-<u></u>bounds,function  -emit-llvm %s -o - -triple x86_64-linux-gnu | FileCheck %s<br>

<br>
struct S {<br>
  double d;<br>
<br>
Modified: cfe/trunk/test/Driver/bounds-<u></u>checking.c<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Driver/bounds-checking.c?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/test/Driver/<u></u>bounds-checking.c?rev=193205&<u></u>r1=193204&r2=193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/test/Driver/bounds-<u></u>checking.c (original)<br>
+++ cfe/trunk/test/Driver/bounds-<u></u>checking.c Tue Oct 22 17:51:04 2013<br>
@@ -1,11 +1,11 @@<br>
// RUN: %clang -fsanitize=bounds -### -fsyntax-only %s 2> %t<br>
// RUN: FileCheck -check-prefix=CHECK < %t %s<br>
-// CHECK: "-fsanitize=bounds"<br>
+// CHECK: "-fsanitize=array-bounds,<u></u>local-bounds"<br>
<br>
// RUN: %clang -fbounds-checking -### -fsyntax-only %s 2> %t<br>
// RUN: FileCheck -check-prefix=CHECK-OLD < %t %s<br>
-// CHECK-OLD: "-fsanitize=bounds"<br>
+// CHECK-OLD: "-fsanitize=local-bounds"<br>
<br>
// RUN: %clang -fbounds-checking=3 -### -fsyntax-only %s 2> %t<br>
// RUN: FileCheck -check-prefix=CHECK-OLD2 < %t %s<br>
-// CHECK-OLD2: "-fsanitize=bounds"<br>
+// CHECK-OLD2: "-fsanitize=local-bounds"<br>
<br>
Modified: cfe/trunk/test/Driver/<u></u>fsanitize.c<br>
URL: <a href="http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Driver/fsanitize.c?rev=193205&r1=193204&r2=193205&view=diff" target="_blank">http://llvm.org/viewvc/llvm-<u></u>project/cfe/trunk/test/Driver/<u></u>fsanitize.c?rev=193205&r1=<u></u>193204&r2=193205&view=diff</a><br>

==============================<u></u>==============================<u></u>==================<br>
--- cfe/trunk/test/Driver/<u></u>fsanitize.c (original)<br>
+++ cfe/trunk/test/Driver/<u></u>fsanitize.c Tue Oct 22 17:51:04 2013<br>
@@ -1,17 +1,17 @@<br>
// RUN: %clang -target x86_64-linux-gnu -fcatch-undefined-behavior %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-<u></u>UNDEFINED-TRAP<br>
// RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-<u></u>error %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-<u></u>UNDEFINED-TRAP<br>
// RUN: %clang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-<u></u>error -fsanitize=undefined-trap %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-<u></u>UNDEFINED-TRAP<br>
-// CHECK-UNDEFINED-TRAP: "-fsanitize={{((signed-<u></u>integer-overflow|integer-<u></u>divide-by-zero|float-divide-<u></u>by-zero|shift|unreachable|<u></u>return|vla-bound|alignment|<u></u>null|object-size|float-cast-<u></u>overflow|bounds|enum|bool),?){<u></u>14}"}}<br>

+// CHECK-UNDEFINED-TRAP: "-fsanitize={{((signed-<u></u>integer-overflow|integer-<u></u>divide-by-zero|float-divide-<u></u>by-zero|shift|unreachable|<u></u>return|vla-bound|alignment|<u></u>null|object-size|float-cast-<u></u>overflow|array-bounds|enum|<u></u>bool),?){14}"}}<br>

// CHECK-UNDEFINED-TRAP: "-fsanitize-undefined-trap-on-<u></u>error"<br>
<br>
// RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-UNDEFINED<br>
-// CHECK-UNDEFINED: "-fsanitize={{((signed-<u></u>integer-overflow|integer-<u></u>divide-by-zero|float-divide-<u></u>by-zero|function|shift|<u></u>unreachable|return|vla-bound|<u></u>alignment|null|vptr|object-<u></u>size|float-cast-overflow|<u></u>bounds|enum|bool),?){16}"}}<br>

+// CHECK-UNDEFINED: "-fsanitize={{((signed-<u></u>integer-overflow|integer-<u></u>divide-by-zero|float-divide-<u></u>by-zero|function|shift|<u></u>unreachable|return|vla-bound|<u></u>alignment|null|vptr|object-<u></u>size|float-cast-overflow|<u></u>array-bounds|enum|bool),?){16}<u></u>"}}<br>

<br>
// RUN: %clang -target x86_64-linux-gnu -fsanitize=integer %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-INTEGER<br>
// CHECK-INTEGER: "-fsanitize={{((signed-<u></u>integer-overflow|unsigned-<u></u>integer-overflow|integer-<u></u>divide-by-zero|shift),?){4}"}}<br>
<br>
// RUN: %clang -target x86_64-linux-gnu -fsanitize=thread,undefined -fno-thread-sanitizer -fno-sanitize=float-cast-<u></u>overflow,vptr,bool,enum %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-PARTIAL-<u></u>UNDEFINED<br>

-// CHECK-PARTIAL-UNDEFINED: "-fsanitize={{((signed-<u></u>integer-overflow|integer-<u></u>divide-by-zero|float-divide-<u></u>by-zero|function|shift|<u></u>unreachable|return|vla-bound|<u></u>alignment|null|object-size|<u></u>bounds),?){12}"}}<br>

+// CHECK-PARTIAL-UNDEFINED: "-fsanitize={{((signed-<u></u>integer-overflow|integer-<u></u>divide-by-zero|float-divide-<u></u>by-zero|function|shift|<u></u>unreachable|return|vla-bound|<u></u>alignment|null|object-size|<u></u>array-bounds),?){12}"}}<br>

<br>
// RUN: %clang -target x86_64-linux-gnu -fsanitize=address-full %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-FULL<br>
// CHECK-ASAN-FULL: "-fsanitize={{((address|init-<u></u>order|use-after-return|use-<u></u>after-scope),?){4}"}}<br>
@@ -101,7 +101,7 @@<br>
// CHECK-DEPRECATED: argument '-fno-thread-sanitizer' is deprecated, use '-fno-sanitize=thread' instead<br>
// CHECK-DEPRECATED: argument '-faddress-sanitizer' is deprecated, use '-fsanitize=address' instead<br>
// CHECK-DEPRECATED: argument '-fno-address-sanitizer' is deprecated, use '-fno-sanitize=address' instead<br>
-// CHECK-DEPRECATED: argument '-fbounds-checking' is deprecated, use '-fsanitize=bounds' instead<br>
+// CHECK-DEPRECATED: argument '-fbounds-checking' is deprecated, use '-fsanitize=local-bounds' instead<br>
<br>
// RUN: %clang -target x86_64-linux-gnu -fsanitize=thread %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-TSAN-NO-<u></u>PIE<br>
// CHECK-TSAN-NO-PIE: "-mrelocation-model" "pic" "-pic-level" "2" "-pie-level" "2"<br>
<br>
<br>
______________________________<u></u>_________________<br>
cfe-commits mailing list<br>
<a href="mailto:cfe-commits@cs.uiuc.edu" target="_blank">cfe-commits@cs.uiuc.edu</a><br>
<a href="http://lists.cs.uiuc.edu/mailman/listinfo/cfe-commits" target="_blank">http://lists.cs.uiuc.edu/<u></u>mailman/listinfo/cfe-commits</a> <br>
</blockquote>
<br>
</div></div></blockquote></div><br></div></div>