forked from OSchip/llvm-project
				
			
		
			
				
	
	
		
			47 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			47 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			C
		
	
	
	
| // Basic test
 | |
| // RUN: rm -rf %t.dir
 | |
| // RUN: mkdir -p %t.dir/a/b
 | |
| // RUN: echo > %t.dir/a/b/x.h
 | |
| // RUN: cd %t.dir
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -I a/b | FileCheck -check-prefix=CHECK-ONE %s
 | |
| // CHECK-ONE: {{ }}a{{[/\\]}}b{{[/\\]}}x.h
 | |
| 
 | |
| // PR8974 (-include flag)
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -include a/b/x.h -DINCLUDE_FLAG_TEST | FileCheck -check-prefix=CHECK-TWO %s
 | |
| // CHECK-TWO: {{ }}a{{[/\\]}}b{{[/\\]}}x.h
 | |
| 
 | |
| // rdar://problem/9734352 (paths involving ".")
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -I ./a/b | FileCheck -check-prefix=CHECK-THREE %s
 | |
| // CHECK-THREE: {{ }}a{{[/\\]}}b{{[/\\]}}x.h
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -I .//./a/b/ | FileCheck -check-prefix=CHECK-FOUR %s
 | |
| // CHECK-FOUR: {{ }}a{{[/\\]}}b{{[/\\]}}x.h
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -I a/b/. | FileCheck -check-prefix=CHECK-FIVE %s
 | |
| // CHECK-FIVE: {{ }}a{{[/\\]}}b{{[/\\]}}.{{[/\\]}}x.h
 | |
| // RUN: cd a/b
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -I ./ | FileCheck -check-prefix=CHECK-SIX %s
 | |
| // CHECK-SIX: {{ }}x.h
 | |
| // RUN: echo "fun:foo" > %t.blacklist
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -resource-dir=%S/Inputs/resource_dir_with_sanitizer_blacklist -fsanitize=undefined -flto -fvisibility=hidden -fsanitize-blacklist=%t.blacklist -I ./ | FileCheck -check-prefix=CHECK-SEVEN %s
 | |
| // CHECK-SEVEN: .blacklist
 | |
| // CHECK-SEVEN: {{ }}x.h
 | |
| #ifndef INCLUDE_FLAG_TEST
 | |
| #include <x.h>
 | |
| #endif
 | |
| 
 | |
| // RUN: echo "fun:foo" > %t.blacklist1
 | |
| // RUN: echo "fun:foo" > %t.blacklist2
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -resource-dir=%S/Inputs/resource_dir_with_sanitizer_blacklist -fsanitize=undefined -flto -fvisibility=hidden -fsanitize-blacklist=%t.blacklist1 -fsanitize-blacklist=%t.blacklist2 -I ./ | FileCheck -check-prefix=TWO-BLACK-LISTS %s
 | |
| // TWO-BLACK-LISTS: dependency-gen.o:
 | |
| // TWO-BLACK-LISTS-DAG: blacklist1
 | |
| // TWO-BLACK-LISTS-DAG: blacklist2
 | |
| // TWO-BLACK-LISTS-DAG: x.h
 | |
| // TWO-BLACK-LISTS-DAG: dependency-gen.c
 | |
| 
 | |
| // RUN: %clang -MD -MF - %s -fsyntax-only -resource-dir=%S/Inputs/resource_dir_with_sanitizer_blacklist -fsanitize=undefined -flto -fvisibility=hidden -I ./ | FileCheck -check-prefix=USER-AND-SYS-DEPS %s
 | |
| // USER-AND-SYS-DEPS: dependency-gen.o:
 | |
| // USER-AND-SYS-DEPS-DAG: ubsan_blacklist.txt
 | |
| 
 | |
| // RUN: %clang -MMD -MF - %s -fsyntax-only -resource-dir=%S/Inputs/resource_dir_with_sanitizer_blacklist -fsanitize=undefined -flto -fvisibility=hidden -I ./ | FileCheck -check-prefix=ONLY-USER-DEPS %s
 | |
| // ONLY-USER-DEPS: dependency-gen.o:
 | |
| // NOT-ONLY-USER-DEPS: ubsan_blacklist.txt
 |