Searched full:msan (Results 1 – 25 of 323) sorted by relevance
12345678910>>...13
/external/swiftshader/third_party/llvm-7.0/llvm/test/Instrumentation/MemorySanitizer/ |
D | manual-shadow.ll | 1 ; Test that the msan layout customization options work as expected 3 ; RUN: opt < %s -msan -msan-shadow-base 3735928559 -S | FileCheck --check-prefix=CHECK-BASE %s 4 ; RUN: opt < %s -msan -msan-shadow-base 3735928559 -msan-and-mask 4294901760 -S | FileCheck --check… 5 ; RUN: opt < %s -msan -msan-shadow-base 3735928559 -msan-xor-mask 48879 -S | FileCheck --check-pref… 6 ; RUN: opt < %s -msan -msan-shadow-base 3735928559 -msan-xor-mask 48879 -msan-and-mask 4294901760 -… 7 ; RUN: opt < %s -msan -msan-track-origins 1 -msan-origin-base 1777777 -S | FileCheck --check-prefix…
|
D | instrumentation-with-call-threshold.ll | 1 ; Test -msan-instrumentation-with-call-threshold 5 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -S |… 6 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa… 7 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
|
D | alloca.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s --check-prefixes=CHECK,INLINE 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-poison-stack-with-call=1 -S | FileCheck %s… 3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s --check-… 4 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck %s --check-…
|
D | global_ctors_2to3.ll | 1 ; MSan converts 2-element global_ctors to 3-element when adding the new entry. 2 ; RUN: opt < %s -msan -msan-with-comdat -S | FileCheck %s 7 ; CHECK: $msan.module_ctor = comdat any 8 …i8* null }, { i32, void ()*, i8* } { i32 0, void ()* @msan.module_ctor, i8* bitcast (void ()* @msa… 17 ; CHECK: define internal void @msan.module_ctor() comdat {
|
D | msan_x86_bts_asm.ll | 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-handle-asm-conservative=0 -S | FileCheck -… 3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-handle-asm-conservative=1 -S | FileCheck -… 21 ; In the regular instrumentation mode MSan is unable to understand that |bit| 65 ; Now calculate the shadow address again, because MSan does this for every
|
D | check-constant-shadow.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-check-constant-shadow=1 -msan-track-origin… 6 ; Test that returning a literal undef from main() triggers an MSan warning.
|
D | atomics.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s 3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck %s
|
D | origin-alignment.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref… 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref…
|
D | nosanitize.ll | 1 ; Verify that calls with !nosanitize are not instrumented by MSan. 2 ; RUN: opt < %s -msan -S | FileCheck %s 3 ; RUN: opt < %s -msan -msan-track-origins=1 -S | FileCheck %s
|
D | store-origin.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref… 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref…
|
/external/compiler-rt/lib/msan/ |
D | CMakeLists.txt | 5 msan.cc 28 add_custom_target(msan) target 29 set_target_properties(msan PROPERTIES FOLDER "Compiler-RT Misc") 32 add_compiler_rt_runtime(clang_rt.msan 41 PARENT_TARGET msan) 48 PARENT_TARGET msan) 49 list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.msan-${arch} 52 add_sanitizer_rt_symbols(clang_rt.msan 54 EXTRA msan.syms.extra) 57 EXTRA msan.syms.extra) [all …]
|
/external/grpc-grpc/tools/ |
D | bazel.rc | 16 build:msan --strip=never 17 build:msan --copt -fsanitize-coverage=edge 18 build:msan --copt -fsanitize=memory 19 build:msan --copt -O0 20 build:msan --copt -fsanitize-memory-track-origins 21 build:msan --copt -fsanitize-memory-use-after-dtor 22 build:msan --copt -fno-omit-frame-pointer 23 build:msan --copt -fPIE 24 build:msan --copt -DGPR_NO_DIRECT_SYSCALLS 25 build:msan --linkopt -fsanitize=memory [all …]
|
/external/llvm/test/Instrumentation/MemorySanitizer/ |
D | instrumentation-with-call-threshold.ll | 1 ; Test -msan-instrumentation-with-call-threshold 5 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -S |… 6 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa… 7 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
|
D | global_ctors_2to3.ll | 1 ; MSan converts 2-element global_ctors to 3-element when adding the new entry. 2 ; RUN: opt < %s -msan -msan-with-comdat -S | FileCheck %s 7 ; CHECK: $msan.module_ctor = comdat any 8 …i8* null }, { i32, void ()*, i8* } { i32 0, void ()* @msan.module_ctor, i8* bitcast (void ()* @msa… 17 ; CHECK: define internal void @msan.module_ctor() comdat {
|
D | check-constant-shadow.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-check-constant-shadow=1 -msan-track-origin… 6 ; Test that returning a literal undef from main() triggers an MSan warning.
|
D | atomics.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s 3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck %s
|
D | origin-alignment.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref… 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref…
|
D | store-origin.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref… 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref…
|
/external/skia/site/dev/testing/ |
D | xsan.md | 1 MSAN, ASAN, & TSAN 11 - MSAN works on Linux[1]. 18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed. 20 of Clang and the instrumented libc++, located in /msan. 41 Configure and Compile Skia with MSAN 47 mkdir -p out/msan 48 cat > out/msan/args.gn <<- EOF 55 "-L${CLANGDIR}/msan", 56 "-Wl,-rpath,${CLANGDIR}/msan" ] 57 sanitize = "MSAN" [all …]
|
/external/skqp/site/dev/testing/ |
D | xsan.md | 1 MSAN, ASAN, & TSAN 11 - MSAN works on Linux[1]. 18 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed. 20 of Clang and the instrumented libc++, located in /msan. 41 Configure and Compile Skia with MSAN 47 mkdir -p out/msan 48 cat > out/msan/args.gn <<- EOF 55 "-L${CLANGDIR}/msan", 56 "-Wl,-rpath,${CLANGDIR}/msan" ] 57 sanitize = "MSAN" [all …]
|
/external/compiler-rt/lib/msan/tests/ |
D | CMakeLists.txt | 27 -I${COMPILER_RT_SOURCE_DIR}/lib/msan 43 -mllvm -msan-keep-going=1 63 list(APPEND COMPILE_DEPS gtest msan) 76 list(APPEND SOURCE_DEPS msan) 87 set_target_properties(MsanUnitTests PROPERTIES FOLDER "MSan unit tests") 89 # Adds MSan unit tests and benchmarks for architecture. 91 # Build gtest instrumented with MSan. 118 list(APPEND MSAN_TEST_DEPS msan) 121 add_compiler_rt_test(MsanUnitTests "Msan-${arch}${kind}-Test" ${arch} 130 # We should only build MSan unit tests if we can build instrumented libcxx. [all …]
|
/external/compiler-rt/test/msan/ |
D | keep-going.cc | 8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1 10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run … 12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run … 14 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=1 not %r… 16 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=0 not %r… 19 // Test behaviour of -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going. 20 // -mllvm -msan-keep-going provides the default value of keep_going flag; value
|
D | keep-going-dso.cc | 8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1 10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run … 12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run … 15 // Test how -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going affect reports 17 // -mllvm -msan-keep-going provides the default value of keep_going flag, but is
|
/external/clang/test/Lexer/ |
D | has_feature_memory_sanitizer.cpp | 1 // RUN: %clang_cc1 -E -fsanitize=memory %s -o - | FileCheck --check-prefix=CHECK-MSAN %s 2 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-NO-MSAN %s 10 // CHECK-MSAN: MemorySanitizerEnabled 11 // CHECK-NO-MSAN: MemorySanitizerDisabled
|
/external/clang/test/Driver/ |
D | sanitizer-ld.c | 178 // RUN: | FileCheck --check-prefix=CHECK-MSAN-LINUX-CXX %s 180 // CHECK-MSAN-LINUX-CXX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 181 // CHECK-MSAN-LINUX-CXX-NOT: stdc++ 182 // CHECK-MSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.msan-x86_64.a" "-no-whole-archive" 183 // CHECK-MSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan-x86_64.a.syms" 184 // CHECK-MSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.msan_cxx-x86_64.a" "-no-whole-archive" 185 // CHECK-MSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan_cxx-x86_64.a.syms" 186 // CHECK-MSAN-LINUX-CXX-NOT: "-export-dynamic" 187 // CHECK-MSAN-LINUX-CXX: stdc++ 188 // CHECK-MSAN-LINUX-CXX: "-lpthread" [all …]
|
12345678910>>...13