Home
last modified time | relevance | path

Searched full:msan (Results 1 – 25 of 653) sorted by relevance

12345678910>>...27

/external/compiler-rt/lib/msan/
DCMakeLists.txt5 msan.cc
28 add_custom_target(msan) target
29 set_target_properties(msan PROPERTIES FOLDER "Compiler-RT Misc")
32 add_compiler_rt_runtime(clang_rt.msan
41 PARENT_TARGET msan)
48 PARENT_TARGET msan)
49 list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.msan-${arch}
52 add_sanitizer_rt_symbols(clang_rt.msan
54 EXTRA msan.syms.extra)
57 EXTRA msan.syms.extra)
[all …]
/external/llvm/test/Instrumentation/MemorySanitizer/
Dinstrumentation-with-call-threshold.ll1 ; Test -msan-instrumentation-with-call-threshold
5 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -S |…
6 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
7 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
Dglobal_ctors_2to3.ll1 ; MSan converts 2-element global_ctors to 3-element when adding the new entry.
2 ; RUN: opt < %s -msan -msan-with-comdat -S | FileCheck %s
7 ; CHECK: $msan.module_ctor = comdat any
8 …i8* null }, { i32, void ()*, i8* } { i32 0, void ()* @msan.module_ctor, i8* bitcast (void ()* @msa…
17 ; CHECK: define internal void @msan.module_ctor() comdat {
Dcheck-constant-shadow.ll1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-check-constant-shadow=1 -msan-track-origin…
6 ; Test that returning a literal undef from main() triggers an MSan warning.
Dorigin-alignment.ll1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref…
2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref…
Datomics.ll1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s
2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s
3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck %s
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/remote_build/
Dlinux.bazelrc50 build:msan --copt=-gmlt
52 build:msan --test_timeout=60,900,1800,3600
54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost
55 build:msan --cxxopt=--stdlib=libc++
56 build:msan --linkopt=--stdlib=libc++
57 # use MSAN-instrumented version of libc++
58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific
60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu
76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it,
77 # we need to involuntarily enable msan as well to be able to build. See b/200667821
[all …]
/external/grpc-grpc/tools/remote_build/
Dlinux.bazelrc50 build:msan --copt=-gmlt
52 build:msan --test_timeout=60,900,1800,3600
54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost
55 build:msan --cxxopt=--stdlib=libc++
56 build:msan --linkopt=--stdlib=libc++
57 # use MSAN-instrumented version of libc++
58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific
60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu
76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it,
77 # we need to involuntarily enable msan as well to be able to build. See b/200667821
[all …]
/external/skia/site/docs/dev/testing/
Dxsan.md3 title: "MSAN, ASAN, & TSAN"
4 linkTitle: "MSAN, ASAN, & TSAN"
16 - MSAN works on Linux[1].
23 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed.
25 of Clang and the instrumented libc++, located in /msan.
47 Configure and Compile Skia with MSAN
53 mkdir -p out/msan
54 cat > out/msan/args.gn <<- EOF
61 "-L${CLANGDIR}/msan",
62 "-Wl,-rpath,${CLANGDIR}/msan" ]
[all …]
/external/compiler-rt/lib/msan/tests/
DCMakeLists.txt27 -I${COMPILER_RT_SOURCE_DIR}/lib/msan
43 -mllvm -msan-keep-going=1
63 list(APPEND COMPILE_DEPS gtest msan)
76 list(APPEND SOURCE_DEPS msan)
87 set_target_properties(MsanUnitTests PROPERTIES FOLDER "MSan unit tests")
89 # Adds MSan unit tests and benchmarks for architecture.
91 # Build gtest instrumented with MSan.
118 list(APPEND MSAN_TEST_DEPS msan)
121 add_compiler_rt_test(MsanUnitTests "Msan-${arch}${kind}-Test" ${arch}
130 # We should only build MSan unit tests if we can build instrumented libcxx.
[all …]
/external/bazelbuild-rules_go/go/private/
Dmode.bzl47 if mode.msan:
48 result.append("msan")
86 msan = _ternary(go_config_info.msan if go_config_info else "off")
100 if pure and msan:
101 …fail("msan instrumentation can't be enabled when cgo is disabled. Check that pure is not set to \"…
114 if msan:
115 tags.append("msan")
120 msan = msan,
139 elif mode.msan:
149 l.msan == r.msan)
/external/compiler-rt/test/msan/
Dkeep-going.cc8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1
10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run …
12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run …
14 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=1 not %r…
16 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=0 not %r…
19 // Test behaviour of -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going.
20 // -mllvm -msan-keep-going provides the default value of keep_going flag; value
Dkeep-going-dso.cc8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1
10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run …
12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run …
15 // Test how -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going affect reports
17 // -mllvm -msan-keep-going provides the default value of keep_going flag, but is
/external/zstd/.github/workflows/
Ddev-long-tests.yml126 # Note : external libraries must be turned off when using MSAN tests,
127 # because they are not msan-instrumented,
198 msan-regression:
202 - name: MSan + Regression Test
205 clang-msan-fuzz-unoptimized:
209 - name: clang + MSan + Fuzz Test
213 CC=clang MOREFLAGS="-O0" make clean msan-fuzztest
215 clang-msan-fuzz:
219 - name: clang + MSan + Fuzz Test
223 CC=clang FUZZER_FLAGS="--long-tests" make clean msan-fuzztest
[all …]
/external/clang/test/Lexer/
Dhas_feature_memory_sanitizer.cpp1 // RUN: %clang_cc1 -E -fsanitize=memory %s -o - | FileCheck --check-prefix=CHECK-MSAN %s
2 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-NO-MSAN %s
10 // CHECK-MSAN: MemorySanitizerEnabled
11 // CHECK-NO-MSAN: MemorySanitizerDisabled
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/
Dbazel.rc92 build:msan --strip=never
93 build:msan --copt=-fsanitize=memory
94 build:msan --copt=-O0
95 build:msan --copt=-fsanitize-memory-track-origins
96 build:msan --copt=-fsanitize-memory-use-after-dtor
97 build:msan --copt=-fno-omit-frame-pointer
98 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS
99 build:msan --linkopt=-fsanitize=memory
100 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
/external/grpc-grpc/tools/
Dbazel.rc101 build:msan --strip=never
102 build:msan --copt=-fsanitize=memory
103 build:msan --copt=-O0
104 build:msan --copt=-fsanitize-memory-track-origins
105 build:msan --copt=-fsanitize-memory-use-after-dtor
106 build:msan --copt=-fno-omit-frame-pointer
107 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS
108 build:msan --linkopt=-fsanitize=memory
109 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
/external/flac/oss-fuzz/fuzzing/
Dmemory.hpp33 #ifndef MSAN
34 #define MSAN 0 macro
45 #if MSAN == 1
66 #if MSAN == 1 in memory_test_msan()
88 #if MSAN == 1 in memory_test()
/external/skia/infra/bots/recipe_modules/build/examples/full.expected/
DBuild-Debian10-Clang-x86_64-Debug-SwiftShader_MSAN.json68 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START…
69 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START…
121 …ux/bin\", \"-fuse-ld=lld\", \"-L[START_DIR]/clang_linux/msan\"] link_pool_depth=2 sanitize=\"MSAN\…
/external/zstd/tests/fuzz/
Dfuzz.py172 args.msan = set_sanitizer('memory', args.msan, san, nosan)
175 args.sanitize = args.asan or args.msan or args.ubsan
260 '--enable-msan', dest='msan', action='store_true', help='Enable MSAN')
262 '--enable-msan-track-origins', dest='msan_track_origins',
263 action='store_true', help='Enable MSAN origin tracking')
265 '--msan-extra-cppflags',
269 help="Extra CPPFLAGS for MSAN (default: $MSAN_EXTRA_CPPFLAGS='{}')".
272 '--msan-extra-cflags',
276 help="Extra CFLAGS for MSAN (default: $MSAN_EXTRA_CFLAGS='{}')".format(
279 '--msan-extra-cxxflags',
[all …]
/external/grpc-grpc/templates/tools/dockerfile/test/rbe_ubuntu2004/
DDockerfile.template35 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++
43 …ng-ubuntu20_04/libcxx-msan_r<%text>${LLVM_LATEST}</%text>.tar.gz -O /tmp/libcxx-msan.tar.gz ${'\\'}
44 …&& mkdir -p /usr/local/libcxx-msan && tar -xzf /tmp/libcxx-msan.tar.gz -C /usr/local/libcxx-msan &…
/external/cronet/tot/testing/libfuzzer/
Dreference.md5 ### MSan subsection
7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not
9 Thus, our [reproduce tool] cannot reproduce bugs found using MSan.
11 run MSan-instrumented code in docker.
37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l…
55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan
/external/cronet/stable/testing/libfuzzer/
Dreference.md5 ### MSan subsection
7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not
9 Thus, our [reproduce tool] cannot reproduce bugs found using MSan.
11 run MSan-instrumented code in docker.
37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l…
55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan
/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/dockerfile/test/rbe_ubuntu2004/
DDockerfile57 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++
65 …ang-builds-stable/clang-ubuntu20_04/libcxx-msan_r${LLVM_LATEST}.tar.gz -O /tmp/libcxx-msan.tar.gz \
66 …&& mkdir -p /usr/local/libcxx-msan && tar -xzf /tmp/libcxx-msan.tar.gz -C /usr/local/libcxx-msan &…
/external/grpc-grpc/tools/dockerfile/test/rbe_ubuntu2004/
DDockerfile57 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++
65 …ang-builds-stable/clang-ubuntu20_04/libcxx-msan_r${LLVM_LATEST}.tar.gz -O /tmp/libcxx-msan.tar.gz \
66 …&& mkdir -p /usr/local/libcxx-msan && tar -xzf /tmp/libcxx-msan.tar.gz -C /usr/local/libcxx-msan &…

12345678910>>...27