| /external/compiler-rt/lib/msan/ |
| D | CMakeLists.txt | 5 msan.cc 28 add_custom_target(msan) target 29 set_target_properties(msan PROPERTIES FOLDER "Compiler-RT Misc") 32 add_compiler_rt_runtime(clang_rt.msan 41 PARENT_TARGET msan) 48 PARENT_TARGET msan) 49 list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.msan-${arch} 52 add_sanitizer_rt_symbols(clang_rt.msan 54 EXTRA msan.syms.extra) 57 EXTRA msan.syms.extra) [all …]
|
| /external/llvm/test/Instrumentation/MemorySanitizer/ |
| D | instrumentation-with-call-threshold.ll | 1 ; Test -msan-instrumentation-with-call-threshold 5 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -S |… 6 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa… 7 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
|
| D | global_ctors_2to3.ll | 1 ; MSan converts 2-element global_ctors to 3-element when adding the new entry. 2 ; RUN: opt < %s -msan -msan-with-comdat -S | FileCheck %s 7 ; CHECK: $msan.module_ctor = comdat any 8 …i8* null }, { i32, void ()*, i8* } { i32 0, void ()* @msan.module_ctor, i8* bitcast (void ()* @msa… 17 ; CHECK: define internal void @msan.module_ctor() comdat {
|
| D | check-constant-shadow.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-check-constant-shadow=1 -msan-track-origin… 6 ; Test that returning a literal undef from main() triggers an MSan warning.
|
| D | origin-alignment.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-pref… 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck -check-pref…
|
| D | atomics.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s 3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck %s
|
| /external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/remote_build/ |
| D | linux.bazelrc | 50 build:msan --copt=-gmlt 52 build:msan --test_timeout=60,900,1800,3600 54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost 55 build:msan --cxxopt=--stdlib=libc++ 56 build:msan --linkopt=--stdlib=libc++ 57 # use MSAN-instrumented version of libc++ 58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific 60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu 76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it, 77 # we need to involuntarily enable msan as well to be able to build. See b/200667821 [all …]
|
| /external/grpc-grpc/tools/remote_build/ |
| D | linux.bazelrc | 50 build:msan --copt=-gmlt 52 build:msan --test_timeout=60,900,1800,3600 54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost 55 build:msan --cxxopt=--stdlib=libc++ 56 build:msan --linkopt=--stdlib=libc++ 57 # use MSAN-instrumented version of libc++ 58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific 60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu 76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it, 77 # we need to involuntarily enable msan as well to be able to build. See b/200667821 [all …]
|
| /external/skia/site/docs/dev/testing/ |
| D | xsan.md | 3 title: "MSAN, ASAN, & TSAN" 4 linkTitle: "MSAN, ASAN, & TSAN" 16 - MSAN works on Linux[1]. 23 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed. 25 of Clang and the instrumented libc++, located in /msan. 47 Configure and Compile Skia with MSAN 53 mkdir -p out/msan 54 cat > out/msan/args.gn <<- EOF 61 "-L${CLANGDIR}/msan", 62 "-Wl,-rpath,${CLANGDIR}/msan" ] [all …]
|
| /external/compiler-rt/lib/msan/tests/ |
| D | CMakeLists.txt | 27 -I${COMPILER_RT_SOURCE_DIR}/lib/msan 43 -mllvm -msan-keep-going=1 63 list(APPEND COMPILE_DEPS gtest msan) 76 list(APPEND SOURCE_DEPS msan) 87 set_target_properties(MsanUnitTests PROPERTIES FOLDER "MSan unit tests") 89 # Adds MSan unit tests and benchmarks for architecture. 91 # Build gtest instrumented with MSan. 118 list(APPEND MSAN_TEST_DEPS msan) 121 add_compiler_rt_test(MsanUnitTests "Msan-${arch}${kind}-Test" ${arch} 130 # We should only build MSan unit tests if we can build instrumented libcxx. [all …]
|
| /external/bazelbuild-rules_go/go/private/ |
| D | mode.bzl | 47 if mode.msan: 48 result.append("msan") 86 msan = _ternary(go_config_info.msan if go_config_info else "off") 100 if pure and msan: 101 …fail("msan instrumentation can't be enabled when cgo is disabled. Check that pure is not set to \"… 114 if msan: 115 tags.append("msan") 120 msan = msan, 139 elif mode.msan: 149 l.msan == r.msan)
|
| /external/compiler-rt/test/msan/ |
| D | keep-going.cc | 8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1 10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run … 12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run … 14 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=1 not %r… 16 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=0 not %r… 19 // Test behaviour of -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going. 20 // -mllvm -msan-keep-going provides the default value of keep_going flag; value
|
| D | keep-going-dso.cc | 8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1 10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run … 12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run … 15 // Test how -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going affect reports 17 // -mllvm -msan-keep-going provides the default value of keep_going flag, but is
|
| /external/zstd/.github/workflows/ |
| D | dev-long-tests.yml | 126 # Note : external libraries must be turned off when using MSAN tests, 127 # because they are not msan-instrumented, 198 msan-regression: 202 - name: MSan + Regression Test 205 clang-msan-fuzz-unoptimized: 209 - name: clang + MSan + Fuzz Test 213 CC=clang MOREFLAGS="-O0" make clean msan-fuzztest 215 clang-msan-fuzz: 219 - name: clang + MSan + Fuzz Test 223 CC=clang FUZZER_FLAGS="--long-tests" make clean msan-fuzztest [all …]
|
| /external/clang/test/Lexer/ |
| D | has_feature_memory_sanitizer.cpp | 1 // RUN: %clang_cc1 -E -fsanitize=memory %s -o - | FileCheck --check-prefix=CHECK-MSAN %s 2 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-NO-MSAN %s 10 // CHECK-MSAN: MemorySanitizerEnabled 11 // CHECK-NO-MSAN: MemorySanitizerDisabled
|
| /external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/ |
| D | bazel.rc | 92 build:msan --strip=never 93 build:msan --copt=-fsanitize=memory 94 build:msan --copt=-O0 95 build:msan --copt=-fsanitize-memory-track-origins 96 build:msan --copt=-fsanitize-memory-use-after-dtor 97 build:msan --copt=-fno-omit-frame-pointer 98 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS 99 build:msan --linkopt=-fsanitize=memory 100 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
|
| /external/grpc-grpc/tools/ |
| D | bazel.rc | 101 build:msan --strip=never 102 build:msan --copt=-fsanitize=memory 103 build:msan --copt=-O0 104 build:msan --copt=-fsanitize-memory-track-origins 105 build:msan --copt=-fsanitize-memory-use-after-dtor 106 build:msan --copt=-fno-omit-frame-pointer 107 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS 108 build:msan --linkopt=-fsanitize=memory 109 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
|
| /external/flac/oss-fuzz/fuzzing/ |
| D | memory.hpp | 33 #ifndef MSAN 34 #define MSAN 0 macro 45 #if MSAN == 1 66 #if MSAN == 1 in memory_test_msan() 88 #if MSAN == 1 in memory_test()
|
| /external/skia/infra/bots/recipe_modules/build/examples/full.expected/ |
| D | Build-Debian10-Clang-x86_64-Debug-SwiftShader_MSAN.json | 68 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START… 69 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START… 121 …ux/bin\", \"-fuse-ld=lld\", \"-L[START_DIR]/clang_linux/msan\"] link_pool_depth=2 sanitize=\"MSAN\…
|
| /external/zstd/tests/fuzz/ |
| D | fuzz.py | 172 args.msan = set_sanitizer('memory', args.msan, san, nosan) 175 args.sanitize = args.asan or args.msan or args.ubsan 260 '--enable-msan', dest='msan', action='store_true', help='Enable MSAN') 262 '--enable-msan-track-origins', dest='msan_track_origins', 263 action='store_true', help='Enable MSAN origin tracking') 265 '--msan-extra-cppflags', 269 help="Extra CPPFLAGS for MSAN (default: $MSAN_EXTRA_CPPFLAGS='{}')". 272 '--msan-extra-cflags', 276 help="Extra CFLAGS for MSAN (default: $MSAN_EXTRA_CFLAGS='{}')".format( 279 '--msan-extra-cxxflags', [all …]
|
| /external/grpc-grpc/templates/tools/dockerfile/test/rbe_ubuntu2004/ |
| D | Dockerfile.template | 35 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++ 43 …ng-ubuntu20_04/libcxx-msan_r<%text>${LLVM_LATEST}</%text>.tar.gz -O /tmp/libcxx-msan.tar.gz ${'\\'} 44 …&& mkdir -p /usr/local/libcxx-msan && tar -xzf /tmp/libcxx-msan.tar.gz -C /usr/local/libcxx-msan &…
|
| /external/cronet/tot/testing/libfuzzer/ |
| D | reference.md | 5 ### MSan subsection 7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not 9 Thus, our [reproduce tool] cannot reproduce bugs found using MSan. 11 run MSan-instrumented code in docker. 37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l… 55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan…
|
| /external/cronet/stable/testing/libfuzzer/ |
| D | reference.md | 5 ### MSan subsection 7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not 9 Thus, our [reproduce tool] cannot reproduce bugs found using MSan. 11 run MSan-instrumented code in docker. 37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l… 55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan…
|
| /external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/dockerfile/test/rbe_ubuntu2004/ |
| D | Dockerfile | 57 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++ 65 …ang-builds-stable/clang-ubuntu20_04/libcxx-msan_r${LLVM_LATEST}.tar.gz -O /tmp/libcxx-msan.tar.gz \ 66 …&& mkdir -p /usr/local/libcxx-msan && tar -xzf /tmp/libcxx-msan.tar.gz -C /usr/local/libcxx-msan &…
|
| /external/grpc-grpc/tools/dockerfile/test/rbe_ubuntu2004/ |
| D | Dockerfile | 57 # * for sanitizers to work, we need MSAN and TSAN enabled versions of libc++ 65 …ang-builds-stable/clang-ubuntu20_04/libcxx-msan_r${LLVM_LATEST}.tar.gz -O /tmp/libcxx-msan.tar.gz \ 66 …&& mkdir -p /usr/local/libcxx-msan && tar -xzf /tmp/libcxx-msan.tar.gz -C /usr/local/libcxx-msan &…
|