HomeSort by relevance Sort by last modified time
    Searched full:msan (Results 51 - 75 of 102) sorted by null

1 23 4 5

  /external/compiler-rt/make/platform/
clang_linux.mk 66 tsan-x86_64 msan-x86_64 ubsan-x86_64 ubsan_cxx-x86_64 dfsan-x86_64 \
74 Arch.msan-x86_64 := x86_64
106 CFLAGS.msan-x86_64 := $(CFLAGS) -m64 $(SANITIZER_CFLAGS) -fno-rtti
149 FUNCTIONS.msan-x86_64 := $(MsanFunctions) $(InterceptionFunctions) \
  /external/compiler-rt/test/msan/
dtls_test.c 5 Regression test for a bug in msan/glibc integration,
wrap_indirect_calls_in_rtl.cc 53 // ThreadFn is called indirectly from a wrapper function in MSan rtl and
print_stats.cc 15 // RUN: %clangxx_msan -fsanitize-memory-track-origins=2 -m64 -g -DPOSITIVE=1 -mllvm -msan-keep-going=1 %s -o %t
chained_origin_limits.cc 29 // RUN: %clangxx_msan -mllvm -msan-instrumentation-with-call-threshold=0 -fsanitize-memory-track-origins=2 -m64 -O3 %s -o %t
42 // RUN: %clangxx_msan -DSTACK -mllvm -msan-instrumentation-with-call-threshold=0 -fsanitize-memory-track-origins=2 -m64 -O3 %s -o %t
  /external/chromium_org/third_party/libjpeg_turbo/
libjpeg.gyp 139 [ 'target_arch=="x64" and msan!=1', {
160 # MSan builds for now.
161 [ 'msan==1', {
  /external/clang/test/Driver/
sanitizer-ld.c 173 // RUN: | FileCheck --check-prefix=CHECK-MSAN-LINUX-CXX %s
175 // CHECK-MSAN-LINUX-CXX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
176 // CHECK-MSAN-LINUX-CXX-NOT: stdc++
177 // CHECK-MSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.msan-x86_64.a" "-no-whole-archive"
178 // CHECK-MSAN-LINUX-CXX: "-lpthread"
179 // CHECK-MSAN-LINUX-CXX: "-lrt"
180 // CHECK-MSAN-LINUX-CXX: "-ldl"
181 // CHECK-MSAN-LINUX-CXX-NOT: "-export-dynamic"
182 // CHECK-MSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan-x86_64.a.syms
    [all...]
  /external/compiler-rt/lib/msan/
msan_interface_internal.h 12 // Private MSan interface header.
36 // (i.e. -mllvm -msan-keep-going)
141 // Tell MSan about newly allocated memory (ex.: custom allocator).
msan.h 1 //===-- msan.h --------------------------------------------------*- C++ -*-===//
12 // Private MSan header.
msan_allocator.cc 18 #include "msan.h"
msan_linux.cc 18 #include "msan.h"
  /external/chromium_org/third_party/libyuv/
libyuv.gyp 109 [ 'msan == 1', {
  /external/compiler-rt/lib/msan/tests/
msan_loadable.cc 15 #include "msan/msan_interface_internal.h"
  /external/llvm/test/Instrumentation/MemorySanitizer/
vector_pack.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s
vector_shift.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s
atomics.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s
msan_basic.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s
2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck -check-prefix=CHECK -check-prefix=CHECK-ORIGINS %s
  /external/compiler-rt/include/sanitizer/
allocator_interface.h 10 // Public interface header for allocator used in sanitizers (ASan/TSan/MSan).
  /external/llvm/test/Unit/
lit.cfg 33 # Propagate path to symbolizer for ASan/MSan.
  /external/llvm/lib/Transforms/Instrumentation/
MemorySanitizer.cpp 26 /// as well: msan needs to see all program events, including system
28 /// compile *everything* with msan or use a binary translation
48 /// values. This behavior is controlled with a flag (msan-track-origins) and is
121 #define DEBUG_TYPE "msan"
137 static cl::opt<int> ClTrackOrigins("msan-track-origins",
140 static cl::opt<bool> ClKeepGoing("msan-keep-going",
143 static cl::opt<bool> ClPoisonStack("msan-poison-stack",
146 static cl::opt<bool> ClPoisonStackWithCall("msan-poison-stack-with-call",
149 static cl::opt<int> ClPoisonStackPattern("msan-poison-stack-pattern",
152 static cl::opt<bool> ClPoisonUndef("msan-poison-undef"
    [all...]
  /external/chromium_org/third_party/libvpx/
libvpx.gyp 19 ['msan==1', {
69 ['target_arch=="x64" and msan==0', {
159 ['msan==1', {
  /external/chromium_org/build/secondary/third_party/libjpeg_turbo/
BUILD.gn 207 # MSan builds for now.
  /external/chromium_org/media/base/simd/
convert_rgb_to_yuv_unittest.cc 33 // Assembly code confuses MemorySanitizer. Do not run it in MSan builds.
  /external/chromium_org/sandbox/linux/services/
libc_urandom_override.cc 28 // under ASan or MSan - it crashes content_unittests. Make sure it works
  /external/clang/test/Unit/
lit.cfg 35 # Propagate path to symbolizer for ASan/MSan.

Completed in 340 milliseconds

1 23 4 5