OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:msan
(Results
1 - 25
of
102
) sorted by null
1
2
3
4
5
/external/chromium_org/testing/buildbot/
chromium.memory.fyi.json
2
"Linux
MSan
Tests": {
31
"Linux
MSan
Browser (1)": {
36
"Linux
MSan
Browser (2)": {
41
"Linux
MSan
Browser (3)": {
/external/clang/test/Lexer/
has_feature_memory_sanitizer.cpp
1
// RUN: %clang_cc1 -E -fsanitize=memory %s -o - | FileCheck --check-prefix=CHECK-
MSAN
%s
2
// RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-NO-
MSAN
%s
10
// CHECK-
MSAN
: MemorySanitizerEnabled
11
// CHECK-NO-
MSAN
: MemorySanitizerDisabled
/external/compiler-rt/test/msan/
CMakeLists.txt
9
list(APPEND MSAN_TEST_DEPS
msan
)
19
add_lit_testsuite(check-
msan
"Running the MemorySanitizer tests"
23
set_target_properties(check-
msan
PROPERTIES FOLDER "
MSan
tests")
default_blacklist.cc
1
// Test that
MSan
uses the default blacklist from resource directory.
initgroups.cc
8
// The above fails unless you are root. Does not matter,
MSan
false positive
wrap_indirect_calls2.cc
3
// RUN: %clangxx_msan -mllvm -
msan
-wrap-indirect-calls=__msan_wrap_indirect_call \
4
// RUN: -mllvm -
msan
-wrap-indirect-calls-fast=0 \
7
// This test disables -
msan
-wrap-indirect-calls-fast, otherwise indirect calls
keep-going-dso.cc
8
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1
10
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run %t >%t.out 2>&1
12
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run %t >%t.out 2>&1
15
// Test how -mllvm -
msan
-keep-going and MSAN_OPTIONS=keep_going affect reports
17
// -mllvm -
msan
-keep-going provides the default value of keep_going flag, but is
keep-going.cc
8
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1
10
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run %t >%t.out 2>&1
12
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run %t >%t.out 2>&1
14
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=1 not %run %t >%t.out 2>&1
16
// RUN: %clangxx_msan -m64 -mllvm -
msan
-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=0 not %run %t >%t.out 2>&1
19
// Test behaviour of -mllvm -
msan
-keep-going and MSAN_OPTIONS=keep_going.
20
// -mllvm -
msan
-keep-going provides the default value of keep_going flag; value
wrap_indirect_calls.cc
10
// RUN: -mllvm -
msan
-wrap-indirect-calls=wrapper \
11
// RUN: -mllvm -
msan
-wrap-indirect-calls-fast=0 \
20
// RUN: -mllvm -
msan
-wrap-indirect-calls=wrapper \
21
// RUN: -mllvm -
msan
-wrap-indirect-calls-fast=1 \
30
// RUN: -mllvm -
msan
-wrap-indirect-calls=wrapper \
31
// RUN: -mllvm -
msan
-wrap-indirect-calls-fast=1 \
40
// RUN: -mllvm -
msan
-wrap-indirect-calls=wrapper \
41
// RUN: -mllvm -
msan
-wrap-indirect-calls-fast=1 \
51
// RUN: -mllvm -
msan
-wrap-indirect-calls=wrapper \
52
// RUN: -mllvm -
msan
-wrap-indirect-calls-fast=1
[
all
...]
death-callback.cc
15
fprintf(stderr, "
msan
-death-callback\n");
35
// CHECK-CB:
msan
-death-callback
36
// CHECK-NOCB-NOT:
msan
-death-callback
strerror_r-non-gnu.c
4
// __xpg_strerror_r. Test that
MSan
handles this correctly.
/external/compiler-rt/lib/msan/
CMakeLists.txt
5
msan
.cc
24
add_custom_target(
msan
)
27
add_compiler_rt_runtime(clang_rt.
msan
-${arch} ${arch} STATIC
33
add_dependencies(
msan
clang_rt.
msan
-${arch})
34
list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.
msan
-${arch})
36
add_sanitizer_rt_symbols(clang_rt.
msan
-${arch}
msan
.syms.extra)
37
add_dependencies(
msan
clang_rt.
msan
-${arch}-symbols
[
all
...]
Makefile.mk
1
#===- lib/
msan
/Makefile.mk ---------------------------------*- Makefile -*--===#
10
ModuleName :=
msan
23
# Define a convenience variable for all the
msan
functions.
/external/compiler-rt/test/msan/Unit/
lit.site.cfg.in
11
# it as build directory with
MSan
unit tests.
12
# FIXME: Don't use hardcoded path to
MSan
unit tests.
13
config.test_exec_root = "@COMPILER_RT_BINARY_DIR@/lib/
msan
/tests"
/external/llvm/test/Instrumentation/MemorySanitizer/
instrumentation-with-call-threshold.ll
1
; Test -
msan
-instrumentation-with-call-threshold
5
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -
msan
-instrumentation-with-call-threshold=0 -S | FileCheck %s
6
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -
msan
-instrumentation-with-call-threshold=0 -
msan
-track-origins=1 -S | FileCheck -check-prefix=CHECK -check-prefix=CHECK-ORIGINS %s
7
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msan-track-origins=2 -S | File (…)
[
all
...]
wrap_indirect_calls.ll
1
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -
msan
-wrap-indirect-calls=zzz -
msan
-wrap-indirect-calls-fast=0 -S | FileCheck %s
2
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -
msan
-wrap-indirect-calls=zzz -
msan
-wrap-indirect-calls-fast=1 -S | FileCheck -check-prefix=CHECK-FAST %s
6
; Test for -
msan
-wrap-indirect-calls functionality.
do-not-emit-module-limits.ll
1
; Test that
MSan
does not emit undefined symbol __executable_start when it is
2
; not needed (i.e. without -
msan
-wrap-indirect-calls).
4
; RUN: opt < %s -
msan
-S | FileCheck %s
missing_origin.ll
1
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -
msan
-track-origins=1 -S | FileCheck %s
check_access_address.ll
1
; RUN: opt < %s -
msan
-
msan
-check-access-address=1 -S | FileCheck %s
return_from_main.ll
1
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -S | FileCheck %s
/external/compiler-rt/lib/msan/tests/
CMakeLists.txt
27
-I${COMPILER_RT_SOURCE_DIR}/lib/
msan
43
-mllvm -
msan
-keep-going=1
65
list(APPEND COMPILE_DEPS gtest
msan
)
78
list(APPEND SOURCE_DEPS
msan
)
89
set_target_properties(MsanUnitTests PROPERTIES FOLDER "
MSan
unit tests")
91
# Adds
MSan
unit tests and benchmarks for architecture.
99
# Build gtest instrumented with
MSan
.
138
list(APPEND MSAN_TEST_DEPS
msan
)
141
add_compiler_rt_test(MsanUnitTests "
Msan
-${arch}${kind}-Test" ${arch}
150
# We should only build
MSan
unit tests if we can build instrumented libcxx
[
all
...]
/external/compiler-rt/lib/tsan/
check_cmake.sh
17
ninja check-
msan
/external/llvm/test/Instrumentation/MemorySanitizer/X86/
vararg.ll
1
; RUN: opt < %s -
msan
-
msan
-check-access-address=0 -S
/external/chromium_org/tools/msan/
blacklist.txt
3
# mentioned here, changing this file requires clobbering all
MSan
bots.
/external/clang/test/Driver/
fsanitize.c
90
// RUN: %clang -target x86_64-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-
MSAN
-NO-PIE
91
// CHECK-
MSAN
-NO-PIE: "-mrelocation-model" "pic" "-pic-level" "2" "-pie-level" "2"
92
// CHECK-
MSAN
-NO-PIE: "-pie"
115
// RUN: %clang -target x86_64-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-
MSAN
116
// CHECK-
MSAN
: "-fno-assume-sane-operator-new"
122
// RUN: %clang -target i686-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-
MSAN
-X86
123
// CHECK-
MSAN
-X86: error: unsupported option '-fsanitize=memory' for target 'i686--linux-gnu'
125
// RUN: %clang -target x86_64-apple-darwin10 -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-
MSAN
-DARWIN
126
// CHECK-
MSAN
-DARWIN: unsupported option '-fsanitize=memory' for target 'x86_64-apple-darwin10'
128
// RUN: %clang -target x86_64-apple-darwin10 -fsanitize=memory -fno-sanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-
MSAN
-NOMSAN-DARWI
[
all
...]
Completed in 1984 milliseconds
1
2
3
4
5