HomeSort by relevance Sort by last modified time
    Searched full:msan (Results 1 - 25 of 102) sorted by null

1 2 3 4 5

  /external/chromium_org/testing/buildbot/
chromium.memory.fyi.json 2 "Linux MSan Tests": {
31 "Linux MSan Browser (1)": {
36 "Linux MSan Browser (2)": {
41 "Linux MSan Browser (3)": {
  /external/clang/test/Lexer/
has_feature_memory_sanitizer.cpp 1 // RUN: %clang_cc1 -E -fsanitize=memory %s -o - | FileCheck --check-prefix=CHECK-MSAN %s
2 // RUN: %clang_cc1 -E %s -o - | FileCheck --check-prefix=CHECK-NO-MSAN %s
10 // CHECK-MSAN: MemorySanitizerEnabled
11 // CHECK-NO-MSAN: MemorySanitizerDisabled
  /external/compiler-rt/test/msan/
CMakeLists.txt 9 list(APPEND MSAN_TEST_DEPS msan)
19 add_lit_testsuite(check-msan "Running the MemorySanitizer tests"
23 set_target_properties(check-msan PROPERTIES FOLDER "MSan tests")
default_blacklist.cc 1 // Test that MSan uses the default blacklist from resource directory.
initgroups.cc 8 // The above fails unless you are root. Does not matter, MSan false positive
wrap_indirect_calls2.cc 3 // RUN: %clangxx_msan -mllvm -msan-wrap-indirect-calls=__msan_wrap_indirect_call \
4 // RUN: -mllvm -msan-wrap-indirect-calls-fast=0 \
7 // This test disables -msan-wrap-indirect-calls-fast, otherwise indirect calls
keep-going-dso.cc 8 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1
10 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run %t >%t.out 2>&1
12 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run %t >%t.out 2>&1
15 // Test how -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going affect reports
17 // -mllvm -msan-keep-going provides the default value of keep_going flag, but is
keep-going.cc 8 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1
10 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run %t >%t.out 2>&1
12 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run %t >%t.out 2>&1
14 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=1 not %run %t >%t.out 2>&1
16 // RUN: %clangxx_msan -m64 -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=0 not %run %t >%t.out 2>&1
19 // Test behaviour of -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going.
20 // -mllvm -msan-keep-going provides the default value of keep_going flag; value
wrap_indirect_calls.cc 10 // RUN: -mllvm -msan-wrap-indirect-calls=wrapper \
11 // RUN: -mllvm -msan-wrap-indirect-calls-fast=0 \
20 // RUN: -mllvm -msan-wrap-indirect-calls=wrapper \
21 // RUN: -mllvm -msan-wrap-indirect-calls-fast=1 \
30 // RUN: -mllvm -msan-wrap-indirect-calls=wrapper \
31 // RUN: -mllvm -msan-wrap-indirect-calls-fast=1 \
40 // RUN: -mllvm -msan-wrap-indirect-calls=wrapper \
41 // RUN: -mllvm -msan-wrap-indirect-calls-fast=1 \
51 // RUN: -mllvm -msan-wrap-indirect-calls=wrapper \
52 // RUN: -mllvm -msan-wrap-indirect-calls-fast=1
    [all...]
death-callback.cc 15 fprintf(stderr, "msan-death-callback\n");
35 // CHECK-CB: msan-death-callback
36 // CHECK-NOCB-NOT: msan-death-callback
strerror_r-non-gnu.c 4 // __xpg_strerror_r. Test that MSan handles this correctly.
  /external/compiler-rt/lib/msan/
CMakeLists.txt 5 msan.cc
24 add_custom_target(msan)
27 add_compiler_rt_runtime(clang_rt.msan-${arch} ${arch} STATIC
33 add_dependencies(msan clang_rt.msan-${arch})
34 list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.msan-${arch})
36 add_sanitizer_rt_symbols(clang_rt.msan-${arch} msan.syms.extra)
37 add_dependencies(msan clang_rt.msan-${arch}-symbols
    [all...]
Makefile.mk 1 #===- lib/msan/Makefile.mk ---------------------------------*- Makefile -*--===#
10 ModuleName := msan
23 # Define a convenience variable for all the msan functions.
  /external/compiler-rt/test/msan/Unit/
lit.site.cfg.in 11 # it as build directory with MSan unit tests.
12 # FIXME: Don't use hardcoded path to MSan unit tests.
13 config.test_exec_root = "@COMPILER_RT_BINARY_DIR@/lib/msan/tests"
  /external/llvm/test/Instrumentation/MemorySanitizer/
instrumentation-with-call-threshold.ll 1 ; Test -msan-instrumentation-with-call-threshold
5 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -S | FileCheck %s
6 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msan-track-origins=1 -S | FileCheck -check-prefix=CHECK -check-prefix=CHECK-ORIGINS %s
7 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msan-track-origins=2 -S | File (…)
    [all...]
wrap_indirect_calls.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-wrap-indirect-calls=zzz -msan-wrap-indirect-calls-fast=0 -S | FileCheck %s
2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-wrap-indirect-calls=zzz -msan-wrap-indirect-calls-fast=1 -S | FileCheck -check-prefix=CHECK-FAST %s
6 ; Test for -msan-wrap-indirect-calls functionality.
do-not-emit-module-limits.ll 1 ; Test that MSan does not emit undefined symbol __executable_start when it is
2 ; not needed (i.e. without -msan-wrap-indirect-calls).
4 ; RUN: opt < %s -msan -S | FileCheck %s
missing_origin.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s
check_access_address.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=1 -S | FileCheck %s
return_from_main.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s
  /external/compiler-rt/lib/msan/tests/
CMakeLists.txt 27 -I${COMPILER_RT_SOURCE_DIR}/lib/msan
43 -mllvm -msan-keep-going=1
65 list(APPEND COMPILE_DEPS gtest msan)
78 list(APPEND SOURCE_DEPS msan)
89 set_target_properties(MsanUnitTests PROPERTIES FOLDER "MSan unit tests")
91 # Adds MSan unit tests and benchmarks for architecture.
99 # Build gtest instrumented with MSan.
138 list(APPEND MSAN_TEST_DEPS msan)
141 add_compiler_rt_test(MsanUnitTests "Msan-${arch}${kind}-Test" ${arch}
150 # We should only build MSan unit tests if we can build instrumented libcxx
    [all...]
  /external/compiler-rt/lib/tsan/
check_cmake.sh 17 ninja check-msan
  /external/llvm/test/Instrumentation/MemorySanitizer/X86/
vararg.ll 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S
  /external/chromium_org/tools/msan/
blacklist.txt 3 # mentioned here, changing this file requires clobbering all MSan bots.
  /external/clang/test/Driver/
fsanitize.c 90 // RUN: %clang -target x86_64-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-NO-PIE
91 // CHECK-MSAN-NO-PIE: "-mrelocation-model" "pic" "-pic-level" "2" "-pie-level" "2"
92 // CHECK-MSAN-NO-PIE: "-pie"
115 // RUN: %clang -target x86_64-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN
116 // CHECK-MSAN: "-fno-assume-sane-operator-new"
122 // RUN: %clang -target i686-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-X86
123 // CHECK-MSAN-X86: error: unsupported option '-fsanitize=memory' for target 'i686--linux-gnu'
125 // RUN: %clang -target x86_64-apple-darwin10 -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-DARWIN
126 // CHECK-MSAN-DARWIN: unsupported option '-fsanitize=memory' for target 'x86_64-apple-darwin10'
128 // RUN: %clang -target x86_64-apple-darwin10 -fsanitize=memory -fno-sanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-NOMSAN-DARWI
    [all...]

Completed in 1984 milliseconds

1 2 3 4 5