/aosp_15_r20/external/compiler-rt/lib/msan/ |
H A D | CMakeLists.txt | 5 msan.cc 28 add_custom_target(msan) target 29 set_target_properties(msan PROPERTIES FOLDER "Compiler-RT Misc") 32 add_compiler_rt_runtime(clang_rt.msan 41 PARENT_TARGET msan) 48 PARENT_TARGET msan) 49 list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.msan-${arch} 52 add_sanitizer_rt_symbols(clang_rt.msan 54 EXTRA msan.syms.extra) 57 EXTRA msan.syms.extra) [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/remote_build/ |
D | linux.bazelrc | 50 build:msan --copt=-gmlt 52 build:msan --test_timeout=60,900,1800,3600 54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost 55 build:msan --cxxopt=--stdlib=libc++ 56 build:msan --linkopt=--stdlib=libc++ 57 # use MSAN-instrumented version of libc++ 58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific 60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu 76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it, 77 # we need to involuntarily enable msan as well to be able to build. See b/200667821 [all …]
|
/aosp_15_r20/external/skia/site/docs/dev/testing/ |
H A D | xsan.md | 3 title: "MSAN, ASAN, & TSAN" 4 linkTitle: "MSAN, ASAN, & TSAN" 16 - MSAN works on Linux[1]. 23 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed. 25 of Clang and the instrumented libc++, located in /msan. 47 Configure and Compile Skia with MSAN 53 mkdir -p out/msan 54 cat > out/msan/args.gn <<- EOF 61 "-L${CLANGDIR}/msan", 62 "-Wl,-rpath,${CLANGDIR}/msan" ] [all …]
|
/aosp_15_r20/external/grpc-grpc/tools/remote_build/ |
H A D | linux.bazelrc | 50 build:msan --copt=-gmlt 52 build:msan --test_timeout=60,900,1800,3600 54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost 55 build:msan --cxxopt=--stdlib=libc++ 56 build:msan --linkopt=--stdlib=libc++ 57 # use MSAN-instrumented version of libc++ 58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific 60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu 76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it, 77 # we need to involuntarily enable msan as well to be able to build. See b/200667821 [all …]
|
/aosp_15_r20/external/llvm/test/Instrumentation/MemorySanitizer/ |
H A D | instrumentation-with-call-threshold.ll | 1 ; Test -msan-instrumentation-with-call-threshold 5 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -S |… 6 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa… 7 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
|
H A D | global_ctors_2to3.ll | 1 ; MSan converts 2-element global_ctors to 3-element when adding the new entry. 2 ; RUN: opt < %s -msan -msan-with-comdat -S | FileCheck %s 7 ; CHECK: $msan.module_ctor = comdat any 8 …i8* null }, { i32, void ()*, i8* } { i32 0, void ()* @msan.module_ctor, i8* bitcast (void ()* @msa… 17 ; CHECK: define internal void @msan.module_ctor() comdat {
|
H A D | atomics.ll | 1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s 2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s 3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck %s
|
/aosp_15_r20/external/zstd/tests/fuzz/ |
H A D | fuzz.py | 172 args.msan = set_sanitizer('memory', args.msan, san, nosan) 175 args.sanitize = args.asan or args.msan or args.ubsan 260 '--enable-msan', dest='msan', action='store_true', help='Enable MSAN') 262 '--enable-msan-track-origins', dest='msan_track_origins', 263 action='store_true', help='Enable MSAN origin tracking') 265 '--msan-extra-cppflags', 269 help="Extra CPPFLAGS for MSAN (default: $MSAN_EXTRA_CPPFLAGS='{}')". 272 '--msan-extra-cflags', 276 help="Extra CFLAGS for MSAN (default: $MSAN_EXTRA_CFLAGS='{}')".format( 279 '--msan-extra-cxxflags', [all …]
|
/aosp_15_r20/external/bazelbuild-rules_go/go/private/ |
H A D | mode.bzl | 47 if mode.msan: 48 result.append("msan") 86 msan = _ternary(go_config_info.msan if go_config_info else "off") 100 if pure and msan: 101 …fail("msan instrumentation can't be enabled when cgo is disabled. Check that pure is not set to \"… 114 if msan: 115 tags.append("msan") 120 msan = msan, 139 elif mode.msan: 149 l.msan == r.msan)
|
/aosp_15_r20/external/compiler-rt/lib/msan/tests/ |
H A D | CMakeLists.txt | 27 -I${COMPILER_RT_SOURCE_DIR}/lib/msan 43 -mllvm -msan-keep-going=1 63 list(APPEND COMPILE_DEPS gtest msan) 76 list(APPEND SOURCE_DEPS msan) 87 set_target_properties(MsanUnitTests PROPERTIES FOLDER "MSan unit tests") 89 # Adds MSan unit tests and benchmarks for architecture. 91 # Build gtest instrumented with MSan. 118 list(APPEND MSAN_TEST_DEPS msan) 121 add_compiler_rt_test(MsanUnitTests "Msan-${arch}${kind}-Test" ${arch} 130 # We should only build MSan unit tests if we can build instrumented libcxx. [all …]
|
/aosp_15_r20/external/zstd/.github/workflows/ |
H A D | dev-long-tests.yml | 125 # Note : external libraries must be turned off when using MSAN tests, 126 # because they are not msan-instrumented, 182 msan-regression: 186 - name: MSan + Regression Test 189 clang-msan-fuzz-unoptimized: 193 - name: clang + MSan + Fuzz Test 197 CC=clang MOREFLAGS="-O0" make clean msan-fuzztest 199 clang-msan-fuzz: 203 - name: clang + MSan + Fuzz Test 207 CC=clang FUZZER_FLAGS="--long-tests" make clean msan-fuzztest [all …]
|
/aosp_15_r20/external/clang/test/Driver/ |
H A D | sanitizer-ld.c | 178 // RUN: | FileCheck --check-prefix=CHECK-MSAN-LINUX-CXX %s 180 // CHECK-MSAN-LINUX-CXX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 181 // CHECK-MSAN-LINUX-CXX-NOT: stdc++ 182 // CHECK-MSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.msan-x86_64.a" "-no-whole-archive" 183 // CHECK-MSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan-x86_64.a.syms" 184 // CHECK-MSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.msan_cxx-x86_64.a" "-no-whole-archive" 185 // CHECK-MSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan_cxx-x86_64.a.syms" 186 // CHECK-MSAN-LINUX-CXX-NOT: "-export-dynamic" 187 // CHECK-MSAN-LINUX-CXX: stdc++ 188 // CHECK-MSAN-LINUX-CXX: "-lpthread" [all …]
|
H A D | fsanitize.c | 123 …ory-track-origins -pie %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-TRACK-ORIGINS-DISABLED-MSAN 124 // CHECK-TRACK-ORIGINS-DISABLED-MSAN-NOT: warning: argument unused 159 …ize-memory-use-after-dtor -pie %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-USE-AFTER-DTOR 160 // CHECK-MSAN-USE-AFTER-DTOR: -cc1{{.*}}-fsanitize-memory-use-after-dtor 228 …ng -target x86_64-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN 229 // CHECK-MSAN: "-fno-assume-sane-operator-new" 237 … -target i686-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-X86 238 // CHECK-MSAN-X86: error: unsupported option '-fsanitize=memory' for target 'i686--linux-gnu' 240 …86_64-apple-darwin10 -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-DARWIN 241 // CHECK-MSAN-DARWIN: unsupported option '-fsanitize=memory' for target 'x86_64-apple-darwin10' [all …]
|
/aosp_15_r20/prebuilts/go/linux-x86/src/runtime/ |
D | msan0.go | 5 //go:build !msan 7 // Dummy MSan support API, used when not built with -msan. 19 func msanread(addr unsafe.Pointer, sz uintptr) { throw("msan") } 20 func msanwrite(addr unsafe.Pointer, sz uintptr) { throw("msan") } 21 func msanmalloc(addr unsafe.Pointer, sz uintptr) { throw("msan") } 22 func msanfree(addr unsafe.Pointer, sz uintptr) { throw("msan") } 23 func msanmove(dst, src unsafe.Pointer, sz uintptr) { throw("msan") }
|
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/cgo/internal/testsanitizers/ |
D | msan_test.go | 27 // The msan tests require support for the -msan option. 29 t.Skipf("skipping on %s/%s; -msan option is not supported.", goos, goarch) 48 {src: "msan.go"}, 58 // This may not always fail specifically due to MSAN. It may sometimes 60 // get here, just that we get an error. This is an MSAN test because without 61 // MSAN it would not fail deterministically. 82 t.Fatalf("%#q exited without error; want MSAN failure\n%s", strings.Join(cmd.Args, " "), out)
|
/aosp_15_r20/external/libyuv/source/ |
H A D | row_any.cc | 23 // SIMD that reads full multiple of 16 bytes will not trigger msan errors. 40 memset(vin, 0, sizeof(vin)); /* for msan */ \ 73 memset(vin, 0, sizeof(vin)); /* for msan */ \ 131 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \ 197 memset(vin, 0, sizeof(vin)); /* for msan */ \ 247 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \ 325 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \ 449 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \ 506 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \ 570 memset(vin, 0, sizeof(vin)); /* for msan */ \ [all …]
|
/aosp_15_r20/external/bazelbuild-rules_go/go/private/rules/ |
H A D | transition.bzl | 41 "//go/config:msan", 76 msan = _set_ternary(settings, attr, "msan") 83 if msan == "on": 85 fail('msan = "on" cannot be set when msan = "on" is set. msan requires cgo.') 91 msan = "off" 92 settings["//go/config:msan"] = False 174 "//go/config:msan": False, 189 "//go/config:msan", 445 "msan": None,
|
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/go/testdata/script/ |
D | install_msan_and_race_and_asan_require_cgo.txt | 9 [!GOOS:darwin] [race] ! stderr '-msan' 11 [msan] ! go install -msan triv.go 12 [msan] stderr '-msan requires cgo' 13 [msan] ! stderr '-race' 17 [asan] ! stderr '-msan'
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/ |
D | bazel.rc | 92 build:msan --strip=never 93 build:msan --copt=-fsanitize=memory 94 build:msan --copt=-O0 95 build:msan --copt=-fsanitize-memory-track-origins 96 build:msan --copt=-fsanitize-memory-use-after-dtor 97 build:msan --copt=-fno-omit-frame-pointer 98 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS 99 build:msan --linkopt=-fsanitize=memory 100 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
|
/aosp_15_r20/external/grpc-grpc/tools/ |
H A D | bazel.rc | 101 build:msan --strip=never 102 build:msan --copt=-fsanitize=memory 103 build:msan --copt=-O0 104 build:msan --copt=-fsanitize-memory-track-origins 105 build:msan --copt=-fsanitize-memory-use-after-dtor 106 build:msan --copt=-fno-omit-frame-pointer 107 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS 108 build:msan --linkopt=-fsanitize=memory 109 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
|
/aosp_15_r20/external/compiler-rt/test/msan/ |
H A D | keep-going.cc | 8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1 10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run … 12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run … 14 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=1 not %r… 16 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=0 not %r… 19 // Test behaviour of -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going. 20 // -mllvm -msan-keep-going provides the default value of keep_going flag; value
|
/aosp_15_r20/external/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Instrumentation/ |
H A D | MemorySanitizer.cpp | 26 /// as well: msan needs to see all program events, including system 28 /// compile *everything* with msan or use a binary translation 48 /// values. This behavior is controlled with a flag (msan-track-origins) and is 111 /// The major differences between KMSAN and MSan instrumentation are: 112 /// - KMSAN always tracks the origins and implies msan-keep-going=true; 204 #define DEBUG_TYPE "msan" 210 // These constants must be kept in sync with the ones in msan.h. 221 static cl::opt<int> ClTrackOrigins("msan-track-origins", 225 static cl::opt<bool> ClKeepGoing("msan-keep-going", 229 static cl::opt<bool> ClPoisonStack("msan-poison-stack", [all …]
|
/aosp_15_r20/external/skia/infra/bots/recipe_modules/build/examples/full.expected/ |
H A D | Build-Debian10-Clang-x86_64-Debug-SwiftShader_MSAN.json | 68 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START… 69 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START… 121 …ux/bin\", \"-fuse-ld=lld\", \"-L[START_DIR]/clang_linux/msan\"] link_pool_depth=2 sanitize=\"MSAN\…
|
/aosp_15_r20/external/cronet/testing/libfuzzer/ |
H A D | reference.md | 5 ### MSan subsection 7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not 9 Thus, our [reproduce tool] cannot reproduce bugs found using MSan. 11 run MSan-instrumented code in docker. 37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l… 55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan…
|
/aosp_15_r20/external/libvpx/third_party/libyuv/source/ |
H A D | row_any.cc | 23 // SIMD that reads full multiple of 16 bytes will not trigger msan errors. 39 memset(temp, 0, 64 * 4); /* for msan */ \ 74 memset(temp, 0, 64 * 3); /* for YUY2 and msan */ \ 131 memset(temp, 0, 128 * 3); /* for YUY2 and msan */ \ 216 memset(temp, 0, 16 * 3 * SBPP); /* for YUY2 and msan */ \ 248 memset(temp, 0, 64 * 2); /* for msan */ \ 346 memset(temp, 0, 128 * 2); /* for msan */ \ 420 memset(temp, 0, 128); /* for YUY2 and msan */ \ 690 memset(temp, 0, 64 * 2); /* for msan */ \ 720 memset(temp, 0, 64); /* for msan */ \ [all …]
|