Home
last modified time | relevance | path

Searched full:msan (Results 1 – 25 of 732) sorted by relevance

12345678910>>...30

/aosp_15_r20/external/compiler-rt/lib/msan/
H A DCMakeLists.txt5 msan.cc
28 add_custom_target(msan) target
29 set_target_properties(msan PROPERTIES FOLDER "Compiler-RT Misc")
32 add_compiler_rt_runtime(clang_rt.msan
41 PARENT_TARGET msan)
48 PARENT_TARGET msan)
49 list(APPEND MSAN_RUNTIME_LIBRARIES clang_rt.msan-${arch}
52 add_sanitizer_rt_symbols(clang_rt.msan
54 EXTRA msan.syms.extra)
57 EXTRA msan.syms.extra)
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/remote_build/
Dlinux.bazelrc50 build:msan --copt=-gmlt
52 build:msan --test_timeout=60,900,1800,3600
54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost
55 build:msan --cxxopt=--stdlib=libc++
56 build:msan --linkopt=--stdlib=libc++
57 # use MSAN-instrumented version of libc++
58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific
60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu
76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it,
77 # we need to involuntarily enable msan as well to be able to build. See b/200667821
[all …]
/aosp_15_r20/external/skia/site/docs/dev/testing/
H A Dxsan.md3 title: "MSAN, ASAN, & TSAN"
4 linkTitle: "MSAN, ASAN, & TSAN"
16 - MSAN works on Linux[1].
23 [1]To compile and run with MSAN, an MSAN-instrumented version of libc++ is needed.
25 of Clang and the instrumented libc++, located in /msan.
47 Configure and Compile Skia with MSAN
53 mkdir -p out/msan
54 cat > out/msan/args.gn <<- EOF
61 "-L${CLANGDIR}/msan",
62 "-Wl,-rpath,${CLANGDIR}/msan" ]
[all …]
/aosp_15_r20/external/grpc-grpc/tools/remote_build/
H A Dlinux.bazelrc50 build:msan --copt=-gmlt
52 build:msan --test_timeout=60,900,1800,3600
54 build:msan --test_tag_filters=-no_linux,-nomsan,-json_run_localhost
55 build:msan --cxxopt=--stdlib=libc++
56 build:msan --linkopt=--stdlib=libc++
57 # use MSAN-instrumented version of libc++
58 # TODO(jtattermusch): include the modified LD_LIBRARY_PATH in an msan-specific
60 build:msan --action_env=LD_LIBRARY_PATH=/usr/local/libcxx-msan/lib/x86_64-unknown-linux-gnu
76 # RBE docker image only has a msan specific version of libc++, so to be able to link against it,
77 # we need to involuntarily enable msan as well to be able to build. See b/200667821
[all …]
/aosp_15_r20/external/llvm/test/Instrumentation/MemorySanitizer/
H A Dinstrumentation-with-call-threshold.ll1 ; Test -msan-instrumentation-with-call-threshold
5 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -S |…
6 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
7 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-instrumentation-with-call-threshold=0 -msa…
H A Dglobal_ctors_2to3.ll1 ; MSan converts 2-element global_ctors to 3-element when adding the new entry.
2 ; RUN: opt < %s -msan -msan-with-comdat -S | FileCheck %s
7 ; CHECK: $msan.module_ctor = comdat any
8 …i8* null }, { i32, void ()*, i8* } { i32 0, void ()* @msan.module_ctor, i8* bitcast (void ()* @msa…
17 ; CHECK: define internal void @msan.module_ctor() comdat {
H A Datomics.ll1 ; RUN: opt < %s -msan -msan-check-access-address=0 -S | FileCheck %s
2 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=1 -S | FileCheck %s
3 ; RUN: opt < %s -msan -msan-check-access-address=0 -msan-track-origins=2 -S | FileCheck %s
/aosp_15_r20/external/zstd/tests/fuzz/
H A Dfuzz.py172 args.msan = set_sanitizer('memory', args.msan, san, nosan)
175 args.sanitize = args.asan or args.msan or args.ubsan
260 '--enable-msan', dest='msan', action='store_true', help='Enable MSAN')
262 '--enable-msan-track-origins', dest='msan_track_origins',
263 action='store_true', help='Enable MSAN origin tracking')
265 '--msan-extra-cppflags',
269 help="Extra CPPFLAGS for MSAN (default: $MSAN_EXTRA_CPPFLAGS='{}')".
272 '--msan-extra-cflags',
276 help="Extra CFLAGS for MSAN (default: $MSAN_EXTRA_CFLAGS='{}')".format(
279 '--msan-extra-cxxflags',
[all …]
/aosp_15_r20/external/bazelbuild-rules_go/go/private/
H A Dmode.bzl47 if mode.msan:
48 result.append("msan")
86 msan = _ternary(go_config_info.msan if go_config_info else "off")
100 if pure and msan:
101 …fail("msan instrumentation can't be enabled when cgo is disabled. Check that pure is not set to \"…
114 if msan:
115 tags.append("msan")
120 msan = msan,
139 elif mode.msan:
149 l.msan == r.msan)
/aosp_15_r20/external/compiler-rt/lib/msan/tests/
H A DCMakeLists.txt27 -I${COMPILER_RT_SOURCE_DIR}/lib/msan
43 -mllvm -msan-keep-going=1
63 list(APPEND COMPILE_DEPS gtest msan)
76 list(APPEND SOURCE_DEPS msan)
87 set_target_properties(MsanUnitTests PROPERTIES FOLDER "MSan unit tests")
89 # Adds MSan unit tests and benchmarks for architecture.
91 # Build gtest instrumented with MSan.
118 list(APPEND MSAN_TEST_DEPS msan)
121 add_compiler_rt_test(MsanUnitTests "Msan-${arch}${kind}-Test" ${arch}
130 # We should only build MSan unit tests if we can build instrumented libcxx.
[all …]
/aosp_15_r20/external/zstd/.github/workflows/
H A Ddev-long-tests.yml125 # Note : external libraries must be turned off when using MSAN tests,
126 # because they are not msan-instrumented,
182 msan-regression:
186 - name: MSan + Regression Test
189 clang-msan-fuzz-unoptimized:
193 - name: clang + MSan + Fuzz Test
197 CC=clang MOREFLAGS="-O0" make clean msan-fuzztest
199 clang-msan-fuzz:
203 - name: clang + MSan + Fuzz Test
207 CC=clang FUZZER_FLAGS="--long-tests" make clean msan-fuzztest
[all …]
/aosp_15_r20/external/clang/test/Driver/
H A Dsanitizer-ld.c178 // RUN: | FileCheck --check-prefix=CHECK-MSAN-LINUX-CXX %s
180 // CHECK-MSAN-LINUX-CXX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
181 // CHECK-MSAN-LINUX-CXX-NOT: stdc++
182 // CHECK-MSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.msan-x86_64.a" "-no-whole-archive"
183 // CHECK-MSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan-x86_64.a.syms"
184 // CHECK-MSAN-LINUX-CXX: "-whole-archive" "{{.*}}libclang_rt.msan_cxx-x86_64.a" "-no-whole-archive"
185 // CHECK-MSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan_cxx-x86_64.a.syms"
186 // CHECK-MSAN-LINUX-CXX-NOT: "-export-dynamic"
187 // CHECK-MSAN-LINUX-CXX: stdc++
188 // CHECK-MSAN-LINUX-CXX: "-lpthread"
[all …]
H A Dfsanitize.c123 …ory-track-origins -pie %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-TRACK-ORIGINS-DISABLED-MSAN
124 // CHECK-TRACK-ORIGINS-DISABLED-MSAN-NOT: warning: argument unused
159 …ize-memory-use-after-dtor -pie %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-USE-AFTER-DTOR
160 // CHECK-MSAN-USE-AFTER-DTOR: -cc1{{.*}}-fsanitize-memory-use-after-dtor
228 …ng -target x86_64-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN
229 // CHECK-MSAN: "-fno-assume-sane-operator-new"
237 … -target i686-linux-gnu -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-X86
238 // CHECK-MSAN-X86: error: unsupported option '-fsanitize=memory' for target 'i686--linux-gnu'
240 …86_64-apple-darwin10 -fsanitize=memory %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-MSAN-DARWIN
241 // CHECK-MSAN-DARWIN: unsupported option '-fsanitize=memory' for target 'x86_64-apple-darwin10'
[all …]
/aosp_15_r20/prebuilts/go/linux-x86/src/runtime/
Dmsan0.go5 //go:build !msan
7 // Dummy MSan support API, used when not built with -msan.
19 func msanread(addr unsafe.Pointer, sz uintptr) { throw("msan") }
20 func msanwrite(addr unsafe.Pointer, sz uintptr) { throw("msan") }
21 func msanmalloc(addr unsafe.Pointer, sz uintptr) { throw("msan") }
22 func msanfree(addr unsafe.Pointer, sz uintptr) { throw("msan") }
23 func msanmove(dst, src unsafe.Pointer, sz uintptr) { throw("msan") }
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/cgo/internal/testsanitizers/
Dmsan_test.go27 // The msan tests require support for the -msan option.
29 t.Skipf("skipping on %s/%s; -msan option is not supported.", goos, goarch)
48 {src: "msan.go"},
58 // This may not always fail specifically due to MSAN. It may sometimes
60 // get here, just that we get an error. This is an MSAN test because without
61 // MSAN it would not fail deterministically.
82 t.Fatalf("%#q exited without error; want MSAN failure\n%s", strings.Join(cmd.Args, " "), out)
/aosp_15_r20/external/libyuv/source/
H A Drow_any.cc23 // SIMD that reads full multiple of 16 bytes will not trigger msan errors.
40 memset(vin, 0, sizeof(vin)); /* for msan */ \
73 memset(vin, 0, sizeof(vin)); /* for msan */ \
131 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \
197 memset(vin, 0, sizeof(vin)); /* for msan */ \
247 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \
325 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \
449 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \
506 memset(vin, 0, sizeof(vin)); /* for YUY2 and msan */ \
570 memset(vin, 0, sizeof(vin)); /* for msan */ \
[all …]
/aosp_15_r20/external/bazelbuild-rules_go/go/private/rules/
H A Dtransition.bzl41 "//go/config:msan",
76 msan = _set_ternary(settings, attr, "msan")
83 if msan == "on":
85 fail('msan = "on" cannot be set when msan = "on" is set. msan requires cgo.')
91 msan = "off"
92 settings["//go/config:msan"] = False
174 "//go/config:msan": False,
189 "//go/config:msan",
445 "msan": None,
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/go/testdata/script/
Dinstall_msan_and_race_and_asan_require_cgo.txt9 [!GOOS:darwin] [race] ! stderr '-msan'
11 [msan] ! go install -msan triv.go
12 [msan] stderr '-msan requires cgo'
13 [msan] ! stderr '-race'
17 [asan] ! stderr '-msan'
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/
Dbazel.rc92 build:msan --strip=never
93 build:msan --copt=-fsanitize=memory
94 build:msan --copt=-O0
95 build:msan --copt=-fsanitize-memory-track-origins
96 build:msan --copt=-fsanitize-memory-use-after-dtor
97 build:msan --copt=-fno-omit-frame-pointer
98 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS
99 build:msan --linkopt=-fsanitize=memory
100 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
/aosp_15_r20/external/grpc-grpc/tools/
H A Dbazel.rc101 build:msan --strip=never
102 build:msan --copt=-fsanitize=memory
103 build:msan --copt=-O0
104 build:msan --copt=-fsanitize-memory-track-origins
105 build:msan --copt=-fsanitize-memory-use-after-dtor
106 build:msan --copt=-fno-omit-frame-pointer
107 build:msan --copt=-DGPR_NO_DIRECT_SYSCALLS
108 build:msan --linkopt=-fsanitize=memory
109 build:msan --action_env=MSAN_OPTIONS=poison_in_dtor=1
/aosp_15_r20/external/compiler-rt/test/msan/
H A Dkeep-going.cc8 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && not %run %t >%t.out 2>&1
10 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=0 not %run …
12 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=keep_going=1 not %run …
14 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=1 not %r…
16 // RUN: %clangxx_msan -mllvm -msan-keep-going=1 -O0 %s -o %t && MSAN_OPTIONS=halt_on_error=0 not %r…
19 // Test behaviour of -mllvm -msan-keep-going and MSAN_OPTIONS=keep_going.
20 // -mllvm -msan-keep-going provides the default value of keep_going flag; value
/aosp_15_r20/external/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Instrumentation/
H A DMemorySanitizer.cpp26 /// as well: msan needs to see all program events, including system
28 /// compile *everything* with msan or use a binary translation
48 /// values. This behavior is controlled with a flag (msan-track-origins) and is
111 /// The major differences between KMSAN and MSan instrumentation are:
112 /// - KMSAN always tracks the origins and implies msan-keep-going=true;
204 #define DEBUG_TYPE "msan"
210 // These constants must be kept in sync with the ones in msan.h.
221 static cl::opt<int> ClTrackOrigins("msan-track-origins",
225 static cl::opt<bool> ClKeepGoing("msan-keep-going",
229 static cl::opt<bool> ClPoisonStack("msan-poison-stack",
[all …]
/aosp_15_r20/external/skia/infra/bots/recipe_modules/build/examples/full.expected/
H A DBuild-Debian10-Clang-x86_64-Debug-SwiftShader_MSAN.json68 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START…
69 …libc++ -L[START_DIR]/clang_linux/msan/lib -lc++abi -I[START_DIR]/clang_linux/msan/include -I[START…
121 …ux/bin\", \"-fuse-ld=lld\", \"-L[START_DIR]/clang_linux/msan\"] link_pool_depth=2 sanitize=\"MSAN\…
/aosp_15_r20/external/cronet/testing/libfuzzer/
H A Dreference.md5 ### MSan subsection
7 Memory Sanitizer (MSan) in Chromium only supports Ubuntu Precise/Trusty and not
9 Thus, our [reproduce tool] cannot reproduce bugs found using MSan.
11 run MSan-instrumented code in docker.
37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l…
55 | is_msan=true | enables [Memory Sanitizer] to catch problems like uninitialized reads. \[[*](#MSan
/aosp_15_r20/external/libvpx/third_party/libyuv/source/
H A Drow_any.cc23 // SIMD that reads full multiple of 16 bytes will not trigger msan errors.
39 memset(temp, 0, 64 * 4); /* for msan */ \
74 memset(temp, 0, 64 * 3); /* for YUY2 and msan */ \
131 memset(temp, 0, 128 * 3); /* for YUY2 and msan */ \
216 memset(temp, 0, 16 * 3 * SBPP); /* for YUY2 and msan */ \
248 memset(temp, 0, 64 * 2); /* for msan */ \
346 memset(temp, 0, 128 * 2); /* for msan */ \
420 memset(temp, 0, 128); /* for YUY2 and msan */ \
690 memset(temp, 0, 64 * 2); /* for msan */ \
720 memset(temp, 0, 64); /* for msan */ \
[all …]

12345678910>>...30