Home
last modified time | relevance | path

Searched full:asan (Results 1 – 25 of 670) sorted by relevance

12345678910>>...27

/external/clang/test/Driver/
Ddarwin-sanitizer-ld.c5 // RUN: | FileCheck --check-prefix=CHECK-ASAN %s
7 // CHECK-ASAN: "{{.*}}ld{{(.exe)?}}"
8 // CHECK-ASAN-NOT: "-lstdc++"
9 // CHECK-ASAN-NOT: "-lc++"
10 // CHECK-ASAN: libclang_rt.asan_osx_dynamic.dylib"
11 // CHECK-ASAN: "-rpath" "@executable_path"
12 // CHECK-ASAN: "-rpath" "{{.*}}lib{{.*}}darwin"
16 // RUN: | FileCheck --check-prefix=CHECK-DYN-ASAN %s
18 // CHECK-DYN-ASAN: "{{.*}}ld{{(.exe)?}}"
19 // CHECK-DYN-ASAN: "-dylib"
[all …]
Dsanitizer-ld.c7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
14 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
15 // CHECK-ASAN-LINUX: "-lpthread"
16 // CHECK-ASAN-LINUX: "-lrt"
17 // CHECK-ASAN-LINUX: "-ldl"
[all …]
Dcl-link.c12 …h:IA32 --target=i386-pc-win32 /Tc%s -### -fsanitize=address 2>&1 | FileCheck --check-prefix=ASAN %s
13 // ASAN: link.exe
14 // ASAN: "-debug"
15 // ASAN: "-incremental:no"
16 // ASAN: "{{.*}}clang_rt.asan-i386.lib"
17 // ASAN: "{{.*}}clang_rt.asan_cxx-i386.lib"
18 // ASAN: "{{.*}}cl-link{{.*}}.obj"
20 …--target=i386-pc-win32 /MD /Tc%s -### -fsanitize=address 2>&1 | FileCheck --check-prefix=ASAN-MD %s
21 // ASAN-MD: link.exe
22 // ASAN-MD: "-debug"
[all …]
/external/compiler-rt/lib/asan/
DCMakeLists.txt51 # As a net result, this allows running ASan executables without LD_PRELOAD-ing the
52 # ASan runtime library.
76 # Compile ASan sources into an object library.
107 # Build ASan runtimes shipped with Clang.
108 add_custom_target(asan) target
109 set_target_properties(asan PROPERTIES FOLDER "Compiler-RT Misc")
112 add_compiler_rt_runtime(clang_rt.asan
124 PARENT_TARGET asan)
135 add_compiler_rt_runtime(clang_rt.asan
143 PARENT_TARGET asan)
[all …]
DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
9 asan_*.{cc,h} : Sources of the asan runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
23 make check-asan
/external/swiftshader/third_party/llvm-7.0/llvm/test/Instrumentation/AddressSanitizer/
Dwith-ifunc.ll1 ; Test -asan-with-ifunc flag.
3 ; RUN: opt -asan -asan-module -S -asan-with-ifunc=0 < %s | \
5 ; RUN: opt -asan -asan-module -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 < %s | \
7 ; RUN: opt -asan -asan-module -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=1 < %s | \
11 ; RUN: opt -asan -asan-module -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv…
13 ; RUN: opt -asan -asan-module -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv…
15 ; RUN: opt -asan -asan-module -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv…
Dinstrumentation-with-call-threshold.ll1 ; Test asan internal compiler flags:
2 ; -asan-instrumentation-with-call-threshold
3 ; -asan-memory-access-callback-prefix
5 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=1 -S | FileCheck %s --…
6 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -S | FileCheck %s --…
7 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -asan-memory-access-…
8 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=5 -S | FileCheck %s --…
9 ; RUN: opt < %s -asan -asan-module -S | FileCheck %s --check-prefix=CHECK-INLINE
Dlifetime-uar-uas.ll2 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=0 -S | FileCheck …
3 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=0 -S | FileCheck …
4 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=1 -S | FileCheck …
5 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=1 -S | FileCheck …
Dglobal_metadata_array.ll1 ; RUN: opt < %s -asan -asan-module -asan-globals-live-support=0 -mtriple=x86_64-unknown-linux-gnu -…
2 ; RUN: opt < %s -asan -asan-module -asan-globals-live-support=0 -mtriple=x86_64-apple-macosx10.11.0…
3 ; RUN: opt < %s -asan -asan-module -asan-globals-live-support=0 -mtriple=x86_64-pc-windows-msvc19.0…
4 ; RUN: opt < %s -asan -asan-module -asan-globals-live-support=0 -asan-mapping-scale=5 -mtriple=x86_…
22 ; CHECK: [[FILENAME:@___asan_gen_.[0-9]+]] = private unnamed_addr constant [22 x i8] c"/tmp/asan-gl…
57 !llvm.asan.globals = !{!0, !1, !2, !3, !4}
68 !6 = !{!"/tmp/asan-globals.cpp", i32 5, i32 5}
69 !7 = !{!"/tmp/asan-globals.cpp", i32 7, i32 5}
70 !8 = !{!"/tmp/asan-globals.cpp", i32 12, i32 14}
71 !9 = !{!"/tmp/asan-globals.cpp", i32 14, i32 25}
Dscale-offset.ll1 ; Test that the scale (-asan-mapping-scale) and offset (-asan-mapping-offset) command-line options …
3 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xdeadbeef -S | FileCheck --check-prefix=CH…
4 ; RUN: opt < %s -asan -asan-module -asan-mapping-scale 1 -S | FileCheck --check-prefix=CHECK-SCALE …
5 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xc0ffee -asan-mapping-scale 0 -S | FileChe…
Dno-globals.ll1 ; A module with no asan-instrumented globals has no asan destructor, and has an asan constructor in…
2 ; RUN: opt -mtriple=x86_64-unknown-linux-gnu < %s -asan -asan-module -asan-with-comdat=1 -asan-glob…
9 …)*, i8* }] [{ i32, void ()*, i8* } { i32 1, void ()* @asan.module_ctor, i8* bitcast (void ()* @asa…
11 ; CHECK: define internal void @asan.module_ctor() comdat
Dstack-poisoning-byval-args.ll2 ; RUN: opt < %s -asan -asan-realign-stack=32 -S | FileCheck %s
3 ; RUN: opt < %s -asan -asan-realign-stack=32 -asan-force-dynamic-shadow -S | FileCheck %s
4 ; RUN: opt < %s -asan -asan-realign-stack=32 -asan-mapping-scale=5 -S | FileCheck %s
5 ; RUN: opt < %s -asan -asan-realign-stack=32 -asan-force-dynamic-shadow -asan-mapping-scale=5 -S | …
37 ; passed via the -asan-realign-stack option, which is greater than 4.
Dglobal_metadata.ll1 ; RUN: opt < %s -asan -asan-module -asan-globals-live-support=1 -S | FileCheck %s
2 ; RUN: opt < %s -asan -asan-module -asan-globals-live-support=1 -asan-mapping-scale=5 -S | FileChec…
22 ; CHECK: [[FILENAME:@___asan_gen_.[0-9]+]] = private unnamed_addr constant [22 x i8] c"/tmp/asan-gl…
60 !llvm.asan.globals = !{!0, !1, !2, !3, !4}
71 !6 = !{!"/tmp/asan-globals.cpp", i32 5, i32 5}
72 !7 = !{!"/tmp/asan-globals.cpp", i32 7, i32 5}
73 !8 = !{!"/tmp/asan-globals.cpp", i32 12, i32 14}
74 !9 = !{!"/tmp/asan-globals.cpp", i32 14, i32 25}
Ddebug_info_noninstrumented_alloca.ll5 ; RUN: opt < %s -asan -asan-module -S | FileCheck %s
6 ; RUN: opt < %s -asan -asan-module -asan-instrument-dynamic-allocas -S | FileCheck %s
13 ; Won't be instrumented because of asan-skip-promotable-allocas.
19 ; Won't be instrumented because of asan-skip-promotable-allocas.
25 ; Won't be instrumented because of asan-skip-promotable-allocas.
/external/llvm/test/Instrumentation/AddressSanitizer/
Dinstrumentation-with-call-threshold.ll1 ; Test asan internal compiler flags:
2 ; -asan-instrumentation-with-call-threshold
3 ; -asan-memory-access-callback-prefix
5 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=1 -S | FileCheck %s --…
6 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -S | FileCheck %s --…
7 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -asan-memory-access-…
8 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=5 -S | FileCheck %s --…
9 ; RUN: opt < %s -asan -asan-module -S | FileCheck %s --check-prefix=CHECK-INLINE
Dlifetime-uar-uas.ll2 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=0 -S | FileCheck …
3 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=0 -S | FileCheck …
4 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=1 -S | FileCheck …
5 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=1 -S | FileCheck …
Dscale-offset.ll1 ; Test that the scale (-asan-mapping-scale) and offset (-asan-mapping-offset) command-line options …
3 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xdeadbeef -S | FileCheck --check-prefix=CH…
4 ; RUN: opt < %s -asan -asan-module -asan-mapping-scale 1 -S | FileCheck --check-prefix=CHECK-SCALE …
5 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xc0ffee -asan-mapping-scale 0 -S | FileChe…
Ddebug_info_noninstrumented_alloca.ll5 ; RUN: opt < %s -asan -asan-module -S | FileCheck %s
6 ; RUN: opt < %s -asan -asan-module -asan-instrument-allocas=1 -S | FileCheck %s
13 ; Won't be instrumented because of asan-skip-promotable-allocas.
19 ; Won't be instrumented because of asan-skip-promotable-allocas.
25 ; Won't be instrumented because of asan-skip-promotable-allocas.
Dinstrument_load_then_store.ll2 ; RUN: opt < %s -asan -asan-module -S -asan-opt=1 | FileCheck %s -check-prefix=OPT1
3 ; RUN: opt < %s -asan -asan-module -S -asan-opt=0 | FileCheck %s -check-prefix=OPT0
19 ; OPT1: asan.module_ctor
25 ; OPT0: asan.module_ctor
/external/clang/test/CodeGen/
Daddress-sanitizer-and-array-cookie.cpp2 …c1 -triple x86_64-gnu-linux -emit-llvm -o - -fsanitize=address %s | FileCheck %s -check-prefix=ASAN
23 // ASAN-LABEL: CallNew
24 // ASAN: store{{.*}}nosanitize
25 // ASAN-NOT: nosanitize
26 // ASAN: call void @__asan_poison_cxx_array_cookie
34 // ASAN-LABEL: CallNewNoThrow
35 // ASAN: store{{.*}}nosanitize
36 // ASAN-NOT: nosanitize
37 // ASAN: call void @__asan_poison_cxx_array_cookie
45 // ASAN-LABEL: CallDelete
[all …]
Daddress-safety-attr.cpp7 …emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address | FileCheck -check-prefix=ASAN %s
26 // ASAN: DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
36 // ASAN: @__cxx_global_var_init{{.*}}[[WITH:#[0-9]+]]
37 // ASAN: @__cxx_global_array_dtor{{.*}}[[WITH]]
43 // ASAN: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
50 // ASAN: NoAddressSafety2{{.*}}) [[NOATTR]]
58 // ASAN: NoAddressSafety3{{.*}}) [[NOATTR]]
65 // ASAN: NoAddressSafety4{{.*}}) [[NOATTR]]
73 // ASAN: NoAddressSafety5{{.*}}) [[NOATTR]]
80 // ASAN: NoAddressSafety6{{.*}}) [[NOATTR]]
[all …]
/external/google-fruit/extras/scripts/
Dtravis_yml_generator.py30 def determine_tests(asan, ubsan, smoke_tests, use_precompiled_headers_in_tests, exclude_tests, argument
35 if asan:
41 if ubsan and not asan:
42 raise Exception('Enabling UBSan but not ASan is not currently supported.')
70 def add_ubuntu_tests(ubuntu_version, compiler, os='linux', stl=None, asan=True, ubsan=True, argument
82 tests = determine_tests(asan, ubsan, smoke_tests,
97 def add_osx_tests(compiler, xcode_version=None, stl=None, asan=True, ubsan=True, argument
109 tests = determine_tests(asan, ubsan, smoke_tests,
140 # TODO: re-enable ASan/UBSan once they work in Travis CI. ATM (as of 18 November 2017) they fail du…
141 add_ubuntu_tests(ubuntu_version='18.10', compiler='gcc-8', asan=False, ubsan=False, smoke_tests=['D…
[all …]
/external/compiler-rt/lib/asan/tests/
DCMakeLists.txt28 -I${COMPILER_RT_SOURCE_DIR}/lib/asan
42 # -gline-tables-only must be enough for ASan, so use it if possible.
76 list(APPEND ASAN_UNITTEST_INSTRUMENTED_CFLAGS -mllvm -asan-instrument-assembly)
134 list(APPEND COMPILE_DEPS gtest asan)
142 # Link ASan unit test for a given architecture from a set
149 list(APPEND TEST_DEPS asan)
181 # ASan benchmarks (not actively used now).
209 # Adds ASan unit tests and benchmarks for architecture.
223 # Create the 'default' folder where ASAN tests are produced.
232 add_asan_test(AsanUnitTests "Asan-${arch}${kind}-Test"
[all …]
/external/autotest/client/site_tests/logging_AsanCrash/
Dlogging_AsanCrash.py21 if not 'asan' in utils.read_file('/etc/ui_use_flags.txt'):
22 raise error.TestFail('Current image not built with ASAN')
31 'So ASAN log is expected at %s.', pid, asan_log_name)
33 logging.info('Initiate simulating memory bug to be caught by ASAN.')
47 'Found no asan log file %s during 10s'
53 # immediately after the return on the call) and caught by ASAN.
59 'Found no asan log message about '
68 'ASAN caught bug but did not mention '
72 logging.debug('ASAN log content: ' + ui_log.get_logs())
75 # The cbuildbot logic will look for asan logs and process them.
/external/compiler-rt/test/asan/TestCases/Linux/
Dactivation-options.cc2 // Main executable is uninstrumented, but linked to ASan runtime. The shared
9 // RUN: rm -f %t.asan.options.activation-options.cc.tmp
10 // RUN: rm -f %t.asan.options.ABCDE
11 // RUN: echo "help=1" >%t.asan.options.activation-options.cc.tmp
14 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t 2>&1 | \
18 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options not %run %t 2>&1 | \
22 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b not %run %t --fix-name 2>&1 | \
25 // RUN: echo "help=1" >%t.asan.options.ABCDE
28 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t --fix-name 2>&1 | \
65 // Empty: all we need is an ASan shared library constructor.

12345678910>>...27