Home
last modified time | relevance | path

Searched refs:AddressSanitizer (Results 1 – 25 of 80) sorted by relevance

1234

/external/compiler-rt/lib/asan/tests/
Dasan_test.cc43 TEST(AddressSanitizer, HasFeatureAddressSanitizerTest) { in TEST() argument
54 TEST(AddressSanitizer, SimpleDeathTest) { in TEST() argument
58 TEST(AddressSanitizer, VariousMallocsTest) { in TEST() argument
91 TEST(AddressSanitizer, CallocTest) { in TEST() argument
97 TEST(AddressSanitizer, CallocReturnsZeroMem) { in TEST() argument
121 TEST(AddressSanitizer, VallocTest) { in TEST() argument
129 TEST(AddressSanitizer, PvallocTest) { in TEST() argument
165 TEST(AddressSanitizer, DISABLED_TSDTest) { in TEST() argument
175 TEST(AddressSanitizer, UAF_char) { in TEST() argument
184 TEST(AddressSanitizer, UAF_long_double) { in TEST() argument
[all …]
Dasan_oob_test.cc69 TEST(AddressSanitizer, OOB_char) { in TEST() argument
73 TEST(AddressSanitizer, OOB_int) { in TEST() argument
77 TEST(AddressSanitizer, OOBRightTest) { in TEST() argument
104 TEST(AddressSanitizer, LargeOOBRightTest) { in TEST() argument
114 TEST(AddressSanitizer, DISABLED_DemoOOBLeftLow) { in TEST() argument
118 TEST(AddressSanitizer, DISABLED_DemoOOBLeftHigh) { in TEST() argument
122 TEST(AddressSanitizer, DISABLED_DemoOOBRightLow) { in TEST() argument
126 TEST(AddressSanitizer, DISABLED_DemoOOBRightHigh) { in TEST() argument
Dasan_str_test.cc80 TEST(AddressSanitizer, StrLenOOBTest) { in TEST() argument
98 TEST(AddressSanitizer, WcsLenTest) { in TEST() argument
111 TEST(AddressSanitizer, StrNLenOOBTest) { in TEST() argument
130 TEST(AddressSanitizer, StrDupOOBTest) { in TEST() argument
149 TEST(AddressSanitizer, StrCpyOOBTest) { in TEST() argument
172 TEST(AddressSanitizer, StrNCpyOOBTest) { in TEST() argument
245 TEST(AddressSanitizer, StrChrAndIndexOOBTest) { in TEST() argument
253 TEST(AddressSanitizer, StrCmpAndFriendsLogicTest) { in TEST() argument
329 TEST(AddressSanitizer, StrCmpOOBTest) { in TEST() argument
334 TEST(AddressSanitizer, StrCaseCmpOOBTest) { in TEST() argument
[all …]
Dasan_noinst_test.cc42 TEST(AddressSanitizer, InternalSimpleDeathTest) { in TEST() argument
94 TEST(AddressSanitizer, NoInstMallocTest) { in TEST() argument
98 TEST(AddressSanitizer, ThreadedMallocStressTest) { in TEST() argument
126 TEST(AddressSanitizer, DISABLED_InternalPrintShadow) { in TEST() argument
135 TEST(AddressSanitizer, QuarantineTest) { in TEST() argument
170 TEST(AddressSanitizer, ThreadedQuarantineTest) { in TEST() argument
200 TEST(AddressSanitizer, ThreadedOneSizeMallocStressTest) { in TEST() argument
211 TEST(AddressSanitizer, ShadowRegionIsPoisonedTest) { in TEST() argument
223 TEST(AddressSanitizer, LoadStoreCallbacks) { in TEST() argument
Dasan_benchmarks_test.cc44 TEST(AddressSanitizer, ManyAccessBenchmark) { in TEST() argument
66 TEST(AddressSanitizer, BorderAccessBenchmark) { in TEST() argument
77 TEST(AddressSanitizer, FakeStackBenchmark) { in TEST() argument
Dasan_mem_test.cc68 TEST(AddressSanitizer, MemSetOOBTest) { in TEST() argument
105 TEST(AddressSanitizer, LargeOOBInMemset) { in TEST() argument
191 TEST(AddressSanitizer, MemCpyOOBTest) { in TEST() argument
203 TEST(AddressSanitizer, MemMoveOOBTest) { in TEST() argument
209 TEST(AddressSanitizer, MemCmpOOBTest) { in TEST() argument
Dasan_asm_test.cc210 TEST(AddressSanitizer, asm_load_store) { in TEST() argument
217 TEST(AddressSanitizer, asm_rw) { in TEST() argument
235 TEST(AddressSanitizer, asm_flags) { in TEST() argument
260 TEST(AddressSanitizer, asm_rep_movs) { in TEST() argument
Dasan_mac_test_helpers.mm47 // If AddressSanitizer doesn't instrument the +load method below correctly,
51 "If your test didn't crash, AddressSanitizer is instrumenting "
96 // pthread_create(). We need to verify that AddressSanitizer notices that the
106 // pthread_create(). We need to verify that AddressSanitizer notices that the
113 // to make sure AddressSanitizer handles the reusing correctly.
/external/clang/docs/
DAddressSanitizer.rst2 AddressSanitizer title
11 AddressSanitizer is a fast memory error detector. It consists of a compiler
21 Typical slowdown introduced by AddressSanitizer is **2x**.
32 AddressSanitizer run-time library should be linked to the final executable, so
34 shared libraries, the AddressSanitizer run-time is not linked, so
35 ``-Wl,-z,defs`` may cause link errors (don't use it with AddressSanitizer). To
63 exit with a non-zero exit code. AddressSanitizer exits on the first detected error.
66 * This approach allows AddressSanitizer to produce faster and smaller generated code
68 * Fixing bugs becomes unavoidable. AddressSanitizer does not produce
84 To make AddressSanitizer symbolize its output
[all …]
DLeakSanitizer.rst12 :doc:`AddressSanitizer` to get both memory error and leak detection, or
21 simply build your program with :doc:`AddressSanitizer`:
39 SUMMARY: AddressSanitizer: 7 byte(s) leaked in 1 allocation(s).
DSanitizerSpecialCaseList.rst18 User of sanitizer tools, such as :doc:`AddressSanitizer`, :doc:`ThreadSanitizer`
47 # AddressSanitizer prints an error report.
/external/swiftshader/third_party/subzero/docs/
DASAN.rst1 Using AddressSanitizer in Subzero
4 AddressSanitizer is a powerful compile-time tool used to detect and report
8 AddressSanitizer is only supported on native builds of .pexe files and cannot be
11 In Subzero, AddressSanitizer depends on being able to find and instrument calls
16 etc., so AddressSanitizer will not work correctly in the final executable.
32 AddressSanitizer runtime to work correctly. A .pexe file can be compiled with
33 AddressSanitizer and properly linked into a final executable using
41 Since AddressSanitizer is implemented only in Subzero, the target .pexe may
50 Most of the SPEC2000 benchmarks can be built with Subzero and AddressSanitizer,
52 calloc, 300.twolf and 252.eon will not build. AddressSanitizer correctly finds
[all …]
/external/llvm/lib/Transforms/Instrumentation/
DAddressSanitizer.cpp448 struct AddressSanitizer : public FunctionPass { struct
449 explicit AddressSanitizer(bool CompileKernel = false, bool Recover = false, in AddressSanitizer() function
518 AddressSanitizer *Pass;
519 FunctionStateRAII(AddressSanitizer *Pass) : Pass(Pass) { in FunctionStateRAII()
601 AddressSanitizer &ASan;
640 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner()
802 char AddressSanitizer::ID = 0;
804 AddressSanitizer, "asan",
810 AddressSanitizer, "asan", in INITIALIZE_PASS_DEPENDENCY()
817 return new AddressSanitizer(CompileKernel, Recover, UseAfterScope); in INITIALIZE_PASS_DEPENDENCY()
[all …]
DCMakeLists.txt2 AddressSanitizer.cpp
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Transforms/Instrumentation/
DAddressSanitizer.cpp600 struct AddressSanitizer : public FunctionPass { struct
604 explicit AddressSanitizer(bool CompileKernel = false, bool Recover = false, in AddressSanitizer() argument
685 AddressSanitizer *Pass;
687 FunctionStateRAII(AddressSanitizer *Pass) : Pass(Pass) { in FunctionStateRAII()
822 AddressSanitizer &ASan;
863 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner()
1062 char AddressSanitizer::ID = 0;
1065 AddressSanitizer, "asan",
1071 AddressSanitizer, "asan", in INITIALIZE_PASS_DEPENDENCY()
1079 return new AddressSanitizer(CompileKernel, Recover, UseAfterScope); in INITIALIZE_PASS_DEPENDENCY()
[all …]
DCMakeLists.txt2 AddressSanitizer.cpp
/external/compiler-rt/lib/asan/
DREADME.txt1 AddressSanitizer RT
3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
Dasan_blacklist.txt1 # Blacklist for AddressSanitizer. Turns off instrumentation of particular
/external/compiler-rt/test/ubsan/
DCMakeLists.txt36 # Disable ubsan with AddressSanitizer tests for Windows 64-bit.
38 add_ubsan_testsuite("AddressSanitizer" asan ${arch})
/external/compiler-rt/test/lsan/
Dlit.common.cfg24 elif lsan_lit_test_mode == "AddressSanitizer":
25 config.name = "LeakSanitizer-AddressSanitizer"
/external/compiler-rt/
DCODE_OWNERS.TXT21 D: AddressSanitizer for Windows
37 D: AddressSanitizer, sanitizer_common, porting sanitizers to another platforms, LeakSanitizer
/external/llvm/lib/Fuzzer/test/
Dfuzzer.test14 NullDerefTest: ERROR: AddressSanitizer: SEGV on unknown address
39 OOB: AddressSanitizer: heap-buffer-overflow
/external/compiler-rt/test/asan/TestCases/Darwin/
Dobjc-odr.mm22 // CHECK-NOT: AddressSanitizer: odr-violation
/external/compiler-rt/test/asan/
DCMakeLists.txt108 add_lit_testsuite(check-asan "Running the AddressSanitizer tests"
122 "Running the AddressSanitizer tests with dynamic runtime"
/external/clang/include/clang/Basic/
DSanitizers.def41 // AddressSanitizer
44 // Kernel AddressSanitizer (KASan)

1234