Searched refs:Sanitizer (Results 1 – 25 of 34) sorted by relevance
12
/external/perfetto/gn/standalone/sanitizers/ |
D | vars.gni | 16 # Address Sanitizer: memory bugs (e.g., UAF). 19 # Leak Sanitizer: memory leaks. 22 # Memory Sanitizer: uninitialized reads. 25 # Thread Sanitizer: threading bugs. 28 # Undefined Behaviour Sanitizer.
|
/external/perfetto/docs/ |
D | build-instructions.md | 129 Enables [Address Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizer) 132 Enables [Leak Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer) 136 Enables [Memory Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer) 140 Enables [Thread Sanitizer](https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual) 144 Enables [Undefined Behavior Sanitizer](https://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html)
|
/external/autotest/client/site_tests/logging_AsanCrash/ |
D | control | 7 PURPOSE = "Verify Address Sanitizer does catch memory errors." 18 This is a positive test for Address Sanitizer.
|
/external/swiftshader/third_party/llvm-7.0/llvm/docs/ |
D | ScudoHardenedAllocator.rst | 12 The Scudo Hardened Allocator is a user-mode allocator based on LLVM Sanitizer's 83 This feature is using the Sanitizer's Quarantine as its base, and the amount of 128 the target platform is supported. Currently, the only other Sanitizer Scudo is 200 Allocator related common Sanitizer options can also be passed through Scudo
|
/external/mesa3d/src/mesa/drivers/x11/ |
D | SConscript | 38 # Disallow undefined symbols, except with Address Sanitizer, since libasan
|
/external/llvm/lib/Fuzzer/ |
D | FuzzerExtFunctions.def | 28 // Sanitizer functions
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
D | CMakeLists.txt | 162 set(SANITIZER_TEST_NAME "Sanitizer-${arch}-Test") 178 add_compiler_rt_test(SanitizerUnitTests "Sanitizer-${arch}-Test-Nolibc"
|
/external/llvm/docs/ |
D | ScudoHardenedAllocator.rst | 11 The Scudo Hardened Allocator is a user-mode allocator based on LLVM Sanitizer's 64 This feature is using the Sanitizer's Quarantine as its base, and the amount of
|
/external/mesa3d/src/gallium/targets/libgl-xlib/ |
D | SConscript | 56 # Disallow undefined symbols, except with Address Sanitizer, since libasan
|
/external/flatbuffers/ |
D | CMakeLists.txt | 22 # NOTE: Sanitizer check only works on Linux & OSX (gcc & llvm). 245 message(STATUS "Sanitizer ${_sanitizer_flags} added to ${_target}") 332 message(STATUS "Sanitizer MSVC::_CrtDumpMemoryLeaks added to flattests")
|
/external/clang/docs/ |
D | SanitizerSpecialCaseList.rst | 2 Sanitizer special case list
|
D | DataFlowSanitizer.rst | 18 Unlike other Sanitizer tools, this tool is not designed to detect a
|
D | SanitizerCoverage.rst | 11 Sanitizer tools have a very simple code coverage tool built in. It allows to 319 These callbacks are not implemented in the Sanitizer run-time and should be defined
|
D | DataFlowSanitizerDesign.rst | 5 dynamic data flow analysis. Unlike other Sanitizer tools, this tool is
|
/external/compiler-rt/lib/sanitizer_common/ |
D | CMakeLists.txt | 1 # Build system for the common Sanitizer runtime support library components.
|
D | sanitizer_common_interceptors_format.inc | 10 // Scanf/printf implementation for use in *Sanitizer interceptors.
|
/external/libyuv/files/docs/ |
D | deprecated_builds.md | 391 ### Running Thread Sanitizer (TSan) 399 ### Running Address Sanitizer (ASan)
|
/external/compiler-rt/test/ |
D | lit.common.cfg | 192 # Sanitizer tests tend to be flaky on Windows due to PR24554, so add some
|
/external/compiler-rt/ |
D | CMakeLists.txt | 162 # Provide some common commmandline flags for Sanitizer runtimes.
|
/external/libaom/libaom/ |
D | README.md | 12 - [Sanitizer support](#sanitizers) 199 Sanitizer integration is built-in to the CMake build system. To enable a
|
/external/swiftshader/third_party/llvm-subzero/lib/Support/Unix/ |
D | Program.inc | 167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
|
/external/llvm/lib/Support/Unix/ |
D | Program.inc | 167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
|
/external/swiftshader/third_party/subzero/src/ |
D | IceClFlags.def | 297 cl::desc("Instrument compiled code with Address Sanitizer"), \
|
/external/clang/lib/Frontend/ |
D | CompilerInvocation.cpp | 371 for (const auto &Sanitizer : Sanitizers) { in parseSanitizerKinds() local 372 SanitizerMask K = parseSanitizerValue(Sanitizer, /*AllowGroups=*/false); in parseSanitizerKinds() 374 Diags.Report(diag::err_drv_invalid_value) << FlagName << Sanitizer; in parseSanitizerKinds()
|
/external/python/cpython3/Misc/NEWS.d/ |
D | 3.7.2rc1.rst | 115 they work properly under clang's Memory Sanitizer. A new configure flag
|
12