Home
last modified time | relevance | path

Searched refs:Sanitizer (Results 1 – 25 of 34) sorted by relevance

12

/external/perfetto/gn/standalone/sanitizers/
Dvars.gni16 # Address Sanitizer: memory bugs (e.g., UAF).
19 # Leak Sanitizer: memory leaks.
22 # Memory Sanitizer: uninitialized reads.
25 # Thread Sanitizer: threading bugs.
28 # Undefined Behaviour Sanitizer.
/external/perfetto/docs/
Dbuild-instructions.md129 Enables [Address Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizer)
132 Enables [Leak Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer)
136 Enables [Memory Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer)
140 Enables [Thread Sanitizer](https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual)
144 Enables [Undefined Behavior Sanitizer](https://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html)
/external/autotest/client/site_tests/logging_AsanCrash/
Dcontrol7 PURPOSE = "Verify Address Sanitizer does catch memory errors."
18 This is a positive test for Address Sanitizer.
/external/swiftshader/third_party/llvm-7.0/llvm/docs/
DScudoHardenedAllocator.rst12 The Scudo Hardened Allocator is a user-mode allocator based on LLVM Sanitizer's
83 This feature is using the Sanitizer's Quarantine as its base, and the amount of
128 the target platform is supported. Currently, the only other Sanitizer Scudo is
200 Allocator related common Sanitizer options can also be passed through Scudo
/external/mesa3d/src/mesa/drivers/x11/
DSConscript38 # Disallow undefined symbols, except with Address Sanitizer, since libasan
/external/llvm/lib/Fuzzer/
DFuzzerExtFunctions.def28 // Sanitizer functions
/external/compiler-rt/lib/sanitizer_common/tests/
DCMakeLists.txt162 set(SANITIZER_TEST_NAME "Sanitizer-${arch}-Test")
178 add_compiler_rt_test(SanitizerUnitTests "Sanitizer-${arch}-Test-Nolibc"
/external/llvm/docs/
DScudoHardenedAllocator.rst11 The Scudo Hardened Allocator is a user-mode allocator based on LLVM Sanitizer's
64 This feature is using the Sanitizer's Quarantine as its base, and the amount of
/external/mesa3d/src/gallium/targets/libgl-xlib/
DSConscript56 # Disallow undefined symbols, except with Address Sanitizer, since libasan
/external/flatbuffers/
DCMakeLists.txt22 # NOTE: Sanitizer check only works on Linux & OSX (gcc & llvm).
245 message(STATUS "Sanitizer ${_sanitizer_flags} added to ${_target}")
332 message(STATUS "Sanitizer MSVC::_CrtDumpMemoryLeaks added to flattests")
/external/clang/docs/
DSanitizerSpecialCaseList.rst2 Sanitizer special case list
DDataFlowSanitizer.rst18 Unlike other Sanitizer tools, this tool is not designed to detect a
DSanitizerCoverage.rst11 Sanitizer tools have a very simple code coverage tool built in. It allows to
319 These callbacks are not implemented in the Sanitizer run-time and should be defined
DDataFlowSanitizerDesign.rst5 dynamic data flow analysis. Unlike other Sanitizer tools, this tool is
/external/compiler-rt/lib/sanitizer_common/
DCMakeLists.txt1 # Build system for the common Sanitizer runtime support library components.
Dsanitizer_common_interceptors_format.inc10 // Scanf/printf implementation for use in *Sanitizer interceptors.
/external/libyuv/files/docs/
Ddeprecated_builds.md391 ### Running Thread Sanitizer (TSan)
399 ### Running Address Sanitizer (ASan)
/external/compiler-rt/test/
Dlit.common.cfg192 # Sanitizer tests tend to be flaky on Windows due to PR24554, so add some
/external/compiler-rt/
DCMakeLists.txt162 # Provide some common commmandline flags for Sanitizer runtimes.
/external/libaom/libaom/
DREADME.md12 - [Sanitizer support](#sanitizers)
199 Sanitizer integration is built-in to the CMake build system. To enable a
/external/swiftshader/third_party/llvm-subzero/lib/Support/Unix/
DProgram.inc167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
/external/llvm/lib/Support/Unix/
DProgram.inc167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
/external/swiftshader/third_party/subzero/src/
DIceClFlags.def297 cl::desc("Instrument compiled code with Address Sanitizer"), \
/external/clang/lib/Frontend/
DCompilerInvocation.cpp371 for (const auto &Sanitizer : Sanitizers) { in parseSanitizerKinds() local
372 SanitizerMask K = parseSanitizerValue(Sanitizer, /*AllowGroups=*/false); in parseSanitizerKinds()
374 Diags.Report(diag::err_drv_invalid_value) << FlagName << Sanitizer; in parseSanitizerKinds()
/external/python/cpython3/Misc/NEWS.d/
D3.7.2rc1.rst115 they work properly under clang's Memory Sanitizer. A new configure flag

12