/external/compiler-rt/lib/asan/tests/ |
D | asan_test.cc | 43 TEST(AddressSanitizer, HasFeatureAddressSanitizerTest) { in TEST() argument 54 TEST(AddressSanitizer, SimpleDeathTest) { in TEST() argument 58 TEST(AddressSanitizer, VariousMallocsTest) { in TEST() argument 91 TEST(AddressSanitizer, CallocTest) { in TEST() argument 97 TEST(AddressSanitizer, CallocReturnsZeroMem) { in TEST() argument 121 TEST(AddressSanitizer, VallocTest) { in TEST() argument 129 TEST(AddressSanitizer, PvallocTest) { in TEST() argument 165 TEST(AddressSanitizer, DISABLED_TSDTest) { in TEST() argument 175 TEST(AddressSanitizer, UAF_char) { in TEST() argument 184 TEST(AddressSanitizer, UAF_long_double) { in TEST() argument [all …]
|
D | asan_oob_test.cc | 69 TEST(AddressSanitizer, OOB_char) { in TEST() argument 73 TEST(AddressSanitizer, OOB_int) { in TEST() argument 77 TEST(AddressSanitizer, OOBRightTest) { in TEST() argument 104 TEST(AddressSanitizer, LargeOOBRightTest) { in TEST() argument 114 TEST(AddressSanitizer, DISABLED_DemoOOBLeftLow) { in TEST() argument 118 TEST(AddressSanitizer, DISABLED_DemoOOBLeftHigh) { in TEST() argument 122 TEST(AddressSanitizer, DISABLED_DemoOOBRightLow) { in TEST() argument 126 TEST(AddressSanitizer, DISABLED_DemoOOBRightHigh) { in TEST() argument
|
D | asan_str_test.cc | 80 TEST(AddressSanitizer, StrLenOOBTest) { in TEST() argument 98 TEST(AddressSanitizer, WcsLenTest) { in TEST() argument 111 TEST(AddressSanitizer, StrNLenOOBTest) { in TEST() argument 130 TEST(AddressSanitizer, StrDupOOBTest) { in TEST() argument 149 TEST(AddressSanitizer, StrCpyOOBTest) { in TEST() argument 172 TEST(AddressSanitizer, StrNCpyOOBTest) { in TEST() argument 245 TEST(AddressSanitizer, StrChrAndIndexOOBTest) { in TEST() argument 253 TEST(AddressSanitizer, StrCmpAndFriendsLogicTest) { in TEST() argument 329 TEST(AddressSanitizer, StrCmpOOBTest) { in TEST() argument 334 TEST(AddressSanitizer, StrCaseCmpOOBTest) { in TEST() argument [all …]
|
D | asan_noinst_test.cc | 42 TEST(AddressSanitizer, InternalSimpleDeathTest) { in TEST() argument 94 TEST(AddressSanitizer, NoInstMallocTest) { in TEST() argument 98 TEST(AddressSanitizer, ThreadedMallocStressTest) { in TEST() argument 126 TEST(AddressSanitizer, DISABLED_InternalPrintShadow) { in TEST() argument 135 TEST(AddressSanitizer, QuarantineTest) { in TEST() argument 170 TEST(AddressSanitizer, ThreadedQuarantineTest) { in TEST() argument 200 TEST(AddressSanitizer, ThreadedOneSizeMallocStressTest) { in TEST() argument 211 TEST(AddressSanitizer, ShadowRegionIsPoisonedTest) { in TEST() argument 223 TEST(AddressSanitizer, LoadStoreCallbacks) { in TEST() argument
|
D | asan_benchmarks_test.cc | 44 TEST(AddressSanitizer, ManyAccessBenchmark) { in TEST() argument 66 TEST(AddressSanitizer, BorderAccessBenchmark) { in TEST() argument 77 TEST(AddressSanitizer, FakeStackBenchmark) { in TEST() argument
|
D | asan_mem_test.cc | 68 TEST(AddressSanitizer, MemSetOOBTest) { in TEST() argument 105 TEST(AddressSanitizer, LargeOOBInMemset) { in TEST() argument 191 TEST(AddressSanitizer, MemCpyOOBTest) { in TEST() argument 203 TEST(AddressSanitizer, MemMoveOOBTest) { in TEST() argument 209 TEST(AddressSanitizer, MemCmpOOBTest) { in TEST() argument
|
D | asan_asm_test.cc | 210 TEST(AddressSanitizer, asm_load_store) { in TEST() argument 217 TEST(AddressSanitizer, asm_rw) { in TEST() argument 235 TEST(AddressSanitizer, asm_flags) { in TEST() argument 260 TEST(AddressSanitizer, asm_rep_movs) { in TEST() argument
|
D | asan_mac_test_helpers.mm | 47 // If AddressSanitizer doesn't instrument the +load method below correctly, 51 "If your test didn't crash, AddressSanitizer is instrumenting " 96 // pthread_create(). We need to verify that AddressSanitizer notices that the 106 // pthread_create(). We need to verify that AddressSanitizer notices that the 113 // to make sure AddressSanitizer handles the reusing correctly.
|
/external/clang/docs/ |
D | AddressSanitizer.rst | 2 AddressSanitizer title 11 AddressSanitizer is a fast memory error detector. It consists of a compiler 21 Typical slowdown introduced by AddressSanitizer is **2x**. 32 AddressSanitizer run-time library should be linked to the final executable, so 34 shared libraries, the AddressSanitizer run-time is not linked, so 35 ``-Wl,-z,defs`` may cause link errors (don't use it with AddressSanitizer). To 63 exit with a non-zero exit code. AddressSanitizer exits on the first detected error. 66 * This approach allows AddressSanitizer to produce faster and smaller generated code 68 * Fixing bugs becomes unavoidable. AddressSanitizer does not produce 84 To make AddressSanitizer symbolize its output [all …]
|
D | LeakSanitizer.rst | 12 :doc:`AddressSanitizer` to get both memory error and leak detection, or 21 simply build your program with :doc:`AddressSanitizer`: 39 SUMMARY: AddressSanitizer: 7 byte(s) leaked in 1 allocation(s).
|
D | SanitizerSpecialCaseList.rst | 18 User of sanitizer tools, such as :doc:`AddressSanitizer`, :doc:`ThreadSanitizer` 47 # AddressSanitizer prints an error report.
|
/external/swiftshader/third_party/subzero/docs/ |
D | ASAN.rst | 1 Using AddressSanitizer in Subzero 4 AddressSanitizer is a powerful compile-time tool used to detect and report 8 AddressSanitizer is only supported on native builds of .pexe files and cannot be 11 In Subzero, AddressSanitizer depends on being able to find and instrument calls 16 etc., so AddressSanitizer will not work correctly in the final executable. 32 AddressSanitizer runtime to work correctly. A .pexe file can be compiled with 33 AddressSanitizer and properly linked into a final executable using 41 Since AddressSanitizer is implemented only in Subzero, the target .pexe may 50 Most of the SPEC2000 benchmarks can be built with Subzero and AddressSanitizer, 52 calloc, 300.twolf and 252.eon will not build. AddressSanitizer correctly finds [all …]
|
/external/llvm/lib/Transforms/Instrumentation/ |
D | AddressSanitizer.cpp | 448 struct AddressSanitizer : public FunctionPass { struct 449 explicit AddressSanitizer(bool CompileKernel = false, bool Recover = false, in AddressSanitizer() function 518 AddressSanitizer *Pass; 519 FunctionStateRAII(AddressSanitizer *Pass) : Pass(Pass) { in FunctionStateRAII() 601 AddressSanitizer &ASan; 640 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner() 802 char AddressSanitizer::ID = 0; 804 AddressSanitizer, "asan", 810 AddressSanitizer, "asan", in INITIALIZE_PASS_DEPENDENCY() 817 return new AddressSanitizer(CompileKernel, Recover, UseAfterScope); in INITIALIZE_PASS_DEPENDENCY() [all …]
|
D | CMakeLists.txt | 2 AddressSanitizer.cpp
|
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Transforms/Instrumentation/ |
D | AddressSanitizer.cpp | 600 struct AddressSanitizer : public FunctionPass { struct 604 explicit AddressSanitizer(bool CompileKernel = false, bool Recover = false, in AddressSanitizer() argument 685 AddressSanitizer *Pass; 687 FunctionStateRAII(AddressSanitizer *Pass) : Pass(Pass) { in FunctionStateRAII() 822 AddressSanitizer &ASan; 863 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner() 1062 char AddressSanitizer::ID = 0; 1065 AddressSanitizer, "asan", 1071 AddressSanitizer, "asan", in INITIALIZE_PASS_DEPENDENCY() 1079 return new AddressSanitizer(CompileKernel, Recover, UseAfterScope); in INITIALIZE_PASS_DEPENDENCY() [all …]
|
D | CMakeLists.txt | 2 AddressSanitizer.cpp
|
/external/compiler-rt/lib/asan/ |
D | README.txt | 1 AddressSanitizer RT 3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
|
D | asan_blacklist.txt | 1 # Blacklist for AddressSanitizer. Turns off instrumentation of particular
|
/external/compiler-rt/test/ubsan/ |
D | CMakeLists.txt | 36 # Disable ubsan with AddressSanitizer tests for Windows 64-bit. 38 add_ubsan_testsuite("AddressSanitizer" asan ${arch})
|
/external/compiler-rt/test/lsan/ |
D | lit.common.cfg | 24 elif lsan_lit_test_mode == "AddressSanitizer": 25 config.name = "LeakSanitizer-AddressSanitizer"
|
/external/compiler-rt/ |
D | CODE_OWNERS.TXT | 21 D: AddressSanitizer for Windows 37 D: AddressSanitizer, sanitizer_common, porting sanitizers to another platforms, LeakSanitizer
|
/external/llvm/lib/Fuzzer/test/ |
D | fuzzer.test | 14 NullDerefTest: ERROR: AddressSanitizer: SEGV on unknown address 39 OOB: AddressSanitizer: heap-buffer-overflow
|
/external/compiler-rt/test/asan/TestCases/Darwin/ |
D | objc-odr.mm | 22 // CHECK-NOT: AddressSanitizer: odr-violation
|
/external/compiler-rt/test/asan/ |
D | CMakeLists.txt | 108 add_lit_testsuite(check-asan "Running the AddressSanitizer tests" 122 "Running the AddressSanitizer tests with dynamic runtime"
|
/external/clang/include/clang/Basic/ |
D | Sanitizers.def | 41 // AddressSanitizer 44 // Kernel AddressSanitizer (KASan)
|