/external/llvm-project/compiler-rt/lib/asan/tests/ |
D | asan_test.cpp | 60 TEST(AddressSanitizer, HasFeatureAddressSanitizerTest) { in TEST() argument 71 TEST(AddressSanitizer, SimpleDeathTest) { in TEST() argument 75 TEST(AddressSanitizer, VariousMallocsTest) { in TEST() argument 110 TEST(AddressSanitizer, CallocTest) { in TEST() argument 116 TEST(AddressSanitizer, CallocReturnsZeroMem) { in TEST() argument 140 TEST(AddressSanitizer, VallocTest) { in TEST() argument 148 TEST(AddressSanitizer, PvallocTest) { in TEST() argument 184 TEST(AddressSanitizer, DISABLED_TSDTest) { in TEST() argument 194 TEST(AddressSanitizer, UAF_char) { in TEST() argument 203 TEST(AddressSanitizer, UAF_long_double) { in TEST() argument [all …]
|
D | asan_oob_test.cpp | 78 TEST(AddressSanitizer, OOB_char) { in TEST() argument 82 TEST(AddressSanitizer, OOB_int) { in TEST() argument 86 TEST(AddressSanitizer, OOBRightTest) { in TEST() argument 109 TEST(AddressSanitizer, LargeOOBRightTest) { in TEST() argument 119 TEST(AddressSanitizer, DISABLED_DemoOOBLeftLow) { in TEST() argument 123 TEST(AddressSanitizer, DISABLED_DemoOOBLeftHigh) { in TEST() argument 127 TEST(AddressSanitizer, DISABLED_DemoOOBRightLow) { in TEST() argument 131 TEST(AddressSanitizer, DISABLED_DemoOOBRightHigh) { in TEST() argument
|
D | asan_noinst_test.cpp | 43 TEST(AddressSanitizer, InternalSimpleDeathTest) { in TEST() argument 95 TEST(AddressSanitizer, NoInstMallocTest) { in TEST() argument 99 TEST(AddressSanitizer, ThreadedMallocStressTest) { in TEST() argument 127 TEST(AddressSanitizer, DISABLED_InternalPrintShadow) { in TEST() argument 136 TEST(AddressSanitizer, QuarantineTest) { in TEST() argument 172 TEST(AddressSanitizer, ThreadedQuarantineTest) { in TEST() argument 210 TEST(AddressSanitizer, ThreadedOneSizeMallocStressTest) { in TEST() argument 221 TEST(AddressSanitizer, ShadowRegionIsPoisonedTest) { in TEST() argument 233 TEST(AddressSanitizer, LoadStoreCallbacks) { in TEST() argument
|
D | asan_str_test.cpp | 79 TEST(AddressSanitizer, StrLenOOBTest) { in TEST() argument 100 TEST(AddressSanitizer, WcsLenTest) { in TEST() argument 114 TEST(AddressSanitizer, StrNLenOOBTest) { in TEST() argument 141 TEST(AddressSanitizer, MAYBE_StrDupOOBTest) { in TEST() argument 161 TEST(AddressSanitizer, MAYBE_StrNDupOOBTest) { in TEST() argument 187 TEST(AddressSanitizer, StrCpyOOBTest) { in TEST() argument 210 TEST(AddressSanitizer, StrNCpyOOBTest) { in TEST() argument 283 TEST(AddressSanitizer, StrChrAndIndexOOBTest) { in TEST() argument 291 TEST(AddressSanitizer, StrCmpAndFriendsLogicTest) { in TEST() argument 367 TEST(AddressSanitizer, StrCmpOOBTest) { in TEST() argument [all …]
|
D | asan_benchmarks_test.cpp | 43 TEST(AddressSanitizer, ManyAccessBenchmark) { in TEST() argument 65 TEST(AddressSanitizer, BorderAccessBenchmark) { in TEST() argument 76 TEST(AddressSanitizer, FakeStackBenchmark) { in TEST() argument
|
D | asan_mem_test.cpp | 72 TEST(AddressSanitizer, MemSetOOBTest) { in TEST() argument 109 TEST(AddressSanitizer, LargeOOBInMemset) { in TEST() argument 195 TEST(AddressSanitizer, MemCpyOOBTest) { in TEST() argument 207 TEST(AddressSanitizer, MemMoveOOBTest) { in TEST() argument 244 TEST(AddressSanitizer, MemCmpOOBTest) { CmpOOBTestCommon<memcmp>(); } in TEST() argument 246 TEST(AddressSanitizer, BCmpOOBTest) { in TEST() argument
|
D | asan_mac_test_helpers.mm | 47 // If AddressSanitizer doesn't instrument the +load method below correctly, 51 "If your test didn't crash, AddressSanitizer is instrumenting " 96 // pthread_create(). We need to verify that AddressSanitizer notices that the 106 // pthread_create(). We need to verify that AddressSanitizer notices that the 113 // to make sure AddressSanitizer handles the reusing correctly.
|
/external/compiler-rt/lib/asan/tests/ |
D | asan_test.cc | 43 TEST(AddressSanitizer, HasFeatureAddressSanitizerTest) { in TEST() argument 54 TEST(AddressSanitizer, SimpleDeathTest) { in TEST() argument 58 TEST(AddressSanitizer, VariousMallocsTest) { in TEST() argument 91 TEST(AddressSanitizer, CallocTest) { in TEST() argument 97 TEST(AddressSanitizer, CallocReturnsZeroMem) { in TEST() argument 121 TEST(AddressSanitizer, VallocTest) { in TEST() argument 129 TEST(AddressSanitizer, PvallocTest) { in TEST() argument 165 TEST(AddressSanitizer, DISABLED_TSDTest) { in TEST() argument 175 TEST(AddressSanitizer, UAF_char) { in TEST() argument 184 TEST(AddressSanitizer, UAF_long_double) { in TEST() argument [all …]
|
D | asan_oob_test.cc | 69 TEST(AddressSanitizer, OOB_char) { in TEST() argument 73 TEST(AddressSanitizer, OOB_int) { in TEST() argument 77 TEST(AddressSanitizer, OOBRightTest) { in TEST() argument 104 TEST(AddressSanitizer, LargeOOBRightTest) { in TEST() argument 114 TEST(AddressSanitizer, DISABLED_DemoOOBLeftLow) { in TEST() argument 118 TEST(AddressSanitizer, DISABLED_DemoOOBLeftHigh) { in TEST() argument 122 TEST(AddressSanitizer, DISABLED_DemoOOBRightLow) { in TEST() argument 126 TEST(AddressSanitizer, DISABLED_DemoOOBRightHigh) { in TEST() argument
|
D | asan_noinst_test.cc | 42 TEST(AddressSanitizer, InternalSimpleDeathTest) { in TEST() argument 94 TEST(AddressSanitizer, NoInstMallocTest) { in TEST() argument 98 TEST(AddressSanitizer, ThreadedMallocStressTest) { in TEST() argument 126 TEST(AddressSanitizer, DISABLED_InternalPrintShadow) { in TEST() argument 135 TEST(AddressSanitizer, QuarantineTest) { in TEST() argument 170 TEST(AddressSanitizer, ThreadedQuarantineTest) { in TEST() argument 200 TEST(AddressSanitizer, ThreadedOneSizeMallocStressTest) { in TEST() argument 211 TEST(AddressSanitizer, ShadowRegionIsPoisonedTest) { in TEST() argument 223 TEST(AddressSanitizer, LoadStoreCallbacks) { in TEST() argument
|
D | asan_str_test.cc | 80 TEST(AddressSanitizer, StrLenOOBTest) { in TEST() argument 98 TEST(AddressSanitizer, WcsLenTest) { in TEST() argument 111 TEST(AddressSanitizer, StrNLenOOBTest) { in TEST() argument 130 TEST(AddressSanitizer, StrDupOOBTest) { in TEST() argument 149 TEST(AddressSanitizer, StrCpyOOBTest) { in TEST() argument 172 TEST(AddressSanitizer, StrNCpyOOBTest) { in TEST() argument 245 TEST(AddressSanitizer, StrChrAndIndexOOBTest) { in TEST() argument 253 TEST(AddressSanitizer, StrCmpAndFriendsLogicTest) { in TEST() argument 329 TEST(AddressSanitizer, StrCmpOOBTest) { in TEST() argument 334 TEST(AddressSanitizer, StrCaseCmpOOBTest) { in TEST() argument [all …]
|
D | asan_benchmarks_test.cc | 44 TEST(AddressSanitizer, ManyAccessBenchmark) { in TEST() argument 66 TEST(AddressSanitizer, BorderAccessBenchmark) { in TEST() argument 77 TEST(AddressSanitizer, FakeStackBenchmark) { in TEST() argument
|
D | asan_mem_test.cc | 68 TEST(AddressSanitizer, MemSetOOBTest) { in TEST() argument 105 TEST(AddressSanitizer, LargeOOBInMemset) { in TEST() argument 191 TEST(AddressSanitizer, MemCpyOOBTest) { in TEST() argument 203 TEST(AddressSanitizer, MemMoveOOBTest) { in TEST() argument 209 TEST(AddressSanitizer, MemCmpOOBTest) { in TEST() argument
|
D | asan_asm_test.cc | 210 TEST(AddressSanitizer, asm_load_store) { in TEST() argument 217 TEST(AddressSanitizer, asm_rw) { in TEST() argument 235 TEST(AddressSanitizer, asm_flags) { in TEST() argument 260 TEST(AddressSanitizer, asm_rep_movs) { in TEST() argument
|
D | asan_mac_test_helpers.mm | 47 // If AddressSanitizer doesn't instrument the +load method below correctly, 51 "If your test didn't crash, AddressSanitizer is instrumenting " 96 // pthread_create(). We need to verify that AddressSanitizer notices that the 106 // pthread_create(). We need to verify that AddressSanitizer notices that the 113 // to make sure AddressSanitizer handles the reusing correctly.
|
/external/llvm-project/clang/docs/ |
D | AddressSanitizer.rst | 2 AddressSanitizer title 11 AddressSanitizer is a fast memory error detector. It consists of a compiler 22 Typical slowdown introduced by AddressSanitizer is **2x**. 33 AddressSanitizer run-time library should be linked to the final executable, so 35 shared libraries, the AddressSanitizer run-time is not linked, so 36 ``-Wl,-z,defs`` may cause link errors (don't use it with AddressSanitizer). To 64 exit with a non-zero exit code. AddressSanitizer exits on the first detected error. 67 * This approach allows AddressSanitizer to produce faster and smaller generated code 69 * Fixing bugs becomes unavoidable. AddressSanitizer does not produce 85 To make AddressSanitizer symbolize its output [all …]
|
D | LeakSanitizer.rst | 12 :doc:`AddressSanitizer` to get both memory error and leak detection, or 21 simply build your program with :doc:`AddressSanitizer`: 39 SUMMARY: AddressSanitizer: 7 byte(s) leaked in 1 allocation(s).
|
D | HardwareAssistedAddressSanitizerDesign.rst | 2 Hardware-assisted AddressSanitizer Design Documentation 6 **hardware-assisted AddressSanitizer** (or **HWASAN**) 7 a tool similar to :doc:`AddressSanitizer`, 14 :doc:`AddressSanitizer` 19 sources of AddressSanitizer's memory overhead. 20 See the `AddressSanitizer paper`_ for details. 25 to implement a memory safety tool, similar to :doc:`AddressSanitizer`, 233 Comparison with AddressSanitizer 237 * Is less portable than :doc:`AddressSanitizer` 257 than that of AddressSanitizer:
|
/external/clang/docs/ |
D | AddressSanitizer.rst | 2 AddressSanitizer title 11 AddressSanitizer is a fast memory error detector. It consists of a compiler 21 Typical slowdown introduced by AddressSanitizer is **2x**. 32 AddressSanitizer run-time library should be linked to the final executable, so 34 shared libraries, the AddressSanitizer run-time is not linked, so 35 ``-Wl,-z,defs`` may cause link errors (don't use it with AddressSanitizer). To 63 exit with a non-zero exit code. AddressSanitizer exits on the first detected error. 66 * This approach allows AddressSanitizer to produce faster and smaller generated code 68 * Fixing bugs becomes unavoidable. AddressSanitizer does not produce 84 To make AddressSanitizer symbolize its output [all …]
|
D | LeakSanitizer.rst | 12 :doc:`AddressSanitizer` to get both memory error and leak detection, or 21 simply build your program with :doc:`AddressSanitizer`: 39 SUMMARY: AddressSanitizer: 7 byte(s) leaked in 1 allocation(s).
|
/external/swiftshader/third_party/subzero/docs/ |
D | ASAN.rst | 1 Using AddressSanitizer in Subzero 4 AddressSanitizer is a powerful compile-time tool used to detect and report 8 AddressSanitizer is only supported on native builds of .pexe files and cannot be 11 In Subzero, AddressSanitizer depends on being able to find and instrument calls 16 etc., so AddressSanitizer will not work correctly in the final executable. 32 AddressSanitizer runtime to work correctly. A .pexe file can be compiled with 33 AddressSanitizer and properly linked into a final executable using 41 Since AddressSanitizer is implemented only in Subzero, the target .pexe may 50 Most of the SPEC2000 benchmarks can be built with Subzero and AddressSanitizer, 52 calloc, 300.twolf and 252.eon will not build. AddressSanitizer correctly finds [all …]
|
/external/llvm-project/clang/include/clang/Basic/ |
D | Sanitizers.def | 40 // AddressSanitizer 43 // Requires AddressSanitizer 46 // Requires AddressSanitizer 49 // Kernel AddressSanitizer (KASan) 52 // Hardware-assisted AddressSanitizer 55 // Kernel Hardware-assisted AddressSanitizer (KHWASan) 58 // A variant of AddressSanitizer using AArch64 MTE extension.
|
/external/llvm/lib/Transforms/Instrumentation/ |
D | AddressSanitizer.cpp | 448 struct AddressSanitizer : public FunctionPass { struct 449 explicit AddressSanitizer(bool CompileKernel = false, bool Recover = false, in AddressSanitizer() argument 518 AddressSanitizer *Pass; 519 FunctionStateRAII(AddressSanitizer *Pass) : Pass(Pass) { in FunctionStateRAII() 601 AddressSanitizer &ASan; 640 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner() 802 char AddressSanitizer::ID = 0; 804 AddressSanitizer, "asan", 810 AddressSanitizer, "asan", in INITIALIZE_PASS_DEPENDENCY() 817 return new AddressSanitizer(CompileKernel, Recover, UseAfterScope); in INITIALIZE_PASS_DEPENDENCY() [all …]
|
/external/compiler-rt/lib/asan/ |
D | README.txt | 1 AddressSanitizer RT 3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
|
/external/llvm-project/compiler-rt/lib/asan/ |
D | README.txt | 1 AddressSanitizer RT 3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
|