Searched +full:linux +full:- +full:asan (Results 1 – 25 of 426) sorted by relevance
12345678910>>...18
| /external/clang/test/Driver/ |
| D | sanitizer-ld.c | 3 // RUN: %clang -no-canonical-prefixes %s -### -o %t.o 2>&1 \ 4 // RUN: -target i386-unknown-linux -fsanitize=address \ 5 // RUN: -resource-dir=%S/Inputs/resource_dir \ 6 // RUN: --sysroot=%S/Inputs/basic_linux_tree \ 7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s 9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}" 10 // CHECK-ASAN-LINUX-NOT: "-lc" 11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a" 12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic" 13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms" [all …]
|
| D | fsanitize.c | 1 …UN: %clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined %s -### 2>&1 | … 2 …-target x86_64-linux-gnu -fsanitize=undefined -fsanitize-trap=undefined -fno-sanitize-trap=signed-… 3 …clang -target x86_64-linux-gnu -fsanitize=undefined -fsanitize-undefined-trap-on-error %s -### 2>&… 4 …ang -target x86_64-linux-gnu -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error %s -### … 5 …ang -target x86_64-linux-gnu -fsanitize-undefined-trap-on-error -fsanitize=undefined-trap %s -### … 6 …-UNDEFINED-TRAP: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-ze… 7 …-UNDEFINED-TRAP: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divid… 8 …-UNDEFINED-TRAP2: "-fsanitize-trap=alignment,array-bounds,bool,enum,float-cast-overflow,float-divi… 10 // RUN: %clang -target x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-pr… 11 …-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|float-divide-by-zero|fu… [all …]
|
| D | asan.c | 1 // RUN: %clang -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 2 // RUN: %clang -O1 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 3 // RUN: %clang -O2 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 4 // RUN: %clang -O3 -target i386-unknown-linux -fsanitize=address %s -S -emit-llvm -o - | FileCheck … 5 // RUN: %clang -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 6 // RUN: %clang -O1 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 7 // RUN: %clang -O2 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 8 // RUN: %clang -O3 -target i386-unknown-linux -fsanitize=kernel-address %s -S -emit-llvm -o - | Fil… 9 // Verify that -fsanitize={address,kernel-address} invoke ASan and KASan instrumentation. 12 // CHECK-ASAN: __asan_init [all …]
|
| /external/cronet/testing/libfuzzer/ |
| D | reference.md | 11 run MSan-instrumented code in docker. 33 |---------|-------------| 34 |Linux ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer` | 35 |Linux ASan (x86) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux32 ASan' out/lib… 36 |Linux ASan Debug | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan Debug' out… 37 |Linux MSan[*](#MSan) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux MSan' out/l… 38 |Linux UBSan[*](#UBSan)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux UBSan' out… 39 |Chrome OS ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/lib… 40 |Mac ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer` | 41 |Windows ASan | `python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\… [all …]
|
| /external/rust/crates/libz-sys/src/zlib-ng/.github/workflows/ |
| D | cmake.yml | 4 ci-cmake: 6 runs-on: ${{ matrix.os }} 8 fail-fast: false 11 - name: Ubuntu 18.04 GCC 12 os: ubuntu-18.04 14 cxx-compiler: g++ 16 - name: Ubuntu GCC ASAN 17 os: ubuntu-latest 19 cxx-compiler: g++ 20 cmake-args: -DWITH_SANITIZER=Address [all …]
|
| /external/skia/site/docs/dev/testing/ |
| D | xsan.md | 2 --- 3 title: "MSAN, ASAN, & TSAN" 4 linkTitle: "MSAN, ASAN, & TSAN" 6 --- 11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 13 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific. 14 - ASAN works on Linux, Mac, Android, and Windows. 15 - TSAN works on Linux and Mac. 16 - MSAN works on Linux[1]. 19 with the system-provided C++ standard library, which is usually libstdc++. [all …]
|
| /external/angle/infra/config/generated/ |
| D | luci-milo.cfg | 1 # Auto-generated by lucicfg. 5 # https://config.luci.app/schemas/projects:luci-milo.cfg 14 name: "buildbucket/luci.angle.ci/android-arm-compile" 19 name: "buildbucket/luci.angle.ci/android-arm-dbg-compile" 24 name: "buildbucket/luci.angle.ci/android-arm64-dbg-compile" 29 name: "buildbucket/luci.angle.ci/android-arm64-exp-s22-test" 34 name: "buildbucket/luci.angle.ci/android-arm64-exp-test" 39 name: "buildbucket/luci.angle.ci/android-arm64-test" 44 name: "buildbucket/luci.angle.ci/linux-asan-test" 45 category: "test|linux|x64" [all …]
|
| D | luci-scheduler.cfg | 1 # Auto-generated by lucicfg. 5 # https://config.luci.app/schemas/projects:luci-scheduler.cfg 8 id: "android-arm-compile" 16 server: "cr-buildbucket.appspot.com" 18 builder: "android-arm-compile" 22 id: "android-arm-dbg-compile" 30 server: "cr-buildbucket.appspot.com" 32 builder: "android-arm-dbg-compile" 36 id: "android-arm64-dbg-compile" 44 server: "cr-buildbucket.appspot.com" [all …]
|
| /external/clang/test/CodeGen/ |
| D | address-sanitizer-and-array-cookie.cpp | 1 // RUN: %clang_cc1 -triple x86_64-gnu-linux -emit-llvm -o - %s | FileCheck %s -check-prefix=PLAIN 2 // RUN: %clang_cc1 -triple x86_64-gnu-linux -emit-llvm -o - -fsanitize=address %s | FileCheck %s -c… 20 // PLAIN-LABEL: CallNew 21 // PLAIN-NOT: nosanitize 22 // PLAIN-NOT: __asan_poison_cxx_array_cookie 23 // ASAN-LABEL: CallNew 24 // ASAN: store{{.*}}nosanitize 25 // ASAN-NOT: nosanitize 26 // ASAN: call void @__asan_poison_cxx_array_cookie 31 // PLAIN-LABEL: CallNewNoThrow [all …]
|
| D | address-safety-attr-kasan.cpp | 1 // Make sure the sanitize_address attribute is emitted when using both ASan and KASan. 4 /// RUN: %clang_cc1 -triple i386-unknown-linux -emit-llvm -o - %s | FileCheck -check-prefix=CHECK-N… 5 /// RUN: %clang_cc1 -triple i386-unknown-linux -fsanitize=address -emit-llvm -o - %s | FileCheck -c… 6 /// RUN: %clang_cc1 -triple i386-unknown-linux -fsanitize=kernel-address -emit-llvm -o - %s | FileC… 11 // CHECK-NOASAN: {{Function Attrs: nounwind$}} 12 // CHECK-ASAN: Function Attrs: nounwind sanitize_address 13 // CHECK-KASAN: Function Attrs: nounwind sanitize_address 19 // CHECK-NOASAN: {{Function Attrs: nounwind$}} 20 // CHECK-ASAN: {{Function Attrs: nounwind$}} 21 // CHECK-KASAN: {{Function Attrs: nounwind sanitize_address$}} [all …]
|
| D | lifetime-asan.c | 1 // RUN: %clang -target x86_64-linux-gnu -S -emit-llvm -o - -O0 %s | FileCheck %s -check-prefix=CHEC… 2 // RUN: %clang -target x86_64-linux-gnu -S -emit-llvm -o - -O0 \ 3 // RUN: -fsanitize=address -fsanitize-address-use-after-scope %s | \ 4 // RUN: FileCheck %s -check-prefix=CHECK-ASAN-USE-AFTER-SCOPE 8 // CHECK-O0-NOT: @llvm.lifetime.start 11 // CHECK-ASAN-USE-AFTER-SCOPE: @llvm.lifetime.start(i64 10, i8* {{.*}}) in foo() 14 // CHECK-ASAN-USE-AFTER-SCOPE: @llvm.lifetime.end(i64 10, i8* {{.*}}) in foo() 16 // CHECK-ASAN-USE-AFTER-SCOPE: @llvm.lifetime.start(i64 20, i8* {{.*}}) in foo() 19 // CHECK-ASAN-USE-AFTER-SCOPE: @llvm.lifetime.end(i64 20, i8* {{.*}}) in foo()
|
| /external/webrtc/tools_webrtc/mb/ |
| D | mb_config.pyl | 3 # Use of this source code is governed by a BSD-style license 11 # configurations source-side instead of in the buildbot scripts. That makes it 15 # This is a map of buildbot builder group names -> buildbot builder names -> 25 'codesearch-gen-webrtc-android': { 28 'codesearch-gen-webrtc-linux': { 29 'linux': 'codesearch_gen_linux_bot', 54 # Linux 57 'Linux (more configs)': { 63 'Linux Asan': 'asan_lsan_clang_release_bot_x64', 64 'Linux MSan': 'msan_clang_release_bot_x64', [all …]
|
| /external/angle/infra/specs/ |
| D | angle_mb_config.pyl | 2 # Use of this source code is governed by a BSD-style license that can be 12 # This is a map of builder group names -> builder names -> config names 17 'android-arm-compile': 'angle_reclient_android_arm_release_bot', 18 'android-arm-dbg-compile': 'angle_reclient_android_arm_debug_bot', 19 'android-arm64-dbg-compile': 'angle_reclient_android_arm64_debug_bot', 20 'android-arm64-exp-s22-test': 'angle_reclient_android_arm64_release_bot', 21 'android-arm64-exp-test': 'angle_reclient_android_arm64_release_bot', 22 'android-arm64-test': 'angle_reclient_android_arm64_release_bot', 23 'android-pixel4-perf': 'angle_reclient_android_perf_bot', 24 'android-pixel6-perf': 'angle_reclient_android_perf_bot', [all …]
|
| D | waterfalls.pyl | 2 # Use of this source code is governed by a BSD-style license that can be 18 'chromium-tester-service-account', 22 'android-arm64-exp-pixel6': { # android-arm64-pixel6 below for android-arm64-test 33 'android-arm64-exp-s22': { 36 'gpu-swarming-pool', 44 'android-arm64-pixel4': { 54 'android-arm64-pixel4-perf': { 65 'android-arm64-pixel6': { 75 'android-arm64-pixel6-perf': { 86 'linux-amd': { [all …]
|
| /external/libyuv/infra/config/ |
| D | luci-scheduler.cfg | 1 # Auto-generated by lucicfg. 5 # https://luci-config.appspot.com/schemas/projects:luci-scheduler.cfg 12 server: "cr-buildbucket.appspot.com" 22 server: "cr-buildbucket.appspot.com" 32 server: "cr-buildbucket.appspot.com" 42 granted_to: "libyuv-ci-builder@chops-service-accounts.iam.gserviceaccount.com" 46 server: "cr-buildbucket.appspot.com" 56 granted_to: "libyuv-ci-builder@chops-service-accounts.iam.gserviceaccount.com" 60 server: "cr-buildbucket.appspot.com" 70 granted_to: "libyuv-ci-builder@chops-service-accounts.iam.gserviceaccount.com" [all …]
|
| D | luci-milo.cfg | 1 # Auto-generated by lucicfg. 5 # https://luci-config.appspot.com/schemas/projects:luci-milo.cfg 54 name: "buildbucket/luci.libyuv.ci/Linux Asan" 55 category: "Linux" 56 short_name: "asan" 59 name: "buildbucket/luci.libyuv.ci/Linux MSan" 60 category: "Linux" 64 name: "buildbucket/luci.libyuv.ci/Linux Tsan v2" 65 category: "Linux" 69 name: "buildbucket/luci.libyuv.ci/Linux UBSan" [all …]
|
| /external/webrtc/infra/config/ |
| D | luci-scheduler.cfg | 1 # Auto-generated by lucicfg. 5 # https://luci-config.appspot.com/schemas/projects:luci-scheduler.cfg 12 server: "cr-buildbucket.appspot.com" 22 server: "cr-buildbucket.appspot.com" 32 server: "cr-buildbucket.appspot.com" 47 server: "cr-buildbucket.appspot.com" 57 server: "cr-buildbucket.appspot.com" 67 server: "cr-buildbucket.appspot.com" 77 server: "cr-buildbucket.appspot.com" 92 server: "cr-buildbucket.appspot.com" [all …]
|
| /external/grpc-grpc/tools/ |
| D | bazel.rc | 5 common --enable_bzlmod=false 7 # for platform-appropriate cxxopts 8 common --enable_platform_specific_config 10 build:windows --cxxopt='/std:c++14' 11 build:windows --host_cxxopt='/std:c++14' 12 build:linux --cxxopt='-std=c++14' 13 build:linux --host_cxxopt='-std=c++14' 14 build:macos --cxxopt='-std=c++14' 15 build:macos --host_cxxopt='-std=c++14' 16 build:freebsd --cxxopt='-std=c++14' [all …]
|
| /external/compiler-rt/test/asan/ |
| D | lit.cfg | 1 # -*- Python -*- 32 # Platform-specific default ASAN_OPTIONS for lit tests. 51 libdl_flag = "-ldl" 55 # GCC-ASan doesn't link in all the necessary libraries automatically, so 58 extra_linkflags = ["-pthread", "-lstdc++", libdl_flag] 62 # BFD linker in 64-bit android toolchains fails to find libm.so, which is a 63 # transitive shared library dependency (via asan runtime). 65 extra_linkflags += ["-lm"] 67 # Setup default compiler flags used with -fsanitize=address option. 71 clang_asan_static_cflags = (["-fsanitize=address", [all …]
|
| /external/compiler-rt/lib/asan/scripts/ |
| D | asan_device_setup | 2 #===- lib/asan/scripts/asan_device_setup -----------------------------------===# 9 # Prepare Android device to run ASan applications. 11 #===------------------------------------------------------------------------===# 13 set -e 24 echo "usage: $0 [--revert] [--device device-id] [--lib path] [--extra-options options]" 25 echo " --revert: Uninstall ASan from the device." 26 echo " --lib: Path to ASan runtime library." 27 echo " --extra-options: Extra ASAN_OPTIONS." 28 echo " --device: Install to the given device. Use 'adb devices' to find" 29 echo " device-id." [all …]
|
| /external/compiler-rt/lib/asan/ |
| D | asan_linux.cc | 1 //===-- asan_linux.cc -----------------------------------------------------===// 8 //===----------------------------------------------------------------------===// 12 // Linux-specific details. 13 //===----------------------------------------------------------------------===// 50 // x86-64 FreeBSD 9.2 and older define 'ucontext_t' incorrectly in 51 // 32-bit mode. 75 // This will fail to link with -static. in AsanDoesNotSupportStaticLinkage() 91 if (!info->dlpi_name || info->dlpi_name[0] == 0) in FindFirstDSOCallback() 95 if (internal_strncmp(info->dlpi_name, "linux-", sizeof("linux-") - 1) == 0) in FindFirstDSOCallback() 98 *(const char **)data = info->dlpi_name; in FindFirstDSOCallback() [all …]
|
| /external/virglrenderer/docs/ |
| D | ASAN-notes.txt | 3 * code base using ASAN, the address sanitizer tools include 10 `-fsanitize=address` 12 `-fsanitize=memory` 17 export CFLAGS="-fsanitize=address -fno-omit-frame-pointer" 18 export CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer" 20 ../autogen.sh --prefix=/home/user/virglrenderer/install --enable-debug 24 The `-fsanitize=leak` flag don't have to be add for Linux as 30 Since mesa unloads the drivers before a program finished, but ASAN only 33 Hence, it is useful to override *dlclose* by pre-loading a shared library 40 It seems that you need to pre-load ASAN before your dummie library. [all …]
|
| /external/compiler-rt/test/lsan/ |
| D | lit.common.cfg | 1 # -*- Python -*- 3 # Common configuration for running leak detection tests under LSan/ASan. 19 # Choose between standalone and LSan+ASan modes. 22 config.name = "LeakSanitizer-Standalone" 23 lsan_cflags = ["-fsanitize=leak"] 25 config.name = "LeakSanitizer-AddressSanitizer" 26 lsan_cflags = ["-fsanitize=address"] 27 config.available_features.add('asan') 32 clang_cflags = ["-O0", config.target_cflags] + config.debug_info_flags 48 # LeakSanitizer tests are currently supported on x86-64 Linux and mips64 Linux only. [all …]
|
| /external/angle/infra/config/ |
| D | main.star | 4 # Use of this source code is governed by a BSD-style license that can be 21 "-module-docstring", 22 "-function-docstring", 28 buildbucket = "cr-buildbucket.appspot.com", 29 logdog = "luci-logdog.appspot.com", 30 milo = "luci-milo.appspot.com", 31 notify = "luci-notify.appspot.com", 32 scheduler = "luci-scheduler.appspot.com", 33 swarming = "chromium-swarm.appspot.com", 48 groups = "project-angle-admins", [all …]
|
| /external/tflite-support/ |
| D | .bazelrc | 6 build --apple_platform_type=macos 9 build --enable_platform_specific_config 12 common --experimental_repo_remote_exec 15 build --java_toolchain=//third_party/toolchains/java:tf_java_toolchain 16 build --host_java_toolchain=//third_party/toolchains/java:tf_java_toolchain 19 build:android --copt=-w 20 build:linux --copt=-w 21 build:macos --copt=-w 22 build:windows --copt=/w 25 build --action_env ANDROID_NDK_HOME [all …]
|
12345678910>>...18