Home
last modified time | relevance | path

Searched full:asan (Results 1 – 25 of 1562) sorted by relevance

12345678910>>...63

/external/clang/test/Driver/
Ddarwin-sanitizer-ld.c5 // RUN: | FileCheck --check-prefix=CHECK-ASAN %s
7 // CHECK-ASAN: "{{.*}}ld{{(.exe)?}}"
8 // CHECK-ASAN-NOT: "-lstdc++"
9 // CHECK-ASAN-NOT: "-lc++"
10 // CHECK-ASAN: libclang_rt.asan_osx_dynamic.dylib"
11 // CHECK-ASAN: "-rpath" "@executable_path"
12 // CHECK-ASAN: "-rpath" "{{.*}}lib{{.*}}darwin"
16 // RUN: | FileCheck --check-prefix=CHECK-DYN-ASAN %s
18 // CHECK-DYN-ASAN: "{{.*}}ld{{(.exe)?}}"
19 // CHECK-DYN-ASAN: "-dylib"
[all …]
Dsanitizer-ld.c7 // RUN: | FileCheck --check-prefix=CHECK-ASAN-LINUX %s
9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
10 // CHECK-ASAN-LINUX-NOT: "-lc"
11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
14 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
15 // CHECK-ASAN-LINUX: "-lpthread"
16 // CHECK-ASAN-LINUX: "-lrt"
17 // CHECK-ASAN-LINUX: "-ldl"
[all …]
Dcl-link.c12 …h:IA32 --target=i386-pc-win32 /Tc%s -### -fsanitize=address 2>&1 | FileCheck --check-prefix=ASAN %s
13 // ASAN: link.exe
14 // ASAN: "-debug"
15 // ASAN: "-incremental:no"
16 // ASAN: "{{.*}}clang_rt.asan-i386.lib"
17 // ASAN: "{{.*}}clang_rt.asan_cxx-i386.lib"
18 // ASAN: "{{.*}}cl-link{{.*}}.obj"
20 …--target=i386-pc-win32 /MD /Tc%s -### -fsanitize=address 2>&1 | FileCheck --check-prefix=ASAN-MD %s
21 // ASAN-MD: link.exe
22 // ASAN-MD: "-debug"
[all …]
/external/compiler-rt/lib/asan/
DCMakeLists.txt51 # As a net result, this allows running ASan executables without LD_PRELOAD-ing the
52 # ASan runtime library.
76 # Compile ASan sources into an object library.
107 # Build ASan runtimes shipped with Clang.
108 add_custom_target(asan) target
109 set_target_properties(asan PROPERTIES FOLDER "Compiler-RT Misc")
112 add_compiler_rt_runtime(clang_rt.asan
124 PARENT_TARGET asan)
135 add_compiler_rt_runtime(clang_rt.asan
143 PARENT_TARGET asan)
[all …]
DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
9 asan_*.{cc,h} : Sources of the asan runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
23 make check-asan
/external/llvm/test/Instrumentation/AddressSanitizer/
Dinstrumentation-with-call-threshold.ll1 ; Test asan internal compiler flags:
2 ; -asan-instrumentation-with-call-threshold
3 ; -asan-memory-access-callback-prefix
5 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=1 -S | FileCheck %s --…
6 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -S | FileCheck %s --…
7 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -asan-memory-access-…
8 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=5 -S | FileCheck %s --…
9 ; RUN: opt < %s -asan -asan-module -S | FileCheck %s --check-prefix=CHECK-INLINE
Dlifetime-uar-uas.ll2 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=0 -S | FileCheck …
3 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=0 -S | FileCheck …
4 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=1 -S | FileCheck …
5 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=1 -S | FileCheck …
Dscale-offset.ll1 ; Test that the scale (-asan-mapping-scale) and offset (-asan-mapping-offset) command-line options …
3 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xdeadbeef -S | FileCheck --check-prefix=CH…
4 ; RUN: opt < %s -asan -asan-module -asan-mapping-scale 1 -S | FileCheck --check-prefix=CHECK-SCALE …
5 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xc0ffee -asan-mapping-scale 0 -S | FileChe…
Ddebug_info_noninstrumented_alloca.ll5 ; RUN: opt < %s -asan -asan-module -S | FileCheck %s
6 ; RUN: opt < %s -asan -asan-module -asan-instrument-allocas=1 -S | FileCheck %s
13 ; Won't be instrumented because of asan-skip-promotable-allocas.
19 ; Won't be instrumented because of asan-skip-promotable-allocas.
25 ; Won't be instrumented because of asan-skip-promotable-allocas.
Dinstrument_load_then_store.ll2 ; RUN: opt < %s -asan -asan-module -S -asan-opt=1 | FileCheck %s -check-prefix=OPT1
3 ; RUN: opt < %s -asan -asan-module -S -asan-opt=0 | FileCheck %s -check-prefix=OPT0
19 ; OPT1: asan.module_ctor
25 ; OPT0: asan.module_ctor
/external/clang/test/CodeGen/
Daddress-sanitizer-and-array-cookie.cpp2 …c1 -triple x86_64-gnu-linux -emit-llvm -o - -fsanitize=address %s | FileCheck %s -check-prefix=ASAN
23 // ASAN-LABEL: CallNew
24 // ASAN: store{{.*}}nosanitize
25 // ASAN-NOT: nosanitize
26 // ASAN: call void @__asan_poison_cxx_array_cookie
34 // ASAN-LABEL: CallNewNoThrow
35 // ASAN: store{{.*}}nosanitize
36 // ASAN-NOT: nosanitize
37 // ASAN: call void @__asan_poison_cxx_array_cookie
45 // ASAN-LABEL: CallDelete
[all …]
Daddress-safety-attr.cpp7 …emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address | FileCheck -check-prefix=ASAN %s
26 // ASAN: DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
36 // ASAN: @__cxx_global_var_init{{.*}}[[WITH:#[0-9]+]]
37 // ASAN: @__cxx_global_array_dtor{{.*}}[[WITH]]
43 // ASAN: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
50 // ASAN: NoAddressSafety2{{.*}}) [[NOATTR]]
58 // ASAN: NoAddressSafety3{{.*}}) [[NOATTR]]
65 // ASAN: NoAddressSafety4{{.*}}) [[NOATTR]]
73 // ASAN: NoAddressSafety5{{.*}}) [[NOATTR]]
80 // ASAN: NoAddressSafety6{{.*}}) [[NOATTR]]
[all …]
/external/coreboot/Documentation/technotes/
Dasan.md10 , also known as ASan, is a runtime memory debugger designed to find
17 ASan in coreboot catches the following types of memory bugs:
67 ## Using ASan
69 In order to enable ASan on a supported platform,
74 above-mentioned memory bugs, ASan will report them in the console log as shown
77 ASan: <bug type> in <ip>
110 To see ASan in action, let's take an example. Suppose, there is a
111 stack-out-of-bounds error in cbfs.c that we aren’t aware of and we want ASan
126 First, we enable ASan from the configuration menu as shown above. Then, we
129 ASan reports the following error in the console log:
[all …]
/external/cronet/tot/testing/libfuzzer/
Dreference.md34 |Linux ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer` |
35 |Linux ASan (x86) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux32 ASan' out/lib…
36 |Linux ASan Debug | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan Debug' out…
39 |Chrome OS ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/lib…
40 |Mac ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer` |
41 |Windows ASan | `python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\…
42 |Linux ASan V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer…
43 |Linux ASan V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzz…
44 |Linux ASan Debug V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Lib…
45 |Linux ASan Debug V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'L…
[all …]
/external/cronet/stable/testing/libfuzzer/
Dreference.md34 |Linux ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer` |
35 |Linux ASan (x86) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux32 ASan' out/lib…
36 |Linux ASan Debug | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan Debug' out…
39 |Chrome OS ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/lib…
40 |Mac ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer` |
41 |Windows ASan | `python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\…
42 |Linux ASan V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer…
43 |Linux ASan V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzz…
44 |Linux ASan Debug V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Lib…
45 |Linux ASan Debug V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'L…
[all …]
/external/gwp_asan/gwp_asan/
Doptions.inc23 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY(
32 "selected for GWP-ASan sampling. Default is 5000. Sample rates "
35 // Developer note - This option is not actually processed by GWP-ASan itself. It
44 "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This "
46 "deallocation when reporting a memory error. GWP-ASan's signal handler "
54 "Install GWP-ASan's signal handler in recoverable mode. This means that "
55 "upon GWP-ASan detecting an error, it'll print the error report, but *not* "
60 "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.")
63 "Install GWP-ASan atfork handlers to acquire internal locks "
71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings
[all …]
/external/zstd/.github/workflows/
Ddev-long-tests.yml97 gcc-8-asan-ubsan-testzstd:
101 - name: gcc-8 + ASan + UBSan + Test Zstd
109 clang-asan-ubsan-testzstd:
113 - name: clang + ASan + UBSan + Test Zstd
116 gcc-asan-ubsan-testzstd-32bit:
120 - name: ASan + UBSan + Test Zstd, 32bit mode
130 gcc-8-asan-ubsan-fuzz:
134 - name: gcc-8 + ASan + UBSan + Fuzz Test
142 clang-asan-ubsan-fuzz:
146 - name: clang + ASan + UBSan + Fuzz Test
[all …]
/external/pytorch/test/distributed/elastic/agent/server/test/
Dlocal_elastic_agent_test.py467 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
473 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
479 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
491 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
497 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
503 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
526 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
534 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
603 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
611 TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
[all …]
/external/compiler-rt/lib/asan/tests/
DCMakeLists.txt28 -I${COMPILER_RT_SOURCE_DIR}/lib/asan
42 # -gline-tables-only must be enough for ASan, so use it if possible.
76 list(APPEND ASAN_UNITTEST_INSTRUMENTED_CFLAGS -mllvm -asan-instrument-assembly)
134 list(APPEND COMPILE_DEPS gtest asan)
142 # Link ASan unit test for a given architecture from a set
149 list(APPEND TEST_DEPS asan)
181 # ASan benchmarks (not actively used now).
209 # Adds ASan unit tests and benchmarks for architecture.
223 # Create the 'default' folder where ASAN tests are produced.
232 add_asan_test(AsanUnitTests "Asan-${arch}${kind}-Test"
[all …]
/external/compiler-rt/test/asan/TestCases/Linux/
Dactivation-options.cc2 // Main executable is uninstrumented, but linked to ASan runtime. The shared
9 // RUN: rm -f %t.asan.options.activation-options.cc.tmp
10 // RUN: rm -f %t.asan.options.ABCDE
11 // RUN: echo "help=1" >%t.asan.options.activation-options.cc.tmp
14 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t 2>&1 | \
18 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options not %run %t 2>&1 | \
22 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b not %run %t --fix-name 2>&1 | \
25 // RUN: echo "help=1" >%t.asan.options.ABCDE
28 // RUN: ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t --fix-name 2>&1 | \
65 // Empty: all we need is an ASan shared library constructor.
/external/coreboot/util/crossgcc/patches/
Dgcc-14.1.0_asan_shadow_offset_callback.patch4 Subject: [PATCH] crossgcc: Enable GCC to get asan shadow offset at runtime
10 For this reason, we enable GCC to determine asan shadow offset address at runtime using a
26 Further, we have made sure that if you compile you tree with ASan enabled but missed this
28 "invalid --param name 'asan-use-shadow-offset-callback'"
36 diff --git a/gcc/asan.c b/gcc/asan.c
38 --- a/gcc/asan.cc
39 +++ b/gcc/asan.cc
82 +-param=asan-use-shadow-offset-callback=
86 -param=asan-memintrin=
88 Enable asan builtin functions protection.
/external/skia/site/docs/dev/testing/
Dxsan.md3 title: "MSAN, ASAN, & TSAN"
4 linkTitle: "MSAN, ASAN, & TSAN"
11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
14 - ASAN works on Linux, Mac, Android, and Windows.
70 Configure and Compile Skia with ASAN
76 mkdir -p out/asan
77 cat > out/asan/args.gn <<- EOF
80 sanitize = "ASAN"
84 bin/gn gen out/asan
85 ninja -C out/asan
/external/compiler-rt/test/asan/
DCMakeLists.txt6 # TODO(wwchrome): Re-enable Win64 asan tests when ready.
7 # Disable tests for asan Win64 temporarily.
24 list(APPEND ASAN_TEST_DEPS asan)
108 add_lit_testsuite(check-asan "Running the AddressSanitizer tests"
112 set_target_properties(check-asan PROPERTIES FOLDER "Compiler-RT Misc")
115 # Add check-dynamic-asan target. It is a part of check-all only on Windows,
121 add_lit_testsuite(check-asan-dynamic
125 set_target_properties(check-asan-dynamic
132 # TODO(wwchrome): Re-enable the tests for asan Win64 when ready.
/external/google-benchmark/.github/workflows/
Dsanitizer.yml18 sanitizer: ['asan', 'ubsan', 'tsan', 'msan']
35 - name: configure asan env
36 if: matrix.sanitizer == 'asan'
47 - name: fine-tune asan options
48 # in asan we get an error from std::regex. ignore it.
49 if: matrix.sanitizer == 'asan'
64 - name: build libc++ (non-asan)
65 if: matrix.sanitizer != 'asan'
/external/llvm/test/DebugInfo/COFF/
Dasan-module-without-functions.ll5 ; D:\asan.c:
12 ; ModuleID = 'asan.c'
17 … appending global [1 x { i32, void ()* }] [{ i32, void ()* } { i32 1, void ()* @asan.module_ctor }]
18 @__asan_gen_ = private constant [7 x i8] c"asan.c\00", align 1
21 … appending global [1 x { i32, void ()* }] [{ i32, void ()* } { i32 1, void ()* @asan.module_dtor }]
23 define internal void @asan.module_ctor() {
39 define internal void @asan.module_dtor() {
49 !1 = !DIFile(filename: "asan.c", directory: "D:\5C")

12345678910>>...63