| /external/clang/test/Driver/ | 
| D | darwin-sanitizer-ld.c | 5 // RUN:   | FileCheck --check-prefix=CHECK-ASAN %s7 // CHECK-ASAN: "{{.*}}ld{{(.exe)?}}"
 8 // CHECK-ASAN-NOT: "-lstdc++"
 9 // CHECK-ASAN-NOT: "-lc++"
 10 // CHECK-ASAN: libclang_rt.asan_osx_dynamic.dylib"
 11 // CHECK-ASAN: "-rpath" "@executable_path"
 12 // CHECK-ASAN: "-rpath" "{{.*}}lib{{.*}}darwin"
 16 // RUN:   | FileCheck --check-prefix=CHECK-DYN-ASAN %s
 18 // CHECK-DYN-ASAN: "{{.*}}ld{{(.exe)?}}"
 19 // CHECK-DYN-ASAN: "-dylib"
 [all …]
 
 | 
| D | sanitizer-ld.c | 7 // RUN:   | FileCheck --check-prefix=CHECK-ASAN-LINUX %s9 // CHECK-ASAN-LINUX: "{{(.*[^-.0-9A-Z_a-z])?}}ld{{(.exe)?}}"
 10 // CHECK-ASAN-LINUX-NOT: "-lc"
 11 // CHECK-ASAN-LINUX: libclang_rt.asan-i386.a"
 12 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
 13 // CHECK-ASAN-LINUX: "--dynamic-list={{.*}}libclang_rt.asan-i386.a.syms"
 14 // CHECK-ASAN-LINUX-NOT: "-export-dynamic"
 15 // CHECK-ASAN-LINUX: "-lpthread"
 16 // CHECK-ASAN-LINUX: "-lrt"
 17 // CHECK-ASAN-LINUX: "-ldl"
 [all …]
 
 | 
| D | cl-link.c | 12 …h:IA32 --target=i386-pc-win32 /Tc%s -### -fsanitize=address 2>&1 | FileCheck --check-prefix=ASAN %s13 // ASAN: link.exe
 14 // ASAN: "-debug"
 15 // ASAN: "-incremental:no"
 16 // ASAN: "{{.*}}clang_rt.asan-i386.lib"
 17 // ASAN: "{{.*}}clang_rt.asan_cxx-i386.lib"
 18 // ASAN: "{{.*}}cl-link{{.*}}.obj"
 20 …--target=i386-pc-win32 /MD /Tc%s -### -fsanitize=address 2>&1 | FileCheck --check-prefix=ASAN-MD %s
 21 // ASAN-MD: link.exe
 22 // ASAN-MD: "-debug"
 [all …]
 
 | 
| /external/compiler-rt/lib/asan/ | 
| D | CMakeLists.txt | 51 # As a net result, this allows running ASan executables without LD_PRELOAD-ing the52 # ASan runtime library.
 76 # Compile ASan sources into an object library.
 107 # Build ASan runtimes shipped with Clang.
 108 add_custom_target(asan)  target
 109 set_target_properties(asan PROPERTIES FOLDER "Compiler-RT Misc")
 112   add_compiler_rt_runtime(clang_rt.asan
 124     PARENT_TARGET asan)
 135   add_compiler_rt_runtime(clang_rt.asan
 143     PARENT_TARGET asan)
 [all …]
 
 | 
| D | README.txt | 3 This directory contains sources of the AddressSanitizer (ASan) runtime library.9 asan_*.{cc,h}    : Sources of the asan runtime library.
 11 tests/*          : ASan unit tests.
 13 Also ASan runtime needs the following libraries:
 17 ASan runtime currently also embeds part of LeakSanitizer runtime for
 20 ASan runtime can only be built by CMake. You can run ASan tests
 23 make check-asan
 
 | 
| /external/llvm/test/Instrumentation/AddressSanitizer/ | 
| D | instrumentation-with-call-threshold.ll | 1 ; Test asan internal compiler flags:2 ;   -asan-instrumentation-with-call-threshold
 3 ;   -asan-memory-access-callback-prefix
 5 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=1 -S | FileCheck %s --…
 6 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -S | FileCheck %s --…
 7 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=0 -asan-memory-access-…
 8 ; RUN: opt < %s -asan -asan-module -asan-instrumentation-with-call-threshold=5 -S | FileCheck %s --…
 9 ; RUN: opt < %s -asan -asan-module  -S | FileCheck %s --check-prefix=CHECK-INLINE
 
 | 
| D | lifetime-uar-uas.ll | 2 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=0 -S | FileCheck …3 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=0 -S | FileCheck …
 4 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -asan-use-after-scope=1 -S | FileCheck …
 5 ; RUN: opt < %s -asan -asan-module -asan-use-after-return=1 -asan-use-after-scope=1 -S | FileCheck …
 
 | 
| D | scale-offset.ll | 1 ; Test that the scale (-asan-mapping-scale) and offset (-asan-mapping-offset) command-line options …3 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xdeadbeef -S | FileCheck --check-prefix=CH…
 4 ; RUN: opt < %s -asan -asan-module -asan-mapping-scale 1 -S | FileCheck --check-prefix=CHECK-SCALE …
 5 ; RUN: opt < %s -asan -asan-module -asan-mapping-offset 0xc0ffee -asan-mapping-scale 0 -S | FileChe…
 
 | 
| D | debug_info_noninstrumented_alloca.ll | 5 ; RUN: opt < %s -asan -asan-module -S | FileCheck %s6 ; RUN: opt < %s -asan -asan-module -asan-instrument-allocas=1 -S | FileCheck %s
 13   ; Won't be instrumented because of asan-skip-promotable-allocas.
 19   ; Won't be instrumented because of asan-skip-promotable-allocas.
 25   ; Won't be instrumented because of asan-skip-promotable-allocas.
 
 | 
| D | instrument_load_then_store.ll | 2 ; RUN: opt < %s -asan -asan-module -S -asan-opt=1 | FileCheck %s -check-prefix=OPT13 ; RUN: opt < %s -asan -asan-module -S -asan-opt=0 | FileCheck %s -check-prefix=OPT0
 19 ; OPT1: asan.module_ctor
 25 ; OPT0: asan.module_ctor
 
 | 
| /external/clang/test/CodeGen/ | 
| D | address-sanitizer-and-array-cookie.cpp | 2 …c1 -triple x86_64-gnu-linux -emit-llvm -o - -fsanitize=address %s | FileCheck %s -check-prefix=ASAN23 // ASAN-LABEL: CallNew
 24 // ASAN: store{{.*}}nosanitize
 25 // ASAN-NOT: nosanitize
 26 // ASAN: call void @__asan_poison_cxx_array_cookie
 34 // ASAN-LABEL: CallNewNoThrow
 35 // ASAN: store{{.*}}nosanitize
 36 // ASAN-NOT: nosanitize
 37 // ASAN: call void @__asan_poison_cxx_array_cookie
 45 // ASAN-LABEL: CallDelete
 [all …]
 
 | 
| D | address-safety-attr.cpp | 7 …emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address | FileCheck -check-prefix=ASAN %s26 // ASAN:    DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
 36 // ASAN: @__cxx_global_var_init{{.*}}[[WITH:#[0-9]+]]
 37 // ASAN: @__cxx_global_array_dtor{{.*}}[[WITH]]
 43 // ASAN:  NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
 50 // ASAN:  NoAddressSafety2{{.*}}) [[NOATTR]]
 58 // ASAN:  NoAddressSafety3{{.*}}) [[NOATTR]]
 65 // ASAN:  NoAddressSafety4{{.*}}) [[NOATTR]]
 73 // ASAN:  NoAddressSafety5{{.*}}) [[NOATTR]]
 80 // ASAN:  NoAddressSafety6{{.*}}) [[NOATTR]]
 [all …]
 
 | 
| /external/coreboot/Documentation/technotes/ | 
| D | asan.md | 10 , also known as ASan, is a runtime memory debugger designed to find17 ASan in coreboot catches the following types of memory bugs:
 67 ## Using ASan
 69 In order to enable ASan on a supported platform,
 74 above-mentioned memory bugs, ASan will report them in the console log as shown
 77 ASan: <bug type> in <ip>
 110 To see ASan in action, let's take an example. Suppose, there is a
 111 stack-out-of-bounds error in cbfs.c that we aren’t aware of and we want ASan
 126 First, we enable ASan from the configuration menu as shown above. Then, we
 129 ASan reports the following error in the console log:
 [all …]
 
 | 
| /external/cronet/tot/testing/libfuzzer/ | 
| D | reference.md | 34 |Linux ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer` |35 |Linux ASan (x86) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux32 ASan' out/lib…
 36 |Linux ASan Debug | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan Debug' out…
 39 |Chrome OS ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/lib…
 40 |Mac ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer` |
 41 |Windows ASan | `python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\…
 42 |Linux ASan V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer…
 43 |Linux ASan V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzz…
 44 |Linux ASan Debug V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Lib…
 45 |Linux ASan Debug V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'L…
 [all …]
 
 | 
| /external/cronet/stable/testing/libfuzzer/ | 
| D | reference.md | 34 |Linux ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan' out/libfuzzer` |35 |Linux ASan (x86) | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux32 ASan' out/lib…
 36 |Linux ASan Debug | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Linux ASan Debug' out…
 39 |Chrome OS ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Chrome OS ASan' out/lib…
 40 |Mac ASan | `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer Upload Mac ASan' out/libfuzzer` |
 41 |Windows ASan | `python tools\mb\mb.py gen -m chromium.fuzz -b "Libfuzzer Upload Windows ASan" out\…
 42 |Linux ASan V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzzer…
 43 |Linux ASan V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Libfuzz…
 44 |Linux ASan Debug V8 ARM Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'Lib…
 45 |Linux ASan Debug V8 ARM64 Simulator[*](#ARM-and-ARM64)| `tools/mb/mb.py gen -m chromium.fuzz -b 'L…
 [all …]
 
 | 
| /external/gwp_asan/gwp_asan/ | 
| D | options.inc | 23                 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY(32                 "selected for GWP-ASan sampling. Default is 5000. Sample rates "
 35 // Developer note - This option is not actually processed by GWP-ASan itself. It
 44     "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This "
 46     "deallocation when reporting a memory error. GWP-ASan's signal handler "
 54     "Install GWP-ASan's signal handler in recoverable mode. This means that "
 55     "upon GWP-ASan detecting an error, it'll print the error report, but *not* "
 60     "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.")
 63                 "Install GWP-ASan atfork handlers to acquire internal locks "
 71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings
 [all …]
 
 | 
| /external/zstd/.github/workflows/ | 
| D | dev-long-tests.yml | 97   gcc-8-asan-ubsan-testzstd:101     - name: gcc-8 + ASan + UBSan + Test Zstd
 109   clang-asan-ubsan-testzstd:
 113     - name: clang + ASan + UBSan + Test Zstd
 116   gcc-asan-ubsan-testzstd-32bit:
 120     - name: ASan + UBSan + Test Zstd, 32bit mode
 130   gcc-8-asan-ubsan-fuzz:
 134     - name: gcc-8 + ASan + UBSan + Fuzz Test
 142   clang-asan-ubsan-fuzz:
 146     - name: clang + ASan + UBSan + Fuzz Test
 [all …]
 
 | 
| /external/pytorch/test/distributed/elastic/agent/server/test/ | 
| D | local_elastic_agent_test.py | 467         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"473         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 479         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 491         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 497         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 503         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 526         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 534         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 603         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 611         TEST_WITH_DEV_DBG_ASAN, "test incompatible with dev/dbg asan"
 [all …]
 
 | 
| /external/compiler-rt/lib/asan/tests/ | 
| D | CMakeLists.txt | 28   -I${COMPILER_RT_SOURCE_DIR}/lib/asan42 # -gline-tables-only must be enough for ASan, so use it if possible.
 76   list(APPEND ASAN_UNITTEST_INSTRUMENTED_CFLAGS -mllvm -asan-instrument-assembly)
 134     list(APPEND COMPILE_DEPS gtest asan)
 142 # Link ASan unit test for a given architecture from a set
 149     list(APPEND TEST_DEPS asan)
 181 # ASan benchmarks (not actively used now).
 209 # Adds ASan unit tests and benchmarks for architecture.
 223   # Create the 'default' folder where ASAN tests are produced.
 232   add_asan_test(AsanUnitTests "Asan-${arch}${kind}-Test"
 [all …]
 
 | 
| /external/compiler-rt/test/asan/TestCases/Linux/ | 
| D | activation-options.cc | 2 // Main executable is uninstrumented, but linked to ASan runtime. The shared9 // RUN: rm -f %t.asan.options.activation-options.cc.tmp
 10 // RUN: rm -f %t.asan.options.ABCDE
 11 // RUN: echo "help=1" >%t.asan.options.activation-options.cc.tmp
 14 // RUN:   ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t 2>&1 | \
 18 // RUN:   ASAN_ACTIVATION_OPTIONS=include=%t.asan.options not %run %t 2>&1 | \
 22 // RUN:   ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b not %run %t --fix-name 2>&1 | \
 25 // RUN: echo "help=1" >%t.asan.options.ABCDE
 28 // RUN:   ASAN_ACTIVATION_OPTIONS=include=%t.asan.options.%b %run %t --fix-name 2>&1 | \
 65 // Empty: all we need is an ASan shared library constructor.
 
 | 
| /external/coreboot/util/crossgcc/patches/ | 
| D | gcc-14.1.0_asan_shadow_offset_callback.patch | 4 Subject: [PATCH] crossgcc: Enable GCC to get asan shadow offset at runtime10 For this reason, we enable GCC to determine asan shadow offset address at runtime using a
 26 Further, we have made sure that if you compile you tree with ASan enabled but missed this
 28 "invalid --param name 'asan-use-shadow-offset-callback'"
 36 diff --git a/gcc/asan.c b/gcc/asan.c
 38 --- a/gcc/asan.cc
 39 +++ b/gcc/asan.cc
 82 +-param=asan-use-shadow-offset-callback=
 86  -param=asan-memintrin=
 88  Enable asan builtin functions protection.
 
 | 
| /external/skia/site/docs/dev/testing/ | 
| D | xsan.md | 3 title: "MSAN, ASAN, & TSAN"4 linkTitle: "MSAN, ASAN, & TSAN"
 11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
 14 - ASAN works on Linux, Mac, Android, and Windows.
 70 Configure and Compile Skia with ASAN
 76     mkdir -p out/asan
 77     cat > out/asan/args.gn <<- EOF
 80         sanitize = "ASAN"
 84     bin/gn gen out/asan
 85     ninja -C out/asan
 
 | 
| /external/compiler-rt/test/asan/ | 
| D | CMakeLists.txt | 6 # TODO(wwchrome): Re-enable Win64 asan tests when ready.7 # Disable tests for asan Win64 temporarily.
 24   list(APPEND ASAN_TEST_DEPS asan)
 108 add_lit_testsuite(check-asan "Running the AddressSanitizer tests"
 112 set_target_properties(check-asan PROPERTIES FOLDER "Compiler-RT Misc")
 115   # Add check-dynamic-asan target. It is a part of check-all only on Windows,
 121   add_lit_testsuite(check-asan-dynamic
 125   set_target_properties(check-asan-dynamic
 132 # TODO(wwchrome): Re-enable the tests for asan Win64 when ready.
 
 | 
| /external/google-benchmark/.github/workflows/ | 
| D | sanitizer.yml | 18         sanitizer: ['asan', 'ubsan', 'tsan', 'msan']35     - name: configure asan env
 36       if: matrix.sanitizer == 'asan'
 47     - name: fine-tune asan options
 48       # in asan we get an error from std::regex. ignore it.
 49       if: matrix.sanitizer == 'asan'
 64     - name: build libc++ (non-asan)
 65       if: matrix.sanitizer != 'asan'
 
 | 
| /external/llvm/test/DebugInfo/COFF/ | 
| D | asan-module-without-functions.ll | 5 ; D:\asan.c:12 ; ModuleID = 'asan.c'
 17 … appending global [1 x { i32, void ()* }] [{ i32, void ()* } { i32 1, void ()* @asan.module_ctor }]
 18 @__asan_gen_ = private constant [7 x i8] c"asan.c\00", align 1
 21 … appending global [1 x { i32, void ()* }] [{ i32, void ()* } { i32 1, void ()* @asan.module_dtor }]
 23 define internal void @asan.module_ctor() {
 39 define internal void @asan.module_dtor() {
 49 !1 = !DIFile(filename: "asan.c", directory: "D:\5C")
 
 |