Home
last modified time | relevance | path

Searched refs:ASan (Results 1 – 25 of 38) sorted by relevance

12

/external/compiler-rt/lib/asan/
DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
DCMakeLists.txt51 # As a net result, this allows running ASan executables without LD_PRELOAD-ing the
52 # ASan runtime library.
76 # Compile ASan sources into an object library.
107 # Build ASan runtimes shipped with Clang.
Dasan_flags.inc10 // ASan runtime flags.
58 "ASan allocator flag. max_malloc_fill_size is the maximal amount of "
83 "If set, prints ASan exit stats even after program terminates "
116 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap "
Dasan_activation_flags.inc10 // A subset of ASan (and common) runtime flags supported at activation time.
/external/compiler-rt/lib/asan/tests/
DCMakeLists.txt42 # -gline-tables-only must be enough for ASan, so use it if possible.
142 # Link ASan unit test for a given architecture from a set
181 # ASan benchmarks (not actively used now).
209 # Adds ASan unit tests and benchmarks for architecture.
252 # Add static ASan runtime that will be linked with uninstrumented tests.
315 # Test w/o ASan instrumentation. Link it with ASan statically.
329 # Test with ASan instrumentation. Link with ASan dynamic runtime.
Dasan_test.ignore1 # blacklisted functions for instrumented ASan unit test
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_common_interceptors.inc660 // FIXME: under ASan the call below may write to freed memory and corrupt
671 // FIXME: under ASan the call below may write to freed memory and corrupt
712 // FIXME: under ASan the call below may write to freed memory and corrupt
730 // FIXME: under ASan the call below may write to freed memory and corrupt
748 // FIXME: under ASan the call below may write to freed memory and corrupt
995 // FIXME: under ASan the call below may write to freed memory and corrupt
1008 // FIXME: under ASan the call below may write to freed memory and corrupt
1021 // FIXME: under ASan the call below may write to freed memory and corrupt
1034 // FIXME: under ASan the call below may write to freed memory and corrupt
1078 // FIXME: under ASan the call below may write to freed memory and corrupt
[all …]
Dsanitizer_malloc_mac.inc58 // FIXME: ASan should support purgeable allocations.
65 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
71 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
/external/compiler-rt/test/lsan/
Dlit.common.cfg3 # Common configuration for running leak detection tests under LSan/ASan.
19 # Choose between standalone and LSan+ASan modes.
/external/llvm/lib/Transforms/Instrumentation/
DAddressSanitizer.cpp601 AddressSanitizer &ASan; member
640 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner()
642 ASan(ASan), in FunctionStackPoisoner()
644 C(ASan.C), in FunctionStackPoisoner()
645 IntptrTy(ASan.IntptrTy), in FunctionStackPoisoner()
647 Mapping(ASan.Mapping), in FunctionStackPoisoner()
649 EmptyInlineAsm(CallInst::Create(ASan.EmptyAsm)) {} in FunctionStackPoisoner()
726 if (!ASan.isInterestingAlloca(AI)) { in visitAllocaInst()
744 if (!ASan.UseAfterScope) in visitIntrinsicInst()
760 if (!AI || !ASan.isInterestingAlloca(*AI)) in visitIntrinsicInst()
[all …]
/external/compiler-rt/
DREADME.android31 * Cherry-pick on 2012/07/27: https://llvm.org/svn/llvm-project/compiler-rt/trunk@160853 for ASan (C…
32 * Cherry-pick on 2012/05/23: https://llvm.org/svn/llvm-project/compiler-rt/trunk@157318 for ASan (C…
/external/compiler-rt/test/ubsan/
Dlit.common.cfg18 # Choose between standalone and UBSan+ASan modes.
25 config.name = 'UBSan-ASan-' + config.target_arch
/external/compiler-rt/test/tsan/Unit/
Dlit.site.cfg.in10 # it as build directory with ASan unit tests.
/external/compiler-rt/test/asan/Unit/
Dlit.site.cfg.in17 # it as build directory with ASan unit tests.
/external/swiftshader/third_party/subzero/tests_lit/asan_tests/
Dfunc_ptr.ll1 ; Test that calls made through pointers are unchanged by ASan
/external/libxml2/
DCONTRIBUTING22 compiler flags, ASan and UBSan. Fork the libxml2 mirror on GitHub and set
/external/swiftshader/third_party/subzero/Makefile.standalone-help/
Dhelp.txt22 Enable ASan support, i.e. -fsanitize=address
/external/compiler-rt/test/asan/
Dlit.cfg55 # GCC-ASan doesn't link in all the necessary libraries automatically, so
183 # GCC-ASan uses dynamic runtime by default.
/external/llvm/test/Instrumentation/AddressSanitizer/
Dubsan.ll1 ; ASan shouldn't instrument code added by UBSan.
Dstack_layout.ll1 ; Test the ASan's stack layout.
/external/llvm/test/DebugInfo/COFF/
Dasan-module-ctor.ll17 ; Make sure we don't put any DWARF debug info for ASan-instrumented modules.
/external/llvm/test/Unit/
Dlit.cfg36 # Propagate path to symbolizer for ASan/MSan.
/external/clang/test/Unit/
Dlit.cfg35 # Propagate path to symbolizer for ASan/MSan.
/external/clang/docs/
DAddressSanitizer.rst75 the ASan library that is packaged with the compiler used to build the
79 the ASan library will also need to be copied over.
/external/libyuv/files/docs/
Ddeprecated_builds.md359 Sanitizers available: TSan, MSan, ASan, UBSan, LSan
399 ### Running Address Sanitizer (ASan)

12