/external/compiler-rt/lib/asan/ |
D | README.txt | 3 This directory contains sources of the AddressSanitizer (ASan) runtime library. 11 tests/* : ASan unit tests. 13 Also ASan runtime needs the following libraries: 17 ASan runtime currently also embeds part of LeakSanitizer runtime for 20 ASan runtime can only be built by CMake. You can run ASan tests
|
D | CMakeLists.txt | 51 # As a net result, this allows running ASan executables without LD_PRELOAD-ing the 52 # ASan runtime library. 76 # Compile ASan sources into an object library. 107 # Build ASan runtimes shipped with Clang.
|
D | asan_flags.inc | 10 // ASan runtime flags. 58 "ASan allocator flag. max_malloc_fill_size is the maximal amount of " 83 "If set, prints ASan exit stats even after program terminates " 116 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap "
|
D | asan_activation_flags.inc | 10 // A subset of ASan (and common) runtime flags supported at activation time.
|
/external/compiler-rt/lib/asan/tests/ |
D | CMakeLists.txt | 42 # -gline-tables-only must be enough for ASan, so use it if possible. 142 # Link ASan unit test for a given architecture from a set 181 # ASan benchmarks (not actively used now). 209 # Adds ASan unit tests and benchmarks for architecture. 252 # Add static ASan runtime that will be linked with uninstrumented tests. 315 # Test w/o ASan instrumentation. Link it with ASan statically. 329 # Test with ASan instrumentation. Link with ASan dynamic runtime.
|
D | asan_test.ignore | 1 # blacklisted functions for instrumented ASan unit test
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_common_interceptors.inc | 660 // FIXME: under ASan the call below may write to freed memory and corrupt 671 // FIXME: under ASan the call below may write to freed memory and corrupt 712 // FIXME: under ASan the call below may write to freed memory and corrupt 730 // FIXME: under ASan the call below may write to freed memory and corrupt 748 // FIXME: under ASan the call below may write to freed memory and corrupt 995 // FIXME: under ASan the call below may write to freed memory and corrupt 1008 // FIXME: under ASan the call below may write to freed memory and corrupt 1021 // FIXME: under ASan the call below may write to freed memory and corrupt 1034 // FIXME: under ASan the call below may write to freed memory and corrupt 1078 // FIXME: under ASan the call below may write to freed memory and corrupt [all …]
|
D | sanitizer_malloc_mac.inc | 58 // FIXME: ASan should support purgeable allocations. 65 // FIXME: ASan should support purgeable allocations. Ignoring them is fine 71 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
|
/external/llvm/lib/Transforms/Instrumentation/ |
D | AddressSanitizer.cpp | 601 AddressSanitizer &ASan; member 640 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner() 642 ASan(ASan), in FunctionStackPoisoner() 644 C(ASan.C), in FunctionStackPoisoner() 645 IntptrTy(ASan.IntptrTy), in FunctionStackPoisoner() 647 Mapping(ASan.Mapping), in FunctionStackPoisoner() 649 EmptyInlineAsm(CallInst::Create(ASan.EmptyAsm)) {} in FunctionStackPoisoner() 726 if (!ASan.isInterestingAlloca(AI)) { in visitAllocaInst() 744 if (!ASan.UseAfterScope) in visitIntrinsicInst() 760 if (!AI || !ASan.isInterestingAlloca(*AI)) in visitIntrinsicInst() [all …]
|
/external/compiler-rt/test/lsan/ |
D | lit.common.cfg | 3 # Common configuration for running leak detection tests under LSan/ASan. 19 # Choose between standalone and LSan+ASan modes.
|
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Transforms/Instrumentation/ |
D | AddressSanitizer.cpp | 822 AddressSanitizer &ASan; member 863 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner() 865 ASan(ASan), in FunctionStackPoisoner() 867 C(ASan.C), in FunctionStackPoisoner() 868 IntptrTy(ASan.IntptrTy), in FunctionStackPoisoner() 870 Mapping(ASan.Mapping), in FunctionStackPoisoner() 872 EmptyInlineAsm(CallInst::Create(ASan.EmptyAsm)) {} in FunctionStackPoisoner() 966 if (!ASan.isInterestingAlloca(AI)) { in visitAllocaInst() 991 if (!ASan.UseAfterScope) in visitIntrinsicInst() 1007 if (!AI || !ASan.isInterestingAlloca(*AI)) in visitIntrinsicInst() [all …]
|
/external/compiler-rt/test/ubsan/ |
D | lit.common.cfg | 18 # Choose between standalone and UBSan+ASan modes. 25 config.name = 'UBSan-ASan-' + config.target_arch
|
/external/compiler-rt/ |
D | README.android | 31 * Cherry-pick on 2012/07/27: https://llvm.org/svn/llvm-project/compiler-rt/trunk@160853 for ASan (C… 32 * Cherry-pick on 2012/05/23: https://llvm.org/svn/llvm-project/compiler-rt/trunk@157318 for ASan (C…
|
/external/compiler-rt/test/tsan/Unit/ |
D | lit.site.cfg.in | 10 # it as build directory with ASan unit tests.
|
/external/compiler-rt/test/asan/Unit/ |
D | lit.site.cfg.in | 17 # it as build directory with ASan unit tests.
|
/external/swiftshader/third_party/subzero/tests_lit/asan_tests/ |
D | func_ptr.ll | 1 ; Test that calls made through pointers are unchanged by ASan
|
/external/libxml2/ |
D | CONTRIBUTING | 22 compiler flags, ASan and UBSan. Fork the libxml2 mirror on GitHub and set
|
/external/swiftshader/third_party/subzero/Makefile.standalone-help/ |
D | help.txt | 22 Enable ASan support, i.e. -fsanitize=address
|
/external/minijail/ |
D | Android.bp | 154 // Example ASan-ified libminijail shared library for target. 344 // Don't build with ASan, but leave commented out for easy local debugging.
|
/external/compiler-rt/test/asan/ |
D | lit.cfg | 55 # GCC-ASan doesn't link in all the necessary libraries automatically, so 183 # GCC-ASan uses dynamic runtime by default.
|
/external/llvm/test/Instrumentation/AddressSanitizer/ |
D | ubsan.ll | 1 ; ASan shouldn't instrument code added by UBSan.
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/Instrumentation/AddressSanitizer/ |
D | ubsan.ll | 1 ; ASan shouldn't instrument code added by UBSan.
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/DebugInfo/COFF/ |
D | asan-module-ctor.ll | 17 ; Make sure we don't put any DWARF debug info for ASan-instrumented modules.
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/Analysis/ScalarEvolution/ |
D | invalidation.ll | 39 ; debug pass printing continuing to match, ASan and other tools can catch it.
|
/external/llvm/test/DebugInfo/COFF/ |
D | asan-module-ctor.ll | 17 ; Make sure we don't put any DWARF debug info for ASan-instrumented modules.
|