Searched refs:ASan (Results 1 – 25 of 25) sorted by relevance
/external/compiler-rt/lib/asan/ |
D | README.txt | 3 This directory contains sources of the AddressSanitizer (ASan) runtime library. 11 tests/* : ASan unit tests. 13 Also ASan runtime needs the following libraries: 17 ASan runtime currently also embeds part of LeakSanitizer runtime for 20 ASan runtime can only be built by CMake. You can run ASan tests
|
D | asan_flags.inc | 10 // ASan runtime flags. 61 "ASan allocator flag. max_malloc_fill_size is the maximal amount of " 89 "If set, prints ASan exit stats even after program terminates " 125 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap "
|
D | asan_activation_flags.inc | 10 // A subset of ASan (and common) runtime flags supported at activation time.
|
D | CMakeLists.txt | 62 # Compile ASan sources into an object library. 89 # Build ASan runtimes shipped with Clang.
|
/external/compiler-rt/lib/asan/tests/ |
D | CMakeLists.txt | 37 # -gline-tables-only must be enough for ASan, so use it if possible. 123 # Link ASan unit test for a given architecture from a set 150 set_target_properties(AsanUnitTests PROPERTIES FOLDER "ASan unit tests") 155 PROPERTIES FOLDER "ASan unit tests with dynamic runtime") 156 # ASan benchmarks (not actively used now). 184 # Adds ASan unit tests and benchmarks for architecture. 210 # Add static ASan runtime that will be linked with uninstrumented tests. 267 # Test w/o ASan instrumentation. Link it with ASan statically. 279 # Test with ASan instrumentation. Link with ASan dynamic runtime.
|
D | asan_test.ignore | 1 # blacklisted functions for instrumented ASan unit test
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_common_interceptors.inc | 316 // FIXME: under ASan the call below may write to freed memory and corrupt 327 // FIXME: under ASan the call below may write to freed memory and corrupt 368 // FIXME: under ASan the call below may write to freed memory and corrupt 386 // FIXME: under ASan the call below may write to freed memory and corrupt 404 // FIXME: under ASan the call below may write to freed memory and corrupt 651 // FIXME: under ASan the call below may write to freed memory and corrupt 664 // FIXME: under ASan the call below may write to freed memory and corrupt 677 // FIXME: under ASan the call below may write to freed memory and corrupt 690 // FIXME: under ASan the call below may write to freed memory and corrupt 734 // FIXME: under ASan the call below may write to freed memory and corrupt [all …]
|
/external/llvm/lib/Transforms/Instrumentation/ |
D | AddressSanitizer.cpp | 506 AddressSanitizer &ASan; member 555 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner() 557 ASan(ASan), in FunctionStackPoisoner() 559 C(ASan.C), in FunctionStackPoisoner() 560 IntptrTy(ASan.IntptrTy), in FunctionStackPoisoner() 562 Mapping(ASan.Mapping), in FunctionStackPoisoner() 565 EmptyInlineAsm(CallInst::Create(ASan.EmptyAsm)) {} in FunctionStackPoisoner() 644 if (!ASan.isInterestingAlloca(AI)) return; in visitAllocaInst() 688 if (!ASan.getDominatorTree().dominates(I, Ret)) return false; in doesDominateAllExits() 1636 for (size_t LargeStoreSizeInBytes = ASan.LongSize / 8; in poisonRedZones() [all …]
|
/external/compiler-rt/test/lsan/ |
D | lit.common.cfg | 3 # Common configuration for running leak detection tests under LSan/ASan. 19 # Choose between standalone and LSan+ASan modes.
|
/external/compiler-rt/test/ubsan/ |
D | lit.common.cfg | 17 # Choose between standalone and UBSan+ASan modes. 28 config.name = 'UBSan-ASan-' + config.target_arch
|
/external/compiler-rt/ |
D | README.android | 31 * Cherry-pick on 2012/07/27: https://llvm.org/svn/llvm-project/compiler-rt/trunk@160853 for ASan (C… 32 * Cherry-pick on 2012/05/23: https://llvm.org/svn/llvm-project/compiler-rt/trunk@157318 for ASan (C…
|
/external/compiler-rt/test/asan/ |
D | CMakeLists.txt | 89 set_target_properties(check-asan PROPERTIES FOLDER "ASan tests") 102 PROPERTIES FOLDER "ASan dynamic tests")
|
D | lit.cfg | 45 # GCC-ASan doesn't link in all the necessary libraries automatically, so 161 # GCC-ASan uses dynamic runtime by default.
|
/external/compiler-rt/test/tsan/Unit/ |
D | lit.site.cfg.in | 11 # it as build directory with ASan unit tests.
|
/external/llvm/test/Instrumentation/AddressSanitizer/ |
D | undecidable-dynamic-alloca-1.ll | 1 ; Test that undecidable dynamic allocas are skipped by ASan.
|
D | ubsan.ll | 1 ; ASan shouldn't instrument code added by UBSan.
|
D | stack_layout.ll | 1 ; Test the ASan's stack layout.
|
/external/compiler-rt/test/asan/Unit/ |
D | lit.site.cfg.in | 18 # it as build directory with ASan unit tests.
|
/external/llvm/test/DebugInfo/COFF/ |
D | asan-module-ctor.ll | 17 ; Make sure we don't put any DWARF debug info for ASan-instrumented modules.
|
/external/llvm/test/Unit/ |
D | lit.cfg | 33 # Propagate path to symbolizer for ASan/MSan.
|
/external/clang/test/Unit/ |
D | lit.cfg | 35 # Propagate path to symbolizer for ASan/MSan.
|
/external/clang/include/clang/Basic/ |
D | LangOptions.def | 226 LANGOPT(SanitizeAddressFieldPadding, 2, 0, "controls how aggressive is ASan "
|
/external/llvm/test/ |
D | lit.cfg | 93 # Propagate path to symbolizer for ASan/MSan.
|
/external/clang/test/ |
D | lit.cfg | 112 # Propagate path to symbolizer for ASan/MSan.
|
/external/mksh/src/ |
D | check.t | 7319 XXX fails when LD_PRELOAD is set with -e and Perl chokes it (ASan)
|