Home
last modified time | relevance | path

Searched refs:ASan (Results 1 – 25 of 25) sorted by relevance

/external/compiler-rt/lib/asan/
DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
Dasan_flags.inc10 // ASan runtime flags.
61 "ASan allocator flag. max_malloc_fill_size is the maximal amount of "
89 "If set, prints ASan exit stats even after program terminates "
125 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap "
Dasan_activation_flags.inc10 // A subset of ASan (and common) runtime flags supported at activation time.
DCMakeLists.txt62 # Compile ASan sources into an object library.
89 # Build ASan runtimes shipped with Clang.
/external/compiler-rt/lib/asan/tests/
DCMakeLists.txt37 # -gline-tables-only must be enough for ASan, so use it if possible.
123 # Link ASan unit test for a given architecture from a set
150 set_target_properties(AsanUnitTests PROPERTIES FOLDER "ASan unit tests")
155 PROPERTIES FOLDER "ASan unit tests with dynamic runtime")
156 # ASan benchmarks (not actively used now).
184 # Adds ASan unit tests and benchmarks for architecture.
210 # Add static ASan runtime that will be linked with uninstrumented tests.
267 # Test w/o ASan instrumentation. Link it with ASan statically.
279 # Test with ASan instrumentation. Link with ASan dynamic runtime.
Dasan_test.ignore1 # blacklisted functions for instrumented ASan unit test
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_common_interceptors.inc316 // FIXME: under ASan the call below may write to freed memory and corrupt
327 // FIXME: under ASan the call below may write to freed memory and corrupt
368 // FIXME: under ASan the call below may write to freed memory and corrupt
386 // FIXME: under ASan the call below may write to freed memory and corrupt
404 // FIXME: under ASan the call below may write to freed memory and corrupt
651 // FIXME: under ASan the call below may write to freed memory and corrupt
664 // FIXME: under ASan the call below may write to freed memory and corrupt
677 // FIXME: under ASan the call below may write to freed memory and corrupt
690 // FIXME: under ASan the call below may write to freed memory and corrupt
734 // FIXME: under ASan the call below may write to freed memory and corrupt
[all …]
/external/llvm/lib/Transforms/Instrumentation/
DAddressSanitizer.cpp506 AddressSanitizer &ASan; member
555 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner()
557 ASan(ASan), in FunctionStackPoisoner()
559 C(ASan.C), in FunctionStackPoisoner()
560 IntptrTy(ASan.IntptrTy), in FunctionStackPoisoner()
562 Mapping(ASan.Mapping), in FunctionStackPoisoner()
565 EmptyInlineAsm(CallInst::Create(ASan.EmptyAsm)) {} in FunctionStackPoisoner()
644 if (!ASan.isInterestingAlloca(AI)) return; in visitAllocaInst()
688 if (!ASan.getDominatorTree().dominates(I, Ret)) return false; in doesDominateAllExits()
1636 for (size_t LargeStoreSizeInBytes = ASan.LongSize / 8; in poisonRedZones()
[all …]
/external/compiler-rt/test/lsan/
Dlit.common.cfg3 # Common configuration for running leak detection tests under LSan/ASan.
19 # Choose between standalone and LSan+ASan modes.
/external/compiler-rt/test/ubsan/
Dlit.common.cfg17 # Choose between standalone and UBSan+ASan modes.
28 config.name = 'UBSan-ASan-' + config.target_arch
/external/compiler-rt/
DREADME.android31 * Cherry-pick on 2012/07/27: https://llvm.org/svn/llvm-project/compiler-rt/trunk@160853 for ASan (C…
32 * Cherry-pick on 2012/05/23: https://llvm.org/svn/llvm-project/compiler-rt/trunk@157318 for ASan (C…
/external/compiler-rt/test/asan/
DCMakeLists.txt89 set_target_properties(check-asan PROPERTIES FOLDER "ASan tests")
102 PROPERTIES FOLDER "ASan dynamic tests")
Dlit.cfg45 # GCC-ASan doesn't link in all the necessary libraries automatically, so
161 # GCC-ASan uses dynamic runtime by default.
/external/compiler-rt/test/tsan/Unit/
Dlit.site.cfg.in11 # it as build directory with ASan unit tests.
/external/llvm/test/Instrumentation/AddressSanitizer/
Dundecidable-dynamic-alloca-1.ll1 ; Test that undecidable dynamic allocas are skipped by ASan.
Dubsan.ll1 ; ASan shouldn't instrument code added by UBSan.
Dstack_layout.ll1 ; Test the ASan's stack layout.
/external/compiler-rt/test/asan/Unit/
Dlit.site.cfg.in18 # it as build directory with ASan unit tests.
/external/llvm/test/DebugInfo/COFF/
Dasan-module-ctor.ll17 ; Make sure we don't put any DWARF debug info for ASan-instrumented modules.
/external/llvm/test/Unit/
Dlit.cfg33 # Propagate path to symbolizer for ASan/MSan.
/external/clang/test/Unit/
Dlit.cfg35 # Propagate path to symbolizer for ASan/MSan.
/external/clang/include/clang/Basic/
DLangOptions.def226 LANGOPT(SanitizeAddressFieldPadding, 2, 0, "controls how aggressive is ASan "
/external/llvm/test/
Dlit.cfg93 # Propagate path to symbolizer for ASan/MSan.
/external/clang/test/
Dlit.cfg112 # Propagate path to symbolizer for ASan/MSan.
/external/mksh/src/
Dcheck.t7319 XXX fails when LD_PRELOAD is set with -e and Perl chokes it (ASan)