HomeSort by relevance Sort by last modified time
    Searched full:addresssanitizer (Results 1 - 25 of 79) sorted by null

1 2 3 4

  /external/llvm/lib/Transforms/Instrumentation/
CMakeLists.txt 2 AddressSanitizer.cpp
AddressSanitizer.cpp 1 //===-- AddressSanitizer.cpp - memory error detector ------------*- C++ -*-===//
10 // This file is a part of AddressSanitizer, an address sanity checker.
130 /// AddressSanitizer: instrument the code in module to find memory bugs.
131 struct AddressSanitizer : public ModulePass {
132 AddressSanitizer();
188 char AddressSanitizer::ID = 0;
189 INITIALIZE_PASS(AddressSanitizer, "asan",
190 "AddressSanitizer: detects use-after-free and out-of-bounds bugs.",
192 AddressSanitizer::AddressSanitizer() : ModulePass(ID) {
    [all...]
Android.mk 4 AddressSanitizer.cpp \
  /external/compiler-rt/lib/asan/output_tests/
null_deref.cc 9 // Check-Common: {{.*ERROR: AddressSanitizer crashed on unknown address}}
11 // Check-Common: {{AddressSanitizer can not provide additional info. ABORTING}}
memcmp_test.cc 5 // Check-Common: AddressSanitizer stack-buffer-overflow
deep_tail_call.cc 1 // Check-Common: AddressSanitizer global-buffer-overflow
shared-lib-test.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
39 // Check-Common: {{.*ERROR: AddressSanitizer global-buffer-overflow}}
dlclose-test-so.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
large_func_test.cc 35 // Check-Common: {{.*ERROR: AddressSanitizer heap-buffer-overflow on address}}
shared-lib-test-so.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
  /external/compiler-rt/lib/asan/
CMakeLists.txt 1 # Build for the AddressSanitizer runtime support library.
README.txt 0 AddressSanitizer RT
3 This directory contains sources of the AddressSanitizer (asan) run-time library.
4 We are in the process of integrating AddressSanitizer with LLVM, stay tuned.
asan_stats.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
12 // Code related to statistics collected by AddressSanitizer.
  /external/clang/docs/
AddressSanitizer.html 7 <title>AddressSanitizer, a fast memory error detector</title>
22 <h1>AddressSanitizer</h1>
35 AddressSanitizer is a fast memory error detector.
43 Typical slowdown introduced by AddressSanitizer is <b>2x</b>.
73 Currently, AddressSanitizer does not symbolize its output, so you may need to use a
78 ==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8
96 AddressSanitizer is enabled.
101 code that runs only under AddressSanitizer
103 code that does not run under AddressSanitizer
108 AddressSanitizer is supported o
    [all...]
  /external/compiler-rt/lib/asan/tests/
asan_test.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
136 TEST(AddressSanitizer, HasFeatureAddressSanitizerTest) {
145 TEST(AddressSanitizer, SimpleDeathTest) {
149 TEST(AddressSanitizer, VariousMallocsTest) {
187 TEST(AddressSanitizer, CallocTest) {
193 TEST(AddressSanitizer, VallocTest) {
200 TEST(AddressSanitizer, PvallocTest) {
234 TEST(AddressSanitizer, DISABLED_TSDTest) {
275 // AddressSanitizer.OOB_char (125503 ms)
276 // AddressSanitizer.OOB_int (126890 ms
    [all...]
asan_benchmarks_test.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
45 TEST(AddressSanitizer, ManyAccessBenchmark) {
67 TEST(AddressSanitizer, BorderAccessBenchmark) {
78 TEST(AddressSanitizer, FakeStackBenchmark) {
asan_noinst_test.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
37 TEST(AddressSanitizer, InternalSimpleDeathTest) {
87 TEST(AddressSanitizer, NoInstMallocTest) {
110 TEST(AddressSanitizer, DISABLED_InternalPrintShadow) {
232 TEST(AddressSanitizer, CompressStackTraceTest) {
252 TEST(AddressSanitizer, CompressStackTraceBenchmark) {
256 TEST(AddressSanitizer, QuarantineTest) {
291 TEST(AddressSanitizer, ThreadedQuarantineTest) {
320 TEST(AddressSanitizer, ThreadedOneSizeMallocStressTest) {
asan_mac_test.mm 43 // If AddressSanitizer doesn't instrument the +load method below correctly,
47 "If your test didn't crash, AddressSanitizer is instrumenting "
85 // pthread_create(). We need to verify that AddressSanitizer notices that the
96 // pthread_create(). We need to verify that AddressSanitizer notices that the
104 // to make sure AddressSanitizer handles the reusing correctly.
asan_break_optimization.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
  /external/llvm/test/Instrumentation/AddressSanitizer/
instrument-no-return.ll 2 ; AddressSanitizer must insert __asan_handle_no_return
instrument_load_then_store.ll 1 ; Test that AddressSanitizer instruments "(*a)++" only once.
  /external/clang/test/CodeGen/
address-safety-attr.cpp 5 // when AddressSanitizer is enabled, unless no_address_safety_analysis attribute
  /external/compiler-rt/lib/asan/interception/
interception_linux.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
interception_linux.h 10 // This file is a part of AddressSanitizer, an address sanity checker.
interception_mac.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.

Completed in 132 milliseconds

1 2 3 4