HomeSort by relevance Sort by last modified time
    Searched full:addresssanitizer (Results 1 - 25 of 211) sorted by null

1 2 3 4 5 6 7 8 9

  /external/chromium_org/chrome/app/
app_asan.saves 6 # helper app executables built with AddressSanitizer
7 # (http://dev.chromium.org/developers/testing/addresssanitizer).
12 # AddressSanitizer should correspond to build/asan.saves
17 # AddressSanitizer-specific symbols.
  /external/llvm/lib/Transforms/Instrumentation/
CMakeLists.txt 2 AddressSanitizer.cpp
  /external/chromium_org/build/
asan.saves 6 # built for Mac OS X using AddressSanitizer
7 # (http://dev.chromium.org/developers/testing/addresssanitizer).
  /external/compiler-rt/lib/asan/tests/
asan_test.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
60 TEST(AddressSanitizer, HasFeatureAddressSanitizerTest) {
71 TEST(AddressSanitizer, SimpleDeathTest) {
75 TEST(AddressSanitizer, VariousMallocsTest) {
108 TEST(AddressSanitizer, CallocTest) {
114 TEST(AddressSanitizer, VallocTest) {
121 TEST(AddressSanitizer, PvallocTest) {
155 TEST(AddressSanitizer, DISABLED_TSDTest) {
164 TEST(AddressSanitizer, UAF_char) {
165 const char *uaf_string = "AddressSanitizer:.*heap-use-after-free"
    [all...]
asan_oob_test.cc 10 // This file is a part of AddressSanitizer, an address sanity checker.
64 // AddressSanitizer.OOB_char (125503 ms)
65 // AddressSanitizer.OOB_int (126890 ms)
66 // AddressSanitizer.OOBRightTest (315605 ms)
67 // AddressSanitizer.SimpleStackTest (366559 ms)
69 TEST(AddressSanitizer, OOB_char) {
73 TEST(AddressSanitizer, OOB_int) {
77 TEST(AddressSanitizer, OOBRightTest) {
102 TEST(AddressSanitizer, LargeOOBRightTest) {
112 TEST(AddressSanitizer, DISABLED_DemoOOBLeftLow)
    [all...]
  /external/clang/test/Driver/
darwin-asan-nofortify.c 1 // Make sure AddressSanitizer disables _FORTIFY_SOURCE on Darwin.
  /external/compiler-rt/lib/asan/
asan_blacklist.txt 1 # Blacklist for AddressSanitizer. Turns off instrumentation of particular
README.txt 0 AddressSanitizer RT
3 This directory contains sources of the AddressSanitizer (asan) run-time library.
4 We are in the process of integrating AddressSanitizer with LLVM, stay tuned.
  /external/compiler-rt/lib/asan/lit_tests/Unit/
lit.site.cfg.in 8 config.name = 'AddressSanitizer-Unit'
  /external/clang/docs/
AddressSanitizer.rst 2 AddressSanitizer
11 AddressSanitizer is a fast memory error detector. It consists of a compiler
20 Typical slowdown introduced by AddressSanitizer is **2x**.
32 AddressSanitizer run-time library should be linked to the final executable, so
34 shared libraries, the AddressSanitizer run-time is not linked, so
35 ``-Wl,-z,defs`` may cause link errors (don't use it with AddressSanitizer). To
63 exit with a non-zero exit code. Currently, AddressSanitizer does not symbolize
71 ==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8
86 AddressSanitizer exits on the first detected error. This is by design.
96 AddressSanitizer is enabled
    [all...]
  /external/chromium_org/webkit/tools/layout_tests/
test_expectations_asan.txt 7 # ==12527== ERROR: AddressSanitizer: SEGV on unknown address 0x7f628058b38b
8 # AddressSanitizer can not provide additional info.
19 # ==15959== ERROR: AddressSanitizer: heap-use-after-free on address 0x7f6c187f8481
26 # ==17332== ERROR: AddressSanitizer: heap-use-after-free on address 0x7f48e8a05a58
40 # ==17931== ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000
41 # AddressSanitizer can not provide additional info.
46 # ==5971== ERROR: AddressSanitizer: SEGV on unknown address 0x0000bbadbeef
47 # AddressSanitizer can not provide additional info.
52 # ==10454==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x00000558b918 sp 0x7fff3153dcf0 bp 0x7fff3153dcf0 T0)
53 # AddressSanitizer can not provide additional info
    [all...]
  /external/clang/test/Index/
annotate-deep-statements.cpp 6 // AddressSanitizer increases stack usage.
  /external/compiler-rt/lib/asan/lit_tests/TestCases/
stack-frame-demangle.cc 11 // CHECK: ERROR: AddressSanitizer: stack-buffer-overflow
stack-oob-frames.cc 41 // CHECK0: AddressSanitizer: stack-buffer-overflow
49 // CHECK1: AddressSanitizer: stack-buffer-overflow
53 // CHECK2: AddressSanitizer: stack-buffer-overflow
57 // CHECK3: AddressSanitizer: stack-buffer-overflow
use-after-poison.cc 16 // CHECK: ERROR: AddressSanitizer: use-after-poison
use-after-scope.cc 11 // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
deep_stack_uaf.cc 27 // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
double-free.cc 11 // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
init-order-atexit.cc 19 // CHECK-NOT: AddressSanitizer
invalid-free.cc 10 // CHECK: AddressSanitizer: attempting free on address{{.*}}in thread T0
log_path_fork_test.cc.disabled 22 // CHECK: ERROR: AddressSanitizer
memcmp_strict_test.cc 13 // CHECK: AddressSanitizer: stack-buffer-overflow
memcmp_test.cc 11 // CHECK: AddressSanitizer: stack-buffer-overflow
  /external/compiler-rt/lib/asan/lit_tests/TestCases/Linux/
malloc_delete_mismatch.cc 18 // CHECK: ERROR: AddressSanitizer: alloc-dealloc-mismatch (malloc vs operator delete) on 0x
syscalls.cc 18 // CHECK: AddressSanitizer: stack-buffer-{{.*}}erflow

Completed in 397 milliseconds

1 2 3 4 5 6 7 8 9