/external/chromium_org/chrome/app/ |
app_asan.saves | 6 # helper app executables built with AddressSanitizer 7 # (http://dev.chromium.org/developers/testing/addresssanitizer). 12 # AddressSanitizer should correspond to build/asan.saves 17 # AddressSanitizer-specific symbols.
|
/external/llvm/lib/Transforms/Instrumentation/ |
CMakeLists.txt | 2 AddressSanitizer.cpp
|
/external/chromium_org/build/ |
asan.saves | 6 # built for Mac OS X using AddressSanitizer 7 # (http://dev.chromium.org/developers/testing/addresssanitizer).
|
/external/compiler-rt/lib/asan/tests/ |
asan_test.cc | 10 // This file is a part of AddressSanitizer, an address sanity checker. 60 TEST(AddressSanitizer, HasFeatureAddressSanitizerTest) { 71 TEST(AddressSanitizer, SimpleDeathTest) { 75 TEST(AddressSanitizer, VariousMallocsTest) { 108 TEST(AddressSanitizer, CallocTest) { 114 TEST(AddressSanitizer, VallocTest) { 121 TEST(AddressSanitizer, PvallocTest) { 155 TEST(AddressSanitizer, DISABLED_TSDTest) { 164 TEST(AddressSanitizer, UAF_char) { 165 const char *uaf_string = "AddressSanitizer:.*heap-use-after-free" [all...] |
asan_oob_test.cc | 10 // This file is a part of AddressSanitizer, an address sanity checker. 64 // AddressSanitizer.OOB_char (125503 ms) 65 // AddressSanitizer.OOB_int (126890 ms) 66 // AddressSanitizer.OOBRightTest (315605 ms) 67 // AddressSanitizer.SimpleStackTest (366559 ms) 69 TEST(AddressSanitizer, OOB_char) { 73 TEST(AddressSanitizer, OOB_int) { 77 TEST(AddressSanitizer, OOBRightTest) { 102 TEST(AddressSanitizer, LargeOOBRightTest) { 112 TEST(AddressSanitizer, DISABLED_DemoOOBLeftLow) [all...] |
/external/clang/test/Driver/ |
darwin-asan-nofortify.c | 1 // Make sure AddressSanitizer disables _FORTIFY_SOURCE on Darwin.
|
/external/compiler-rt/lib/asan/ |
asan_blacklist.txt | 1 # Blacklist for AddressSanitizer. Turns off instrumentation of particular
|
README.txt | 0 AddressSanitizer RT 3 This directory contains sources of the AddressSanitizer (asan) run-time library. 4 We are in the process of integrating AddressSanitizer with LLVM, stay tuned.
|
/external/compiler-rt/lib/asan/lit_tests/Unit/ |
lit.site.cfg.in | 8 config.name = 'AddressSanitizer-Unit'
|
/external/clang/docs/ |
AddressSanitizer.rst | 2 AddressSanitizer 11 AddressSanitizer is a fast memory error detector. It consists of a compiler 20 Typical slowdown introduced by AddressSanitizer is **2x**. 32 AddressSanitizer run-time library should be linked to the final executable, so 34 shared libraries, the AddressSanitizer run-time is not linked, so 35 ``-Wl,-z,defs`` may cause link errors (don't use it with AddressSanitizer). To 63 exit with a non-zero exit code. Currently, AddressSanitizer does not symbolize 71 ==9442== ERROR: AddressSanitizer heap-use-after-free on address 0x7f7ddab8c084 at pc 0x403c8c bp 0x7fff87fb82d0 sp 0x7fff87fb82c8 86 AddressSanitizer exits on the first detected error. This is by design. 96 AddressSanitizer is enabled [all...] |
/external/chromium_org/webkit/tools/layout_tests/ |
test_expectations_asan.txt | 7 # ==12527== ERROR: AddressSanitizer: SEGV on unknown address 0x7f628058b38b 8 # AddressSanitizer can not provide additional info. 19 # ==15959== ERROR: AddressSanitizer: heap-use-after-free on address 0x7f6c187f8481 26 # ==17332== ERROR: AddressSanitizer: heap-use-after-free on address 0x7f48e8a05a58 40 # ==17931== ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 41 # AddressSanitizer can not provide additional info. 46 # ==5971== ERROR: AddressSanitizer: SEGV on unknown address 0x0000bbadbeef 47 # AddressSanitizer can not provide additional info. 52 # ==10454==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x00000558b918 sp 0x7fff3153dcf0 bp 0x7fff3153dcf0 T0) 53 # AddressSanitizer can not provide additional info [all...] |
/external/clang/test/Index/ |
annotate-deep-statements.cpp | 6 // AddressSanitizer increases stack usage.
|
/external/compiler-rt/lib/asan/lit_tests/TestCases/ |
stack-frame-demangle.cc | 11 // CHECK: ERROR: AddressSanitizer: stack-buffer-overflow
|
stack-oob-frames.cc | 41 // CHECK0: AddressSanitizer: stack-buffer-overflow 49 // CHECK1: AddressSanitizer: stack-buffer-overflow 53 // CHECK2: AddressSanitizer: stack-buffer-overflow 57 // CHECK3: AddressSanitizer: stack-buffer-overflow
|
use-after-poison.cc | 16 // CHECK: ERROR: AddressSanitizer: use-after-poison
|
use-after-scope.cc | 11 // CHECK: ERROR: AddressSanitizer: stack-use-after-scope
|
deep_stack_uaf.cc | 27 // CHECK: {{.*ERROR: AddressSanitizer: heap-use-after-free on address}}
|
double-free.cc | 11 // CHECK: AddressSanitizer: attempting double-free{{.*}}in thread T0
|
init-order-atexit.cc | 19 // CHECK-NOT: AddressSanitizer
|
invalid-free.cc | 10 // CHECK: AddressSanitizer: attempting free on address{{.*}}in thread T0
|
log_path_fork_test.cc.disabled | 22 // CHECK: ERROR: AddressSanitizer
|
memcmp_strict_test.cc | 13 // CHECK: AddressSanitizer: stack-buffer-overflow
|
memcmp_test.cc | 11 // CHECK: AddressSanitizer: stack-buffer-overflow
|
/external/compiler-rt/lib/asan/lit_tests/TestCases/Linux/ |
malloc_delete_mismatch.cc | 18 // CHECK: ERROR: AddressSanitizer: alloc-dealloc-mismatch (malloc vs operator delete) on 0x
|
syscalls.cc | 18 // CHECK: AddressSanitizer: stack-buffer-{{.*}}erflow
|