Lines Matching defs:AddressSanitizer

1 //===-- AddressSanitizer.cpp - memory error detector ------------*- C++ -*-===//
10 // This file is a part of AddressSanitizer, an address sanity checker.
361 /// AddressSanitizer: instrument the code in module to find memory bugs.
362 struct AddressSanitizer : public FunctionPass {
363 AddressSanitizer() : FunctionPass(ID) {}
458 AddressSanitizer &ASan;
486 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan)
583 char AddressSanitizer::ID = 0;
584 INITIALIZE_PASS(AddressSanitizer, "asan",
585 "AddressSanitizer: detects use-after-free and out-of-bounds bugs.",
588 return new AddressSanitizer();
593 "AddressSanitizer: detects use-after-free and out-of-bounds bugs."
624 Value *AddressSanitizer::memToShadow(Value *Shadow, IRBuilder<> &IRB) {
637 void AddressSanitizer::instrumentMemIntrinsic(MemIntrinsic *MI) {
709 bool AddressSanitizer::GlobalIsLinkerInitialized(GlobalVariable *G) {
717 AddressSanitizer::instrumentPointerComparisonOrSubtraction(Instruction *I) {
728 void AddressSanitizer::instrumentMop(Instruction *I, bool UseCalls) {
792 // function of AddressSanitizer. If the instrumented module defines a function
798 report_fatal_error("trying to redefine an AddressSanitizer "
802 Instruction *AddressSanitizer::generateCrashCode(
817 Value *AddressSanitizer::createSlowPathCmp(IRBuilder<> &IRB, Value *AddrLong,
835 void AddressSanitizer::instrumentAddress(Instruction *OrigIns,
1182 void AddressSanitizer::initializeCallbacks(Module &M) {
1238 bool AddressSanitizer::doInitialization(Module &M) {
1268 bool AddressSanitizer::maybeInsertAsanInitAtFunctionEntry(Function &F) {
1284 void AddressSanitizer::InjectCoverageAtBlock(Function &F, BasicBlock &BB) {
1338 bool AddressSanitizer::InjectCoverage(Function &F,
1352 bool AddressSanitizer::runOnFunction(Function &F) {
1487 bool AddressSanitizer::LooksLikeCodeInBug11395(Instruction *I) {