Lines Matching defs:ASan

163 // ASan version script has __asan_* wildcard. Triple underscore prevents a
356 cl::desc("Sets the ASan constructor kind"),
426 cl::desc("Place ASan constructors in comdat sections"),
431 cl::desc("Sets the ASan destructor kind. The default is to use the value "
996 AddressSanitizer &ASan;
1034 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan,
1036 : F(F), ASan(ASan), RTCI(RTCI),
1037 DIB(*F.getParent(), /*AllowUnresolved*/ false), C(ASan.C),
1038 IntptrTy(ASan.IntptrTy),
1040 Mapping(ASan.Mapping),
1152 if (!ASan.isInterestingAlloca(AI) || isa<ScalableVectorType>(AllocaType) ||
1177 if (!ASan.UseAfterScope)
1181 // Found lifetime intrinsic, add ASan instrumentation if necessary.
1200 if (!ASan.isInterestingAlloca(*AI))
1212 HasInlineAsm |= CI->isInlineAsm() && &CB != ASan.LocalDynamicShadow;
2273 // Create a separate metadata global and put it in the appropriate ASan
3111 if (ASan.UseAfterReturn == AsanDetectStackUseAfterReturnMode::Always ||
3112 ASan.UseAfterReturn == AsanDetectStackUseAfterReturnMode::Runtime) {
3114 ASan.UseAfterReturn == AsanDetectStackUseAfterReturnMode::Always
3126 if (ASan.UseAfterScope) {
3157 std::min<size_t>(sizeof(uint64_t), ASan.LongSize / 8);
3226 if (j - i >= ASan.MaxInlinePoisoningSize) {
3251 if (CopyInsertPoint == ASan.LocalDynamicShadow) {
3325 assert(ASan.isInterestingAlloca(*APC.AI));
3348 AddressSanitizer &ASan, Instruction &InsBefore,
3365 // ASan to instrument. These are moved up before InsBefore, and they're
3368 if (!Alloca || ASan.isInterestingAlloca(*Alloca))
3424 findStoresToUninstrumentedArgAllocas(ASan, *InsBefore, ArgInitInsts);
3436 ASan.getAllocaSizeInBytes(*AI),
3448 uint64_t MinHeaderSize = std::max((uint64_t)ASan.LongSize / 2, Granularity);
3461 assert(ASan.isInterestingAlloca(*APC.AI));
3479 ASan.UseAfterReturn != AsanDetectStackUseAfterReturnMode::Never &&
3480 !ASan.CompileKernel && LocalStackSize <= kMaxStackMallocSize;
3502 if (ASan.UseAfterReturn == AsanDetectStackUseAfterReturnMode::Runtime) {
3525 // assert(ASan.UseAfterReturn == AsanDetectStackUseAfterReturnMode:Always)
3563 "Variable descriptions relative to ASan stack base will be dropped");
3584 ConstantInt::get(IntptrTy, ASan.LongSize / 8)),
3594 ConstantInt::get(IntptrTy, 2 * ASan.LongSize / 8)),
3601 Value *ShadowBase = ASan.memToShadow(LocalStackBase, IRB);
3650 if (ASan.MaxInlinePoisoningSize != 0 && StackMallocIdx <= 4) {
3658 ConstantInt::get(IntptrTy, ClassSize - ASan.LongSize / 8));
3685 // For now just insert the call to ASan runtime.