Home
last modified time | relevance | path

Searched full:sanitizer (Results 1 – 25 of 306) sorted by relevance

12345678910>>...13

/freebsd/contrib/llvm-project/clang/include/clang/Basic/
H A DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
10 // enable. Users of this file must define the SANITIZER macro to make use of
16 #ifndef SANITIZER
17 #error "Define SANITIZER prior to including this file!"
20 // SANITIZER(NAME, ID)
22 // The first value is the name of the sanitizer as a string. The sanitizer can
26 // sanitizer.
31 // The first two values have the same semantics as the corresponding SANITIZER
41 SANITIZER("address", Address)
44 SANITIZER("pointer-compare", PointerCompare)
[all …]
H A DCodeGenOptions.def264 CODEGENOPT(SanitizeMinimalRuntime, 1, 0) ///< Use "_minimal" sanitizer runtime for
272 CODEGENOPT(SanitizeCoverageType, 2, 0) ///< Type of sanitizer coverage
274 CODEGENOPT(SanitizeCoverageIndirectCalls, 1, 0) ///< Enable sanitizer coverage
277 ///< in sanitizer coverage.
279 ///< in sanitizer coverage.
281 ///< in sanitizer coverage.
283 ///< in sanitizer coverage.
285 ///< in sanitizer coverage.
287 ///< in sanitizer coverage.
289 ///< in sanitizer coverage.
/freebsd/share/man/man9/
H A Dkmsan.933 .Nd Kernel Memory SANitizer
114 The sanitizer in a KMSAN-configured kernel can be disabled by setting the loader
138 are not intercepted by the sanitizer; to avoid false positives, drivers should
191 reports from the sanitizer.
219 In some cases this is handled by the sanitizer runtime, which defines
234 In addition to the shadow maps, the sanitizer requires some thread-local
237 The sanitizer instrumentation will automatically fetch, update and
239 In particular, this storage block has a layout defined by the sanitizer
244 To ensure that thread-local sanitizer state remains consistent, the
253 functions in the sanitizer runtime.
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Utils/
H A DSanitizerStats.h1 //===- SanitizerStats.h - Sanitizer statistics gathering -------*- C++ -*-===//
9 // Declares functions and data structures for sanitizer statistics gathering.
20 // Number of bits in data that are used for the sanitizer kind. Needs to match
36 /// with the given sanitizer kind SK.
H A DModuleUtils.h55 /// Creates sanitizer constructor function.
59 /// Creates sanitizer constructor function, and calls sanitizer's init
68 /// Creates sanitizer constructor function lazily. If a constructor and init
/freebsd/contrib/llvm-project/clang/lib/Basic/
H A DSanitizers.cpp23 #define SANITIZER(NAME, ID) constexpr SanitizerMask SanitizerKind::ID; macro
31 #define SANITIZER(NAME, ID) .Case(NAME, SanitizerKind::ID) in parseSanitizerValue() macro
41 #define SANITIZER(NAME, ID) \ in serializeSanitizerSet() macro
48 #define SANITIZER(NAME, ID) in expandSanitizerGroups() macro
/freebsd/contrib/unbound/
H A DREADME-Travis.md30 ## Sanitizer builds
32sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i…
51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
/freebsd/contrib/ldns/
H A DREADME-Travis.md30 ## Sanitizer builds
32sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i…
51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/
H A DSanitizerCoverage.cpp89 "sanitizer-coverage-level",
90 cl::desc("Sanitizer Coverage. 0: none, 1: entry block, 2: all blocks, "
94 static cl::opt<bool> ClTracePC("sanitizer-coverage-trace-pc",
97 static cl::opt<bool> ClTracePCGuard("sanitizer-coverage-trace-pc-guard",
107 static cl::opt<bool> ClCreatePCTable("sanitizer-coverage-pc-table",
112 ClInline8bitCounters("sanitizer-coverage-inline-8bit-counters",
117 ClInlineBoolFlag("sanitizer-coverage-inline-bool-flag",
122 ClCMPTracing("sanitizer-coverage-trace-compares",
126 static cl::opt<bool> ClDIVTracing("sanitizer-coverage-trace-divs",
130 static cl::opt<bool> ClLoadTracing("sanitizer-coverage-trace-loads",
[all …]
H A DSanitizerBinaryMetadata.cpp91 "sanitizer-metadata-weak-callbacks",
95 ClNoSanitize("sanitizer-metadata-nosanitize-attr",
100 cl::opt<bool> ClEmitCovered("sanitizer-metadata-covered",
103 cl::opt<bool> ClEmitAtomics("sanitizer-metadata-atomics",
106 cl::opt<bool> ClEmitUAR("sanitizer-metadata-uar",
312 // Sanitizer function also don't leak or don't return. in isUARSafeCall()
/freebsd/lib/libclang_rt/include/
H A DMakefile3 .PATH: ${CRTSRC}/include/sanitizer
5 INCSDIR= ${CLANGDIR}/include/sanitizer
/freebsd/lib/libsys/x86/
H A DMakefile.sys17 # We can't use sanitizer instrumentation on ifuncs called during sanitizer
/freebsd/contrib/llvm-project/clang/lib/Driver/
H A DSanitizerArgs.cpp1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
128 /// provides some sanitizer kind from \p Mask. For example, the argument list
239 #define SANITIZER(NAME, ID) in setGroupBits() macro
251 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs()
321 // sanitizers disabled by the current sanitizer in SanitizerArgs()
346 // The object size sanitizer should not be enabled at -O0. in SanitizerArgs()
359 // The user explicitly enabled the object size sanitizer. Warn in SanitizerArgs()
368 // Avoid diagnosing any sanitizer which is disabled later. in SanitizerArgs()
463 // the vptr sanitizer requires RTTI, so this is a user error. in SanitizerArgs()
468 // The vptr sanitizer requires RTTI, but RTTI is disabled (by in SanitizerArgs()
[all …]
/freebsd/sys/contrib/libsodium/m4/
H A Dax_check_catchable_segv.m439 …d if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Ad…
/freebsd/
H A DObsoleteFiles.inc479 OLD_FILES+=usr/lib/clang/18/include/sanitizer/allocator_interface.h
480 OLD_FILES+=usr/lib/clang/18/include/sanitizer/asan_interface.h
481 OLD_FILES+=usr/lib/clang/18/include/sanitizer/common_interface_defs.h
482 OLD_FILES+=usr/lib/clang/18/include/sanitizer/coverage_interface.h
483 OLD_FILES+=usr/lib/clang/18/include/sanitizer/dfsan_interface.h
484 OLD_FILES+=usr/lib/clang/18/include/sanitizer/hwasan_interface.h
485 OLD_FILES+=usr/lib/clang/18/include/sanitizer/linux_syscall_hooks.h
486 OLD_FILES+=usr/lib/clang/18/include/sanitizer/lsan_interface.h
487 OLD_FILES+=usr/lib/clang/18/include/sanitizer/memprof_interface.h
488 OLD_FILES+=usr/lib/clang/18/include/sanitizer/msan_interfac
[all...]
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_win_dynamic_runtime_thunk.cpp10 // to interact with Sanitizer Common, when it is included in a dll.
16 // Define weak alias for all weak functions imported from sanitizer common.
H A Dsanitizer_coverage_win_dynamic_runtime_thunk.cpp10 // to interact with Sanitizer Coverage, when it is included in a dll.
16 // Define weak alias for all weak functions imported from sanitizer coverage.
H A Dsanitizer_fuchsia.h9 // Fuchsia-specific sanitizer support.
20 #include <zircon/sanitizer.h>
H A Dsanitizer_common_interface.inc8 // Sanitizer Common interface list.
25 // Sanitizer weak hooks
H A Dsanitizer_allocator_dlsym.h9 // Hack: Sanitizer initializer calls dlsym which may need to allocate and call
10 // back into uninitialized sanitizer.
/freebsd/contrib/llvm-project/compiler-rt/lib/stats/
H A Dstats.h9 // Data definitions for sanitizer statistics gathering.
20 // Number of bits in data that are used for the sanitizer kind. Needs to match
/freebsd/share/mk/
H A Dbsd.sanitizer.mk4 # Add the necessary sanitizer flags if requested
27 .error Sanitizer instrumentation currently only supported with clang
/freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/
H A DAArch64GlobalsTagging.cpp34 "Missing sanitizer metadata, but symbol is apparently tagged."); in shouldTagGlobal()
84 // sanitizer-instrumented global, then the interposer also needs to be in tagGlobalDefinition()
85 // sanitizer-instrumented. in tagGlobalDefinition()
/freebsd/crypto/openssl/include/internal/
H A Dtsan_assist.h23 * it upsets Thread Sanitizer. Suggested solution is
29 * bother. Having Thread Sanitizer accept "thread-opportunistic" code
32 * Resolving Thread Sanitizer nits was the initial purpose for this module,
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Instrumentation/
H A DAddressSanitizer.h34 /// Public interface to the address sanitizer module pass for instrumenting code
38 /// run intependently of the function address sanitizer.

12345678910>>...13