/freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
H A D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 10 // enable. Users of this file must define the SANITIZER macro to make use of 16 #ifndef SANITIZER 17 #error "Define SANITIZER prior to including this file!" 20 // SANITIZER(NAME, ID) 22 // The first value is the name of the sanitizer as a string. The sanitizer can 26 // sanitizer. 31 // The first two values have the same semantics as the corresponding SANITIZER 41 SANITIZER("address", Address) 44 SANITIZER("pointer-compare", PointerCompare) [all …]
|
H A D | CodeGenOptions.def | 264 CODEGENOPT(SanitizeMinimalRuntime, 1, 0) ///< Use "_minimal" sanitizer runtime for 272 CODEGENOPT(SanitizeCoverageType, 2, 0) ///< Type of sanitizer coverage 274 CODEGENOPT(SanitizeCoverageIndirectCalls, 1, 0) ///< Enable sanitizer coverage 277 ///< in sanitizer coverage. 279 ///< in sanitizer coverage. 281 ///< in sanitizer coverage. 283 ///< in sanitizer coverage. 285 ///< in sanitizer coverage. 287 ///< in sanitizer coverage. 289 ///< in sanitizer coverage.
|
/freebsd/share/man/man9/ |
H A D | kmsan.9 | 33 .Nd Kernel Memory SANitizer 114 The sanitizer in a KMSAN-configured kernel can be disabled by setting the loader 138 are not intercepted by the sanitizer; to avoid false positives, drivers should 191 reports from the sanitizer. 219 In some cases this is handled by the sanitizer runtime, which defines 234 In addition to the shadow maps, the sanitizer requires some thread-local 237 The sanitizer instrumentation will automatically fetch, update and 239 In particular, this storage block has a layout defined by the sanitizer 244 To ensure that thread-local sanitizer state remains consistent, the 253 functions in the sanitizer runtime.
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Utils/ |
H A D | SanitizerStats.h | 1 //===- SanitizerStats.h - Sanitizer statistics gathering -------*- C++ -*-===// 9 // Declares functions and data structures for sanitizer statistics gathering. 20 // Number of bits in data that are used for the sanitizer kind. Needs to match 36 /// with the given sanitizer kind SK.
|
H A D | ModuleUtils.h | 55 /// Creates sanitizer constructor function. 59 /// Creates sanitizer constructor function, and calls sanitizer's init 68 /// Creates sanitizer constructor function lazily. If a constructor and init
|
/freebsd/contrib/llvm-project/clang/lib/Basic/ |
H A D | Sanitizers.cpp | 23 #define SANITIZER(NAME, ID) constexpr SanitizerMask SanitizerKind::ID; macro 31 #define SANITIZER(NAME, ID) .Case(NAME, SanitizerKind::ID) in parseSanitizerValue() macro 41 #define SANITIZER(NAME, ID) \ in serializeSanitizerSet() macro 48 #define SANITIZER(NAME, ID) in expandSanitizerGroups() macro
|
/freebsd/contrib/unbound/ |
H A D | README-Travis.md | 30 ## Sanitizer builds 32 …sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i… 51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
|
/freebsd/contrib/ldns/ |
H A D | README-Travis.md | 30 ## Sanitizer builds 32 …sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i… 51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/ |
H A D | SanitizerCoverage.cpp | 89 "sanitizer-coverage-level", 90 cl::desc("Sanitizer Coverage. 0: none, 1: entry block, 2: all blocks, " 94 static cl::opt<bool> ClTracePC("sanitizer-coverage-trace-pc", 97 static cl::opt<bool> ClTracePCGuard("sanitizer-coverage-trace-pc-guard", 107 static cl::opt<bool> ClCreatePCTable("sanitizer-coverage-pc-table", 112 ClInline8bitCounters("sanitizer-coverage-inline-8bit-counters", 117 ClInlineBoolFlag("sanitizer-coverage-inline-bool-flag", 122 ClCMPTracing("sanitizer-coverage-trace-compares", 126 static cl::opt<bool> ClDIVTracing("sanitizer-coverage-trace-divs", 130 static cl::opt<bool> ClLoadTracing("sanitizer-coverage-trace-loads", [all …]
|
H A D | SanitizerBinaryMetadata.cpp | 91 "sanitizer-metadata-weak-callbacks", 95 ClNoSanitize("sanitizer-metadata-nosanitize-attr", 100 cl::opt<bool> ClEmitCovered("sanitizer-metadata-covered", 103 cl::opt<bool> ClEmitAtomics("sanitizer-metadata-atomics", 106 cl::opt<bool> ClEmitUAR("sanitizer-metadata-uar", 312 // Sanitizer function also don't leak or don't return. in isUARSafeCall()
|
/freebsd/lib/libclang_rt/include/ |
H A D | Makefile | 3 .PATH: ${CRTSRC}/include/sanitizer 5 INCSDIR= ${CLANGDIR}/include/sanitizer
|
/freebsd/lib/libsys/x86/ |
H A D | Makefile.sys | 17 # We can't use sanitizer instrumentation on ifuncs called during sanitizer
|
/freebsd/contrib/llvm-project/clang/lib/Driver/ |
H A D | SanitizerArgs.cpp | 1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===// 128 /// provides some sanitizer kind from \p Mask. For example, the argument list 239 #define SANITIZER(NAME, ID) in setGroupBits() macro 251 // sanitizers disabled by the current sanitizer in parseSanitizeTrapArgs() 321 // sanitizers disabled by the current sanitizer in SanitizerArgs() 346 // The object size sanitizer should not be enabled at -O0. in SanitizerArgs() 359 // The user explicitly enabled the object size sanitizer. Warn in SanitizerArgs() 368 // Avoid diagnosing any sanitizer which is disabled later. in SanitizerArgs() 463 // the vptr sanitizer requires RTTI, so this is a user error. in SanitizerArgs() 468 // The vptr sanitizer requires RTTI, but RTTI is disabled (by in SanitizerArgs() [all …]
|
/freebsd/sys/contrib/libsodium/m4/ |
H A D | ax_check_catchable_segv.m4 | 39 …d if you enabled a tool such as Address Sanitizer (-fsanitize=address), but be aware that using Ad…
|
/freebsd/ |
H A D | ObsoleteFiles.inc | 479 OLD_FILES+=usr/lib/clang/18/include/sanitizer/allocator_interface.h 480 OLD_FILES+=usr/lib/clang/18/include/sanitizer/asan_interface.h 481 OLD_FILES+=usr/lib/clang/18/include/sanitizer/common_interface_defs.h 482 OLD_FILES+=usr/lib/clang/18/include/sanitizer/coverage_interface.h 483 OLD_FILES+=usr/lib/clang/18/include/sanitizer/dfsan_interface.h 484 OLD_FILES+=usr/lib/clang/18/include/sanitizer/hwasan_interface.h 485 OLD_FILES+=usr/lib/clang/18/include/sanitizer/linux_syscall_hooks.h 486 OLD_FILES+=usr/lib/clang/18/include/sanitizer/lsan_interface.h 487 OLD_FILES+=usr/lib/clang/18/include/sanitizer/memprof_interface.h 488 OLD_FILES+=usr/lib/clang/18/include/sanitizer/msan_interfac [all...] |
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_win_dynamic_runtime_thunk.cpp | 10 // to interact with Sanitizer Common, when it is included in a dll. 16 // Define weak alias for all weak functions imported from sanitizer common.
|
H A D | sanitizer_coverage_win_dynamic_runtime_thunk.cpp | 10 // to interact with Sanitizer Coverage, when it is included in a dll. 16 // Define weak alias for all weak functions imported from sanitizer coverage.
|
H A D | sanitizer_fuchsia.h | 9 // Fuchsia-specific sanitizer support. 20 #include <zircon/sanitizer.h>
|
H A D | sanitizer_common_interface.inc | 8 // Sanitizer Common interface list. 25 // Sanitizer weak hooks
|
H A D | sanitizer_allocator_dlsym.h | 9 // Hack: Sanitizer initializer calls dlsym which may need to allocate and call 10 // back into uninitialized sanitizer.
|
/freebsd/contrib/llvm-project/compiler-rt/lib/stats/ |
H A D | stats.h | 9 // Data definitions for sanitizer statistics gathering. 20 // Number of bits in data that are used for the sanitizer kind. Needs to match
|
/freebsd/share/mk/ |
H A D | bsd.sanitizer.mk | 4 # Add the necessary sanitizer flags if requested 27 .error Sanitizer instrumentation currently only supported with clang
|
/freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/ |
H A D | AArch64GlobalsTagging.cpp | 34 "Missing sanitizer metadata, but symbol is apparently tagged."); in shouldTagGlobal() 84 // sanitizer-instrumented global, then the interposer also needs to be in tagGlobalDefinition() 85 // sanitizer-instrumented. in tagGlobalDefinition()
|
/freebsd/crypto/openssl/include/internal/ |
H A D | tsan_assist.h | 23 * it upsets Thread Sanitizer. Suggested solution is 29 * bother. Having Thread Sanitizer accept "thread-opportunistic" code 32 * Resolving Thread Sanitizer nits was the initial purpose for this module,
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Instrumentation/ |
H A D | AddressSanitizer.h | 34 /// Public interface to the address sanitizer module pass for instrumenting code 38 /// run intependently of the function address sanitizer.
|