Home
last modified time | relevance | path

Searched full:asan (Results 1 – 25 of 210) sorted by relevance

123456789

/freebsd/lib/libclang_rt/asan/
H A DMakefile3 LIB= clang_rt.asan-${CRTARCH}
5 SRCS+= asan/asan_activation.cpp
6 SRCS+= asan/asan_allocator.cpp
7 SRCS+= asan/asan_debugging.cpp
8 SRCS+= asan/asan_descriptions.cpp
9 SRCS+= asan/asan_errors.cpp
10 SRCS+= asan/asan_fake_stack.cpp
11 SRCS+= asan/asan_flags.cpp
12 SRCS+= asan/asan_globals.cpp
13 SRCS+= asan/asan_interceptors.cpp
[all …]
/freebsd/lib/libclang_rt/asan_dynamic/
H A DMakefile3 SHLIB_NAME= libclang_rt.asan-${CRTARCH}.so
8 SRCS+= asan/asan_activation.cpp
9 SRCS+= asan/asan_allocator.cpp
10 SRCS+= asan/asan_debugging.cpp
11 SRCS+= asan/asan_descriptions.cpp
12 SRCS+= asan/asan_errors.cpp
13 SRCS+= asan/asan_fake_stack.cpp
14 SRCS+= asan/asan_flags.cpp
15 SRCS+= asan/asan_globals.cpp
16 SRCS+= asan/asan_interceptors.cpp
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/gwp_asan/
H A Doptions.inc23 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY(
32 "selected for GWP-ASan sampling. Default is 5000. Sample rates "
35 // Developer note - This option is not actually processed by GWP-ASan itself. It
44 "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This "
46 "deallocation when reporting a memory error. GWP-ASan's signal handler "
54 "Install GWP-ASan's signal handler in recoverable mode. This means that "
55 "upon GWP-ASan detecting an error, it'll print the error report, but *not* "
60 "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.")
63 "Install GWP-ASan atfork handlers to acquire internal locks "
71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings
[all …]
H A Dcrash_handler.h13 // from retrieving new GWP-ASan allocations, which may corrupt the metadata.
24 // 1. The crash is unrelated to GWP-ASan - in which case this function returns
26 // 2. The crash is internally detected within GWP-ASan itself (e.g. a
28 // GWP-ASan will terminate the process). In this case - this function
31 // system, but GWP-ASan is responsible for the allocation. In this case -
42 // `ErrorPtr` is unrelated to GWP-ASan, or if the error type cannot be deduced,
56 // 3. If GWP-ASan wasn't responsible for the crash at all, this function also
76 // GWP-ASan, or information about the allocation that caused the error. These
98 // frames were stored by GWP-ASan). A return value greater than `BufferLen`
120 // frames were stored by GWP-ASan). A return value greater than `BufferLen`
H A Dcommon.h23 // Magic header that resides in the AllocatorState so that GWP-ASan bugreports
28 // of GWP-ASan it's extracting the information, as the structures are not
32 // `GuardedPoolAllocator::init()` so that GWP-ASan remains completely in the
60 // by GWP-ASan. If `AllocationMetadata.Addr` is zero, the metadata is non-valid.
109 // This holds the state that's shared between the GWP-ASan allocator and the
111 // set of information required for understanding a GWP-ASan crash.
153 // and DOUBLE_FREE, these errors are detected in GWP-ASan, which will set
160 // GWP-ASan structures are undisturbed. If they are disturbed, the version magic
163 // GWP-ASan structures into a minidump for offline reconstruction of the crash.
165 // version of GWP-ASan internal structures that it's unpacking (along with the
H A Dguarded_pool_allocator.h35 // ASan. It is the sole owner of the pool of sequentially allocated guarded
43 // Name of the GWP-ASan mapping that for `Metadata`.
44 static constexpr const char *kGwpAsanMetadataName = "GWP-ASan Metadata";
48 // GWP-ASan. The constructor value-initialises the class such that if no
142 static constexpr const char *kGwpAsanAliveSlotName = "GWP-ASan Alive Slot";
145 static constexpr const char *kGwpAsanGuardPageName = "GWP-ASan Guard Page";
147 static constexpr const char *kGwpAsanFreeSlotsName = "GWP-ASan Metadata";
167 // thing in GWP-ASan that treats pages in a single VM region on an individual
237 // GWP-ASan is disabled, we wish to never spend wasted cycles recalculating in ScopedRecursiveGuard()
H A Dguarded_pool_allocator.cpp48 // Note: We return from the constructor here if GWP-ASan is not available. in init()
55 check(Opts.SampleRate >= 0, "GWP-ASan Error: SampleRate is < 0."); in init()
56 check(Opts.SampleRate < (1 << 30), "GWP-ASan Error: SampleRate is >= 2^30."); in init()
58 "GWP-ASan Error: MaxSimultaneousAllocations is < 0."); in init()
166 // Note, minimum backing allocation size in GWP-ASan is always one page, and
205 // GuardedPagePoolEnd == 0 when GWP-ASan is disabled. If we are disabled, fall in allocate()
387 // GWP-ASan report (e.g. backtrace_symbols()), make sure that GWP-ASan doesn't in preCrashReport()
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/
H A DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
9 asan_*.{cc,h} : Sources of the asan runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
23 make check-asan
H A Dasan_globals_win.cpp18 #pragma section(".ASAN$GA", read, write)
19 #pragma section(".ASAN$GZ", read, write)
21 __declspec(allocate(".ASAN$GA")) __asan_global __asan_globals_start = {};
23 __declspec(allocate(".ASAN$GZ")) __asan_global __asan_globals_end = {};
24 #pragma comment(linker, "/merge:.ASAN=.data")
34 CHECK("corrupt asan global array"); in call_on_globals()
H A Dasan_linux.cpp105 // Since asan's mapping is compacting, the shadow chunk may be in FlushUnneededASanShadowMemory()
147 return internal_strstr(libname, "libclang_rt.asan") || in IsDynamicRTName()
152 Report("Your application is linked against incompatible ASan runtimes.\n"); in ReportIncompatibleRT()
165 "ASan runtime does not come first in initial library list; " in AsanCheckDynamicRTPrereqs()
182 // as early as possible, otherwise ASan interceptors could bind to in AsanCheckIncompatibleRT()
183 // the functions in dynamic ASan runtime instead of the functions in in AsanCheckIncompatibleRT()
184 // system libraries, causing crashes later in ASan initialization. in AsanCheckIncompatibleRT()
192 "incompatible ASan runtimes.\n"); in AsanCheckIncompatibleRT()
H A Dasan_win_dynamic_runtime_thunk.cpp12 // to interact with the ASan DLL runtime correctly and can't be implemented
16 // - creating weak aliases to default implementation imported from asan dll.
29 // Define weak alias for all weak functions imported from asan dll.
46 // The ASan MD runtime dllexports '__asan_option_detect_stack_use_after_return',
84 // unload or on exit. ASan relies on LLVM global_dtors to call
115 // ASan SEH handling.
116 // We need to set the ASan-specific SEH handler at the end of CRT initialization
H A Dasan_internal.h11 // ASan-private header which defines various general utilities.
30 // If set, asan will intercept C++ exception api call(s).
53 // All internal functions in asan reside inside the __asan namespace
55 // Separate namespace also makes it simpler to distinguish the asan run-time
122 // Returns `true` iff most of ASan init process should be skipped due to the
123 // ASan library being loaded via `dlopen()`. Platforms may perform any
H A Dasan_flags.h11 // ASan runtime flags.
20 // ASan flag values can be defined in four ways:
22 // 2) overriden during compilation of ASan runtime by providing
27 // 5) overriden during ASan activation (for now used on Android only).
H A Dasan_flags.inc9 // ASan runtime flags.
64 "ASan allocator flag. max_malloc_fill_size is the maximal amount of "
68 "ASan allocator flag. max_free_fill_size is the maximal amount of "
103 "If set, prints ASan exit stats even after program terminates "
136 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap "
163 "Check position of ASan runtime in library list (needs to be disabled"
/freebsd/contrib/llvm-project/compiler-rt/lib/gwp_asan/optional/
H A Doptions_parser.cpp67 InvokeIfNonNull(Printf, "GWP-ASan: Available options:\n"); in printOptionDescriptions()
92 InvokeIfNonNull(Printf, "GWP-ASan: Expected '=' when parsing option '%s'.", in parseOption()
103 InvokeIfNonNull(Printf, "GWP-ASan: Unterminated string in option '%s'.", in parseOption()
124 InvokeIfNonNull(Printf, "GWP-ASan: Options parsing failed.\n"); in parseOptions()
163 Printf, "GWP-ASan: Invalid boolean value '%s' for option '%s'.\n", in setOptionToValue()
174 Printf, "GWP-ASan: Invalid integer value '%s' for option '%s'.\n", in setOptionToValue()
181 InvokeIfNonNull(Printf, "GWP-ASan: Unknown option '%s'.", Name); in setOptionToValue()
188 "GWP-ASan Error: Ran out of space for options.\n"); in registerOption()
239 "GWP-ASan ERROR: MaxSimultaneousAllocations must be > 0 when GWP-ASan " in initOptions()
246 "GWP-ASan ERROR: SampleRate must be > 0 when GWP-ASan is enabled.\n"); in initOptions()
H A Dsegv_handler_posix.cpp37 ~ScopedEndOfReportDecorator() { Printf("*** End GWP-ASan report ***\n"); } in ~ScopedEndOfReportDecorator()
104 "GWP-ASan cannot provide any more information about this error. This may "
105 "occur due to a wild memory access into the GWP-ASan pool, or an "
116 "dumpReport() called on a non-GWP-ASan error."); in dumpReport()
129 Printf("*** GWP-ASan detected a memory error ***\n"); in dumpReport()
145 Printf("*** GWP-ASan detected a memory error ***\n"); in dumpReport()
215 // Process any previous handlers as long as the crash wasn't a GWP-ASan crash in sigSegvHandler()
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/
H A DAddressSanitizer.cpp94 #define DEBUG_TYPE "asan"
131 const char kAsanModuleCtorName[] = "asan.module_ctor";
132 const char kAsanModuleDtorName[] = "asan.module_dtor";
163 // ASan version script has __asan_* wildcard. Triple underscore prevents a
197 "asan-kernel", cl::desc("Enable KernelAddressSanitizer instrumentation"),
201 "asan-recover",
206 "asan-guard-against-version-mismatch",
210 // This flag may need to be replaced with -f[no-]asan-reads.
211 static cl::opt<bool> ClInstrumentReads("asan-instrument-reads",
216 "asan-instrument-writes", cl::desc("instrument write instructions"),
[all …]
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Instrumentation/
H A DAddressSanitizerOptions.h15 /// Types of ASan module destructors supported
17 None, ///< Do not emit any destructors for ASan
22 /// Types of ASan module constructors supported
28 /// Mode of ASan detect stack use after return
/freebsd/sys/conf/
H A Dkern.mk257 SAN_CFLAGS+= -mllvm -asan-stack=true \
258 -mllvm -asan-instrument-dynamic-allocas=true \
259 -mllvm -asan-globals=true \
260 -mllvm -asan-use-after-scope=true \
261 -mllvm -asan-instrumentation-with-call-threshold=0 \
262 -mllvm -asan-instrument-byval=false
266 # KASAN/ARM64 TODO: -asan-mapping-offset is calculated from:
274 SAN_CFLAGS+= -mllvm -asan-mapping-offset=0xdfff208000000000
281 # an assertion failure compiling dtrace.c with asan enabled.
282 SAN_CFLAGS+= -mllvm -asan-use-stack-safety=0
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_common_interceptors.inc974 // FIXME: under ASan the call below may write to freed memory and corrupt
992 // FIXME: under ASan the call below may write to freed memory and corrupt
1009 // FIXME: under ASan the call below may write to freed memory and corrupt
1027 // FIXME: under ASan the call below may write to freed memory and corrupt
1205 // FIXME: under ASan the call below may write to freed memory and corrupt
1354 // FIXME: under ASan the call below may write to freed memory and corrupt
1367 // FIXME: under ASan the call below may write to freed memory and corrupt
1380 // FIXME: under ASan the call below may write to freed memory and corrupt
1393 // FIXME: under ASan the call below may write to freed memory and corrupt
1437 // FIXME: under ASan the call below may write to freed memory and corrupt
[all …]
/freebsd/sys/contrib/zstd/
H A DTESTING.md20 - The following tests run with UBsan and Asan on x86_64 and x86, as well as with
35 - x86_64 and x86 with UBsan and Asan
41 - `pzstd` with asan and tsan, as well as in 32-bits mode
/freebsd/lib/libclang_rt/asan-preinit/
H A DMakefile3 LIB= clang_rt.asan-preinit-${CRTARCH}
5 SRCS+= asan/asan_preinit.cpp
/freebsd/lib/libclang_rt/asan_static/
H A DMakefile5 SRCS+= asan/asan_rtl_static.cpp
6 SRCS+= asan/asan_rtl_x86_64.S
/freebsd/crypto/openssl/fuzz/
H A DREADME.md27 -DPEDANTIC enable-asan enable-ubsan no-shared \
65 -DPEDANTIC enable-asan enable-ubsan no-shared \
89 The following options can also be enabled: enable-asan, enable-ubsan, enable-msan
104 above might be needed. For instance the enable-asan or enable-ubsan option might
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Utils/
H A DASanStackFrameLayout.h22 // in asan_internal.h from ASan runtime in compiler-rt.
31 const char *Name; // Name of the variable that will be displayed by asan
60 // Compute frame description, see DescribeAddressIfStack in ASan runtime.

123456789