/freebsd/lib/libclang_rt/asan/ |
H A D | Makefile | 3 LIB= clang_rt.asan-${CRTARCH} 5 SRCS+= asan/asan_activation.cpp 6 SRCS+= asan/asan_allocator.cpp 7 SRCS+= asan/asan_debugging.cpp 8 SRCS+= asan/asan_descriptions.cpp 9 SRCS+= asan/asan_errors.cpp 10 SRCS+= asan/asan_fake_stack.cpp 11 SRCS+= asan/asan_flags.cpp 12 SRCS+= asan/asan_globals.cpp 13 SRCS+= asan/asan_interceptors.cpp [all …]
|
/freebsd/lib/libclang_rt/asan_dynamic/ |
H A D | Makefile | 3 SHLIB_NAME= libclang_rt.asan-${CRTARCH}.so 8 SRCS+= asan/asan_activation.cpp 9 SRCS+= asan/asan_allocator.cpp 10 SRCS+= asan/asan_debugging.cpp 11 SRCS+= asan/asan_descriptions.cpp 12 SRCS+= asan/asan_errors.cpp 13 SRCS+= asan/asan_fake_stack.cpp 14 SRCS+= asan/asan_flags.cpp 15 SRCS+= asan/asan_globals.cpp 16 SRCS+= asan/asan_interceptors.cpp [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/gwp_asan/ |
H A D | options.inc | 23 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY( 32 "selected for GWP-ASan sampling. Default is 5000. Sample rates " 35 // Developer note - This option is not actually processed by GWP-ASan itself. It 44 "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This " 46 "deallocation when reporting a memory error. GWP-ASan's signal handler " 54 "Install GWP-ASan's signal handler in recoverable mode. This means that " 55 "upon GWP-ASan detecting an error, it'll print the error report, but *not* " 60 "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.") 63 "Install GWP-ASan atfork handlers to acquire internal locks " 71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings [all …]
|
H A D | crash_handler.h | 13 // from retrieving new GWP-ASan allocations, which may corrupt the metadata. 24 // 1. The crash is unrelated to GWP-ASan - in which case this function returns 26 // 2. The crash is internally detected within GWP-ASan itself (e.g. a 28 // GWP-ASan will terminate the process). In this case - this function 31 // system, but GWP-ASan is responsible for the allocation. In this case - 42 // `ErrorPtr` is unrelated to GWP-ASan, or if the error type cannot be deduced, 56 // 3. If GWP-ASan wasn't responsible for the crash at all, this function also 76 // GWP-ASan, or information about the allocation that caused the error. These 98 // frames were stored by GWP-ASan). A return value greater than `BufferLen` 120 // frames were stored by GWP-ASan). A return value greater than `BufferLen`
|
H A D | common.h | 23 // Magic header that resides in the AllocatorState so that GWP-ASan bugreports 28 // of GWP-ASan it's extracting the information, as the structures are not 32 // `GuardedPoolAllocator::init()` so that GWP-ASan remains completely in the 60 // by GWP-ASan. If `AllocationMetadata.Addr` is zero, the metadata is non-valid. 109 // This holds the state that's shared between the GWP-ASan allocator and the 111 // set of information required for understanding a GWP-ASan crash. 153 // and DOUBLE_FREE, these errors are detected in GWP-ASan, which will set 160 // GWP-ASan structures are undisturbed. If they are disturbed, the version magic 163 // GWP-ASan structures into a minidump for offline reconstruction of the crash. 165 // version of GWP-ASan internal structures that it's unpacking (along with the
|
H A D | guarded_pool_allocator.h | 35 // ASan. It is the sole owner of the pool of sequentially allocated guarded 43 // Name of the GWP-ASan mapping that for `Metadata`. 44 static constexpr const char *kGwpAsanMetadataName = "GWP-ASan Metadata"; 48 // GWP-ASan. The constructor value-initialises the class such that if no 142 static constexpr const char *kGwpAsanAliveSlotName = "GWP-ASan Alive Slot"; 145 static constexpr const char *kGwpAsanGuardPageName = "GWP-ASan Guard Page"; 147 static constexpr const char *kGwpAsanFreeSlotsName = "GWP-ASan Metadata"; 167 // thing in GWP-ASan that treats pages in a single VM region on an individual 237 // GWP-ASan is disabled, we wish to never spend wasted cycles recalculating in ScopedRecursiveGuard()
|
H A D | guarded_pool_allocator.cpp | 48 // Note: We return from the constructor here if GWP-ASan is not available. in init() 55 check(Opts.SampleRate >= 0, "GWP-ASan Error: SampleRate is < 0."); in init() 56 check(Opts.SampleRate < (1 << 30), "GWP-ASan Error: SampleRate is >= 2^30."); in init() 58 "GWP-ASan Error: MaxSimultaneousAllocations is < 0."); in init() 166 // Note, minimum backing allocation size in GWP-ASan is always one page, and 205 // GuardedPagePoolEnd == 0 when GWP-ASan is disabled. If we are disabled, fall in allocate() 387 // GWP-ASan report (e.g. backtrace_symbols()), make sure that GWP-ASan doesn't in preCrashReport()
|
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | README.txt | 3 This directory contains sources of the AddressSanitizer (ASan) runtime library. 9 asan_*.{cc,h} : Sources of the asan runtime library. 11 tests/* : ASan unit tests. 13 Also ASan runtime needs the following libraries: 17 ASan runtime currently also embeds part of LeakSanitizer runtime for 20 ASan runtime can only be built by CMake. You can run ASan tests 23 make check-asan
|
H A D | asan_globals_win.cpp | 18 #pragma section(".ASAN$GA", read, write) 19 #pragma section(".ASAN$GZ", read, write) 21 __declspec(allocate(".ASAN$GA")) __asan_global __asan_globals_start = {}; 23 __declspec(allocate(".ASAN$GZ")) __asan_global __asan_globals_end = {}; 24 #pragma comment(linker, "/merge:.ASAN=.data") 34 CHECK("corrupt asan global array"); in call_on_globals()
|
H A D | asan_linux.cpp | 105 // Since asan's mapping is compacting, the shadow chunk may be in FlushUnneededASanShadowMemory() 147 return internal_strstr(libname, "libclang_rt.asan") || in IsDynamicRTName() 152 Report("Your application is linked against incompatible ASan runtimes.\n"); in ReportIncompatibleRT() 165 "ASan runtime does not come first in initial library list; " in AsanCheckDynamicRTPrereqs() 182 // as early as possible, otherwise ASan interceptors could bind to in AsanCheckIncompatibleRT() 183 // the functions in dynamic ASan runtime instead of the functions in in AsanCheckIncompatibleRT() 184 // system libraries, causing crashes later in ASan initialization. in AsanCheckIncompatibleRT() 192 "incompatible ASan runtimes.\n"); in AsanCheckIncompatibleRT()
|
H A D | asan_win_dynamic_runtime_thunk.cpp | 12 // to interact with the ASan DLL runtime correctly and can't be implemented 16 // - creating weak aliases to default implementation imported from asan dll. 29 // Define weak alias for all weak functions imported from asan dll. 46 // The ASan MD runtime dllexports '__asan_option_detect_stack_use_after_return', 84 // unload or on exit. ASan relies on LLVM global_dtors to call 115 // ASan SEH handling. 116 // We need to set the ASan-specific SEH handler at the end of CRT initialization
|
H A D | asan_internal.h | 11 // ASan-private header which defines various general utilities. 30 // If set, asan will intercept C++ exception api call(s). 53 // All internal functions in asan reside inside the __asan namespace 55 // Separate namespace also makes it simpler to distinguish the asan run-time 122 // Returns `true` iff most of ASan init process should be skipped due to the 123 // ASan library being loaded via `dlopen()`. Platforms may perform any
|
H A D | asan_flags.h | 11 // ASan runtime flags. 20 // ASan flag values can be defined in four ways: 22 // 2) overriden during compilation of ASan runtime by providing 27 // 5) overriden during ASan activation (for now used on Android only).
|
H A D | asan_flags.inc | 9 // ASan runtime flags. 64 "ASan allocator flag. max_malloc_fill_size is the maximal amount of " 68 "ASan allocator flag. max_free_fill_size is the maximal amount of " 103 "If set, prints ASan exit stats even after program terminates " 136 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap " 163 "Check position of ASan runtime in library list (needs to be disabled"
|
/freebsd/contrib/llvm-project/compiler-rt/lib/gwp_asan/optional/ |
H A D | options_parser.cpp | 67 InvokeIfNonNull(Printf, "GWP-ASan: Available options:\n"); in printOptionDescriptions() 92 InvokeIfNonNull(Printf, "GWP-ASan: Expected '=' when parsing option '%s'.", in parseOption() 103 InvokeIfNonNull(Printf, "GWP-ASan: Unterminated string in option '%s'.", in parseOption() 124 InvokeIfNonNull(Printf, "GWP-ASan: Options parsing failed.\n"); in parseOptions() 163 Printf, "GWP-ASan: Invalid boolean value '%s' for option '%s'.\n", in setOptionToValue() 174 Printf, "GWP-ASan: Invalid integer value '%s' for option '%s'.\n", in setOptionToValue() 181 InvokeIfNonNull(Printf, "GWP-ASan: Unknown option '%s'.", Name); in setOptionToValue() 188 "GWP-ASan Error: Ran out of space for options.\n"); in registerOption() 239 "GWP-ASan ERROR: MaxSimultaneousAllocations must be > 0 when GWP-ASan " in initOptions() 246 "GWP-ASan ERROR: SampleRate must be > 0 when GWP-ASan is enabled.\n"); in initOptions()
|
H A D | segv_handler_posix.cpp | 37 ~ScopedEndOfReportDecorator() { Printf("*** End GWP-ASan report ***\n"); } in ~ScopedEndOfReportDecorator() 104 "GWP-ASan cannot provide any more information about this error. This may " 105 "occur due to a wild memory access into the GWP-ASan pool, or an " 116 "dumpReport() called on a non-GWP-ASan error."); in dumpReport() 129 Printf("*** GWP-ASan detected a memory error ***\n"); in dumpReport() 145 Printf("*** GWP-ASan detected a memory error ***\n"); in dumpReport() 215 // Process any previous handlers as long as the crash wasn't a GWP-ASan crash in sigSegvHandler()
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/ |
H A D | AddressSanitizer.cpp | 94 #define DEBUG_TYPE "asan" 131 const char kAsanModuleCtorName[] = "asan.module_ctor"; 132 const char kAsanModuleDtorName[] = "asan.module_dtor"; 163 // ASan version script has __asan_* wildcard. Triple underscore prevents a 197 "asan-kernel", cl::desc("Enable KernelAddressSanitizer instrumentation"), 201 "asan-recover", 206 "asan-guard-against-version-mismatch", 210 // This flag may need to be replaced with -f[no-]asan-reads. 211 static cl::opt<bool> ClInstrumentReads("asan-instrument-reads", 216 "asan-instrument-writes", cl::desc("instrument write instructions"), [all …]
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Instrumentation/ |
H A D | AddressSanitizerOptions.h | 15 /// Types of ASan module destructors supported 17 None, ///< Do not emit any destructors for ASan 22 /// Types of ASan module constructors supported 28 /// Mode of ASan detect stack use after return
|
/freebsd/sys/conf/ |
H A D | kern.mk | 257 SAN_CFLAGS+= -mllvm -asan-stack=true \ 258 -mllvm -asan-instrument-dynamic-allocas=true \ 259 -mllvm -asan-globals=true \ 260 -mllvm -asan-use-after-scope=true \ 261 -mllvm -asan-instrumentation-with-call-threshold=0 \ 262 -mllvm -asan-instrument-byval=false 266 # KASAN/ARM64 TODO: -asan-mapping-offset is calculated from: 274 SAN_CFLAGS+= -mllvm -asan-mapping-offset=0xdfff208000000000 281 # an assertion failure compiling dtrace.c with asan enabled. 282 SAN_CFLAGS+= -mllvm -asan-use-stack-safety=0
|
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_interceptors.inc | 974 // FIXME: under ASan the call below may write to freed memory and corrupt 992 // FIXME: under ASan the call below may write to freed memory and corrupt 1009 // FIXME: under ASan the call below may write to freed memory and corrupt 1027 // FIXME: under ASan the call below may write to freed memory and corrupt 1205 // FIXME: under ASan the call below may write to freed memory and corrupt 1354 // FIXME: under ASan the call below may write to freed memory and corrupt 1367 // FIXME: under ASan the call below may write to freed memory and corrupt 1380 // FIXME: under ASan the call below may write to freed memory and corrupt 1393 // FIXME: under ASan the call below may write to freed memory and corrupt 1437 // FIXME: under ASan the call below may write to freed memory and corrupt [all …]
|
/freebsd/sys/contrib/zstd/ |
H A D | TESTING.md | 20 - The following tests run with UBsan and Asan on x86_64 and x86, as well as with 35 - x86_64 and x86 with UBsan and Asan 41 - `pzstd` with asan and tsan, as well as in 32-bits mode
|
/freebsd/lib/libclang_rt/asan-preinit/ |
H A D | Makefile | 3 LIB= clang_rt.asan-preinit-${CRTARCH} 5 SRCS+= asan/asan_preinit.cpp
|
/freebsd/lib/libclang_rt/asan_static/ |
H A D | Makefile | 5 SRCS+= asan/asan_rtl_static.cpp 6 SRCS+= asan/asan_rtl_x86_64.S
|
/freebsd/crypto/openssl/fuzz/ |
H A D | README.md | 27 -DPEDANTIC enable-asan enable-ubsan no-shared \ 65 -DPEDANTIC enable-asan enable-ubsan no-shared \ 89 The following options can also be enabled: enable-asan, enable-ubsan, enable-msan 104 above might be needed. For instance the enable-asan or enable-ubsan option might
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Utils/ |
H A D | ASanStackFrameLayout.h | 22 // in asan_internal.h from ASan runtime in compiler-rt. 31 const char *Name; // Name of the variable that will be displayed by asan 60 // Compute frame description, see DescribeAddressIfStack in ASan runtime.
|