| /freebsd/lib/libclang_rt/msan/ |
| H A D | Makefile | 3 LIB= clang_rt.msan-${CRTARCH} 7 SRCS+= msan/msan.cpp 8 SRCS+= msan/msan_allocator.cpp 9 SRCS+= msan/msan_chained_origin_depot.cpp 10 SRCS+= msan/msan_dl.cpp 11 SRCS+= msan/msan_interceptors.cpp 12 SRCS+= msan/msan_linux.cpp 13 SRCS+= msan/msan_poisoning.cpp 14 SRCS+= msan/msan_report.cpp 15 SRCS+= msan/msan_thread.cpp [all …]
|
| /freebsd/contrib/libfido2/fuzz/ |
| H A D | mutator_aux.h | 28 * As of LLVM 10.0.0, MSAN support in libFuzzer was still experimental. 30 * MSAN will flag uninitialised reads on memory populated by libFuzzer. 31 * Since there is no way to suppress MSAN without regenerating object 32 * code (in which case you might as well rebuild libFuzzer with MSAN),
|
| H A D | README | 2 ASAN/MSAN/UBSAN. 21 To run under ASAN/MSAN/UBSAN, libfido2 needs to be linked against flavours of
|
| /freebsd/contrib/llvm-project/compiler-rt/lib/msan/ |
| H A D | msan_interface_internal.h | 11 // Private MSan interface header. 35 // (i.e. -mllvm -msan-keep-going) 158 // Tell MSan about newly allocated memory (ex.: custom allocator). 163 // Tell MSan about newly destroyed memory. Memory will be marked
|
| H A D | msan_linux.cpp | 31 # include "msan.h" 222 // Reuse the MSan TSD API for compatibility with existing code 306 // Usually we lock ThreadRegistry, but msan does not have one. in BeforeFork() 316 // Usually we unlock ThreadRegistry, but msan does not have one. in AfterFork()
|
| H A D | msan.cpp | 1 //===-- msan.cpp ----------------------------------------------------------===// 14 #include "msan.h" 204 // Check if deprecated exit_code MSan flag is set. in InitializeFlags() 265 // Backup MSan runtime TLS state. 356 // an MSan shadow region. 395 // an MSan shadow region.
|
| H A D | msan_dl.h | 17 #include "msan.h"
|
| H A D | msan_report.h | 10 /// This file is a part of MemorySanitizer. MSan-private header for error
|
| H A D | msan_flags.inc | 9 // MSan runtime flags.
|
| H A D | msan_poisoning.h | 16 #include "msan.h"
|
| H A D | msan_thread.cpp | 4 #include "msan.h"
|
| H A D | msan_new_delete.cpp | 14 #include "msan.h"
|
| /freebsd/sys/contrib/openzfs/module/zstd/lib/common/ |
| H A D | portability_macros.h | 40 /* detects whether we are being compiled under msan */ 114 * Disable assembly when MSAN is enabled, because MSAN requires
|
| /freebsd/sys/contrib/zstd/lib/common/ |
| H A D | portability_macros.h | 39 /* detects whether we are being compiled under msan */ 113 * Disable assembly when MSAN is enabled, because MSAN requires
|
| /freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/ |
| H A D | MemorySanitizer.cpp | 26 /// as well: msan needs to see all program events, including system 28 /// compile *everything* with msan or use a binary translation 48 /// values. This behavior is controlled with a flag (msan-track-origins) and is 111 /// The major differences between KMSAN and MSan instrumentation are: 112 /// - KMSAN always tracks the origins and implies msan-keep-going=true; 217 #define DEBUG_TYPE "msan" 219 DEBUG_COUNTER(DebugInsertCheck, "msan-insert-check", 222 DEBUG_COUNTER(DebugInstrumentInstruction, "msan-instrument-instruction", 229 // These constants must be kept in sync with the ones in msan.h. 241 "msan-track-origins", [all …]
|
| /freebsd/sys/contrib/zstd/programs/ |
| H A D | timefn.c | 74 /* time must be initialized, othersize it may fail msan test. in UTIL_getTime() 101 /* time must be initialized, othersize it may fail msan test. in UTIL_getTime()
|
| /freebsd/lib/libclang_rt/msan_cxx/ |
| H A D | Makefile | 5 SRCS+= msan/msan_new_delete.cpp
|
| /freebsd/sys/kern/ |
| H A D | subr_msan.c | 53 #include <sys/msan.h> 63 #include <machine/msan.h> 190 REPORT("MSan: Uninitialized memory in %s, offset %zu", in kmsan_report_hook() 200 REPORT("MSan: Uninitialized %s memory in %s, " in kmsan_report_hook() 213 REPORT("MSan: Uninitialized %s memory in %s, offset %zu, " in kmsan_report_hook() 216 REPORT("MSan: Uninitialized %s memory in %s, " in kmsan_report_hook() 246 REPORT("MSan: uninitialized variable in %p", (void *)pc); in kmsan_report_inline() 255 REPORT("MSan: Uninitialized %s memory from %s+%#lx", in kmsan_report_inline() 267 REPORT("MSan: Uninitialized variable '%s' from %s", var, fn); in kmsan_report_inline() 269 REPORT("MSan: Uninitialized %s memory, origin %x", in kmsan_report_inline()
|
| /freebsd/contrib/libfido2/.github/workflows/ |
| H A D | linux_fuzz.yml | 25 sanitizer: [ asan, msan ]
|
| /freebsd/lib/libclang_rt/ |
| H A D | Makefile | 18 SD_MSAN+= msan
|
| /freebsd/contrib/llvm-project/llvm/include/llvm/Transforms/Instrumentation/ |
| H A D | MemorySanitizer.h | 37 /// A module pass for msan instrumentation.
|
| /freebsd/contrib/llvm-project/libc/src/__support/macros/ |
| H A D | sanitizer.h | 37 // Only perform MSAN unpoison in non-constexpr context.
|
| /freebsd/sys/sys/ |
| H A D | msan.h | 1 /* $NetBSD: msan.h,v 1.2 2020/09/09 16:29:59 maxv Exp $ */
|
| /freebsd/contrib/libfido2/.actions/ |
| H A D | fuzz-linux | 34 msan)
|
| /freebsd/contrib/llvm-project/compiler-rt/lib/dfsan/ |
| H A D | dfsan.cpp | 220 // memory write cost. MSan does similar optimization. The following invariant in ChainOrigin() 1091 // TODO: CheckMemoryLayoutSanity is based on msan. 1124 // TODO: CheckMemoryRangeAvailability is based on msan. 1138 // TODO: ProtectMemoryRange is based on msan. 1161 // TODO: InitShadow is based on msan.
|