Home
last modified time | relevance | path

Searched refs:ASan (Results 1 – 20 of 20) sorted by relevance

/freebsd/contrib/llvm-project/compiler-rt/lib/gwp_asan/
H A Doptions.inc23 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY(
32 "selected for GWP-ASan sampling. Default is 5000. Sample rates "
35 // Developer note - This option is not actually processed by GWP-ASan itself. It
44 "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This "
46 "deallocation when reporting a memory error. GWP-ASan's signal handler "
54 "Install GWP-ASan's signal handler in recoverable mode. This means that "
55 "upon GWP-ASan detecting an error, it'll print the error report, but *not* "
60 "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.")
63 "Install GWP-ASan atfork handlers to acquire internal locks "
71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/
H A DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
H A Dasan_flags.inc9 // ASan runtime flags.
64 "ASan allocator flag. max_malloc_fill_size is the maximal amount of "
68 "ASan allocator flag. max_free_fill_size is the maximal amount of "
103 "If set, prints ASan exit stats even after program terminates "
136 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap "
163 "Check position of ASan runtime in library list (needs to be disabled"
H A Dasan_activation_flags.inc9 // A subset of ASan (and common) runtime flags supported at activation time.
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/
H A DAddressSanitizer.cpp986 AddressSanitizer &ASan; member
1024 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan, in FunctionStackPoisoner()
1026 : F(F), ASan(ASan), RTCI(RTCI), in FunctionStackPoisoner()
1027 DIB(*F.getParent(), /*AllowUnresolved*/ false), C(ASan.C), in FunctionStackPoisoner()
1028 IntptrTy(ASan.IntptrTy), IntptrPtrTy(PointerType::get(IntptrTy, 0)), in FunctionStackPoisoner()
1029 Mapping(ASan.Mapping), in FunctionStackPoisoner()
1144 if (!ASan.isInterestingAlloca(AI) || isa<ScalableVectorType>(AllocaType) || in visitAllocaInst()
1169 if (!ASan.UseAfterScope) in visitIntrinsicInst()
1192 if (!ASan.isInterestingAlloca(*AI)) in visitIntrinsicInst()
1204 HasInlineAsm |= CI->isInlineAsm() && &CB != ASan.LocalDynamicShadow; in visitCallBase()
[all …]
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_common_interceptors.inc974 // FIXME: under ASan the call below may write to freed memory and corrupt
992 // FIXME: under ASan the call below may write to freed memory and corrupt
1009 // FIXME: under ASan the call below may write to freed memory and corrupt
1027 // FIXME: under ASan the call below may write to freed memory and corrupt
1205 // FIXME: under ASan the call below may write to freed memory and corrupt
1354 // FIXME: under ASan the call below may write to freed memory and corrupt
1367 // FIXME: under ASan the call below may write to freed memory and corrupt
1380 // FIXME: under ASan the call below may write to freed memory and corrupt
1393 // FIXME: under ASan the call below may write to freed memory and corrupt
1437 // FIXME: under ASan the call below may write to freed memory and corrupt
[all …]
H A Dsanitizer_common_interceptors_netbsd_compat.inc37 // FIXME: under ASan the call below may write to freed memory and corrupt
49 // FIXME: under ASan the call below may write to freed memory and corrupt
H A Dsanitizer_malloc_mac.inc101 // FIXME: ASan should support purgeable allocations.
108 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
114 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
/freebsd/tools/build/options/
H A DWITH_ASAN1 Build the base system with Address Sanitizer (ASan) to detect
/freebsd/tools/test/stress2/misc/
H A Dsyzkaller67.sh35 // i386 + ASan
H A Dall.exclude73 syzkaller67.sh panic: ASan: Invalid access, 8-byte read at ... 20230621
/freebsd/contrib/libcbor/
H A DCMakeLists.txt58 option(SANITIZE "Enable ASan & a few compatible sanitizers in Debug mode" ON)
/freebsd/contrib/llvm-project/clang/include/clang/Basic/
H A DCodeGenOptions.def256 llvm::AsanDtorKind::Global) ///< Set how ASan global
H A DLangOptions.def434 LANGOPT(SanitizeAddressFieldPadding, 2, 0, "controls how aggressive is ASan "
/freebsd/contrib/llvm-project/libcxx/include/
H A Dstring676 // This macro disables AddressSanitizer (ASan) instrumentation for a specific function,
677 // allowing memory accesses that would normally trigger ASan errors to proceed without crashing.
780 // When compiling with AddressSanitizer (ASan), basic_string cannot be trivially
1025 …// Turning off ASan instrumentation for variable initialization with _LIBCPP_STRING_INTERNAL_MEMOR…
2713 // ASan annotations: was long, so object memory is unpoisoned as new.
2717 // ASan annotations: Guard against `std::string s; s = std::move(s);`
H A Ddeque2115 // ASan: this is empty container, we have to poison whole block
2240 // ASan: this is an empty container, we have to poison the whole block
/freebsd/lib/clang/liblldb/
H A DMakefile396 SRCS+= Plugins/InstrumentationRuntime/ASan/InstrumentationRuntimeASan.cpp
/freebsd/contrib/llvm-project/
H A DFREEBSD-Xlist385 lldb/source/Plugins/InstrumentationRuntime/ASan/CMakeLists.txt
/freebsd/contrib/bc/
H A DNEWS.md1492 6. Memory leaks and errors have been eliminated (as far as ASan and Valgrind
/freebsd/contrib/llvm-project/clang/include/clang/Driver/
H A DOptions.td1622 …HelpText<"Statically link the sanitizer runtime (Not supported for ASan, TSan or UBSan on darwin)"…