/freebsd/contrib/llvm-project/compiler-rt/lib/gwp_asan/ |
H A D | options.inc | 23 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY( 32 "selected for GWP-ASan sampling. Default is 5000. Sample rates " 35 // Developer note - This option is not actually processed by GWP-ASan itself. It 44 "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This " 46 "deallocation when reporting a memory error. GWP-ASan's signal handler " 54 "Install GWP-ASan's signal handler in recoverable mode. This means that " 55 "upon GWP-ASan detecting an error, it'll print the error report, but *not* " 60 "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.") 63 "Install GWP-ASan atfork handlers to acquire internal locks " 71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | README.txt | 3 This directory contains sources of the AddressSanitizer (ASan) runtime library. 11 tests/* : ASan unit tests. 13 Also ASan runtime needs the following libraries: 17 ASan runtime currently also embeds part of LeakSanitizer runtime for 20 ASan runtime can only be built by CMake. You can run ASan tests
|
H A D | asan_flags.inc | 9 // ASan runtime flags. 64 "ASan allocator flag. max_malloc_fill_size is the maximal amount of " 68 "ASan allocator flag. max_free_fill_size is the maximal amount of " 103 "If set, prints ASan exit stats even after program terminates " 136 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap " 163 "Check position of ASan runtime in library list (needs to be disabled"
|
H A D | asan_activation_flags.inc | 9 // A subset of ASan (and common) runtime flags supported at activation time.
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/ |
H A D | AddressSanitizer.cpp | 986 AddressSanitizer &ASan; member 1024 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan, in FunctionStackPoisoner() 1026 : F(F), ASan(ASan), RTCI(RTCI), in FunctionStackPoisoner() 1027 DIB(*F.getParent(), /*AllowUnresolved*/ false), C(ASan.C), in FunctionStackPoisoner() 1028 IntptrTy(ASan.IntptrTy), IntptrPtrTy(PointerType::get(IntptrTy, 0)), in FunctionStackPoisoner() 1029 Mapping(ASan.Mapping), in FunctionStackPoisoner() 1144 if (!ASan.isInterestingAlloca(AI) || isa<ScalableVectorType>(AllocaType) || in visitAllocaInst() 1169 if (!ASan.UseAfterScope) in visitIntrinsicInst() 1192 if (!ASan.isInterestingAlloca(*AI)) in visitIntrinsicInst() 1204 HasInlineAsm |= CI->isInlineAsm() && &CB != ASan.LocalDynamicShadow; in visitCallBase() [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_interceptors.inc | 974 // FIXME: under ASan the call below may write to freed memory and corrupt 992 // FIXME: under ASan the call below may write to freed memory and corrupt 1009 // FIXME: under ASan the call below may write to freed memory and corrupt 1027 // FIXME: under ASan the call below may write to freed memory and corrupt 1205 // FIXME: under ASan the call below may write to freed memory and corrupt 1354 // FIXME: under ASan the call below may write to freed memory and corrupt 1367 // FIXME: under ASan the call below may write to freed memory and corrupt 1380 // FIXME: under ASan the call below may write to freed memory and corrupt 1393 // FIXME: under ASan the call below may write to freed memory and corrupt 1437 // FIXME: under ASan the call below may write to freed memory and corrupt [all …]
|
H A D | sanitizer_common_interceptors_netbsd_compat.inc | 37 // FIXME: under ASan the call below may write to freed memory and corrupt 49 // FIXME: under ASan the call below may write to freed memory and corrupt
|
H A D | sanitizer_malloc_mac.inc | 101 // FIXME: ASan should support purgeable allocations. 108 // FIXME: ASan should support purgeable allocations. Ignoring them is fine 114 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
|
/freebsd/tools/build/options/ |
H A D | WITH_ASAN | 1 Build the base system with Address Sanitizer (ASan) to detect
|
/freebsd/tools/test/stress2/misc/ |
H A D | syzkaller67.sh | 35 // i386 + ASan
|
H A D | all.exclude | 73 syzkaller67.sh panic: ASan: Invalid access, 8-byte read at ... 20230621
|
/freebsd/contrib/libcbor/ |
H A D | CMakeLists.txt | 58 option(SANITIZE "Enable ASan & a few compatible sanitizers in Debug mode" ON)
|
/freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
H A D | CodeGenOptions.def | 256 llvm::AsanDtorKind::Global) ///< Set how ASan global
|
H A D | LangOptions.def | 434 LANGOPT(SanitizeAddressFieldPadding, 2, 0, "controls how aggressive is ASan "
|
/freebsd/contrib/llvm-project/libcxx/include/ |
H A D | string | 676 // This macro disables AddressSanitizer (ASan) instrumentation for a specific function, 677 // allowing memory accesses that would normally trigger ASan errors to proceed without crashing. 780 // When compiling with AddressSanitizer (ASan), basic_string cannot be trivially 1025 …// Turning off ASan instrumentation for variable initialization with _LIBCPP_STRING_INTERNAL_MEMOR… 2713 // ASan annotations: was long, so object memory is unpoisoned as new. 2717 // ASan annotations: Guard against `std::string s; s = std::move(s);`
|
H A D | deque | 2115 // ASan: this is empty container, we have to poison whole block 2240 // ASan: this is an empty container, we have to poison the whole block
|
/freebsd/lib/clang/liblldb/ |
H A D | Makefile | 396 SRCS+= Plugins/InstrumentationRuntime/ASan/InstrumentationRuntimeASan.cpp
|
/freebsd/contrib/llvm-project/ |
H A D | FREEBSD-Xlist | 385 lldb/source/Plugins/InstrumentationRuntime/ASan/CMakeLists.txt
|
/freebsd/contrib/bc/ |
H A D | NEWS.md | 1492 6. Memory leaks and errors have been eliminated (as far as ASan and Valgrind
|
/freebsd/contrib/llvm-project/clang/include/clang/Driver/ |
H A D | Options.td | 1622 …HelpText<"Statically link the sanitizer runtime (Not supported for ASan, TSan or UBSan on darwin)"…
|