/freebsd/lib/libclang_rt/include/ |
H A D | Makefile | 3 .PATH: ${CRTSRC}/include/sanitizer 5 INCSDIR= ${CLANGDIR}/include/sanitizer
|
/freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
H A D | Sanitizers.def | 1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===// 22 // The first value is the name of the sanitizer as a string. The sanitizer can 26 // sanitizer. 79 // Numerical stability sanitizer.
|
H A D | CodeGenOptions.def | 264 CODEGENOPT(SanitizeMinimalRuntime, 1, 0) ///< Use "_minimal" sanitizer runtime for 272 CODEGENOPT(SanitizeCoverageType, 2, 0) ///< Type of sanitizer coverage 274 CODEGENOPT(SanitizeCoverageIndirectCalls, 1, 0) ///< Enable sanitizer coverage 277 ///< in sanitizer coverage. 279 ///< in sanitizer coverage. 281 ///< in sanitizer coverage. 283 ///< in sanitizer coverage. 285 ///< in sanitizer coverage. 287 ///< in sanitizer coverage. 289 ///< in sanitizer coverage.
|
H A D | DiagnosticDriverKinds.td | 245 "missing sanitizer ignorelist: '%0'">; 247 "malformed sanitizer ignorelist: '%0'">; 249 "malformed sanitizer coverage allowlist: '%0'">; 251 "malformed sanitizer coverage ignorelist: '%0'">; 253 "malformed sanitizer metadata ignorelist: '%0'">; 484 "implicitly disabling vptr sanitizer because rtti wasn't enabled">, 487 "the object size sanitizer has no effect at -O0, but is explicitly enabled: %0">, 645 …"option '-ffine-grained-bitfield-accesses' cannot be enabled together with a sanitizer; flag ignor…
|
H A D | DiagnosticGroups.td | 34 def AutoDisableVptrSanitizer : DiagGroup<"auto-disable-vptr-sanitizer">;
|
/freebsd/ |
H A D | ObsoleteFiles.inc | 506 OLD_FILES+=usr/lib/clang/18/include/sanitizer/allocator_interface.h 507 OLD_FILES+=usr/lib/clang/18/include/sanitizer/asan_interface.h 508 OLD_FILES+=usr/lib/clang/18/include/sanitizer/common_interface_defs.h 509 OLD_FILES+=usr/lib/clang/18/include/sanitizer/coverage_interface.h 510 OLD_FILES+=usr/lib/clang/18/include/sanitizer/dfsan_interface.h 511 OLD_FILES+=usr/lib/clang/18/include/sanitizer/hwasan_interface.h 512 OLD_FILES+=usr/lib/clang/18/include/sanitizer/linux_syscall_hooks.h 513 OLD_FILES+=usr/lib/clang/18/include/sanitizer/lsan_interface.h 514 OLD_FILES+=usr/lib/clang/18/include/sanitizer/memprof_interface.h 515 OLD_FILES+=usr/lib/clang/18/include/sanitizer/msan_interface.h [all …]
|
/freebsd/sys/contrib/libsodium/test/default/ |
H A D | sodium_utils3.c | 12 # warning The sodium_utils3 test is expected to fail with address sanitizer
|
H A D | sodium_utils2.c | 12 # warning The sodium_utils2 test is expected to fail with address sanitizer
|
/freebsd/contrib/unbound/ |
H A D | README-Travis.md | 32 …sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i… 51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
|
/freebsd/contrib/ldns/ |
H A D | README-Travis.md | 32 …sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i… 51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
|
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_flags.inc | 24 "If set, use the online symbolizer from common sanitizer runtime to turn " 66 "Write all sanitizer output to syslog in addition to other means of " 72 "Whether to remove the sanitizer from DYLD_INSERT_LIBRARIES to " 246 "If set, decorate sanitizer mappings in /proc/self/maps with " 280 "Use sanitizer symbolizer markup, available on Linux "
|
H A D | sanitizer_malloc_mac.inc | 94 if (size) { // Claimed by sanitizer zone? 385 // Perform any sanitizer specific initialization.
|
H A D | sanitizer_common_interceptors_ioctl.inc | 9 // Ioctl handling in common sanitizer interceptors.
|
H A D | sanitizer_interceptors_ioctl_netbsd.inc | 9 // Ioctl handling in common sanitizer interceptors.
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Support/ |
H A D | Compiler.h | 451 #if __has_include(<sanitizer/asan_interface.h>)
|
/freebsd/etc/mtree/ |
H A D | BSD.usr.dist | 57 sanitizer
|
/freebsd/contrib/libpcap/ |
H A D | CMakeLists.txt | 1311 # turn sanitizer stuff on). 1325 message(STATUS "Checking sanitizer ${_sanitizer}") 1335 # If the sanitizer is "address", try -fsanitize-address. 1370 foreach(sanitizer "address" "undefined") 1372 test_sanitizer(${sanitizer} SANITIZER_FLAG) 1374 message(STATUS "${sanitizer} sanitizer supported using ${SANITIZER_FLAG}") 1377 message(STATUS "${sanitizer} isn't a supported sanitizer") 1413 foreach(sanitizer IN LISTS ENABLE_SANITIZERS) 1415 test_sanitizer(${sanitizer} SANITIZER_FLAG) 1417 message(STATUS "${sanitizer} sanitizer supported using ${SANITIZER_FLAG}") [all …]
|
/freebsd/contrib/llvm-project/llvm/tools/llvm-symbolizer/ |
H A D | Opts.td | 79 // Compatibility aliases for old asan_symbolize.py and sanitizer binaries (before 2020-08).
|
/freebsd/contrib/llvm-project/clang/lib/Driver/ToolChains/ |
H A D | Darwin.cpp | 1519 const char *sanitizer = nullptr; in AddLinkRuntimeLibArgs() local 1521 sanitizer = "UndefinedBehaviorSanitizer"; in AddLinkRuntimeLibArgs() 1523 sanitizer = "AddressSanitizer"; in AddLinkRuntimeLibArgs() 1525 sanitizer = "ThreadSanitizer"; in AddLinkRuntimeLibArgs() 1527 if (sanitizer) { in AddLinkRuntimeLibArgs() 1529 << sanitizer; in AddLinkRuntimeLibArgs()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OPENSSL_malloc.pod | 197 clang's memory and leak sanitizer.
|
/freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/ |
H A D | FuzzerLoop.cpp | 25 #if __has_include(<sanitizer / lsan_interface.h>) 26 #include <sanitizer/lsan_interface.h> 49 // than frees (using the sanitizer malloc hooks) and only then try to call lsan. 80 // sanitizer.
|
/freebsd/contrib/llvm-project/clang/include/clang/Driver/ |
H A D | Options.td | 1296 HelpText<"Enable sanitizer for supported offloading devices">; 1620 HelpText<"Dynamically link the sanitizer runtime">; 1622 …HelpText<"Statically link the sanitizer runtime (Not supported for ASan, TSan or UBSan on darwin)"… 1878 "The file uses the sanitizer special case list format.">, 2318 // Begin sanitizer flags. These should all be core options exposed in all driver 2355 …HelpText<"Restrict sanitizer coverage instrumentation exclusively to modules and functions that ma… 2359 HelpText<"Disable sanitizer coverage instrumentation for modules and functions " 2370 …HelpText<"Disable sanitizer metadata for modules and functions that match the provided special cas… 2386 … HelpText<"Always generate function calls for address sanitizer instrumentation">; 2389 … HelpText<"Use default code inlining logic for the address sanitizer">; [all …]
|
/freebsd/contrib/googletest/docs/ |
H A D | advanced.md | 2427 when they detect sanitizer errors, such as creating a reference from `nullptr`. 2434 FAIL() << "Encountered an undefined behavior sanitizer error"; 2437 FAIL() << "Encountered an address sanitizer error"; 2440 FAIL() << "Encountered a thread sanitizer error"; 2446 test triggers a sanitizer error, GoogleTest will report that it failed.
|
/freebsd/tools/build/mk/ |
H A D | OptionalObsoleteFiles.inc | 1108 OLD_FILES+=usr/lib/clang/19/include/sanitizer/allocator_interface.h 1109 OLD_FILES+=usr/lib/clang/19/include/sanitizer/asan_interface.h 1110 OLD_FILES+=usr/lib/clang/19/include/sanitizer/common_interface_defs.h 1111 OLD_FILES+=usr/lib/clang/19/include/sanitizer/coverage_interface.h 1112 OLD_FILES+=usr/lib/clang/19/include/sanitizer/dfsan_interface.h 1113 OLD_FILES+=usr/lib/clang/19/include/sanitizer/hwasan_interface.h 1114 OLD_FILES+=usr/lib/clang/19/include/sanitizer/linux_syscall_hooks.h 1115 OLD_FILES+=usr/lib/clang/19/include/sanitizer/lsan_interface.h 1116 OLD_FILES+=usr/lib/clang/19/include/sanitizer/memprof_interface.h 1117 OLD_FILES+=usr/lib/clang/19/include/sanitizer/msan_interface.h [all …]
|
/freebsd/share/mk/ |
H A D | bsd.README | 117 stack smashing protection and without sanitizer instrumentation.
|