Home
last modified time | relevance | path

Searched refs:sanitizer (Results 1 – 25 of 36) sorted by relevance

12

/freebsd/lib/libclang_rt/include/
H A DMakefile3 .PATH: ${CRTSRC}/include/sanitizer
5 INCSDIR= ${CLANGDIR}/include/sanitizer
/freebsd/contrib/llvm-project/clang/include/clang/Basic/
H A DSanitizers.def1 //===--- Sanitizers.def - Runtime sanitizer options -------------*- C++ -*-===//
22 // The first value is the name of the sanitizer as a string. The sanitizer can
26 // sanitizer.
79 // Numerical stability sanitizer.
H A DCodeGenOptions.def264 CODEGENOPT(SanitizeMinimalRuntime, 1, 0) ///< Use "_minimal" sanitizer runtime for
272 CODEGENOPT(SanitizeCoverageType, 2, 0) ///< Type of sanitizer coverage
274 CODEGENOPT(SanitizeCoverageIndirectCalls, 1, 0) ///< Enable sanitizer coverage
277 ///< in sanitizer coverage.
279 ///< in sanitizer coverage.
281 ///< in sanitizer coverage.
283 ///< in sanitizer coverage.
285 ///< in sanitizer coverage.
287 ///< in sanitizer coverage.
289 ///< in sanitizer coverage.
H A DDiagnosticDriverKinds.td245 "missing sanitizer ignorelist: '%0'">;
247 "malformed sanitizer ignorelist: '%0'">;
249 "malformed sanitizer coverage allowlist: '%0'">;
251 "malformed sanitizer coverage ignorelist: '%0'">;
253 "malformed sanitizer metadata ignorelist: '%0'">;
484 "implicitly disabling vptr sanitizer because rtti wasn't enabled">,
487 "the object size sanitizer has no effect at -O0, but is explicitly enabled: %0">,
645 …"option '-ffine-grained-bitfield-accesses' cannot be enabled together with a sanitizer; flag ignor…
H A DDiagnosticGroups.td34 def AutoDisableVptrSanitizer : DiagGroup<"auto-disable-vptr-sanitizer">;
/freebsd/
H A DObsoleteFiles.inc506 OLD_FILES+=usr/lib/clang/18/include/sanitizer/allocator_interface.h
507 OLD_FILES+=usr/lib/clang/18/include/sanitizer/asan_interface.h
508 OLD_FILES+=usr/lib/clang/18/include/sanitizer/common_interface_defs.h
509 OLD_FILES+=usr/lib/clang/18/include/sanitizer/coverage_interface.h
510 OLD_FILES+=usr/lib/clang/18/include/sanitizer/dfsan_interface.h
511 OLD_FILES+=usr/lib/clang/18/include/sanitizer/hwasan_interface.h
512 OLD_FILES+=usr/lib/clang/18/include/sanitizer/linux_syscall_hooks.h
513 OLD_FILES+=usr/lib/clang/18/include/sanitizer/lsan_interface.h
514 OLD_FILES+=usr/lib/clang/18/include/sanitizer/memprof_interface.h
515 OLD_FILES+=usr/lib/clang/18/include/sanitizer/msan_interface.h
[all …]
/freebsd/sys/contrib/libsodium/test/default/
H A Dsodium_utils3.c12 # warning The sodium_utils3 test is expected to fail with address sanitizer
H A Dsodium_utils2.c12 # warning The sodium_utils2 test is expected to fail with address sanitizer
/freebsd/contrib/unbound/
H A DREADME-Travis.md32sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i…
51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
/freebsd/contrib/ldns/
H A DREADME-Travis.md32sanitizer builds are tested using Clang and GCC, for a total of four builds. The first sanitizer i…
51 When the Travis script encounters a sanitizer it uses different `CFLAGS` and configuration string.
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_flags.inc24 "If set, use the online symbolizer from common sanitizer runtime to turn "
66 "Write all sanitizer output to syslog in addition to other means of "
72 "Whether to remove the sanitizer from DYLD_INSERT_LIBRARIES to "
246 "If set, decorate sanitizer mappings in /proc/self/maps with "
280 "Use sanitizer symbolizer markup, available on Linux "
H A Dsanitizer_malloc_mac.inc94 if (size) { // Claimed by sanitizer zone?
385 // Perform any sanitizer specific initialization.
H A Dsanitizer_common_interceptors_ioctl.inc9 // Ioctl handling in common sanitizer interceptors.
H A Dsanitizer_interceptors_ioctl_netbsd.inc9 // Ioctl handling in common sanitizer interceptors.
/freebsd/contrib/llvm-project/llvm/include/llvm/Support/
H A DCompiler.h451 #if __has_include(<sanitizer/asan_interface.h>)
/freebsd/etc/mtree/
H A DBSD.usr.dist57 sanitizer
/freebsd/contrib/libpcap/
H A DCMakeLists.txt1311 # turn sanitizer stuff on).
1325 message(STATUS "Checking sanitizer ${_sanitizer}")
1335 # If the sanitizer is "address", try -fsanitize-address.
1370 foreach(sanitizer "address" "undefined")
1372 test_sanitizer(${sanitizer} SANITIZER_FLAG)
1374 message(STATUS "${sanitizer} sanitizer supported using ${SANITIZER_FLAG}")
1377 message(STATUS "${sanitizer} isn't a supported sanitizer")
1413 foreach(sanitizer IN LISTS ENABLE_SANITIZERS)
1415 test_sanitizer(${sanitizer} SANITIZER_FLAG)
1417 message(STATUS "${sanitizer} sanitizer supported using ${SANITIZER_FLAG}")
[all …]
/freebsd/contrib/llvm-project/llvm/tools/llvm-symbolizer/
H A DOpts.td79 // Compatibility aliases for old asan_symbolize.py and sanitizer binaries (before 2020-08).
/freebsd/contrib/llvm-project/clang/lib/Driver/ToolChains/
H A DDarwin.cpp1519 const char *sanitizer = nullptr; in AddLinkRuntimeLibArgs() local
1521 sanitizer = "UndefinedBehaviorSanitizer"; in AddLinkRuntimeLibArgs()
1523 sanitizer = "AddressSanitizer"; in AddLinkRuntimeLibArgs()
1525 sanitizer = "ThreadSanitizer"; in AddLinkRuntimeLibArgs()
1527 if (sanitizer) { in AddLinkRuntimeLibArgs()
1529 << sanitizer; in AddLinkRuntimeLibArgs()
/freebsd/crypto/openssl/doc/man3/
H A DOPENSSL_malloc.pod197 clang's memory and leak sanitizer.
/freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/
H A DFuzzerLoop.cpp25 #if __has_include(<sanitizer / lsan_interface.h>)
26 #include <sanitizer/lsan_interface.h>
49 // than frees (using the sanitizer malloc hooks) and only then try to call lsan.
80 // sanitizer.
/freebsd/contrib/llvm-project/clang/include/clang/Driver/
H A DOptions.td1296 HelpText<"Enable sanitizer for supported offloading devices">;
1620 HelpText<"Dynamically link the sanitizer runtime">;
1622 …HelpText<"Statically link the sanitizer runtime (Not supported for ASan, TSan or UBSan on darwin)"…
1878 "The file uses the sanitizer special case list format.">,
2318 // Begin sanitizer flags. These should all be core options exposed in all driver
2355 …HelpText<"Restrict sanitizer coverage instrumentation exclusively to modules and functions that ma…
2359 HelpText<"Disable sanitizer coverage instrumentation for modules and functions "
2370 …HelpText<"Disable sanitizer metadata for modules and functions that match the provided special cas…
2386 … HelpText<"Always generate function calls for address sanitizer instrumentation">;
2389 … HelpText<"Use default code inlining logic for the address sanitizer">;
[all …]
/freebsd/contrib/googletest/docs/
H A Dadvanced.md2427 when they detect sanitizer errors, such as creating a reference from `nullptr`.
2434 FAIL() << "Encountered an undefined behavior sanitizer error";
2437 FAIL() << "Encountered an address sanitizer error";
2440 FAIL() << "Encountered a thread sanitizer error";
2446 test triggers a sanitizer error, GoogleTest will report that it failed.
/freebsd/tools/build/mk/
H A DOptionalObsoleteFiles.inc1108 OLD_FILES+=usr/lib/clang/19/include/sanitizer/allocator_interface.h
1109 OLD_FILES+=usr/lib/clang/19/include/sanitizer/asan_interface.h
1110 OLD_FILES+=usr/lib/clang/19/include/sanitizer/common_interface_defs.h
1111 OLD_FILES+=usr/lib/clang/19/include/sanitizer/coverage_interface.h
1112 OLD_FILES+=usr/lib/clang/19/include/sanitizer/dfsan_interface.h
1113 OLD_FILES+=usr/lib/clang/19/include/sanitizer/hwasan_interface.h
1114 OLD_FILES+=usr/lib/clang/19/include/sanitizer/linux_syscall_hooks.h
1115 OLD_FILES+=usr/lib/clang/19/include/sanitizer/lsan_interface.h
1116 OLD_FILES+=usr/lib/clang/19/include/sanitizer/memprof_interface.h
1117 OLD_FILES+=usr/lib/clang/19/include/sanitizer/msan_interface.h
[all …]
/freebsd/share/mk/
H A Dbsd.README117 stack smashing protection and without sanitizer instrumentation.

12