Home
last modified time | relevance | path

Searched refs:ASan (Results 1 – 25 of 32) sorted by relevance

12

/openbsd-src/gnu/llvm/llvm/docs/
H A DGwpAsan.rst2 GWP-ASan
12 GWP-ASan is a sampled allocator framework that assists in finding use-after-free
14 recursive acronym, "**G**\WP-ASan **W**\ill **P**\rovide **A**\llocation
17 GWP-ASan is based on the classic
27 GWP-ASan vs. ASan
31 GWP-ASan does not induce a significant performance overhead. ASan often requires
35 GWP-ASan is only capable of finding a subset of the memory issues detected by
36 ASan. Furthermore, GWP-ASan's bug detection capabilities are only probabilistic.
37 As such, we recommend using ASan over GWP-ASan in testing, as well as anywhere
40 impact is too high, and GWP-ASan proves extremely useful.
[all …]
H A DScudoHardenedAllocator.rst193 When dealing with the options string, it follows a syntax similar to ASan, where
255 `GWP-ASan <https://llvm.org/docs/GwpAsan.html>`_ support.
297 please consider `ASan <https://github.com/google/sanitizers/wiki/AddressSanitizer>`_
/openbsd-src/gnu/llvm/compiler-rt/lib/gwp_asan/
H A Doptions.inc23 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY(
32 "selected for GWP-ASan sampling. Default is 5000. Sample rates "
35 // Developer note - This option is not actually processed by GWP-ASan itself. It
44 "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This "
46 "deallocation when reporting a memory error. GWP-ASan's signal handler "
54 "Install GWP-ASan's signal handler in recoverable mode. This means that "
55 "upon GWP-ASan detecting an error, it'll print the error report, but *not* "
60 "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.")
63 "Install GWP-ASan atfork handlers to acquire internal locks "
71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings
[all …]
H A DCMakeLists.txt33 # Ensure that GWP-ASan meets the delegated requirements of some supporting
/openbsd-src/gnu/llvm/compiler-rt/lib/asan/
H A DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
H A Dasan_flags.inc9 // ASan runtime flags.
64 "ASan allocator flag. max_malloc_fill_size is the maximal amount of "
68 "ASan allocator flag. max_free_fill_size is the maximal amount of "
103 "If set, prints ASan exit stats even after program terminates "
136 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap "
163 "Check position of ASan runtime in library list (needs to be disabled"
H A Dasan_activation_flags.inc9 // A subset of ASan (and common) runtime flags supported at activation time.
H A DCMakeLists.txt132 # Compile ASan sources into an object library.
176 # Build ASan runtimes shipped with Clang.
/openbsd-src/gnu/llvm/compiler-rt/lib/asan/tests/
H A DCMakeLists.txt44 # -gline-tables-only must be enough for ASan, so use it if possible.
130 # ASan benchmarks (not actively used now).
254 # Add static ASan runtime that will be linked with uninstrumented tests.
293 # Test w/o ASan instrumentation. Link it with ASan statically.
311 # Test with ASan instrumentation. Link with ASan dynamic runtime.
H A Dasan_test.ignore1 # ignorelisted functions for instrumented ASan unit test
/openbsd-src/gnu/llvm/llvm/lib/Transforms/Instrumentation/
H A DAddressSanitizer.cpp891 AddressSanitizer &ASan; member
928 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner()
929 : F(F), ASan(ASan), DIB(*F.getParent(), /*AllowUnresolved*/ false), in FunctionStackPoisoner()
930 C(ASan.C), IntptrTy(ASan.IntptrTy), in FunctionStackPoisoner()
931 IntptrPtrTy(PointerType::get(IntptrTy, 0)), Mapping(ASan.Mapping), in FunctionStackPoisoner()
1043 if (!ASan.isInterestingAlloca(AI)) { in visitAllocaInst()
1067 if (!ASan.UseAfterScope) in visitIntrinsicInst()
1090 if (!ASan.isInterestingAlloca(*AI)) in visitIntrinsicInst()
1102 HasInlineAsm |= CI->isInlineAsm() && &CB != ASan.LocalDynamicShadow; in visitCallBase()
2833 if (ASan.UseAfterReturn == AsanDetectStackUseAfterReturnMode::Always || in initializeCallbacks()
[all …]
/openbsd-src/gnu/llvm/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_common_interceptors.inc1069 // FIXME: under ASan the call below may write to freed memory and corrupt
1087 // FIXME: under ASan the call below may write to freed memory and corrupt
1104 // FIXME: under ASan the call below may write to freed memory and corrupt
1122 // FIXME: under ASan the call below may write to freed memory and corrupt
1297 // FIXME: under ASan the call below may write to freed memory and corrupt
1441 // FIXME: under ASan the call below may write to freed memory and corrupt
1454 // FIXME: under ASan the call below may write to freed memory and corrupt
1467 // FIXME: under ASan the call below may write to freed memory and corrupt
1480 // FIXME: under ASan the call below may write to freed memory and corrupt
1524 // FIXME: under ASan the call below may write to freed memory and corrupt
[all …]
H A Dsanitizer_common_interceptors_netbsd_compat.inc37 // FIXME: under ASan the call below may write to freed memory and corrupt
49 // FIXME: under ASan the call below may write to freed memory and corrupt
H A Dsanitizer_malloc_mac.inc101 // FIXME: ASan should support purgeable allocations.
108 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
114 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
/openbsd-src/gnu/llvm/lldb/source/Plugins/InstrumentationRuntime/
H A DCMakeLists.txt1 add_subdirectory(ASan)
/openbsd-src/gnu/llvm/libcxx/cmake/caches/
H A DGeneric-asan.cmake2 # This is a temporary (hopefully) workaround for an ASan issue (see https://llvm.org/D119410).
/openbsd-src/gnu/usr.bin/clang/liblldbPluginInstrumentationRuntime/
H A DMakefile13 .PATH: ${.CURDIR}/../../../llvm/lldb/source/Plugins/InstrumentationRuntime/ASan
/openbsd-src/gnu/llvm/compiler-rt/lib/gwp_asan/tests/
H A DCMakeLists.txt49 # GWP-ASan unit tests are only run on the host machine.
/openbsd-src/gnu/llvm/clang/bindings/python/tests/
H A DCMakeLists.txt26 # with ASan.
/openbsd-src/gnu/llvm/compiler-rt/
H A DCMakeLists.txt65 option(COMPILER_RT_BUILD_GWP_ASAN "Build GWP-ASan, and link it into SCUDO" ON)
378 # that requires -fno-function-sections to work properly. If lacking, the ASan
416 # Disable thread safe initialization for static locals. ASan shouldn't need
418 # initialized, but ASan initializes before the CRT.
/openbsd-src/gnu/llvm/llvm/utils/gn/build/
H A DBUILD.gn512 # Disable thread safe initialization for static locals. ASan shouldn't need it.
513 …# Thread safe initialization assumes that the CRT has already been initialized, but ASan initializ…
/openbsd-src/gnu/llvm/clang/docs/
H A DAddressSanitizer.rst78 the ASan library that is packaged with the compiler used to build the
82 the ASan library will also need to be copied over.
/openbsd-src/gnu/llvm/clang/tools/clang-fuzzer/
H A DREADME.txt144 helps to build it without ASan instrumentation and with the -O2 flag. Because
/openbsd-src/gnu/llvm/compiler-rt/cmake/
H A Dconfig-ix.cmake866 # Note: Fuchsia and Windows are not currently supported by GWP-ASan. Support
870 # for Scudo and GWP-ASan, further testing needed.
/openbsd-src/gnu/llvm/clang/include/clang/Basic/
H A DCodeGenOptions.def248 llvm::AsanDtorKind::Global) ///< Set how ASan global

12