| /openbsd-src/gnu/llvm/llvm/docs/ |
| H A D | GwpAsan.rst | 2 GWP-ASan 12 GWP-ASan is a sampled allocator framework that assists in finding use-after-free 14 recursive acronym, "**G**\WP-ASan **W**\ill **P**\rovide **A**\llocation 17 GWP-ASan is based on the classic 27 GWP-ASan vs. ASan 31 GWP-ASan does not induce a significant performance overhead. ASan often requires 35 GWP-ASan is only capable of finding a subset of the memory issues detected by 36 ASan. Furthermore, GWP-ASan's bug detection capabilities are only probabilistic. 37 As such, we recommend using ASan over GWP-ASan in testing, as well as anywhere 40 impact is too high, and GWP-ASan proves extremely useful. [all …]
|
| H A D | ScudoHardenedAllocator.rst | 193 When dealing with the options string, it follows a syntax similar to ASan, where 255 `GWP-ASan <https://llvm.org/docs/GwpAsan.html>`_ support. 297 please consider `ASan <https://github.com/google/sanitizers/wiki/AddressSanitizer>`_
|
| /openbsd-src/gnu/llvm/compiler-rt/lib/gwp_asan/ |
| H A D | options.inc | 23 "Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY( 32 "selected for GWP-ASan sampling. Default is 5000. Sample rates " 35 // Developer note - This option is not actually processed by GWP-ASan itself. It 44 "Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This " 46 "deallocation when reporting a memory error. GWP-ASan's signal handler " 54 "Install GWP-ASan's signal handler in recoverable mode. This means that " 55 "upon GWP-ASan detecting an error, it'll print the error report, but *not* " 60 "non-GWP-ASan errors, as all GWP-ASan errors won't be forwarded.") 63 "Install GWP-ASan atfork handlers to acquire internal locks " 71 // If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings [all …]
|
| H A D | CMakeLists.txt | 33 # Ensure that GWP-ASan meets the delegated requirements of some supporting
|
| /openbsd-src/gnu/llvm/compiler-rt/lib/asan/ |
| H A D | README.txt | 3 This directory contains sources of the AddressSanitizer (ASan) runtime library. 11 tests/* : ASan unit tests. 13 Also ASan runtime needs the following libraries: 17 ASan runtime currently also embeds part of LeakSanitizer runtime for 20 ASan runtime can only be built by CMake. You can run ASan tests
|
| H A D | asan_flags.inc | 9 // ASan runtime flags. 64 "ASan allocator flag. max_malloc_fill_size is the maximal amount of " 68 "ASan allocator flag. max_free_fill_size is the maximal amount of " 103 "If set, prints ASan exit stats even after program terminates " 136 "If true, ASan tweaks a bunch of other flags (quarantine, redzone, heap " 163 "Check position of ASan runtime in library list (needs to be disabled"
|
| H A D | asan_activation_flags.inc | 9 // A subset of ASan (and common) runtime flags supported at activation time.
|
| H A D | CMakeLists.txt | 132 # Compile ASan sources into an object library. 176 # Build ASan runtimes shipped with Clang.
|
| /openbsd-src/gnu/llvm/compiler-rt/lib/asan/tests/ |
| H A D | CMakeLists.txt | 44 # -gline-tables-only must be enough for ASan, so use it if possible. 130 # ASan benchmarks (not actively used now). 254 # Add static ASan runtime that will be linked with uninstrumented tests. 293 # Test w/o ASan instrumentation. Link it with ASan statically. 311 # Test with ASan instrumentation. Link with ASan dynamic runtime.
|
| H A D | asan_test.ignore | 1 # ignorelisted functions for instrumented ASan unit test
|
| /openbsd-src/gnu/llvm/llvm/lib/Transforms/Instrumentation/ |
| H A D | AddressSanitizer.cpp | 891 AddressSanitizer &ASan; member 928 FunctionStackPoisoner(Function &F, AddressSanitizer &ASan) in FunctionStackPoisoner() 929 : F(F), ASan(ASan), DIB(*F.getParent(), /*AllowUnresolved*/ false), in FunctionStackPoisoner() 930 C(ASan.C), IntptrTy(ASan.IntptrTy), in FunctionStackPoisoner() 931 IntptrPtrTy(PointerType::get(IntptrTy, 0)), Mapping(ASan.Mapping), in FunctionStackPoisoner() 1043 if (!ASan.isInterestingAlloca(AI)) { in visitAllocaInst() 1067 if (!ASan.UseAfterScope) in visitIntrinsicInst() 1090 if (!ASan.isInterestingAlloca(*AI)) in visitIntrinsicInst() 1102 HasInlineAsm |= CI->isInlineAsm() && &CB != ASan.LocalDynamicShadow; in visitCallBase() 2833 if (ASan.UseAfterReturn == AsanDetectStackUseAfterReturnMode::Always || in initializeCallbacks() [all …]
|
| /openbsd-src/gnu/llvm/compiler-rt/lib/sanitizer_common/ |
| H A D | sanitizer_common_interceptors.inc | 1069 // FIXME: under ASan the call below may write to freed memory and corrupt 1087 // FIXME: under ASan the call below may write to freed memory and corrupt 1104 // FIXME: under ASan the call below may write to freed memory and corrupt 1122 // FIXME: under ASan the call below may write to freed memory and corrupt 1297 // FIXME: under ASan the call below may write to freed memory and corrupt 1441 // FIXME: under ASan the call below may write to freed memory and corrupt 1454 // FIXME: under ASan the call below may write to freed memory and corrupt 1467 // FIXME: under ASan the call below may write to freed memory and corrupt 1480 // FIXME: under ASan the call below may write to freed memory and corrupt 1524 // FIXME: under ASan the call below may write to freed memory and corrupt [all …]
|
| H A D | sanitizer_common_interceptors_netbsd_compat.inc | 37 // FIXME: under ASan the call below may write to freed memory and corrupt 49 // FIXME: under ASan the call below may write to freed memory and corrupt
|
| H A D | sanitizer_malloc_mac.inc | 101 // FIXME: ASan should support purgeable allocations. 108 // FIXME: ASan should support purgeable allocations. Ignoring them is fine 114 // FIXME: ASan should support purgeable allocations. Ignoring them is fine
|
| /openbsd-src/gnu/llvm/lldb/source/Plugins/InstrumentationRuntime/ |
| H A D | CMakeLists.txt | 1 add_subdirectory(ASan)
|
| /openbsd-src/gnu/llvm/libcxx/cmake/caches/ |
| H A D | Generic-asan.cmake | 2 # This is a temporary (hopefully) workaround for an ASan issue (see https://llvm.org/D119410).
|
| /openbsd-src/gnu/usr.bin/clang/liblldbPluginInstrumentationRuntime/ |
| H A D | Makefile | 13 .PATH: ${.CURDIR}/../../../llvm/lldb/source/Plugins/InstrumentationRuntime/ASan
|
| /openbsd-src/gnu/llvm/compiler-rt/lib/gwp_asan/tests/ |
| H A D | CMakeLists.txt | 49 # GWP-ASan unit tests are only run on the host machine.
|
| /openbsd-src/gnu/llvm/clang/bindings/python/tests/ |
| H A D | CMakeLists.txt | 26 # with ASan.
|
| /openbsd-src/gnu/llvm/compiler-rt/ |
| H A D | CMakeLists.txt | 65 option(COMPILER_RT_BUILD_GWP_ASAN "Build GWP-ASan, and link it into SCUDO" ON) 378 # that requires -fno-function-sections to work properly. If lacking, the ASan 416 # Disable thread safe initialization for static locals. ASan shouldn't need 418 # initialized, but ASan initializes before the CRT.
|
| /openbsd-src/gnu/llvm/llvm/utils/gn/build/ |
| H A D | BUILD.gn | 512 # Disable thread safe initialization for static locals. ASan shouldn't need it. 513 …# Thread safe initialization assumes that the CRT has already been initialized, but ASan initializ…
|
| /openbsd-src/gnu/llvm/clang/docs/ |
| H A D | AddressSanitizer.rst | 78 the ASan library that is packaged with the compiler used to build the 82 the ASan library will also need to be copied over.
|
| /openbsd-src/gnu/llvm/clang/tools/clang-fuzzer/ |
| H A D | README.txt | 144 helps to build it without ASan instrumentation and with the -O2 flag. Because
|
| /openbsd-src/gnu/llvm/compiler-rt/cmake/ |
| H A D | config-ix.cmake | 866 # Note: Fuchsia and Windows are not currently supported by GWP-ASan. Support 870 # for Scudo and GWP-ASan, further testing needed.
|
| /openbsd-src/gnu/llvm/clang/include/clang/Basic/ |
| H A D | CodeGenOptions.def | 248 llvm::AsanDtorKind::Global) ///< Set how ASan global
|