Home
last modified time | relevance | path

Searched +full:- +full:fsanitize (Results 1 – 25 of 51) sorted by relevance

123

/openbmc/linux/lib/
H A DKconfig.ubsan1 # SPDX-License-Identifier: GPL-2.0-only
9 Compile-time instrumentation is used to detect various undefined
11 Documentation/dev-tools/ubsan.rst
27 trade-off.
38 def_bool $(cc-option,-fsanitize=bounds-strict)
40 The -fsanitize=bounds-strict option is only available on GCC,
43 -fsanitize=bounds.
46 def_bool $(cc-option,-fsanitize=array-bounds)
48 Under Clang, the -fsanitize=bounds option is actually composed
49 of two more specific options, -fsanitize=array-bounds and
[all …]
H A DKconfig.kmsan1 # SPDX-License-Identifier: GPL-2.0-only
6 # Clang versions <14.0.0 also support -fsanitize=kernel-memory, but not
9 def_bool $(cc-option,-fsanitize=kernel-memory -mllvm -msan-disable-checks=1)
27 See <file:Documentation/dev-tools/kmsan.rst> for more details.
32 # -fsanitize-memory-param-retval is supported only by Clang >= 14.
34 def_bool $(cc-option,-fsanitize=kernel-memory -fsanitize-memory-param-retval)
41 If the compiler supports -fsanitize-memory-param-retval, KMSAN will
48 may potentially report errors in corner cases when non-instrumented
H A DKconfig.kasan1 # SPDX-License-Identifier: GPL-2.0-only
23 def_bool $(cc-option, -fsanitize=kernel-address)
26 def_bool $(cc-option, -fsanitize=kernel-hwaddress)
43 Enables KASAN (Kernel Address Sanitizer) - a dynamic memory safety
44 error detector designed to find out-of-bounds and use-after-free bugs.
46 See Documentation/dev-tools/kasan.rst for details.
53 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=kernel-address -mllvm -asan-kernel-mem-intrinsic-p…
54 (CC_IS_GCC && $(cc-option,-fsanitize=kernel-address --param asan-kernel-mem-intrinsic-prefix=1))
69 2. Software Tag-Based KASAN (arm64 only, based on software memory
72 3. Hardware Tag-Based KASAN (arm64 only, based on hardware memory
[all …]
H A DKconfig.kcsan1 # SPDX-License-Identifier: GPL-2.0-only
7 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1)) || \
8 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-distinguish-volatile=1))
11 <file:Documentation/dev-tools/kcsan.rst>.
21 data-race detector that relies on compile-time instrumentation.
22 KCSAN uses a watchpoint-based sampling approach to detect races.
29 See <file:Documentation/dev-tools/kcsan.rst> for more details.
34 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-compound-read-before-write=1))…
35 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-compound-read-before-write=1))
37 The compiler instruments plain compound read-write operations
[all …]
/openbmc/linux/scripts/
H A DMakefile.ubsan1 # SPDX-License-Identifier: GPL-2.0
4 ubsan-cflags-$(CONFIG_UBSAN_ALIGNMENT) += -fsanitize=alignment
5 ubsan-cflags-$(CONFIG_UBSAN_BOUNDS_STRICT) += -fsanitize=bounds-strict
6 ubsan-cflags-$(CONFIG_UBSAN_ARRAY_BOUNDS) += -fsanitize=array-bounds
7 ubsan-cflags-$(CONFIG_UBSAN_LOCAL_BOUNDS) += -fsanitize=local-bounds
8 ubsan-cflags-$(CONFIG_UBSAN_SHIFT) += -fsanitize=shift
9 ubsan-cflags-$(CONFIG_UBSAN_DIV_ZERO) += -fsanitize=integer-divide-by-zero
10 ubsan-cflags-$(CONFIG_UBSAN_UNREACHABLE) += -fsanitize=unreachable
11 ubsan-cflags-$(CONFIG_UBSAN_BOOL) += -fsanitize=bool
12 ubsan-cflags-$(CONFIG_UBSAN_ENUM) += -fsanitize=enum
[all …]
H A DMakefile.kasan1 # SPDX-License-Identifier: GPL-2.0
9 CFLAGS_KASAN_NOSANITIZE := -fno-builtin
14 cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1)))
30 CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address
32 # -fasan-shadow-offset fails without -fsanitize
33 CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \
34 -fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \
35 $(call cc-option, -fsanitize=kernel-address \
36 -mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET)))
43 $(call cc-param,asan-globals=1) \
[all …]
H A DMakefile.kmsan1 # SPDX-License-Identifier: GPL-2.0
2 kmsan-cflags := -fsanitize=kernel-memory
5 kmsan-cflags += -fsanitize-memory-param-retval
8 export CFLAGS_KMSAN := $(kmsan-cflags)
H A DMakefile.kcov1 # SPDX-License-Identifier: GPL-2.0-only
2 kcov-flags-$(CONFIG_CC_HAS_SANCOV_TRACE_PC) += -fsanitize-coverage=trace-pc
3 kcov-flags-$(CONFIG_KCOV_ENABLE_COMPARISONS) += -fsanitize-coverage=trace-cmp
4 kcov-flags-$(CONFIG_GCC_PLUGIN_SANCOV) += -fplugin=$(objtree)/scripts/gcc-plugins/sancov_plugin.so
6 export CFLAGS_KCOV := $(kcov-flags-y)
/openbmc/witherspoon-pfault-analysis/
H A Delog-errors.hpp2 // See elog-gen.py for more details
5 #include <phosphor-logging/elog.hpp>
6 #include <phosphor-logging/log.hpp>
162 * We can't use -fsanitize=undefined if we declare a
163 * 'static constexpr auto str' member, so don't. Instead, open-code the
174 * We can't use -fsanitize=undefined if we declare a
175 * 'static constexpr auto str' member, so don't. Instead, open-code the
188 * We can't use -fsanitize=undefined if we declare a
189 * 'static constexpr auto str' member, so don't. Instead, open-code the
239 * We can't use -fsanitize=undefined if we declare a
[all …]
/openbmc/linux/tools/testing/memblock/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
5 CFLAGS += -I. -I../../include -Wall -O2 -fsanitize=address \
6 -fsanitize=undefined -D CONFIG_PHYS_ADDR_T_64BIT
7 LDFLAGS += -fsanitize=address -fsanitize=undefined
16 CFLAGS += -m32
17 LDFLAGS += -m32
30 @mkdir -p linux
31 test -L linux/memblock.h || ln -s ../../../../include/linux/memblock.h linux/memblock.h
32 test -L asm/asm.h || ln -s ../../../arch/x86/include/asm/asm.h asm/asm.h
33 test -L asm/cmpxchg.h || ln -s ../../../arch/x86/include/asm/cmpxchg.h asm/cmpxchg.h
[all …]
/openbmc/openpower-host-ipmi-oem/
H A Delog-errors.hpp2 // See elog-gen.py for more details
5 #include <phosphor-logging/elog.hpp>
6 #include <phosphor-logging/log.hpp>
60 * We can't use -fsanitize=undefined if we declare a
61 * 'static constexpr auto str' member, so don't. Instead, open-code the
105 * We can't use -fsanitize=undefined if we declare a
106 * 'static constexpr auto str' member, so don't. Instead, open-code the
152 * We can't use -fsanitize=undefined if we declare a
153 * 'static constexpr auto str' member, so don't. Instead, open-code the
166 * We can't use -fsanitize=undefined if we declare a
[all …]
/openbmc/linux/tools/testing/scatterlist/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0-only
2 CFLAGS += -I. -I../../include -g -O2 -Wall -fsanitize=address
3 LDFLAGS += -fsanitize=address -fsanitize=undefined
8 CFLAGS += -m32
9 LDFLAGS += -m32
21 @sed -e 's/^static //' -e 's/__always_inline //' -e 's/inline //' < $< > $@
26 @mkdir -p linux
27 @mkdir -p asm
/openbmc/linux/tools/testing/radix-tree/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
3 CFLAGS += -I. -I../../include -I../../../lib -g -Og -Wall \
4 -D_LGPL_SOURCE -fsanitize=address -fsanitize=undefined
5 LDFLAGS += -fsanitize=address -fsanitize=undefined
6 LDLIBS+= -lpthread -lurcu
7 TARGETS = main idr-test multiorder xarray maple
8 CORE_OFILES := xarray.o radix-tree.o idr.o linux.o test.o find_bit.o bitmap.o \
11 regression4.o tag_check.o multiorder.o idr-test.o iteration_check.o \
19 CFLAGS += -m32
20 LDFLAGS += -m32
[all …]
/openbmc/phosphor-mboxd/
H A Dbootstrap.sh3 set -eu
5 AUTOCONF_FILES="Makefile.in aclocal.m4 ar-lib autom4te.cache compile \
6 config.guess config.h.in config.sub configure depcomp install-sh \
7 ltmain.sh missing *libtool test-driver"
11 if [ $# -gt 0 ];
19 AX_CODE_COVERAGE_PATH="$(aclocal --print-ac-dir)"/ax_code_coverage.m4
20 if [ ! -e ${AX_CODE_COVERAGE_PATH} ];
25 LCOV_VERSION=$(lcov --version | tr ' ' '\n' | tail -1)
27 # Ubuntu Zesty ships with lcov v1.13, but Zesty's autoconf-archive
31 # sed-patch ax_code_coverage.m4 as it's GPLv3, and this is an Apache v2
[all …]
/openbmc/hiomapd/
H A Dbootstrap.sh3 set -eu
5 AUTOCONF_FILES="Makefile.in aclocal.m4 ar-lib autom4te.cache compile \
6 config.guess config.h.in config.sub configure depcomp install-sh \
7 ltmain.sh missing *libtool test-driver"
11 if [ $# -gt 0 ];
19 AX_CODE_COVERAGE_PATH="$(aclocal --print-ac-dir)"/ax_code_coverage.m4
20 if [ ! -e "${AX_CODE_COVERAGE_PATH}" ];
25 LCOV_VERSION=$(lcov --version | tr ' ' '\n' | tail -1)
27 # Ubuntu Zesty ships with lcov v1.13, but Zesty's autoconf-archive
31 # sed-patch ax_code_coverage.m4 as it's GPLv3, and this is an Apache v2
[all …]
/openbmc/linux/tools/testing/selftests/fchmodat2/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0-or-later
3 CFLAGS += -Wall -O2 -g -fsanitize=address -fsanitize=undefined -static-libasan $(KHDR_INCLUDES)
/openbmc/linux/tools/testing/selftests/openat2/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0-or-later
3 CFLAGS += -Wall -O2 -g -fsanitize=address -fsanitize=undefined -static-libasan
/openbmc/linux/tools/net/ynl/lib/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
4 CFLAGS=-std=gnu11 -O2 -W -Wall -Wextra -Wno-unused-parameter -Wshadow
6 CFLAGS += -g -fsanitize=address -fsanitize=leak -static-libasan
19 rm -f *.o *.d *~
22 rm -f *.a
25 $(COMPILE.c) -MMD -c -o $@ $<
/openbmc/linux/tools/net/ynl/samples/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
6 CFLAGS=-std=gnu11 -O2 -W -Wall -Wextra -Wno-unused-parameter -Wshadow \
7 -I../lib/ -I../generated/ -idirafter $(UAPI_PATH)
9 CFLAGS += -g -fsanitize=address -fsanitize=leak -static-libasan
12 LDLIBS=-lmnl ../lib/ynl.a ../generated/protos.a
24 rm -f *.o *.d *~
27 rm -f $(BINS)
/openbmc/phosphor-power/
H A Delog-errors.hpp2 // See elog-gen.py for more details
5 #include <phosphor-logging/elog.hpp>
6 #include <phosphor-logging/log.hpp>
1457 * We can't use -fsanitize=undefined if we declare a
1458 * 'static constexpr auto str' member, so don't. Instead, open-code the
1469 * We can't use -fsanitize=undefined if we declare a
1470 * 'static constexpr auto str' member, so don't. Instead, open-code the
1483 * We can't use -fsanitize=undefined if we declare a
1484 * 'static constexpr auto str' member, so don't. Instead, open-code the
1534 * We can't use -fsanitize=undefined if we declare a
[all …]
/openbmc/linux/tools/net/ynl/generated/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
4 CFLAGS=-std=gnu11 -O2 -W -Wall -Wextra -Wno-unused-parameter -Wshadow \
5 -I../lib/ -idirafter $(UAPI_PATH)
7 CFLAGS += -g -fsanitize=address -fsanitize=leak -static-libasan
12 YNL_GEN_ARG_ethtool:=--user-header linux/ethtool_netlink.h \
13 --exclude-op stats-get
15 TOOL:=../ynl-gen-c.py
18 SRCS=$(patsubst %,%-user.c,${GENS})
19 HDRS=$(patsubst %,%-user.h,${GENS})
20 OBJS=$(patsubst %,%-user.o,${GENS})
[all …]
/openbmc/linux/tools/perf/Documentation/
H A DBuild.txt6 - libperf library (static)
7 - perf builtin commands
8 - traceevent library (static)
9 - GTK ui library
13 - Makefile
15 Makefile.perf with a -j option to do parallel builds.
17 - Makefile.perf
21 - tools/build/Makefile.build
24 - tools/build/Build.include
27 - Build makefiles
[all …]
/openbmc/qemu/tests/tsan/
H A Dignore.tsan3 # "--extra-cflags=-fsanitize-blacklist=<src path>/tests/tsan/ignore.tsan"
/openbmc/qemu/
H A Dmeson.build10 meson.add_postconf_script(find_program('scripts/symlink-install-tree.py'))
23 config_host = keyval.load(meson.current_build_dir() / 'config-host.mak')
30 tmpdir = meson.current_build_dir() / 'meson-private/temp'
61 have_linux_user = have_linux_user or target.endswith('linux-user')
62 have_bsd_user = have_bsd_user or target.endswith('bsd-user')
63 have_system = have_system or target.endswith('-softmmu')
107 …dgen.version() + ' is unsupported. You can install a new version with "cargo install bindgen-cli"')
114 message('To use Rust you can install a new version with "cargo install bindgen-cli"')
132 # instead. QEMU --enable-modules depends on this because the SystemTap
135 add_global_arguments('-DSTAP_SDT_V2',
[all …]
/openbmc/qemu/tests/docker/
H A Dtest-clang1 #!/bin/bash -e
12 # the top-level directory.
20 OPTS="--cxx=clang++ --cc=clang --host-cc=clang"
21 OPTS="$OPTS --extra-cflags=-fsanitize=undefined \
22 --extra-cflags=-fno-sanitize=float-divide-by-zero"

123