/openbmc/linux/scripts/ |
H A D | Makefile.kasan | 36 -mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET))) 43 $(call cc-param,asan-globals=1) \ 44 $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \ 45 $(call cc-param,asan-instrument-allocas=1) 48 CFLAGS_KASAN += $(call cc-param,asan-stack=$(stack_enable)) 53 CFLAGS_KASAN += $(call cc-param,asan-kernel-mem-intrinsic-prefix=1)
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | Build.txt | 51 3) Build with ASan or UBSan 57 AddressSanitizer (or ASan) is a GCC feature that detects memory corruption bugs 62 $ ASAN_OPTIONS=log_path=asan.log ./perf record -a 64 ASan outputs all detected issues into a log file named 'asan.log.<pid>'.
|
/openbmc/libmctp/tests/fuzz/ |
H A D | fuzz-build.py | 10 # * AFL (normal, asan, cmplog) 11 # * honggfuzz (asan, msan, ubsan) 60 # ASAN 86 # asan by default
|
/openbmc/libpldm/tests/fuzz/ |
H A D | fuzz-build.py | 10 # * AFL (normal, asan, cmplog) 60 # ASAN
|
H A D | fd-fuzz.cpp | 427 /* Fresh allocation so that ASAN will notice overflow reads */ in LLVMFuzzerTestOneInput()
|
/openbmc/linux/lib/ |
H A D | Kconfig.kasan | 53 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=kernel-address -mllvm -asan-kernel-mem-intrinsic-p… 54 (CC_IS_GCC && $(cc-option,-fsanitize=kernel-address --param asan-kernel-mem-intrinsic-prefix=1)) 68 CONFIG_KASAN_GENERIC, similar to userspace ASan),
|
/openbmc/qemu/tests/docker/ |
H A D | test-debug | 22 OPTS="--enable-debug --enable-asan --enable-ubsan $OPTS"
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/civetweb/ |
H A D | civetweb_1.16.bb | 19 # Disable ASAN as it is included only in Debug build.
|
/openbmc/qemu/ |
H A D | .patchew.yml | 91 {% elif test == "docker-mingw@fedora" or test == "docker-quick@centos8" or test == "asan" %} 120 asan:
|
H A D | meson_options.txt | 96 option('asan', type: 'boolean', value: false, boolean
|
H A D | meson.build | 527 if get_option('asan') 558 if get_option('asan') or get_option('ubsan') 2643 if get_option('asan') and \ 2647 warning('Missing ASAN due to missing fiber annotation interface')
|
/openbmc/linux/lib/zstd/common/ |
H A D | portability_macros.h | 41 /* detects whether we are being compiled under asan */
|
/openbmc/linux/Documentation/dev-tools/ |
H A D | kfence.rst | 315 In userspace, a similar approach is taken by `GWP-ASan 316 <http://llvm.org/docs/GwpAsan.html>`_. GWP-ASan also relies on guard pages and 318 directly influenced by GWP-ASan, and can be seen as its kernel sibling. Another
|
H A D | kasan.rst | 17 debugging, similar to userspace ASan. This mode is supported on many CPU
|
/openbmc/linux/lib/zstd/compress/ |
H A D | zstd_cwksp.h | 25 * arena, when we run under ASAN, we should similarly insert redzones between 26 * each internal element of the workspace, so ASAN will catch overruns that 185 * but under special conditions, like ASAN, where we pad each object, it might
|
/openbmc/linux/scripts/gcc-plugins/ |
H A D | sancov_plugin.c | 107 PASS_INFO(sancov, "asan", 0, PASS_POS_INSERT_BEFORE); in plugin_init()
|
/openbmc/qemu/docs/devel/testing/ |
H A D | fuzzing.rst | 24 Here, enable-asan and enable-ubsan are optional but they allow us to reliably 29 --enable-fuzzing --enable-asan --enable-ubsan
|
/openbmc/qemu/docs/devel/ |
H A D | secure-coding-practices.rst | 36 asan.
|
/openbmc/qemu/scripts/ |
H A D | meson-buildoptions.sh | 24 printf "%s\n" ' --enable-asan enable address sanitizer' 238 --enable-asan) printf "%s" -Dasan=true ;; 239 --disable-asan) printf "%s" -Dasan=false ;;
|
/openbmc/linux/arch/powerpc/kernel/ |
H A D | vmlinux.lds.S | 125 *(.text.asan.* .text.tsan.*)
|
/openbmc/qemu/tests/qtest/ |
H A D | fdc-test.c | 555 g_test_skip("QEMU not configured using --enable-asan"); in qtest_check_clang_sanitizer()
|
/openbmc/linux/rust/ |
H A D | Makefile | 292 --param=% --param asan-%
|
/openbmc/qemu/tests/qtest/fuzz/ |
H A D | generic_fuzz.c | 614 * SEPARATOR is trivial for the fuzzer to discover when using ASan. Optionally,
|
/openbmc/linux/include/asm-generic/ |
H A D | vmlinux.lds.h | 563 *(.text.asan.* .text.tsan.*)
|
/openbmc/openbmc-build-scripts/scripts/ |
H A D | unit-test.py | 1083 # asan symbols at runtime only. We don't want to set it earlier
|