reference, declaration → definition definition → references, declarations, derived classes, virtual overrides reference to multiple definitions → definitions unreferenced |
256 CfiCrossDso = Args.hasFlag(options::OPT_fsanitize_cfi_cross_dso, 262 SanitizerMask TrappingKinds = parseSanitizeTrapArgs(D, Args); 266 Args.hasFlag(options::OPT_fsanitize_minimal_runtime, 270 Arg *OptLevel = Args.getLastArg(options::OPT_O_Group); 274 for (ArgList::const_reverse_iterator I = Args.rbegin(), E = Args.rend(); 274 for (ArgList::const_reverse_iterator I = Args.rbegin(), E = Args.rend(); 288 << Arg->getAsString(Args); 354 << "-fsanitize=vptr" << NoRTTIArg->getAsString(Args); 454 << lastArgumentForMask(D, Args, Kinds & NeedsLTO) << "-flto"; 460 !Args.hasArg(options::OPT_ffixed_x18)) { 462 << lastArgumentForMask(D, Args, Kinds & SanitizerKind::ShadowCallStack) 491 << lastArgumentForMask(D, Args, Group) 492 << lastArgumentForMask(D, Args, Incompatible); 506 for (const auto *Arg : Args) { 548 D.Diag(diag::warn_drv_deprecated_arg) << Arg->getAsString(Args) 562 for (const auto *Arg : Args) { 590 Args.getLastArg(options::OPT_fsanitize_memory_track_origins_EQ, 602 D.Diag(clang::diag::err_drv_invalid_value) << A->getAsString(Args) << S; 607 Args.hasFlag(options::OPT_fsanitize_memory_use_after_dtor, 617 TsanMemoryAccess = Args.hasFlag( 620 TsanFuncEntryExit = Args.hasFlag( 624 Args.hasFlag(options::OPT_fsanitize_thread_atomics, 633 Args.hasArg(options::OPT_fsanitize_cfi_icall_generalize_pointers); 641 Args.hasFlag(options::OPT_fsanitize_cfi_canonical_jump_tables, 645 Stats = Args.hasFlag(options::OPT_fsanitize_stats, 654 << lastArgumentForMask(D, Args, IncompatibleMask); 665 for (const auto *Arg : Args) { 675 << Arg->getAsString(Args) << "-fsanitize-coverage=trace-pc-guard"; 738 Args.hasFlag(options::OPT_shared_libsan, options::OPT_static_libsan, 747 Args.getLastArg(options::OPT_fsanitize_address_field_padding)) { 752 D.Diag(clang::diag::err_drv_invalid_value) << A->getAsString(Args) << S; 757 Args.getLastArg(options::OPT__SLASH_MTd, options::OPT__SLASH_MT, 765 << WindowsDebugRTArg->getAsString(Args) 766 << lastArgumentForMask(D, Args, SanitizerKind::Address); 771 AsanUseAfterScope = Args.hasFlag( 775 AsanPoisonCustomArrayCookie = Args.hasFlag( 786 Args.hasArg(options::OPT_fsanitize_address_globals_dead_stripping); 789 Args.hasFlag(options::OPT_fsanitize_address_use_odr_indicator, 808 << lastArgumentForMask(D, Args, 817 Args.getLastArg(options::OPT_fsanitize_hwaddress_abi_EQ)) { 821 << HwasanAbiArg->getAsString(Args) << HwasanAbi; 833 Args.hasFlag(options::OPT_fsanitize_link_runtime, 837 LinkCXXRuntimes = Args.hasArg(options::OPT_fsanitize_link_cxx_runtime,