Home
last modified time | relevance | path

Searched +full:build +full:- +full:asan (Results 1 – 25 of 298) sorted by relevance

12345678910>>...12

/netbsd-src/external/mit/libuv/dist/.github/workflows/
H A Dsanitizer.yml6 - '**'
7 - '!docs/**'
8 - '!.**'
9 - '.github/workflows/sanitizer.yml'
12 - v[0-9].*
13 - master
17 runs-on: ubuntu-latest
19 - uses: actions/checkout@v2
20 - name: Setup
22 sudo apt-get install ninja-build
[all …]
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/asan/
H A DREADME.txt3 This directory contains sources of the AddressSanitizer (ASan) runtime library.
7 Makefile.mk : File for make-based build.
8 CMakeLists.txt : File for cmake-based build.
9 asan_*.{cc,h} : Sources of the asan runtime library.
11 tests/* : ASan unit tests.
13 Also ASan runtime needs the following libraries:
17 ASan runtime currently also embeds part of LeakSanitizer runtime for
20 ASan runtime can only be built by CMake. You can run ASan tests
21 from the root of your CMake build tree:
23 make check-asan
H A Dasan_internal.h1 //===-- asan_internal.h -----------------------------------------*- C++ -*-===//
8 //===----------------------------------------------------------------------===//
12 // ASan-private header which defines various general utilities.
13 //===----------------------------------------------------------------------===//
25 # error "The AddressSanitizer run-time should not be"
29 // Build-time configuration options.
31 // If set, asan will intercept C++ exception api call(s).
54 // All internal functions in asan reside inside the __asan namespace
56 // Separate namespace also makes it simpler to distinguish the asan run-time
114 // Returns `true` iff most of ASan init process should be skipped due to the
[all …]
/netbsd-src/external/gpl3/gcc/dist/libsanitizer/
H A DChangeLog1 2024-06-20 Release Manager
5 2023-05-21 Iain Sandoe <iain@sandoe.co.uk>
8 2023-04-18 Iain Sandoe <iain@sandoe.co.uk>
13 2023-05-08 Release Manager
17 2023-01-04 Florian Weimer <fweimer@redhat.com>
20 2022-10-18 Florian Weimer <fweimer@redhat.com>
26 2022-08-19 Release Manager
30 2022-05-06 Release Manager
34 2022-03-14 Xi Ruoyao <xry111@mengyan1223.wang>
36 * configure.tgt: Enable build on mips*64*-*-linux*.
[all …]
H A DHOWTO_MERGE2 track various ABI changes and GCC-specific patches carefully. Here is a
7 * Modify Makefile.am files into asan/tsan/lsan/ubsan/sanitizer_common/interception
11 in corresponding CMakeLists.txt and config-ix.cmake files from compiler-rt source
13 * Apply all needed GCC-specific patches to libsanitizer (note that some of
20 * Update ASan testsuite with corresponding tests from lib/asan/tests directory.
25 * Bump SONAME for sanitizer libraries in asan/tsan/ubsan libtool-version files
30 * Run regression testing on at least three platforms (e.g. x86-linux-gnu, x86_64-linux-gnu,
31 aarch64-linux-gnu, arm-linux-gnueabi).
33 * Compare ABI of corresponding libclang_rt.asan and newly build libasan libraries.
39 * Split your changes into logical parts (e.g. raw merge, compiler changes, GCC-specific changes
[all …]
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/secondary/compiler-rt/lib/asan/
H A DBUILD.gn1 import("//compiler-rt/target.gni")
4 configs -= [ "//llvm/utils/gn/build:llvm_code" ]
5 configs += [ "//llvm/utils/gn/build:crt_code" ]
15 target(asan_target_type, "asan") {
16 configs -= [ "//llvm/utils/gn/build:llvm_code" ]
17 configs += [ "//llvm/utils/gn/build:crt_code" ]
24 output_name = "clang_rt.asan$crt_current_target_suffix"
28 "//compiler-rt/lib/interception:sources",
29 "//compiler-rt/lib/lsan:common_sources",
30 "//compiler-rt/lib/sanitizer_common:sources",
[all …]
/netbsd-src/external/apache2/llvm/dist/clang/cmake/caches/
H A DFuchsia-stage2.cmake1 # This file sets up a CMakeCache for the second stage of a Fuchsia toolchain build.
7 set(LLVM_ENABLE_PROJECTS "clang;clang-tools-extra;lld;llvm;polly" CACHE STRING "")
8 set(LLVM_ENABLE_RUNTIMES "compiler-rt;libcxx;libcxxabi;libunwind" CACHE STRING "")
32 set(CLANG_DEFAULT_OBJCOPY llvm-objcopy CACHE STRING "")
34 set(CLANG_DEFAULT_RTLIB compiler-rt CACHE STRING "")
77 set(target "x86_64-pc-windows-msvc")
91 set(RUNTIMES_${target}_LLVM_ENABLE_RUNTIMES "compiler-rt;libcxx" CACHE STRING "")
94 foreach(target aarch64-unknown-linux-gnu;armv7-unknown-linux-gnueabihf;i386-unknown-linux-gnu;x86_6…
96 # Set the per-target builtins options.
100 set(BUILTINS_${target}_CMAKE_C_FLAGS "--target=${target}" CACHE STRING "")
[all …]
/netbsd-src/external/apache2/llvm/dist/clang/runtime/
H A DCMakeLists.txt20 set(${out_var} ${CMAKE_COMMAND} --build . --target ${target}
21 --config $<CONFIG> PARENT_SCOPE)
25 set(COMPILER_RT_SRC_ROOT ${LLVM_MAIN_SRC_DIR}/projects/compiler-rt)
38 # Add compiler-rt as an external project.
39 set(COMPILER_RT_PREFIX ${CMAKE_BINARY_DIR}/projects/compiler-rt)
41 set(STAMP_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-stamps/)
42 set(BINARY_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-bins/)
44 add_custom_target(compiler-rt-clear
45 COMMAND ${CMAKE_COMMAND} -E remove_directory ${BINARY_DIR}
46 COMMAND ${CMAKE_COMMAND} -E remove_directory ${STAMP_DIR}
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/fuzz/
H A DREADME.md10 Use Chrome's handy recent build of clang. Older versions may also work.
12 $ sudo apt-get install git
13 $ mkdir git-work
17 You may want to git pull and re-run the update from time to time.
21 $ PATH=~/third_party/llvm-build/Release+Asserts/bin/:$PATH
23 Get and build libFuzzer (there is a git mirror at
24 https://github.com/llvm-mirror/llvm/tree/master/lib/Fuzzer if you prefer):
27 $ sudo apt-get install subversion
28 $ mkdir svn-work
29 $ cd svn-work
[all …]
/netbsd-src/external/gpl3/gcc.old/dist/libsanitizer/
H A DHOWTO_MERGE2 track various ABI changes and GCC-specific patches carefully. Here is a
8 * Modify Makefile.am files into asan/tsan/lsan/ubsan/sanitizer_common/interception
12 in corresponding CMakeLists.txt and config-ix.cmake files from compiler-rt source
14 * Apply all needed GCC-specific patches to libsanitizer (note that some of
21 * Update ASan testsuite with corresponding tests from lib/asan/tests directory.
26 * Bump SONAME for sanitizer libraries in asan/tsan/ubsan libtool-version files
31 * Run regression testing on at least three platforms (e.g. x86-linux-gnu, x86_64-linux-gnu,
32 aarch64-linux-gnu, arm-linux-gnueabi).
34 * Compare ABI of corresponding libclang_rt.asan and newly build libasan libraries.
40 * Split your changes into logical parts (e.g. raw merge, compiler changes, GCC-specific changes
[all …]
H A DREADME.gcc4 Both tools consist of a compiler module and a run-time library.
5 The sources of the run-time library for these projects are hosted at
6 https://llvm.org/svn/llvm-project/compiler-rt in the following directories:
10 lib/asan
15 Trivial and urgent fixes (portability, build fixes, etc.) may go directly to the
16 GCC tree. All non-trivial changes, functionality improvements, etc. should go
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/scripts/
H A Dcheck_lint.sh20 COMMON_LINT_FILTER=-build/include,-build/header_guard,-legal/copyright,-whitespace/comments,-readab…
21 -build/namespaces,-readability/braces
22 ASAN_RTL_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/int
23 ASAN_TEST_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/sizeof,-runtime/int,-runtime/printf,-runtime/t…
24 ASAN_LIT_TEST_LINT_FILTER=${ASAN_TEST_LINT_FILTER},-whitespace/line_length
26 TSAN_TEST_LINT_FILTER=${TSAN_RTL_LINT_FILTER},-runtime/threadsafe_fn,-runtime/int
27 TSAN_LIT_TEST_LINT_FILTER=${TSAN_TEST_LINT_FILTER},-whitespace/line_length
30 LSAN_LIT_TEST_LINT_FILTER=${LSAN_RTL_LINT_FILTER},-whitespace/line_length
31 DFSAN_RTL_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/int,-runtime/printf,-runtime/references,-reada…
33 COMMON_RTL_INC_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/int,-runtime/sizeof,-runtime/printf,-read…
[all …]
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/asan/tests/
H A DCMakeLists.txt5 # no-instrumentation tests.
9 # and have some elements of version skew -- they test the *host* compiler's
10 # instrumentation against the just-built runtime library.
27 -I${COMPILER_RT_SOURCE_DIR}/include
28 -I${COMPILER_RT_SOURCE_DIR}/lib
29 -I${COMPILER_RT_SOURCE_DIR}/lib/asan
30 -I${COMPILER_RT_SOURCE_DIR}/lib/sanitizer_common/tests
31 -fno-rtti
32 -O2
33 -Wno-format
[all …]
/netbsd-src/external/apache2/llvm/dist/clang/docs/
H A DAddressSanitizer.rst12 instrumentation module and a run-time library. The tool can detect the
15 * Out-of-bounds accesses to heap, stack and globals
16 * Use-after-free
17 * Use-after-return (runtime flag `ASAN_OPTIONS=detect_stack_use_after_return=1`)
18 * Use-after-scope (clang flag `-fsanitize-address-use-after-scope`)
19 * Double-free, invalid free
24 How to build
27 Build LLVM/Clang with `CMake <https://llvm.org/docs/CMake.html>`_.
32 Simply compile and link your program with ``-fsanitize=address`` flag. The
33 AddressSanitizer run-time library should be linked to the final executable, so
[all …]
/netbsd-src/sys/arch/arm/conf/
H A DMakefile.arm15 # To specify debugging, add the config line: makeoptions DEBUG="-g"
16 # A better way is to specify -g only for a few files.
26 . error Don't build 32-bit kernel with 64-bit toolchain
35 .-include "$S/arch/${MACHINE}/conf/Makefile.${MACHINE}.inc"
40 # CPPFLAGS set by platform-specific Makefile fragment.
41 AFLAGS+= -x assembler-with-cpp
42 COPTS.arm32_kvminit.c+= -fno-stack-protector
43 COPTS.vfp_init.c= -mfpu=vfp
44 CLANG_OBSOLETE_MULTI_ST= ${${ACTIVE_CC} == "clang":? -Wa,-W :}
45 AFLAGS.bcopyinout.S+= -marm
[all …]
/netbsd-src/external/gpl3/gcc/dist/libsanitizer/asan/
H A Dasan_internal.h1 //===-- asan_internal.h -----------------------------------------*- C++ -*-===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
11 // ASan-private header which defines various general utilities.
12 //===----------------------------------------------------------------------===//
24 # error "The AddressSanitizer run-time should not be"
28 // Build-time configuration options.
30 // If set, asan will intercept C++ exception api call(s).
53 // All internal functions in asan reside inside the __asan namespace
55 // Separate namespace also makes it simpler to distinguish the asan run-time
[all …]
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/tsan/
H A Dcheck_cmake.sh2 set -u
3 set -e
6 if [ -d "$ROOT/llvm-build" ]; then
7 cd $ROOT/llvm-build
9 mkdir -p $ROOT/llvm-build
10 cd $ROOT/llvm-build
11 …CC=clang CXX=clang++ cmake -G Ninja -DLLVM_ENABLE_WERROR=ON -DCMAKE_BUILD_TYPE=Release -DLLVM_ENAB…
14 ninja check-sanitizer
15 ninja check-tsan
16 ninja check-asan
[all …]
/netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/
H A DTODO.txt3 - more projects (lldb, check- targets for compiler-rt's asan/ubsan/msan/tsan)
4 - once there are more projects, have an llvm_enable_projects arg, modeled
5 after llvm_targets_to_build in the GN build
6 - a check-all build target that runs test of all projects
7 - more targets (ARC MSP430 XCore)
8 - example: https://reviews.llvm.org/D56416
9 - investigate feasibility of working `gn check`
11 - "optimized tblgen" mode
12 - either just always build tablegen and support with opt config
13 - or use opt toolchain and build tablegen twice in debug builds, like cmake
[all …]
/netbsd-src/external/apache2/llvm/dist/llvm/docs/
H A DGwpAsan.rst2 GWP-ASan
12 GWP-ASan is a sampled allocator framework that assists in finding use-after-free
13 and heap-buffer-overflow bugs in production environments. It informally is a
14 recursive acronym, "**G**\WP-ASan **W**\ill **P**\rovide **A**\llocation
17 GWP-ASan is based on the classic
27 GWP-ASan vs. ASan
31 GWP-ASan does not induce a significant performance overhead. ASan often requires
35 GWP-ASan is only capable of finding a subset of the memory issues detected by
36 ASan. Furthermore, GWP-ASan's bug detection capabilities are only probabilistic.
37 As such, we recommend using ASan over GWP-ASan in testing, as well as anywhere
[all …]
/netbsd-src/external/gpl3/gcc.old/dist/libsanitizer/asan/
H A Dasan_internal.h1 //===-- asan_internal.h -----------------------------------------*- C++ -*-===//
6 //===----------------------------------------------------------------------===//
10 // ASan-private header which defines various general utilities.
11 //===----------------------------------------------------------------------===//
23 # error "The AddressSanitizer run-time should not be"
27 // Build-time configuration options.
29 // If set, asan will intercept C++ exception api call(s).
52 // All internal functions in asan reside inside the __asan namespace
54 // Separate namespace also makes it simpler to distinguish the asan run-time
/netbsd-src/external/bsd/libfido2/dist/fuzz/
H A DREADME2 ASAN/MSAN/UBSAN.
5 libfido2 in an existing application. To do so, use preload-snoop.c with a real
6 authenticator to obtain an initial corpus, rebuild libfido2 with -DFUZZ=ON, and
7 use preload-fuzz.c to read device data from stdin.
10 fuzz_assert.c, fuzz_hid.c, and fuzz_mgmt.c for examples. To build these
11 harnesses, use -DCMAKE_C_FLAGS=-fsanitize=fuzzer-no-link
12 -DFUZZ_LDFLAGS=-fsanitize=fuzzer -DFUZZ=ON.
14 If -DFUZZ=ON is enabled, symbols listed in wrapped.sym are wrapped in the
19 use '-reduce_inputs=0 --fido-mutate=seed'.
21 To run under ASAN/MSAN/UBSAN, libfido2 needs to be linked against flavours of
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/
H A D90-test_fipsload.t2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
20 plan skip_all => 'Test only supported in a shared build' if disabled('shared');
22 plan skip_all => 'Test is disabled on NonStop ia64' if config('target') =~ m|^nonstop-nse|;
23 plan skip_all => 'Test only supported in a dso build' if disabled('dso');
24 plan skip_all => 'Test is disabled in an address sanitizer build' unless disabled('asan');
28 my $fips = bldtop_file('providers', platform->dso('fips'));
H A D90-test_shlibload.t2 # Copyright 2016-2024 The OpenSSL Project Authors. All Rights Reserved.
21 plan skip_all => "Test only supported in a shared build" if disabled("shared");
24 plan skip_all => "Test only supported in a dso build" if disabled("dso");
25 plan skip_all => "Test is disabled in an address sanitizer build" unless disabled("asan");
26 plan skip_all => "Test is disabled in no-atexit build" if disabled("atexit");
30 my $libcrypto = platform->sharedlib('libcrypto');
31 my $libssl = platform->sharedlib('libssl');
34 $atexit_outfile = 'atexit-cryptofirst.txt';
36 ok(run(test(["shlibloadtest", "-crypto_first", $libcrypto, $libssl, $atexit_outfile])),
37 "running shlibloadtest -crypto_first $atexit_outfile");
[all …]
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/asan/scripts/
H A Dasan_device_setup2 #===- lib/asan/scripts/asan_device_setup -----------------------------------===#
9 # Prepare Android device to run ASan applications.
11 #===------------------------------------------------------------------------===#
13 set -e
24 echo "usage: $0 [--revert] [--device device-id] [--lib path] [--extra-options options]"
25 echo " --revert: Uninstall ASan from the device."
26 echo " --lib: Path to ASan runtime library."
27 echo " --extra-options: Extra ASAN_OPTIONS."
28 echo " --device: Install to the given device. Use 'adb devices' to find"
29 echo " device-id."
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/fuzz/
H A DREADME.md7 ---------
13 -----------------------------------
15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage)
18 sudo apt-get install clang
23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`.
25 CC=clang ./config enable-fuzz-libfuzzer \
26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
27 -DPEDANTIC enable-asan enable-ubsan no-shared \
28 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \
29 -fsanitize=fuzzer-no-link \
[all …]

12345678910>>...12