| /netbsd-src/external/mit/libuv/dist/.github/workflows/ | 
| H A D | sanitizer.yml | 6       - '**'7       - '!docs/**'
 8       - '!.**'
 9       - '.github/workflows/sanitizer.yml'
 12       - v[0-9].*
 13       - master
 17     runs-on: ubuntu-latest
 19       - uses: actions/checkout@v2
 20       - name: Setup
 22           sudo apt-get install ninja-build
 [all …]
 
 | 
| /netbsd-src/sys/external/bsd/compiler_rt/dist/lib/asan/ | 
| H A D | README.txt | 3 This directory contains sources of the AddressSanitizer (ASan) runtime library.7 Makefile.mk      : File for make-based build.
 8 CMakeLists.txt   : File for cmake-based build.
 9 asan_*.{cc,h}    : Sources of the asan runtime library.
 11 tests/*          : ASan unit tests.
 13 Also ASan runtime needs the following libraries:
 17 ASan runtime currently also embeds part of LeakSanitizer runtime for
 20 ASan runtime can only be built by CMake. You can run ASan tests
 21 from the root of your CMake build tree:
 23 make check-asan
 
 | 
| H A D | asan_internal.h | 1 //===-- asan_internal.h -----------------------------------------*- C++ -*-===//8 //===----------------------------------------------------------------------===//
 12 // ASan-private header which defines various general utilities.
 13 //===----------------------------------------------------------------------===//
 25 # error "The AddressSanitizer run-time should not be"
 29 // Build-time configuration options.
 31 // If set, asan will intercept C++ exception api call(s).
 54 // All internal functions in asan reside inside the __asan namespace
 56 // Separate namespace also makes it simpler to distinguish the asan run-time
 114 // Returns `true` iff most of ASan init process should be skipped due to the
 [all …]
 
 | 
| /netbsd-src/external/gpl3/gcc/dist/libsanitizer/ | 
| H A D | ChangeLog | 1 2024-06-20  Release Manager5 2023-05-21  Iain Sandoe  <iain@sandoe.co.uk>
 8 	2023-04-18  Iain Sandoe  <iain@sandoe.co.uk>
 13 2023-05-08  Release Manager
 17 2023-01-04  Florian Weimer  <fweimer@redhat.com>
 20 	2022-10-18  Florian Weimer  <fweimer@redhat.com>
 26 2022-08-19  Release Manager
 30 2022-05-06  Release Manager
 34 2022-03-14  Xi Ruoyao  <xry111@mengyan1223.wang>
 36 	* configure.tgt: Enable build on mips*64*-*-linux*.
 [all …]
 
 | 
| H A D | HOWTO_MERGE | 2 track various ABI changes and GCC-specific patches carefully.  Here is a7 * Modify Makefile.am files into asan/tsan/lsan/ubsan/sanitizer_common/interception
 11   in corresponding CMakeLists.txt and config-ix.cmake files from compiler-rt source
 13 * Apply all needed GCC-specific patches to libsanitizer (note that some of
 20 * Update ASan testsuite with corresponding tests from lib/asan/tests directory.
 25 * Bump SONAME for sanitizer libraries in asan/tsan/ubsan libtool-version files
 30 * Run regression testing on at least three platforms (e.g. x86-linux-gnu, x86_64-linux-gnu,
 31   aarch64-linux-gnu, arm-linux-gnueabi).
 33 * Compare ABI of corresponding libclang_rt.asan and newly build libasan libraries.
 39 * Split your changes into logical parts (e.g. raw merge, compiler changes, GCC-specific changes
 [all …]
 
 | 
| /netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/secondary/compiler-rt/lib/asan/ | 
| H A D | BUILD.gn | 1 import("//compiler-rt/target.gni")4   configs -= [ "//llvm/utils/gn/build:llvm_code" ]
 5   configs += [ "//llvm/utils/gn/build:crt_code" ]
 15 target(asan_target_type, "asan") {
 16   configs -= [ "//llvm/utils/gn/build:llvm_code" ]
 17   configs += [ "//llvm/utils/gn/build:crt_code" ]
 24     output_name = "clang_rt.asan$crt_current_target_suffix"
 28     "//compiler-rt/lib/interception:sources",
 29     "//compiler-rt/lib/lsan:common_sources",
 30     "//compiler-rt/lib/sanitizer_common:sources",
 [all …]
 
 | 
| /netbsd-src/external/apache2/llvm/dist/clang/cmake/caches/ | 
| H A D | Fuchsia-stage2.cmake | 1 # This file sets up a CMakeCache for the second stage of a Fuchsia toolchain build.7 set(LLVM_ENABLE_PROJECTS "clang;clang-tools-extra;lld;llvm;polly" CACHE STRING "")
 8 set(LLVM_ENABLE_RUNTIMES "compiler-rt;libcxx;libcxxabi;libunwind" CACHE STRING "")
 32   set(CLANG_DEFAULT_OBJCOPY llvm-objcopy CACHE STRING "")
 34 set(CLANG_DEFAULT_RTLIB compiler-rt CACHE STRING "")
 77   set(target "x86_64-pc-windows-msvc")
 91   set(RUNTIMES_${target}_LLVM_ENABLE_RUNTIMES "compiler-rt;libcxx" CACHE STRING "")
 94 foreach(target aarch64-unknown-linux-gnu;armv7-unknown-linux-gnueabihf;i386-unknown-linux-gnu;x86_6…
 96     # Set the per-target builtins options.
 100     set(BUILTINS_${target}_CMAKE_C_FLAGS "--target=${target}" CACHE STRING "")
 [all …]
 
 | 
| /netbsd-src/external/apache2/llvm/dist/clang/runtime/ | 
| H A D | CMakeLists.txt | 20     set(${out_var} ${CMAKE_COMMAND} --build . --target ${target}21                                     --config $<CONFIG> PARENT_SCOPE)
 25 set(COMPILER_RT_SRC_ROOT ${LLVM_MAIN_SRC_DIR}/projects/compiler-rt)
 38   # Add compiler-rt as an external project.
 39   set(COMPILER_RT_PREFIX ${CMAKE_BINARY_DIR}/projects/compiler-rt)
 41   set(STAMP_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-stamps/)
 42   set(BINARY_DIR ${CMAKE_CURRENT_BINARY_DIR}/compiler-rt-bins/)
 44   add_custom_target(compiler-rt-clear
 45     COMMAND ${CMAKE_COMMAND} -E remove_directory ${BINARY_DIR}
 46     COMMAND ${CMAKE_COMMAND} -E remove_directory ${STAMP_DIR}
 [all …]
 
 | 
| /netbsd-src/crypto/external/bsd/openssl.old/dist/fuzz/ | 
| H A D | README.md | 10 Use Chrome's handy recent build of clang. Older versions may also work.12     $ sudo apt-get install git
 13     $ mkdir git-work
 17 You may want to git pull and re-run the update from time to time.
 21     $ PATH=~/third_party/llvm-build/Release+Asserts/bin/:$PATH
 23 Get and build libFuzzer (there is a git mirror at
 24 https://github.com/llvm-mirror/llvm/tree/master/lib/Fuzzer if you prefer):
 27     $ sudo apt-get install subversion
 28     $ mkdir svn-work
 29     $ cd svn-work
 [all …]
 
 | 
| /netbsd-src/external/gpl3/gcc.old/dist/libsanitizer/ | 
| H A D | HOWTO_MERGE | 2 track various ABI changes and GCC-specific patches carefully.  Here is a8 * Modify Makefile.am files into asan/tsan/lsan/ubsan/sanitizer_common/interception
 12   in corresponding CMakeLists.txt and config-ix.cmake files from compiler-rt source
 14 * Apply all needed GCC-specific patches to libsanitizer (note that some of
 21 * Update ASan testsuite with corresponding tests from lib/asan/tests directory.
 26 * Bump SONAME for sanitizer libraries in asan/tsan/ubsan libtool-version files
 31 * Run regression testing on at least three platforms (e.g. x86-linux-gnu, x86_64-linux-gnu,
 32   aarch64-linux-gnu, arm-linux-gnueabi).
 34 * Compare ABI of corresponding libclang_rt.asan and newly build libasan libraries.
 40 * Split your changes into logical parts (e.g. raw merge, compiler changes, GCC-specific changes
 [all …]
 
 | 
| H A D | README.gcc | 4 Both tools consist of a compiler module and a run-time library.5 The sources of the run-time library for these projects are hosted at
 6 https://llvm.org/svn/llvm-project/compiler-rt in the following directories:
 10   lib/asan
 15 Trivial and urgent fixes (portability, build fixes, etc.) may go directly to the
 16 GCC tree.  All non-trivial changes, functionality improvements, etc. should go
 
 | 
| /netbsd-src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/scripts/ | 
| H A D | check_lint.sh | 20 COMMON_LINT_FILTER=-build/include,-build/header_guard,-legal/copyright,-whitespace/comments,-readab…21 -build/namespaces,-readability/braces
 22 ASAN_RTL_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/int
 23 ASAN_TEST_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/sizeof,-runtime/int,-runtime/printf,-runtime/t…
 24 ASAN_LIT_TEST_LINT_FILTER=${ASAN_TEST_LINT_FILTER},-whitespace/line_length
 26 TSAN_TEST_LINT_FILTER=${TSAN_RTL_LINT_FILTER},-runtime/threadsafe_fn,-runtime/int
 27 TSAN_LIT_TEST_LINT_FILTER=${TSAN_TEST_LINT_FILTER},-whitespace/line_length
 30 LSAN_LIT_TEST_LINT_FILTER=${LSAN_RTL_LINT_FILTER},-whitespace/line_length
 31 DFSAN_RTL_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/int,-runtime/printf,-runtime/references,-reada…
 33 COMMON_RTL_INC_LINT_FILTER=${COMMON_LINT_FILTER},-runtime/int,-runtime/sizeof,-runtime/printf,-read…
 [all …]
 
 | 
| /netbsd-src/sys/external/bsd/compiler_rt/dist/lib/asan/tests/ | 
| H A D | CMakeLists.txt | 5 # no-instrumentation tests.9 # and have some elements of version skew -- they test the *host* compiler's
 10 # instrumentation against the just-built runtime library.
 27   -I${COMPILER_RT_SOURCE_DIR}/include
 28   -I${COMPILER_RT_SOURCE_DIR}/lib
 29   -I${COMPILER_RT_SOURCE_DIR}/lib/asan
 30   -I${COMPILER_RT_SOURCE_DIR}/lib/sanitizer_common/tests
 31   -fno-rtti
 32   -O2
 33   -Wno-format
 [all …]
 
 | 
| /netbsd-src/external/apache2/llvm/dist/clang/docs/ | 
| H A D | AddressSanitizer.rst | 12 instrumentation module and a run-time library. The tool can detect the15 * Out-of-bounds accesses to heap, stack and globals
 16 * Use-after-free
 17 * Use-after-return (runtime flag `ASAN_OPTIONS=detect_stack_use_after_return=1`)
 18 * Use-after-scope (clang flag `-fsanitize-address-use-after-scope`)
 19 * Double-free, invalid free
 24 How to build
 27 Build LLVM/Clang with `CMake <https://llvm.org/docs/CMake.html>`_.
 32 Simply compile and link your program with ``-fsanitize=address`` flag.  The
 33 AddressSanitizer run-time library should be linked to the final executable, so
 [all …]
 
 | 
| /netbsd-src/sys/arch/arm/conf/ | 
| H A D | Makefile.arm | 15 # To specify debugging, add the config line: makeoptions DEBUG="-g"16 # A better way is to specify -g only for a few files.
 26 . error Don't build 32-bit kernel with 64-bit toolchain
 35 .-include "$S/arch/${MACHINE}/conf/Makefile.${MACHINE}.inc"
 40 # CPPFLAGS set by platform-specific Makefile fragment.
 41 AFLAGS+=	-x assembler-with-cpp
 42 COPTS.arm32_kvminit.c+=		-fno-stack-protector
 43 COPTS.vfp_init.c=		-mfpu=vfp
 44 CLANG_OBSOLETE_MULTI_ST=	${${ACTIVE_CC} == "clang":? -Wa,-W :}
 45 AFLAGS.bcopyinout.S+=	-marm
 [all …]
 
 | 
| /netbsd-src/external/gpl3/gcc/dist/libsanitizer/asan/ | 
| H A D | asan_internal.h | 1 //===-- asan_internal.h -----------------------------------------*- C++ -*-===//5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
 7 //===----------------------------------------------------------------------===//
 11 // ASan-private header which defines various general utilities.
 12 //===----------------------------------------------------------------------===//
 24 # error "The AddressSanitizer run-time should not be"
 28 // Build-time configuration options.
 30 // If set, asan will intercept C++ exception api call(s).
 53 // All internal functions in asan reside inside the __asan namespace
 55 // Separate namespace also makes it simpler to distinguish the asan run-time
 [all …]
 
 | 
| /netbsd-src/sys/external/bsd/compiler_rt/dist/lib/tsan/ | 
| H A D | check_cmake.sh | 2 set -u3 set -e
 6 if [ -d "$ROOT/llvm-build" ]; then
 7   cd $ROOT/llvm-build
 9   mkdir -p $ROOT/llvm-build
 10   cd $ROOT/llvm-build
 11 …CC=clang CXX=clang++ cmake -G Ninja -DLLVM_ENABLE_WERROR=ON -DCMAKE_BUILD_TYPE=Release -DLLVM_ENAB…
 14 ninja check-sanitizer
 15 ninja check-tsan
 16 ninja check-asan
 [all …]
 
 | 
| /netbsd-src/external/apache2/llvm/dist/llvm/utils/gn/ | 
| H A D | TODO.txt | 3 - more projects (lldb, check- targets for compiler-rt's asan/ubsan/msan/tsan)4   - once there are more projects, have an llvm_enable_projects arg, modeled
 5     after llvm_targets_to_build in the GN build
 6   - a check-all build target that runs test of all projects
 7 - more targets (ARC MSP430 XCore)
 8   - example: https://reviews.llvm.org/D56416
 9 - investigate feasibility of working `gn check`
 11 - "optimized tblgen" mode
 12   - either just always build tablegen and support with opt config
 13   - or use opt toolchain and build tablegen twice in debug builds, like cmake
 [all …]
 
 | 
| /netbsd-src/external/apache2/llvm/dist/llvm/docs/ | 
| H A D | GwpAsan.rst | 2 GWP-ASan12 GWP-ASan is a sampled allocator framework that assists in finding use-after-free
 13 and heap-buffer-overflow bugs in production environments. It informally is a
 14 recursive acronym, "**G**\WP-ASan **W**\ill **P**\rovide **A**\llocation
 17 GWP-ASan is based on the classic
 27 GWP-ASan vs. ASan
 31 GWP-ASan does not induce a significant performance overhead. ASan often requires
 35 GWP-ASan is only capable of finding a subset of the memory issues detected by
 36 ASan. Furthermore, GWP-ASan's bug detection capabilities are only probabilistic.
 37 As such, we recommend using ASan over GWP-ASan in testing, as well as anywhere
 [all …]
 
 | 
| /netbsd-src/external/gpl3/gcc.old/dist/libsanitizer/asan/ | 
| H A D | asan_internal.h | 1 //===-- asan_internal.h -----------------------------------------*- C++ -*-===//6 //===----------------------------------------------------------------------===//
 10 // ASan-private header which defines various general utilities.
 11 //===----------------------------------------------------------------------===//
 23 # error "The AddressSanitizer run-time should not be"
 27 // Build-time configuration options.
 29 // If set, asan will intercept C++ exception api call(s).
 52 // All internal functions in asan reside inside the __asan namespace
 54 // Separate namespace also makes it simpler to distinguish the asan run-time
 
 | 
| /netbsd-src/external/bsd/libfido2/dist/fuzz/ | 
| H A D | README | 2 ASAN/MSAN/UBSAN.5 libfido2 in an existing application. To do so, use preload-snoop.c with a real
 6 authenticator to obtain an initial corpus, rebuild libfido2 with -DFUZZ=ON, and
 7 use preload-fuzz.c to read device data from stdin.
 10 fuzz_assert.c, fuzz_hid.c, and fuzz_mgmt.c for examples. To build these
 11 harnesses, use -DCMAKE_C_FLAGS=-fsanitize=fuzzer-no-link
 12 -DFUZZ_LDFLAGS=-fsanitize=fuzzer -DFUZZ=ON.
 14 If -DFUZZ=ON is enabled, symbols listed in wrapped.sym are wrapped in the
 19 use '-reduce_inputs=0 --fido-mutate=seed'.
 21 To run under ASAN/MSAN/UBSAN, libfido2 needs to be linked against flavours of
 [all …]
 
 | 
| /netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/ | 
| H A D | 90-test_fipsload.t | 2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.20 plan skip_all => 'Test only supported in a shared build' if disabled('shared');
 22 plan skip_all => 'Test is disabled on NonStop ia64' if config('target') =~ m|^nonstop-nse|;
 23 plan skip_all => 'Test only supported in a dso build' if disabled('dso');
 24 plan skip_all => 'Test is disabled in an address sanitizer build' unless disabled('asan');
 28 my $fips = bldtop_file('providers', platform->dso('fips'));
 
 | 
| H A D | 90-test_shlibload.t | 2 # Copyright 2016-2024 The OpenSSL Project Authors. All Rights Reserved.21 plan skip_all => "Test only supported in a shared build" if disabled("shared");
 24 plan skip_all => "Test only supported in a dso build" if disabled("dso");
 25 plan skip_all => "Test is disabled in an address sanitizer build" unless disabled("asan");
 26 plan skip_all => "Test is disabled in no-atexit build" if disabled("atexit");
 30 my $libcrypto = platform->sharedlib('libcrypto');
 31 my $libssl = platform->sharedlib('libssl');
 34 $atexit_outfile = 'atexit-cryptofirst.txt';
 36 ok(run(test(["shlibloadtest", "-crypto_first", $libcrypto, $libssl, $atexit_outfile])),
 37    "running shlibloadtest -crypto_first $atexit_outfile");
 [all …]
 
 | 
| /netbsd-src/sys/external/bsd/compiler_rt/dist/lib/asan/scripts/ | 
| H A D | asan_device_setup | 2 #===- lib/asan/scripts/asan_device_setup -----------------------------------===#9 # Prepare Android device to run ASan applications.
 11 #===------------------------------------------------------------------------===#
 13 set -e
 24     echo "usage: $0 [--revert] [--device device-id] [--lib path] [--extra-options options]"
 25     echo "  --revert: Uninstall ASan from the device."
 26     echo "  --lib: Path to ASan runtime library."
 27     echo "  --extra-options: Extra ASAN_OPTIONS."
 28     echo "  --device: Install to the given device. Use 'adb devices' to find"
 29     echo "            device-id."
 [all …]
 
 | 
| /netbsd-src/crypto/external/bsd/openssl/dist/fuzz/ | 
| H A D | README.md | 7 ---------13 -----------------------------------
 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage)
 18     sudo apt-get install clang
 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`.
 25     CC=clang ./config enable-fuzz-libfuzzer \
 26             --with-fuzzer-lib=$PATH_TO_LIBFUZZER \
 27             -DPEDANTIC enable-asan enable-ubsan no-shared \
 28             -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \
 29             -fsanitize=fuzzer-no-link \
 [all …]
 
 |