/freebsd/crypto/openssl/fuzz/ |
H A D | README.md | 7 --------- 13 ----------------------------------- 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 18 sudo apt-get install clang 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 25 CC=clang ./config enable-fuzz-libfuzzer \ 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 27 -DPEDANTIC enable-asan enable-ubsan no-shared \ 28 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \ 29 -fsanitize=fuzzer-no-link \ [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/gwp_asan/ |
H A D | guarded_pool_allocator.cpp | 1 //===-- guarded_pool_allocator.cpp ------------------------------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 27 // init-order-fiasco. 31 return (Size + Boundary - 1) & ~(Boundary - 1); in roundUpTo() 35 return Ptr & ~(PageSize - 1); in getPageAddr() 38 bool isPowerOfTwo(uintptr_t X) { return (X & (X - 1)) == 0; } in isPowerOfTwo() 41 // Gets the singleton implementation of this class. Thread-compatible until 42 // init() is called, thread-safe afterwards. 48 // Note: We return from the constructor here if GWP-ASan is not available. in init() [all …]
|
H A D | guarded_pool_allocator.h | 1 //===-- guarded_pool_allocator.h -------- [all...] |
/freebsd/contrib/llvm-project/compiler-rt/lib/asan/ |
H A D | asan_flags.inc | 1 //===-- asan_flags.inc ------------------------------------------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 9 // ASan runtime flags. 11 //===----------------------------------------------------------------------===// 19 ASAN_FLAG(int, quarantine_size, -1, 21 ASAN_FLAG(int, quarantine_size_mb, -1, 22 "Size (in Mb) of quarantine used to detect use-after-free " 25 ASAN_FLAG(int, thread_local_quarantine_size_kb, -1, 27 "use-after-free errors. Lower value may reduce memory usage but " [all …]
|
H A D | asan_rtl.cpp | 1 //===-- asan_rtl.cpp ------------------------------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 11 // Main file of the ASan run-time library. 12 //===----------------------------------------------------------------------===// 38 uptr *__asan_test_only_reported_buggy_pointer; // Used only for testing asan. 47 // Don't die twice - run a busy loop. in AsanDie() 52 if (common_flags()->print_module_map >= 1) in AsanDie() 55 WaitForDebugger(flags()->sleep_before_dying, "before dying"); in AsanDie() 57 if (flags()->unmap_shadow_on_exit) { in AsanDie() [all …]
|
H A D | asan_poisoning.h | 1 //===-- asan_poisoning.h ----------------------------------------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 11 // Shadow memory poisoning by ASan RTL and by user application. 12 //===----------------------------------------------------------------------===// 22 // Enable/disable memory poisoning. 38 // performance-critical code with care. 44 common_flags()->clear_shadow_mmap_threshold); in FastPoisonShadow() 48 MEM_TO_SHADOW(aligned_beg + aligned_size - ASAN_SHADOW_GRANULARITY) + 1; in FastPoisonShadow() 51 // probably provide higher-level interface for these operations. in FastPoisonShadow() [all …]
|
/freebsd/sys/contrib/openzfs/rpm/generic/ |
H A D | zfs.spec.in | 27 %global _bashcompletiondir /usr/share/bash-completion 49 %global _presetdir %{_prefix}/lib/systemd/system-preset 53 %global _modulesloaddir %{_prefix}/lib/modules-load.d 57 %global _systemdgeneratordir %{_prefix}/lib/systemd/system-generators 66 %bcond_with asan 72 # Generic enable switch for systemd 90 … %(%{__python} -Esc "from distutils.sysconfig import get_python_lib; print(get_python_lib(… 100 Source0: %{name}-%{version}.tar.gz 101 BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) 102 Requires: libzpool6%{?_isa} = %{version}-%{release} [all …]
|
/freebsd/sys/contrib/openzfs/rpm/redhat/ |
H A D | zfs.spec.in | 27 %global _bashcompletiondir /usr/share/bash-completion 49 %global _presetdir %{_prefix}/lib/systemd/system-preset 53 %global _modulesloaddir %{_prefix}/lib/modules-load.d 57 %global _systemdgeneratordir %{_prefix}/lib/systemd/system-generators 66 %bcond_with asan 72 # Generic enable switch for systemd 90 %define __python_sitelib %(%{__python} -Esc "from distutils.sysconfig import get_python_lib; print(get_python_lib())" 2>/dev/null || %{__python} -Esc "import sysconfig; print(sysconfig.get_path('purelib'))") 100 Source0: %{name}-%{version}.tar.gz 101 BuildRoot: %{_tmppath}/%{name}- [all...] |
/freebsd/sys/conf/ |
H A D | kern.mk | 5 CWARNFLAGS?= -Wall -Wstrict-prototypes \ 6 -Wmissing-prototypes -Wpointer-arith -Wcast-qual \ 7 -Wundef -Wno-pointer-sign ${FORMAT_EXTENSIONS} \ 8 -Wmissing-include-dirs -fdiagnostics-show-option \ 9 -Wno-unknown-pragmas -Wswitch \ 13 # -Wextra 19 NO_WCONSTANT_CONVERSION= -Wno-error=constant-conversion 20 NO_WSHIFT_COUNT_NEGATIVE= -Wno-shift-count-negative 21 NO_WSHIFT_COUNT_OVERFLOW= -Wno-shift-count-overflow 22 NO_WSELF_ASSIGN= -Wno-self-assign [all …]
|
/freebsd/lib/libthr/ |
H A D | Makefile | 6 # XXX: work around gcc -m32 + bfd ld path issue for DT_NEEDED symbols. 8 LDFLAGS+= -Wl,--rpath=/usr/lib${COMPAT_libcompat} 22 CFLAGS+=-DPTHREAD_KERNEL 23 CFLAGS+=-I${SRCTOP}/lib/libc/include 24 CFLAGS+=-I${SRCTOP}/lib/libc/${MACHINE_CPUARCH} 25 CFLAGS+=-I${.CURDIR}/thread 26 CFLAGS+=-I${.CURDIR}/arch/${MACHINE_CPUARCH}/include 27 CFLAGS+=-I${.CURDIR}/sys 28 CFLAGS+=-I${SRCTOP}/libexec/rtld-elf 29 CFLAGS+=-I${SRCTOP}/libexec/rtld-elf/${MACHINE_CPUARCH} [all …]
|
/freebsd/sys/contrib/openzfs/.github/workflows/ |
H A D | zloop.yml | 8 group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }} 9 cancel-in-progress: true 13 runs-on: ubuntu-24.04 17 - uses: actions/checkout@v4 20 - name: Install dependencies 22 sudo apt-get purge -y snapd google-chrome-stable firefox 23 ONLY_DEPS=1 .github/workflows/scripts/qemu-3-deps-vm.sh ubuntu24 24 - name: Autogen.sh 26 sed -i '/DEBUG_CFLAGS="-Werror"/s/^/#/' config/zfs-build.m4 28 - name: Configure [all …]
|
/freebsd/sys/contrib/openzfs/config/ |
H A D | always-compiler-options.m4 | 2 dnl # Enabled -fsanitize=address if supported by $CC. 4 dnl # LDFLAGS needs -fsanitize=address at all times so libraries compiled with 8 dnl # the behavior of binaries and libraries build with -fsanitize=address. 11 AC_MSG_CHECKING([whether to build with -fsanitize=address support]) 12 AC_ARG_ENABLE([asan], 13 [AS_HELP_STRING([--enable-asan], 14 [Enable -fsanitize=address support @<:@default=no@:>@])], 23 AC_MSG_CHECKING([whether $CC supports -fsanitize=address]) 25 CFLAGS="$CFLAGS -Werror -fsanitize=address" 29 ASAN_CFLAGS="-fsanitize=address" [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Instrumentation/ |
H A D | AddressSanitizer.cpp | 1 //===- AddressSanitizer.cpp - memory error detector -----------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 16 //===----------------------------------------------------------------------===// 94 #define DEBUG_TYPE "asan" 131 const char kAsanModuleCtorName[] = "asan.module_ctor"; 132 const char kAsanModuleDtorName[] = "asan.module_dtor"; 163 // ASan version script has __asan_* wildcard. Triple underscore prevents a 194 // Command-line flags. 197 "asan-kernel", cl::desc("Enable KernelAddressSanitizer instrumentation"), [all …]
|
/freebsd/sys/contrib/zstd/lib/common/ |
H A D | portability_macros.h | 5 * This source code is licensed under both the BSD-style license (found in the 8 * You may select, at your option, one of the above-listed licenses. 24 /* compat. with non-clang compilers */ 29 /* compat. with non-clang compilers */ 34 /* compat. with non-clang compilers */ 48 /* detects whether we are being compiled under asan */ 75 /* Enable runtime BMI2 dispatch based on the CPU. 91 * Only enable assembly for GNUC comptabile compilers, 94 * Only enable assembly for Linux / MacOS, other platforms may 118 * Determines whether we should enable assembly for x86-64 [all …]
|
H A D | compiler.h | 5 * This source code is licensed under both the BSD-style license (found in the 8 * You may select, at your option, one of the above-listed licenses. 16 /*-******************************************************* 65 * gcc-4.8 and gcc-4.9 have been shown to benefit from leaving off the 104 * Enable lzcnt, bmi, and bmi2. 116 # include <mmintrin.h> /* https://msdn.microsoft.com/fr-fr/library/84szxsww(v=vs.90).aspx */ 143 * older GCC (pre gcc-4.3 picked as the cutoff) uses a different syntax, 147 # define DONT_VECTORIZE __attribute__((optimize("no-tree-vectorize"))) 149 # define DONT_VECTORIZE _Pragma("GCC optimize(\"no-tree-vectorize\")") 173 # pragma warning(disable : 4204) /* disable: C4204: non-constant aggregate initializer */ [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_flags.inc | 1 //===-- sanitizer_flags.h -------- [all...] |
/freebsd/contrib/libcbor/ |
H A D | CMakeLists.txt | 13 option(CMAKE_SKIP_INSTALL_ALL_DEPENDENCY "cmake --build --target install does not depend on cmake --build" true) 21 add_definitions(-DIS_BIG_ENDIAN) 28 "The flag is a no-op and will be removed in the next version. " 32 option(CBOR_PRETTY_PRINTER "Include a pretty-printing routine" ON) 38 add_definitions(-DWITH_TEST [all...] |
/freebsd/contrib/llvm-project/llvm/include/llvm/ADT/ |
H A D | FunctionExtras.h | 1 //===- FunctionExtras.h - Function type erasure utilities -------*- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 14 /// move-only callable objects and const-qualification. 17 /// - Add a `function` that provides ref-qualified support, which doesn't work 19 /// - Provide support for specifying multiple signatures to type erase callable 21 /// - Expand to include a copyable utility that directly replaces std::function 30 //===----------------------------------------------------------------------===// 47 /// unique_function is a type-erasing functor similar to std::function. 49 /// It can hold move-only function objects, like lambdas capturing unique_ptrs. [all …]
|
/freebsd/contrib/llvm-project/clang/lib/Driver/ |
H A D | SanitizerArgs.cpp | 1 //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 112 /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any 117 /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid 122 /// Parse -f(no-)?sanitize-metadata= flag values, diagnosing any invalid 129 /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt 130 /// would produce "-fsanitize=vptr". 137 /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce 138 /// "-fsanitize=alignment". [all …]
|
/freebsd/ |
H A D | ObsoleteFiles.inc | 9 # delete-old-libs target, whereas OLD_FILES and OLD_DIRS are removed by the 10 # delete-old target. This separation allows users to avoid deleting old 18 # For files listed in OLD_FILES, OLD_LIBS, and MOVED_LIBS, the check-old* 19 # and delete-old* targets will also delete associated debug symbols from 34 # ( grep '+=' /usr/src/ObsoleteFiles.inc | sort -u ; \ 35 # grep '+=' /usr/src/tools/build/mk/OptionalObsoleteFiles.inc | sort -u) | \ 36 # sort | uniq -d 40 # for t in `make -V TARGETS universe`; do 41 # __MAKE_CONF=/dev/null make -f Makefile.inc1 TARGET=$t \ 42 # -V OLD_FILES -V OLD_LIBS -V MOVED_LIBS -V OLD_DIRS check-old | \ [all …]
|
/freebsd/crypto/openssl/ |
H A D | Configure | 2 # -*- mode: perl; -*- 3 # Copyright 2016-2024 The OpenSSL Project Authors. All Rights Reserved. 10 ## Configure -- OpenSSL source tree configuration script 30 …-<cipher> ...] [enable-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[n… 42 *** perl configdata.pm --dump *** 52 # --config add the given configuration file, which will be read after 55 # --prefix prefix for the OpenSSL installation, which includes the 59 # --openssldir OpenSSL data area, such as openssl.cnf, certificates and keys. 61 # given with --prefix. 64 # --banner=".." Output specified text instead of default completion banner [all …]
|
/freebsd/contrib/llvm-project/compiler-rt/lib/fuzzer/ |
H A D | FuzzerFlags.def | 1 //===- FuzzerFlags.def - Run-time flags ------- [all...] |
/freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
H A D | CodeGenOptions.def | 1 //===--- CodeGenOptions.def - Code generation option database ----- C++ -*-===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 18 //===----------------------------------------------------------------------===// 38 CODEGENOPT(DisableIntegratedAS, 1, 0) ///< -no-integrated-as 39 CODEGENOPT(Crel, 1, 0) ///< -Wa,--crel 40 CODEGENOPT(RelaxELFRelocations, 1, 1) ///< -Wa,-mrelax-relocations={yes,no} 41 CODEGENOPT(SSE2AVX , 1, 0) ///< -msse2avx 42 CODEGENOPT(AsmVerbose , 1, 0) ///< -dA, -fverbose-asm. 43 CODEGENOPT(PreserveAsmComments, 1, 1) ///< -dA, -fno-preserve-as-comments. [all …]
|
/freebsd/share/mk/ |
H A D | src.opts.mk | 22 # The old-style YES_FOO and NO_FOO are being phased out. No new instances of them 49 # hard-wired to 'no'. "Broken" here means not working or 50 # not-appropriate and/or not supported. It doesn't imply something is 53 # time. Options are added to BROKEN_OPTIONS list on a per-arch basis. 55 # Options listed in 'REQUIRED_OPTIONS' will be hard-wired to 'yes'; this 260 # as MACHINE_ARCH (the non-buildworld case). Normally TARGET_ARCH is not 263 # Additional, per-target behavior should be rarely added only after much 281 # Default enable the given TARGET's LLVM_TARGET support 284 # aarch64 needs arm for -m32 support. 308 # LIB32 is not supported on all 64-bit architectures. [all …]
|
/freebsd/contrib/llvm-project/clang/lib/CodeGen/ |
H A D | BackendUtil.cpp | 1 //===--- BackendUtil.cpp - LLVM Backend Utilities -------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 104 "sanitizer-early-opt-ep", cl::Optional, 110 "pgo-cold-func-opt", cl::init(PGOOptions::ColdFuncOpt::Default), cl::Hidden, 151 return TM->getTargetIRAnalysis(); in getTargetIRAnalysis() 218 TargetTriple(TheModule->getTargetTriple()) {} in EmitAssemblyHelper() 266 // Check if ASan should use GC-friendly instrumentation for globals. 267 // First of all, there is no point if -fdata-sections is off (expect for MachO, 269 // extension that only works with -integrated-as at the moment. [all …]
|