| /third_party/skia/site/docs/dev/testing/ |
| D | xsan.md | 2 --- 3 title: "MSAN, ASAN, & TSAN" 4 linkTitle: "MSAN, ASAN, & TSAN" 6 --- 11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 13 - UBSAN works on Linux, Mac, Android, and Windows, though some checks are platform-specific. 14 - ASAN works on Linux, Mac, Android, and Windows. 15 - TSAN works on Linux and Mac. 16 - MSAN works on Linux[1]. 19 with the system-provided C++ standard library, which is usually libstdc++. [all …]
|
| /third_party/benchmark/.github/workflows/ |
| D | sanitizer.yml | 13 runs-on: ubuntu-latest 15 fail-fast: false 18 sanitizer: ['asan', 'ubsan', 'tsan'] 22 - uses: actions/checkout@v2 24 - name: configure msan env 27 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=memory -fsanitize-memory-track-origins… 30 - name: configure ubsan env 33 …echo "EXTRA_FLAGS=-g -O2 -fno-omit-frame-pointer -fsanitize=undefined -fno-sanitize-recover=all" >… 36 - name: configure asan env 37 if: matrix.sanitizer == 'asan' [all …]
|
| /third_party/libbpf/scripts/ |
| D | build-fuzzers.sh | 2 set -eux 4 SANITIZER=${SANITIZER:-address} 5 flags="-O1 -fno-omit-frame-pointer -g -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=$SANITI… 7 export CC=${CC:-clang} 8 export CFLAGS=${CFLAGS:-$flags} 10 export CXX=${CXX:-clang++} 11 export CXXFLAGS=${CXXFLAGS:-$flags} 13 cd "$(dirname -- "$0")/.." 15 export OUT=${OUT:-"$(pwd)/out"} 16 mkdir -p "$OUT" [all …]
|
| /third_party/toybox/ |
| D | configure | 5 # People run ./configure out of habit, so do "defconfig" for them. 7 if [ "$(basename "$0")" == configure ] 15 [ -z "$CROSS_COMPILE" ] && CROSS_COMPILE="$CROSS" 19 [ -z "$CFLAGS" ] && CFLAGS="-Wall -Wundef -Wno-char-subscripts -Werror=implicit-function-declaratio… 20 # Required for our expected ABI. we're 8-bit clean thus "char" must be unsigned. 21 CFLAGS="$CFLAGS -funsigned-char" 22 [ -z "$OPTIMIZE" ] && OPTIMIZE="-Os -ffunction-sections -fdata-sections -fno-asynchronous-unwind-ta… 23 # set ASAN=1 to enable "address sanitizer" and debuggable backtraces 24 [ -z "$ASAN" ] || { CFLAGS="$CFLAGS -O1 -g -fno-omit-frame-pointer -fno-optimize-sibling-calls -fsa… 29 [ -z "$LDOPTIMIZE" ] && LDOPTIMIZE="-Wl,--gc-sections" [all …]
|
| /third_party/node/ |
| D | BUILDING.md | 13 * [Supported platforms](#supported-platforms) 16 * [Platform list](#platform-list) 17 * [Supported toolchains](#supported-toolchains) 18 * [Official binary platforms and toolchains](#official-binary-platforms-and-toolchains) 19 * [OpenSSL asm support](#openssl-asm-support) 20 * [Previous versions of this document](#previous-versions-of-this-document) 21 * [Building Node.js on supported platforms](#building-nodejs-on-supported-platforms) 22 * [Note about Python](#note-about-python) 23 * [Unix and macOS](#unix-and-macos) 24 * [Unix prerequisites](#unix-prerequisites) [all …]
|
| D | common.gypi | 4 'asan%': 0, 5 'werror': '', # Turn off -Werror in V8 build. 38 # Increment by one for each non-official patch applied to deps/v8. 39 'v8_embedder_string': '-node.36', 54 # Enable disassembler for `--print-code` v8 options 57 # Sets -dOBJECT_PRINT. 63 # Disable pointer compression. Can be enabled at build time via configure 65 # node-gyp to build addons. 78 # TODO(refack): make v8-perfetto happen 138 'cflags': [ '-g', '-O0' ], [all …]
|
| /third_party/openssl/fuzz/ |
| D | README.md | 7 --------- 13 ----------------------------------- 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 18 sudo apt-get install clang 20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 25 CC=clang ./config enable-fuzz-libfuzzer \ 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 27 -DPEDANTIC enable-asan enable-ubsan no-shared \ 28 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \ [all …]
|
| /third_party/node/deps/openssl/openssl/fuzz/ |
| D | README.md | 7 --------- 13 ----------------------------------- 15 Install `clang`, which [ships with `libfuzzer`](http://llvm.org/docs/LibFuzzer.html#fuzzer-usage) 18 sudo apt-get install clang 20 Configure `openssl` for fuzzing. For now, you'll still need to pass in the path 23 `/usr/lib/llvm-7/lib/clang/7.0.1/lib/linux/libclang_rt.fuzzer-x86_64.a`. 25 CC=clang ./config enable-fuzz-libfuzzer \ 26 --with-fuzzer-lib=$PATH_TO_LIBFUZZER \ 27 -DPEDANTIC enable-asan enable-ubsan no-shared \ 28 -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION \ [all …]
|
| /third_party/skia/site/docs/dev/contrib/ |
| D | bazel.md | 2 --- 6 --- 16 ------------ 58 linkopts = ["-lpng", "-L/Users/mtklein/brew/lib"], 64 `~/brew/lib` doesn't work here, though `-L/Users/mtklein/brew/lib` works fine. 69 Finally, we point Bazel at all that using `--override_repository`: 71 $ bazel test ... --override_repository libpng=/Users/mtklein/overrides/libpng 81 -------- 88 build --verbose_failures 89 test --test_output errors [all …]
|
| /third_party/astc-encoder/Docs/ |
| D | Building.md | 17 To use CMake you must first configure the build. Create a build directory in 26 # Configure your build of choice, for example: 28 # x86-64 using a Visual Studio solution 29 cmake -G "Visual Studio 16 2019" -T ClangCL -DCMAKE_INSTALL_PREFIX=..\ ^ 30 -DASTCENC_ISA_AVX2=ON -DASTCENC_ISA_SSE41=ON -DASTCENC_ISA_SSE2=ON .. 32 # x86-64 using NMake 33 cmake -G "NMake Makefiles" -DCMAKE_BUILD_TYPE=Release -DCMAKE_INSTALL_PREFIX=..\ ^ 34 -DASTCENC_ISA_AVX2=ON -DASTCENC_ISA_SSE41=ON -DASTCENC_ISA_SSE2=ON .. 37 A single CMake configure can build multiple binaries for a single target CPU 42 Using the Visual Studio Clang-CL LLVM toolchain (`-T ClangCL`) is optional but [all …]
|
| /third_party/mbedtls/tests/scripts/ |
| D | all.sh | 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 15 # ------- 20 # --------------- 32 # * Basic Unix tools (Windows users note: a Unix-style find must be before 37 # * GCC and Clang (recent enough for using ASan with gcc and MemSan with clang, or valgrind) 39 # * arm-gcc and mingw-gcc 40 # * ArmCC 5 and ArmCC 6, unless invoked with --no-armcc 53 # The behavior on an error depends on whether --keep-going (alias -k) 55 # * Without --keep-going: the script stops on the first error without 58 # * With --keep-going: the script runs all requested components and [all …]
|
| /third_party/mesa3d/.gitlab-ci/meson/ |
| D | build.sh | 3 set -e 4 set -o xtrace 6 CROSS_FILE=/cross_file-"$CROSS".txt 8 # We need to control the version of llvm-config we're using, so we'll 10 if test -n "$LLVM_VERSION"; then 11 LLVM_CONFIG="llvm-config-${LLVM_VERSION}" 12 echo -e "[binaries]\nllvm-config = '`which $LLVM_CONFIG`'" > native.file 13 if [ -n "$CROSS" ]; then 14 sed -i -e '/\[binaries\]/a\' -e "llvm-config = '`which $LLVM_CONFIG`'" $CROSS_FILE 16 $LLVM_CONFIG --version [all …]
|
| /third_party/libsnd/.github/workflows/ |
| D | action.yml | 8 fail-fast: false 11 ubuntu-gcc-autotools, 12 ubuntu-clang-autotools, 13 ubuntu-gcc-ossfuzz, 14 macos-autotools, 15 ubuntu-gcc-cmake, 16 ubuntu-gcc-cmake-shared, 17 ubuntu-clang-cmake, 18 ubuntu-clang-cmake-shared, 19 macos-cmake, [all …]
|
| /third_party/astc-encoder/ |
| D | CMakeLists.txt | 1 # SPDX-License-Identifier: Apache-2.0 2 # ---------------------------------------------------------------------------- 3 # Copyright 2020-2024 Arm Limited 9 # http://www.apache.org/licenses/LICENSE-2.0 16 # ---------------------------------------------------------------------------- 51 # Preflight for some macOS-specific build options 53 option(ASTCENC_UNIVERSAL_BUILD "Enable universal multi-arch build" ON) 94 # Non-macOS builds 97 message(FATAL_ERROR "Builds can only support a single architecture per configure.") 108 message(STATUS " ${optName} - ON") [all …]
|
| /third_party/mbedtls/ |
| D | README.md | 6 Mbed TLS includes a reference implementation of the [PSA Cryptography API](#psa-cryptography-api). … 9 ------------- 11 … more programmatic way using the Python 3 script `scripts/config.py` (use `--help` for usage instr… 15 We provide some non-standard configurations focused on specific use cases in the `configs/` directo… 18 ------------- 20 The main Mbed TLS documentation is available via [ReadTheDocs](https://mbed-tls.readthedocs.io/). 22 …or the PSA Cryptography API is available [on GitHub](https://arm-software.github.io/psa-api/crypto… 24 To generate a local copy of the library documentation in HTML format, tailored to your compile-time… 33 --------- 37 - GNU Make [all …]
|
| /third_party/node/deps/uv/ |
| D | CMakeLists.txt | 30 add_definitions(-D__QEMU__=1) 33 option(ASAN "Enable AddressSanitizer (ASan)" OFF) option 36 if((ASAN OR TSAN) AND NOT (CMAKE_C_COMPILER_ID MATCHES "AppleClang|GNU|Clang")) 37 message(SEND_ERROR "Sanitizer support requires clang or gcc. Try again with -DCMAKE_C_COMPILER.") 40 if(ASAN) 41 add_definitions(-D__ASAN__=1) 42 set (CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fno-omit-frame-pointer -fsanitize=address") 43 …set (CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -fno-omit-frame-pointer -fsanitize=ad… 44 …set (CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fno-omit-frame-pointer -fsanitize=address") 48 add_definitions(-D__TSAN__=1) [all …]
|
| /third_party/node/deps/v8/tools/testrunner/ |
| D | base_runner.py | 2 # Use of this source code is governed by a BSD-style license that can be 56 "wasm-spec-tests", 60 "wasm-js", 65 "wasm-api-tests", 72 "wasm-spec-tests", 75 "wasm-js", 80 "wasm-api-tests", 122 DEBUG_FLAGS = ["--nohard-abort", "--enable-slow-asserts", "--verify-heap"] 123 RELEASE_FLAGS = ["--nohard-abort"] 140 # implies debug is set. Hence, the status file needs to assume debug-like [all …]
|
| /third_party/libuv/ |
| D | CMakeLists.txt | 43 option(ASAN "Enable AddressSanitizer (ASan)" OFF) option 49 message(SEND_ERROR "MemorySanitizer requires clang. Try again with -DCMAKE_C_COMPILER=clang") 52 if(ASAN) 55 set (CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fno-omit-frame-pointer -fsanitize=address") 56 …set (CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -fno-omit-frame-pointer -fsanitize=ad… 57 …set (CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fno-omit-frame-pointer -fsanitize=address") 61 …message(SEND_ERROR "AddressSanitizer support requires clang, gcc, or msvc. Try again with -DCMAKE_… 67 set (CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fno-omit-frame-pointer -fsanitize=memory") 68 …set (CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -fno-omit-frame-pointer -fsanitize=me… 69 set (CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fno-omit-frame-pointer -fsanitize=memory") [all …]
|
| /third_party/python/Doc/using/ |
| D | configure.rst | 2 Configure Python 5 .. _configure-options: 7 Configure Options 10 List all ``./configure`` script options using:: 12 ./configure --help 17 --------------- 19 .. cmdoption:: --enable-loadable-sqlite-extensions 29 .. cmdoption:: --disable-ipv6 34 .. cmdoption:: --enable-big-digits=[15|30] 44 .. cmdoption:: --with-cxx-main [all …]
|
| /third_party/libsnd/ |
| D | NEWS.OLD | 1 Version 1.0.31 (2021-01-24) 38 * Fix memory leak in wav_read_smpl_chunk() function, credit to OSS-Fuzz. 39 * Fix aiff_read_header() memory leak(), credit to OSS-Fuzz. 40 * Fix leak in wav_read_header(), credit to OSS-Fuzz. 41 * Fix leak in wavlike_read_cart_chunk(), credit to OSS-Fuzz. 42 * Fix memory leak in wav_read_acid_chunk(), credit to OSS-Fuzz. 43 * Fix memory leak in aiff_read_basc_chunk(), credit to OSS-Fuzz. 44 * Fix memory leak in wavlike_read_peak_chunk(), credit to OSS-Fuzz. 45 * Fix memory leak in aiff_read_header(), credit to OSS-Fuzz. 46 * Fix use of uninitialized value in exif_subchunk_parse(), credit to OSS-Fuzz. [all …]
|
| /third_party/node/deps/cares/ |
| D | CHANGES | 1 Changelog for the c-ares project. Generated with git2changes.pl 6 - [Brad House brought this change] 12 - [Brad House brought this change] 14 Merge pull request from GHSA-mg26-v6qh-x48q 16 - [Oliver Welsh brought this change] 20 Hello, I work on an application for Microsoft which uses c-ares to 51 - `ContainerNoDfltSvrEmptyInit` to test that initialization fails when 53 - `ContainerNoDfltSvrFullInit` to test that initialization still 63 --------- 68 - badge should be only main branch [all …]
|
| /third_party/libabigail/ |
| D | configure.ac | 1 # SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 39 AC_CONFIG_AUX_DIR([build-aux]) 47 dnl http://www.gnu.org/software/autoconf-archive 50 m4_include([autoconf-archive/ax_check_python_modules.m4]) 53 m4_include([autoconf-archive/ax_compare_version.m4]) 54 m4_include([autoconf-archive/ax_prog_python_version.m4]) 56 dnl This one is to be able to run "make check-valgrind" 58 m4_include([autoconf-archive/ax_valgrind_check.m4]) 60 AM_INIT_AUTOMAKE([1.11.1 foreign subdir-objects dist-xz tar-ustar parallel-tests]) 88 dnl The feature can be enabled by passing VERSION_SUFFIX to `configure`, [all …]
|
| /third_party/pcre2/pcre2/maint/ |
| D | ManyConfigTests | 13 # -noasan skip the test that uses -fsanitize=address 14 # -nousan skip the test that uses -fsanitize=undefined 15 # -nodebug skip the test that uses --enable-debug 16 # -nojit skip all JIT tests 17 # -nojitmain skip non-valgrind JIT tests 18 # -nojitvalgrind skip JIT tests with valgrind 19 # -nomain skip all the main (non-JIT) set of tests 20 # -nomainvalgrind skip the main (non-JIT) valgrind tests 21 # -notmp skip the test in a temporary directory 22 # -novalgrind skip all the valgrind tests [all …]
|
| /third_party/node/deps/openssl/openssl/ |
| D | INSTALL.md | 11 - [Prerequisites](#prerequisites) 12 - [Notational Conventions](#notational-conventions) 13 - [Quick Installation Guide](#quick-installation-guide) 14 - [Building OpenSSL](#building-openssl) 15 - [Installing OpenSSL](#installing-openssl) 16 - [Configuration Options](#configuration-options) 17 - [API Level](#api-level) 18 - [Cross Compile Prefix](#cross-compile-prefix) 19 - [Build Type](#build-type) 20 - [Directories](#directories) [all …]
|
| /third_party/openssl/ |
| D | INSTALL.md | 11 - [Prerequisites](#prerequisites) 12 - [Notational Conventions](#notational-conventions) 13 - [Quick Installation Guide](#quick-installation-guide) 14 - [Building OpenSSL](#building-openssl) 15 - [Installing OpenSSL](#installing-openssl) 16 - [Configuration Options](#configuration-options) 17 - [API Level](#api-level) 18 - [Cross Compile Prefix](#cross-compile-prefix) 19 - [Build Type](#build-type) 20 - [Directories](#directories) [all …]
|