History log of /netbsd/tests/usr.bin/cc/Makefile (Results 1 – 8 of 8)
Revision Date Author Comments
# fdb6b69d 18-Aug-2019 kamil <kamil@NetBSD.org>

Add ATF c and c++ tests for TSan, MSan, libFuzzer

These tests require Clang/LLVM 7 or newer on NetBSD.

Contributed by Yang Zheng during GSoC 2018.


# 88d981d6 09-Feb-2019 mrg <mrg@NetBSD.org>

add very simple test that you can link -fopenmp.

currently fails, but should work soon...


# 9bce57c1 29-Jan-2019 mgorny <mgorny@NetBSD.org>

Move common UBSAN test case code into ubsan_common.subr

Reviewed by <kamil>


# 1b5c2020 29-Jan-2019 mgorny <mgorny@NetBSD.org>

Move common ASAN test case code into asan_common.subr

Reviewed by <kamil>


# 5d8fa03f 02-May-2018 kamil <kamil@NetBSD.org>

Add new ATF Undefined Behavior Sanitizer tests

Add new cc and c++ tests to check whether UBSan works.
These tests are prepared for GCC (in base) and Clang (with external patches).

Enable these test

Add new ATF Undefined Behavior Sanitizer tests

Add new cc and c++ tests to check whether UBSan works.
These tests are prepared for GCC (in base) and Clang (with external patches).

Enable these tests for all ports by default, just verify whether we are
using GCC/Clang or a compatible compiler.

Add five equivalent C and C++ tests:
- Integer addition overflow
- Integer divide by zero
- Integer negation overflow
- Integer subtraction overflow
- VLA out of bounds

All tests pass on NetBSD/amd64.

Patch submitted by <Harry Pantazis>
Minor cleanup by <myself>

show more ...


# b7ff57c5 11-Apr-2018 kamil <kamil@NetBSD.org>

Import new C and C++ ATF tests for ASan

Add new tests:
- tests/usr.bin/cc/t_asan_poison.sh
- tests/usr.bin/c++/t_asan_poison.sh

These tests verify the following build options:
- regular
- profi

Import new C and C++ ATF tests for ASan

Add new tests:
- tests/usr.bin/cc/t_asan_poison.sh
- tests/usr.bin/c++/t_asan_poison.sh

These tests verify the following build options:
- regular
- profile
- pic
- pie
- compat32
- (static unsupported)

These tests verify whether ASan code can include compiler and sanitizer
specific header: <sanitizer/asan_interface.h>. The testing code checks
the ASAN_POISON_MEMORY_REGION() functionality, poisoning valid memory and
asserting that it triggers expected failure.

Patch submitted by <Siddharth Muralee>

show more ...


# 65fc6ecb 04-Apr-2018 kamil <kamil@NetBSD.org>

Add new ATF tests for Address Sanitzier (ASan)

Add new C and C++ tests:
- t_asan_double_free
- t_asan_global_buffer_overflow
- t_asan_heap_overflow
- t_asan_off_by_one
- t_asan_uaf

Each tests

Add new ATF tests for Address Sanitzier (ASan)

Add new C and C++ tests:
- t_asan_double_free
- t_asan_global_buffer_overflow
- t_asan_heap_overflow
- t_asan_off_by_one
- t_asan_uaf

Each tests checks:
- regular build
- 32-bit
- PIC
- PIE
- profile

These tests require paxctl(8) to disable ASLR in order to work in a
predictable way. This is especially true for all !regular builds with
additional compiler flags.

There are no static variations of these tests as this mode is not supported
in upstream ASan.

Enable these tests on amd64 and i386.

Patch submitted by <Siddharth Muralee>
Additional polishing by myself.

show more ...


# 33d7ae6c 17-Mar-2012 jruoho <jruoho@NetBSD.org>

Deprecate tests/toolchain.