Searched full:asan (Results 1 – 25 of 382) sorted by relevance
12345678910>>...16
/third_party/grpc/tools/ |
D | bazel.rc | 16 build:asan --strip=never 17 build:asan --copt=-fsanitize=address 18 build:asan --copt=-O0 19 build:asan --copt=-fno-omit-frame-pointer 20 build:asan --copt=-DGPR_NO_DIRECT_SYSCALLS 21 build:asan --copt=-DGRPC_ASAN 22 build:asan --copt=-DADDRESS_SANITIZER # used by absl 23 build:asan --linkopt=-fsanitize=address 24 build:asan --action_env=ASAN_OPTIONS=detect_leaks=1:color=always 25 build:asan --action_env=LSAN_OPTIONS=suppressions=test/core/util/lsan_suppressions.txt:report_objec… [all …]
|
/third_party/skia/site/docs/dev/testing/ |
D | xsan.md | 3 title: "MSAN, ASAN, & TSAN" 4 linkTitle: "MSAN, ASAN, & TSAN" 11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 14 - ASAN works on Linux, Mac, Android, and Windows. 69 Configure and Compile Skia with ASAN 75 mkdir -p out/asan 76 cat > out/asan/args.gn <<- EOF 79 sanitize = "ASAN" 83 bin/gn gen out/asan 84 ninja -C out/asan
|
D | fuzz.md | 9 reproduce when building with ASAN or MSAN; see 27 out/ASAN/fuzz -b /path/to/downloaded/testcase 33 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase 34 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase 38 out/ASAN/fuzz --help # will list all types 39 out/ASAN/fuzz -t api # will list all names 43 out/ASAN/fuzz -b /path/to/downloaded/testcase --loops <times-to-run>
|
/third_party/musl/porting/linux/user/config/ |
D | README_zh.md | 21 …asan.lib.paths`项用于指定musl asan linker加载动态库时的查找路径,多个路径中间使用`:`号分隔,判断是否为asan linker是看linker的名字中是否含有`-a… 25 …asan/build_mixed_asan.sh`中,是通过将asan版本的lib和bin放到`/data`目录下,然后调整系统服务进程的配置文件(`/system/etc/init/*.cfg`…
|
D | ld-musl-namespace-x86_64-test.ini | 7 …namespace.default.asan.lib.paths = /system/lib64:/system/lib64/module:/vendor/lib64:/vendor/lib64/… 47 #ns_asan_lib_path ,testing asan.lib.paths 50 namespace.ns_asan_lib_path.asan.lib.paths = /data/tests/libc-test/src/functionalext/dlns/B 52 #ns_asan_permit_path ,testing asan.permitted.paths 55 …namespace.ns_asan_permit_path.asan.permitted.paths = /data/tests/libc-test/src/functionalext/dlns/B
|
D | ld-musl-namespace-arm-test.ini | 7 …namespace.default.asan.lib.paths = /system/lib:/system/lib/module:/vendor/lib:/vendor/lib/chipsets… 47 #ns_asan_lib_path ,testing asan.lib.paths 50 namespace.ns_asan_lib_path.asan.lib.paths = /data/tests/libc-test/src/functionalext/dlns/B 52 #ns_asan_permit_path ,testing asan.permitted.paths 55 …namespace.ns_asan_permit_path.asan.permitted.paths = /data/tests/libc-test/src/functionalext/dlns/B
|
D | ld-musl-namespace-aarch64-test.ini | 7 …namespace.default.asan.lib.paths = /system/lib64:/system/lib64/module:/vendor/lib64:/vendor/lib64/… 47 #ns_asan_lib_path ,testing asan.lib.paths 50 namespace.ns_asan_lib_path.asan.lib.paths = /data/tests/libc-test/src/functionalext/dlns/B 52 #ns_asan_permit_path ,testing asan.permitted.paths 55 …namespace.ns_asan_permit_path.asan.permitted.paths = /data/tests/libc-test/src/functionalext/dlns/B
|
/third_party/flutter/skia/site/dev/testing/ |
D | fuzz.md | 5 when building with ASAN or MSAN; see [those instructions for more details](./xsan). 21 out/ASAN/fuzz -b /path/to/downloaded/testcase 26 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase 27 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase 31 out/ASAN/fuzz --help # will list all types 32 out/ASAN/fuzz -t api # will list all names
|
D | xsan.md | 1 MSAN, ASAN, & TSAN 6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang. 9 - ASAN works on Linux, Mac, Android. 64 Configure and Compile Skia with ASAN 70 mkdir -p out/asan 71 cat > out/asan/args.gn <<- EOF 74 sanitize = "ASAN" 78 bin/gn gen out/asan 79 ninja -C out/asan
|
/third_party/libuv/.github/workflows/ |
D | sanitizer.yml | 21 - name: ASAN 23 mkdir build-asan 24 (cd build-asan && cmake .. -G Ninja -DBUILD_TESTING=ON -DASAN=ON -DCMAKE_BUILD_TYPE=Debug) 25 cmake --build build-asan 26 ./build-asan/uv_run_tests_a
|
/third_party/skia/third_party/externals/swiftshader/tests/kokoro/macos/ |
D | continuous.sh | 21 # Disable ASAN checks for debug builds, to reduce Kokoro build times. 22 # ASAN builds are recommended to be optimized. 23 ASAN="ON" 25 ASAN="OFF" 29 "-DSWIFTSHADER_ASAN=${ASAN}" \
|
/third_party/mbedtls/tests/scripts/ |
D | all.sh | 49 # * GCC and Clang (recent enough for using ASan with gcc and MemSan with clang, or valgrind) 184 # CFLAGS and LDFLAGS for Asan builds that don't use CMake 900 msg "build: cmake, gcc, ASan" # ~ 1 min 50s 901 CC=gcc cmake -D CMAKE_BUILD_TYPE:String=Asan . 904 msg "test: main suites (inc. selftests) (ASan build)" # ~ 50s 907 msg "test: selftest (ASan build)" # ~ 10s 910 msg "test: ssl-opt.sh (ASan build)" # ~ 1 min 913 msg "test: compat.sh (ASan build)" # ~ 6 min 916 msg "test: context-info.sh (ASan build)" # ~ 15 sec 921 msg "build: full config, cmake, gcc, ASan" [all …]
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Instrumentation/ |
D | AddressSanitizer.cpp | 91 #define DEBUG_TYPE "asan" 130 static const char *const kAsanModuleCtorName = "asan.module_ctor"; 131 static const char *const kAsanModuleDtorName = "asan.module_dtor"; 167 // ASan version script has __asan_* wildcard. Triple underscore prevents a 189 "asan-kernel", cl::desc("Enable KernelAddressSanitizer instrumentation"), 193 "asan-recover", 198 "asan-guard-against-version-mismatch", 202 // This flag may need to be replaced with -f[no-]asan-reads. 203 static cl::opt<bool> ClInstrumentReads("asan-instrument-reads", 208 "asan-instrument-writes", cl::desc("instrument write instructions"), [all …]
|
/third_party/libpsl/ |
D | .travis.yml | 49 - ./configure $CFI --enable-asan $UBSAN && make -j4 && make check -j4 50 …- ./configure $CFI --enable-runtime=$RUNTIME --enable-builtin=libicu --enable-asan $UBSAN && make … 51 …- ./configure $CFI --enable-runtime=$RUNTIME --enable-builtin=libidn2 --enable-asan $UBSAN && make… 52 …- ./configure $CFI --enable-runtime=$RUNTIME --enable-builtin=libidn --enable-asan $UBSAN && make … 53 …- ./configure $CFI --enable-runtime=$RUNTIME --disable-builtin --enable-asan $UBSAN && make clean …
|
/third_party/skia/site/docs/dev/contrib/ |
D | bazel.md | 91 # Create an ASAN config, try `bazel test --config asan ...`. 92 build:asan --copt -fsanitize=address 93 build:asan --copt -Wno-macro-redefined # (_FORTIFY_SOURCE redefined.) 94 build:asan --linkopt -fsanitize=address
|
/third_party/mesa3d/src/gallium/drivers/llvmpipe/ci/ |
D | gitlab-ci.yml | 98 llvmpipe-deqp-asan: 100 DEQP_SUITE: llvmpipe-asan 101 GPU_VERSION: llvmpipe-asan 106 - debian-testing-asan
|
/third_party/mesa3d/src/gallium/frontends/lavapipe/ci/ |
D | gitlab-ci.yml | 27 lavapipe-vk-asan: 31 GPU_VERSION: lvp-asan 39 - debian-testing-asan
|
/third_party/musl/ndk-test/sanitize/ |
D | runtest.sh | 5 chmod +x sanitize/asan/* 17 for case in `ls sanitize/asan` 19 echo [Runing test] : sanitize/asan/$case 21 ASAN_OPTIONS=detect_stack_use_after_return=1 sanitize/asan/$case 2>tmp 23 ASAN_OPTIONS=check_initialization_order=true sanitize/asan/$case 2>tmp 25 ASAN_OPTIONS='' sanitize/asan/$case 2>tmp 41 echo "[ERROR] asan/$case failed." | tee -a REPORT 42 sanitize/asan/$case >> REPORT
|
/third_party/grpc/tools/run_tests/generated/ |
D | configs.json | 6 "config": "asan-trace-cmp", 16 "config": "asan", 39 "config": "asan-noleaks",
|
/third_party/skia/third_party/externals/angle2/infra/config/generated/ |
D | luci-milo.cfg | 34 name: "buildbucket/luci.angle.ci/linux-asan-test" 36 short_name: "asan" 69 name: "buildbucket/luci.angle.ci/win-asan-test" 71 short_name: "asan" 175 name: "buildbucket/luci.angle.try/linux-asan-test" 196 name: "buildbucket/luci.angle.try/win-asan-test"
|
D | luci-scheduler.cfg | 58 id: "linux-asan-test" 64 builder: "linux-asan-test" 158 id: "win-asan-test" 164 builder: "win-asan-test" 307 triggers: "linux-asan-test" 317 triggers: "win-asan-test"
|
/third_party/mesa3d/src/gallium/drivers/softpipe/ci/ |
D | gitlab-ci.yml | 20 softpipe-asan-gles31: 22 GPU_VERSION: softpipe-asan 29 - debian-testing-asan
|
/third_party/skia/third_party/externals/abseil-cpp/absl/debugging/ |
D | leak_check.h | 21 // integrated within the AddressSanitizer (ASan) as an additional component, or 22 // which can be used standalone. LSan and ASan are included (or can be provided) 25 // Leak checking is enabled by default in all ASan builds. 42 // Returns true if a leak-checking sanitizer (either ASan or standalone LSan) is 48 // Returns true if a leak-checking sanitizer (either ASan or standalone LSan) is
|
/third_party/mindspore/mindspore/lite/test/st/scripts/ |
D | run_benchmark_asan.sh | 60 x86_path=${release_path}/ubuntu_x86/asan 101 echo 'run x86 asan logs: ' > ${run_x86_asan_log_file} 108 echo "start Run x86 ASAN..." 120 echo "Run_x86 ASAN failed"
|
/third_party/musl/ndk-test/script/ |
D | runtest-sanitize.sh | 16 for case in `ls sanitize/asan` 18 echo [Runing test] : sanitize/asan/$case 20 ASAN_OPTIONS=detect_stack_use_after_return=1 sanitize/asan/$case 2>tmp 22 ASAN_OPTIONS=check_initialization_order=true sanitize/asan/$case 2>tmp 24 ASAN_OPTIONS='' sanitize/asan/$case 2>tmp 40 echo "[ERROR] asan/$case failed." | tee -a REPORT-SANITIZE 41 sanitize/asan/$case >> REPORT-SANITIZE
|
12345678910>>...16