Home
last modified time | relevance | path

Searched full:asan (Results 1 – 25 of 382) sorted by relevance

12345678910>>...16

/third_party/grpc/tools/
Dbazel.rc16 build:asan --strip=never
17 build:asan --copt=-fsanitize=address
18 build:asan --copt=-O0
19 build:asan --copt=-fno-omit-frame-pointer
20 build:asan --copt=-DGPR_NO_DIRECT_SYSCALLS
21 build:asan --copt=-DGRPC_ASAN
22 build:asan --copt=-DADDRESS_SANITIZER # used by absl
23 build:asan --linkopt=-fsanitize=address
24 build:asan --action_env=ASAN_OPTIONS=detect_leaks=1:color=always
25 build:asan --action_env=LSAN_OPTIONS=suppressions=test/core/util/lsan_suppressions.txt:report_objec…
[all …]
/third_party/skia/site/docs/dev/testing/
Dxsan.md3 title: "MSAN, ASAN, & TSAN"
4 linkTitle: "MSAN, ASAN, & TSAN"
11 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
14 - ASAN works on Linux, Mac, Android, and Windows.
69 Configure and Compile Skia with ASAN
75 mkdir -p out/asan
76 cat > out/asan/args.gn <<- EOF
79 sanitize = "ASAN"
83 bin/gn gen out/asan
84 ninja -C out/asan
Dfuzz.md9 reproduce when building with ASAN or MSAN; see
27 out/ASAN/fuzz -b /path/to/downloaded/testcase
33 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase
34 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase
38 out/ASAN/fuzz --help # will list all types
39 out/ASAN/fuzz -t api # will list all names
43 out/ASAN/fuzz -b /path/to/downloaded/testcase --loops <times-to-run>
/third_party/musl/porting/linux/user/config/
DREADME_zh.md21asan.lib.paths`项用于指定musl asan linker加载动态库时的查找路径,多个路径中间使用`:`号分隔,判断是否为asan linker是看linker的名字中是否含有`-a…
25asan/build_mixed_asan.sh`中,是通过将asan版本的lib和bin放到`/data`目录下,然后调整系统服务进程的配置文件(`/system/etc/init/*.cfg`…
Dld-musl-namespace-x86_64-test.ini7 …namespace.default.asan.lib.paths = /system/lib64:/system/lib64/module:/vendor/lib64:/vendor/lib64/…
47 #ns_asan_lib_path ,testing asan.lib.paths
50 namespace.ns_asan_lib_path.asan.lib.paths = /data/tests/libc-test/src/functionalext/dlns/B
52 #ns_asan_permit_path ,testing asan.permitted.paths
55 …namespace.ns_asan_permit_path.asan.permitted.paths = /data/tests/libc-test/src/functionalext/dlns/B
Dld-musl-namespace-arm-test.ini7 …namespace.default.asan.lib.paths = /system/lib:/system/lib/module:/vendor/lib:/vendor/lib/chipsets…
47 #ns_asan_lib_path ,testing asan.lib.paths
50 namespace.ns_asan_lib_path.asan.lib.paths = /data/tests/libc-test/src/functionalext/dlns/B
52 #ns_asan_permit_path ,testing asan.permitted.paths
55 …namespace.ns_asan_permit_path.asan.permitted.paths = /data/tests/libc-test/src/functionalext/dlns/B
Dld-musl-namespace-aarch64-test.ini7 …namespace.default.asan.lib.paths = /system/lib64:/system/lib64/module:/vendor/lib64:/vendor/lib64/…
47 #ns_asan_lib_path ,testing asan.lib.paths
50 namespace.ns_asan_lib_path.asan.lib.paths = /data/tests/libc-test/src/functionalext/dlns/B
52 #ns_asan_permit_path ,testing asan.permitted.paths
55 …namespace.ns_asan_permit_path.asan.permitted.paths = /data/tests/libc-test/src/functionalext/dlns/B
/third_party/flutter/skia/site/dev/testing/
Dfuzz.md5 when building with ASAN or MSAN; see [those instructions for more details](./xsan).
21 out/ASAN/fuzz -b /path/to/downloaded/testcase
26 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase
27 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase
31 out/ASAN/fuzz --help # will list all types
32 out/ASAN/fuzz -t api # will list all names
Dxsan.md1 MSAN, ASAN, & TSAN
6 Compiling Skia with ASAN, UBSAN, or TSAN can be done with the latest version of Clang.
9 - ASAN works on Linux, Mac, Android.
64 Configure and Compile Skia with ASAN
70 mkdir -p out/asan
71 cat > out/asan/args.gn <<- EOF
74 sanitize = "ASAN"
78 bin/gn gen out/asan
79 ninja -C out/asan
/third_party/libuv/.github/workflows/
Dsanitizer.yml21 - name: ASAN
23 mkdir build-asan
24 (cd build-asan && cmake .. -G Ninja -DBUILD_TESTING=ON -DASAN=ON -DCMAKE_BUILD_TYPE=Debug)
25 cmake --build build-asan
26 ./build-asan/uv_run_tests_a
/third_party/skia/third_party/externals/swiftshader/tests/kokoro/macos/
Dcontinuous.sh21 # Disable ASAN checks for debug builds, to reduce Kokoro build times.
22 # ASAN builds are recommended to be optimized.
23 ASAN="ON"
25 ASAN="OFF"
29 "-DSWIFTSHADER_ASAN=${ASAN}" \
/third_party/mbedtls/tests/scripts/
Dall.sh49 # * GCC and Clang (recent enough for using ASan with gcc and MemSan with clang, or valgrind)
184 # CFLAGS and LDFLAGS for Asan builds that don't use CMake
900 msg "build: cmake, gcc, ASan" # ~ 1 min 50s
901 CC=gcc cmake -D CMAKE_BUILD_TYPE:String=Asan .
904 msg "test: main suites (inc. selftests) (ASan build)" # ~ 50s
907 msg "test: selftest (ASan build)" # ~ 10s
910 msg "test: ssl-opt.sh (ASan build)" # ~ 1 min
913 msg "test: compat.sh (ASan build)" # ~ 6 min
916 msg "test: context-info.sh (ASan build)" # ~ 15 sec
921 msg "build: full config, cmake, gcc, ASan"
[all …]
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Instrumentation/
DAddressSanitizer.cpp91 #define DEBUG_TYPE "asan"
130 static const char *const kAsanModuleCtorName = "asan.module_ctor";
131 static const char *const kAsanModuleDtorName = "asan.module_dtor";
167 // ASan version script has __asan_* wildcard. Triple underscore prevents a
189 "asan-kernel", cl::desc("Enable KernelAddressSanitizer instrumentation"),
193 "asan-recover",
198 "asan-guard-against-version-mismatch",
202 // This flag may need to be replaced with -f[no-]asan-reads.
203 static cl::opt<bool> ClInstrumentReads("asan-instrument-reads",
208 "asan-instrument-writes", cl::desc("instrument write instructions"),
[all …]
/third_party/libpsl/
D.travis.yml49 - ./configure $CFI --enable-asan $UBSAN && make -j4 && make check -j4
50 …- ./configure $CFI --enable-runtime=$RUNTIME --enable-builtin=libicu --enable-asan $UBSAN && make …
51 …- ./configure $CFI --enable-runtime=$RUNTIME --enable-builtin=libidn2 --enable-asan $UBSAN && make…
52 …- ./configure $CFI --enable-runtime=$RUNTIME --enable-builtin=libidn --enable-asan $UBSAN && make …
53 …- ./configure $CFI --enable-runtime=$RUNTIME --disable-builtin --enable-asan $UBSAN && make clean …
/third_party/skia/site/docs/dev/contrib/
Dbazel.md91 # Create an ASAN config, try `bazel test --config asan ...`.
92 build:asan --copt -fsanitize=address
93 build:asan --copt -Wno-macro-redefined # (_FORTIFY_SOURCE redefined.)
94 build:asan --linkopt -fsanitize=address
/third_party/mesa3d/src/gallium/drivers/llvmpipe/ci/
Dgitlab-ci.yml98 llvmpipe-deqp-asan:
100 DEQP_SUITE: llvmpipe-asan
101 GPU_VERSION: llvmpipe-asan
106 - debian-testing-asan
/third_party/mesa3d/src/gallium/frontends/lavapipe/ci/
Dgitlab-ci.yml27 lavapipe-vk-asan:
31 GPU_VERSION: lvp-asan
39 - debian-testing-asan
/third_party/musl/ndk-test/sanitize/
Druntest.sh5 chmod +x sanitize/asan/*
17 for case in `ls sanitize/asan`
19 echo [Runing test] : sanitize/asan/$case
21 ASAN_OPTIONS=detect_stack_use_after_return=1 sanitize/asan/$case 2>tmp
23 ASAN_OPTIONS=check_initialization_order=true sanitize/asan/$case 2>tmp
25 ASAN_OPTIONS='' sanitize/asan/$case 2>tmp
41 echo "[ERROR] asan/$case failed." | tee -a REPORT
42 sanitize/asan/$case >> REPORT
/third_party/grpc/tools/run_tests/generated/
Dconfigs.json6 "config": "asan-trace-cmp",
16 "config": "asan",
39 "config": "asan-noleaks",
/third_party/skia/third_party/externals/angle2/infra/config/generated/
Dluci-milo.cfg34 name: "buildbucket/luci.angle.ci/linux-asan-test"
36 short_name: "asan"
69 name: "buildbucket/luci.angle.ci/win-asan-test"
71 short_name: "asan"
175 name: "buildbucket/luci.angle.try/linux-asan-test"
196 name: "buildbucket/luci.angle.try/win-asan-test"
Dluci-scheduler.cfg58 id: "linux-asan-test"
64 builder: "linux-asan-test"
158 id: "win-asan-test"
164 builder: "win-asan-test"
307 triggers: "linux-asan-test"
317 triggers: "win-asan-test"
/third_party/mesa3d/src/gallium/drivers/softpipe/ci/
Dgitlab-ci.yml20 softpipe-asan-gles31:
22 GPU_VERSION: softpipe-asan
29 - debian-testing-asan
/third_party/skia/third_party/externals/abseil-cpp/absl/debugging/
Dleak_check.h21 // integrated within the AddressSanitizer (ASan) as an additional component, or
22 // which can be used standalone. LSan and ASan are included (or can be provided)
25 // Leak checking is enabled by default in all ASan builds.
42 // Returns true if a leak-checking sanitizer (either ASan or standalone LSan) is
48 // Returns true if a leak-checking sanitizer (either ASan or standalone LSan) is
/third_party/mindspore/mindspore/lite/test/st/scripts/
Drun_benchmark_asan.sh60 x86_path=${release_path}/ubuntu_x86/asan
101 echo 'run x86 asan logs: ' > ${run_x86_asan_log_file}
108 echo "start Run x86 ASAN..."
120 echo "Run_x86 ASAN failed"
/third_party/musl/ndk-test/script/
Druntest-sanitize.sh16 for case in `ls sanitize/asan`
18 echo [Runing test] : sanitize/asan/$case
20 ASAN_OPTIONS=detect_stack_use_after_return=1 sanitize/asan/$case 2>tmp
22 ASAN_OPTIONS=check_initialization_order=true sanitize/asan/$case 2>tmp
24 ASAN_OPTIONS='' sanitize/asan/$case 2>tmp
40 echo "[ERROR] asan/$case failed." | tee -a REPORT-SANITIZE
41 sanitize/asan/$case >> REPORT-SANITIZE

12345678910>>...16