Searched full:detect_odr_violation (Results 1 – 20 of 20) sorted by relevance
8 // Different size: detect a bug if detect_odr_violation>=111 // RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=1 not %run %t-ODR-EXE 2>&1 | Fi…12 // RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | Fi…13 // RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=0 %run %t-ODR-EXE 2>&1 | Fi…16 // Same size: report a bug only if detect_odr_violation>=2.18 // RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=1 %run %t-ODR-EXE 2>&1 | Fi…19 // RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | Fi…22 // RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp not %ru…24 // RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp %ru…
9 "ASAN_OPTIONS=detect_odr_violation=0",
5 export ASAN_OPTIONS="detect_odr_violation=0 detect_leaks=0"
156 (flags()->detect_odr_violation >= 2 || g->size != l->g->size) && in CheckODRViolationViaIndicator()172 (flags()->detect_odr_violation >= 2 || g->size != l->g->size) && in CheckODRViolationViaPoisoning()222 if (flags()->detect_odr_violation) { in RegisterGlobal()
130 ASAN_FLAG(int, detect_odr_violation, 2,
986 "ASAN_OPTIONS=detect_odr_violation=0\n"); in ReportODRViolation()
27 export ASAN_OPTIONS="detect_odr_violation=0 detect_leaks=0"
35 export ASAN_OPTIONS="detect_leaks=0:symbolize=0:detect_odr_violation=0:abort_on_error=1"
46 export ASAN_OPTIONS="detect_leaks=0:symbolize=0:detect_odr_violation=0:abort_on_error=1"
49 …_usable_size=0:detect_container_overflow=0:quarantine_size_mb=256:detect_odr_violation=0:symbolize…
153 the following environment variable: `ASAN_OPTIONS=detect_odr_violation=0` and
65 …val_ms=500:check_malloc_usable_size=0:detect_container_overflow=1:detect_odr_violation=0:detect_le…
107 export ASAN_OPTIONS="$ASAN_OPTIONS:abort_on_error=1:symbolize=0:detect_odr_violation=0:"
452 // detect_odr_violation=0: http://crbug.com/376306454 const char* kAsanDefaultOptionsNaCl = "handle_segv=0:detect_odr_violation=0";
203 $ ASAN_OPTIONS=detect_odr_violation=0 \
716 "detect_odr_violation=0:" in set_up_environment()
734 "detect_odr_violation=0:" in set_up_environment()
605 "detect_odr_violation=0:" in set_up_environment()
700 "detect_odr_violation=0:" in afl_fsrv_start()
950 self.exec_env['ASAN_OPTIONS'] = 'detect_odr_violation=0'