/dports/lang/racket/racket-8.3/src/ac/ |
H A D | asan.m4 | 2 ASAN="-fsanitize=address -fsanitize-recover=address -fno-omit-frame-pointer -fno-common" 3 CFLAGS="$CFLAGS $ASAN" 5 CPPFLAGS="$CPPFLAGS $ASAN" 6 PREFLAGS="$PREFLAGS $ASAN" 8 LDFLAGS="$LDFLAGS $ASAN"
|
/dports/lang/racket-minimal/racket-8.3/src/ac/ |
H A D | asan.m4 | 2 ASAN="-fsanitize=address -fsanitize-recover=address -fno-omit-frame-pointer -fno-common" 3 CFLAGS="$CFLAGS $ASAN" 5 CPPFLAGS="$CPPFLAGS $ASAN" 6 PREFLAGS="$PREFLAGS $ASAN" 8 LDFLAGS="$LDFLAGS $ASAN"
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/skia/site/dev/testing/ |
H A D | fuzz.md | 5 when building with ASAN or MSAN; see [those instructions for more details](./xsan). 21 out/ASAN/fuzz -b /path/to/downloaded/testcase 26 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase 27 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase 31 out/ASAN/fuzz --help # will list all types 32 out/ASAN/fuzz -t api # will list all names
|
/dports/devel/llvm-devel/llvm-project-f05c95f10fc1d8171071735af8ad3a9e87633120/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/tinygo/tinygo-0.14.1/llvm-project/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/llvm/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/wasi-libcxx/llvm-project-13.0.1.src/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm90/llvm-9.0.1.src/tools/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm-cheri/llvm-project-37c49ff00e3eadce5d8703fdc4497f28458c64a8/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm12/llvm-project-12.0.1.src/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm10/llvm-10.0.1.src/tools/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm11/llvm-11.0.1.src/tools/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/wasi-compiler-rt13/llvm-project-13.0.1.src/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/lang/rust/rustc-1.58.1-src/src/llvm-project/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/wasi-compiler-rt12/llvm-project-12.0.1.src/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm13/llvm-project-13.0.1.src/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm80/llvm-8.0.1.src/tools/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/devel/llvm70/llvm-7.0.1.src/tools/clang/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/lang/clang-mesa/clang-13.0.1.src/test/CodeGenObjCXX/ |
H A D | address-safety-attr.mm | 2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s 11 // ASAN: +[MyClass load]{{.*}}#0 15 // ASAN: +[MyClass addressSafety:]{{.*}}#0 20 // ASAN: attributes #0 = {{.*}}sanitize_address
|
/dports/audio/flac/flac-1.3.4/oss-fuzz/fuzzing/ |
H A D | memory.hpp | 6 #ifndef ASAN 7 #define ASAN 0 macro 18 #if ASAN == 1 31 #if ASAN == 1 in memory_test_asan()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/skia/site/dev/testing/ |
H A D | fuzz.md | 8 when building with ASAN or MSAN; see [those instructions for more details](./xsan). 25 out/ASAN/fuzz -b /path/to/downloaded/testcase 30 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase 31 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase 35 out/ASAN/fuzz --help # will list all types 36 out/ASAN/fuzz -t api # will list all names 40 out/ASAN/fuzz -b /path/to/downloaded/testcase --loops <times-to-run>
|
/dports/dns/flamethrower/flamethrower-0.11.0/cmake/ |
H A D | sanitizer.cmake | 3 option(ASAN "Build with ASAN." OFF) option 6 if (ASAN)
|
/dports/net/wireshark/wireshark-3.6.1/tools/ |
H A D | test-captures.sh | 23 ASAN=$CONFIGURED_WITH_ASAN 27 a) ASAN=1 ;; 54 if [ $ASAN -eq 0 ]; then
|
/dports/net/wireshark-lite/wireshark-3.6.1/tools/ |
H A D | test-captures.sh | 23 ASAN=$CONFIGURED_WITH_ASAN 27 a) ASAN=1 ;; 54 if [ $ASAN -eq 0 ]; then
|
/dports/net/tshark-lite/wireshark-3.6.1/tools/ |
H A D | test-captures.sh | 23 ASAN=$CONFIGURED_WITH_ASAN 27 a) ASAN=1 ;; 54 if [ $ASAN -eq 0 ]; then
|