Home
last modified time | relevance | path

Searched refs:ASAN (Results 1 – 25 of 1466) sorted by relevance

12345678910>>...59

/dports/lang/racket/racket-8.3/src/ac/
H A Dasan.m42 ASAN="-fsanitize=address -fsanitize-recover=address -fno-omit-frame-pointer -fno-common"
3 CFLAGS="$CFLAGS $ASAN"
5 CPPFLAGS="$CPPFLAGS $ASAN"
6 PREFLAGS="$PREFLAGS $ASAN"
8 LDFLAGS="$LDFLAGS $ASAN"
/dports/lang/racket-minimal/racket-8.3/src/ac/
H A Dasan.m42 ASAN="-fsanitize=address -fsanitize-recover=address -fno-omit-frame-pointer -fno-common"
3 CFLAGS="$CFLAGS $ASAN"
5 CPPFLAGS="$CPPFLAGS $ASAN"
6 PREFLAGS="$PREFLAGS $ASAN"
8 LDFLAGS="$LDFLAGS $ASAN"
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/skia/site/dev/testing/
H A Dfuzz.md5 when building with ASAN or MSAN; see [those instructions for more details](./xsan).
21 out/ASAN/fuzz -b /path/to/downloaded/testcase
26 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase
27 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase
31 out/ASAN/fuzz --help # will list all types
32 out/ASAN/fuzz -t api # will list all names
/dports/devel/llvm-devel/llvm-project-f05c95f10fc1d8171071735af8ad3a9e87633120/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/tinygo/tinygo-0.14.1/llvm-project/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/llvm/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/wasi-libcxx/llvm-project-13.0.1.src/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm90/llvm-9.0.1.src/tools/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm-cheri/llvm-project-37c49ff00e3eadce5d8703fdc4497f28458c64a8/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm12/llvm-project-12.0.1.src/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm10/llvm-10.0.1.src/tools/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm11/llvm-11.0.1.src/tools/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/wasi-compiler-rt13/llvm-project-13.0.1.src/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/lang/rust/rustc-1.58.1-src/src/llvm-project/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/wasi-compiler-rt12/llvm-project-12.0.1.src/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm13/llvm-project-13.0.1.src/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm80/llvm-8.0.1.src/tools/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/devel/llvm70/llvm-7.0.1.src/tools/clang/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/lang/clang-mesa/clang-13.0.1.src/test/CodeGenObjCXX/
H A Daddress-safety-attr.mm2 // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
11 // ASAN: +[MyClass load]{{.*}}#0
15 // ASAN: +[MyClass addressSafety:]{{.*}}#0
20 // ASAN: attributes #0 = {{.*}}sanitize_address
/dports/audio/flac/flac-1.3.4/oss-fuzz/fuzzing/
H A Dmemory.hpp6 #ifndef ASAN
7 #define ASAN 0 macro
18 #if ASAN == 1
31 #if ASAN == 1 in memory_test_asan()
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/skia/site/dev/testing/
H A Dfuzz.md8 when building with ASAN or MSAN; see [those instructions for more details](./xsan).
25 out/ASAN/fuzz -b /path/to/downloaded/testcase
30 out/ASAN/fuzz -t filter_fuzz -b /path/to/downloaded/testcase
31 out/ASAN/fuzz -t api -n RasterN32Canvas -b /path/to/downloaded/testcase
35 out/ASAN/fuzz --help # will list all types
36 out/ASAN/fuzz -t api # will list all names
40 out/ASAN/fuzz -b /path/to/downloaded/testcase --loops <times-to-run>
/dports/dns/flamethrower/flamethrower-0.11.0/cmake/
H A Dsanitizer.cmake3 option(ASAN "Build with ASAN." OFF) option
6 if (ASAN)
/dports/net/wireshark/wireshark-3.6.1/tools/
H A Dtest-captures.sh23 ASAN=$CONFIGURED_WITH_ASAN
27 a) ASAN=1 ;;
54 if [ $ASAN -eq 0 ]; then
/dports/net/wireshark-lite/wireshark-3.6.1/tools/
H A Dtest-captures.sh23 ASAN=$CONFIGURED_WITH_ASAN
27 a) ASAN=1 ;;
54 if [ $ASAN -eq 0 ]; then
/dports/net/tshark-lite/wireshark-3.6.1/tools/
H A Dtest-captures.sh23 ASAN=$CONFIGURED_WITH_ASAN
27 a) ASAN=1 ;;
54 if [ $ASAN -eq 0 ]; then

12345678910>>...59