You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following table lists the options for the AddressSanitizer. Enable them via the `ASAN_OPTIONS` environment variable or by overriding the `__asan_default_options()` user function described [here](./asan-runtime.md#runtime-options).
11
11
12
12
> [!NOTE]
13
-
> These descriptions account for MSVC specific behaviors which may vary from Clang's runtime options.
13
+
> These descriptions account for Microsoft Visual C++ (MSVC) specific behaviors, which may vary from Clang's runtime options.
14
14
15
15
16
16
| Flag | Default value | Description |
@@ -21,7 +21,7 @@ The following table lists the options for the AddressSanitizer. Enable them via
21
21
|`allocator_may_return_null`|`false`| If `true`, the allocator returns `nullptr` when out of memory. Instead of crashing, ASan emits a warning about the allocator's failure and execution continues.|
22
22
|`allow_user_poisoning`|`true`| If `true`, you may manually mark memory regions as poisoned or unpoisoned using the [Manual AddressSanitizer poising interface](./asan-runtime.md#poisoning).|
23
23
|`check_initialization_order`|`false`| If `true`, attempts to catch initialization order issues.|
24
-
|`continue_on_error`| 0 | Allows an application to continue running while reporting memory safety errors.0-disabled, 1-enabled and error output is sent to `stdout`, 2-enabled and error output is sent to `stderr`.For more information, see [continue_on_error](asan-continue-on-error.md).|
24
+
|`continue_on_error`| 0 | Allows an application to continue running while reporting memory safety errors.<br>0-disabled.<br>1-enabled; errors are sent to `stdout`.<br>2-enabled; errors are sent to `stderr`.<br>For more information, see [continue_on_error](asan-continue-on-error.md).|
25
25
|`detect_container_overflow`|`true`| If `true`, honor the container overflow annotations. For more information, see [ContainerOverflow](./error-container-overflow.md).|
26
26
|`detect_invalid_pointer_pairs`|`false`| If `true`, ASan detects operations like `<`, `<=`, `>`, `>=`, and `-` on invalid pointer pairs such as pointers that belong to different objects.|
27
27
|`detect_stack_use_after_return`|`false`| Experimental. If `true`, ASan enables `stack-use-after-return` checking at runtime. Requires `/fsanitize-address-use-after-return`. For more information, see [stack-use-after-return](./error-stack-use-after-return.md).|
0 commit comments