Home
last modified time | relevance | path

Searched full:asan_options (Results 1 – 25 of 62) sorted by relevance

123

/external/compiler-rt/test/lsan/TestCases/
Duse_after_return.cc5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS="" %run %t 2>&1
/external/compiler-rt/test/asan/TestCases/Linux/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux
9 // lit doesn't set ASAN_OPTIONS anyway.
Dmalloc_delete_mismatch.cc33 // CHECK: HINT: {{.*}} you may set ASAN_OPTIONS=alloc_dealloc_mismatch=0
/external/compiler-rt/test/asan/TestCases/Darwin/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
/external/google-fruit/extras/scripts/
Dpostsubmit.sh28 export ASAN_OPTIONS=$ASAN_OPTIONS;
38 export ASAN_OPTIONS
/external/grpc-grpc/tools/run_tests/generated/
Dconfigs.json8 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
18 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
41 "ASAN_OPTIONS": "detect_leaks=0:color=always" string
/external/clang/docs/
DSanitizerCoverage.rst31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``,
54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov
57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov
204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out
206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1
260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out
300 % ASAN_OPTIONS=coverage=1 ./a.out
356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``:
360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo
376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a
[all …]
DAddressSanitizer.rst109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):
113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log
134 ``ASAN_OPTIONS=check_initialization_order=1``.
160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point
166 ASAN_OPTIONS=suppressions=MyASan.supp
/external/compiler-rt/lib/asan/scripts/
Dasan_device_setup27 echo " --extra-options: Extra ASAN_OPTIONS."
312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0
327 ASAN_OPTIONS=$ASAN_OPTIONS \\
337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"
341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
/external/llvm/test/tools/sancov/Inputs/
Dtest.cpp3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…
4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
/external/swiftshader/third_party/llvm-7.0/llvm/test/tools/sancov/Inputs/
Dtest.cpp3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…
4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
/external/llvm/lib/Fuzzer/test/
Dafl-driver-extra-stats.test6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest
10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
Dfuzzer-segv.test1 RUN: ASAN_OPTIONS=handle_segv=0 not LLVMFuzzer-NullDerefTest 2>&1 | FileCheck %s --check-prefix=LIB…
Dafl-driver-stderr.test6 RUN: ASAN_OPTIONS= AFL_DRIVER_STDERR_DUPLICATE_FILENAME="%T" not --crash AFLDriverTest
/external/compiler-rt/test/asan/
Dlit.cfg32 # Platform-specific default ASAN_OPTIONS for lit tests.
41 config.environment['ASAN_OPTIONS'] = default_asan_opts
44 'env ASAN_OPTIONS=' + default_asan_opts))
/external/libvpx/libvpx/tools/
Dset_analyzer_env.sh26 unset ASAN_OPTIONS MSAN_OPTIONS TSAN_OPTIONS UBSAN_OPTIONS
108 export ASAN_OPTIONS="${sanitizer_options}"
/external/honggfuzz/
Dsanitizers.c43 * ASAN_OPTIONS flags, leaving garbage logs. An attempt is made to parse such
136 sanitizers_AddFlag(hfuzz, "ASAN_OPTIONS", asanOpts, sizeof(asanOpts)); in sanitizers_Init()
/external/brotli/
D.travis.yml47 … env: BUILD_SYSTEM=fuzz C_COMPILER=clang-5.0 CXX_COMPILER=clang++-5.0 ASAN_OPTIONS=detect_leaks=0
148 …M=cmake C_COMPILER=clang-5.0 CXX_COMPILER=clang++-5.0 SANITIZER=address ASAN_OPTIONS=detect_leaks=0
/external/v8/tools/testrunner/
Dbase_runner.py510 asan_options = [
517 asan_options.append('detect_leaks=1')
519 asan_options.append('detect_leaks=0')
520 os.environ['ASAN_OPTIONS'] = ":".join(asan_options)
/external/swiftshader/third_party/llvm-7.0/llvm/test/tools/lto/
Dlit.local.cfg6 config.environment['ASAN_OPTIONS'] = 'detect_leaks=0'
/external/compiler-rt/test/asan/TestCases/
Dstrtol_strict.c53 char *opts = getenv("ASAN_OPTIONS"); in test3()
71 char *opts = getenv("ASAN_OPTIONS"); in test4()
/external/grpc-grpc/tools/fuzzer/
Dbuild_and_run_fuzzer.sh22 export ASAN_OPTIONS=handle_abort=1
/external/compiler-rt/test/asan/android_commands/
Dandroid_run.py17 if key in ['ASAN_OPTIONS', 'ASAN_ACTIVATION_OPTIONS']:
/external/compiler-rt/test/sanitizer_common/
Dlit.common.cfg11 tool_options = "ASAN_OPTIONS"
/external/libprotobuf-mutator/
D.travis.yml58 - export ASAN_OPTIONS=detect_leaks=0

123