Home
last modified time | relevance | path

Searched refs:ASAN_OPTIONS (Results 1 – 17 of 17) sorted by relevance

/external/compiler-rt/lib/asan/scripts/
Dasan_device_setup312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0
327 ASAN_OPTIONS=$ASAN_OPTIONS \\
337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"
341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
/external/google-fruit/extras/scripts/
Dpostsubmit.sh28 export ASAN_OPTIONS=$ASAN_OPTIONS;
38 export ASAN_OPTIONS
/external/libvpx/libvpx/tools/
Dset_analyzer_env.sh26 unset ASAN_OPTIONS MSAN_OPTIONS TSAN_OPTIONS UBSAN_OPTIONS
108 export ASAN_OPTIONS="${sanitizer_options}"
/external/clang/docs/
DSanitizerCoverage.rst31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``,
54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov
57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov
204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out
206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1
260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out
300 % ASAN_OPTIONS=coverage=1 ./a.out
356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``:
360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo
376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a
[all …]
DAddressSanitizer.rst109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):
113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log
134 ``ASAN_OPTIONS=check_initialization_order=1``.
160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point
166 ASAN_OPTIONS=suppressions=MyASan.supp
/external/llvm/lib/Fuzzer/test/
Dafl-driver-extra-stats.test6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest
10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
Dfuzzer-segv.test1 RUN: ASAN_OPTIONS=handle_segv=0 not LLVMFuzzer-NullDerefTest 2>&1 | FileCheck %s --check-prefix=LIB…
Dafl-driver-stderr.test6 RUN: ASAN_OPTIONS= AFL_DRIVER_STDERR_DUPLICATE_FILENAME="%T" not --crash AFLDriverTest
/external/grpc-grpc/tools/fuzzer/
Dbuild_and_run_fuzzer.sh22 export ASAN_OPTIONS=handle_abort=1
/external/swiftshader/third_party/llvm-7.0/llvm/test/tools/lto/
Dlit.local.cfg6 config.environment['ASAN_OPTIONS'] = 'detect_leaks=0'
/external/compiler-rt/test/asan/
Dlit.cfg32 # Platform-specific default ASAN_OPTIONS for lit tests.
41 config.environment['ASAN_OPTIONS'] = default_asan_opts
44 'env ASAN_OPTIONS=' + default_asan_opts))
/external/compiler-rt/test/sanitizer_common/
Dlit.common.cfg11 tool_options = "ASAN_OPTIONS"
/external/swiftshader/third_party/llvm-7.0/llvm/test/tools/llvm-objdump/
Dmacho-LLVM-bundle.test2 # RUN: env ASAN_OPTIONS=detect_leaks=0 llvm-objdump -macho -archive-headers -section __LLVM,__bundl…
/external/grpc-grpc/tools/
Dbazel.rc13 build:asan --action_env=ASAN_OPTIONS=detect_leaks=1:color=always
/external/compiler-rt/test/
Dlit.common.cfg45 possibly_dangerous_env_vars = ['ASAN_OPTIONS', 'DFSAN_OPTIONS', 'LSAN_OPTIONS',
/external/libxml2/
DMakefile.am211 ASAN_OPTIONS="$$ASAN_OPTIONS:detect_leaks=0" $(CHECKER) ./testapi$(EXEEXT) && \
238 -@(ASAN_OPTIONS="$$ASAN_OPTIONS:detect_leaks=0" $(CHECKER) $(top_builddir)/testapi -q)
/external/llvm/docs/
DLibFuzzer.rst659 ASAN_OPTIONS=coverage=1:html_cov_report=1 ./fuzzer CORPUS_DIR -runs=0