Searched full:asan_options (Results 1 – 25 of 163) sorted by relevance
1234567
5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS="" %run %t 2>&1
5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 %env_lsan_opts=$LSAN_BASE:"use_s…6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 %env_lsan_opts=$LSAN_BASE:"use_s…7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 %env_lsan_opts="" %run %t 2>&1
1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash6 // Intentionally don't inherit the default ASAN_OPTIONS.7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux9 // lit doesn't set ASAN_OPTIONS anyway.
1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash6 // Intentionally don't inherit the default ASAN_OPTIONS.7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
26 ASAN_OPTIONS=detect_leaks=0 \33 ASAN_OPTIONS=detect_leaks=0 \45 ASAN_OPTIONS=detect_leaks=0 \63 ASAN_OPTIONS=detect_leaks=0 \78 ASAN_OPTIONS=detect_leaks=0 LIBS="-lunistring" CXXFLAGS="$CXXFLAGS -L$DEPS_PATH/lib" \
20 # - asan_options - AddressSanitizer options (e.g. allow_user_segv_handler=1).79 defined(invoker.asan_options) || defined(invoker.msan_options) ||113 if (defined(invoker.asan_options)) {114 args += [ "--asan_options" ]115 args += invoker.asan_options
40 parser.add_argument('--asan_options', nargs='+', default=[])52 args.asan_options or args.msan_options or args.ubsan_options):65 [option.split('=') for option in args.asan_options])
28 export ASAN_OPTIONS=$ASAN_OPTIONS;38 export ASAN_OPTIONS
8 "ASAN_OPTIONS": "detect_leaks=1:color=always", string18 "ASAN_OPTIONS": "detect_leaks=1:color=always", string41 "ASAN_OPTIONS": "detect_leaks=0:color=always" string
31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``,54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out300 % ASAN_OPTIONS=coverage=1 ./a.out356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``:360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a[all …]
109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log134 ``ASAN_OPTIONS=check_initialization_order=1``.160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point166 ASAN_OPTIONS=suppressions=MyASan.supp
38 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \44 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \53 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \82 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
27 echo " --extra-options: Extra ASAN_OPTIONS."312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0327 ASAN_OPTIONS=$ASAN_OPTIONS \\337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
17 * Use-after-return (runtime flag `ASAN_OPTIONS=detect_stack_use_after_return=1`)110 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):114 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log135 ``ASAN_OPTIONS=check_initialization_order=1``.144 and can be enabled using ``ASAN_OPTIONS=detect_leaks=1`` on macOS;162 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point168 ASAN_OPTIONS=suppressions=MyASan.supp
26 echo " --extra-options: Extra ASAN_OPTIONS."311 ASAN_OPTIONS=start_deactivated=1330 ASAN_OPTIONS=$ASAN_OPTIONS \\342 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"346 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
82 export ASAN_OPTIONS="$ASAN_OPTIONS:$custom_asan_options"101 export ASAN_OPTIONS="$ASAN_OPTIONS:abort_on_error=1:symbolize=0:detect_odr_violation=0:"
3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
2 // RUN: env ASAN_OPTIONS=handle_segv=0 %run %t 2>&1 | FileCheck %s --check-prefix=USER3 // RUN: env ASAN_OPTIONS=handle_segv=1 not %run %t 2>&1 | FileCheck %s --check-prefix=ASAN
30 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…
31 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…