Home
last modified time | relevance | path

Searched full:asan_options (Results 1 – 25 of 163) sorted by relevance

1234567

/external/compiler-rt/test/lsan/TestCases/
Duse_after_return.cc5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS="" %run %t 2>&1
/external/llvm-project/compiler-rt/test/lsan/TestCases/
Duse_after_return.cpp5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 %env_lsan_opts=$LSAN_BASE:"use_s…
6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 %env_lsan_opts=$LSAN_BASE:"use_s…
7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 %env_lsan_opts="" %run %t 2>&1
/external/compiler-rt/test/asan/TestCases/Linux/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux
9 // lit doesn't set ASAN_OPTIONS anyway.
/external/llvm-project/compiler-rt/test/asan/TestCases/Linux/
Dabort_on_error.cpp1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux
9 // lit doesn't set ASAN_OPTIONS anyway.
/external/compiler-rt/test/asan/TestCases/Darwin/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
/external/llvm-project/compiler-rt/test/asan/TestCases/Darwin/
Dabort_on_error.cpp1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
/external/oss-fuzz/projects/gnutls/
Dbuild.sh26 ASAN_OPTIONS=detect_leaks=0 \
33 ASAN_OPTIONS=detect_leaks=0 \
45 ASAN_OPTIONS=detect_leaks=0 \
63 ASAN_OPTIONS=detect_leaks=0 \
78 ASAN_OPTIONS=detect_leaks=0 LIBS="-lunistring" CXXFLAGS="$CXXFLAGS -L$DEPS_PATH/lib" \
/external/openscreen/testing/libfuzzer/
Dfuzzer_test.gni20 # - asan_options - AddressSanitizer options (e.g. allow_user_segv_handler=1).
79 defined(invoker.asan_options) || defined(invoker.msan_options) ||
113 if (defined(invoker.asan_options)) {
114 args += [ "--asan_options" ]
115 args += invoker.asan_options
Dgen_fuzzer_config.py40 parser.add_argument('--asan_options', nargs='+', default=[])
52 args.asan_options or args.msan_options or args.ubsan_options):
65 [option.split('=') for option in args.asan_options])
/external/google-fruit/extras/scripts/
Dpostsubmit.sh28 export ASAN_OPTIONS=$ASAN_OPTIONS;
38 export ASAN_OPTIONS
/external/grpc-grpc/tools/run_tests/generated/
Dconfigs.json8 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
18 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
41 "ASAN_OPTIONS": "detect_leaks=0:color=always" string
/external/clang/docs/
DSanitizerCoverage.rst31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``,
54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov
57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov
204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out
206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1
260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out
300 % ASAN_OPTIONS=coverage=1 ./a.out
356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``:
360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo
376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a
[all …]
DAddressSanitizer.rst109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):
113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log
134 ``ASAN_OPTIONS=check_initialization_order=1``.
160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point
166 ASAN_OPTIONS=suppressions=MyASan.supp
/external/oss-fuzz/projects/libpsl/
Dbuild.sh38 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
44 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
53 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
82 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
/external/compiler-rt/lib/asan/scripts/
Dasan_device_setup27 echo " --extra-options: Extra ASAN_OPTIONS."
312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0
327 ASAN_OPTIONS=$ASAN_OPTIONS \\
337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"
341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
/external/llvm-project/clang/docs/
DAddressSanitizer.rst17 * Use-after-return (runtime flag `ASAN_OPTIONS=detect_stack_use_after_return=1`)
110 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):
114 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log
135 ``ASAN_OPTIONS=check_initialization_order=1``.
144 and can be enabled using ``ASAN_OPTIONS=detect_leaks=1`` on macOS;
162 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point
168 ASAN_OPTIONS=suppressions=MyASan.supp
/external/llvm-project/compiler-rt/lib/asan/scripts/
Dasan_device_setup26 echo " --extra-options: Extra ASAN_OPTIONS."
311 ASAN_OPTIONS=start_deactivated=1
330 ASAN_OPTIONS=$ASAN_OPTIONS \\
342 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"
346 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
/external/oss-fuzz/infra/base-images/base-runner/
Drun_fuzzer82 export ASAN_OPTIONS="$ASAN_OPTIONS:$custom_asan_options"
101 export ASAN_OPTIONS="$ASAN_OPTIONS:abort_on_error=1:symbolize=0:detect_odr_violation=0:"
/external/llvm/test/tools/sancov/Inputs/
Dtest.cpp3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…
4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
/external/llvm-project/llvm/test/tools/sancov/Inputs/
Dtest.cpp3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…
4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
/external/llvm/lib/Fuzzer/test/
Dafl-driver-extra-stats.test6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest
10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
/external/llvm-project/compiler-rt/test/asan/TestCases/Windows/
Duser-exception.cpp2 // RUN: env ASAN_OPTIONS=handle_segv=0 %run %t 2>&1 | FileCheck %s --check-prefix=USER
3 // RUN: env ASAN_OPTIONS=handle_segv=1 not %run %t 2>&1 | FileCheck %s --check-prefix=ASAN
/external/oss-fuzz/projects/imageio/
Dbuild.sh30 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…
/external/oss-fuzz/projects/bs4/
Dbuild.sh30 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…
/external/oss-fuzz/projects/pyyaml/
Dbuild.sh31 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…

1234567