Home
last modified time | relevance | path

Searched full:asan_options (Results 1 – 25 of 145) sorted by relevance

123456

/external/compiler-rt/test/lsan/TestCases/
Duse_after_return.cc5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS="" %run %t 2>&1
/external/compiler-rt/test/asan/TestCases/Linux/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux
9 // lit doesn't set ASAN_OPTIONS anyway.
/external/cronet/testing/libfuzzer/fuzzers/
DBUILD.gn118 asan_options = [
148 asan_options = [
170 asan_options = [
186 asan_options = [
204 asan_options = [
220 asan_options = [
236 asan_options = [
252 asan_options = [
270 asan_options = [
288 asan_options = [
[all …]
/external/compiler-rt/test/asan/TestCases/Darwin/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
/external/oss-fuzz/projects/gnutls/
Dbuild.sh26 ASAN_OPTIONS=detect_leaks=0 \
33 ASAN_OPTIONS=detect_leaks=0 \
45 ASAN_OPTIONS=detect_leaks=0 \
63 ASAN_OPTIONS=detect_leaks=0 \
78 ASAN_OPTIONS=detect_leaks=0 LIBS="-lunistring" CXXFLAGS="$CXXFLAGS -L$DEPS_PATH/lib" \
/external/openscreen/testing/libfuzzer/
Dfuzzer_test.gni20 # - asan_options - AddressSanitizer options (e.g. allow_user_segv_handler=1).
79 defined(invoker.asan_options) || defined(invoker.msan_options) ||
113 if (defined(invoker.asan_options)) {
114 args += [ "--asan_options" ]
115 args += invoker.asan_options
Dgen_fuzzer_config.py40 parser.add_argument('--asan_options', nargs='+', default=[])
52 args.asan_options or args.msan_options or args.ubsan_options):
65 [option.split('=') for option in args.asan_options])
/external/google-fruit/extras/scripts/
Dpostsubmit.sh28 export ASAN_OPTIONS=$ASAN_OPTIONS;
38 export ASAN_OPTIONS
/external/clang/docs/
DSanitizerCoverage.rst31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``,
54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov
57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov
204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out
206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1
260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out
300 % ASAN_OPTIONS=coverage=1 ./a.out
356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``:
360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo
376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a
[all …]
DAddressSanitizer.rst109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):
113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log
134 ``ASAN_OPTIONS=check_initialization_order=1``.
160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point
166 ASAN_OPTIONS=suppressions=MyASan.supp
/external/grpc-grpc/tools/run_tests/generated/
Dconfigs.json8 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
18 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
41 "ASAN_OPTIONS": "detect_leaks=0:color=always" string
/external/oss-fuzz/projects/libpsl/
Dbuild.sh45 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
52 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
59 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
88 ASAN_OPTIONS=detect_leaks=0 UBSAN_OPTIONS=detect_leaks=0 \
/external/compiler-rt/lib/asan/scripts/
Dasan_device_setup27 echo " --extra-options: Extra ASAN_OPTIONS."
312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0
327 ASAN_OPTIONS=$ASAN_OPTIONS \\
337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"
341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
/external/cronet/testing/libfuzzer/
Dgen_fuzzer_config.py44 parser.add_argument('--asan_options', nargs='+', default=[])
57 args.asan_options or args.msan_options or args.ubsan_options or
71 [option.split('=') for option in args.asan_options])
Dfuzzer_test.gni23 # - asan_options - AddressSanitizer options (e.g. allow_user_segv_handler=1).
104 defined(invoker.asan_options) || defined(invoker.msan_options) ||
139 if (defined(invoker.asan_options)) {
140 args += [ "--asan_options" ]
141 args += invoker.asan_options
/external/oss-fuzz/infra/base-images/base-runner/
Drun_fuzzer88 export ASAN_OPTIONS="$ASAN_OPTIONS:$custom_asan_options"
107 export ASAN_OPTIONS="$ASAN_OPTIONS:abort_on_error=1:symbolize=0:detect_odr_violation=0:"
/external/angle/build/config/fuchsia/test/
Dasan_options.shard.test-cml6 // TODO(crbug.com/1465997): Remove the use of ASAN_OPTIONS once media does
9 "ASAN_OPTIONS=detect_odr_violation=0",
/external/llvm/test/tools/sancov/Inputs/
Dtest.cpp3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…
4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
/external/libcups/scripts/
Dmakecups38 ASAN_OPTIONS="leak_check_at_exit=false"; export ASAN_OPTIONS
/external/cronet/testing/
Dtest_env.py77 asan_options = symbolization_options[:]
79 asan_options.append('detect_leaks=1')
83 asan_options.append('intercept_tls_get_addr=0')
85 if asan_options:
86 extra_env['ASAN_OPTIONS'] = ' '.join(asan_options)
/external/llvm/lib/Fuzzer/test/
Dafl-driver-extra-stats.test6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest
10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
/external/oss-fuzz/projects/imageio/
Dbuild.sh30 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…
/external/oss-fuzz/projects/sqlalchemy/
Dbuild.sh28 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…
/external/oss-fuzz/projects/pyyaml/
Dbuild.sh31 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…
/external/oss-fuzz/projects/pygments/
Dbuild.sh31 ASAN_OPTIONS=\$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=\$this_dir/llvm-symbolizer:detect_…

123456