Home
last modified time | relevance | path

Searched full:asan_options (Results 1 – 25 of 130) sorted by relevance

123456

/external/compiler-rt/test/lsan/TestCases/
Duse_after_return.cc5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…
7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS="" %run %t 2>&1
/external/compiler-rt/test/asan/TestCases/Linux/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux
9 // lit doesn't set ASAN_OPTIONS anyway.
/external/compiler-rt/test/asan/TestCases/Darwin/
Dabort_on_error.cc1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash
6 // Intentionally don't inherit the default ASAN_OPTIONS.
7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s
8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
/external/openscreen/testing/libfuzzer/
Dfuzzer_test.gni20 # - asan_options - AddressSanitizer options (e.g. allow_user_segv_handler=1).
79 defined(invoker.asan_options) || defined(invoker.msan_options) ||
113 if (defined(invoker.asan_options)) {
114 args += [ "--asan_options" ]
115 args += invoker.asan_options
Dgen_fuzzer_config.py40 parser.add_argument('--asan_options', nargs='+', default=[])
52 args.asan_options or args.msan_options or args.ubsan_options):
65 [option.split('=') for option in args.asan_options])
/external/grpc-grpc/tools/run_tests/generated/
Dconfigs.json5 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
12 "ASAN_OPTIONS": "detect_leaks=0:color=always" string
18 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
/external/google-fruit/extras/scripts/
Dpostsubmit.sh28 export ASAN_OPTIONS=$ASAN_OPTIONS;
41 export ASAN_OPTIONS
/external/clang/docs/
DSanitizerCoverage.rst31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``,
54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov
57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov
204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out
206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1
260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out
300 % ASAN_OPTIONS=coverage=1 ./a.out
356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``:
360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo
376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a
[all …]
DAddressSanitizer.rst109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):
113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log
134 ``ASAN_OPTIONS=check_initialization_order=1``.
160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point
166 ASAN_OPTIONS=suppressions=MyASan.supp
/external/compiler-rt/lib/asan/scripts/
Dasan_device_setup27 echo " --extra-options: Extra ASAN_OPTIONS."
312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0
327 ASAN_OPTIONS=$ASAN_OPTIONS \\
337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"
341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
/external/cronet/tot/build/config/fuchsia/test/
Dasan_options.shard.test-cml6 // TODO(crbug.com/40276216): Remove the use of ASAN_OPTIONS once media does
9 "ASAN_OPTIONS=detect_odr_violation=0",
/external/cronet/stable/build/config/fuchsia/test/
Dasan_options.shard.test-cml6 // TODO(crbug.com/40276216): Remove the use of ASAN_OPTIONS once media does
9 "ASAN_OPTIONS=detect_odr_violation=0",
/external/angle/build/config/fuchsia/test/
Dasan_options.shard.test-cml6 // TODO(crbug.com/40276216): Remove the use of ASAN_OPTIONS once media does
9 "ASAN_OPTIONS=detect_odr_violation=0",
/external/cronet/stable/testing/libfuzzer/
Dgen_fuzzer_config.py45 parser.add_argument('--asan_options', nargs='+', default=[])
57 or args.asan_options or args.msan_options or args.ubsan_options
78 [option.split('=') for option in args.asan_options])
/external/cronet/tot/testing/libfuzzer/
Dgen_fuzzer_config.py45 parser.add_argument('--asan_options', nargs='+', default=[])
57 or args.asan_options or args.msan_options or args.ubsan_options
78 [option.split('=') for option in args.asan_options])
/external/llvm/test/tools/sancov/Inputs/
Dtest.cpp3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…
4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
/external/libcups/scripts/
Dmakecups38 ASAN_OPTIONS="leak_check_at_exit=false"; export ASAN_OPTIONS
/external/llvm/lib/Fuzzer/test/
Dafl-driver-extra-stats.test6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest
10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
/external/cronet/stable/build/android/
Dgenerate_wrap_sh.py23 log -t cr_wrap.sh -- "ASAN_OPTIONS=$_ASAN_OPTIONS"
28 export ASAN_OPTIONS=$_ASAN_OPTIONS
/external/cronet/tot/build/android/
Dgenerate_wrap_sh.py23 log -t cr_wrap.sh -- "ASAN_OPTIONS=$_ASAN_OPTIONS"
28 export ASAN_OPTIONS=$_ASAN_OPTIONS
/external/google-fruit/.github/workflows/
Dtest-on-linux.yml22 ASAN_OPTIONS: ""
55 ASAN_OPTIONS: ""
87 ASAN_OPTIONS: ""
/external/angle/build/android/
Dgenerate_wrap_sh.py40 log -t cr_wrap.sh -- "ASAN_OPTIONS=$_ASAN_OPTIONS"
45 export ASAN_OPTIONS=$_ASAN_OPTIONS
/external/cronet/tot/testing/
Dtest_env.py83 asan_options = symbolization_options[:]
85 asan_options.append('detect_leaks=1')
89 asan_options.append('intercept_tls_get_addr=0')
91 if asan_options:
92 extra_env['ASAN_OPTIONS'] = ' '.join(asan_options)
/external/cronet/stable/testing/
Dtest_env.py83 asan_options = symbolization_options[:]
85 asan_options.append('detect_leaks=1')
89 asan_options.append('intercept_tls_get_addr=0')
91 if asan_options:
92 extra_env['ASAN_OPTIONS'] = ' '.join(asan_options)
/external/rust/android-crates-io/crates/grpcio-sys/grpc/
Dbuild_handwritten.yaml31 ASAN_OPTIONS: detect_leaks=1:color=always
43 ASAN_OPTIONS: detect_leaks=0:color=always
55 ASAN_OPTIONS: detect_leaks=1:color=always

123456