Searched full:asan_options (Results 1 – 25 of 130) sorted by relevance
123456
5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta…7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS="" %run %t 2>&1
1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash6 // Intentionally don't inherit the default ASAN_OPTIONS.7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux9 // lit doesn't set ASAN_OPTIONS anyway.
1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash6 // Intentionally don't inherit the default ASAN_OPTIONS.7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
20 # - asan_options - AddressSanitizer options (e.g. allow_user_segv_handler=1).79 defined(invoker.asan_options) || defined(invoker.msan_options) ||113 if (defined(invoker.asan_options)) {114 args += [ "--asan_options" ]115 args += invoker.asan_options
40 parser.add_argument('--asan_options', nargs='+', default=[])52 args.asan_options or args.msan_options or args.ubsan_options):65 [option.split('=') for option in args.asan_options])
5 "ASAN_OPTIONS": "detect_leaks=1:color=always", string12 "ASAN_OPTIONS": "detect_leaks=0:color=always" string18 "ASAN_OPTIONS": "detect_leaks=1:color=always", string
28 export ASAN_OPTIONS=$ASAN_OPTIONS;41 export ASAN_OPTIONS
31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``,54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out300 % ASAN_OPTIONS=coverage=1 ./a.out356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``:360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a[all …]
109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``):113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log134 ``ASAN_OPTIONS=check_initialization_order=1``.160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point166 ASAN_OPTIONS=suppressions=MyASan.supp
27 echo " --extra-options: Extra ASAN_OPTIONS."312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0327 ASAN_OPTIONS=$ASAN_OPTIONS \\337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1"341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
6 // TODO(crbug.com/40276216): Remove the use of ASAN_OPTIONS once media does9 "ASAN_OPTIONS=detect_odr_violation=0",
45 parser.add_argument('--asan_options', nargs='+', default=[])57 or args.asan_options or args.msan_options or args.ubsan_options78 [option.split('=') for option in args.asan_options])
3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_…4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
38 ASAN_OPTIONS="leak_check_at_exit=false"; export ASAN_OPTIONS
6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
23 log -t cr_wrap.sh -- "ASAN_OPTIONS=$_ASAN_OPTIONS"28 export ASAN_OPTIONS=$_ASAN_OPTIONS
22 ASAN_OPTIONS: ""55 ASAN_OPTIONS: ""87 ASAN_OPTIONS: ""
40 log -t cr_wrap.sh -- "ASAN_OPTIONS=$_ASAN_OPTIONS"45 export ASAN_OPTIONS=$_ASAN_OPTIONS
83 asan_options = symbolization_options[:]85 asan_options.append('detect_leaks=1')89 asan_options.append('intercept_tls_get_addr=0')91 if asan_options:92 extra_env['ASAN_OPTIONS'] = ' '.join(asan_options)
31 ASAN_OPTIONS: detect_leaks=1:color=always43 ASAN_OPTIONS: detect_leaks=0:color=always55 ASAN_OPTIONS: detect_leaks=1:color=always