Searched full:asan_options (Results 1 – 25 of 62) sorted by relevance
123
/external/compiler-rt/test/lsan/TestCases/ |
D | use_after_return.cc | 5 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta… 6 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS=$LSAN_BASE:"use_sta… 7 // RUN: ASAN_OPTIONS=$ASAN_OPTIONS:detect_stack_use_after_return=1 LSAN_OPTIONS="" %run %t 2>&1
|
/external/compiler-rt/test/asan/TestCases/Linux/ |
D | abort_on_error.cc | 1 // Check that with empty ASAN_OPTIONS, ASan reports on Linux don't crash 6 // Intentionally don't inherit the default ASAN_OPTIONS. 7 // RUN: env ASAN_OPTIONS="" not %run %t 2>&1 | FileCheck %s 8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash either. On Linux 9 // lit doesn't set ASAN_OPTIONS anyway.
|
D | malloc_delete_mismatch.cc | 33 // CHECK: HINT: {{.*}} you may set ASAN_OPTIONS=alloc_dealloc_mismatch=0
|
/external/compiler-rt/test/asan/TestCases/Darwin/ |
D | abort_on_error.cc | 1 // Check that with empty ASAN_OPTIONS, ASan reports on OS X actually crash 6 // Intentionally don't inherit the default ASAN_OPTIONS. 7 // RUN: env ASAN_OPTIONS="" not --crash %run %t 2>&1 | FileCheck %s 8 // When we use lit's default ASAN_OPTIONS, we shouldn't crash.
|
/external/google-fruit/extras/scripts/ |
D | postsubmit.sh | 28 export ASAN_OPTIONS=$ASAN_OPTIONS; 38 export ASAN_OPTIONS
|
/external/clang/docs/ |
D | SanitizerCoverage.rst | 31 At run time, pass ``coverage=1`` in ``ASAN_OPTIONS``, 54 % ASAN_OPTIONS=coverage=1 ./a.out; ls -l *sancov 57 % ASAN_OPTIONS=coverage=1 ./a.out foo ; ls -l *sancov 204 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 206 % ASAN_OPTIONS="coverage=1:coverage_bitset=1" ./a.out 1 260 % ASAN_OPTIONS="coverage=1:coverage_counters=1" ./a.out 300 % ASAN_OPTIONS=coverage=1 ./a.out 356 This can be changed with ``ASAN_OPTIONS=coverage_dir=/path``: 360 % ASAN_OPTIONS="coverage=1:coverage_dir=/tmp/cov" ./a.out foo 376 With ``ASAN_OPTIONS=coverage=1:coverage_direct=1`` coverage data is written to a [all …]
|
D | AddressSanitizer.rst | 109 force disabled by setting ``ASAN_OPTIONS=symbolize=0``): 113 % ASAN_OPTIONS=symbolize=0 ./a.out 2> log 134 ``ASAN_OPTIONS=check_initialization_order=1``. 160 in external libraries, set the ``ASAN_OPTIONS`` environment variable to point 166 ASAN_OPTIONS=suppressions=MyASan.supp
|
/external/grpc-grpc/tools/run_tests/generated/ |
D | configs.json | 8 "ASAN_OPTIONS": "detect_leaks=1:color=always", string 18 "ASAN_OPTIONS": "detect_leaks=1:color=always", string 41 "ASAN_OPTIONS": "detect_leaks=0:color=always" string
|
/external/compiler-rt/lib/asan/scripts/ |
D | asan_device_setup | 27 echo " --extra-options: Extra ASAN_OPTIONS." 312 ASAN_OPTIONS=start_deactivated=1,malloc_context_size=0 327 ASAN_OPTIONS=$ASAN_OPTIONS \\ 337 ASAN_OPTIONS="$ASAN_OPTIONS,allow_user_segv_handler=1" 341 ASAN_OPTIONS="$ASAN_OPTIONS,$extra_options"
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/tools/sancov/Inputs/ |
D | test.cpp | 3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_… 4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
|
/external/llvm/test/tools/sancov/Inputs/ |
D | test.cpp | 3 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 && mv test-linux_x86_64.??*.sancov test-linux_x86_… 4 // ASAN_OPTIONS="coverage=1" ./test-linux_x86_64 1 && mv test-linux_x86_64.??*.sancov test-linux_x8…
|
/external/llvm/lib/Fuzzer/test/ |
D | afl-driver-extra-stats.test | 6 RUN: ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%T not --crash AFLDriverTest 10 ASAN_OPTIONS= AFL_DRIVER_EXTRA_STATS_FILENAME=%t not --crash AFLDriverTest
|
D | fuzzer-segv.test | 1 RUN: ASAN_OPTIONS=handle_segv=0 not LLVMFuzzer-NullDerefTest 2>&1 | FileCheck %s --check-prefix=LIB…
|
D | afl-driver-stderr.test | 6 RUN: ASAN_OPTIONS= AFL_DRIVER_STDERR_DUPLICATE_FILENAME="%T" not --crash AFLDriverTest
|
/external/compiler-rt/test/asan/ |
D | lit.cfg | 32 # Platform-specific default ASAN_OPTIONS for lit tests. 41 config.environment['ASAN_OPTIONS'] = default_asan_opts 44 'env ASAN_OPTIONS=' + default_asan_opts))
|
/external/libvpx/libvpx/tools/ |
D | set_analyzer_env.sh | 26 unset ASAN_OPTIONS MSAN_OPTIONS TSAN_OPTIONS UBSAN_OPTIONS 108 export ASAN_OPTIONS="${sanitizer_options}"
|
/external/v8/tools/testrunner/ |
D | base_runner.py | 510 asan_options = [ 517 asan_options.append('detect_leaks=1') 519 asan_options.append('detect_leaks=0') 520 os.environ['ASAN_OPTIONS'] = ":".join(asan_options)
|
/external/brotli/ |
D | .travis.yml | 47 … env: BUILD_SYSTEM=fuzz C_COMPILER=clang-5.0 CXX_COMPILER=clang++-5.0 ASAN_OPTIONS=detect_leaks=0 148 …M=cmake C_COMPILER=clang-5.0 CXX_COMPILER=clang++-5.0 SANITIZER=address ASAN_OPTIONS=detect_leaks=0
|
/external/honggfuzz/ |
D | sanitizers.c | 43 * ASAN_OPTIONS flags, leaving garbage logs. An attempt is made to parse such 136 sanitizers_AddFlag(hfuzz, "ASAN_OPTIONS", asanOpts, sizeof(asanOpts)); in sanitizers_Init()
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/tools/lto/ |
D | lit.local.cfg | 6 config.environment['ASAN_OPTIONS'] = 'detect_leaks=0'
|
/external/compiler-rt/test/asan/TestCases/ |
D | strtol_strict.c | 53 char *opts = getenv("ASAN_OPTIONS"); in test3() 71 char *opts = getenv("ASAN_OPTIONS"); in test4()
|
/external/grpc-grpc/tools/fuzzer/ |
D | build_and_run_fuzzer.sh | 22 export ASAN_OPTIONS=handle_abort=1
|
/external/compiler-rt/test/asan/android_commands/ |
D | android_run.py | 17 if key in ['ASAN_OPTIONS', 'ASAN_ACTIVATION_OPTIONS']:
|
/external/compiler-rt/test/sanitizer_common/ |
D | lit.common.cfg | 11 tool_options = "ASAN_OPTIONS"
|
/external/libprotobuf-mutator/ |
D | .travis.yml | 58 - export ASAN_OPTIONS=detect_leaks=0
|
123