| Index: build/sanitizers/sanitizer_options.cc
|
| diff --git a/build/sanitizers/sanitizer_options.cc b/build/sanitizers/sanitizer_options.cc
|
| index 80b5ce7cc9271646ba194e038ba4e6002e74bf18..a659a22caa5c9928b253c17d9253d70ba39235d0 100644
|
| --- a/build/sanitizers/sanitizer_options.cc
|
| +++ b/build/sanitizers/sanitizer_options.cc
|
| @@ -50,8 +50,6 @@ void _sanitizer_options_link_helper() { }
|
| // they reside in shared memory). This option is going to be deprecated in
|
| // upstream AddressSanitizer and must not be used anywhere except the
|
| // official builds.
|
| -// replace_intrin=0 - do not intercept memcpy(), memmove() and memset() to
|
| -// work around http://crbug.com/162461 (ASan report in OpenCL on Mac).
|
| // check_printf=1 - check the memory accesses to printf (and other formatted
|
| // output routines) arguments.
|
| // use_sigaltstack=1 - handle signals on an alternate signal stack. Useful
|
| @@ -83,7 +81,7 @@ const char *kAsanDefaultOptions =
|
|
|
| #elif defined(OS_MACOSX)
|
| const char *kAsanDefaultOptions =
|
| - "replace_intrin=0 check_printf=1 use_sigaltstack=1 "
|
| + "check_printf=1 use_sigaltstack=1 "
|
| "strip_path_prefix=Release/../../ fast_unwind_on_fatal=1 "
|
| "detect_stack_use_after_return=1 detect_odr_violation=0 ";
|
| static const char kNaClDefaultOptions[] = "handle_segv=0";
|
|
|