OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 // | 4 // |
5 // This file contains the default options for various compiler-based dynamic | 5 // This file contains the default options for various compiler-based dynamic |
6 // tools. | 6 // tools. |
7 | 7 |
8 #include "build/build_config.h" | 8 #include "build/build_config.h" |
9 | 9 |
10 #if defined(ADDRESS_SANITIZER) && defined(OS_MACOSX) | 10 #if defined(ADDRESS_SANITIZER) && defined(OS_MACOSX) |
(...skipping 125 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
136 } | 136 } |
137 | 137 |
138 extern "C" char kTSanDefaultSuppressions[]; | 138 extern "C" char kTSanDefaultSuppressions[]; |
139 | 139 |
140 SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() { | 140 SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() { |
141 return kTSanDefaultSuppressions; | 141 return kTSanDefaultSuppressions; |
142 } | 142 } |
143 | 143 |
144 #endif // THREAD_SANITIZER && OS_LINUX | 144 #endif // THREAD_SANITIZER && OS_LINUX |
145 | 145 |
| 146 #if defined(MEMORY_SANITIZER) |
| 147 // Default options for MemorySanitizer: |
| 148 // intercept_memcmp=0 - do not detect uninitialized memory in memcmp() calls. |
| 149 // Pending cleanup, see http://crbug.com/523428 |
| 150 // strip_path_prefix=Release/../../ - prefixes up to and including this |
| 151 // substring will be stripped from source file paths in symbolized reports. |
| 152 const char kMsanDefaultOptions[] = |
| 153 "intercept_memcmp=0 strip_path_prefix=Release/../../ "; |
| 154 |
| 155 SANITIZER_HOOK_ATTRIBUTE const char *__msan_default_options() { |
| 156 return kMsanDefaultOptions; |
| 157 } |
| 158 |
| 159 #endif // MEMORY_SANITIZER |
| 160 |
146 #if defined(LEAK_SANITIZER) | 161 #if defined(LEAK_SANITIZER) |
147 // Default options for LeakSanitizer: | 162 // Default options for LeakSanitizer: |
148 // print_suppressions=1 - print the list of matched suppressions. | 163 // print_suppressions=1 - print the list of matched suppressions. |
149 // strip_path_prefix=Release/../../ - prefixes up to and including this | 164 // strip_path_prefix=Release/../../ - prefixes up to and including this |
150 // substring will be stripped from source file paths in symbolized reports. | 165 // substring will be stripped from source file paths in symbolized reports. |
151 const char kLsanDefaultOptions[] = | 166 const char kLsanDefaultOptions[] = |
152 "print_suppressions=1 strip_path_prefix=Release/../../ "; | 167 "print_suppressions=1 strip_path_prefix=Release/../../ "; |
153 | 168 |
154 SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_options() { | 169 SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_options() { |
155 return kLsanDefaultOptions; | 170 return kLsanDefaultOptions; |
156 } | 171 } |
157 | 172 |
158 extern "C" char kLSanDefaultSuppressions[]; | 173 extern "C" char kLSanDefaultSuppressions[]; |
159 | 174 |
160 SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_suppressions() { | 175 SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_suppressions() { |
161 return kLSanDefaultSuppressions; | 176 return kLSanDefaultSuppressions; |
162 } | 177 } |
163 | 178 |
164 #endif // LEAK_SANITIZER | 179 #endif // LEAK_SANITIZER |
OLD | NEW |