| Index: build/sanitizers/sanitizer_options.cc
|
| diff --git a/build/sanitizers/sanitizer_options.cc b/build/sanitizers/sanitizer_options.cc
|
| index a659a22caa5c9928b253c17d9253d70ba39235d0..9e2544160a89b700d6dca3aeab0499cb2e76da18 100644
|
| --- a/build/sanitizers/sanitizer_options.cc
|
| +++ b/build/sanitizers/sanitizer_options.cc
|
| @@ -143,6 +143,21 @@ SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() {
|
|
|
| #endif // THREAD_SANITIZER && OS_LINUX
|
|
|
| +#if defined(MEMORY_SANITIZER)
|
| +// Default options for MemorySanitizer:
|
| +// intercept_memcmp=0 - do not detect uninitialized memory in memcmp() calls.
|
| +// Pending cleanup, see http://crbug.com/523428
|
| +// strip_path_prefix=Release/../../ - prefixes up to and including this
|
| +// substring will be stripped from source file paths in symbolized reports.
|
| +const char kMsanDefaultOptions[] =
|
| + "intercept_memcmp=0 strip_path_prefix=Release/../../ ";
|
| +
|
| +SANITIZER_HOOK_ATTRIBUTE const char *__msan_default_options() {
|
| + return kMsanDefaultOptions;
|
| +}
|
| +
|
| +#endif // MEMORY_SANITIZER
|
| +
|
| #if defined(LEAK_SANITIZER)
|
| // Default options for LeakSanitizer:
|
| // print_suppressions=1 - print the list of matched suppressions.
|
|
|