| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // This file contains the default options for various compiler-based dynamic | 5 // This file contains the default options for various compiler-based dynamic |
| 6 // tools. | 6 // tools. |
| 7 | 7 |
| 8 #include "build/build_config.h" | 8 #include "build/build_config.h" |
| 9 | 9 |
| 10 #if defined(ADDRESS_SANITIZER) && defined(OS_MACOSX) | 10 #if defined(ADDRESS_SANITIZER) && defined(OS_MACOSX) |
| (...skipping 111 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 122 // report_thread_leaks=0 - do not report unjoined threads at the end of | 122 // report_thread_leaks=0 - do not report unjoined threads at the end of |
| 123 // the program execution. | 123 // the program execution. |
| 124 // print_suppressions=1 - print the list of matched suppressions. | 124 // print_suppressions=1 - print the list of matched suppressions. |
| 125 // history_size=7 - make the history buffer proportional to 2^7 (the maximum | 125 // history_size=7 - make the history buffer proportional to 2^7 (the maximum |
| 126 // value) to keep more stack traces. | 126 // value) to keep more stack traces. |
| 127 // strip_path_prefix=Release/../../ - prefixes up to and including this | 127 // strip_path_prefix=Release/../../ - prefixes up to and including this |
| 128 // substring will be stripped from source file paths in symbolized reports. | 128 // substring will be stripped from source file paths in symbolized reports. |
| 129 const char kTsanDefaultOptions[] = | 129 const char kTsanDefaultOptions[] = |
| 130 "detect_deadlocks=1 second_deadlock_stack=1 report_signal_unsafe=0 " | 130 "detect_deadlocks=1 second_deadlock_stack=1 report_signal_unsafe=0 " |
| 131 "report_thread_leaks=0 print_suppressions=1 history_size=7 " | 131 "report_thread_leaks=0 print_suppressions=1 history_size=7 " |
| 132 "intercept_memcmp=0 strip_path_prefix=Release/../../ "; | 132 "strict_memcmp=0 strip_path_prefix=Release/../../ "; |
| 133 | 133 |
| 134 SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_options() { | 134 SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_options() { |
| 135 return kTsanDefaultOptions; | 135 return kTsanDefaultOptions; |
| 136 } | 136 } |
| 137 | 137 |
| 138 extern "C" char kTSanDefaultSuppressions[]; | 138 extern "C" char kTSanDefaultSuppressions[]; |
| 139 | 139 |
| 140 SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() { | 140 SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() { |
| 141 return kTSanDefaultSuppressions; | 141 return kTSanDefaultSuppressions; |
| 142 } | 142 } |
| (...skipping 27 matching lines...) Expand all Loading... |
| 170 return kLsanDefaultOptions; | 170 return kLsanDefaultOptions; |
| 171 } | 171 } |
| 172 | 172 |
| 173 extern "C" char kLSanDefaultSuppressions[]; | 173 extern "C" char kLSanDefaultSuppressions[]; |
| 174 | 174 |
| 175 SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_suppressions() { | 175 SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_suppressions() { |
| 176 return kLSanDefaultSuppressions; | 176 return kLSanDefaultSuppressions; |
| 177 } | 177 } |
| 178 | 178 |
| 179 #endif // LEAK_SANITIZER | 179 #endif // LEAK_SANITIZER |
| OLD | NEW |