Index: BUILD.gn |
diff --git a/BUILD.gn b/BUILD.gn |
index 0641aa65deac428085f4685595de4eb5d3712e73..97bb7a3beb47b00863af238527401940e03d7613 100644 |
--- a/BUILD.gn |
+++ b/BUILD.gn |
@@ -69,17 +69,6 @@ declare_args() { |
v8_random_seed = "314159265" |
v8_toolset_for_shell = "host" |
-if (v8_target_arch == "") { |
- if (is_msan) { |
- # Running the V8-generated code on an ARM simulator is a powerful hack that |
- # allows the tool to see the memory accesses from JITted code. Without this |
- # flag, JS code causes false positive reports from MSan. |
- v8_target_arch = "arm64" |
- } else { |
- v8_target_arch = target_cpu |
- } |
-} |
- |
if (v8_use_snapshot && v8_use_external_startup_data) { |
snapshot_target = ":v8_external_snapshot" |
} else if (v8_use_snapshot) { |