Index: trunk/src/base/debug/sanitizer_options.cc |
=================================================================== |
--- trunk/src/base/debug/sanitizer_options.cc (revision 263633) |
+++ trunk/src/base/debug/sanitizer_options.cc (working copy) |
@@ -1,60 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
-// |
-// This file contains the default options for various compiler-based dynamic |
-// tools. |
- |
-#include "build/build_config.h" |
- |
-// Functions returning default options are declared weak in the tools' runtime |
-// libraries. To make the linker pick the strong replacements for those |
-// functions from this module, we explicitly force its inclusion by passing |
-// -Wl,-u_sanitizer_options_link_helper |
-extern "C" |
-void _sanitizer_options_link_helper() { } |
- |
-#if defined(ADDRESS_SANITIZER) |
-// Default options for AddressSanitizer in various configurations: |
-// strict_memcmp=1 - disable the strict memcmp() checking |
-// (http://crbug.com/178677 and http://crbug.com/178404). |
-// malloc_context_size=5 - limit the size of stack traces collected by ASan |
-// for each malloc/free by 5 frames. These stack traces tend to accumulate |
-// very fast in applications using JIT (v8 in Chrome's case), see |
-// https://code.google.com/p/address-sanitizer/issues/detail?id=177 |
-// symbolize=false - disable the in-process symbolization, which isn't 100% |
-// compatible with the existing sandboxes and doesn't make much sense for |
-// stripped official binaries. |
-// legacy_pthread_cond=1 - run in the libpthread 2.2.5 compatibility mode to |
-// work around libGL.so using the obsolete API, see |
-// http://crbug.com/341805. This may break if pthread_cond_t objects are |
-// accessed by both instrumented and non-instrumented binaries (e.g. if |
-// they reside in shared memory). |
-// replace_intrin=0 - do not intercept memcpy(), memmove() and memset() to |
-// work around http://crbug.com/162461 (ASan report in OpenCL on Mac). |
-#if defined(OS_LINUX) |
-#if defined(GOOGLE_CHROME_BUILD) |
-// Default AddressSanitizer options for the official build. These do not affect |
-// tests on buildbots (which don't set GOOGLE_CHROME_BUILD) or non-official |
-// Chromium builds. |
-const char kAsanDefaultOptions[] = |
- "legacy_pthread_cond=1 malloc_context_size=5 strict_memcmp=0 " |
- "symbolize=false"; |
-#else |
-// Default AddressSanitizer options for buildbots and non-official builds. |
-const char *kAsanDefaultOptions = |
- "legacy_pthread_cond=1 strict_memcmp=0 symbolize=false"; |
-#endif // GOOGLE_CHROME_BUILD |
- |
-#elif defined(OS_MACOSX) |
-const char *kAsanDefaultOptions = "strict_memcmp=0 replace_intrin=0"; |
-#endif // OS_LINUX |
- |
-#if defined(OS_LINUX) || defined(OS_MACOSX) |
-extern "C" |
-__attribute__((no_sanitize_address)) |
-const char *__asan_default_options() { |
- return kAsanDefaultOptions; |
-} |
-#endif // OS_LINUX || OS_MACOSX |
-#endif // ADDRESS_SANITIZER |