Index: base/debug/sanitizer_options.cc |
diff --git a/base/debug/sanitizer_options.cc b/base/debug/sanitizer_options.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..8a303da26224d4e0f60a29dfe3be2369f7bc1d75 |
--- /dev/null |
+++ b/base/debug/sanitizer_options.cc |
@@ -0,0 +1,62 @@ |
+// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+// |
+// This file contains the default options for various compiler-based dynamic |
+// tools. |
+ |
+#include "build/build_config.h" |
+ |
+// Functions returning default options are declared weak in the tools' runtime |
+// libraries. To make the linker pick the strong replacements for those |
+// functions from this module, we explicitly force its inclusion by passing |
+// -Wl,-u_sanitizer_options_link_helper |
+extern "C" |
+void _sanitizer_options_link_helper() { } |
+ |
+#if defined(ADDRESS_SANITIZER) |
+// Default options for AddressSanitizer in various configurations: |
+// strict_memcmp=1 - disable the strict memcmp() checking |
+// (http://crbug.com/178677 and http://crbug.com/178404). |
+// malloc_context_size=5 - limit the size of stack traces collected by ASan |
+// for each malloc/free by 5 frames. These stack traces tend to accumulate |
+// very fast in applications using JIT (v8 in Chrome's case), see |
+// https://code.google.com/p/address-sanitizer/issues/detail?id=177 |
+// symbolize=false - disable the in-process symbolization, which isn't 100% |
+// compatible with the existing sandboxes and doesn't make much sense for |
+// stripped official binaries. |
+// legacy_pthread_cond=1 - run in the libpthread 2.2.5 compatibility mode to |
+// work around libGL.so using the obsolete API, see |
+// http://crbug.com/341805. This may break if pthread_cond_t objects are |
+// accessed by both instrumented and non-instrumented binaries (e.g. if |
+// they reside in shared memory). This option is going to be deprecated in |
+// upstream AddressSanitizer and must not be used anywhere except the |
+// official builds. |
+// replace_intrin=0 - do not intercept memcpy(), memmove() and memset() to |
+// work around http://crbug.com/162461 (ASan report in OpenCL on Mac). |
+#if defined(OS_LINUX) |
+#if defined(GOOGLE_CHROME_BUILD) |
+// Default AddressSanitizer options for the official build. These do not affect |
+// tests on buildbots (which don't set GOOGLE_CHROME_BUILD) or non-official |
+// Chromium builds. |
+const char kAsanDefaultOptions[] = |
+ "legacy_pthread_cond=1 malloc_context_size=5 strict_memcmp=0 " |
+ "symbolize=false"; |
+#else |
+// Default AddressSanitizer options for buildbots and non-official builds. |
+const char *kAsanDefaultOptions = |
+ "strict_memcmp=0 symbolize=false"; |
+#endif // GOOGLE_CHROME_BUILD |
+ |
+#elif defined(OS_MACOSX) |
+const char *kAsanDefaultOptions = "strict_memcmp=0 replace_intrin=0"; |
+#endif // OS_LINUX |
+ |
+#if defined(OS_LINUX) || defined(OS_MACOSX) |
+extern "C" |
+__attribute__((no_sanitize_address)) |
+const char *__asan_default_options() { |
+ return kAsanDefaultOptions; |
+} |
+#endif // OS_LINUX || OS_MACOSX |
+#endif // ADDRESS_SANITIZER |