Commit 5c249e73 authored by Hayato Ito's avatar Hayato Ito Committed by Commit Bot

Revert "Add default sanitizer options for Windows."

This reverts commit 6cd7b732.

Reason for revert: See https://crbug.com/907758
Findit found culprit 610287 with 75% confidence.

Original change's description:
> Add default sanitizer options for Windows.
> 
> strip_path_prefix is needed for Predator to work on ClusterFuzz.
> 
> R=​ochang@chromium.org
> CC=​metzman@chromium.org
> 
> Change-Id: Ib800a54c5f95176ef4acd292f935d6405529cf8f
> Reviewed-on: https://chromium-review.googlesource.com/c/1345570
> Reviewed-by: Alexander Potapenko <glider@chromium.org>
> Reviewed-by: Evgeniy Stepanov <eugenis@chromium.org>
> Reviewed-by: Oliver Chang <ochang@chromium.org>
> Cr-Commit-Position: refs/heads/master@{#610287}

TBR=eugenis@chromium.org,glider@chromium.org,inferno@chromium.org,ochang@chromium.org

Change-Id: I4a72cbced73bd0ef1d5c9fe723f28e45fab2fd24
No-Presubmit: true
No-Tree-Checks: true
No-Try: true
Reviewed-on: https://chromium-review.googlesource.com/c/1347965Reviewed-by: default avatarHayato Ito <hayato@chromium.org>
Commit-Queue: Hayato Ito <hayato@chromium.org>
Cr-Commit-Position: refs/heads/master@{#610350}
parent 8c4e99ae
...@@ -77,15 +77,9 @@ const char *kAsanDefaultOptions = ...@@ -77,15 +77,9 @@ const char *kAsanDefaultOptions =
"check_printf=1 use_sigaltstack=1 " "check_printf=1 use_sigaltstack=1 "
"strip_path_prefix=/../../ fast_unwind_on_fatal=1 " "strip_path_prefix=/../../ fast_unwind_on_fatal=1 "
"detect_stack_use_after_return=1 detect_odr_violation=0 "; "detect_stack_use_after_return=1 detect_odr_violation=0 ";
#elif defined(OS_WIN)
const char* kAsanDefaultOptions =
"check_printf=1 use_sigaltstack=1 "
"strip_path_prefix=\\..\\..\\ fast_unwind_on_fatal=1 "
"detect_stack_use_after_return=1 ";
#endif // OS_LINUX #endif // OS_LINUX
#if defined(OS_LINUX) || defined(OS_MACOSX) || defined(OS_WIN) #if defined(OS_LINUX) || defined(OS_MACOSX)
// Allow NaCl to override the default asan options. // Allow NaCl to override the default asan options.
extern const char* kAsanDefaultOptionsNaCl; extern const char* kAsanDefaultOptionsNaCl;
__attribute__((weak)) const char* kAsanDefaultOptionsNaCl = nullptr; __attribute__((weak)) const char* kAsanDefaultOptionsNaCl = nullptr;
...@@ -101,7 +95,7 @@ extern char kASanDefaultSuppressions[]; ...@@ -101,7 +95,7 @@ extern char kASanDefaultSuppressions[];
SANITIZER_HOOK_ATTRIBUTE const char *__asan_default_suppressions() { SANITIZER_HOOK_ATTRIBUTE const char *__asan_default_suppressions() {
return kASanDefaultSuppressions; return kASanDefaultSuppressions;
} }
#endif // OS_LINUX || OS_MACOSX || OS_WIN #endif // OS_LINUX || OS_MACOSX
#endif // ADDRESS_SANITIZER #endif // ADDRESS_SANITIZER
#if defined(THREAD_SANITIZER) && defined(OS_LINUX) #if defined(THREAD_SANITIZER) && defined(OS_LINUX)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment