Commit 6cd7b732 authored by Abhishek Arya's avatar Abhishek Arya

Add default sanitizer options for Windows.

strip_path_prefix is needed for Predator to work on ClusterFuzz.

R=ochang@chromium.org
CC=metzman@chromium.org

Change-Id: Ib800a54c5f95176ef4acd292f935d6405529cf8f
Reviewed-on: https://chromium-review.googlesource.com/c/1345570Reviewed-by: default avatarAlexander Potapenko <glider@chromium.org>
Reviewed-by: default avatarEvgeniy Stepanov <eugenis@chromium.org>
Reviewed-by: default avatarOliver Chang <ochang@chromium.org>
Cr-Commit-Position: refs/heads/master@{#610287}
parent b9e57bb2
......@@ -77,9 +77,15 @@ const char *kAsanDefaultOptions =
"check_printf=1 use_sigaltstack=1 "
"strip_path_prefix=/../../ fast_unwind_on_fatal=1 "
"detect_stack_use_after_return=1 detect_odr_violation=0 ";
#elif defined(OS_WIN)
const char* kAsanDefaultOptions =
"check_printf=1 use_sigaltstack=1 "
"strip_path_prefix=\\..\\..\\ fast_unwind_on_fatal=1 "
"detect_stack_use_after_return=1 ";
#endif // OS_LINUX
#if defined(OS_LINUX) || defined(OS_MACOSX)
#if defined(OS_LINUX) || defined(OS_MACOSX) || defined(OS_WIN)
// Allow NaCl to override the default asan options.
extern const char* kAsanDefaultOptionsNaCl;
__attribute__((weak)) const char* kAsanDefaultOptionsNaCl = nullptr;
......@@ -95,7 +101,7 @@ extern char kASanDefaultSuppressions[];
SANITIZER_HOOK_ATTRIBUTE const char *__asan_default_suppressions() {
return kASanDefaultSuppressions;
}
#endif // OS_LINUX || OS_MACOSX
#endif // OS_LINUX || OS_MACOSX || OS_WIN
#endif // ADDRESS_SANITIZER
#if defined(THREAD_SANITIZER) && defined(OS_LINUX)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment