Commit f10581ba authored by aizatsky's avatar aizatsky Committed by Commit bot

[sanitizers] stripping output path even if it is not named Release.

This will also get rid of "libfuzzer/../../" strings in libfuzzer stacktraces.

BUG=

Review-Url: https://codereview.chromium.org/2108713003
Cr-Commit-Position: refs/heads/master@{#402623}
parent 13510755
...@@ -51,7 +51,7 @@ void _sanitizer_options_link_helper() { } ...@@ -51,7 +51,7 @@ void _sanitizer_options_link_helper() { }
// output routines) arguments. // output routines) arguments.
// use_sigaltstack=1 - handle signals on an alternate signal stack. Useful // use_sigaltstack=1 - handle signals on an alternate signal stack. Useful
// for stack overflow detection. // for stack overflow detection.
// strip_path_prefix=Release/../../ - prefixes up to and including this // strip_path_prefix=/../../ - prefixes up to and including this
// substring will be stripped from source file paths in symbolized reports // substring will be stripped from source file paths in symbolized reports
// fast_unwind_on_fatal=1 - use the fast (frame-pointer-based) stack unwinder // fast_unwind_on_fatal=1 - use the fast (frame-pointer-based) stack unwinder
// to print error reports. V8 doesn't generate debug info for the JIT code, // to print error reports. V8 doesn't generate debug info for the JIT code,
...@@ -66,19 +66,19 @@ void _sanitizer_options_link_helper() { } ...@@ -66,19 +66,19 @@ void _sanitizer_options_link_helper() { }
const char kAsanDefaultOptions[] = const char kAsanDefaultOptions[] =
"legacy_pthread_cond=1 malloc_context_size=5 " "legacy_pthread_cond=1 malloc_context_size=5 "
"symbolize=1 check_printf=1 use_sigaltstack=1 detect_leaks=0 " "symbolize=1 check_printf=1 use_sigaltstack=1 detect_leaks=0 "
"strip_path_prefix=Release/../../ fast_unwind_on_fatal=1"; "strip_path_prefix=/../../ fast_unwind_on_fatal=1";
#else #else
// Default AddressSanitizer options for buildbots and non-official builds. // Default AddressSanitizer options for buildbots and non-official builds.
const char *kAsanDefaultOptions = const char *kAsanDefaultOptions =
"symbolize=1 check_printf=1 use_sigaltstack=1 " "symbolize=1 check_printf=1 use_sigaltstack=1 "
"detect_leaks=0 strip_path_prefix=Release/../../ fast_unwind_on_fatal=1 " "detect_leaks=0 strip_path_prefix=/../../ fast_unwind_on_fatal=1 "
"detect_stack_use_after_return=1 "; "detect_stack_use_after_return=1 ";
#endif // GOOGLE_CHROME_BUILD #endif // GOOGLE_CHROME_BUILD
#elif defined(OS_MACOSX) #elif defined(OS_MACOSX)
const char *kAsanDefaultOptions = const char *kAsanDefaultOptions =
"check_printf=1 use_sigaltstack=1 " "check_printf=1 use_sigaltstack=1 "
"strip_path_prefix=Release/../../ fast_unwind_on_fatal=1 " "strip_path_prefix=/../../ fast_unwind_on_fatal=1 "
"detect_stack_use_after_return=1 detect_odr_violation=0 "; "detect_stack_use_after_return=1 detect_odr_violation=0 ";
static const char kNaClDefaultOptions[] = "handle_segv=0"; static const char kNaClDefaultOptions[] = "handle_segv=0";
static const char kNaClFlag[] = "--type=nacl-loader"; static const char kNaClFlag[] = "--type=nacl-loader";
...@@ -120,12 +120,12 @@ SANITIZER_HOOK_ATTRIBUTE const char *__asan_default_suppressions() { ...@@ -120,12 +120,12 @@ SANITIZER_HOOK_ATTRIBUTE const char *__asan_default_suppressions() {
// print_suppressions=1 - print the list of matched suppressions. // print_suppressions=1 - print the list of matched suppressions.
// history_size=7 - make the history buffer proportional to 2^7 (the maximum // history_size=7 - make the history buffer proportional to 2^7 (the maximum
// value) to keep more stack traces. // value) to keep more stack traces.
// strip_path_prefix=Release/../../ - prefixes up to and including this // strip_path_prefix=/../../ - prefixes up to and including this
// substring will be stripped from source file paths in symbolized reports. // substring will be stripped from source file paths in symbolized reports.
const char kTsanDefaultOptions[] = const char kTsanDefaultOptions[] =
"detect_deadlocks=1 second_deadlock_stack=1 report_signal_unsafe=0 " "detect_deadlocks=1 second_deadlock_stack=1 report_signal_unsafe=0 "
"report_thread_leaks=0 print_suppressions=1 history_size=7 " "report_thread_leaks=0 print_suppressions=1 history_size=7 "
"strict_memcmp=0 strip_path_prefix=Release/../../ "; "strict_memcmp=0 strip_path_prefix=/../../ ";
SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_options() { SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_options() {
return kTsanDefaultOptions; return kTsanDefaultOptions;
...@@ -143,10 +143,10 @@ SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() { ...@@ -143,10 +143,10 @@ SANITIZER_HOOK_ATTRIBUTE const char *__tsan_default_suppressions() {
// Default options for MemorySanitizer: // Default options for MemorySanitizer:
// intercept_memcmp=0 - do not detect uninitialized memory in memcmp() calls. // intercept_memcmp=0 - do not detect uninitialized memory in memcmp() calls.
// Pending cleanup, see http://crbug.com/523428 // Pending cleanup, see http://crbug.com/523428
// strip_path_prefix=Release/../../ - prefixes up to and including this // strip_path_prefix=/../../ - prefixes up to and including this
// substring will be stripped from source file paths in symbolized reports. // substring will be stripped from source file paths in symbolized reports.
const char kMsanDefaultOptions[] = const char kMsanDefaultOptions[] =
"intercept_memcmp=0 strip_path_prefix=Release/../../ "; "intercept_memcmp=0 strip_path_prefix=/../../ ";
SANITIZER_HOOK_ATTRIBUTE const char *__msan_default_options() { SANITIZER_HOOK_ATTRIBUTE const char *__msan_default_options() {
return kMsanDefaultOptions; return kMsanDefaultOptions;
...@@ -157,10 +157,10 @@ SANITIZER_HOOK_ATTRIBUTE const char *__msan_default_options() { ...@@ -157,10 +157,10 @@ SANITIZER_HOOK_ATTRIBUTE const char *__msan_default_options() {
#if defined(LEAK_SANITIZER) #if defined(LEAK_SANITIZER)
// Default options for LeakSanitizer: // Default options for LeakSanitizer:
// print_suppressions=1 - print the list of matched suppressions. // print_suppressions=1 - print the list of matched suppressions.
// strip_path_prefix=Release/../../ - prefixes up to and including this // strip_path_prefix=/../../ - prefixes up to and including this
// substring will be stripped from source file paths in symbolized reports. // substring will be stripped from source file paths in symbolized reports.
const char kLsanDefaultOptions[] = const char kLsanDefaultOptions[] =
"print_suppressions=1 strip_path_prefix=Release/../../ "; "print_suppressions=1 strip_path_prefix=/../../ ";
SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_options() { SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_options() {
return kLsanDefaultOptions; return kLsanDefaultOptions;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment