AddressSanitizer: disable ODR-violation checks on Mac
They started failing after the Clang roll. Seems they're not ready for prime time yet. BUG=431803, 440543 TBR=glider NOTRY=true Review URL: https://codereview.chromium.org/788033002 Cr-Original-Commit-Position: refs/heads/master@{#307565} Cr-Mirrored-From: https://chromium.googlesource.com/chromium/src Cr-Mirrored-Commit: 0bf822367e392d7120c1e2360cb6a8f89e24e2e6
This commit is contained in:
Родитель
0ace8b9e61
Коммит
9ef4e72d30
|
@ -72,7 +72,7 @@ const char *kAsanDefaultOptions =
|
|||
const char *kAsanDefaultOptions =
|
||||
"strict_memcmp=0 replace_intrin=0 check_printf=1 use_sigaltstack=1 "
|
||||
"strip_path_prefix=Release/../../ fast_unwind_on_fatal=1 "
|
||||
"detect_stack_use_after_return=1 ";
|
||||
"detect_stack_use_after_return=1 detect_odr_violation=0 ";
|
||||
static const char kNaClDefaultOptions[] = "handle_segv=0";
|
||||
static const char kNaClFlag[] = "--type=nacl-loader";
|
||||
#endif // OS_LINUX
|
||||
|
|
Загрузка…
Ссылка в новой задаче