Thu, 22 Jan 2015 13:21:57 +0100
Incorporate requested changes from Mozilla in review:
https://bugzilla.mozilla.org/show_bug.cgi?id=1123480#c6
michael@0 | 1 | /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ |
michael@0 | 2 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 3 | * License, v. 2.0. If a copy of the MPL was not distributed with this file, |
michael@0 | 4 | * You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 5 | |
michael@0 | 6 | #include "mozilla/Attributes.h" |
michael@0 | 7 | |
michael@0 | 8 | // When running with AddressSanitizer, we need to explicitely set some |
michael@0 | 9 | // options specific to our codebase to prevent errors during runtime. |
michael@0 | 10 | // |
michael@0 | 11 | // Currently, these are: |
michael@0 | 12 | // |
michael@0 | 13 | // allow_user_segv_handler=1 - Tell ASan to allow our code to use its |
michael@0 | 14 | // own SIGSEGV handlers. This is required by ASM.js internally. |
michael@0 | 15 | // |
michael@0 | 16 | // alloc_dealloc_mismatch=0 - Disable alloc-dealloc mismatch checking |
michael@0 | 17 | // in ASan. This is required because we define our own new/delete |
michael@0 | 18 | // operators that are backed by malloc/free. If one of them gets inlined |
michael@0 | 19 | // while the other doesn't, ASan will report false positives. |
michael@0 | 20 | // |
michael@0 | 21 | extern "C" MOZ_ASAN_BLACKLIST |
michael@0 | 22 | const char* __asan_default_options() { |
michael@0 | 23 | return "allow_user_segv_handler=1:alloc_dealloc_mismatch=0"; |
michael@0 | 24 | } |