blob: 53b7eb6300d1023793d1d01d51d223918a662928 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
|
#ifndef _NDEBUG
// The callbacks we define here will be called from the sanitizer runtime, but
// aren't referenced from the Chrome executable. We must ensure that those
// callbacks are not sanitizer-instrumented, and that they aren't stripped by
// the linker.
#define SANITIZER_HOOK_ATTRIBUTE \
extern "C" \
__attribute__((no_sanitize("address", "thread", "undefined"))) \
__attribute__((visibility("default"))) \
__attribute__((used))
static char kLSanDefaultSuppressions[] =
"leak:InitModule\n"
"leak:MallocExtension::Initialize\n"
"leak:MallocExtension::Register\n";
SANITIZER_HOOK_ATTRIBUTE const char *__lsan_default_suppressions() {
return kLSanDefaultSuppressions;
}
#endif // ! _NDEBUG
|