SANITIZE_TARGET: set global ASAN_OPTIONS
allow_user_segv_handler=1 is required to run ART under ASan detect_odr_violation=0 and alloc_dealloc_mismatch=0 suppress some of the existing bug reports during boot. Bug: 21951850, 21785137 Change-Id: I4d36967c6d8d936dacbfdf1b94b87fa94766bd3e
This commit is contained in:
parent
d2e7f0021d
commit
1cbe3d944a
|
@ -30,6 +30,11 @@ LOCAL_POST_INSTALL_CMD := mkdir -p $(addprefix $(TARGET_ROOT_OUT)/, \
|
|||
|
||||
include $(BUILD_SYSTEM)/base_rules.mk
|
||||
|
||||
EXPORT_GLOBAL_ASAN_OPTIONS :=
|
||||
ifeq (address,$(strip $(SANITIZE_TARGET)))
|
||||
EXPORT_GLOBAL_ASAN_OPTIONS := export ASAN_OPTIONS allow_user_segv_handler=1:detect_odr_violation=0:alloc_dealloc_mismatch=0
|
||||
endif
|
||||
|
||||
# Regenerate init.environ.rc if PRODUCT_BOOTCLASSPATH has changed.
|
||||
bcp_md5 := $(word 1, $(shell echo $(PRODUCT_BOOTCLASSPATH) $(PRODUCT_SYSTEM_SERVER_CLASSPATH) | $(MD5SUM)))
|
||||
bcp_dep := $(intermediates)/$(bcp_md5).bcp.dep
|
||||
|
@ -41,6 +46,7 @@ $(LOCAL_BUILT_MODULE): $(LOCAL_PATH)/init.environ.rc.in $(bcp_dep)
|
|||
@mkdir -p $(dir $@)
|
||||
$(hide) sed -e 's?%BOOTCLASSPATH%?$(PRODUCT_BOOTCLASSPATH)?g' $< >$@
|
||||
$(hide) sed -i -e 's?%SYSTEMSERVERCLASSPATH%?$(PRODUCT_SYSTEM_SERVER_CLASSPATH)?g' $@
|
||||
$(hide) sed -i -e 's?%EXPORT_GLOBAL_ASAN_OPTIONS%?$(EXPORT_GLOBAL_ASAN_OPTIONS)?g' $@
|
||||
|
||||
bcp_md5 :=
|
||||
bcp_dep :=
|
||||
|
|
|
@ -9,3 +9,4 @@ on init
|
|||
export LOOP_MOUNTPOINT /mnt/obb
|
||||
export BOOTCLASSPATH %BOOTCLASSPATH%
|
||||
export SYSTEMSERVERCLASSPATH %SYSTEMSERVERCLASSPATH%
|
||||
%EXPORT_GLOBAL_ASAN_OPTIONS%
|
||||
|
|
Loading…
Reference in New Issue