Merge "[cc/sanitize] Re-enable new pass manager for fuzzer targets" am: 2a7092927c

Original change: https://android-review.googlesource.com/c/platform/build/soong/+/1908971

Change-Id: I0fb2a77805c1426cdf1cc11bfe66ea4eac2ebc98
This commit is contained in:
Treehugger Robot
2021-12-06 21:42:56 +00:00
committed by Automerger Merge Worker

View File

@@ -35,7 +35,6 @@ var (
asanCflags = []string{
"-fno-omit-frame-pointer",
"-fno-experimental-new-pass-manager",
}
asanLdflags = []string{"-Wl,-u,__asan_preinit"}
@@ -666,9 +665,6 @@ func (sanitize *sanitize) flags(ctx ModuleContext, flags Flags) Flags {
flags.Local.LdFlags = append(flags.Local.LdFlags, "-fno-sanitize-coverage=stack-depth")
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize-coverage=stack-depth")
// TODO(b/133876586): Experimental PM breaks sanitizer coverage.
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-experimental-new-pass-manager")
// Disable fortify for fuzzing builds. Generally, we'll be building with
// UBSan or ASan here and the fortify checks pollute the stack traces.
flags.Local.CFlags = append(flags.Local.CFlags, "-U_FORTIFY_SOURCE")