| Index: BUILD.gn
|
| diff --git a/BUILD.gn b/BUILD.gn
|
| index 6d07d77000288590145384e9e90bce0a843fdfff..1721544f98d1671cb6acd87cf048eb59d9e07d86 100644
|
| --- a/BUILD.gn
|
| +++ b/BUILD.gn
|
| @@ -22,10 +22,18 @@ v8_interpreted_regexp = false
|
| v8_object_print = false
|
| v8_postmortem_support = false
|
| v8_use_snapshot = true
|
| -v8_target_arch = target_cpu
|
| v8_random_seed = "314159265"
|
| v8_toolset_for_d8 = "host"
|
|
|
| +if (is_msan) {
|
| + # Running the V8-generated code on an ARM simulator is a powerful hack that
|
| + # allows the tool to see the memory accesses from JITted code. Without this
|
| + # flag, JS code causes false positive reports from MSan.
|
| + v8_target_arch = "arm64"
|
| +} else {
|
| + v8_target_arch = target_cpu
|
| +}
|
| +
|
| # The snapshot needs to be compiled for the host, but compiled with
|
| # a toolchain that matches the bit-width of the target.
|
| #
|
| @@ -1380,6 +1388,9 @@ source_set("v8_base") {
|
| "src/arm64/decoder-arm64.cc",
|
| "src/arm64/decoder-arm64.h",
|
| "src/arm64/decoder-arm64-inl.h",
|
| + "src/arm64/delayed-masm-arm64.cc",
|
| + "src/arm64/delayed-masm-arm64.h",
|
| + "src/arm64/delayed-masm-arm64-inl.h",
|
| "src/arm64/deoptimizer-arm64.cc",
|
| "src/arm64/disasm-arm64.cc",
|
| "src/arm64/disasm-arm64.h",
|
|
|