Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(140)

Side by Side Diff: build/config/sanitizers/sanitizers.gni

Issue 1326053003: port cfi to gn (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Revert gn changes; start using toolchain_os; fix use_cfi_diag=true Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « build/config/compiler/BUILD.gn ('k') | build/toolchain/gcc_toolchain.gni » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright 2015 The Chromium Authors. All rights reserved. 1 # Copyright 2015 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 declare_args() { 5 declare_args() {
6 # Use libc++ (buildtools/third_party/libc++ and 6 # Use libc++ (buildtools/third_party/libc++ and
7 # buildtools/third_party/libc++abi) instead of stdlibc++ as standard library. 7 # buildtools/third_party/libc++abi) instead of stdlibc++ as standard library.
8 # This is intended to be used for instrumented builds. 8 # This is intended to be used for instrumented builds.
9 use_custom_libcxx = (is_asan && is_linux) || is_tsan || is_msan 9 use_custom_libcxx = (is_asan && is_linux) || is_tsan || is_msan
10 10
11 # Track where uninitialized memory originates from. From fastest to slowest: 11 # Track where uninitialized memory originates from. From fastest to slowest:
12 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the 12 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
13 # chain of stores leading from allocation site to use site. 13 # chain of stores leading from allocation site to use site.
14 msan_track_origins = 2 14 msan_track_origins = 2
15 15
16 # Use dynamic libraries instrumented by one of the sanitizers instead of the 16 # Use dynamic libraries instrumented by one of the sanitizers instead of the
17 # standard system libraries. Set this flag to download prebuilt binaries from 17 # standard system libraries. Set this flag to download prebuilt binaries from
18 # GCS. 18 # GCS.
19 use_prebuilt_instrumented_libraries = false 19 use_prebuilt_instrumented_libraries = false
20 20
21 # Enable building with SyzyAsan which can find certain types of memory 21 # Enable building with SyzyAsan which can find certain types of memory
22 # errors. Only works on Windows. See 22 # errors. Only works on Windows. See
23 # https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo 23 # https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo
24 is_syzyasan = false 24 is_syzyasan = false
25
26 # Compile with Control Flow Integrity to protect virtual calls and casts.
27 # See http://clang.llvm.org/docs/ControlFlowIntegrity.html
28 is_cfi = false
29
30 # Whether Control Flow Integrity prints diagnostics instead of crashing.
brettw 2015/09/10 23:16:34 Can you rephrase this comment to make more clear w
pcc 2015/09/11 02:38:56 Done.
31 use_cfi_diag = false
25 } 32 }
26 33
27 # MSan only links Chrome properly in release builds (brettw -- 9/1/2015). The 34 # MSan only links Chrome properly in release builds (brettw -- 9/1/2015). The
28 # same is possibly true for the other non-ASan sanitizers. But regardless of 35 # same is possibly true for the other non-ASan sanitizers. But regardless of
29 # whether it links, one would normally never run a sanitizer in debug mode. 36 # whether it links, one would normally never run a sanitizer in debug mode.
30 # Running in debug mode probably indicates you forgot to set the "is_debug = 37 # Running in debug mode probably indicates you forgot to set the "is_debug =
31 # false" flag in the build args. ASan seems to run fine in debug mode. 38 # false" flag in the build args. ASan seems to run fine in debug mode.
32 # 39 #
33 # If you find a use-case where you want to compile a sanitizer in debug mode 40 # If you find a use-case where you want to compile a sanitizer in debug mode
34 # and have verified it works, ask brettw and we can consider removing it from 41 # and have verified it works, ask brettw and we can consider removing it from
35 # this condition. We may also be able to find another way to enable your case 42 # this condition. We may also be able to find another way to enable your case
36 # without having people accidentally get broken builds by compiling an 43 # without having people accidentally get broken builds by compiling an
37 # unsupported or unadvisable configurations. 44 # unsupported or unadvisable configurations.
38 # 45 #
39 # For one-off testing, just comment this assertion out. 46 # For one-off testing, just comment this assertion out.
40 assert(!is_debug || !(is_msan || is_lsan || is_tsan), 47 assert(!is_debug || !(is_msan || is_lsan || is_tsan),
41 "Sanitizers should generally be used in release (set is_debug=false).") 48 "Sanitizers should generally be used in release (set is_debug=false).")
OLDNEW
« no previous file with comments | « build/config/compiler/BUILD.gn ('k') | build/toolchain/gcc_toolchain.gni » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698