Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(43)

Side by Side Diff: build/common.gypi

Issue 141943002: Introduce an MSan blacklist and use it to ignore V8. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | tools/msan/blacklist.txt » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 # IMPORTANT: 5 # IMPORTANT:
6 # Please don't directly include this file if you are building via gyp_chromium, 6 # Please don't directly include this file if you are building via gyp_chromium,
7 # since gyp_chromium is automatically forcing its inclusion. 7 # since gyp_chromium is automatically forcing its inclusion.
8 { 8 {
9 # Variables expected to be overriden on the GYP command line (-D) or by 9 # Variables expected to be overriden on the GYP command line (-D) or by
10 # ~/.gyp/include.gypi. 10 # ~/.gyp/include.gypi.
(...skipping 357 matching lines...) Expand 10 before | Expand all | Expand 10 after
368 # Enable building with TSAN (Clang's -fsanitize=thread option). 368 # Enable building with TSAN (Clang's -fsanitize=thread option).
369 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1 369 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1
370 # See http://clang.llvm.org/docs/ThreadSanitizer.html 370 # See http://clang.llvm.org/docs/ThreadSanitizer.html
371 'tsan%': 0, 371 'tsan%': 0,
372 'tsan_blacklist%': '<(PRODUCT_DIR)/../../tools/valgrind/tsan_v2/ignores.tx t', 372 'tsan_blacklist%': '<(PRODUCT_DIR)/../../tools/valgrind/tsan_v2/ignores.tx t',
373 373
374 # Enable building with MSAN (Clang's -fsanitize=memory option). 374 # Enable building with MSAN (Clang's -fsanitize=memory option).
375 # MemorySanitizer only works with clang, but msan=1 implies clang=1 375 # MemorySanitizer only works with clang, but msan=1 implies clang=1
376 # See http://clang.llvm.org/docs/MemorySanitizer.html 376 # See http://clang.llvm.org/docs/MemorySanitizer.html
377 'msan%': 0, 377 'msan%': 0,
378 'msan_blacklist%': '<(PRODUCT_DIR)/../../tools/msan/blacklist.txt',
378 379
379 # Use the dynamic libraries instrumented by one of the sanitizers 380 # Use the dynamic libraries instrumented by one of the sanitizers
380 # instead of the standard system libraries. 381 # instead of the standard system libraries.
381 'use_instrumented_libraries%': 0, 382 'use_instrumented_libraries%': 0,
382 383
383 # Use libc++ (third_party/libc++ and third_party/libc++abi) instead of 384 # Use libc++ (third_party/libc++ and third_party/libc++abi) instead of
384 # stdlibc++ as standard library. This is intended to use for instrumented 385 # stdlibc++ as standard library. This is intended to use for instrumented
385 # builds. 386 # builds.
386 'use_custom_libcxx%': 0, 387 'use_custom_libcxx%': 0,
387 388
(...skipping 543 matching lines...) Expand 10 before | Expand all | Expand 10 after
931 'configuration_policy%': '<(configuration_policy)', 932 'configuration_policy%': '<(configuration_policy)',
932 'safe_browsing%': '<(safe_browsing)', 933 'safe_browsing%': '<(safe_browsing)',
933 'input_speech%': '<(input_speech)', 934 'input_speech%': '<(input_speech)',
934 'notifications%': '<(notifications)', 935 'notifications%': '<(notifications)',
935 'clang_use_chrome_plugins%': '<(clang_use_chrome_plugins)', 936 'clang_use_chrome_plugins%': '<(clang_use_chrome_plugins)',
936 'mac_want_real_dsym%': '<(mac_want_real_dsym)', 937 'mac_want_real_dsym%': '<(mac_want_real_dsym)',
937 'asan%': '<(asan)', 938 'asan%': '<(asan)',
938 'asan_coverage%': '<(asan_coverage)', 939 'asan_coverage%': '<(asan_coverage)',
939 'lsan%': '<(lsan)', 940 'lsan%': '<(lsan)',
940 'msan%': '<(msan)', 941 'msan%': '<(msan)',
942 'msan_blacklist%': '<(msan_blacklist)',
941 'tsan%': '<(tsan)', 943 'tsan%': '<(tsan)',
942 'tsan_blacklist%': '<(tsan_blacklist)', 944 'tsan_blacklist%': '<(tsan_blacklist)',
943 'use_instrumented_libraries%': '<(use_instrumented_libraries)', 945 'use_instrumented_libraries%': '<(use_instrumented_libraries)',
944 'use_custom_libcxx%': '<(use_custom_libcxx)', 946 'use_custom_libcxx%': '<(use_custom_libcxx)',
945 'clang_type_profiler%': '<(clang_type_profiler)', 947 'clang_type_profiler%': '<(clang_type_profiler)',
946 'order_profiling%': '<(order_profiling)', 948 'order_profiling%': '<(order_profiling)',
947 'order_text_section%': '<(order_text_section)', 949 'order_text_section%': '<(order_text_section)',
948 'enable_extensions%': '<(enable_extensions)', 950 'enable_extensions%': '<(enable_extensions)',
949 'enable_plugin_installation%': '<(enable_plugin_installation)', 951 'enable_plugin_installation%': '<(enable_plugin_installation)',
950 'enable_plugins%': '<(enable_plugins)', 952 'enable_plugins%': '<(enable_plugins)',
(...skipping 2567 matching lines...) Expand 10 before | Expand all | Expand 10 after
3518 }], 3520 }],
3519 ], 3521 ],
3520 }], 3522 }],
3521 ['msan==1', { 3523 ['msan==1', {
3522 'target_conditions': [ 3524 'target_conditions': [
3523 ['_toolset=="target"', { 3525 ['_toolset=="target"', {
3524 'cflags': [ 3526 'cflags': [
3525 '-fsanitize=memory', 3527 '-fsanitize=memory',
3526 '-fsanitize-memory-track-origins', 3528 '-fsanitize-memory-track-origins',
3527 '-fPIC', 3529 '-fPIC',
3530 '-fsanitize-blacklist=<(msan_blacklist)',
3528 ], 3531 ],
3529 'ldflags': [ 3532 'ldflags': [
3530 '-fsanitize=memory', 3533 '-fsanitize=memory',
3531 ], 3534 ],
3532 'defines': [ 3535 'defines': [
3533 'MEMORY_SANITIZER', 3536 'MEMORY_SANITIZER',
3534 ], 3537 ],
3535 'target_conditions': [ 3538 'target_conditions': [
3536 ['_type=="executable"', { 3539 ['_type=="executable"', {
3537 'ldflags': [ 3540 'ldflags': [
(...skipping 1309 matching lines...) Expand 10 before | Expand all | Expand 10 after
4847 # settings in target dicts. SYMROOT is a special case, because many other 4850 # settings in target dicts. SYMROOT is a special case, because many other
4848 # Xcode variables depend on it, including variables such as 4851 # Xcode variables depend on it, including variables such as
4849 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something 4852 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something
4850 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the 4853 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the
4851 # files to appear (when present) in the UI as actual files and not red 4854 # files to appear (when present) in the UI as actual files and not red
4852 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR, 4855 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR,
4853 # and therefore SYMROOT, needs to be set at the project level. 4856 # and therefore SYMROOT, needs to be set at the project level.
4854 'SYMROOT': '<(DEPTH)/xcodebuild', 4857 'SYMROOT': '<(DEPTH)/xcodebuild',
4855 }, 4858 },
4856 } 4859 }
OLDNEW
« no previous file with comments | « no previous file | tools/msan/blacklist.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698