| OLD | NEW |
| 1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
| 3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
| 4 | 4 |
| 5 import("//build/config/chrome_build.gni") | 5 import("//build/config/chrome_build.gni") |
| 6 import("//build/config/sanitizers/sanitizers.gni") | 6 import("//build/config/sanitizers/sanitizers.gni") |
| 7 | 7 |
| 8 # Contains the dependencies needed for sanitizers to link into executables and | 8 # Contains the dependencies needed for sanitizers to link into executables and |
| 9 # shared_libraries. Unconditionally depend upon this target as it is empty if | 9 # shared_libraries. Unconditionally depend upon this target as it is empty if |
| 10 # |is_asan|, |is_lsan|, |is_tsan|, |is_msan| and |use_custom_libcxx| are false. | 10 # |is_asan|, |is_lsan|, |is_tsan|, |is_msan| and |use_custom_libcxx| are false. |
| (...skipping 18 matching lines...) Expand all Loading... |
| 29 if (is_asan) { | 29 if (is_asan) { |
| 30 ldflags += [ "-fsanitize=address" ] | 30 ldflags += [ "-fsanitize=address" ] |
| 31 } | 31 } |
| 32 if (is_lsan) { | 32 if (is_lsan) { |
| 33 ldflags += [ "-fsanitize=leak" ] | 33 ldflags += [ "-fsanitize=leak" ] |
| 34 } | 34 } |
| 35 if (is_tsan) { | 35 if (is_tsan) { |
| 36 ldflags += [ "-fsanitize=thread" ] | 36 ldflags += [ "-fsanitize=thread" ] |
| 37 } | 37 } |
| 38 if (is_msan) { | 38 if (is_msan) { |
| 39 ldflags += [ "-fsanitize=memory" ] | 39 ldflags += [ |
| 40 "-fsanitize=memory", |
| 41 |
| 42 # TODO(eugenis): Remove when msan migrates to new ABI (crbug.com/560589). |
| 43 "-pie", |
| 44 ] |
| 40 } | 45 } |
| 41 if (is_ubsan) { | 46 if (is_ubsan) { |
| 42 ldflags += [ "-fsanitize=undefined" ] | 47 ldflags += [ "-fsanitize=undefined" ] |
| 43 } | 48 } |
| 44 if (is_ubsan_vptr) { | 49 if (is_ubsan_vptr) { |
| 45 ldflags += [ "-fsanitize=vptr" ] | 50 ldflags += [ "-fsanitize=vptr" ] |
| 46 } | 51 } |
| 47 } | 52 } |
| 48 | 53 |
| 49 source_set("options_sources") { | 54 source_set("options_sources") { |
| (...skipping 82 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 132 "-fsanitize-blacklist=$tsan_blacklist_path", | 137 "-fsanitize-blacklist=$tsan_blacklist_path", |
| 133 ] | 138 ] |
| 134 } | 139 } |
| 135 if (is_msan) { | 140 if (is_msan) { |
| 136 msan_blacklist_path = | 141 msan_blacklist_path = |
| 137 rebase_path("//tools/msan/blacklist.txt", root_build_dir) | 142 rebase_path("//tools/msan/blacklist.txt", root_build_dir) |
| 138 cflags += [ | 143 cflags += [ |
| 139 "-fsanitize=memory", | 144 "-fsanitize=memory", |
| 140 "-fsanitize-memory-track-origins=$msan_track_origins", | 145 "-fsanitize-memory-track-origins=$msan_track_origins", |
| 141 "-fsanitize-blacklist=$msan_blacklist_path", | 146 "-fsanitize-blacklist=$msan_blacklist_path", |
| 147 |
| 148 # TODO(eugenis): Remove when msan migrates to new ABI (crbug.com/560589)
. |
| 149 "-fPIC", |
| 142 ] | 150 ] |
| 143 } | 151 } |
| 144 if (is_ubsan) { | 152 if (is_ubsan) { |
| 145 ubsan_blacklist_path = | 153 ubsan_blacklist_path = |
| 146 rebase_path("//tools/ubsan/blacklist.txt", root_build_dir) | 154 rebase_path("//tools/ubsan/blacklist.txt", root_build_dir) |
| 147 cflags += [ | 155 cflags += [ |
| 148 # Yasm dies with an "Illegal instruction" error when bounds checking is | 156 # Yasm dies with an "Illegal instruction" error when bounds checking is |
| 149 # enabled. See http://crbug.com/489901 | 157 # enabled. See http://crbug.com/489901 |
| 150 # "-fsanitize=bounds", | 158 # "-fsanitize=bounds", |
| 151 "-fsanitize=float-divide-by-zero", | 159 "-fsanitize=float-divide-by-zero", |
| (...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 242 | 250 |
| 243 config("default_sanitizer_coverage_flags") { | 251 config("default_sanitizer_coverage_flags") { |
| 244 cflags = [] | 252 cflags = [] |
| 245 | 253 |
| 246 if (use_sanitizer_coverage) { | 254 if (use_sanitizer_coverage) { |
| 247 # FIXME: make this configurable. | 255 # FIXME: make this configurable. |
| 248 cflags += | 256 cflags += |
| 249 [ "-fsanitize-coverage=edge,indirect-calls,8bit-counters,trace-cmp" ] | 257 [ "-fsanitize-coverage=edge,indirect-calls,8bit-counters,trace-cmp" ] |
| 250 } | 258 } |
| 251 } | 259 } |
| OLD | NEW |