Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(83)

Side by Side Diff: build/common.gypi

Issue 1543803005: Added an integration test for kasko hang reports (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 # IMPORTANT: 5 # IMPORTANT:
6 # Please don't directly include this file if you are building via gyp_chromium, 6 # Please don't directly include this file if you are building via gyp_chromium,
7 # since gyp_chromium is automatically forcing its inclusion. 7 # since gyp_chromium is automatically forcing its inclusion.
8 { 8 {
9 # Variables expected to be overriden on the GYP command line (-D) or by 9 # Variables expected to be overriden on the GYP command line (-D) or by
10 # ~/.gyp/include.gypi. 10 # ~/.gyp/include.gypi.
(...skipping 464 matching lines...) Expand 10 before | Expand all | Expand 10 after
475 # dynamic tools (like ASan). 475 # dynamic tools (like ASan).
476 'use_sanitizer_options%': 0, 476 'use_sanitizer_options%': 0,
477 477
478 # Enable building with SyzyAsan. 478 # Enable building with SyzyAsan.
479 # See https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo 479 # See https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo
480 'syzyasan%': 0, 480 'syzyasan%': 0,
481 481
482 # Enable crash reporting via Kasko. 482 # Enable crash reporting via Kasko.
483 'kasko%': 0, 483 'kasko%': 0,
484 484
485 # Enable hang reports in Kasko. Requires Kasko to be enabled.
486 'kasko_hang_reports%': 0,
487
485 # Enable building with LSan (Clang's -fsanitize=leak option). 488 # Enable building with LSan (Clang's -fsanitize=leak option).
486 # -fsanitize=leak only works with clang, but lsan=1 implies clang=1 489 # -fsanitize=leak only works with clang, but lsan=1 implies clang=1
487 # See https://sites.google.com/a/chromium.org/dev/developers/testing/leaks anitizer 490 # See https://sites.google.com/a/chromium.org/dev/developers/testing/leaks anitizer
488 'lsan%': 0, 491 'lsan%': 0,
489 492
490 # Enable building with TSan (Clang's -fsanitize=thread option). 493 # Enable building with TSan (Clang's -fsanitize=thread option).
491 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1 494 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1
492 # See http://clang.llvm.org/docs/ThreadSanitizer.html 495 # See http://clang.llvm.org/docs/ThreadSanitizer.html
493 'tsan%': 0, 496 'tsan%': 0,
494 'tsan_blacklist%': '<(PRODUCT_DIR)/../../tools/memory/tsan_v2/ignores.txt' , 497 'tsan_blacklist%': '<(PRODUCT_DIR)/../../tools/memory/tsan_v2/ignores.txt' ,
(...skipping 687 matching lines...) Expand 10 before | Expand all | Expand 10 after
1182 'clang_use_chrome_plugins%': '<(clang_use_chrome_plugins)', 1185 'clang_use_chrome_plugins%': '<(clang_use_chrome_plugins)',
1183 'mac_want_real_dsym%': '<(mac_want_real_dsym)', 1186 'mac_want_real_dsym%': '<(mac_want_real_dsym)',
1184 'asan%': '<(asan)', 1187 'asan%': '<(asan)',
1185 'asan_blacklist%': '<(asan_blacklist)', 1188 'asan_blacklist%': '<(asan_blacklist)',
1186 'asan_coverage%': '<(asan_coverage)', 1189 'asan_coverage%': '<(asan_coverage)',
1187 'sanitizer_coverage%': '<(sanitizer_coverage)', 1190 'sanitizer_coverage%': '<(sanitizer_coverage)',
1188 'asan_field_padding%': '<(asan_field_padding)', 1191 'asan_field_padding%': '<(asan_field_padding)',
1189 'use_sanitizer_options%': '<(use_sanitizer_options)', 1192 'use_sanitizer_options%': '<(use_sanitizer_options)',
1190 'syzyasan%': '<(syzyasan)', 1193 'syzyasan%': '<(syzyasan)',
1191 'kasko%': '<(kasko)', 1194 'kasko%': '<(kasko)',
1195 'kasko_hang_reports%': '<(kasko_hang_reports)',
1192 'syzygy_optimize%': '<(syzygy_optimize)', 1196 'syzygy_optimize%': '<(syzygy_optimize)',
1193 'lsan%': '<(lsan)', 1197 'lsan%': '<(lsan)',
1194 'msan%': '<(msan)', 1198 'msan%': '<(msan)',
1195 'msan_blacklist%': '<(msan_blacklist)', 1199 'msan_blacklist%': '<(msan_blacklist)',
1196 'msan_track_origins%': '<(msan_track_origins)', 1200 'msan_track_origins%': '<(msan_track_origins)',
1197 'tsan%': '<(tsan)', 1201 'tsan%': '<(tsan)',
1198 'tsan_blacklist%': '<(tsan_blacklist)', 1202 'tsan_blacklist%': '<(tsan_blacklist)',
1199 'ubsan%': '<(ubsan)', 1203 'ubsan%': '<(ubsan)',
1200 'ubsan_blacklist%': '<(ubsan_blacklist)', 1204 'ubsan_blacklist%': '<(ubsan_blacklist)',
1201 'ubsan_vptr_blacklist%': '<(ubsan_vptr_blacklist)', 1205 'ubsan_vptr_blacklist%': '<(ubsan_vptr_blacklist)',
(...skipping 1687 matching lines...) Expand 10 before | Expand all | Expand 10 after
2889 'MEMORY_SANITIZER_INITIAL_SIZE', 2893 'MEMORY_SANITIZER_INITIAL_SIZE',
2890 ], 2894 ],
2891 }], 2895 }],
2892 ['kasko==1', { 2896 ['kasko==1', {
2893 'defines': [ 2897 'defines': [
2894 'KASKO', 2898 'KASKO',
2895 ], 2899 ],
2896 'include_dirs': [ 2900 'include_dirs': [
2897 '<(DEPTH)/third_party/kasko/include', 2901 '<(DEPTH)/third_party/kasko/include',
2898 ], 2902 ],
2903 'conditions': [
2904 ['kasko_hang_reports==1', {
2905 'defines': [
2906 'KASKO_HANG_REPORTS',
2907 ],
2908 }],
2909 ],
2899 }], 2910 }],
2900 ['OS=="win"', { 2911 ['OS=="win"', {
2901 'defines': [ 2912 'defines': [
2902 '__STD_C', 2913 '__STD_C',
2903 '_CRT_SECURE_NO_DEPRECATE', 2914 '_CRT_SECURE_NO_DEPRECATE',
2904 '_SCL_SECURE_NO_DEPRECATE', 2915 '_SCL_SECURE_NO_DEPRECATE',
2905 # This define is required to pull in the new Win 10 interfaces from 2916 # This define is required to pull in the new Win 10 interfaces from
2906 # system headers like ShObjIdl.h. 2917 # system headers like ShObjIdl.h.
2907 'NTDDI_VERSION=0x0A000000', 2918 'NTDDI_VERSION=0x0A000000',
2908 # This is required for ATL to use XP-safe versions of its functions. 2919 # This is required for ATL to use XP-safe versions of its functions.
(...skipping 3508 matching lines...) Expand 10 before | Expand all | Expand 10 after
6417 # settings in target dicts. SYMROOT is a special case, because many other 6428 # settings in target dicts. SYMROOT is a special case, because many other
6418 # Xcode variables depend on it, including variables such as 6429 # Xcode variables depend on it, including variables such as
6419 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something 6430 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something
6420 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the 6431 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the
6421 # files to appear (when present) in the UI as actual files and not red 6432 # files to appear (when present) in the UI as actual files and not red
6422 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR, 6433 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR,
6423 # and therefore SYMROOT, needs to be set at the project level. 6434 # and therefore SYMROOT, needs to be set at the project level.
6424 'SYMROOT': '<(DEPTH)/xcodebuild', 6435 'SYMROOT': '<(DEPTH)/xcodebuild',
6425 }, 6436 },
6426 } 6437 }
OLDNEW
« no previous file with comments | « no previous file | chrome/app/main_dll_loader_win.cc » ('j') | chrome/test/kasko/hang_watcher_integration_test.py » ('J')

Powered by Google App Engine
This is Rietveld 408576698