Chromium Code Reviews| Index: BUILD.gn |
| diff --git a/BUILD.gn b/BUILD.gn |
| index 27c1fae120a2e5d7301560245f8a258f40289bc4..c03487e9567b63c7986f4a20feb73008108004ce 100644 |
| --- a/BUILD.gn |
| +++ b/BUILD.gn |
| @@ -70,13 +70,20 @@ declare_args() { |
| v8_random_seed = "314159265" |
| v8_toolset_for_shell = "host" |
| -if (is_msan) { |
| +declare_args() { |
| # Running the V8-generated code on an ARM simulator is a powerful hack that |
| - # allows the tool to see the memory accesses from JITted code. Without this |
| - # flag, JS code causes false positive reports from MSan. |
| - v8_target_arch = "arm64" |
| -} else { |
| - v8_target_arch = target_cpu |
| + # allows sanitizers and other tools to see the memory accesses from |
| + # JITted code. |
| + v8_target_arch = "" |
|
Michael Achenbach
2016/05/24 06:39:32
I've recently added this to v8's overrides:
https:
|
| +} |
| + |
| +if (v8_target_arch == "") { |
| + if (is_msan) { |
| + # Without this flag, JS code causes false positive reports from MSan. |
| + v8_target_arch = "arm64" |
| + } else { |
| + v8_target_arch = target_cpu |
| + } |
| } |
| if (v8_use_snapshot && v8_use_external_startup_data) { |