Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(94)

Side by Side Diff: build/config/sanitizers/sanitizers.gni

Issue 2103683002: Add GN rules for building instrumented libraries. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright 2015 The Chromium Authors. All rights reserved. 1 # Copyright 2015 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 declare_args() { 5 declare_args() {
6 # Compile for Address Sanitizer to find memory bugs. 6 # Compile for Address Sanitizer to find memory bugs.
7 is_asan = false 7 is_asan = false
8 8
9 # Compile for Leak Sanitizer to find leaks. 9 # Compile for Leak Sanitizer to find leaks.
10 is_lsan = false 10 is_lsan = false
(...skipping 20 matching lines...) Expand all
31 # Track where uninitialized memory originates from. From fastest to slowest: 31 # Track where uninitialized memory originates from. From fastest to slowest:
32 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the 32 # 0 - no tracking, 1 - track only the initial allocation site, 2 - track the
33 # chain of stores leading from allocation site to use site. 33 # chain of stores leading from allocation site to use site.
34 msan_track_origins = 2 34 msan_track_origins = 2
35 35
36 # Use dynamic libraries instrumented by one of the sanitizers instead of the 36 # Use dynamic libraries instrumented by one of the sanitizers instead of the
37 # standard system libraries. Set this flag to download prebuilt binaries from 37 # standard system libraries. Set this flag to download prebuilt binaries from
38 # GCS. 38 # GCS.
39 use_prebuilt_instrumented_libraries = false 39 use_prebuilt_instrumented_libraries = false
40 40
41 # Use dynamic libraries instrumented by one of the sanitizers instead of the
42 # standard system libraries. Set this flag to build the libraries from source.
43 use_locally_built_instrumented_libraries = false
44
41 # Enable building with SyzyAsan which can find certain types of memory 45 # Enable building with SyzyAsan which can find certain types of memory
42 # errors. Only works on Windows. See 46 # errors. Only works on Windows. See
43 # https://github.com/google/syzygy/wiki/SyzyASanHowTo 47 # https://github.com/google/syzygy/wiki/SyzyASanHowTo
44 is_syzyasan = false 48 is_syzyasan = false
45 49
46 # Compile with Control Flow Integrity to protect virtual calls and casts. 50 # Compile with Control Flow Integrity to protect virtual calls and casts.
47 # See http://clang.llvm.org/docs/ControlFlowIntegrity.html 51 # See http://clang.llvm.org/docs/ControlFlowIntegrity.html
48 # 52 #
49 # TODO(pcc): Remove this flag if/when CFI is enabled in official builds. 53 # TODO(pcc): Remove this flag if/when CFI is enabled in official builds.
50 is_cfi = false 54 is_cfi = false
(...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after
121 # 125 #
122 # If you find a use-case where you want to compile a sanitizer in debug mode 126 # If you find a use-case where you want to compile a sanitizer in debug mode
123 # and have verified it works, ask brettw and we can consider removing it from 127 # and have verified it works, ask brettw and we can consider removing it from
124 # this condition. We may also be able to find another way to enable your case 128 # this condition. We may also be able to find another way to enable your case
125 # without having people accidentally get broken builds by compiling an 129 # without having people accidentally get broken builds by compiling an
126 # unsupported or unadvisable configurations. 130 # unsupported or unadvisable configurations.
127 # 131 #
128 # For one-off testing, just comment this assertion out. 132 # For one-off testing, just comment this assertion out.
129 assert(!is_debug || !(is_msan || is_ubsan || is_ubsan_null || is_ubsan_vptr), 133 assert(!is_debug || !(is_msan || is_ubsan || is_ubsan_null || is_ubsan_vptr),
130 "Sanitizers should generally be used in release (set is_debug=false).") 134 "Sanitizers should generally be used in release (set is_debug=false).")
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698