OLD | NEW |
1 # Copyright 2015 The Chromium Authors. All rights reserved. | 1 # Copyright 2015 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 declare_args() { | 5 declare_args() { |
6 # Compile for Address Sanitizer to find memory bugs. | 6 # Compile for Address Sanitizer to find memory bugs. |
7 is_asan = false | 7 is_asan = false |
8 | 8 |
9 # Compile for Leak Sanitizer to find leaks. | 9 # Compile for Leak Sanitizer to find leaks. |
10 is_lsan = false | 10 is_lsan = false |
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
71 # Helper variable for testing builds with disabled libfuzzer. | 71 # Helper variable for testing builds with disabled libfuzzer. |
72 # Not for client use. | 72 # Not for client use. |
73 disable_libfuzzer = false | 73 disable_libfuzzer = false |
74 | 74 |
75 # Value for -fsanitize-coverage flag. Setting this causes | 75 # Value for -fsanitize-coverage flag. Setting this causes |
76 # use_sanitizer_coverage to be enabled. | 76 # use_sanitizer_coverage to be enabled. |
77 # Default value when unset and use_afl=true: | 77 # Default value when unset and use_afl=true: |
78 # trace-pc | 78 # trace-pc |
79 # Default value when unset and use_sanitizer_coverage=true: | 79 # Default value when unset and use_sanitizer_coverage=true: |
80 # edge,indirect-calls,8bit-counters | 80 # edge,indirect-calls,8bit-counters |
81 | |
82 sanitizer_coverage_flags = "" | 81 sanitizer_coverage_flags = "" |
83 } | 82 } |
84 | 83 |
85 # Args that are in turn dependent on other args must be in a separate | 84 # Args that are in turn dependent on other args must be in a separate |
86 # declare_args block. User overrides are only applied at the end of a | 85 # declare_args block. User overrides are only applied at the end of a |
87 # declare_args block. | 86 # declare_args block. |
88 declare_args() { | 87 declare_args() { |
89 # Use libc++ (buildtools/third_party/libc++ and | 88 # Use libc++ (buildtools/third_party/libc++ and |
90 # buildtools/third_party/libc++abi) instead of stdlibc++ as standard library. | 89 # buildtools/third_party/libc++abi) instead of stdlibc++ as standard library. |
91 # This is intended to be used for instrumented builds. | 90 # This is intended to be used for instrumented builds. |
92 use_custom_libcxx = | 91 use_custom_libcxx = |
93 (is_asan && is_linux && !is_chromeos) || is_tsan || is_msan || is_ubsan || | 92 (is_asan && is_linux && !is_chromeos) || is_tsan || is_msan || is_ubsan || |
94 is_ubsan_security || use_libfuzzer || use_afl | 93 is_ubsan_security || use_libfuzzer || use_afl |
95 | 94 |
96 # Enable -fsanitize-coverage. | 95 # Enable -fsanitize-coverage. |
97 use_sanitizer_coverage = | 96 use_sanitizer_coverage = |
98 use_libfuzzer || use_afl || sanitizer_coverage_flags != "" | 97 use_libfuzzer || use_afl || sanitizer_coverage_flags != "" |
| 98 |
| 99 # Detect overflow/underflow for global objects. |
| 100 # |
| 101 # Android build relies on -Wl,--gc-sections removing unreachable code. |
| 102 # ASan instrumentation for globals inhibits this and results in a |
| 103 # library with unresolvable relocations. |
| 104 # TODO(eugenis): find a way to reenable this. |
| 105 # |
| 106 # Mac: http://crbug.com/352073 |
| 107 asan_globals = !is_android && !is_mac |
99 } | 108 } |
100 | 109 |
101 if (use_afl && sanitizer_coverage_flags == "") { | 110 if (use_afl && sanitizer_coverage_flags == "") { |
102 sanitizer_coverage_flags = "trace-pc" | 111 sanitizer_coverage_flags = "trace-pc" |
103 } else if (use_sanitizer_coverage && sanitizer_coverage_flags == "") { | 112 } else if (use_sanitizer_coverage && sanitizer_coverage_flags == "") { |
104 sanitizer_coverage_flags = "edge,indirect-calls,8bit-counters" | 113 sanitizer_coverage_flags = "edge,indirect-calls,8bit-counters" |
105 } | 114 } |
106 | 115 |
107 using_sanitizer = is_asan || is_lsan || is_tsan || is_msan || is_ubsan || | 116 using_sanitizer = is_asan || is_lsan || is_tsan || is_msan || is_ubsan || |
108 is_ubsan_null || is_ubsan_vptr || is_ubsan_security | 117 is_ubsan_null || is_ubsan_vptr || is_ubsan_security |
(...skipping 12 matching lines...) Expand all Loading... |
121 # | 130 # |
122 # If you find a use-case where you want to compile a sanitizer in debug mode | 131 # If you find a use-case where you want to compile a sanitizer in debug mode |
123 # and have verified it works, ask brettw and we can consider removing it from | 132 # and have verified it works, ask brettw and we can consider removing it from |
124 # this condition. We may also be able to find another way to enable your case | 133 # this condition. We may also be able to find another way to enable your case |
125 # without having people accidentally get broken builds by compiling an | 134 # without having people accidentally get broken builds by compiling an |
126 # unsupported or unadvisable configurations. | 135 # unsupported or unadvisable configurations. |
127 # | 136 # |
128 # For one-off testing, just comment this assertion out. | 137 # For one-off testing, just comment this assertion out. |
129 assert(!is_debug || !(is_msan || is_ubsan || is_ubsan_null || is_ubsan_vptr), | 138 assert(!is_debug || !(is_msan || is_ubsan || is_ubsan_null || is_ubsan_vptr), |
130 "Sanitizers should generally be used in release (set is_debug=false).") | 139 "Sanitizers should generally be used in release (set is_debug=false).") |
OLD | NEW |