OLD | NEW |
---|---|
1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 import("//build/config/chrome_build.gni") | 5 import("//build/config/chrome_build.gni") |
6 import("//build/config/chromecast_build.gni") | 6 import("//build/config/chromecast_build.gni") |
7 import("//build/config/clang/clang.gni") | 7 import("//build/config/clang/clang.gni") |
8 import("//build/config/sanitizers/sanitizers.gni") | 8 import("//build/config/sanitizers/sanitizers.gni") |
9 import("//build/toolchain/toolchain.gni") | 9 import("//build/toolchain/toolchain.gni") |
10 | 10 |
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
73 ] | 73 ] |
74 | 74 |
75 public_deps = [ | 75 public_deps = [ |
76 ":asan_runtime_bundle_data", | 76 ":asan_runtime_bundle_data", |
77 ] | 77 ] |
78 } | 78 } |
79 } | 79 } |
80 } | 80 } |
81 | 81 |
82 if (is_mac && using_sanitizer) { | 82 if (is_mac && using_sanitizer) { |
83 copy("copy_asan_runtime") { | 83 copy("copy_asan_runtime") { |
Dirk Pranke
2016/07/30 00:57:38
I think you need to make this rule work as well on
| |
84 sources = [ | 84 sources = [ |
85 "$clang_base_path/lib/clang/$clang_version/lib/darwin/libclang_rt.asan_osx _dynamic.dylib", | 85 "$clang_base_path/lib/clang/$clang_version/lib/darwin/libclang_rt.asan_osx _dynamic.dylib", |
86 ] | 86 ] |
87 outputs = [ | 87 outputs = [ |
88 "$root_out_dir/{{source_file_part}}", | 88 "$root_out_dir/{{source_file_part}}", |
89 ] | 89 ] |
90 } | 90 } |
91 | 91 |
92 bundle_data("asan_runtime_bundle_data") { | 92 bundle_data("asan_runtime_bundle_data") { |
93 sources = get_target_outputs(":copy_asan_runtime") | 93 sources = get_target_outputs(":copy_asan_runtime") |
(...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
234 rebase_path("//tools/memory/asan/blacklist_win.txt", | 234 rebase_path("//tools/memory/asan/blacklist_win.txt", |
235 root_build_dir) ] | 235 root_build_dir) ] |
236 } else { | 236 } else { |
237 # TODO(rnk): Remove this as discussed in http://crbug.com/427202. | 237 # TODO(rnk): Remove this as discussed in http://crbug.com/427202. |
238 cflags += | 238 cflags += |
239 [ "-fsanitize-blacklist=" + | 239 [ "-fsanitize-blacklist=" + |
240 rebase_path("//tools/memory/asan/blacklist.txt", root_build_dir) ] | 240 rebase_path("//tools/memory/asan/blacklist.txt", root_build_dir) ] |
241 } | 241 } |
242 | 242 |
243 if (is_win) { | 243 if (is_win) { |
244 assert(current_cpu == "x86", "WinASan is 32-bit only currently") | 244 if (target_cpu == "x64") { |
245 if (is_component_build) { | 245 # Windows 64-bit. |
246 libs = [ | 246 if (is_component_build) { |
247 "clang_rt.asan_dynamic-i386.lib", | 247 libs = [ |
248 "clang_rt.asan_dynamic_runtime_thunk-i386.lib", | 248 "clang_rt.asan_dynamic-x86_64.lib", |
249 ] | 249 "clang_rt.asan_dynamic_runtime_thunk-x86_64.lib", |
250 ] | |
251 } else { | |
252 # TODO(etienneb): DLLs in the non-component build should link against | |
253 # clang_rt.asan_dll_thunk-x86_64.lib instead. | |
254 libs = [ "clang_rt.asan-x86_64.lib" ] | |
255 } | |
250 } else { | 256 } else { |
251 # TODO(rnk): DLLs in the non-component build should link against | 257 assert(target_cpu == "x86", "WinASan unsupported architecture") |
252 # clang_rt.asan_dll_thunk-i386.lib instead. | 258 if (is_component_build) { |
253 libs = [ "clang_rt.asan-i386.lib" ] | 259 libs = [ |
260 "clang_rt.asan_dynamic-i386.lib", | |
261 "clang_rt.asan_dynamic_runtime_thunk-i386.lib", | |
262 ] | |
263 } else { | |
264 # TODO(etienneb): DLLs in the non-component build should link against | |
265 # clang_rt.asan_dll_thunk-i386.lib instead. | |
266 libs = [ "clang_rt.asan-i386.lib" ] | |
Dirk Pranke
2016/07/30 00:57:38
why not just change this to clang_rt.asan_dll_thun
| |
267 } | |
254 } | 268 } |
255 } | 269 } |
256 } | 270 } |
257 } | 271 } |
258 | 272 |
259 config("cfi_flags") { | 273 config("cfi_flags") { |
260 cflags = [] | 274 cflags = [] |
261 if (is_cfi && !is_nacl) { | 275 if (is_cfi && !is_nacl) { |
262 cfi_blacklist_path = | 276 cfi_blacklist_path = |
263 rebase_path("//tools/cfi/blacklist.txt", root_build_dir) | 277 rebase_path("//tools/cfi/blacklist.txt", root_build_dir) |
(...skipping 182 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
446 # This allows to selectively disable ubsan_vptr, when needed. In particular, | 460 # This allows to selectively disable ubsan_vptr, when needed. In particular, |
447 # if some third_party code is required to be compiled without rtti, which | 461 # if some third_party code is required to be compiled without rtti, which |
448 # is a requirement for ubsan_vptr. | 462 # is a requirement for ubsan_vptr. |
449 config("default_sanitizer_flags_but_ubsan_vptr") { | 463 config("default_sanitizer_flags_but_ubsan_vptr") { |
450 configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] | 464 configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] |
451 } | 465 } |
452 | 466 |
453 config("default_sanitizer_flags_but_coverage") { | 467 config("default_sanitizer_flags_but_coverage") { |
454 configs = all_sanitizer_configs - [ ":coverage_flags" ] | 468 configs = all_sanitizer_configs - [ ":coverage_flags" ] |
455 } | 469 } |
OLD | NEW |