OLD | NEW |
1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 import("//build/config/chrome_build.gni") | 5 import("//build/config/chrome_build.gni") |
6 import("//build/config/chromecast_build.gni") | 6 import("//build/config/chromecast_build.gni") |
7 import("//build/config/clang/clang.gni") | 7 import("//build/config/clang/clang.gni") |
8 import("//build/config/sanitizers/sanitizers.gni") | 8 import("//build/config/sanitizers/sanitizers.gni") |
9 import("//build/toolchain/toolchain.gni") | 9 import("//build/toolchain/toolchain.gni") |
10 | 10 |
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
129 # Don't compile this target with any sanitizer code. It can be called from | 129 # Don't compile this target with any sanitizer code. It can be called from |
130 # the sanitizer runtimes, so instrumenting these functions could cause | 130 # the sanitizer runtimes, so instrumenting these functions could cause |
131 # recursive calls into the runtime if there is an error. | 131 # recursive calls into the runtime if there is an error. |
132 configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ] | 132 configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ] |
133 | 133 |
134 if (is_asan) { | 134 if (is_asan) { |
135 sources += [ "//build/sanitizers/asan_suppressions.cc" ] | 135 sources += [ "//build/sanitizers/asan_suppressions.cc" ] |
136 } | 136 } |
137 | 137 |
138 if (is_lsan) { | 138 if (is_lsan) { |
139 sources += [ "//build/sanitizers/lsan_suppressions.cc" ] | 139 sources += [ lsan_suppressions_file ] |
140 } | 140 } |
141 | 141 |
142 if (is_tsan) { | 142 if (is_tsan) { |
143 sources += [ "//build/sanitizers/tsan_suppressions.cc" ] | 143 sources += [ tsan_suppressions_file ] |
144 } | 144 } |
145 } | 145 } |
146 | 146 |
147 # Applies linker flags necessary when either :deps or :default_sanitizer_flags | 147 # Applies linker flags necessary when either :deps or :default_sanitizer_flags |
148 # are used. | 148 # are used. |
149 config("default_sanitizer_ldflags") { | 149 config("default_sanitizer_ldflags") { |
150 visibility = [ | 150 visibility = [ |
151 ":default_sanitizer_flags", | 151 ":default_sanitizer_flags", |
152 ":deps", | 152 ":deps", |
153 ] | 153 ] |
(...skipping 345 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
499 # This allows to selectively disable ubsan_vptr, when needed. In particular, | 499 # This allows to selectively disable ubsan_vptr, when needed. In particular, |
500 # if some third_party code is required to be compiled without rtti, which | 500 # if some third_party code is required to be compiled without rtti, which |
501 # is a requirement for ubsan_vptr. | 501 # is a requirement for ubsan_vptr. |
502 config("default_sanitizer_flags_but_ubsan_vptr") { | 502 config("default_sanitizer_flags_but_ubsan_vptr") { |
503 configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] | 503 configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] |
504 } | 504 } |
505 | 505 |
506 config("default_sanitizer_flags_but_coverage") { | 506 config("default_sanitizer_flags_but_coverage") { |
507 configs = all_sanitizer_configs - [ ":coverage_flags" ] | 507 configs = all_sanitizer_configs - [ ":coverage_flags" ] |
508 } | 508 } |
OLD | NEW |