| OLD | NEW | 
|---|
| 1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. | 
| 2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be | 
| 3 # found in the LICENSE file. | 3 # found in the LICENSE file. | 
| 4 | 4 | 
| 5 import("//build_overrides/build.gni") | 5 import("//build_overrides/build.gni") | 
| 6 import("//build/config/chrome_build.gni") | 6 import("//build/config/chrome_build.gni") | 
| 7 import("//build/config/chromecast_build.gni") | 7 import("//build/config/chromecast_build.gni") | 
| 8 import("//build/config/clang/clang.gni") | 8 import("//build/config/clang/clang.gni") | 
| 9 import("//build/config/sanitizers/sanitizers.gni") | 9 import("//build/config/sanitizers/sanitizers.gni") | 
| 10 import("//build/toolchain/toolchain.gni") | 10 import("//build/toolchain/toolchain.gni") | 
| (...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
| 102         "{{bundle_executable_dir}}/{{source_file_part}}", | 102         "{{bundle_executable_dir}}/{{source_file_part}}", | 
| 103       ] | 103       ] | 
| 104       public_deps = [ | 104       public_deps = [ | 
| 105         ":copy_asan_runtime", | 105         ":copy_asan_runtime", | 
| 106       ] | 106       ] | 
| 107     } | 107     } | 
| 108   } | 108   } | 
| 109 } | 109 } | 
| 110 | 110 | 
| 111 config("sanitizer_options_link_helper") { | 111 config("sanitizer_options_link_helper") { | 
| 112   if (is_mac) { | 112   if (is_mac || is_ios) { | 
| 113     ldflags = [ "-Wl,-U,_sanitizer_options_link_helper" ] | 113     ldflags = [ "-Wl,-U,_sanitizer_options_link_helper" ] | 
| 114   } else if (!is_win) { | 114   } else if (!is_win) { | 
| 115     ldflags = [ "-Wl,-u_sanitizer_options_link_helper" ] | 115     ldflags = [ "-Wl,-u_sanitizer_options_link_helper" ] | 
| 116   } | 116   } | 
| 117 } | 117 } | 
| 118 | 118 | 
| 119 static_library("options_sources") { | 119 static_library("options_sources") { | 
| 120   # This is a static_library instead of a source_set, as it shouldn't be | 120   # This is a static_library instead of a source_set, as it shouldn't be | 
| 121   # unconditionally linked into targets. | 121   # unconditionally linked into targets. | 
| 122   visibility = [ | 122   visibility = [ | 
| (...skipping 378 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
| 501 # This allows to selectively disable ubsan_vptr, when needed. In particular, | 501 # This allows to selectively disable ubsan_vptr, when needed. In particular, | 
| 502 # if some third_party code is required to be compiled without rtti, which | 502 # if some third_party code is required to be compiled without rtti, which | 
| 503 # is a requirement for ubsan_vptr. | 503 # is a requirement for ubsan_vptr. | 
| 504 config("default_sanitizer_flags_but_ubsan_vptr") { | 504 config("default_sanitizer_flags_but_ubsan_vptr") { | 
| 505   configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] | 505   configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] | 
| 506 } | 506 } | 
| 507 | 507 | 
| 508 config("default_sanitizer_flags_but_coverage") { | 508 config("default_sanitizer_flags_but_coverage") { | 
| 509   configs = all_sanitizer_configs - [ ":coverage_flags" ] | 509   configs = all_sanitizer_configs - [ ":coverage_flags" ] | 
| 510 } | 510 } | 
| OLD | NEW | 
|---|