OLD | NEW |
1 # Copyright 2014 The Chromium Authors. All rights reserved. | 1 # Copyright 2014 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 import("//build_overrides/build.gni") | 5 import("//build_overrides/build.gni") |
6 import("//build/config/chrome_build.gni") | 6 import("//build/config/chrome_build.gni") |
7 import("//build/config/chromecast_build.gni") | 7 import("//build/config/chromecast_build.gni") |
8 import("//build/config/clang/clang.gni") | 8 import("//build/config/clang/clang.gni") |
9 import("//build/config/sanitizers/sanitizers.gni") | 9 import("//build/config/sanitizers/sanitizers.gni") |
10 import("//build/toolchain/toolchain.gni") | 10 import("//build/toolchain/toolchain.gni") |
(...skipping 410 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
421 assert(is_linux, "tsan only supported on linux x86_64") | 421 assert(is_linux, "tsan only supported on linux x86_64") |
422 tsan_blacklist_path = | 422 tsan_blacklist_path = |
423 rebase_path("//tools/memory/tsan_v2/ignores.txt", root_build_dir) | 423 rebase_path("//tools/memory/tsan_v2/ignores.txt", root_build_dir) |
424 cflags = [ | 424 cflags = [ |
425 "-fsanitize=thread", | 425 "-fsanitize=thread", |
426 "-fsanitize-blacklist=$tsan_blacklist_path", | 426 "-fsanitize-blacklist=$tsan_blacklist_path", |
427 ] | 427 ] |
428 } | 428 } |
429 } | 429 } |
430 | 430 |
| 431 # UBSan is still in bring-up. Chrome builds with is_ubsan=true, but if you |
| 432 # set is_ubsan=true is_ubsan_no_recover = true, then many tests are still |
| 433 # failing. |
431 config("ubsan_flags") { | 434 config("ubsan_flags") { |
432 cflags = [] | 435 cflags = [] |
433 if (is_ubsan) { | 436 if (is_ubsan) { |
434 ubsan_blacklist_path = | 437 ubsan_blacklist_path = |
435 rebase_path("//tools/ubsan/blacklist.txt", root_build_dir) | 438 rebase_path("//tools/ubsan/blacklist.txt", root_build_dir) |
436 cflags += [ | 439 cflags += [ |
437 # Yasm dies with an "Illegal instruction" error when bounds checking is | 440 # Yasm dies with an "Illegal instruction" error when bounds checking is |
438 # enabled. See http://crbug.com/489901 | 441 # enabled. See http://crbug.com/489901 |
439 # "-fsanitize=bounds", | 442 # "-fsanitize=bounds", |
440 "-fsanitize=float-divide-by-zero", | 443 "-fsanitize=float-divide-by-zero", |
| 444 "-fsanitize=float-cast-overflow", |
441 "-fsanitize=integer-divide-by-zero", | 445 "-fsanitize=integer-divide-by-zero", |
442 "-fsanitize=null", | 446 "-fsanitize=null", |
443 "-fsanitize=object-size", | 447 "-fsanitize=object-size", |
444 "-fsanitize=return", | 448 "-fsanitize=return", |
445 "-fsanitize=returns-nonnull-attribute", | 449 "-fsanitize=returns-nonnull-attribute", |
446 "-fsanitize=shift-exponent", | 450 "-fsanitize=shift-exponent", |
447 "-fsanitize=signed-integer-overflow", | 451 "-fsanitize=signed-integer-overflow", |
448 "-fsanitize=unreachable", | 452 "-fsanitize=unreachable", |
449 "-fsanitize=vla-bound", | 453 "-fsanitize=vla-bound", |
450 "-fsanitize-blacklist=$ubsan_blacklist_path", | 454 "-fsanitize-blacklist=$ubsan_blacklist_path", |
(...skipping 84 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
535 # This allows to selectively disable ubsan_vptr, when needed. In particular, | 539 # This allows to selectively disable ubsan_vptr, when needed. In particular, |
536 # if some third_party code is required to be compiled without rtti, which | 540 # if some third_party code is required to be compiled without rtti, which |
537 # is a requirement for ubsan_vptr. | 541 # is a requirement for ubsan_vptr. |
538 config("default_sanitizer_flags_but_ubsan_vptr") { | 542 config("default_sanitizer_flags_but_ubsan_vptr") { |
539 configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] | 543 configs = all_sanitizer_configs - [ ":ubsan_vptr_flags" ] |
540 } | 544 } |
541 | 545 |
542 config("default_sanitizer_flags_but_coverage") { | 546 config("default_sanitizer_flags_but_coverage") { |
543 configs = all_sanitizer_configs - [ ":coverage_flags" ] | 547 configs = all_sanitizer_configs - [ ":coverage_flags" ] |
544 } | 548 } |
OLD | NEW |