OLD | NEW |
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 # Use of this source code is governed by a BSD-style license that can be | 2 # Use of this source code is governed by a BSD-style license that can be |
3 # found in the LICENSE file. | 3 # found in the LICENSE file. |
4 | 4 |
5 # IMPORTANT: | 5 # IMPORTANT: |
6 # Please don't directly include this file if you are building via gyp_chromium, | 6 # Please don't directly include this file if you are building via gyp_chromium, |
7 # since gyp_chromium is automatically forcing its inclusion. | 7 # since gyp_chromium is automatically forcing its inclusion. |
8 { | 8 { |
9 # Variables expected to be overriden on the GYP command line (-D) or by | 9 # Variables expected to be overriden on the GYP command line (-D) or by |
10 # ~/.gyp/include.gypi. | 10 # ~/.gyp/include.gypi. |
(...skipping 369 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
380 # If this is set, the clang plugins used on the buildbot will be used. | 380 # If this is set, the clang plugins used on the buildbot will be used. |
381 # Run tools/clang/scripts/update.sh to make sure they are compiled. | 381 # Run tools/clang/scripts/update.sh to make sure they are compiled. |
382 # This causes 'clang_chrome_plugins_flags' to be set. | 382 # This causes 'clang_chrome_plugins_flags' to be set. |
383 # Has no effect if 'clang' is not set as well. | 383 # Has no effect if 'clang' is not set as well. |
384 'clang_use_chrome_plugins%': 1, | 384 'clang_use_chrome_plugins%': 1, |
385 | 385 |
386 # Enable building with ASAN (Clang's -fsanitize=address option). | 386 # Enable building with ASAN (Clang's -fsanitize=address option). |
387 # -fsanitize=address only works with clang, but asan=1 implies clang=1 | 387 # -fsanitize=address only works with clang, but asan=1 implies clang=1 |
388 # See https://sites.google.com/a/chromium.org/dev/developers/testing/addre
sssanitizer | 388 # See https://sites.google.com/a/chromium.org/dev/developers/testing/addre
sssanitizer |
389 'asan%': 0, | 389 'asan%': 0, |
390 'asan_blacklist%': '<(PRODUCT_DIR)/../../tools/memory/asan/blacklist.txt', | 390 'asan_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/memory/asan/blacklist.
txt', |
391 # Enable coverage gathering instrumentation in ASan. This flag also | 391 # Enable coverage gathering instrumentation in ASan. This flag also |
392 # controls coverage granularity (1 for function-level coverage, 2 for | 392 # controls coverage granularity (1 for function-level coverage, 2 for |
393 # block-level coverage). | 393 # block-level coverage). |
394 'asan_coverage%': 0, | 394 'asan_coverage%': 0, |
395 # Enable intra-object-overflow detection in ASan (experimental). | 395 # Enable intra-object-overflow detection in ASan (experimental). |
396 'asan_field_padding%': 0, | 396 'asan_field_padding%': 0, |
397 | 397 |
398 # Enable Chromium overrides of the default configurations for various | 398 # Enable Chromium overrides of the default configurations for various |
399 # dynamic tools (like ASan). | 399 # dynamic tools (like ASan). |
400 'use_sanitizer_options%': 0, | 400 'use_sanitizer_options%': 0, |
401 | 401 |
402 # Enable building with SyzyAsan. | 402 # Enable building with SyzyAsan. |
403 # See https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo | 403 # See https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo |
404 'syzyasan%': 0, | 404 'syzyasan%': 0, |
405 | 405 |
406 # Enable building with LSan (Clang's -fsanitize=leak option). | 406 # Enable building with LSan (Clang's -fsanitize=leak option). |
407 # -fsanitize=leak only works with clang, but lsan=1 implies clang=1 | 407 # -fsanitize=leak only works with clang, but lsan=1 implies clang=1 |
408 # See https://sites.google.com/a/chromium.org/dev/developers/testing/leaks
anitizer | 408 # See https://sites.google.com/a/chromium.org/dev/developers/testing/leaks
anitizer |
409 'lsan%': 0, | 409 'lsan%': 0, |
410 | 410 |
411 # Enable building with TSan (Clang's -fsanitize=thread option). | 411 # Enable building with TSan (Clang's -fsanitize=thread option). |
412 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1 | 412 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1 |
413 # See http://clang.llvm.org/docs/ThreadSanitizer.html | 413 # See http://clang.llvm.org/docs/ThreadSanitizer.html |
414 'tsan%': 0, | 414 'tsan%': 0, |
415 'tsan_blacklist%': '<(PRODUCT_DIR)/../../tools/memory/tsan_v2/ignores.txt'
, | 415 'tsan_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/memory/tsan_v2/ignores
.txt', |
416 | 416 |
417 # Enable building with MSan (Clang's -fsanitize=memory option). | 417 # Enable building with MSan (Clang's -fsanitize=memory option). |
418 # MemorySanitizer only works with clang, but msan=1 implies clang=1 | 418 # MemorySanitizer only works with clang, but msan=1 implies clang=1 |
419 # See http://clang.llvm.org/docs/MemorySanitizer.html | 419 # See http://clang.llvm.org/docs/MemorySanitizer.html |
420 'msan%': 0, | 420 'msan%': 0, |
421 'msan_blacklist%': '<(PRODUCT_DIR)/../../tools/msan/blacklist.txt', | 421 'msan_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/msan/blacklist.txt', |
422 # Track where uninitialized memory originates from. From fastest to | 422 # Track where uninitialized memory originates from. From fastest to |
423 # slowest: 0 - no tracking, 1 - track only the initial allocation site, 2 | 423 # slowest: 0 - no tracking, 1 - track only the initial allocation site, 2 |
424 # - track the chain of stores leading from allocation site to use site. | 424 # - track the chain of stores leading from allocation site to use site. |
425 'msan_track_origins%': 1, | 425 'msan_track_origins%': 1, |
426 | 426 |
427 # Enable building with UBSan (Clang's -fsanitize=undefined option). | 427 # Enable building with UBSan (Clang's -fsanitize=undefined option). |
428 # -fsanitize=undefined only works with clang, but ubsan=1 implies clang=1 | 428 # -fsanitize=undefined only works with clang, but ubsan=1 implies clang=1 |
429 # See http://clang.llvm.org/docs/UsersManual.html | 429 # See http://clang.llvm.org/docs/UsersManual.html |
430 'ubsan%': 0, | 430 'ubsan%': 0, |
431 | 431 |
432 # Enable building with UBsan's vptr (Clang's -fsanitize=vptr option). | 432 # Enable building with UBsan's vptr (Clang's -fsanitize=vptr option). |
433 # -fsanitize=vptr only works with clang, but ubsan_vptr=1 implies clang=1 | 433 # -fsanitize=vptr only works with clang, but ubsan_vptr=1 implies clang=1 |
434 'ubsan_vptr%': 0, | 434 'ubsan_vptr%': 0, |
435 'ubsan_vptr_blacklist%': '<(PRODUCT_DIR)/../../tools/ubsan_vptr/blacklist.
txt', | 435 'ubsan_vptr_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/ubsan_vptr/black
list.txt', |
436 | 436 |
437 # Use the dynamic libraries instrumented by one of the sanitizers | 437 # Use the dynamic libraries instrumented by one of the sanitizers |
438 # instead of the standard system libraries. | 438 # instead of the standard system libraries. |
439 'use_instrumented_libraries%': 0, | 439 'use_instrumented_libraries%': 0, |
440 | 440 |
441 # Use libc++ (third_party/libc++ and third_party/libc++abi) instead of | 441 # Use libc++ (third_party/libc++ and third_party/libc++abi) instead of |
442 # stdlibc++ as standard library. This is intended to use for instrumented | 442 # stdlibc++ as standard library. This is intended to use for instrumented |
443 # builds. | 443 # builds. |
444 'use_custom_libcxx%': 0, | 444 'use_custom_libcxx%': 0, |
445 | 445 |
(...skipping 5392 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
5838 # settings in target dicts. SYMROOT is a special case, because many other | 5838 # settings in target dicts. SYMROOT is a special case, because many other |
5839 # Xcode variables depend on it, including variables such as | 5839 # Xcode variables depend on it, including variables such as |
5840 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something | 5840 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something |
5841 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the | 5841 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the |
5842 # files to appear (when present) in the UI as actual files and not red | 5842 # files to appear (when present) in the UI as actual files and not red |
5843 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR, | 5843 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR, |
5844 # and therefore SYMROOT, needs to be set at the project level. | 5844 # and therefore SYMROOT, needs to be set at the project level. |
5845 'SYMROOT': '<(DEPTH)/xcodebuild', | 5845 'SYMROOT': '<(DEPTH)/xcodebuild', |
5846 }, | 5846 }, |
5847 } | 5847 } |
OLD | NEW |