Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(714)

Side by Side Diff: build/common.gypi

Issue 633333003: Use <(DEPTH) instead of <(PRODUCT_DIR)/../../ for sanitizer blacklist paths. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: use absolute paths Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 # IMPORTANT: 5 # IMPORTANT:
6 # Please don't directly include this file if you are building via gyp_chromium, 6 # Please don't directly include this file if you are building via gyp_chromium,
7 # since gyp_chromium is automatically forcing its inclusion. 7 # since gyp_chromium is automatically forcing its inclusion.
8 { 8 {
9 # Variables expected to be overriden on the GYP command line (-D) or by 9 # Variables expected to be overriden on the GYP command line (-D) or by
10 # ~/.gyp/include.gypi. 10 # ~/.gyp/include.gypi.
(...skipping 369 matching lines...) Expand 10 before | Expand all | Expand 10 after
380 # If this is set, the clang plugins used on the buildbot will be used. 380 # If this is set, the clang plugins used on the buildbot will be used.
381 # Run tools/clang/scripts/update.sh to make sure they are compiled. 381 # Run tools/clang/scripts/update.sh to make sure they are compiled.
382 # This causes 'clang_chrome_plugins_flags' to be set. 382 # This causes 'clang_chrome_plugins_flags' to be set.
383 # Has no effect if 'clang' is not set as well. 383 # Has no effect if 'clang' is not set as well.
384 'clang_use_chrome_plugins%': 1, 384 'clang_use_chrome_plugins%': 1,
385 385
386 # Enable building with ASAN (Clang's -fsanitize=address option). 386 # Enable building with ASAN (Clang's -fsanitize=address option).
387 # -fsanitize=address only works with clang, but asan=1 implies clang=1 387 # -fsanitize=address only works with clang, but asan=1 implies clang=1
388 # See https://sites.google.com/a/chromium.org/dev/developers/testing/addre sssanitizer 388 # See https://sites.google.com/a/chromium.org/dev/developers/testing/addre sssanitizer
389 'asan%': 0, 389 'asan%': 0,
390 'asan_blacklist%': '<(PRODUCT_DIR)/../../tools/memory/asan/blacklist.txt', 390 'asan_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/memory/asan/blacklist. txt',
391 # Enable coverage gathering instrumentation in ASan. This flag also 391 # Enable coverage gathering instrumentation in ASan. This flag also
392 # controls coverage granularity (1 for function-level coverage, 2 for 392 # controls coverage granularity (1 for function-level coverage, 2 for
393 # block-level coverage). 393 # block-level coverage).
394 'asan_coverage%': 0, 394 'asan_coverage%': 0,
395 # Enable intra-object-overflow detection in ASan (experimental). 395 # Enable intra-object-overflow detection in ASan (experimental).
396 'asan_field_padding%': 0, 396 'asan_field_padding%': 0,
397 397
398 # Enable Chromium overrides of the default configurations for various 398 # Enable Chromium overrides of the default configurations for various
399 # dynamic tools (like ASan). 399 # dynamic tools (like ASan).
400 'use_sanitizer_options%': 0, 400 'use_sanitizer_options%': 0,
401 401
402 # Enable building with SyzyAsan. 402 # Enable building with SyzyAsan.
403 # See https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo 403 # See https://code.google.com/p/sawbuck/wiki/SyzyASanHowTo
404 'syzyasan%': 0, 404 'syzyasan%': 0,
405 405
406 # Enable building with LSan (Clang's -fsanitize=leak option). 406 # Enable building with LSan (Clang's -fsanitize=leak option).
407 # -fsanitize=leak only works with clang, but lsan=1 implies clang=1 407 # -fsanitize=leak only works with clang, but lsan=1 implies clang=1
408 # See https://sites.google.com/a/chromium.org/dev/developers/testing/leaks anitizer 408 # See https://sites.google.com/a/chromium.org/dev/developers/testing/leaks anitizer
409 'lsan%': 0, 409 'lsan%': 0,
410 410
411 # Enable building with TSan (Clang's -fsanitize=thread option). 411 # Enable building with TSan (Clang's -fsanitize=thread option).
412 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1 412 # -fsanitize=thread only works with clang, but tsan=1 implies clang=1
413 # See http://clang.llvm.org/docs/ThreadSanitizer.html 413 # See http://clang.llvm.org/docs/ThreadSanitizer.html
414 'tsan%': 0, 414 'tsan%': 0,
415 'tsan_blacklist%': '<(PRODUCT_DIR)/../../tools/memory/tsan_v2/ignores.txt' , 415 'tsan_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/memory/tsan_v2/ignores .txt',
416 416
417 # Enable building with MSan (Clang's -fsanitize=memory option). 417 # Enable building with MSan (Clang's -fsanitize=memory option).
418 # MemorySanitizer only works with clang, but msan=1 implies clang=1 418 # MemorySanitizer only works with clang, but msan=1 implies clang=1
419 # See http://clang.llvm.org/docs/MemorySanitizer.html 419 # See http://clang.llvm.org/docs/MemorySanitizer.html
420 'msan%': 0, 420 'msan%': 0,
421 'msan_blacklist%': '<(PRODUCT_DIR)/../../tools/msan/blacklist.txt', 421 'msan_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/msan/blacklist.txt',
422 # Track where uninitialized memory originates from. From fastest to 422 # Track where uninitialized memory originates from. From fastest to
423 # slowest: 0 - no tracking, 1 - track only the initial allocation site, 2 423 # slowest: 0 - no tracking, 1 - track only the initial allocation site, 2
424 # - track the chain of stores leading from allocation site to use site. 424 # - track the chain of stores leading from allocation site to use site.
425 'msan_track_origins%': 1, 425 'msan_track_origins%': 1,
426 426
427 # Enable building with UBSan (Clang's -fsanitize=undefined option). 427 # Enable building with UBSan (Clang's -fsanitize=undefined option).
428 # -fsanitize=undefined only works with clang, but ubsan=1 implies clang=1 428 # -fsanitize=undefined only works with clang, but ubsan=1 implies clang=1
429 # See http://clang.llvm.org/docs/UsersManual.html 429 # See http://clang.llvm.org/docs/UsersManual.html
430 'ubsan%': 0, 430 'ubsan%': 0,
431 431
432 # Enable building with UBsan's vptr (Clang's -fsanitize=vptr option). 432 # Enable building with UBsan's vptr (Clang's -fsanitize=vptr option).
433 # -fsanitize=vptr only works with clang, but ubsan_vptr=1 implies clang=1 433 # -fsanitize=vptr only works with clang, but ubsan_vptr=1 implies clang=1
434 'ubsan_vptr%': 0, 434 'ubsan_vptr%': 0,
435 'ubsan_vptr_blacklist%': '<(PRODUCT_DIR)/../../tools/ubsan_vptr/blacklist. txt', 435 'ubsan_vptr_blacklist%': '<!(cd <(DEPTH) && pwd -P)/tools/ubsan_vptr/black list.txt',
436 436
437 # Use the dynamic libraries instrumented by one of the sanitizers 437 # Use the dynamic libraries instrumented by one of the sanitizers
438 # instead of the standard system libraries. 438 # instead of the standard system libraries.
439 'use_instrumented_libraries%': 0, 439 'use_instrumented_libraries%': 0,
440 440
441 # Use libc++ (third_party/libc++ and third_party/libc++abi) instead of 441 # Use libc++ (third_party/libc++ and third_party/libc++abi) instead of
442 # stdlibc++ as standard library. This is intended to use for instrumented 442 # stdlibc++ as standard library. This is intended to use for instrumented
443 # builds. 443 # builds.
444 'use_custom_libcxx%': 0, 444 'use_custom_libcxx%': 0,
445 445
(...skipping 5392 matching lines...) Expand 10 before | Expand all | Expand 10 after
5838 # settings in target dicts. SYMROOT is a special case, because many other 5838 # settings in target dicts. SYMROOT is a special case, because many other
5839 # Xcode variables depend on it, including variables such as 5839 # Xcode variables depend on it, including variables such as
5840 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something 5840 # PROJECT_DERIVED_FILE_DIR. When a source group corresponding to something
5841 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the 5841 # like PROJECT_DERIVED_FILE_DIR is added to a project, in order for the
5842 # files to appear (when present) in the UI as actual files and not red 5842 # files to appear (when present) in the UI as actual files and not red
5843 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR, 5843 # red "missing file" proxies, the correct path to PROJECT_DERIVED_FILE_DIR,
5844 # and therefore SYMROOT, needs to be set at the project level. 5844 # and therefore SYMROOT, needs to be set at the project level.
5845 'SYMROOT': '<(DEPTH)/xcodebuild', 5845 'SYMROOT': '<(DEPTH)/xcodebuild',
5846 }, 5846 },
5847 } 5847 }
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698