mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-28 08:16:09 +03:00
130 lines
3.3 KiB
Plaintext
130 lines
3.3 KiB
Plaintext
# Copyright (C) 2017 The Android Open Source Project
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import("//gn/standalone/sanitizers/sanitizers.gni")
|
|
|
|
# Link dependencies for sanitizers for executables.
|
|
group("deps") {
|
|
visibility = [ "*" ]
|
|
if (using_sanitizer) {
|
|
public_configs = [ ":sanitizers_ldflags" ]
|
|
if (is_android && sanitizer_lib != "" && !sanitizer_lib_dir_is_static) {
|
|
deps = [
|
|
":copy_sanitizer_lib",
|
|
]
|
|
}
|
|
}
|
|
}
|
|
|
|
if (is_android && sanitizer_lib != "" && !sanitizer_lib_dir_is_static) {
|
|
copy("copy_sanitizer_lib") {
|
|
sources = [
|
|
"${sanitizer_lib_dir}/lib${sanitizer_lib}.so",
|
|
]
|
|
outputs = [
|
|
"${root_out_dir}/sanitizer_libs/lib${sanitizer_lib}.so",
|
|
]
|
|
}
|
|
}
|
|
|
|
config("sanitizers_cflags") {
|
|
cflags = []
|
|
defines = []
|
|
if (using_sanitizer) {
|
|
blacklist_path_ = rebase_path("blacklist.txt", root_build_dir)
|
|
cflags += [
|
|
"-fno-omit-frame-pointer",
|
|
"-fsanitize-blacklist=$blacklist_path_",
|
|
]
|
|
}
|
|
|
|
if (is_asan) {
|
|
cflags += [ "-fsanitize=address" ]
|
|
defines += [ "ADDRESS_SANITIZER" ]
|
|
}
|
|
if (is_lsan) {
|
|
cflags += [ "-fsanitize=leak" ]
|
|
defines += [ "LEAK_SANITIZER" ]
|
|
}
|
|
if (is_tsan) {
|
|
cflags += [ "-fsanitize=thread" ]
|
|
defines += [
|
|
"THREAD_SANITIZER",
|
|
"DYNAMIC_ANNOTATIONS_EXTERNAL_IMPL=1",
|
|
]
|
|
}
|
|
if (is_msan) {
|
|
cflags += [
|
|
"-fsanitize=memory",
|
|
"-fsanitize-memory-track-origins=2",
|
|
]
|
|
defines += [ "MEMORY_SANITIZER" ]
|
|
}
|
|
if (is_ubsan) {
|
|
cflags += [
|
|
"-fsanitize=bounds",
|
|
"-fsanitize=float-divide-by-zero",
|
|
"-fsanitize=integer-divide-by-zero",
|
|
"-fsanitize=null",
|
|
"-fsanitize=object-size",
|
|
"-fsanitize=return",
|
|
"-fsanitize=returns-nonnull-attribute",
|
|
"-fsanitize=shift-exponent",
|
|
"-fsanitize=signed-integer-overflow",
|
|
"-fsanitize=unreachable",
|
|
"-fsanitize=vla-bound",
|
|
]
|
|
defines += [ "UNDEFINED_SANITIZER" ]
|
|
}
|
|
if (use_libfuzzer) {
|
|
cflags += [ "-fsanitize=fuzzer" ]
|
|
if (is_asan) {
|
|
cflags += [
|
|
"-mllvm",
|
|
"-asan-use-private-alias",
|
|
]
|
|
}
|
|
}
|
|
}
|
|
|
|
config("sanitizer_options_link_helper") {
|
|
if (is_mac) {
|
|
ldflags = [ "-Wl,-U,_sanitizer_options_link_helper" ]
|
|
}
|
|
}
|
|
|
|
config("sanitizers_ldflags") {
|
|
visibility = [ ":deps" ]
|
|
ldflags = []
|
|
if (is_asan) {
|
|
ldflags += [ "-fsanitize=address" ]
|
|
}
|
|
if (is_lsan) {
|
|
# This is not a copy/paste mistake. The LSan runtime library has
|
|
# moved into asan. So in order to make LSan work one has to build
|
|
# .cc files with -fsanitize=leak but link with -fsanitize=address.
|
|
ldflags += [ "-fsanitize=address" ]
|
|
}
|
|
if (is_tsan) {
|
|
ldflags += [ "-fsanitize=thread" ]
|
|
}
|
|
if (is_msan) {
|
|
ldflags += [ "-fsanitize=memory" ]
|
|
}
|
|
if (is_ubsan) {
|
|
ldflags += [ "-fsanitize=undefined" ]
|
|
}
|
|
configs = [ ":sanitizer_options_link_helper" ]
|
|
}
|