naiveproxy/third_party/perfetto/gn/standalone/sanitizers/BUILD.gn
2018-12-09 21:59:24 -05:00

130 lines
3.3 KiB
Plaintext

# Copyright (C) 2017 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import("//gn/standalone/sanitizers/sanitizers.gni")
# Link dependencies for sanitizers for executables.
group("deps") {
visibility = [ "*" ]
if (using_sanitizer) {
public_configs = [ ":sanitizers_ldflags" ]
if (is_android && sanitizer_lib != "" && !sanitizer_lib_dir_is_static) {
deps = [
":copy_sanitizer_lib",
]
}
}
}
if (is_android && sanitizer_lib != "" && !sanitizer_lib_dir_is_static) {
copy("copy_sanitizer_lib") {
sources = [
"${sanitizer_lib_dir}/lib${sanitizer_lib}.so",
]
outputs = [
"${root_out_dir}/sanitizer_libs/lib${sanitizer_lib}.so",
]
}
}
config("sanitizers_cflags") {
cflags = []
defines = []
if (using_sanitizer) {
blacklist_path_ = rebase_path("blacklist.txt", root_build_dir)
cflags += [
"-fno-omit-frame-pointer",
"-fsanitize-blacklist=$blacklist_path_",
]
}
if (is_asan) {
cflags += [ "-fsanitize=address" ]
defines += [ "ADDRESS_SANITIZER" ]
}
if (is_lsan) {
cflags += [ "-fsanitize=leak" ]
defines += [ "LEAK_SANITIZER" ]
}
if (is_tsan) {
cflags += [ "-fsanitize=thread" ]
defines += [
"THREAD_SANITIZER",
"DYNAMIC_ANNOTATIONS_EXTERNAL_IMPL=1",
]
}
if (is_msan) {
cflags += [
"-fsanitize=memory",
"-fsanitize-memory-track-origins=2",
]
defines += [ "MEMORY_SANITIZER" ]
}
if (is_ubsan) {
cflags += [
"-fsanitize=bounds",
"-fsanitize=float-divide-by-zero",
"-fsanitize=integer-divide-by-zero",
"-fsanitize=null",
"-fsanitize=object-size",
"-fsanitize=return",
"-fsanitize=returns-nonnull-attribute",
"-fsanitize=shift-exponent",
"-fsanitize=signed-integer-overflow",
"-fsanitize=unreachable",
"-fsanitize=vla-bound",
]
defines += [ "UNDEFINED_SANITIZER" ]
}
if (use_libfuzzer) {
cflags += [ "-fsanitize=fuzzer" ]
if (is_asan) {
cflags += [
"-mllvm",
"-asan-use-private-alias",
]
}
}
}
config("sanitizer_options_link_helper") {
if (is_mac) {
ldflags = [ "-Wl,-U,_sanitizer_options_link_helper" ]
}
}
config("sanitizers_ldflags") {
visibility = [ ":deps" ]
ldflags = []
if (is_asan) {
ldflags += [ "-fsanitize=address" ]
}
if (is_lsan) {
# This is not a copy/paste mistake. The LSan runtime library has
# moved into asan. So in order to make LSan work one has to build
# .cc files with -fsanitize=leak but link with -fsanitize=address.
ldflags += [ "-fsanitize=address" ]
}
if (is_tsan) {
ldflags += [ "-fsanitize=thread" ]
}
if (is_msan) {
ldflags += [ "-fsanitize=memory" ]
}
if (is_ubsan) {
ldflags += [ "-fsanitize=undefined" ]
}
configs = [ ":sanitizer_options_link_helper" ]
}