# Copyright (C) 2017 The Android Open Source Project # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import("//gn/standalone/sanitizers/sanitizers.gni") # Link dependencies for sanitizers for executables. group("deps") { visibility = [ "*" ] if (using_sanitizer) { public_configs = [ ":sanitizers_ldflags" ] if (is_android && sanitizer_lib != "" && !sanitizer_lib_dir_is_static) { deps = [ ":copy_sanitizer_lib", ] } } } if (is_android && sanitizer_lib != "" && !sanitizer_lib_dir_is_static) { copy("copy_sanitizer_lib") { sources = [ "${sanitizer_lib_dir}/lib${sanitizer_lib}.so", ] outputs = [ "${root_out_dir}/sanitizer_libs/lib${sanitizer_lib}.so", ] } } config("sanitizers_cflags") { cflags = [] defines = [] if (using_sanitizer) { blacklist_path_ = rebase_path("blacklist.txt", root_build_dir) cflags += [ "-fno-omit-frame-pointer", "-fsanitize-blacklist=$blacklist_path_", ] } if (is_asan) { cflags += [ "-fsanitize=address" ] defines += [ "ADDRESS_SANITIZER" ] } if (is_lsan) { cflags += [ "-fsanitize=leak" ] defines += [ "LEAK_SANITIZER" ] } if (is_tsan) { cflags += [ "-fsanitize=thread" ] defines += [ "THREAD_SANITIZER", "DYNAMIC_ANNOTATIONS_EXTERNAL_IMPL=1", ] } if (is_msan) { cflags += [ "-fsanitize=memory", "-fsanitize-memory-track-origins=2", ] defines += [ "MEMORY_SANITIZER" ] } if (is_ubsan) { cflags += [ "-fsanitize=bounds", "-fsanitize=float-divide-by-zero", "-fsanitize=integer-divide-by-zero", "-fsanitize=null", "-fsanitize=object-size", "-fsanitize=return", "-fsanitize=returns-nonnull-attribute", "-fsanitize=shift-exponent", "-fsanitize=signed-integer-overflow", "-fsanitize=unreachable", "-fsanitize=vla-bound", ] defines += [ "UNDEFINED_SANITIZER" ] } if (is_fuzzer) { # FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION is also defined by oss-fuzz, # so using the same name. defines += [ "FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION" ] cflags += [ "-fsanitize=fuzzer-no-link" ] if (is_asan) { cflags += [ "-mllvm", "-asan-use-private-alias", ] } } } config("sanitizer_options_link_helper") { if (is_mac) { ldflags = [ "-Wl,-U,_sanitizer_options_link_helper" ] } } config("sanitizers_ldflags") { visibility = [ ":deps" ] ldflags = [] if (is_asan) { ldflags += [ "-fsanitize=address" ] } if (is_lsan) { # This is not a copy/paste mistake. The LSan runtime library has # moved into asan. So in order to make LSan work one has to build # .cc files with -fsanitize=leak but link with -fsanitize=address. ldflags += [ "-fsanitize=address" ] } if (is_tsan) { ldflags += [ "-fsanitize=thread" ] } if (is_msan) { ldflags += [ "-fsanitize=memory" ] } if (is_ubsan) { ldflags += [ "-fsanitize=undefined" ] } configs = [ ":sanitizer_options_link_helper" ] }