diff options
author | Allan Sandfeld Jensen <allan.jensen@qt.io> | 2019-05-16 09:59:13 +0200 |
---|---|---|
committer | Allan Sandfeld Jensen <allan.jensen@qt.io> | 2019-05-20 10:28:53 +0000 |
commit | 6c11fb357ec39bf087b8b632e2b1e375aef1b38b (patch) | |
tree | c8315530db18a8ee566521c39ab8a6af4f72bc03 /chromium/third_party/libFuzzer | |
parent | 3ffaed019d0772e59d6cdb2d0d32fe4834c31f72 (diff) | |
download | qtwebengine-chromium-6c11fb357ec39bf087b8b632e2b1e375aef1b38b.tar.gz |
BASELINE: Update Chromium to 74.0.3729.159
Change-Id: I8d2497da544c275415aedd94dd25328d555de811
Reviewed-by: Michael BrĂ¼ning <michael.bruning@qt.io>
Diffstat (limited to 'chromium/third_party/libFuzzer')
-rw-r--r-- | chromium/third_party/libFuzzer/BUILD.gn | 30 |
1 files changed, 20 insertions, 10 deletions
diff --git a/chromium/third_party/libFuzzer/BUILD.gn b/chromium/third_party/libFuzzer/BUILD.gn index 25d54402ab8..0bc238c7bdf 100644 --- a/chromium/third_party/libFuzzer/BUILD.gn +++ b/chromium/third_party/libFuzzer/BUILD.gn @@ -4,23 +4,35 @@ import("///build/config/sanitizers/sanitizers.gni") +config("ignore_unused_result_warning") { + if (is_clang) { + cflags = [ + # See crbug.com/932188, libFuzzer does not check the result of write() + # when it does raw printing. + "-Wno-unused-result", + ] + } +} + # Engine should be compiled without coverage (infinite loop in trace_cmp). fuzzing_engine_remove_configs = [ "//build/config/coverage:default_coverage", "//build/config/sanitizers:default_sanitizer_flags", ] -# Add any sanitizer flags back. In MSAN builds, instrumenting libfuzzer with +# Add any sanitizer flags back. In MSAN builds, instrumenting libfuzzer with # MSAN is necessary since all parts of the binary need to be instrumented for it -# to work. ASAN builds are more subtle: libfuzzer depends on features from the -# C++ STL. If it were not instrumented, templates would be insantiated without -# ASAN from libfuzzer and with ASAN in other TUs. The linker might merge +# to work. ASAN builds are more subtle: libfuzzer depends on features from the +# C++ STL. If it were not instrumented, templates would be insantiated without +# ASAN from libfuzzer and with ASAN in other TUs. The linker might merge # instrumented template instantiations with non-instrumented ones (which could # have a different ABI) in the final binary, which is problematic for TUs -# expecting one particular ABI (https://crbug.com/915422). The other sanitizers +# expecting one particular ABI (https://crbug.com/915422). The other sanitizers # are added back for the same reason. -fuzzing_engine_add_configs = - [ "//build/config/sanitizers:default_sanitizer_flags_but_coverage" ] +fuzzing_engine_add_configs = [ + "//build/config/sanitizers:default_sanitizer_flags_but_coverage", + ":ignore_unused_result_warning", +] source_set("libfuzzer") { sources = [ @@ -31,6 +43,7 @@ source_set("libfuzzer") { "src/FuzzerExtFunctionsWeak.cpp", "src/FuzzerExtFunctionsWindows.cpp", "src/FuzzerExtraCounters.cpp", + "src/FuzzerFork.cpp", "src/FuzzerIO.cpp", "src/FuzzerIOPosix.cpp", "src/FuzzerIOWindows.cpp", @@ -39,9 +52,6 @@ source_set("libfuzzer") { "src/FuzzerMerge.cpp", "src/FuzzerMutate.cpp", "src/FuzzerSHA1.cpp", - "src/FuzzerShmemFuchsia.cpp", - "src/FuzzerShmemPosix.cpp", - "src/FuzzerShmemWindows.cpp", "src/FuzzerTracePC.cpp", "src/FuzzerUtil.cpp", "src/FuzzerUtilDarwin.cpp", |