summaryrefslogtreecommitdiff
path: root/chromium/third_party/libFuzzer
diff options
context:
space:
mode:
authorAllan Sandfeld Jensen <allan.jensen@qt.io>2019-05-16 09:59:13 +0200
committerAllan Sandfeld Jensen <allan.jensen@qt.io>2019-05-20 10:28:53 +0000
commit6c11fb357ec39bf087b8b632e2b1e375aef1b38b (patch)
treec8315530db18a8ee566521c39ab8a6af4f72bc03 /chromium/third_party/libFuzzer
parent3ffaed019d0772e59d6cdb2d0d32fe4834c31f72 (diff)
downloadqtwebengine-chromium-6c11fb357ec39bf087b8b632e2b1e375aef1b38b.tar.gz
BASELINE: Update Chromium to 74.0.3729.159
Change-Id: I8d2497da544c275415aedd94dd25328d555de811 Reviewed-by: Michael BrĂ¼ning <michael.bruning@qt.io>
Diffstat (limited to 'chromium/third_party/libFuzzer')
-rw-r--r--chromium/third_party/libFuzzer/BUILD.gn30
1 files changed, 20 insertions, 10 deletions
diff --git a/chromium/third_party/libFuzzer/BUILD.gn b/chromium/third_party/libFuzzer/BUILD.gn
index 25d54402ab8..0bc238c7bdf 100644
--- a/chromium/third_party/libFuzzer/BUILD.gn
+++ b/chromium/third_party/libFuzzer/BUILD.gn
@@ -4,23 +4,35 @@
import("///build/config/sanitizers/sanitizers.gni")
+config("ignore_unused_result_warning") {
+ if (is_clang) {
+ cflags = [
+ # See crbug.com/932188, libFuzzer does not check the result of write()
+ # when it does raw printing.
+ "-Wno-unused-result",
+ ]
+ }
+}
+
# Engine should be compiled without coverage (infinite loop in trace_cmp).
fuzzing_engine_remove_configs = [
"//build/config/coverage:default_coverage",
"//build/config/sanitizers:default_sanitizer_flags",
]
-# Add any sanitizer flags back. In MSAN builds, instrumenting libfuzzer with
+# Add any sanitizer flags back. In MSAN builds, instrumenting libfuzzer with
# MSAN is necessary since all parts of the binary need to be instrumented for it
-# to work. ASAN builds are more subtle: libfuzzer depends on features from the
-# C++ STL. If it were not instrumented, templates would be insantiated without
-# ASAN from libfuzzer and with ASAN in other TUs. The linker might merge
+# to work. ASAN builds are more subtle: libfuzzer depends on features from the
+# C++ STL. If it were not instrumented, templates would be insantiated without
+# ASAN from libfuzzer and with ASAN in other TUs. The linker might merge
# instrumented template instantiations with non-instrumented ones (which could
# have a different ABI) in the final binary, which is problematic for TUs
-# expecting one particular ABI (https://crbug.com/915422). The other sanitizers
+# expecting one particular ABI (https://crbug.com/915422). The other sanitizers
# are added back for the same reason.
-fuzzing_engine_add_configs =
- [ "//build/config/sanitizers:default_sanitizer_flags_but_coverage" ]
+fuzzing_engine_add_configs = [
+ "//build/config/sanitizers:default_sanitizer_flags_but_coverage",
+ ":ignore_unused_result_warning",
+]
source_set("libfuzzer") {
sources = [
@@ -31,6 +43,7 @@ source_set("libfuzzer") {
"src/FuzzerExtFunctionsWeak.cpp",
"src/FuzzerExtFunctionsWindows.cpp",
"src/FuzzerExtraCounters.cpp",
+ "src/FuzzerFork.cpp",
"src/FuzzerIO.cpp",
"src/FuzzerIOPosix.cpp",
"src/FuzzerIOWindows.cpp",
@@ -39,9 +52,6 @@ source_set("libfuzzer") {
"src/FuzzerMerge.cpp",
"src/FuzzerMutate.cpp",
"src/FuzzerSHA1.cpp",
- "src/FuzzerShmemFuchsia.cpp",
- "src/FuzzerShmemPosix.cpp",
- "src/FuzzerShmemWindows.cpp",
"src/FuzzerTracePC.cpp",
"src/FuzzerUtil.cpp",
"src/FuzzerUtilDarwin.cpp",