63526069c2
This adds the v8-side fuzzer executables for smoke testing. This also renames the old gyp targets to stay consistent with chromium. Naming convention for type X after the rename: library: X_fuzzer (gn), X_fuzzer_lib (gyp) executable v8: v8_simple_X_fuzzer executable chromium: v8_X_fuzzer BUG=chromium:474921 Review-Url: https://codereview.chromium.org/2032363002 Cr-Commit-Position: refs/heads/master@{#36713}
189 lines
4.0 KiB
Python
189 lines
4.0 KiB
Python
# Copyright 2016 the V8 project authors. All rights reserved.
|
|
# Use of this source code is governed by a BSD-style license that can be
|
|
# found in the LICENSE file.
|
|
|
|
{
|
|
'variables': {
|
|
'v8_code': 1,
|
|
},
|
|
'includes': ['../../gypfiles/toolchain.gypi', '../../gypfiles/features.gypi'],
|
|
'targets': [
|
|
{
|
|
'target_name': 'v8_simple_json_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'json_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'json_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'json.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'v8_simple_parser_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'parser_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'parser_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'parser.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'v8_simple_regexp_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'regexp_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'regexp_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'regexp.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'v8_simple_wasm_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'wasm_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'wasm_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'wasm.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'v8_simple_wasm_asmjs_fuzzer',
|
|
'type': 'executable',
|
|
'dependencies': [
|
|
'wasm_asmjs_fuzzer_lib',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [
|
|
'fuzzer.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'wasm_asmjs_fuzzer_lib',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'fuzzer_support',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'wasm-asmjs.cc',
|
|
],
|
|
},
|
|
{
|
|
'target_name': 'fuzzer_support',
|
|
'type': 'static_library',
|
|
'dependencies': [
|
|
'../../src/v8.gyp:v8_libplatform',
|
|
],
|
|
'include_dirs': [
|
|
'../..',
|
|
],
|
|
'sources': [ ### gcmole(all) ###
|
|
'fuzzer-support.cc',
|
|
'fuzzer-support.h',
|
|
],
|
|
'conditions': [
|
|
['component=="shared_library"', {
|
|
# fuzzers can't be built against a shared library, so we need to
|
|
# depend on the underlying static target in that case.
|
|
'dependencies': ['../../src/v8.gyp:v8_maybe_snapshot'],
|
|
}, {
|
|
'dependencies': ['../../src/v8.gyp:v8'],
|
|
}],
|
|
],
|
|
},
|
|
],
|
|
'conditions': [
|
|
['test_isolation_mode != "noop"', {
|
|
'targets': [
|
|
{
|
|
'target_name': 'fuzzer_run',
|
|
'type': 'none',
|
|
'dependencies': [
|
|
'v8_simple_json_fuzzer',
|
|
'v8_simple_parser_fuzzer',
|
|
'v8_simple_regexp_fuzzer',
|
|
'v8_simple_wasm_fuzzer',
|
|
'v8_simple_wasm_asmjs_fuzzer',
|
|
],
|
|
'includes': [
|
|
'../../gypfiles/isolate.gypi',
|
|
],
|
|
'sources': [
|
|
'fuzzer.isolate',
|
|
],
|
|
},
|
|
],
|
|
}],
|
|
],
|
|
}
|