-
Notifications
You must be signed in to change notification settings - Fork 5.1k
build: bump rules_foreign_cc to e3f4b5e0 and switch to lld for .bazel… #6610
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…rc sanitizers. This allows for all --copt/--cxxopt/--linkopt to be plumbed to external dependencies. Risk level: Low Testing: CI Signed-off-by: Harvey Tuch <htuch@google.com>
@htuch ASAN/TSAN test failed, so the flags are propagated down to dependencies? |
Signed-off-by: Harvey Tuch <htuch@google.com>
@mergeconflict is looking at the TSAN failure related to |
Signed-off-by: Harvey Tuch <htuch@google.com>
|
|
@htuch discovered a race condition in my libevent watcher implementation in the process of enabling TSAN for dependencies (#6610). Update libevent to pull in the fix (libevent/libevent#793). Risk Level: low Testing: bazel test //test/server:worker_impl_test -c dbg --config=clang-tsan --runs_per_test=1000 (with @htuch's patch applied). Signed-off-by: Dan Rosen <mergeconflict@google.com>
Signed-off-by: Harvey Tuch <htuch@google.com>
Signed-off-by: Harvey Tuch <htuch@google.com>
Signed-off-by: Harvey Tuch <htuch@google.com>
@lizan this is ready for final review, all tests should now pass. |
+ # Blacklist LuaJIT from ASAN for now. | ||
+ # TODO(htuch): Remove this when https://github.com/envoyproxy/envoy/issues/6084 is resolved. | ||
+ if "ENVOY_CONFIG_ASAN" in os.environ: | ||
+ os.environ["TARGET_CFLAGS"] += " -fsanitize-blacklist=%s/com_github_luajit_luajit/clang-asan-blacklist.txt" % os.environ["PWD"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if we do fun:*
blacklist, shall we just remove -fsanitize=address from TARGET_CFLAGS?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's a useful hook to leave around to experiment with making this more precise, so I'd vote to keep it as is.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SGTM
Since envoyproxy#6610 the fuzzer build has been broken. This is due to the interaction of rules_foreign_cc external dependencies and the additional UBSAN blacklist maintained by the oss-fuzz driver to workaround the fact we don't have protocolbuffers/protobuf#5901 yet. Thir PR moves protocolbuffers/protobuf#5901 into Envoy proper and hence we don't need an UBSAN blacklist in the oss-fuzz driver anymore. Risk level: Low Tesitng: oss-fuzz Docker build. Signed-off-by: Harvey Tuch <htuch@google.com>
This is no longer needed as we handle this Envoy-side. This should fix the build that has been broken since envoyproxy/envoy#6610. Signed-off-by: Harvey Tuch <htuch@google.com>
This is no longer needed as we handle this Envoy-side. This should fix the build that has been broken since envoyproxy/envoy#6610. Signed-off-by: Harvey Tuch <htuch@google.com>
Since #6610 the fuzzer build has been broken. This is due to the interaction of rules_foreign_cc external dependencies and the additional UBSAN blacklist maintained by the oss-fuzz driver to workaround the fact we don't have protocolbuffers/protobuf#5901 yet. This PR moves protocolbuffers/protobuf#5901 into Envoy proper and hence we don't need an UBSAN blacklist in the oss-fuzz driver anymore. Risk level: Low Tesitng: oss-fuzz Docker build. Signed-off-by: Harvey Tuch <htuch@google.com>
Since envoyproxy#6610 the fuzzer build has been broken. This is due to the interaction of rules_foreign_cc external dependencies and the additional UBSAN blacklist maintained by the oss-fuzz driver to workaround the fact we don't have protocolbuffers/protobuf#5901 yet. This PR moves protocolbuffers/protobuf#5901 into Envoy proper and hence we don't need an UBSAN blacklist in the oss-fuzz driver anymore. Risk level: Low Tesitng: oss-fuzz Docker build. Signed-off-by: Harvey Tuch <htuch@google.com> Signed-off-by: Jeff Piazza <jeffpiazza@google.com>
…rc sanitizers.
This allows for all --copt/--cxxopt/--linkopt to be plumbed to external
dependencies.
Risk level: Low
Testing: CI
Signed-off-by: Harvey Tuch htuch@google.com