07e6b34a07
* chore: bump chromium in DEPS to 128.0.6571.0 * 5636652: [4/n] Introduce RenderInputRouterClient and move InputRouterClient implementation to RenderInputRouter. https://chromium-review.googlesource.com/c/chromium/src/+/5636652 * 5655811: Revert "Reland "Reland "Add toolchains without PartitionAlloc-Everywhere for dump_syms et al""" https://chromium-review.googlesource.com/c/chromium/src/+/5655811 * 5581006: [tracing] Forward startup tracing config as shmem https://chromium-review.googlesource.com/c/chromium/src/+/5581006 * chore: fixup patch indices * 5608450: [Views AX] Move Image Auto Captioning strings to ui/ https://chromium-review.googlesource.com/c/chromium/src/+/5608450 * 5648900: [Extensions] Move ExtensionAPIEnabledForServiceWorkerScript() https://chromium-review.googlesource.com/c/chromium/src/+/5648900 * 5651681: Remove Web Speech API profanity masking https://chromium-review.googlesource.com/c/chromium/src/+/5651681 * 5651361: `content::RenderFrame::GetBrowserInterfaceBroker`: return a const-ref. https://chromium-review.googlesource.com/c/chromium/src/+/5651361 * 5604943: Start capture of toolbar after gesture end events are received https://chromium-review.googlesource.com/c/chromium/src/+/5604943 * 5624392: [BRP] Enforce raw_ptr/ref in Renderer code https://chromium-review.googlesource.com/c/chromium/src/+/5624392 * 5659259: Portals: Remove WebContentsView::TransferDragSecurityInfo https://chromium-review.googlesource.com/c/chromium/src/+/5659259 * 5230721: Move ComposeStatus to components/compose https://chromium-review.googlesource.com/c/chromium/src/+/5230721 * 5647894: [api] Cleanup usages of v8::ReturnValue<void>::Set[NonEmpty](..) https://chromium-review.googlesource.com/c/v8/v8/+/5647894 --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com>
57 lines
1.8 KiB
Text
57 lines
1.8 KiB
Text
import("//build/toolchain/toolchain.gni")
|
|
|
|
# Extracts symbols from a binary into a symbol file using dump_syms.
|
|
#
|
|
# Args:
|
|
# binary: Path to the binary containing symbols to extract, e.g.:
|
|
# "$root_out_dir/electron"
|
|
# symbol_dir: Desired output directory for symbols, e.g.:
|
|
# "$root_out_dir/breakpad_symbols"
|
|
|
|
if (host_os == "win") {
|
|
_host_executable_suffix = ".exe"
|
|
} else {
|
|
_host_executable_suffix = ""
|
|
}
|
|
|
|
template("extract_symbols") {
|
|
action(target_name) {
|
|
forward_variables_from(invoker,
|
|
[
|
|
"deps",
|
|
"testonly",
|
|
])
|
|
assert(defined(invoker.binary), "Need binary to dump")
|
|
assert(defined(invoker.symbol_dir), "Need directory for symbol output")
|
|
|
|
if (host_os == "win" && target_cpu == "x86") {
|
|
dump_syms_label = "//third_party/breakpad:dump_syms(//build/toolchain/win:win_clang_x64)"
|
|
} else {
|
|
dump_syms_label = "//third_party/breakpad:dump_syms($host_toolchain)"
|
|
}
|
|
dump_syms_binary = get_label_info(dump_syms_label, "root_out_dir") +
|
|
"/dump_syms$_host_executable_suffix"
|
|
|
|
script = "//electron/build/dump_syms.py"
|
|
inputs = [
|
|
invoker.binary,
|
|
dump_syms_binary,
|
|
]
|
|
stamp_file = "${target_gen_dir}/${target_name}.stamp"
|
|
outputs = [ stamp_file ]
|
|
args = [
|
|
"./" + rebase_path(dump_syms_binary, root_build_dir),
|
|
rebase_path(invoker.binary, root_build_dir),
|
|
rebase_path(invoker.symbol_dir, root_build_dir),
|
|
rebase_path(stamp_file, root_build_dir),
|
|
]
|
|
if (defined(invoker.dsym_file)) {
|
|
args += [ rebase_path(invoker.dsym_file, root_build_dir) ]
|
|
}
|
|
|
|
if (!defined(deps)) {
|
|
deps = []
|
|
}
|
|
deps += [ dump_syms_label ]
|
|
}
|
|
}
|