blob: 1e65f3a49fa96e4608ca678c25989622d32c4cb2 [file] [log] [blame]
Brian Silvermanb2215d02015-11-23 19:10:15 -05001# Use our CROSSTOOL.
Brian Silvermanfbe4fd52015-10-26 10:40:55 -04002build --crosstool_top=//tools/cpp:toolchain
Brian Silvermanb2215d02015-11-23 19:10:15 -05003# Don't switch HOST compilers.
4build --host_crosstool_top=//tools/cpp:toolchain
Brian Silvermanfbe4fd52015-10-26 10:40:55 -04005
Brian Silverman5bc54342015-11-26 22:57:46 -05006# Always include debug information in the non-.stripped binaries.
7build --strip=never
8
Austin Schuhda9d0602019-09-15 17:29:38 -07009build --noincompatible_disable_nocopts
10build --noincompatible_restrict_string_escapes
11
Brian Silverman516ceb22015-11-27 01:29:05 -050012# Use the malloc we want.
13build --custom_malloc=//tools/cpp:malloc
14
Brian Silverman6470f442018-08-05 12:08:16 -070015# Use our hermetic Python runtime.
16build --python_top=//tools/python:runtime
Austin Schuhda9d0602019-09-15 17:29:38 -070017build --noincompatible_use_python_toolchains
18build --noincompatible_py3_is_default
19build --noincompatible_py2_outputs_are_suffixed
Brian Silverman6470f442018-08-05 12:08:16 -070020
Brian Silverman63889f92015-11-27 01:33:56 -050021build:asan --copt -fsanitize=address
22build:asan --linkopt -fsanitize=address --linkopt -ldl
23build:asan --platform_suffix=-asan
24build:asan --test_env ASAN_SYMBOLIZER_PATH=/usr/bin/llvm-symbolizer-3.6
25build:asan --test_env ASAN_OPTIONS=detect_leaks=1:check_initialization_order=1:strict_init_order=1:detect_stack_use_after_return=1:detect_odr_violation=2:allow_user_segv_handler=1
Brian Silvermanb466eef2015-11-28 20:33:44 -050026build:asan --copt -fsanitize-blacklist=tools/cpp/asan-blacklist
Brian Silverman7dc6adb2017-02-19 17:04:36 -080027build:asan --define have_asan=true
Brian Silverman63889f92015-11-27 01:33:56 -050028
29build:tsan --copt -fsanitize=thread --copt -DAOS_SANITIZER_thread
30build:tsan --linkopt -fsanitize=thread
31build:tsan --platform_suffix=-tsan
32build:tsan --test_env TSAN_OPTIONS=external_symbolizer_path=/usr/bin/llvm-symbolizer-3.6:detect_deadlocks=1:second_deadlock_stack=1
Brian Silverman7dc6adb2017-02-19 17:04:36 -080033build:tsan --define have_tsan=true
Brian Silverman63889f92015-11-27 01:33:56 -050034
35build:isan --copt -fsanitize=integer
36build:isan --linkopt -fsanitize=integer
37build:isan --platform_suffix=-isan
38build:isan --test_env LLVM_SYMBOLIZER=/usr/bin/llvm-symbolizer-3.6
Brian Silverman7dc6adb2017-02-19 17:04:36 -080039build:isan --define have_isan=true
Brian Silverman63889f92015-11-27 01:33:56 -050040
Brian Silvermana4a4ea62015-11-27 10:27:53 -050041build:ubsan --copt -fsanitize=undefined --copt -fno-sanitize-recover
42# Bad alignment is just slow on x86 and traps on ARM, so we'll find
43# it other ways, and some x86 code does it on purpose.
44build:ubsan --copt -fno-sanitize=alignment
Brian Silverman63889f92015-11-27 01:33:56 -050045build:ubsan --linkopt -fsanitize=undefined
Brian Silvermanb466eef2015-11-28 20:33:44 -050046# TOOD(Brian): Remove this once Clang adds it itself like it should.
47build:ubsan --linkopt /usr/lib/llvm-3.6/lib/clang/3.6.2/lib/linux/libclang_rt.ubsan_cxx-x86_64.a
Brian Silverman63889f92015-11-27 01:33:56 -050048build:ubsan --platform_suffix=-ubsan
Brian Silvermanb466eef2015-11-28 20:33:44 -050049build:ubsan --test_env UBSAN_OPTIONS=external_symbolizer_path=/usr/bin/llvm-symbolizer-3.6:color=always:print_stacktrace=1
50build:ubsan --copt -fsanitize-blacklist=tools/cpp/ubsan-blacklist
Brian Silverman7dc6adb2017-02-19 17:04:36 -080051build:ubsan --define have_ubsan=true
Brian Silverman63889f92015-11-27 01:33:56 -050052
Brian Silvermana4a4ea62015-11-27 10:27:53 -050053build:msan --copt -fsanitize=memory --copt -fsanitize-memory-track-origins
Brian Silvermanb466eef2015-11-28 20:33:44 -050054build:msan --linkopt -fsanitize=memory --linkopt -fsanitize-memory-track-origins
Brian Silverman63889f92015-11-27 01:33:56 -050055build:msan --platform_suffix=-msan
56build:msan --test_env MSAN_SYMBOLIZER_PATH=/usr/bin/llvm-symbolizer-3.6
Brian Silverman7dc6adb2017-02-19 17:04:36 -080057build:msan --define have_msan=true
Brian Silverman63889f92015-11-27 01:33:56 -050058
James Kuszmaul2af1ba82019-02-09 22:16:53 -080059# Sometime, we want to be able to have eigen assertions run so that we can
60# catch potential issues (e.g., accessing invalid indices).
61build:eigen --copt -UNDEBUG
62
Brian Silverman12b3fc52015-10-11 19:38:33 -040063# Show paths to a few more than just 1 target.
Austin Schuh00bc0932016-02-14 21:05:34 -080064build --show_result 5
Brian Silverman12b3fc52015-10-11 19:38:33 -040065# Dump the output of the failing test to stdout.
66test --test_output=errors
Brian Silvermanb200c172017-01-02 17:35:35 -080067
Austin Schuh9d92e6b2017-10-17 01:19:38 -070068build --experimental_sandbox_base=/dev/shm/
Austin Schuh35c75e82017-03-11 21:54:05 -080069build --experimental_multi_threaded_digest
Austin Schuh9d92e6b2017-10-17 01:19:38 -070070
71build --sandbox_fake_hostname=true
72build --sandbox_fake_username=true
73
Austin Schuh4f857292018-02-15 23:42:04 -080074build --auto_cpu_environment_group=//tools:cpus
Austin Schuh9d92e6b2017-10-17 01:19:38 -070075startup --host_jvm_args=-Dbazel.DigestFunction=SHA1
76
77common --watchfs
Austin Schuhe18baff2018-10-20 17:40:42 -070078
79# Switch to SHA256 for compatibility with distributed caching.
80startup --host_jvm_args=-Dbazel.DigestFunction=SHA256
81
Austin Schuhb6043b22017-11-29 00:14:39 -080082build --spawn_strategy=linux-sandbox
Austin Schuhe18baff2018-10-20 17:40:42 -070083build --experimental_sandbox_default_allow_network=false
84
Austin Schuh89a95052019-04-14 14:51:14 -070085build --strategy=TypeScriptCompile=worker --strategy=AngularTemplateCompile=worker
86
Austin Schuhe18baff2018-10-20 17:40:42 -070087# Use our hermetic JDK.
88# Note that this doesn't quite work fully, but it should. See
89# https://github.com/bazelbuild/bazel/issues/6341 for ongoing discussion with
90# upstream about this.
91build --javabase=@openjdk_linux_archive//:jdk --host_javabase=@openjdk_linux_archive//:jdk