http://crbug.com/22926

You know the funny part? I had hacked that exact thing (in
ChromiumCurrentTime.cpp) locally during work on this bug.

M-A

On Tue, Oct 27, 2009 at 9:53 PM, Albert J. Wong (王重傑)
<ajw...@chromium.org> wrote:
> Would a hack like running  nm --defined-only on each generated object, and
> then checking for dups work?  You'd have to ignore weak symbols, and
> probably some others, but sounds doable.
> -Albert
>
> On Tue, Oct 27, 2009 at 6:48 PM, Peter Kasting <pkast...@google.com> wrote:
>>
>> On Tue, Oct 27, 2009 at 4:40 PM, James Robinson <jam...@chromium.org>
>> wrote:
>>>
>>> So what's the problem?  WTF::currentTime() is implemented twice, once in
>>> JavaScriptCore/wtf/CurrentTime.cpp and once in
>>> webkit/api/src/ChromiumCurrentTime.cpp.  The latter simply defers to
>>> base::Time::Now().ToDoubleT(), the former uses a somewhat different
>>> algorithm to try to normalize what the system returns.  ThreadTimers.cpp was
>>> linking against the JavaScriptCore/wtf/CurrentTime.cpp version and
>>> webkitclient_impl.cc was linking against the
>>> webkit/api/src/ChromiumCurrentTime.cpp version.
>>
>> Arrrgghhhhhh
>>  Is there a way we can compile-time detect similar symbol names like this
>> and throw fits (with a whitelist for any we know are OK)?  Seems like this
>> is an issue for something with linking that maruel might have looked at long
>> ago.
>> PKJ
>> >>
>
>

--~--~---------~--~----~------------~-------~--~----~
Chromium Developers mailing list: chromium-dev@googlegroups.com 
View archives, change email options, or unsubscribe: 
    http://groups.google.com/group/chromium-dev
-~----------~----~----~----~------~----~------~--~---

Reply via email to