OLD | NEW |
1 #!/usr/bin/env python | 1 #!/usr/bin/env python |
2 # Copyright (c) 2012 The Chromium Authors. All rights reserved. | 2 # Copyright (c) 2012 The Chromium Authors. All rights reserved. |
3 # Use of this source code is governed by a BSD-style license that can be | 3 # Use of this source code is governed by a BSD-style license that can be |
4 # found in the LICENSE file. | 4 # found in the LICENSE file. |
5 | 5 |
6 """A tool used to run a Chrome test executable and process the output. | 6 """A tool used to run a Chrome test executable and process the output. |
7 | 7 |
8 This script is used by the buildbot slaves. It must be run from the outer | 8 This script is used by the buildbot slaves. It must be run from the outer |
9 build directory, e.g. chrome-release/build/. | 9 build directory, e.g. chrome-release/build/. |
10 | 10 |
(...skipping 1722 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1733 if options.enable_lsan: | 1733 if options.enable_lsan: |
1734 # Symbolization options set here take effect only for standalone LSan. | 1734 # Symbolization options set here take effect only for standalone LSan. |
1735 lsan_options = symbolization_options | 1735 lsan_options = symbolization_options |
1736 AddToExistingEnv(extra_env, 'LSAN_OPTIONS', lsan_options) | 1736 AddToExistingEnv(extra_env, 'LSAN_OPTIONS', lsan_options) |
1737 | 1737 |
1738 # Disable sandboxing under LSan. | 1738 # Disable sandboxing under LSan. |
1739 args.append(disable_sandbox_flag) | 1739 args.append(disable_sandbox_flag) |
1740 | 1740 |
1741 # AddressSanitizer | 1741 # AddressSanitizer |
1742 if options.enable_asan: | 1742 if options.enable_asan: |
1743 # Avoid aggressive memcmp checks until http://crbug.com/178677 is | 1743 asan_options = symbolization_options |
1744 # fixed. Also do not replace memcpy/memmove/memset to suppress a | |
1745 # report in OpenCL, see http://crbug.com/162461. | |
1746 asan_options = symbolization_options + \ | |
1747 ['strict_memcmp=0', | |
1748 'replace_intrin=0'] | |
1749 if options.enable_lsan: | 1744 if options.enable_lsan: |
1750 asan_options += ['detect_leaks=1'] | 1745 asan_options += ['detect_leaks=1'] |
1751 AddToExistingEnv(extra_env, 'ASAN_OPTIONS', asan_options) | 1746 AddToExistingEnv(extra_env, 'ASAN_OPTIONS', asan_options) |
1752 | 1747 |
1753 # MemorySanitizer | 1748 # MemorySanitizer |
1754 if options.enable_msan: | 1749 if options.enable_msan: |
1755 msan_options = symbolization_options | 1750 msan_options = symbolization_options |
1756 if options.enable_lsan: | 1751 if options.enable_lsan: |
1757 msan_options += ['detect_leaks=1'] | 1752 msan_options += ['detect_leaks=1'] |
1758 AddToExistingEnv(extra_env, 'MSAN_OPTIONS', msan_options) | 1753 AddToExistingEnv(extra_env, 'MSAN_OPTIONS', msan_options) |
(...skipping 311 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2070 finally: | 2065 finally: |
2071 if did_launch_dbus: | 2066 if did_launch_dbus: |
2072 # It looks like the command line argument --exit-with-session | 2067 # It looks like the command line argument --exit-with-session |
2073 # isn't working to clean up the spawned dbus-daemon. Kill it | 2068 # isn't working to clean up the spawned dbus-daemon. Kill it |
2074 # manually. | 2069 # manually. |
2075 _ShutdownDBus() | 2070 _ShutdownDBus() |
2076 | 2071 |
2077 | 2072 |
2078 if '__main__' == __name__: | 2073 if '__main__' == __name__: |
2079 sys.exit(main()) | 2074 sys.exit(main()) |
OLD | NEW |