| Index: testing/test_env.py
|
| diff --git a/testing/test_env.py b/testing/test_env.py
|
| index 052df6769b262c442a5b8721ae38c166c659c0b8..0513e1a0fd96c2d1dc58e3eb3128ee96651a5e7d 100755
|
| --- a/testing/test_env.py
|
| +++ b/testing/test_env.py
|
| @@ -65,8 +65,8 @@ def get_sanitizer_env(cmd, asan, lsan, msan, tsan):
|
|
|
| # TODO(glider): remove the symbolizer path once
|
| # https://code.google.com/p/address-sanitizer/issues/detail?id=134 is fixed.
|
| - symbolizer_path = os.path.abspath(os.path.join(ROOT_DIR, 'third_party',
|
| - 'llvm-build', 'Release+Asserts', 'bin', 'llvm-symbolizer'))
|
| + symbolizer_path = os.path.join(ROOT_DIR,
|
| + 'third_party', 'llvm-build', 'Release+Asserts', 'bin', 'llvm-symbolizer')
|
|
|
| if lsan or tsan:
|
| # LSan is not sandbox-compatible, so we can use online symbolization. In
|
| @@ -125,7 +125,8 @@ def get_sanitizer_env(cmd, asan, lsan, msan, tsan):
|
|
|
| def get_sanitizer_symbolize_command(json_path=None, executable_path=None):
|
| """Construct the command to invoke offline symbolization script."""
|
| - script_path = '../tools/valgrind/asan/asan_symbolize.py'
|
| + script_path = os.path.join(
|
| + ROOT_DIR, 'tools', 'valgrind', 'asan', 'asan_symbolize.py')
|
| cmd = [sys.executable, script_path]
|
| if json_path is not None:
|
| cmd.append('--test-summary-json-file=%s' % json_path)
|
|
|