OLD | NEW |
1 #!/usr/bin/env python | 1 #!/usr/bin/env python |
2 # Copyright (c) 2012 The Chromium Authors. All rights reserved. | 2 # Copyright (c) 2012 The Chromium Authors. All rights reserved. |
3 # Use of this source code is governed by a BSD-style license that can be | 3 # Use of this source code is governed by a BSD-style license that can be |
4 # found in the LICENSE file. | 4 # found in the LICENSE file. |
5 | 5 |
6 """A tool used to run a Chrome test executable and process the output. | 6 """A tool used to run a Chrome test executable and process the output. |
7 | 7 |
8 This script is used by the buildbot slaves. It must be run from the outer | 8 This script is used by the buildbot slaves. It must be run from the outer |
9 build directory, e.g. chrome-release/build/. | 9 build directory, e.g. chrome-release/build/. |
10 | 10 |
(...skipping 1716 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1727 # ThreadSanitizer | 1727 # ThreadSanitizer |
1728 if options.enable_tsan: | 1728 if options.enable_tsan: |
1729 tsan_options = symbolization_options | 1729 tsan_options = symbolization_options |
1730 AddToExistingEnv(extra_env, 'TSAN_OPTIONS', tsan_options) | 1730 AddToExistingEnv(extra_env, 'TSAN_OPTIONS', tsan_options) |
1731 # Disable sandboxing under TSan for now. http://crbug.com/223602. | 1731 # Disable sandboxing under TSan for now. http://crbug.com/223602. |
1732 args.append(disable_sandbox_flag) | 1732 args.append(disable_sandbox_flag) |
1733 | 1733 |
1734 # LeakSanitizer | 1734 # LeakSanitizer |
1735 if options.enable_lsan: | 1735 if options.enable_lsan: |
1736 # Symbolization options set here take effect only for standalone LSan. | 1736 # Symbolization options set here take effect only for standalone LSan. |
1737 lsan_options = symbolization_options + \ | 1737 lsan_options = symbolization_options |
1738 ['suppressions=%s' % options.lsan_suppressions_file, | |
1739 'print_suppressions=1'] | |
1740 AddToExistingEnv(extra_env, 'LSAN_OPTIONS', lsan_options) | 1738 AddToExistingEnv(extra_env, 'LSAN_OPTIONS', lsan_options) |
1741 | 1739 |
1742 # Disable sandboxing under LSan. | 1740 # Disable sandboxing under LSan. |
1743 args.append(disable_sandbox_flag) | 1741 args.append(disable_sandbox_flag) |
1744 | 1742 |
1745 # AddressSanitizer | 1743 # AddressSanitizer |
1746 if options.enable_asan: | 1744 if options.enable_asan: |
1747 # Avoid aggressive memcmp checks until http://crbug.com/178677 is | 1745 # Avoid aggressive memcmp checks until http://crbug.com/178677 is |
1748 # fixed. Also do not replace memcpy/memmove/memset to suppress a | 1746 # fixed. Also do not replace memcpy/memmove/memset to suppress a |
1749 # report in OpenCL, see http://crbug.com/162461. | 1747 # report in OpenCL, see http://crbug.com/162461. |
(...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1912 option_parser.add_option('--webkit-revision', | 1910 option_parser.add_option('--webkit-revision', |
1913 help='See --revision.') | 1911 help='See --revision.') |
1914 option_parser.add_option('--enable-asan', action='store_true', default=False, | 1912 option_parser.add_option('--enable-asan', action='store_true', default=False, |
1915 help='Enable fast memory error detection ' | 1913 help='Enable fast memory error detection ' |
1916 '(AddressSanitizer). Can also enabled with the ' | 1914 '(AddressSanitizer). Can also enabled with the ' |
1917 'factory property "asan" (deprecated).') | 1915 'factory property "asan" (deprecated).') |
1918 option_parser.add_option('--enable-lsan', action='store_true', default=False, | 1916 option_parser.add_option('--enable-lsan', action='store_true', default=False, |
1919 help='Enable memory leak detection (LeakSanitizer). ' | 1917 help='Enable memory leak detection (LeakSanitizer). ' |
1920 'Can also be enabled with the factory ' | 1918 'Can also be enabled with the factory ' |
1921 'property "lsan" (deprecated).') | 1919 'property "lsan" (deprecated).') |
1922 option_parser.add_option('--lsan-suppressions-file', | |
1923 default='src/tools/lsan/suppressions.txt', | |
1924 help='Suppression file for LeakSanitizer. ' | |
1925 'Default: %default.') | |
1926 option_parser.add_option('--enable-msan', action='store_true', default=False, | 1920 option_parser.add_option('--enable-msan', action='store_true', default=False, |
1927 help='Enable uninitialized memory reads detection ' | 1921 help='Enable uninitialized memory reads detection ' |
1928 '(MemorySanitizer). Can also enabled with the ' | 1922 '(MemorySanitizer). Can also enabled with the ' |
1929 'factory property "msan" (deprecated).') | 1923 'factory property "msan" (deprecated).') |
1930 option_parser.add_option('--enable-tsan', action='store_true', default=False, | 1924 option_parser.add_option('--enable-tsan', action='store_true', default=False, |
1931 help='Enable data race detection ' | 1925 help='Enable data race detection ' |
1932 '(ThreadSanitizer). Can also enabled with the ' | 1926 '(ThreadSanitizer). Can also enabled with the ' |
1933 'factory property "tsan" (deprecated).') | 1927 'factory property "tsan" (deprecated).') |
1934 option_parser.add_option('--strip-path-prefix', | 1928 option_parser.add_option('--strip-path-prefix', |
1935 default='build/src/out/Release/../../', | 1929 default='build/src/out/Release/../../', |
(...skipping 142 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2078 finally: | 2072 finally: |
2079 if did_launch_dbus: | 2073 if did_launch_dbus: |
2080 # It looks like the command line argument --exit-with-session | 2074 # It looks like the command line argument --exit-with-session |
2081 # isn't working to clean up the spawned dbus-daemon. Kill it | 2075 # isn't working to clean up the spawned dbus-daemon. Kill it |
2082 # manually. | 2076 # manually. |
2083 _ShutdownDBus() | 2077 _ShutdownDBus() |
2084 | 2078 |
2085 | 2079 |
2086 if '__main__' == __name__: | 2080 if '__main__' == __name__: |
2087 sys.exit(main()) | 2081 sys.exit(main()) |
OLD | NEW |