• Home
  • Raw
  • Download

Lines Matching +full:gtk +full:- +full:doc +full:- +full:tools

3 # Use of this source code is governed by a BSD-style license that can be
24 sanitizers = ['asan', 'lsan', 'msan', 'tsan', 'coverage-continuous-mode',
25 'skip-set-lpac-acls']
26 internal_flags = frozenset('--%s=%d' % (name, value)
43 """Returns the environment flags needed for sanitizer tools."""
47 # Instruct GTK to use malloc while running sanitizer-instrumented tests.
48 extra_env['G_SLICE'] = 'always-malloc'
54 # https://code.google.com/p/address-sanitizer/issues/detail?id=134 is fixed.
56 'third_party', 'llvm-build', 'Release+Asserts', 'bin', 'llvm-symbolizer')
59 # LSan is not sandbox-compatible, so we can use online symbolization. In
68 # Set the path to llvm-symbolizer to be used by asan_symbolize.py
96 extra_env['LD_LIBRARY_PATH'] = '/usr/lib/x86_64-linux-gnu/debug:'
135 ROOT_DIR, 'tools', 'valgrind', 'asan', 'asan_symbolize.py')
138 cmd.append('--test-summary-json-file=%s' % json_path)
140 cmd.append('--executable-path=%s' % executable_path)
146 json_path_flag = '--test-launcher-summary-output='
177 ROOT_DIR, 'tools', 'memory', 'sanitizer',
180 cmd.append('--test-summary-json-file=%s' % json_path)
213 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
226 sys.stdout.write(reader.read().decode('utf-8'))
231 sys.stdout.write(reader.read().decode('utf-8'))
241 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
260 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
275 """A version of process.wait() that works cross-platform.
300 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
311 # pylint: disable=no-member
317 # pylint: enable=no-member
319 signal.signal(signal.SIGBREAK, _sig_handler) # pylint: disable=no-member
327 - CHROME_HEADLESS set to indicate that the test is running on a
329 - environment variable CR_SOURCE_ROOT set to the root directory.
330 - environment variable LANGUAGE to en_US.UTF-8.
331 - environment variable CHROME_DEVEL_SANDBOX set
332 - Reuses sys.executable automatically.
335 # Set to indicate that the executable is running non-interactively on
340 'LANG': 'en_US.UTF-8',
347 # Copy logic from tools/build/scripts/slave/runtest.py.
348 asan = '--asan=1' in cmd
349 lsan = '--lsan=1' in cmd
350 msan = '--msan=1' in cmd
351 tsan = '--tsan=1' in cmd
352 cfi_diag = '--cfi-diag=1' in cmd
354 use_sanitizer_warnings_script = '--fail-san=1' in cmd
356 # Symbolization works in-process on Windows even when sandboxed.
367 # LSan and TSan are not sandbox-friendly.
368 cmd.append('--no-sandbox')
371 if '--coverage-continuous-mode=1' in cmd:
374 # pylint: disable=import-outside-toplevel
375 if '--skip-set-lpac-acls=1' not in cmd and sys.platform == 'win32':
380 # pylint: enable=import-outside-toplevel
421 # Also feed the out-of-band JSON output to the symbolizer script.
426 # Check if we should post-process sanitizer warnings.