Lines Matching +full:gtk +full:- +full:doc +full:- +full:tools
3 # Use of this source code is governed by a BSD-style license that can be
23 'asan', 'lsan', 'msan', 'tsan', 'coverage-continuous-mode',
24 'skip-set-lpac-acls'
26 internal_flags = frozenset('--%s=%d' % (name, value) for name in sanitizers
47 """Returns the environment flags needed for sanitizer tools."""
51 # Instruct GTK to use malloc while running sanitizer-instrumented tests.
52 extra_env['G_SLICE'] = 'always-malloc'
58 # https://code.google.com/p/address-sanitizer/issues/detail?id=134 is fixed.
59 symbolizer_path = os.path.join(ROOT_DIR, 'third_party', 'llvm-build',
60 'Release+Asserts', 'bin', 'llvm-symbolizer')
63 # LSan is not sandbox-compatible, so we can use online symbolization. In
74 # Set the path to llvm-symbolizer to be used by asan_symbolize.py
102 extra_env['LD_LIBRARY_PATH'] = '/usr/lib/x86_64-linux-gnu/debug:'
147 script_path = os.path.join(ROOT_DIR, 'tools', 'valgrind', 'asan',
151 cmd.append('--test-summary-json-file=%s' % json_path)
153 cmd.append('--executable-path=%s' % executable_path)
159 json_path_flag = '--test-launcher-summary-output='
189 script_path = os.path.join(ROOT_DIR, 'tools', 'memory', 'sanitizer',
192 cmd.append('--test-summary-json-file=%s' % json_path)
226 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
242 sys.stdout.write(reader.read().decode('utf-8'))
247 sys.stdout.write(reader.read().decode('utf-8'))
257 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
276 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
294 """A version of process.wait() that works cross-platform.
319 …ooglesource.com/infra/luci/luci-py/+/main/appengine/swarming/doc/Bot.md#graceful-termination_aka-t…
331 # pylint: disable=no-member
337 # pylint: enable=no-member
340 signal.signal(signal.SIGBREAK, _sig_handler) # pylint: disable=no-member
348 - CHROME_HEADLESS set to indicate that the test is running on a
350 - environment variable CR_SOURCE_ROOT set to the root directory.
351 - environment variable LANGUAGE to en_US.UTF-8.
352 - environment variable CHROME_DEVEL_SANDBOX set
353 - Reuses sys.executable automatically.
356 # Set to indicate that the executable is running non-interactively on
361 'LANG': 'en_US.UTF-8',
368 # Copy logic from tools/build/scripts/slave/runtest.py.
369 asan = '--asan=1' in cmd
370 lsan = '--lsan=1' in cmd
371 msan = '--msan=1' in cmd
372 tsan = '--tsan=1' in cmd
373 cfi_diag = '--cfi-diag=1' in cmd
375 use_sanitizer_warnings_script = '--fail-san=1' in cmd
377 # Symbolization works in-process on Windows even when sandboxed.
391 # LSan and TSan are not sandbox-friendly.
392 cmd.append('--no-sandbox')
395 if '--coverage-continuous-mode=1' in cmd:
398 # pylint: disable=import-outside-toplevel
399 if '--skip-set-lpac-acls=1' not in cmd and sys.platform == 'win32':
402 from scripts import common # pylint: disable=cyclic-import
404 # pylint: enable=import-outside-toplevel
447 # Also feed the out-of-band JSON output to the symbolizer script.
452 # Check if we should post-process sanitizer warnings.