mirror of
https://chromium.googlesource.com/libyuv/libyuv
synced 2025-12-07 01:06:46 +08:00
This is a renamed copy of the r3354 wrapper script existing for WebRTC located in trunk/tools/valgrind-webrtc/ of WebRTC (with suppressions cleaned). Using the libyuv_tests.[sh,bat] script, it is possible to run the libyuv unit tests under memory tools like Valgrind memcheck, Thread Sanitizer and Address Sanitizer. Adding this directory to libyuv makes it possible to handle suppressions entirely in libyuv, instead of depending on manually setting up the WebRTC wrapper script on the buildbots. Having this directory in libyuv is identical to the current buildbot setup in terms of execution, but will make the buildbot code cleaner. It also makes it convenient for libyuv developers to run memory tests. Examples: memcheck: tools/valgrind-libyuv/libyuv_tests.sh -t out/Debug/libyuv_unittest tsan: tools/valgrind-libyuv/libyuv_tests.sh --tool=tsan -t out/Debug/libyuv_unittest asan: tools/valgrind-libyuv/libyuv_tests.sh --tool=asan -t out/Debug/libyuv_unittest BUG=none TEST=Ran the command lines listed above. Review URL: https://webrtc-codereview.appspot.com/1023009 git-svn-id: http://libyuv.googlecode.com/svn/trunk@533 16f28f9a-4ce2-e073-06de-1de4eb20be90
139 lines
4.3 KiB
Bash
Executable File
139 lines
4.3 KiB
Bash
Executable File
#!/bin/bash
|
|
# Copyright (c) 2012 The LibYuv Project Authors. All rights reserved.
|
|
#
|
|
# Use of this source code is governed by a BSD-style license
|
|
# that can be found in the LICENSE file in the root of the source
|
|
# tree. An additional intellectual property rights grant can be found
|
|
# in the file PATENTS. All contributing project authors may
|
|
# be found in the AUTHORS file in the root of the source tree.
|
|
|
|
# Set up some paths and re-direct the arguments to libyuv_tests.py
|
|
|
|
# This script is a copy of the chrome_tests.sh wrapper script with the following
|
|
# changes:
|
|
# - The locate_valgrind.sh of Chromium's Valgrind scripts dir is used to locate
|
|
# the Valgrind framework install.
|
|
# - libyuv_tests.py is invoked instead of chrome_tests.py.
|
|
# - Chromium's Valgrind scripts directory is added to the PYTHONPATH to make it
|
|
# possible to execute the Python scripts properly.
|
|
|
|
export THISDIR=`dirname $0`
|
|
ARGV_COPY="$@"
|
|
|
|
# We need to set CHROME_VALGRIND iff using Memcheck or TSan-Valgrind:
|
|
# tools/valgrind-libyuv/libyuv_tests.sh --tool memcheck
|
|
# or
|
|
# tools/valgrind-libyuv/libyuv_tests.sh --tool=memcheck
|
|
# (same for "--tool=tsan")
|
|
tool="memcheck" # Default to memcheck.
|
|
while (( "$#" ))
|
|
do
|
|
if [[ "$1" == "--tool" ]]
|
|
then
|
|
tool="$2"
|
|
shift
|
|
elif [[ "$1" =~ --tool=(.*) ]]
|
|
then
|
|
tool="${BASH_REMATCH[1]}"
|
|
fi
|
|
shift
|
|
done
|
|
|
|
NEEDS_VALGRIND=0
|
|
NEEDS_DRMEMORY=0
|
|
|
|
case "$tool" in
|
|
"memcheck")
|
|
NEEDS_VALGRIND=1
|
|
;;
|
|
"tsan" | "tsan_rv")
|
|
if [ "`uname -s`" == CYGWIN* ]
|
|
then
|
|
NEEDS_PIN=1
|
|
else
|
|
NEEDS_VALGRIND=1
|
|
fi
|
|
;;
|
|
"drmemory" | "drmemory_light" | "drmemory_full" | "drmemory_pattern")
|
|
NEEDS_DRMEMORY=1
|
|
;;
|
|
esac
|
|
|
|
# For Libyuv, we'll use the locate_valgrind.sh script in Chromium's Valgrind
|
|
# scripts dir to locate the Valgrind framework install
|
|
CHROME_VALGRIND_SCRIPTS=$THISDIR/../valgrind
|
|
|
|
if [ "$NEEDS_VALGRIND" == "1" ]
|
|
then
|
|
CHROME_VALGRIND=`sh $CHROME_VALGRIND_SCRIPTS/locate_valgrind.sh`
|
|
if [ "$CHROME_VALGRIND" = "" ]
|
|
then
|
|
# locate_valgrind.sh failed
|
|
exit 1
|
|
fi
|
|
echo "Using valgrind binaries from ${CHROME_VALGRIND}"
|
|
|
|
PATH="${CHROME_VALGRIND}/bin:$PATH"
|
|
# We need to set these variables to override default lib paths hard-coded into
|
|
# Valgrind binary.
|
|
export VALGRIND_LIB="$CHROME_VALGRIND/lib/valgrind"
|
|
export VALGRIND_LIB_INNER="$CHROME_VALGRIND/lib/valgrind"
|
|
|
|
# Clean up some /tmp directories that might be stale due to interrupted
|
|
# chrome_tests.py execution.
|
|
# FYI:
|
|
# -mtime +1 <- only print files modified more than 24h ago,
|
|
# -print0/-0 are needed to handle possible newlines in the filenames.
|
|
echo "Cleanup /tmp from Valgrind stuff"
|
|
find /tmp -maxdepth 1 \(\
|
|
-name "vgdb-pipe-*" -or -name "vg_logs_*" -or -name "valgrind.*" \
|
|
\) -mtime +1 -print0 | xargs -0 rm -rf
|
|
fi
|
|
|
|
if [ "$NEEDS_DRMEMORY" == "1" ]
|
|
then
|
|
if [ -z "$DRMEMORY_COMMAND" ]
|
|
then
|
|
DRMEMORY_PATH="$THISDIR/../../third_party/drmemory"
|
|
DRMEMORY_SFX="$DRMEMORY_PATH/drmemory-windows-sfx.exe"
|
|
if [ ! -f "$DRMEMORY_SFX" ]
|
|
then
|
|
echo "Can't find Dr. Memory executables."
|
|
echo "See http://www.chromium.org/developers/how-tos/using-valgrind/dr-memory"
|
|
echo "for the instructions on how to get them."
|
|
exit 1
|
|
fi
|
|
|
|
chmod +x "$DRMEMORY_SFX" # Cygwin won't run it without +x.
|
|
"$DRMEMORY_SFX" -o"$DRMEMORY_PATH/unpacked" -y
|
|
export DRMEMORY_COMMAND="$DRMEMORY_PATH/unpacked/bin/drmemory.exe"
|
|
fi
|
|
fi
|
|
|
|
if [ "$NEEDS_PIN" == "1" ]
|
|
then
|
|
if [ -z "$PIN_COMMAND" ]
|
|
then
|
|
# Set up PIN_COMMAND to invoke TSan.
|
|
TSAN_PATH="$THISDIR/../../third_party/tsan"
|
|
TSAN_SFX="$TSAN_PATH/tsan-x86-windows-sfx.exe"
|
|
echo "$TSAN_SFX"
|
|
if [ ! -f $TSAN_SFX ]
|
|
then
|
|
echo "Can't find ThreadSanitizer executables."
|
|
echo "See http://www.chromium.org/developers/how-tos/using-valgrind/threadsanitizer/threadsanitizer-on-windows"
|
|
echo "for the instructions on how to get them."
|
|
exit 1
|
|
fi
|
|
|
|
chmod +x "$TSAN_SFX" # Cygwin won't run it without +x.
|
|
"$TSAN_SFX" -o"$TSAN_PATH"/unpacked -y
|
|
export PIN_COMMAND="$TSAN_PATH/unpacked/tsan-x86-windows/tsan.bat"
|
|
fi
|
|
fi
|
|
|
|
# Add Chrome's Valgrind scripts dir to the PYTHON_PATH since it contains
|
|
# the scripts that are needed for this script to run
|
|
PYTHONPATH=$THISDIR/../python/google:$CHROME_VALGRIND_SCRIPTS python \
|
|
"$THISDIR/libyuv_tests.py" $ARGV_COPY
|