sandboxType=none executionType=none # To run wine, point these at your wine and wineserver executables #wine= #wineServer= winePrefix=/tmp/ce-wine-prefix firejail=firejail nsjail=nsjail nsjail.config.execute=etc/nsjail/compilers-and-tools.cfg nsjail.config.sandbox=etc/nsjail/user-execution.cfg firejail.profile.execute=etc/firejail/compilers-and-tools.profile firejail.profile.sandbox=etc/firejail/user-execution.profile firejail.profile.wine=etc/firejail/wine.profile cewrapper= cewrapper.config.sandbox=etc/cewrapper/user-execution.json cewrapper.config.execute=etc/cewrapper/compilers-and-tools.json # stdbuf operates by injecting a library into the target executable with LD_PRELOAD, which clashes with # asan and other scenarios. Disabling for now - still not deleting code until faketty is implemented. # Prefix execution with `stdbuf -o0` to have stdout output also for crashing executions. # Discussed further in https://github.com/compiler-explorer/compiler-explorer/issues/7239 # unbufferStdoutExe=stdbuf # unbufferStdoutArgs=-o0