forked from OSchip/llvm-project
[asan] Mass-xfail 17 tests on Android.
This makes check-asan pass on Android, which should help prevent future regressions. https://code.google.com/p/address-sanitizer/issues/detail?id=316 llvm-svn: 209736
This commit is contained in:
parent
15d71b598e
commit
0e56b623a5
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -mllvm -asan-coverage=1 %s -o %t
|
||||
// RUN: rm -rf %T/coverage-maybe-open-file
|
||||
// RUN: mkdir -p %T/coverage-maybe-open-file && cd %T/coverage-maybe-open-file
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -O0 %s -o %t && %run %t %p 2>&1 | FileCheck %s
|
||||
// RUN: %clangxx_asan -O3 %s -o %t && %run %t %p 2>&1 | FileCheck %s
|
||||
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -O0 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s
|
||||
// RUN: %clangxx_asan -O1 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s
|
||||
// RUN: %clangxx_asan -O2 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// Test that kernel area is not sanitized on 32-bit machines.
|
||||
//
|
||||
// RUN: %clangxx_asan %s -o %t
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// Different size: detect a bug if detect_odr_violation>=1
|
||||
// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t.so
|
||||
// RUN: %clangxx_asan %s %t.so -Wl,-R. -o %t
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx -DFUNC=zzzz %s -shared -o %t.so -fPIC
|
||||
// RUN: %clangxx_asan -DFUNC=main %s -o %t -Wl,-R. %t.so
|
||||
// RUN: %run %t
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -O0 %s -o %t && %run %t
|
||||
// RUN: %clangxx_asan -DPOSITIVE -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
||||
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -O1 %s -o %t && %run %t 2>&1
|
||||
// Regression test for
|
||||
// https://code.google.com/p/address-sanitizer/issues/detail?id=250
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -DSHARED %s -shared -o %T/stack_trace_dlclose.so -fPIC
|
||||
// RUN: %clangxx_asan -DSO_DIR=\"%T\" %s -o %t
|
||||
// RUN: ASAN_OPTIONS=exitcode=0 %run %t 2>&1 | FileCheck %s
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
||||
// RUN: %clangxx_asan -O3 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
||||
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// Check that asan_symbolize.py script works (for binaries, ASan RTL and
|
||||
// shared object files.
|
||||
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// Test that ASan uses the default blacklist from resource directory.
|
||||
// RUN: %clangxx_asan -### %s 2>&1 | FileCheck %s
|
||||
// CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=264
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
||||
|
||||
namespace XXX {
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// Test for the following situation:
|
||||
// (1) global A is constructed.
|
||||
// (2) exit() is called during construction of global B.
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// RUN: %clangxx_asan %s -o %t
|
||||
|
||||
// Regular run.
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// Check that LSan annotations work fine.
|
||||
// RUN: %clangxx_asan -O0 %s -o %t && %run %t
|
||||
// RUN: %clangxx_asan -O3 %s -o %t && %run %t
|
||||
|
|
|
@ -1,3 +1,6 @@
|
|||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||
// XFAIL: android
|
||||
//
|
||||
// Make sure __asan_gen_* strings do not end up in the symbol table.
|
||||
|
||||
// RUN: %clang_asan %s -o %t.exe
|
||||
|
|
Loading…
Reference in New Issue