forked from OSchip/llvm-project
[asan][tsan] Mark tests failing with debug checks as XFAIL
See https://llvm.org/PR46862. This does not fix the underlying issue but at least it allows me to run check-all again without having to disable building compiler-rt. Reviewed By: #sanitizers, vitalybuka Differential Revision: https://reviews.llvm.org/D84650
This commit is contained in:
parent
87de54dbb6
commit
895878f456
|
@ -1,6 +1,8 @@
|
||||||
// Test for ASAN_OPTIONS=start_deactivated=1 mode.
|
// Test for ASAN_OPTIONS=start_deactivated=1 mode.
|
||||||
// Main executable is uninstrumented, but linked to ASan runtime. The shared
|
// Main executable is uninstrumented, but linked to ASan runtime. The shared
|
||||||
// library is instrumented.
|
// library is instrumented.
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862
|
||||||
|
// XFAIL: !compiler-rt-optimized
|
||||||
|
|
||||||
// RUN: %clangxx_asan -O0 -DSHARED_LIB %s -fPIC -shared -o %t-so.so
|
// RUN: %clangxx_asan -O0 -DSHARED_LIB %s -fPIC -shared -o %t-so.so
|
||||||
// RUN: %clangxx -O0 %s -c -o %t.o
|
// RUN: %clangxx -O0 %s -c -o %t.o
|
||||||
|
|
|
@ -1,5 +1,7 @@
|
||||||
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||||||
// XFAIL: android
|
// XFAIL: android
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862
|
||||||
|
// XFAIL: !compiler-rt-optimized
|
||||||
//
|
//
|
||||||
// We use fast_unwind_on_malloc=0 to have full unwinding even w/o frame
|
// We use fast_unwind_on_malloc=0 to have full unwinding even w/o frame
|
||||||
// pointers. This setting is not on by default because it's too expensive.
|
// pointers. This setting is not on by default because it's too expensive.
|
||||||
|
|
|
@ -1,3 +1,6 @@
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862
|
||||||
|
// XFAIL: !compiler-rt-optimized
|
||||||
|
|
||||||
// RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared %s -o %dynamiclib1
|
// RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared %s -o %dynamiclib1
|
||||||
// RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared %s -o %dynamiclib2
|
// RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared %s -o %dynamiclib2
|
||||||
// RUN: %clangxx_asan -fno-rtti %s %ld_flags_rpath_exe1 %ld_flags_rpath_exe2 -o %t
|
// RUN: %clangxx_asan -fno-rtti %s %ld_flags_rpath_exe1 %ld_flags_rpath_exe2 -o %t
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
// Test for ASAN_OPTIONS=start_deactivated=1 mode.
|
// Test for ASAN_OPTIONS=start_deactivated=1 mode.
|
||||||
// Main executable is uninstrumented, but linked to ASan runtime. The shared
|
// Main executable is uninstrumented, but linked to ASan runtime. The shared
|
||||||
// library is instrumented. Memory errors before dlopen are not detected.
|
// library is instrumented. Memory errors before dlopen are not detected.
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862
|
||||||
|
// XFAIL: !compiler-rt-optimized
|
||||||
|
|
||||||
// RUN: %clangxx_asan -O0 -DSHARED_LIB %s -std=c++11 -fPIC -shared -o %t-so.so
|
// RUN: %clangxx_asan -O0 -DSHARED_LIB %s -std=c++11 -fPIC -shared -o %t-so.so
|
||||||
// RUN: %clangxx -O0 %s -std=c++11 -c -o %t.o
|
// RUN: %clangxx -O0 %s -std=c++11 -c -o %t.o
|
||||||
|
|
|
@ -1,4 +1,6 @@
|
||||||
// Regression test: __asan_handle_no_return should unpoison stack even with poison_heap=0.
|
// Regression test: __asan_handle_no_return should unpoison stack even with poison_heap=0.
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862
|
||||||
|
// XFAIL: !compiler-rt-optimized
|
||||||
// RUN: %clangxx_asan -O0 %s -o %t && \
|
// RUN: %clangxx_asan -O0 %s -o %t && \
|
||||||
// RUN: %env_asan_opts=poison_heap=1 %run %t && \
|
// RUN: %env_asan_opts=poison_heap=1 %run %t && \
|
||||||
// RUN: %env_asan_opts=poison_heap=0 %run %t
|
// RUN: %env_asan_opts=poison_heap=0 %run %t
|
||||||
|
|
|
@ -1,5 +1,7 @@
|
||||||
// Regression test for
|
// Regression test for
|
||||||
// https://code.google.com/p/address-sanitizer/issues/detail?id=180
|
// https://code.google.com/p/address-sanitizer/issues/detail?id=180
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860
|
||||||
|
// XFAIL: !compiler-rt-optimized && tsan
|
||||||
|
|
||||||
// RUN: %clangxx -O0 %s -o %t
|
// RUN: %clangxx -O0 %s -o %t
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,6 @@
|
||||||
// Test line numbers in signal handlers
|
// Test line numbers in signal handlers
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860
|
||||||
|
// XFAIL: !compiler-rt-optimized && tsan
|
||||||
|
|
||||||
// RUN: %clangxx %s -o %t -O0
|
// RUN: %clangxx %s -o %t -O0
|
||||||
// RUN: %env_tool_opts=handle_segv=1:print_stacktrace=1 not %run %t 1 2>&1 | FileCheck --check-prefixes=CHECK1,CHECK %s
|
// RUN: %env_tool_opts=handle_segv=1:print_stacktrace=1 not %run %t 1 2>&1 | FileCheck --check-prefixes=CHECK1,CHECK %s
|
||||||
|
|
|
@ -1,4 +1,6 @@
|
||||||
// Test dedup_token_length
|
// Test dedup_token_length
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860
|
||||||
|
// XFAIL: !compiler-rt-optimized && tsan
|
||||||
// RUN: %clangxx -O0 %s -o %t
|
// RUN: %clangxx -O0 %s -o %t
|
||||||
// RUN: env %tool_options='abort_on_error=0' not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK0 --match-full-lines
|
// RUN: env %tool_options='abort_on_error=0' not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK0 --match-full-lines
|
||||||
// RUN: env %tool_options='abort_on_error=0, dedup_token_length=0' not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK0 --match-full-lines
|
// RUN: env %tool_options='abort_on_error=0, dedup_token_length=0' not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK0 --match-full-lines
|
||||||
|
|
|
@ -1,4 +1,6 @@
|
||||||
// Test that there was an illegal READ memory access.
|
// Test that there was an illegal READ memory access.
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860
|
||||||
|
// XFAIL: !compiler-rt-optimized && tsan
|
||||||
// RUN: %clangxx -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
// RUN: %clangxx -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
||||||
|
|
||||||
// REQUIRES: stable-runtime
|
// REQUIRES: stable-runtime
|
||||||
|
|
|
@ -1,4 +1,6 @@
|
||||||
// Test that there was an illegal WRITE memory access.
|
// Test that there was an illegal WRITE memory access.
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860
|
||||||
|
// XFAIL: !compiler-rt-optimized && tsan
|
||||||
// RUN: %clangxx -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
// RUN: %clangxx -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
||||||
|
|
||||||
// REQUIRES: stable-runtime
|
// REQUIRES: stable-runtime
|
||||||
|
|
|
@ -1,4 +1,6 @@
|
||||||
// Test __sanitizer_set_report_fd:
|
// Test __sanitizer_set_report_fd:
|
||||||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860
|
||||||
|
// XFAIL: !compiler-rt-optimized && tsan
|
||||||
// RUN: %clangxx -O2 %s -o %t
|
// RUN: %clangxx -O2 %s -o %t
|
||||||
// RUN: not %run %t 2>&1 | FileCheck %s
|
// RUN: not %run %t 2>&1 | FileCheck %s
|
||||||
// RUN: not %run %t stdout | FileCheck %s
|
// RUN: not %run %t stdout | FileCheck %s
|
||||||
|
|
Loading…
Reference in New Issue