From 0e56b623a543372224b9d8ba7bb1db81ec7b8024 Mon Sep 17 00:00:00 2001 From: Evgeniy Stepanov Date: Wed, 28 May 2014 13:45:18 +0000 Subject: [PATCH] [asan] Mass-xfail 17 tests on Android. This makes check-asan pass on Android, which should help prevent future regressions. https://code.google.com/p/address-sanitizer/issues/detail?id=316 llvm-svn: 209736 --- compiler-rt/test/asan/TestCases/Linux/coverage-maybe-open-file.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/glob.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/interception_readdir_r_test.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/kernel-area.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/odr-violation.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/preinit_test.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/ptrace.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/shmctl.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/stack-trace-dlclose.cc | 3 +++ compiler-rt/test/asan/TestCases/Linux/syscalls.cc | 3 +++ compiler-rt/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc | 3 +++ compiler-rt/test/asan/TestCases/default_blacklist.cc | 3 +++ compiler-rt/test/asan/TestCases/global-demangle.cc | 3 +++ compiler-rt/test/asan/TestCases/init-order-atexit.cc | 3 +++ compiler-rt/test/asan/TestCases/log-path_test.cc | 3 +++ compiler-rt/test/asan/TestCases/lsan_annotations.cc | 3 +++ compiler-rt/test/asan/TestCases/no_asan_gen_globals.c | 3 +++ 17 files changed, 51 insertions(+) diff --git a/compiler-rt/test/asan/TestCases/Linux/coverage-maybe-open-file.cc b/compiler-rt/test/asan/TestCases/Linux/coverage-maybe-open-file.cc index 4665123..1cd2253 100644 --- a/compiler-rt/test/asan/TestCases/Linux/coverage-maybe-open-file.cc +++ b/compiler-rt/test/asan/TestCases/Linux/coverage-maybe-open-file.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -mllvm -asan-coverage=1 %s -o %t // RUN: rm -rf %T/coverage-maybe-open-file // RUN: mkdir -p %T/coverage-maybe-open-file && cd %T/coverage-maybe-open-file diff --git a/compiler-rt/test/asan/TestCases/Linux/glob.cc b/compiler-rt/test/asan/TestCases/Linux/glob.cc index c1dbeda..2cc8f41 100644 --- a/compiler-rt/test/asan/TestCases/Linux/glob.cc +++ b/compiler-rt/test/asan/TestCases/Linux/glob.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && %run %t %p 2>&1 | FileCheck %s // RUN: %clangxx_asan -O3 %s -o %t && %run %t %p 2>&1 | FileCheck %s diff --git a/compiler-rt/test/asan/TestCases/Linux/interception_readdir_r_test.cc b/compiler-rt/test/asan/TestCases/Linux/interception_readdir_r_test.cc index 347320a..93b553c 100644 --- a/compiler-rt/test/asan/TestCases/Linux/interception_readdir_r_test.cc +++ b/compiler-rt/test/asan/TestCases/Linux/interception_readdir_r_test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s // RUN: %clangxx_asan -O1 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s // RUN: %clangxx_asan -O2 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s diff --git a/compiler-rt/test/asan/TestCases/Linux/kernel-area.cc b/compiler-rt/test/asan/TestCases/Linux/kernel-area.cc index 4b330f2..8dd509f 100644 --- a/compiler-rt/test/asan/TestCases/Linux/kernel-area.cc +++ b/compiler-rt/test/asan/TestCases/Linux/kernel-area.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Test that kernel area is not sanitized on 32-bit machines. // // RUN: %clangxx_asan %s -o %t diff --git a/compiler-rt/test/asan/TestCases/Linux/odr-violation.cc b/compiler-rt/test/asan/TestCases/Linux/odr-violation.cc index 91fa6d5..a5fa289 100644 --- a/compiler-rt/test/asan/TestCases/Linux/odr-violation.cc +++ b/compiler-rt/test/asan/TestCases/Linux/odr-violation.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Different size: detect a bug if detect_odr_violation>=1 // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t.so // RUN: %clangxx_asan %s %t.so -Wl,-R. -o %t diff --git a/compiler-rt/test/asan/TestCases/Linux/preinit_test.cc b/compiler-rt/test/asan/TestCases/Linux/preinit_test.cc index ab62d63..10dde67 100644 --- a/compiler-rt/test/asan/TestCases/Linux/preinit_test.cc +++ b/compiler-rt/test/asan/TestCases/Linux/preinit_test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx -DFUNC=zzzz %s -shared -o %t.so -fPIC // RUN: %clangxx_asan -DFUNC=main %s -o %t -Wl,-R. %t.so // RUN: %run %t diff --git a/compiler-rt/test/asan/TestCases/Linux/ptrace.cc b/compiler-rt/test/asan/TestCases/Linux/ptrace.cc index 90086a0..94037ce 100644 --- a/compiler-rt/test/asan/TestCases/Linux/ptrace.cc +++ b/compiler-rt/test/asan/TestCases/Linux/ptrace.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && %run %t // RUN: %clangxx_asan -DPOSITIVE -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s diff --git a/compiler-rt/test/asan/TestCases/Linux/shmctl.cc b/compiler-rt/test/asan/TestCases/Linux/shmctl.cc index 5fc9b46..e1752bc 100644 --- a/compiler-rt/test/asan/TestCases/Linux/shmctl.cc +++ b/compiler-rt/test/asan/TestCases/Linux/shmctl.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O1 %s -o %t && %run %t 2>&1 // Regression test for // https://code.google.com/p/address-sanitizer/issues/detail?id=250 diff --git a/compiler-rt/test/asan/TestCases/Linux/stack-trace-dlclose.cc b/compiler-rt/test/asan/TestCases/Linux/stack-trace-dlclose.cc index 3c6812b..4c9a934 100644 --- a/compiler-rt/test/asan/TestCases/Linux/stack-trace-dlclose.cc +++ b/compiler-rt/test/asan/TestCases/Linux/stack-trace-dlclose.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -DSHARED %s -shared -o %T/stack_trace_dlclose.so -fPIC // RUN: %clangxx_asan -DSO_DIR=\"%T\" %s -o %t // RUN: ASAN_OPTIONS=exitcode=0 %run %t 2>&1 | FileCheck %s diff --git a/compiler-rt/test/asan/TestCases/Linux/syscalls.cc b/compiler-rt/test/asan/TestCases/Linux/syscalls.cc index ec14bca7..bcdd5bc 100644 --- a/compiler-rt/test/asan/TestCases/Linux/syscalls.cc +++ b/compiler-rt/test/asan/TestCases/Linux/syscalls.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s // RUN: %clangxx_asan -O3 %s -o %t && not %run %t 2>&1 | FileCheck %s diff --git a/compiler-rt/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc b/compiler-rt/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc index 1aa41b6..b1376ea 100644 --- a/compiler-rt/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc +++ b/compiler-rt/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Check that asan_symbolize.py script works (for binaries, ASan RTL and // shared object files. diff --git a/compiler-rt/test/asan/TestCases/default_blacklist.cc b/compiler-rt/test/asan/TestCases/default_blacklist.cc index 25a1ae1..9358cc4 100644 --- a/compiler-rt/test/asan/TestCases/default_blacklist.cc +++ b/compiler-rt/test/asan/TestCases/default_blacklist.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Test that ASan uses the default blacklist from resource directory. // RUN: %clangxx_asan -### %s 2>&1 | FileCheck %s // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt diff --git a/compiler-rt/test/asan/TestCases/global-demangle.cc b/compiler-rt/test/asan/TestCases/global-demangle.cc index 5f7ff91..2bfa0d1 100644 --- a/compiler-rt/test/asan/TestCases/global-demangle.cc +++ b/compiler-rt/test/asan/TestCases/global-demangle.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=264 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s namespace XXX { diff --git a/compiler-rt/test/asan/TestCases/init-order-atexit.cc b/compiler-rt/test/asan/TestCases/init-order-atexit.cc index c4defaf..e0dac32 100644 --- a/compiler-rt/test/asan/TestCases/init-order-atexit.cc +++ b/compiler-rt/test/asan/TestCases/init-order-atexit.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Test for the following situation: // (1) global A is constructed. // (2) exit() is called during construction of global B. diff --git a/compiler-rt/test/asan/TestCases/log-path_test.cc b/compiler-rt/test/asan/TestCases/log-path_test.cc index f68c94c..5a1d072 100644 --- a/compiler-rt/test/asan/TestCases/log-path_test.cc +++ b/compiler-rt/test/asan/TestCases/log-path_test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan %s -o %t // Regular run. diff --git a/compiler-rt/test/asan/TestCases/lsan_annotations.cc b/compiler-rt/test/asan/TestCases/lsan_annotations.cc index f52b0ff..84c2878 100644 --- a/compiler-rt/test/asan/TestCases/lsan_annotations.cc +++ b/compiler-rt/test/asan/TestCases/lsan_annotations.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Check that LSan annotations work fine. // RUN: %clangxx_asan -O0 %s -o %t && %run %t // RUN: %clangxx_asan -O3 %s -o %t && %run %t diff --git a/compiler-rt/test/asan/TestCases/no_asan_gen_globals.c b/compiler-rt/test/asan/TestCases/no_asan_gen_globals.c index a747d7a..0a383da 100644 --- a/compiler-rt/test/asan/TestCases/no_asan_gen_globals.c +++ b/compiler-rt/test/asan/TestCases/no_asan_gen_globals.c @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Make sure __asan_gen_* strings do not end up in the symbol table. // RUN: %clang_asan %s -o %t.exe -- 2.7.4