diff options
author | Evgeniy Stepanov <eugeni.stepanov@gmail.com> | 2014-05-28 13:45:18 +0000 |
---|---|---|
committer | Evgeniy Stepanov <eugeni.stepanov@gmail.com> | 2014-05-28 13:45:18 +0000 |
commit | 1fc4afe6298391f7bf9c7c98387ba94f1b23b120 (patch) | |
tree | a546ff8ac98b7dd55d2741df853dbabcf204a257 /test/asan/TestCases | |
parent | 13c5ce2e9719dfa2b43b55aa3f6c5716283249e0 (diff) |
[asan] Mass-xfail 17 tests on Android.
This makes check-asan pass on Android, which should help prevent future
regressions.
https://code.google.com/p/address-sanitizer/issues/detail?id=316
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@209736 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'test/asan/TestCases')
-rw-r--r-- | test/asan/TestCases/Linux/coverage-maybe-open-file.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/glob.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/interception_readdir_r_test.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/kernel-area.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/odr-violation.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/preinit_test.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/ptrace.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/shmctl.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/stack-trace-dlclose.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Linux/syscalls.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/default_blacklist.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/global-demangle.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/init-order-atexit.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/log-path_test.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/lsan_annotations.cc | 3 | ||||
-rw-r--r-- | test/asan/TestCases/no_asan_gen_globals.c | 3 |
17 files changed, 51 insertions, 0 deletions
diff --git a/test/asan/TestCases/Linux/coverage-maybe-open-file.cc b/test/asan/TestCases/Linux/coverage-maybe-open-file.cc index 466512374..1cd2253e5 100644 --- a/test/asan/TestCases/Linux/coverage-maybe-open-file.cc +++ b/test/asan/TestCases/Linux/coverage-maybe-open-file.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -mllvm -asan-coverage=1 %s -o %t // RUN: rm -rf %T/coverage-maybe-open-file // RUN: mkdir -p %T/coverage-maybe-open-file && cd %T/coverage-maybe-open-file diff --git a/test/asan/TestCases/Linux/glob.cc b/test/asan/TestCases/Linux/glob.cc index c1dbeda43..2cc8f41ef 100644 --- a/test/asan/TestCases/Linux/glob.cc +++ b/test/asan/TestCases/Linux/glob.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && %run %t %p 2>&1 | FileCheck %s // RUN: %clangxx_asan -O3 %s -o %t && %run %t %p 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Linux/interception_readdir_r_test.cc b/test/asan/TestCases/Linux/interception_readdir_r_test.cc index 347320a36..93b553c37 100644 --- a/test/asan/TestCases/Linux/interception_readdir_r_test.cc +++ b/test/asan/TestCases/Linux/interception_readdir_r_test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s // RUN: %clangxx_asan -O1 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s // RUN: %clangxx_asan -O2 %s -DTEMP_DIR='"'"%T"'"' -o %t && %run %t 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Linux/kernel-area.cc b/test/asan/TestCases/Linux/kernel-area.cc index 4b330f27f..8dd509f84 100644 --- a/test/asan/TestCases/Linux/kernel-area.cc +++ b/test/asan/TestCases/Linux/kernel-area.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Test that kernel area is not sanitized on 32-bit machines. // // RUN: %clangxx_asan %s -o %t diff --git a/test/asan/TestCases/Linux/odr-violation.cc b/test/asan/TestCases/Linux/odr-violation.cc index 91fa6d558..a5fa28913 100644 --- a/test/asan/TestCases/Linux/odr-violation.cc +++ b/test/asan/TestCases/Linux/odr-violation.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Different size: detect a bug if detect_odr_violation>=1 // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t.so // RUN: %clangxx_asan %s %t.so -Wl,-R. -o %t diff --git a/test/asan/TestCases/Linux/preinit_test.cc b/test/asan/TestCases/Linux/preinit_test.cc index ab62d6327..10dde67d6 100644 --- a/test/asan/TestCases/Linux/preinit_test.cc +++ b/test/asan/TestCases/Linux/preinit_test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx -DFUNC=zzzz %s -shared -o %t.so -fPIC // RUN: %clangxx_asan -DFUNC=main %s -o %t -Wl,-R. %t.so // RUN: %run %t diff --git a/test/asan/TestCases/Linux/ptrace.cc b/test/asan/TestCases/Linux/ptrace.cc index 90086a057..94037ce9f 100644 --- a/test/asan/TestCases/Linux/ptrace.cc +++ b/test/asan/TestCases/Linux/ptrace.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && %run %t // RUN: %clangxx_asan -DPOSITIVE -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Linux/shmctl.cc b/test/asan/TestCases/Linux/shmctl.cc index 5fc9b4642..e1752bc89 100644 --- a/test/asan/TestCases/Linux/shmctl.cc +++ b/test/asan/TestCases/Linux/shmctl.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O1 %s -o %t && %run %t 2>&1 // Regression test for // https://code.google.com/p/address-sanitizer/issues/detail?id=250 diff --git a/test/asan/TestCases/Linux/stack-trace-dlclose.cc b/test/asan/TestCases/Linux/stack-trace-dlclose.cc index 3c6812b02..4c9a934b7 100644 --- a/test/asan/TestCases/Linux/stack-trace-dlclose.cc +++ b/test/asan/TestCases/Linux/stack-trace-dlclose.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -DSHARED %s -shared -o %T/stack_trace_dlclose.so -fPIC // RUN: %clangxx_asan -DSO_DIR=\"%T\" %s -o %t // RUN: ASAN_OPTIONS=exitcode=0 %run %t 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Linux/syscalls.cc b/test/asan/TestCases/Linux/syscalls.cc index ec14bca76..bcdd5bc82 100644 --- a/test/asan/TestCases/Linux/syscalls.cc +++ b/test/asan/TestCases/Linux/syscalls.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s // RUN: %clangxx_asan -O3 %s -o %t && not %run %t 2>&1 | FileCheck %s diff --git a/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc b/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc index 1aa41b64f..b1376eab4 100644 --- a/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc +++ b/test/asan/TestCases/Posix/asan-symbolize-sanity-test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Check that asan_symbolize.py script works (for binaries, ASan RTL and // shared object files. diff --git a/test/asan/TestCases/default_blacklist.cc b/test/asan/TestCases/default_blacklist.cc index 25a1ae175..9358cc47c 100644 --- a/test/asan/TestCases/default_blacklist.cc +++ b/test/asan/TestCases/default_blacklist.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Test that ASan uses the default blacklist from resource directory. // RUN: %clangxx_asan -### %s 2>&1 | FileCheck %s // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt diff --git a/test/asan/TestCases/global-demangle.cc b/test/asan/TestCases/global-demangle.cc index 5f7ff91b1..2bfa0d108 100644 --- a/test/asan/TestCases/global-demangle.cc +++ b/test/asan/TestCases/global-demangle.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=264 +// XFAIL: android +// // RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s namespace XXX { diff --git a/test/asan/TestCases/init-order-atexit.cc b/test/asan/TestCases/init-order-atexit.cc index c4defaf15..e0dac325c 100644 --- a/test/asan/TestCases/init-order-atexit.cc +++ b/test/asan/TestCases/init-order-atexit.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Test for the following situation: // (1) global A is constructed. // (2) exit() is called during construction of global B. diff --git a/test/asan/TestCases/log-path_test.cc b/test/asan/TestCases/log-path_test.cc index f68c94c7c..5a1d07291 100644 --- a/test/asan/TestCases/log-path_test.cc +++ b/test/asan/TestCases/log-path_test.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // RUN: %clangxx_asan %s -o %t // Regular run. diff --git a/test/asan/TestCases/lsan_annotations.cc b/test/asan/TestCases/lsan_annotations.cc index f52b0ff66..84c2878ed 100644 --- a/test/asan/TestCases/lsan_annotations.cc +++ b/test/asan/TestCases/lsan_annotations.cc @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Check that LSan annotations work fine. // RUN: %clangxx_asan -O0 %s -o %t && %run %t // RUN: %clangxx_asan -O3 %s -o %t && %run %t diff --git a/test/asan/TestCases/no_asan_gen_globals.c b/test/asan/TestCases/no_asan_gen_globals.c index a747d7a36..0a383da13 100644 --- a/test/asan/TestCases/no_asan_gen_globals.c +++ b/test/asan/TestCases/no_asan_gen_globals.c @@ -1,3 +1,6 @@ +// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 +// XFAIL: android +// // Make sure __asan_gen_* strings do not end up in the symbol table. // RUN: %clang_asan %s -o %t.exe |