[LLVMbugs] [Bug 16197] New: AddressSanitizer: Linux '-m32' tests cannot be avoidable if '-m32' option is not supported

bugzilla-daemon at llvm.org bugzilla-daemon at llvm.org
Sun Jun 2 13:56:26 PDT 2013


http://llvm.org/bugs/show_bug.cgi?id=16197

            Bug ID: 16197
           Summary: AddressSanitizer: Linux '-m32' tests cannot be
                    avoidable if '-m32' option is not supported
           Product: compiler-rt
           Version: unspecified
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: compiler-rt
          Assignee: unassignedbugs at nondot.org
          Reporter: ed0.88.prez at gmail.com
                CC: llvmbugs at cs.uiuc.edu
    Classification: Unclassified

Hi. I get these failures in the following tests:


Failing Tests (28):
    AddressSanitizer :: Linux/clone_test.cc
    AddressSanitizer :: Linux/glob.cc
    AddressSanitizer :: Linux/heavy_uar_test.cc
    AddressSanitizer :: Linux/interception_failure_test.cc
    AddressSanitizer :: Linux/interception_malloc_test.cc
    AddressSanitizer :: Linux/interception_test.cc
    AddressSanitizer :: allow_user_segv.cc
    AddressSanitizer :: blacklist.cc
    AddressSanitizer :: deep_stack_uaf.cc
    AddressSanitizer :: deep_tail_call.cc
    AddressSanitizer :: deep_thread_stack.cc
    AddressSanitizer :: global-overflow.cc
    AddressSanitizer :: heap-overflow.cc
    AddressSanitizer :: initialization-blacklist.cc
    AddressSanitizer :: initialization-bug.cc
    AddressSanitizer :: initialization-constexpr.cc
    AddressSanitizer :: initialization-nobug.cc
    AddressSanitizer :: large_func_test.cc
    AddressSanitizer :: memcmp_test.cc
    AddressSanitizer :: null_deref.cc
    AddressSanitizer :: partial_right.cc
    AddressSanitizer :: shared-lib-test.cc
    AddressSanitizer :: stack-overflow.cc
    AddressSanitizer :: strncpy-overflow.cc
    AddressSanitizer :: use-after-free-right.cc
    AddressSanitizer :: use-after-free.cc
    AddressSanitizer :: use-after-scope-inlined.cc
    AddressSanitizer :: wait.cc

All of these have commands like this:

"// RUN: %clangxx_asan -m32 -O2 %s -o %t &&
ASAN_OPTIONS=allow_user_segv_handler=true %t 2>&1 | FileCheck %s"

which my system don't support.

Because of this, I can't be certain if I get regressions or not when I update
the code base.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20130602/bc60023d/attachment.html>


More information about the llvm-bugs mailing list