<html>
    <head>
      <base href="https://llvm.org/bugs/" />
    </head>
    <body><table border="1" cellspacing="0" cellpadding="8">
        <tr>
          <th>Bug ID</th>
          <td><a class="bz_bug_link 
          bz_status_NEW "
   title="NEW --- - Identify what's unstable about ARM for sanitizers"
   href="https://llvm.org/bugs/show_bug.cgi?id=31074">31074</a>
          </td>
        </tr>

        <tr>
          <th>Summary</th>
          <td>Identify what's unstable about ARM for sanitizers
          </td>
        </tr>

        <tr>
          <th>Product</th>
          <td>compiler-rt
          </td>
        </tr>

        <tr>
          <th>Version</th>
          <td>unspecified
          </td>
        </tr>

        <tr>
          <th>Hardware</th>
          <td>PC
          </td>
        </tr>

        <tr>
          <th>OS</th>
          <td>Linux
          </td>
        </tr>

        <tr>
          <th>Status</th>
          <td>NEW
          </td>
        </tr>

        <tr>
          <th>Severity</th>
          <td>normal
          </td>
        </tr>

        <tr>
          <th>Priority</th>
          <td>P
          </td>
        </tr>

        <tr>
          <th>Component</th>
          <td>compiler-rt
          </td>
        </tr>

        <tr>
          <th>Assignee</th>
          <td>unassignedbugs@nondot.org
          </td>
        </tr>

        <tr>
          <th>Reporter</th>
          <td>renato.golin@linaro.org
          </td>
        </tr>

        <tr>
          <th>CC</th>
          <td>llvm-bugs@lists.llvm.org
          </td>
        </tr>

        <tr>
          <th>Classification</th>
          <td>Unclassified
          </td>
        </tr></table>
      <p>
        <div>
        <pre>A while ago, when we started testing the sanitizers on ARM, we have identified
a number of "unstable" tests that could not be easily explained. 

The test fail consistently on a board+OS combination, however, on different
boards and similar OS (+compiler+libs+tools), the test pass. Also, some
configurations pass on stage 1 and fail on stage 2 and 3, but on others, the
same test fails on stage 1 and pass on stage 2 and 3.

Pass here generally means the stack trace is in the correct order and have
captured the function names correctly, while fail means the location was
"unknown", or the stack track failed completely, due to unwind failures.

Here's the list of all 36 the tests that were disabled with the
"stable-runtime" flag:

asan/TestCases/Posix/current_allocated_bytes.cc
asan/TestCases/Posix/stack-overflow.cc
asan/TestCases/Posix/deep_thread_stack.cc
asan/TestCases/Posix/asan-symbolize-sanity-test.cc
asan/TestCases/Posix/gc-test.cc
asan/TestCases/alloca_loop_unpoisoning.cc
asan/TestCases/double-free.cc
asan/TestCases/debug_stacks.cc
asan/TestCases/alloca_vla_interact.cc
asan/TestCases/use-after-free-right.cc
asan/TestCases/use-after-delete.cc
asan/TestCases/invalid-free.cc
asan/TestCases/sanity_check_pure_c.c
asan/TestCases/vla_condition_overflow.cc
asan/TestCases/vla_loop_overfow.cc
asan/TestCases/use-after-free.cc
asan/TestCases/deep_stack_uaf.cc
asan/TestCases/large_func_test.cc
asan/TestCases/strncpy-overflow.cc
asan/TestCases/Linux/malloc_delete_mismatch.cc
asan/TestCases/Linux/uar_signals.cc
asan/TestCases/Linux/stack-trace-dlclose.cc
ubsan/TestCases/Misc/nonnull-arg.cpp
ubsan/TestCases/TypeCheck/vptr-corrupted-vtable-itanium.cpp
ubsan/TestCases/TypeCheck/vptr.cpp
safestack/canary.c
safestack/overflow.c
sanitizer_common/TestCases/Posix/getpass.cc
sanitizer_common/TestCases/Posix/dedup_token_length_test.cc
sanitizer_common/TestCases/Posix/sanitizer_set_death_callback_test.cc
sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc
sanitizer_common/TestCases/Linux/decorate_proc_maps.cc
tsan/ignore_lib1.cc
tsan/ignore_lib0.cc
tsan/ignore_lib3.cc
msan/Linux/mallinfo.cc</pre>
        </div>
      </p>
      <hr>
      <span>You are receiving this mail because:</span>
      
      <ul>
          <li>You are on the CC list for the bug.</li>
      </ul>
    </body>
</html>