<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:Helvetica;
        panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-reply;
        font-family:"Calibri",sans-serif;
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri",sans-serif;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">I think the attachment was lost in the reply. Can you reattach?<o:p></o:p></span></p>
<p class="MsoNormal"><a name="_MailEndCompose"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p> </o:p></span></a></p>
<p class="MsoNormal"><a name="_____replyseparator"></a><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">From:</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> Vitaly Buka [mailto:vitalybuka@google.com]
<br>
<b>Sent:</b> Wednesday, September 27, 2017 2:58 PM<br>
<b>To:</b> Evgenii Stepanov <eugeni.stepanov@gmail.com><br>
<b>Cc:</b> Mike Edwards <mike@sqlby.me>; juergen@apple.com; LLVM Commits <llvm-commits@lists.llvm.org>; Topper, Craig <craig.topper@intel.com><br>
<b>Subject:</b> Re: [compiler-rt] r314041 - [lsan] Deadly signal handler for lsan<o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<p class="MsoNormal">I don't believe that it has anything to do with compiler-rt.<o:p></o:p></p>
<div>
<p class="MsoNormal">It's in InstCombiner, and the range has several related patches.<o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
<div>
<p class="MsoNormal">+<span style="font-family:"Helvetica",sans-serif;color:#333333">ctopper It's more likely </span><span style="font-size:10.0pt;font-family:"Helvetica",sans-serif;color:#333333">r314025</span><o:p></o:p></p>
</div>
</div>
<div>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<p class="MsoNormal">On Wed, Sep 27, 2017 at 2:41 PM, Evgenii Stepanov <<a href="mailto:eugeni.stepanov@gmail.com" target="_blank">eugeni.stepanov@gmail.com</a>> wrote:<o:p></o:p></p>
<blockquote style="border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class="MsoNormal">Are you a 100% sure you've got the right change? This one only touches<br>
the runtime support library, and error by the buildbot link shows a<br>
compiler crash.<o:p></o:p></p>
<div>
<div>
<p class="MsoNormal"><br>
On Wed, Sep 27, 2017 at 2:32 PM, Mike Edwards via llvm-commits<br>
<<a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a>> wrote:<br>
> Hi Vitaly,<br>
> We are seeing a bot failure with this commit.  The particular bot which<br>
> caught this error takes quite some time to run and this was bundled with<br>
> around 50 other commits so I apologize for the amount of time it took to get<br>
> the error to you.  The bot failure can be seen here:<br>
><br>
> <a href="http://green.lab.llvm.org/green/job/clang-stage2-cmake-RgSan_build/5097/" target="_blank">
http://green.lab.llvm.org/green/job/clang-stage2-cmake-RgSan_build/5097/</a><br>
><br>
> I have attached a reproducer to this email and here is the command line<br>
> invocation used to reproduce the issue:<br>
><br>
> <path to compiler built on r314041>/bin/clang++  -fPIC<br>
> -fvisibility-inlines-hidden -Werror=date-time<br>
> -Werror=unguarded-availability-new -std=c++11 -Wall -W -Wno-unused-parameter<br>
> -Wwrite-strings -Wcast-qual -Wmissing-field-initializers -pedantic<br>
> -Wno-long-long -Wcovered-switch-default -Wnon-virtual-dtor<br>
> -Wdelete-non-virtual-dtor -Wstring-conversion -fno-omit-frame-pointer<br>
> -fsanitize=address,undefined -fno-sanitize=vptr,function<br>
> -fno-sanitize-recover=all -fsanitize-address-use-after-scope<br>
> -fcolor-diagnostics -O2 -g  -fno-exceptions -fno-rtti -o /dev/null -c<br>
> BinaryStreamError.ii<br>
><br>
> This bot has been broken for almost 5 days now (this was my fault as it took<br>
> so much time to reproduce the issue) so if you could have a look and get a<br>
> patch up as soon as possible it would be greatly appreciated.<br>
><br>
> Respectfully,<br>
> Mike Edwards<br>
><br>
> On Fri, Sep 22, 2017 at 3:57 PM, Vitaly Buka via llvm-commits<br>
> <<a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a>> wrote:<br>
>><br>
>> Author: vitalybuka<br>
>> Date: Fri Sep 22 15:57:48 2017<br>
>> New Revision: 314041<br>
>><br>
>> URL: <a href="http://llvm.org/viewvc/llvm-project?rev=314041&view=rev" target="_blank">
http://llvm.org/viewvc/llvm-project?rev=314041&view=rev</a><br>
>> Log:<br>
>> [lsan] Deadly signal handler for lsan<br>
>><br>
>> Summary: Part of <a href="https://github.com/google/sanitizers/issues/637" target="_blank">
https://github.com/google/sanitizers/issues/637</a><br>
>><br>
>> Reviewers: eugenis, alekseyshl<br>
>><br>
>> Subscribers: llvm-commits, dberris, kubamracek, krytarowski<br>
>><br>
>> Differential Revision: <a href="https://reviews.llvm.org/D37608" target="_blank">
https://reviews.llvm.org/D37608</a><br>
>><br>
>> Modified:<br>
>>     compiler-rt/trunk/lib/lsan/lsan.cc<br>
>>     compiler-rt/trunk/lib/lsan/lsan_interceptors.cc<br>
>>     compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h<br>
>>     compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>>     compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc<br>
>>     compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>>     compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>><br>
>> Modified: compiler-rt/trunk/lib/lsan/lsan.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/lsan/lsan.cc (original)<br>
>> +++ compiler-rt/trunk/lib/lsan/lsan.cc Fri Sep 22 15:57:48 2017<br>
>> @@ -65,6 +65,18 @@ static void InitializeFlags() {<br>
>>    if (common_flags()->help) parser.PrintFlagDescriptions();<br>
>>  }<br>
>><br>
>> +static void OnStackUnwind(const SignalContext &sig, const void *,<br>
>> +                          BufferedStackTrace *stack) {<br>
>> +  GetStackTraceWithPcBpAndContext(stack, kStackTraceMax, sig.pc, sig.bp,<br>
>> +                                  sig.context,<br>
>> +                                  common_flags()->fast_unwind_on_fatal);<br>
>> +}<br>
>> +<br>
>> +void LsanOnDeadlySignal(int signo, void *siginfo, void *context) {<br>
>> +  HandleDeadlySignal(siginfo, context, GetCurrentThread(),<br>
>> &OnStackUnwind,<br>
>> +                     nullptr);<br>
>> +}<br>
>> +<br>
>>  extern "C" void __lsan_init() {<br>
>>    CHECK(!lsan_init_is_running);<br>
>>    if (lsan_inited)<br>
>> @@ -80,6 +92,7 @@ extern "C" void __lsan_init() {<br>
>>    InitTlsSize();<br>
>>    InitializeInterceptors();<br>
>>    InitializeThreadRegistry();<br>
>> +  InstallDeadlySignalHandlers(LsanOnDeadlySignal);<br>
>>    u32 tid = ThreadCreate(0, 0, true);<br>
>>    CHECK_EQ(tid, 0);<br>
>>    ThreadStart(tid, GetTid());<br>
>><br>
>> Modified: compiler-rt/trunk/lib/lsan/lsan_interceptors.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan_interceptors.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan_interceptors.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/lsan/lsan_interceptors.cc (original)<br>
>> +++ compiler-rt/trunk/lib/lsan/lsan_interceptors.cc Fri Sep 22 15:57:48<br>
>> 2017<br>
>> @@ -401,9 +401,14 @@ INTERCEPTOR(void, _exit, int status) {<br>
>>    REAL(_exit)(status);<br>
>>  }<br>
>><br>
>> +#define COMMON_INTERCEPT_FUNCTION(name) INTERCEPT_FUNCTION(name)<br>
>> +#include "sanitizer_common/sanitizer_signal_interceptors.inc"<br>
>> +<br>
>>  namespace __lsan {<br>
>><br>
>>  void InitializeInterceptors() {<br>
>> +  InitializeSignalInterceptors();<br>
>> +<br>
>>    INTERCEPT_FUNCTION(malloc);<br>
>>    INTERCEPT_FUNCTION(free);<br>
>>    LSAN_MAYBE_INTERCEPT_CFREE;<br>
>><br>
>> Modified: compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h (original)<br>
>> +++ compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h Fri Sep 22<br>
>> 15:57:48 2017<br>
>> @@ -318,15 +318,24 @@ void SetSoftRssLimitExceededCallback(voi<br>
>>  typedef void (*SignalHandlerType)(int, void *, void *);<br>
>>  HandleSignalMode GetHandleSignalMode(int signum);<br>
>>  void InstallDeadlySignalHandlers(SignalHandlerType handler);<br>
>> +<br>
>>  // Signal reporting.<br>
>> -void StartReportDeadlySignal();<br>
>>  // Each sanitizer uses slightly different implementation of stack<br>
>> unwinding.<br>
>>  typedef void (*UnwindSignalStackCallbackType)(const SignalContext &sig,<br>
>>                                                const void<br>
>> *callback_context,<br>
>>                                                BufferedStackTrace *stack);<br>
>> +// Print deadly signal report and die.<br>
>> +void HandleDeadlySignal(void *siginfo, void *context, u32 tid,<br>
>> +                        UnwindSignalStackCallbackType unwind,<br>
>> +                        const void *unwind_context);<br>
>> +<br>
>> +// Part of HandleDeadlySignal, exposed for asan.<br>
>> +void StartReportDeadlySignal();<br>
>> +// Part of HandleDeadlySignal, exposed for asan.<br>
>>  void ReportDeadlySignal(const SignalContext &sig, u32 tid,<br>
>>                          UnwindSignalStackCallbackType unwind,<br>
>>                          const void *unwind_context);<br>
>> +<br>
>>  // Alternative signal stack (POSIX-only).<br>
>>  void SetAlternateSignalStack();<br>
>>  void UnsetAlternateSignalStack();<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc Fri<br>
>> Sep 22 15:57:48 2017<br>
>> @@ -254,6 +254,18 @@ void ReportDeadlySignal(const SignalCont<br>
>>    else<br>
>>      ReportDeadlySignalImpl(sig, tid, unwind, unwind_context);<br>
>>  }<br>
>> +<br>
>> +void HandleDeadlySignal(void *siginfo, void *context, u32 tid,<br>
>> +                        UnwindSignalStackCallbackType unwind,<br>
>> +                        const void *unwind_context) {<br>
>> +  StartReportDeadlySignal();<br>
>> +  ScopedErrorReportLock rl;<br>
>> +  SignalContext sig(siginfo, context);<br>
>> +  ReportDeadlySignal(sig, tid, unwind, unwind_context);<br>
>> +  Report("ABORTING\n");<br>
>> +  Die();<br>
>> +}<br>
>> +<br>
>>  #endif  // !SANITIZER_FUCHSIA && !SANITIZER_GO<br>
>><br>
>>  void WriteToSyslog(const char *msg) {<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -18,7 +18,6 @@<br>
>>  // clang-format on<br>
>><br>
>>  // Remove when fixed: <a href="https://github.com/google/sanitizers/issues/637" target="_blank">
https://github.com/google/sanitizers/issues/637</a><br>
>> -// XFAIL: lsan<br>
>>  // XFAIL: msan<br>
>>  // XFAIL: tsan<br>
>>  // XFAIL: ubsan<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc Fri<br>
>> Sep 22 15:57:48 2017<br>
>> @@ -7,11 +7,11 @@<br>
>>  // RUN: %env_tool_opts=handle_abort=1 not         %run %t 2>&1 |<br>
>> FileCheck --check-prefix=CHECK1 %s<br>
>>  // clang-format on<br>
>><br>
>> -// FIXME: implement in other sanitizers, not just asan.<br>
>> +// FIXME: implement in other sanitizers.<br>
>>  // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>>  // XFAIL: tsan<br>
>>  // XFAIL: ubsan<br>
>> +<br>
>>  #include <assert.h><br>
>>  #include <stdio.h><br>
>>  #include <sanitizer/asan_interface.h><br>
>><br>
>> Modified: compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc Fri Sep<br>
>> 22 15:57:48 2017<br>
>> @@ -7,9 +7,8 @@<br>
>>  // RUN: %env_tool_opts=handle_sigill=1 not         %run %t 2>&1 |<br>
>> FileCheck --check-prefix=CHECK1 %s<br>
>>  // clang-format on<br>
>><br>
>> -// FIXME: implement in other sanitizers, not just asan.<br>
>> +// FIXME: implement in other sanitizers.<br>
>>  // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>>  // XFAIL: tsan<br>
>>  // XFAIL: ubsan<br>
>>  //<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -9,7 +9,6 @@<br>
>>  // REQUIRES: stable-runtime<br>
>>  // FIXME: implement SEGV handler in other sanitizers, not just asan.<br>
>>  // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>>  // XFAIL: tsan<br>
>>  // XFAIL: ubsan<br>
>><br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -8,7 +8,10 @@<br>
>>  // clang-format on<br>
>><br>
>>  // REQUIRES: x86-target-arch<br>
>> -// XFAIL: lsan, msan, tsan, ubsan<br>
>> +// FIXME: implement in other sanitizers.<br>
>> +// XFAIL: msan<br>
>> +// XFAIL: tsan<br>
>> +// XFAIL: ubsan<br>
>><br>
>>  int main() {<br>
>>  #if defined(__x86_64__)<br>
>><br>
>> Modified: compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc Fri Sep<br>
>> 22 15:57:48 2017<br>
>> @@ -5,7 +5,6 @@<br>
>>  // RUN: %env_tool_opts=handle_sigfpe=1 not         %run %t 2>&1 |<br>
>> FileCheck --check-prefix=CHECK1 %s<br>
>>  // FIXME: implement in other sanitizers, not just asan.<br>
>>  // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>>  // XFAIL: tsan<br>
>>  // XFAIL: ubsan<br>
>>  //<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -8,7 +8,6 @@<br>
>>  // XFAIL: android && i386-target-arch && asan<br>
>>  // FIXME: implement SEGV handler in other sanitizers, not just asan.<br>
>>  // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>>  // XFAIL: tsan<br>
>>  // XFAIL: ubsan<br>
>><br>
>><br>
>><br>
>> _______________________________________________<br>
>> llvm-commits mailing list<br>
>> <a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a><br>
>> <a href="http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits" target="_blank">
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits</a><br>
><br>
><br>
><br>
> _______________________________________________<br>
> llvm-commits mailing list<br>
> <a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a><br>
> <a href="http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits" target="_blank">
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits</a><br>
><o:p></o:p></p>
</div>
</div>
</blockquote>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</div>
</body>
</html>