<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Helvetica;
panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">I think the attachment was lost in the reply. Can you reattach?<o:p></o:p></span></p>
<p class="MsoNormal"><a name="_MailEndCompose"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p> </o:p></span></a></p>
<p class="MsoNormal"><a name="_____replyseparator"></a><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">From:</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> Vitaly Buka [mailto:vitalybuka@google.com]
<br>
<b>Sent:</b> Wednesday, September 27, 2017 2:58 PM<br>
<b>To:</b> Evgenii Stepanov <eugeni.stepanov@gmail.com><br>
<b>Cc:</b> Mike Edwards <mike@sqlby.me>; juergen@apple.com; LLVM Commits <llvm-commits@lists.llvm.org>; Topper, Craig <craig.topper@intel.com><br>
<b>Subject:</b> Re: [compiler-rt] r314041 - [lsan] Deadly signal handler for lsan<o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<p class="MsoNormal">I don't believe that it has anything to do with compiler-rt.<o:p></o:p></p>
<div>
<p class="MsoNormal">It's in InstCombiner, and the range has several related patches.<o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
<div>
<p class="MsoNormal">+<span style="font-family:"Helvetica",sans-serif;color:#333333">ctopper It's more likely </span><span style="font-size:10.0pt;font-family:"Helvetica",sans-serif;color:#333333">r314025</span><o:p></o:p></p>
</div>
</div>
<div>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<p class="MsoNormal">On Wed, Sep 27, 2017 at 2:41 PM, Evgenii Stepanov <<a href="mailto:eugeni.stepanov@gmail.com" target="_blank">eugeni.stepanov@gmail.com</a>> wrote:<o:p></o:p></p>
<blockquote style="border:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class="MsoNormal">Are you a 100% sure you've got the right change? This one only touches<br>
the runtime support library, and error by the buildbot link shows a<br>
compiler crash.<o:p></o:p></p>
<div>
<div>
<p class="MsoNormal"><br>
On Wed, Sep 27, 2017 at 2:32 PM, Mike Edwards via llvm-commits<br>
<<a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a>> wrote:<br>
> Hi Vitaly,<br>
> We are seeing a bot failure with this commit. The particular bot which<br>
> caught this error takes quite some time to run and this was bundled with<br>
> around 50 other commits so I apologize for the amount of time it took to get<br>
> the error to you. The bot failure can be seen here:<br>
><br>
> <a href="http://green.lab.llvm.org/green/job/clang-stage2-cmake-RgSan_build/5097/" target="_blank">
http://green.lab.llvm.org/green/job/clang-stage2-cmake-RgSan_build/5097/</a><br>
><br>
> I have attached a reproducer to this email and here is the command line<br>
> invocation used to reproduce the issue:<br>
><br>
> <path to compiler built on r314041>/bin/clang++ -fPIC<br>
> -fvisibility-inlines-hidden -Werror=date-time<br>
> -Werror=unguarded-availability-new -std=c++11 -Wall -W -Wno-unused-parameter<br>
> -Wwrite-strings -Wcast-qual -Wmissing-field-initializers -pedantic<br>
> -Wno-long-long -Wcovered-switch-default -Wnon-virtual-dtor<br>
> -Wdelete-non-virtual-dtor -Wstring-conversion -fno-omit-frame-pointer<br>
> -fsanitize=address,undefined -fno-sanitize=vptr,function<br>
> -fno-sanitize-recover=all -fsanitize-address-use-after-scope<br>
> -fcolor-diagnostics -O2 -g -fno-exceptions -fno-rtti -o /dev/null -c<br>
> BinaryStreamError.ii<br>
><br>
> This bot has been broken for almost 5 days now (this was my fault as it took<br>
> so much time to reproduce the issue) so if you could have a look and get a<br>
> patch up as soon as possible it would be greatly appreciated.<br>
><br>
> Respectfully,<br>
> Mike Edwards<br>
><br>
> On Fri, Sep 22, 2017 at 3:57 PM, Vitaly Buka via llvm-commits<br>
> <<a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a>> wrote:<br>
>><br>
>> Author: vitalybuka<br>
>> Date: Fri Sep 22 15:57:48 2017<br>
>> New Revision: 314041<br>
>><br>
>> URL: <a href="http://llvm.org/viewvc/llvm-project?rev=314041&view=rev" target="_blank">
http://llvm.org/viewvc/llvm-project?rev=314041&view=rev</a><br>
>> Log:<br>
>> [lsan] Deadly signal handler for lsan<br>
>><br>
>> Summary: Part of <a href="https://github.com/google/sanitizers/issues/637" target="_blank">
https://github.com/google/sanitizers/issues/637</a><br>
>><br>
>> Reviewers: eugenis, alekseyshl<br>
>><br>
>> Subscribers: llvm-commits, dberris, kubamracek, krytarowski<br>
>><br>
>> Differential Revision: <a href="https://reviews.llvm.org/D37608" target="_blank">
https://reviews.llvm.org/D37608</a><br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/lib/lsan/lsan.cc<br>
>> compiler-rt/trunk/lib/lsan/lsan_interceptors.cc<br>
>> compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h<br>
>> compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc<br>
>><br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>><br>
>> Modified: compiler-rt/trunk/lib/lsan/lsan.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/lsan/lsan.cc (original)<br>
>> +++ compiler-rt/trunk/lib/lsan/lsan.cc Fri Sep 22 15:57:48 2017<br>
>> @@ -65,6 +65,18 @@ static void InitializeFlags() {<br>
>> if (common_flags()->help) parser.PrintFlagDescriptions();<br>
>> }<br>
>><br>
>> +static void OnStackUnwind(const SignalContext &sig, const void *,<br>
>> + BufferedStackTrace *stack) {<br>
>> + GetStackTraceWithPcBpAndContext(stack, kStackTraceMax, sig.pc, sig.bp,<br>
>> + sig.context,<br>
>> + common_flags()->fast_unwind_on_fatal);<br>
>> +}<br>
>> +<br>
>> +void LsanOnDeadlySignal(int signo, void *siginfo, void *context) {<br>
>> + HandleDeadlySignal(siginfo, context, GetCurrentThread(),<br>
>> &OnStackUnwind,<br>
>> + nullptr);<br>
>> +}<br>
>> +<br>
>> extern "C" void __lsan_init() {<br>
>> CHECK(!lsan_init_is_running);<br>
>> if (lsan_inited)<br>
>> @@ -80,6 +92,7 @@ extern "C" void __lsan_init() {<br>
>> InitTlsSize();<br>
>> InitializeInterceptors();<br>
>> InitializeThreadRegistry();<br>
>> + InstallDeadlySignalHandlers(LsanOnDeadlySignal);<br>
>> u32 tid = ThreadCreate(0, 0, true);<br>
>> CHECK_EQ(tid, 0);<br>
>> ThreadStart(tid, GetTid());<br>
>><br>
>> Modified: compiler-rt/trunk/lib/lsan/lsan_interceptors.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan_interceptors.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/lsan/lsan_interceptors.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/lsan/lsan_interceptors.cc (original)<br>
>> +++ compiler-rt/trunk/lib/lsan/lsan_interceptors.cc Fri Sep 22 15:57:48<br>
>> 2017<br>
>> @@ -401,9 +401,14 @@ INTERCEPTOR(void, _exit, int status) {<br>
>> REAL(_exit)(status);<br>
>> }<br>
>><br>
>> +#define COMMON_INTERCEPT_FUNCTION(name) INTERCEPT_FUNCTION(name)<br>
>> +#include "sanitizer_common/sanitizer_signal_interceptors.inc"<br>
>> +<br>
>> namespace __lsan {<br>
>><br>
>> void InitializeInterceptors() {<br>
>> + InitializeSignalInterceptors();<br>
>> +<br>
>> INTERCEPT_FUNCTION(malloc);<br>
>> INTERCEPT_FUNCTION(free);<br>
>> LSAN_MAYBE_INTERCEPT_CFREE;<br>
>><br>
>> Modified: compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h (original)<br>
>> +++ compiler-rt/trunk/lib/sanitizer_common/sanitizer_common.h Fri Sep 22<br>
>> 15:57:48 2017<br>
>> @@ -318,15 +318,24 @@ void SetSoftRssLimitExceededCallback(voi<br>
>> typedef void (*SignalHandlerType)(int, void *, void *);<br>
>> HandleSignalMode GetHandleSignalMode(int signum);<br>
>> void InstallDeadlySignalHandlers(SignalHandlerType handler);<br>
>> +<br>
>> // Signal reporting.<br>
>> -void StartReportDeadlySignal();<br>
>> // Each sanitizer uses slightly different implementation of stack<br>
>> unwinding.<br>
>> typedef void (*UnwindSignalStackCallbackType)(const SignalContext &sig,<br>
>> const void<br>
>> *callback_context,<br>
>> BufferedStackTrace *stack);<br>
>> +// Print deadly signal report and die.<br>
>> +void HandleDeadlySignal(void *siginfo, void *context, u32 tid,<br>
>> + UnwindSignalStackCallbackType unwind,<br>
>> + const void *unwind_context);<br>
>> +<br>
>> +// Part of HandleDeadlySignal, exposed for asan.<br>
>> +void StartReportDeadlySignal();<br>
>> +// Part of HandleDeadlySignal, exposed for asan.<br>
>> void ReportDeadlySignal(const SignalContext &sig, u32 tid,<br>
>> UnwindSignalStackCallbackType unwind,<br>
>> const void *unwind_context);<br>
>> +<br>
>> // Alternative signal stack (POSIX-only).<br>
>> void SetAlternateSignalStack();<br>
>> void UnsetAlternateSignalStack();<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/lib/sanitizer_common/sanitizer_common_libcdep.cc Fri<br>
>> Sep 22 15:57:48 2017<br>
>> @@ -254,6 +254,18 @@ void ReportDeadlySignal(const SignalCont<br>
>> else<br>
>> ReportDeadlySignalImpl(sig, tid, unwind, unwind_context);<br>
>> }<br>
>> +<br>
>> +void HandleDeadlySignal(void *siginfo, void *context, u32 tid,<br>
>> + UnwindSignalStackCallbackType unwind,<br>
>> + const void *unwind_context) {<br>
>> + StartReportDeadlySignal();<br>
>> + ScopedErrorReportLock rl;<br>
>> + SignalContext sig(siginfo, context);<br>
>> + ReportDeadlySignal(sig, tid, unwind, unwind_context);<br>
>> + Report("ABORTING\n");<br>
>> + Die();<br>
>> +}<br>
>> +<br>
>> #endif // !SANITIZER_FUCHSIA && !SANITIZER_GO<br>
>><br>
>> void WriteToSyslog(const char *msg) {<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/allow_user_segv.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -18,7 +18,6 @@<br>
>> // clang-format on<br>
>><br>
>> // Remove when fixed: <a href="https://github.com/google/sanitizers/issues/637" target="_blank">
https://github.com/google/sanitizers/issues/637</a><br>
>> -// XFAIL: lsan<br>
>> // XFAIL: msan<br>
>> // XFAIL: tsan<br>
>> // XFAIL: ubsan<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/assert.cc Fri<br>
>> Sep 22 15:57:48 2017<br>
>> @@ -7,11 +7,11 @@<br>
>> // RUN: %env_tool_opts=handle_abort=1 not %run %t 2>&1 |<br>
>> FileCheck --check-prefix=CHECK1 %s<br>
>> // clang-format on<br>
>><br>
>> -// FIXME: implement in other sanitizers, not just asan.<br>
>> +// FIXME: implement in other sanitizers.<br>
>> // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>> // XFAIL: tsan<br>
>> // XFAIL: ubsan<br>
>> +<br>
>> #include <assert.h><br>
>> #include <stdio.h><br>
>> #include <sanitizer/asan_interface.h><br>
>><br>
>> Modified: compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/test/sanitizer_common/TestCases/Linux/ill.cc Fri Sep<br>
>> 22 15:57:48 2017<br>
>> @@ -7,9 +7,8 @@<br>
>> // RUN: %env_tool_opts=handle_sigill=1 not %run %t 2>&1 |<br>
>> FileCheck --check-prefix=CHECK1 %s<br>
>> // clang-format on<br>
>><br>
>> -// FIXME: implement in other sanitizers, not just asan.<br>
>> +// FIXME: implement in other sanitizers.<br>
>> // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>> // XFAIL: tsan<br>
>> // XFAIL: ubsan<br>
>> //<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -9,7 +9,6 @@<br>
>> // REQUIRES: stable-runtime<br>
>> // FIXME: implement SEGV handler in other sanitizers, not just asan.<br>
>> // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>> // XFAIL: tsan<br>
>> // XFAIL: ubsan<br>
>><br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/dump_instruction_bytes.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -8,7 +8,10 @@<br>
>> // clang-format on<br>
>><br>
>> // REQUIRES: x86-target-arch<br>
>> -// XFAIL: lsan, msan, tsan, ubsan<br>
>> +// FIXME: implement in other sanitizers.<br>
>> +// XFAIL: msan<br>
>> +// XFAIL: tsan<br>
>> +// XFAIL: ubsan<br>
>><br>
>> int main() {<br>
>> #if defined(__x86_64__)<br>
>><br>
>> Modified: compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> --- compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc<br>
>> (original)<br>
>> +++ compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/fpe.cc Fri Sep<br>
>> 22 15:57:48 2017<br>
>> @@ -5,7 +5,6 @@<br>
>> // RUN: %env_tool_opts=handle_sigfpe=1 not %run %t 2>&1 |<br>
>> FileCheck --check-prefix=CHECK1 %s<br>
>> // FIXME: implement in other sanitizers, not just asan.<br>
>> // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>> // XFAIL: tsan<br>
>> // XFAIL: ubsan<br>
>> //<br>
>><br>
>> Modified:<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>> URL:<br>
>> <a href="http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc?rev=314041&r1=314040&r2=314041&view=diff" target="_blank">
http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc?rev=314041&r1=314040&r2=314041&view=diff</a><br>
>><br>
>> ==============================================================================<br>
>> ---<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>> (original)<br>
>> +++<br>
>> compiler-rt/trunk/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc<br>
>> Fri Sep 22 15:57:48 2017<br>
>> @@ -8,7 +8,6 @@<br>
>> // XFAIL: android && i386-target-arch && asan<br>
>> // FIXME: implement SEGV handler in other sanitizers, not just asan.<br>
>> // XFAIL: msan<br>
>> -// XFAIL: lsan<br>
>> // XFAIL: tsan<br>
>> // XFAIL: ubsan<br>
>><br>
>><br>
>><br>
>> _______________________________________________<br>
>> llvm-commits mailing list<br>
>> <a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a><br>
>> <a href="http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits" target="_blank">
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits</a><br>
><br>
><br>
><br>
> _______________________________________________<br>
> llvm-commits mailing list<br>
> <a href="mailto:llvm-commits@lists.llvm.org">llvm-commits@lists.llvm.org</a><br>
> <a href="http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits" target="_blank">
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits</a><br>
><o:p></o:p></p>
</div>
</div>
</blockquote>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</div>
</body>
</html>