https://llvm.org/bugs/show_bug.cgi?id=31074

            Bug ID: 31074
           Summary: Identify what's unstable about ARM for sanitizers
           Product: compiler-rt
           Version: unspecified
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: compiler-rt
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected]
    Classification: Unclassified

A while ago, when we started testing the sanitizers on ARM, we have identified
a number of "unstable" tests that could not be easily explained. 

The test fail consistently on a board+OS combination, however, on different
boards and similar OS (+compiler+libs+tools), the test pass. Also, some
configurations pass on stage 1 and fail on stage 2 and 3, but on others, the
same test fails on stage 1 and pass on stage 2 and 3.

Pass here generally means the stack trace is in the correct order and have
captured the function names correctly, while fail means the location was
"unknown", or the stack track failed completely, due to unwind failures.

Here's the list of all 36 the tests that were disabled with the
"stable-runtime" flag:

asan/TestCases/Posix/current_allocated_bytes.cc
asan/TestCases/Posix/stack-overflow.cc
asan/TestCases/Posix/deep_thread_stack.cc
asan/TestCases/Posix/asan-symbolize-sanity-test.cc
asan/TestCases/Posix/gc-test.cc
asan/TestCases/alloca_loop_unpoisoning.cc
asan/TestCases/double-free.cc
asan/TestCases/debug_stacks.cc
asan/TestCases/alloca_vla_interact.cc
asan/TestCases/use-after-free-right.cc
asan/TestCases/use-after-delete.cc
asan/TestCases/invalid-free.cc
asan/TestCases/sanity_check_pure_c.c
asan/TestCases/vla_condition_overflow.cc
asan/TestCases/vla_loop_overfow.cc
asan/TestCases/use-after-free.cc
asan/TestCases/deep_stack_uaf.cc
asan/TestCases/large_func_test.cc
asan/TestCases/strncpy-overflow.cc
asan/TestCases/Linux/malloc_delete_mismatch.cc
asan/TestCases/Linux/uar_signals.cc
asan/TestCases/Linux/stack-trace-dlclose.cc
ubsan/TestCases/Misc/nonnull-arg.cpp
ubsan/TestCases/TypeCheck/vptr-corrupted-vtable-itanium.cpp
ubsan/TestCases/TypeCheck/vptr.cpp
safestack/canary.c
safestack/overflow.c
sanitizer_common/TestCases/Posix/getpass.cc
sanitizer_common/TestCases/Posix/dedup_token_length_test.cc
sanitizer_common/TestCases/Posix/sanitizer_set_death_callback_test.cc
sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cc
sanitizer_common/TestCases/Linux/decorate_proc_maps.cc
tsan/ignore_lib1.cc
tsan/ignore_lib0.cc
tsan/ignore_lib3.cc
msan/Linux/mallinfo.cc

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
llvm-bugs mailing list
[email protected]
http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs

Reply via email to