diff --git a/compiler-rt/test/asan/TestCases/Linux/activation-options.cpp b/compiler-rt/test/asan/TestCases/Linux/activation-options.cpp --- a/compiler-rt/test/asan/TestCases/Linux/activation-options.cpp +++ b/compiler-rt/test/asan/TestCases/Linux/activation-options.cpp @@ -1,6 +1,8 @@ // Test for ASAN_OPTIONS=start_deactivated=1 mode. // Main executable is uninstrumented, but linked to ASan runtime. The shared // library is instrumented. +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862 +// XFAIL: compiler-rt-debug // RUN: %clangxx_asan -O0 -DSHARED_LIB %s -fPIC -shared -o %t-so.so // RUN: %clangxx -O0 %s -c -o %t.o diff --git a/compiler-rt/test/asan/TestCases/Linux/odr-violation.cpp b/compiler-rt/test/asan/TestCases/Linux/odr-violation.cpp --- a/compiler-rt/test/asan/TestCases/Linux/odr-violation.cpp +++ b/compiler-rt/test/asan/TestCases/Linux/odr-violation.cpp @@ -1,5 +1,7 @@ // FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 // XFAIL: android +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862 +// XFAIL: compiler-rt-debug // // We use fast_unwind_on_malloc=0 to have full unwinding even w/o frame // pointers. This setting is not on by default because it's too expensive. diff --git a/compiler-rt/test/asan/TestCases/Linux/odr-vtable.cpp b/compiler-rt/test/asan/TestCases/Linux/odr-vtable.cpp --- a/compiler-rt/test/asan/TestCases/Linux/odr-vtable.cpp +++ b/compiler-rt/test/asan/TestCases/Linux/odr-vtable.cpp @@ -1,3 +1,6 @@ +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862 +// XFAIL: compiler-rt-debug + // RUN: %clangxx_asan -fno-rtti -DBUILD_SO1 -fPIC -shared %s -o %dynamiclib1 // RUN: %clangxx_asan -fno-rtti -DBUILD_SO2 -fPIC -shared %s -o %dynamiclib2 // RUN: %clangxx_asan -fno-rtti %s %ld_flags_rpath_exe1 %ld_flags_rpath_exe2 -o %t diff --git a/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp b/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp --- a/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp +++ b/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp @@ -1,6 +1,8 @@ // Test for ASAN_OPTIONS=start_deactivated=1 mode. // Main executable is uninstrumented, but linked to ASan runtime. The shared // library is instrumented. Memory errors before dlopen are not detected. +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862 +// XFAIL: compiler-rt-debug // RUN: %clangxx_asan -O0 -DSHARED_LIB %s -std=c++11 -fPIC -shared -o %t-so.so // RUN: %clangxx -O0 %s -std=c++11 -c -o %t.o diff --git a/compiler-rt/test/asan/TestCases/handle_noreturn_bug.cpp b/compiler-rt/test/asan/TestCases/handle_noreturn_bug.cpp --- a/compiler-rt/test/asan/TestCases/handle_noreturn_bug.cpp +++ b/compiler-rt/test/asan/TestCases/handle_noreturn_bug.cpp @@ -1,4 +1,6 @@ // Regression test: __asan_handle_no_return should unpoison stack even with poison_heap=0. +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862 +// XFAIL: compiler-rt-debug // RUN: %clangxx_asan -O0 %s -o %t && \ // RUN: %env_asan_opts=poison_heap=1 %run %t && \ // RUN: %env_asan_opts=poison_heap=0 %run %t diff --git a/compiler-rt/test/lit.common.cfg.py b/compiler-rt/test/lit.common.cfg.py --- a/compiler-rt/test/lit.common.cfg.py +++ b/compiler-rt/test/lit.common.cfg.py @@ -238,6 +238,9 @@ compiler_rt_debug = getattr(config, 'compiler_rt_debug', False) if not compiler_rt_debug: config.available_features.add('compiler-rt-optimized') +else: + config.available_features.add('compiler-rt-debug') + libdispatch = getattr(config, 'compiler_rt_intercept_libdispatch', False) if libdispatch: diff --git a/compiler-rt/test/sanitizer_common/TestCases/Linux/allow_user_segv.cpp b/compiler-rt/test/sanitizer_common/TestCases/Linux/allow_user_segv.cpp --- a/compiler-rt/test/sanitizer_common/TestCases/Linux/allow_user_segv.cpp +++ b/compiler-rt/test/sanitizer_common/TestCases/Linux/allow_user_segv.cpp @@ -1,5 +1,7 @@ // Regression test for // https://code.google.com/p/address-sanitizer/issues/detail?id=180 +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860 +// XFAIL: compiler-rt-debug && tsan // RUN: %clangxx -O0 %s -o %t diff --git a/compiler-rt/test/sanitizer_common/TestCases/Linux/signal_line.cpp b/compiler-rt/test/sanitizer_common/TestCases/Linux/signal_line.cpp --- a/compiler-rt/test/sanitizer_common/TestCases/Linux/signal_line.cpp +++ b/compiler-rt/test/sanitizer_common/TestCases/Linux/signal_line.cpp @@ -1,4 +1,6 @@ // Test line numbers in signal handlers +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860 +// XFAIL: compiler-rt-debug && tsan // RUN: %clangxx %s -o %t -O0 // RUN: %env_tool_opts=handle_segv=1:print_stacktrace=1 not %run %t 1 2>&1 | FileCheck --check-prefixes=CHECK1,CHECK %s diff --git a/compiler-rt/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cpp b/compiler-rt/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cpp --- a/compiler-rt/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cpp +++ b/compiler-rt/test/sanitizer_common/TestCases/Posix/dedup_token_length_test.cpp @@ -1,4 +1,6 @@ // Test dedup_token_length +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860 +// XFAIL: compiler-rt-debug && tsan // RUN: %clangxx -O0 %s -o %t // RUN: env %tool_options='abort_on_error=0' not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK0 --match-full-lines // RUN: env %tool_options='abort_on_error=0, dedup_token_length=0' not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK0 --match-full-lines diff --git a/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_read_test.cpp b/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_read_test.cpp --- a/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_read_test.cpp +++ b/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_read_test.cpp @@ -1,4 +1,6 @@ // Test that there was an illegal READ memory access. +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860 +// XFAIL: compiler-rt-debug && tsan // RUN: %clangxx -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s // REQUIRES: stable-runtime diff --git a/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_write_test.cpp b/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_write_test.cpp --- a/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_write_test.cpp +++ b/compiler-rt/test/sanitizer_common/TestCases/Posix/illegal_write_test.cpp @@ -1,4 +1,6 @@ // Test that there was an illegal WRITE memory access. +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860 +// XFAIL: compiler-rt-debug && tsan // RUN: %clangxx -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s // REQUIRES: stable-runtime diff --git a/compiler-rt/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cpp b/compiler-rt/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cpp --- a/compiler-rt/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cpp +++ b/compiler-rt/test/sanitizer_common/TestCases/Posix/sanitizer_set_report_fd_test.cpp @@ -1,4 +1,6 @@ // Test __sanitizer_set_report_fd: +// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46860 +// XFAIL: compiler-rt-debug && tsan // RUN: %clangxx -O2 %s -o %t // RUN: not %run %t 2>&1 | FileCheck %s // RUN: not %run %t stdout | FileCheck %s