diff options
author | Rainer Orth <ro@gcc.gnu.org> | 2024-09-19 10:04:18 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-09-19 10:04:18 +0200 |
commit | 0a3b6af768c95f8d8260aa28adbccabd60f7e9e5 (patch) | |
tree | efa8081d1c5d9e3504dc8fd7707a407f5ad3bf2c /llvm/lib/CodeGen/AssignmentTrackingAnalysis.cpp | |
parent | edc71e22c004d3b3dfc535f7917ea0b47a282ac8 (diff) | |
download | llvm-0a3b6af768c95f8d8260aa28adbccabd60f7e9e5.zip llvm-0a3b6af768c95f8d8260aa28adbccabd60f7e9e5.tar.gz llvm-0a3b6af768c95f8d8260aa28adbccabd60f7e9e5.tar.bz2 |
[ASan][test] Skip Linux/odr_c_test.c on SPARC (#109111)
When ASan testing is enabled on SPARC as per PR #107405, the
```
AddressSanitizer-sparc-linux :: TestCases/Linux/odr_c_test.c
```
test `FAIL`s on Linux/sparc64:
```
+ projects/compiler-rt/test/asan/SPARCLinuxConfig/TestCases/Linux/Output/odr_c_test.c.tmp
+ count 0
Expected 0 lines, got 13.
AddressSanitizer:DEADLYSIGNAL
=================================================================
==4165420==ERROR: AddressSanitizer: BUS on unknown address (pc 0x7012d5b4 bp 0xffa3b938 sp 0xffa3b8d0 T0)
==4165420==The signal is caused by a READ memory access.
==4165420==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used.
```
The test relies on an unaligned access, which cannot work on a
strict-alignment target like SPARC.
Thus this patch skips the test.
Tested on `sparc64-unknown-linux-gnu`.
Diffstat (limited to 'llvm/lib/CodeGen/AssignmentTrackingAnalysis.cpp')
0 files changed, 0 insertions, 0 deletions