Export of internal Abseil changes.
-- ab1a58c85a462884413ec0022dc1fff19ccb8602 by Abseil Team <absl-team@google.com>: Clarified the documentation in str_format.h to say that use of absl::FormatSpec is ok for wrapper functions. Added tests that express this. PiperOrigin-RevId: 247657991 -- fef9481e58d579f1514babcb960ca60a51883fd8 by CJ Johnson <johnsoncj@google.com>: Adds exception safety tests for InlinedVector::InlinedVector() and InlinedVector::InlinedVector(const allocator_type&). PiperOrigin-RevId: 247617048 -- ef3217e1cd1e9a6ff5f2025e061b8ce3735af78f by Abseil Team <absl-team@google.com>: Internal change. PiperOrigin-RevId: 247614063 -- ed4c3345c4a04d8ec5c9e627058f17fce55925b1 by CJ Johnson <johnsoncj@google.com>: Update InlinedVector::clear() Introduces inlined_vector_exception_safety_test with the first test (clear), adds new benchmarks (for clear), and updates the implementation of clear. PiperOrigin-RevId: 247496049 -- 144a3a77c93bc8b2226da6f4b56166ee3d9868de by Derek Mauro <dmauro@google.com>: Internal change PiperOrigin-RevId: 247482532 -- 286bbb89e154d5424955b644edad5fe04be487f8 by Derek Mauro <dmauro@google.com>: Add scripts to run ASAN and TSAN on CI. PiperOrigin-RevId: 247479658 GitOrigin-RevId: ab1a58c85a462884413ec0022dc1fff19ccb8602 Change-Id: Ief4c5a62587d0c59d405735df469d498aa6bf101
This commit is contained in:
parent
27c2f6e2f3
commit
0cbdc774b9
18 changed files with 422 additions and 36 deletions
|
@ -815,7 +815,12 @@ TEST(Mutex, MutexReaderDecrementBug) NO_THREAD_SAFETY_ANALYSIS {
|
|||
|
||||
// Test that we correctly handle the situation when a lock is
|
||||
// held and then destroyed (w/o unlocking).
|
||||
#ifdef THREAD_SANITIZER
|
||||
// TSAN reports errors when locked Mutexes are destroyed.
|
||||
TEST(Mutex, DISABLED_LockedMutexDestructionBug) NO_THREAD_SAFETY_ANALYSIS {
|
||||
#else
|
||||
TEST(Mutex, LockedMutexDestructionBug) NO_THREAD_SAFETY_ANALYSIS {
|
||||
#endif
|
||||
for (int i = 0; i != 10; i++) {
|
||||
// Create, lock and destroy 10 locks.
|
||||
const int kNumLocks = 10;
|
||||
|
@ -1062,7 +1067,12 @@ class ScopedDisableBazelTestWarnings {
|
|||
const char ScopedDisableBazelTestWarnings::kVarName[] =
|
||||
"TEST_WARNINGS_OUTPUT_FILE";
|
||||
|
||||
#ifdef THREAD_SANITIZER
|
||||
// This test intentionally creates deadlocks to test the deadlock detector.
|
||||
TEST(Mutex, DISABLED_DeadlockDetectorBazelWarning) {
|
||||
#else
|
||||
TEST(Mutex, DeadlockDetectorBazelWarning) {
|
||||
#endif
|
||||
absl::SetMutexDeadlockDetectionMode(absl::OnDeadlockCycle::kReport);
|
||||
|
||||
// Cause deadlock detection to detect something, if it's
|
||||
|
@ -1109,7 +1119,12 @@ TEST(Mutex, DeadlockDetectorStessTest) NO_THREAD_SAFETY_ANALYSIS {
|
|||
}
|
||||
}
|
||||
|
||||
#ifdef THREAD_SANITIZER
|
||||
// TSAN reports errors when locked Mutexes are destroyed.
|
||||
TEST(Mutex, DISABLED_DeadlockIdBug) NO_THREAD_SAFETY_ANALYSIS {
|
||||
#else
|
||||
TEST(Mutex, DeadlockIdBug) NO_THREAD_SAFETY_ANALYSIS {
|
||||
#endif
|
||||
// Test a scenario where a cached deadlock graph node id in the
|
||||
// list of held locks is not invalidated when the corresponding
|
||||
// mutex is deleted.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue