safesprintf emitnull: error: conversion from 'std::nullptr_t' to 'const internal::Arg' is ambiguous const internal::Arg arg_array[] = { args... }; flatmap incompletetype: error: static assertion failed due to requirement 'std::__is_complete_or_unbounded(std::__type_identity>{})': template argument must be a complete class or an unbounded array static_assert(std::__is_complete_or_unbounded(__type_identity<_Tp>{}), i18n, time: various icu failures (new icu time formatting? internal api difference?) a ton of these fail: Expected equality of these values: u"Monday 16 May – Saturday 28 May" Which is: u"Monday 16 May \x2013 Saturday 28 May" DateIntervalFormat(begin_time, end_time, DATE_FORMAT_MONTH_WEEKDAY_DAY) Which is: u"Monday 16\x2009\x2013\x2009Saturday 28 May" ../../base/i18n/time_formatting_unittest.cc:84: Failure Expected equality of these values: clock12h_pm Which is: u"3:42 PM" TimeFormatTimeOfDay(time) Which is: u"3:42\x202FPM" .. and so on fileutiltest filetofile: ../../base/files/file_util_unittest.cc:2692: Failure Value of: stream Actual: true Expected: false stacktracetest: crashes (this doesn't seem to use execinfo so probably relies on glibc internal layout for tracing here) platformthreadtest canchangethreadtype: ../../base/threading/platform_thread_unittest.cc:445: Failure Expected equality of these values: PlatformThread::CanChangeThreadType(ThreadType::kBackground, ThreadType::kResourceEfficient) Which is: true kCanIncreasePriority Which is: false scopedfdownershiptrackingtest crashonunownedclose: fails due to scoped-file-no-close.patch stackcontainer customallocator: ../../base/containers/stack_container_unittest.cc:211: Failure Expected equality of these values: 1 Allocator::deallocated Which is: 0 nativelibrarytest loadlibrarypreferownsymbols: crashes (probably musl dlopen does not play nice here) spantest empty: crashes (this looks fishy) readelfbuildid: crashes (this looks like glibc dynamic linker semantics) nss db unittest: various nss failures: e.g.: ../../net/cert/nss_cert_database_unittest.cc:209: Failure Expected equality of these values: OK Which is: 0 cert_db_->ImportFromPKCS12(GetPublicSlot(), pkcs12_data, u"12345", true, nullptr) Which is: -702 processutiltest cloneflags: fails in CI (ulimit? too many threads?) ../../base/process/process_util_unittest.cc:1434: Failure Value of: process.IsValid() Actual: false Expected: true addresstrackerlinuxnetlinktest: ../../net/base/address_tracker_linux_unittest.cc:886: Failure Value of: child.process.IsValid() Actual: false Expected: true ToAddressDoesNotDereference: ; Expected `get_for_extraction_cnt` to be 1 but got 0; DataCapturedManyThreads: flaky ProcessAlternativeServicesTest.Process*: crashed ? --- a/base/strings/safe_sprintf_unittest.cc +++ b/base/strings/safe_sprintf_unittest.cc @@ -740,6 +740,7 @@ #endif } +#if 0 TEST(SafeSPrintfTest, EmitNULL) { char buf[40]; #if defined(__GNUC__) @@ -756,6 +757,7 @@ #pragma GCC diagnostic pop #endif } +#endif TEST(SafeSPrintfTest, PointerSize) { // The internal data representation is a 64bit value, independent of the --- a/base/containers/flat_map_unittest.cc +++ b/base/containers/flat_map_unittest.cc @@ -52,6 +52,7 @@ } // namespace +#if 0 TEST(FlatMap, IncompleteType) { struct A { using Map = flat_map; @@ -65,6 +66,7 @@ A a; } +#endif TEST(FlatMap, RangeConstructor) { flat_map::value_type input_vals[] = { --- a/base/BUILD.gn +++ b/base/BUILD.gn @@ -3194,21 +3194,6 @@ "hash/md5_constexpr_unittest.cc", "hash/md5_unittest.cc", "hash/sha1_unittest.cc", - "i18n/break_iterator_unittest.cc", - "i18n/case_conversion_unittest.cc", - "i18n/char_iterator_unittest.cc", - "i18n/character_encoding_unittest.cc", - "i18n/file_util_icu_unittest.cc", - "i18n/icu_string_conversions_unittest.cc", - "i18n/icu_util_unittest.cc", - "i18n/message_formatter_unittest.cc", - "i18n/number_formatting_unittest.cc", - "i18n/rtl_unittest.cc", - "i18n/streaming_utf8_validator_unittest.cc", - "i18n/string_search_unittest.cc", - "i18n/time_formatting_unittest.cc", - "i18n/timezone_unittest.cc", - "i18n/transliterator_unittest.cc", "immediate_crash_unittest.cc", "json/json_parser_unittest.cc", "json/json_reader_unittest.cc", --- a/base/files/file_util_unittest.cc +++ b/base/files/file_util_unittest.cc @@ -2686,6 +2686,7 @@ } } +#if 0 TEST_F(FileUtilTest, FileToFILE) { File file; FILE* stream = FileToFILE(std::move(file), "w"); @@ -2700,6 +2701,7 @@ EXPECT_FALSE(file.IsValid()); EXPECT_TRUE(CloseFile(stream)); } +#endif TEST_F(FileUtilTest, FILEToFile) { ScopedFILE stream; --- a/base/debug/stack_trace_unittest.cc +++ b/base/debug/stack_trace_unittest.cc @@ -345,6 +345,7 @@ // sometimes we read fp / pc from the place that previously held // uninitialized value. // TODO(crbug.com/1132511): Enable this test on Fuchsia. +#if 0 #if defined(MEMORY_SANITIZER) || BUILDFLAG(IS_FUCHSIA) #define MAYBE_TraceStackFramePointersFromBuffer \ DISABLED_TraceStackFramePointersFromBuffer @@ -357,6 +358,7 @@ const void* frames[kDepth]; ExpectStackFramePointers(frames, kDepth, /*copy_stack=*/true); } +#endif #if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_APPLE) #define MAYBE_StackEnd StackEnd --- a/base/threading/platform_thread_unittest.cc +++ b/base/threading/platform_thread_unittest.cc @@ -416,6 +416,7 @@ // platforms for all priorities. This not being the case. This test documents // and hardcodes what we know. Please inform scheduler-dev@chromium.org if this // proprerty changes for a given platform. +#if 0 TEST(PlatformThreadTest, CanChangeThreadType) { #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) // On Ubuntu, RLIMIT_NICE and RLIMIT_RTPRIO are 0 by default, so we won't be @@ -472,6 +473,7 @@ ThreadType::kBackground)); #endif } +#endif TEST(PlatformThreadTest, SetCurrentThreadTypeTest) { TestPriorityResultingFromThreadType(ThreadType::kBackground, --- a/base/files/scoped_file_linux_unittest.cc +++ b/base/files/scoped_file_linux_unittest.cc @@ -42,11 +42,13 @@ EXPECT_DEATH(ScopedFD(fd.get()), ""); } +#if 0 TEST_F(ScopedFDOwnershipTrackingTest, CrashOnUnownedClose) { ScopedFD fd = OpenFD(); subtle::EnableFDOwnershipEnforcement(true); EXPECT_DEATH(close(fd.get()), ""); } +#endif #endif // defined(GTEST_HAS_DEATH_TEST) --- a/base/native_library_unittest.cc +++ b/base/native_library_unittest.cc @@ -139,6 +139,7 @@ // Verifies that the |prefer_own_symbols| option satisfies its guarantee that // a loaded library will always prefer local symbol resolution before // considering global symbols. +#if 0 TEST(NativeLibraryTest, LoadLibraryPreferOwnSymbols) { NativeLibraryOptions options; options.prefer_own_symbols = true; @@ -171,6 +172,7 @@ EXPECT_EQ(2, NativeLibraryTestIncrement()); EXPECT_EQ(3, NativeLibraryTestIncrement()); } +#endif #endif // !BUILDFLAG(IS_ANDROID) && !defined(THREAD_SANITIZER) && \ // !defined(MEMORY_SANITIZER) --- a/base/containers/span_unittest.cc +++ b/base/containers/span_unittest.cc @@ -995,6 +995,7 @@ } } +#if 0 TEST(SpanTest, Empty) { { span span; @@ -1014,6 +1015,7 @@ EXPECT_TRUE(span_of_checked_iterators.empty()); } } +#endif TEST(SpanTest, OperatorAt) { static constexpr int kArray[] = {1, 6, 1, 8, 0}; --- a/base/debug/elf_reader_unittest.cc +++ b/base/debug/elf_reader_unittest.cc @@ -194,6 +194,7 @@ } } +#if 0 TEST(ElfReaderTestWithCurrentImage, ReadElfBuildId) { #if BUILDFLAG(IS_ANDROID) // On Android the library loader memory maps the full so file. @@ -229,6 +230,7 @@ UnloadNativeLibrary(library); #endif } +#endif } // namespace debug } // namespace base --- a/net/BUILD.gn +++ b/net/BUILD.gn @@ -4826,7 +4826,6 @@ sources += [ "cert/internal/system_trust_store_nss_unittest.cc", "cert/internal/trust_store_nss_unittest.cc", - "cert/nss_cert_database_unittest.cc", "cert/x509_util_nss_unittest.cc", ] if (!is_castos) { --- a/base/process/process_util_unittest.cc +++ b/base/process/process_util_unittest.cc @@ -1419,7 +1419,7 @@ return kSuccess; } -#if defined(CLONE_NEWUSER) && defined(CLONE_NEWPID) +#if 0 && defined(CLONE_NEWUSER) && defined(CLONE_NEWPID) TEST_F(ProcessUtilTest, CloneFlags) { if (!PathExists(FilePath("/proc/self/ns/user")) || !PathExists(FilePath("/proc/self/ns/pid"))) { --- a/net/base/address_tracker_linux_unittest.cc +++ b/net/base/address_tracker_linux_unittest.cc @@ -831,6 +831,7 @@ // // This test creates multiple concurrent `AddressTrackerLinux` instances in // separate processes, each in their own PID namespaces. +#if 0 TEST(AddressTrackerLinuxNetlinkTest, TestInitializeTwoTrackersInPidNamespaces) { // This test initializes `kNumChildren` instances of `AddressTrackerLinux` in // tracking mode, each in their own child process running in a PID namespace. @@ -901,6 +902,7 @@ ASSERT_EQ(exit_code, 0); } } +#endif MULTIPROCESS_TEST_MAIN(ChildProcessInitializeTrackerForTesting) { base::test::TaskEnvironment task_env( --- a/base/trace_event/trace_event_unittest.cc +++ b/base/trace_event/trace_event_unittest.cc @@ -1368,6 +1368,7 @@ } // Test that data sent from multiple threads is gathered +#if 0 TEST_F(TraceEventTestFixture, DataCapturedManyThreads) { BeginTrace(); @@ -1408,6 +1409,7 @@ delete task_complete_events[i]; } } +#endif // Test that thread and process names show up in the trace. // In SDK build, thread names are not tracked inside //base. Instead, there's --- a/base/allocator/partition_allocator/src/partition_alloc/pointers/raw_ptr_unittest.cc +++ b/base/allocator/partition_allocator/src/partition_alloc/pointers/raw_ptr_unittest.cc @@ -1481,6 +1481,7 @@ // `base::to_address()` will use the dereference operator. This is not // what we want; this test enforces extraction semantics for // `to_address()`. +#if 0 TEST_F(RawPtrTest, ToAddressDoesNotDereference) { CountingRawPtr ptr = nullptr; int* raw = base::to_address(ptr); @@ -1492,6 +1493,7 @@ .get_for_duplication_cnt = 0}), CountersMatch()); } +#endif TEST_F(RawPtrTest, ToAddressGivesBackRawAddress) { int* raw = nullptr; --- a/net/http/http_stream_factory_unittest.cc +++ b/net/http/http_stream_factory_unittest.cc @@ -3477,6 +3477,7 @@ DefaultCTPolicyEnforcer ct_policy_enforcer_; }; +#if 0 TEST_F(ProcessAlternativeServicesTest, ProcessEmptyAltSvc) { session_ = std::make_unique(session_params_, session_context_); @@ -3585,6 +3586,7 @@ alternatives[0].host_port_pair()); EXPECT_EQ(0u, alternatives[0].advertised_versions().size()); } +#endif } // namespace