You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
68 lines
3.6 KiB
68 lines
3.6 KiB
4 months ago
|
// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
|
||
|
// XFAIL: android
|
||
|
// Fails with debug checks: https://bugs.llvm.org/show_bug.cgi?id=46862
|
||
|
// XFAIL: !compiler-rt-optimized && !riscv64
|
||
|
//
|
||
|
// We use fast_unwind_on_malloc=0 to have full unwinding even w/o frame
|
||
|
// pointers. This setting is not on by default because it's too expensive.
|
||
|
//
|
||
|
// Different size: detect a bug if detect_odr_violation>=1
|
||
|
// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %dynamiclib
|
||
|
// RUN: %clangxx_asan %s %ld_flags_rpath_exe -o %t-ODR-EXE
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=1 not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=0 %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0 not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
//
|
||
|
// Same size: report a bug only if detect_odr_violation>=2.
|
||
|
// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %dynamiclib -DSZ=100
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=1 %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0 not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
// RUN: echo "odr_violation:foo::ZZZ" > %t.supp
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
// RUN: echo "odr_violation:foo::G" > %t.supp
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED
|
||
|
// RUN: rm -f %t.supp
|
||
|
//
|
||
|
// Use private aliases for global variables without indicator symbol.
|
||
|
// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared -mllvm -asan-use-private-alias %s -o %dynamiclib -DSZ=100
|
||
|
// RUN: %clangxx_asan -mllvm -asan-use-private-alias %s %ld_flags_rpath_exe -o %t-ODR-EXE
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0 %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED
|
||
|
|
||
|
// Use private aliases for global variables: use indicator symbol to detect ODR violation.
|
||
|
// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared -mllvm -asan-use-private-alias -mllvm -asan-use-odr-indicator %s -o %dynamiclib -DSZ=100
|
||
|
// RUN: %clangxx_asan -mllvm -asan-use-private-alias -mllvm -asan-use-odr-indicator %s %ld_flags_rpath_exe -o %t-ODR-EXE
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0 not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
|
||
|
// Same as above but with clang switches.
|
||
|
// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared -fsanitize-address-use-odr-indicator %s -o %dynamiclib -DSZ=100
|
||
|
// RUN: %clangxx_asan -fsanitize-address-use-odr-indicator %s %ld_flags_rpath_exe -o %t-ODR-EXE
|
||
|
// RUN: %env_asan_opts=fast_unwind_on_malloc=0 not %run %t-ODR-EXE 2>&1 | FileCheck %s
|
||
|
|
||
|
// GNU driver doesn't handle .so files properly.
|
||
|
// REQUIRES: Clang
|
||
|
|
||
|
#ifndef SZ
|
||
|
# define SZ 4
|
||
|
#endif
|
||
|
|
||
|
#if BUILD_SO
|
||
|
namespace foo { char G[SZ]; }
|
||
|
#else
|
||
|
#include <stdio.h>
|
||
|
namespace foo { char G[100]; }
|
||
|
// CHECK: ERROR: AddressSanitizer: odr-violation
|
||
|
// CHECK: size=100 'foo::G' {{.*}}odr-violation.cpp:[[@LINE-2]]:22
|
||
|
// CHECK: size={{4|100}} 'foo::G'
|
||
|
int main(int argc, char **argv) {
|
||
|
printf("PASS: %p\n", &foo::G);
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
// CHECK: These globals were registered at these points:
|
||
|
// CHECK: ODR-EXE
|
||
|
// CHECK: odr-violation.cpp.dynamic
|
||
|
// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cpp
|
||
|
// DISABLED: PASS
|