You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
153 lines
5.0 KiB
153 lines
5.0 KiB
// Copyright 2019 The Chromium OS Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
package main
|
|
|
|
import (
|
|
"testing"
|
|
)
|
|
|
|
func TestFilterUnsupportedSanitizerFlagsIfSanitizeGiven(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-Wl,--no-undefined", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-Wl,--no-undefined"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
cmd = ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-Wl,-z,defs", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-Wl,-z,defs"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
cmd = ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-D_FORTIFY_SOURCE=1", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-D_FORTIFY_SOURCE=1"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
cmd = ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-D_FORTIFY_SOURCE=2", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-D_FORTIFY_SOURCE=2"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestFilterUnsupportedDefaultSanitizerFlagsIfSanitizeGivenForClang(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
ctx.cfg.commonFlags = []string{"-D_FORTIFY_SOURCE=1"}
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(clangX86_64, "-fsanitize=kernel-address", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-D_FORTIFY_SOURCE=1"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestKeepUnsupportedDefaultSanitizerFlagsIfSanitizeGivenForGcc(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
ctx.cfg.commonFlags = []string{"-D_FORTIFY_SOURCE=1"}
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", mainCc)))
|
|
if err := verifyArgCount(cmd, 1, "-D_FORTIFY_SOURCE=1"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
// TODO: This is a bug in the old wrapper to not filter
|
|
// non user args for gcc. Fix this once we don't compare to the old wrapper anymore.
|
|
func TestKeepSanitizerFlagsIfNoSanitizeGiven(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-Wl,--no-undefined", mainCc)))
|
|
if err := verifyArgCount(cmd, 1, "-Wl,--no-undefined"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
cmd = ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-Wl,-z,defs", mainCc)))
|
|
if err := verifyArgCount(cmd, 1, "-Wl,-z,defs"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
cmd = ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-D_FORTIFY_SOURCE=1", mainCc)))
|
|
if err := verifyArgCount(cmd, 1, "-D_FORTIFY_SOURCE=1"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
|
|
cmd = ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-D_FORTIFY_SOURCE=2", mainCc)))
|
|
if err := verifyArgCount(cmd, 1, "-D_FORTIFY_SOURCE=2"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestKeepSanitizerFlagsIfSanitizeGivenInCommonFlags(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
ctx.cfg.commonFlags = []string{"-fsanitize=kernel-address"}
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-Wl,--no-undefined", mainCc)))
|
|
if err := verifyArgCount(cmd, 1, "-Wl,--no-undefined"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestAddFuzzerFlagsForClang(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(clangX86_64, "-fsanitize=fuzzer", mainCc)))
|
|
if err := verifyArgOrder(cmd, "-fno-experimental-new-pass-manager",
|
|
"-fsanitize=fuzzer", mainCc); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestOmitFuzzerFlagsForGcc(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(gccX86_64, "-fsanitize=fuzzer", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-fno-experimental-new-pass-manager"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestAddSanitizerCoverageFlagsForClang(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(clangX86_64, "-fsanitize=address", "-fprofile-instr-generate", mainCc)))
|
|
if err := verifyArgOrder(cmd, "-fno-experimental-new-pass-manager",
|
|
"-fsanitize=address", "-fprofile-instr-generate", mainCc); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestOmitSanitizerCoverageFlagsForClang(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(clangX86_64, "-fsanitize=address", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-fno-experimental-new-pass-manager"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestKeepSanitizerCoverageFlagsForClang(t *testing.T) {
|
|
withTestContext(t, func(ctx *testContext) {
|
|
cmd := ctx.must(callCompiler(ctx, ctx.cfg,
|
|
ctx.newCommand(clangX86_64, "-fprofile-instr-generate", mainCc)))
|
|
if err := verifyArgCount(cmd, 0, "-fno-experimental-new-pass-manager"); err != nil {
|
|
t.Error(err)
|
|
}
|
|
})
|
|
}
|