1// Test the blacklist functionality of ASan 2 3// RUN: echo "fun:*brokenFunction*" > %tmp 4// RUN: echo "global:*badGlobal*" >> %tmp 5// RUN: echo "src:*blacklist-extra.cc" >> %tmp 6// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \ 7// RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1 8// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \ 9// RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1 10// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \ 11// RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1 12// RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \ 13// RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1 14 15// badGlobal is accessed improperly, but we blacklisted it. 16int badGlobal; 17int readBadGlobal() { 18 return (&badGlobal)[1]; 19} 20 21// A function which is broken, but excluded in the blacklist. 22int brokenFunction(int argc) { 23 char x[10] = {0}; 24 return x[argc * 10]; // BOOM 25} 26 27// This function is defined in Helpers/blacklist-extra.cc, a source file which 28// is blacklisted by name 29int externalBrokenFunction(int x); 30 31int main(int argc, char **argv) { 32 brokenFunction(argc); 33 int x = readBadGlobal(); 34 externalBrokenFunction(argc); 35 return 0; 36} 37