odr-violation.cc revision 86277eb844c4983c81de62d7c050e92fe7155788
1// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 2// XFAIL: android 3// 4// We use fast_unwind_on_malloc=0 to have full unwinding even w/o frame 5// pointers. This setting is not on by default because it's too expensive. 6// 7// Different size: detect a bug if detect_odr_violation>=1 8// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t-ODR-SO.so 9// RUN: %clangxx_asan %s %t-ODR-SO.so -Wl,-R. -o %t-ODR-EXE 10// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=1 not %run %t-ODR-EXE 2>&1 | FileCheck %s 11// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | FileCheck %s 12// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=0 %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED 13// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0 not %run %t-ODR-EXE 2>&1 | FileCheck %s 14// 15// Same size: report a bug only if detect_odr_violation>=2. 16// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t-ODR-SO.so -DSZ=100 17// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=1 %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED 18// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | FileCheck %s 19// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0 not %run %t-ODR-EXE 2>&1 | FileCheck %s 20// RUN: echo "odr_violation:foo::ZZZ" > %t.supp 21// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp not %run %t-ODR-EXE 2>&1 | FileCheck %s 22// RUN: echo "odr_violation:foo::G" > %t.supp 23// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED 24// RUN: rm -f %t.supp 25 26// GNU driver doesn't handle .so files properly. 27// REQUIRES: Clang 28 29#ifndef SZ 30# define SZ 4 31#endif 32 33#if BUILD_SO 34namespace foo { char G[SZ]; } 35#else 36#include <stdio.h> 37namespace foo { char G[100]; } 38// CHECK: ERROR: AddressSanitizer: odr-violation 39// CHECK: size=100 'foo::G' {{.*}}odr-violation.cc:[[@LINE-2]]:22 40// CHECK: size={{4|100}} 'foo::G' 41int main(int argc, char **argv) { 42 printf("PASS: %p\n", &foo::G); 43} 44#endif 45 46// CHECK: These globals were registered at these points: 47// CHECK: ODR-EXE 48// CHECK: ODR-SO 49// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cc 50// DISABLED: PASS 51