odr-violation.cc revision 86277eb844c4983c81de62d7c050e92fe7155788
1// FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316
2// XFAIL: android
3//
4// We use fast_unwind_on_malloc=0 to have full unwinding even w/o frame
5// pointers. This setting is not on by default because it's too expensive.
6//
7// Different size: detect a bug if detect_odr_violation>=1
8// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t-ODR-SO.so
9// RUN: %clangxx_asan %s %t-ODR-SO.so -Wl,-R. -o %t-ODR-EXE
10// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=1 not %run %t-ODR-EXE 2>&1 | FileCheck %s
11// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | FileCheck %s
12// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=0     %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED
13// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0                        not %run %t-ODR-EXE 2>&1 | FileCheck %s
14//
15// Same size: report a bug only if detect_odr_violation>=2.
16// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t-ODR-SO.so -DSZ=100
17// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=1     %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED
18// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2 not %run %t-ODR-EXE 2>&1 | FileCheck %s
19// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0                        not %run %t-ODR-EXE 2>&1 | FileCheck %s
20// RUN: echo "odr_violation:foo::ZZZ" > %t.supp
21// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp  not %run %t-ODR-EXE 2>&1 | FileCheck %s
22// RUN: echo "odr_violation:foo::G" > %t.supp
23// RUN: ASAN_OPTIONS=fast_unwind_on_malloc=0:detect_odr_violation=2:suppressions=%t.supp      %run %t-ODR-EXE 2>&1 | FileCheck %s --check-prefix=DISABLED
24// RUN: rm -f %t.supp
25
26// GNU driver doesn't handle .so files properly.
27// REQUIRES: Clang
28
29#ifndef SZ
30# define SZ 4
31#endif
32
33#if BUILD_SO
34namespace foo { char G[SZ]; }
35#else
36#include <stdio.h>
37namespace foo { char G[100]; }
38// CHECK: ERROR: AddressSanitizer: odr-violation
39// CHECK: size=100 'foo::G' {{.*}}odr-violation.cc:[[@LINE-2]]:22
40// CHECK: size={{4|100}} 'foo::G'
41int main(int argc, char **argv) {
42  printf("PASS: %p\n", &foo::G);
43}
44#endif
45
46// CHECK: These globals were registered at these points:
47// CHECK: ODR-EXE
48// CHECK: ODR-SO
49// CHECK: SUMMARY: AddressSanitizer: odr-violation: global 'foo::G' at {{.*}}odr-violation.cc
50// DISABLED: PASS
51