[ubsan] Remove -fsanitizer=vptr from -fsanitizer=undefined (#121115)
This makes `undefined` more consistent. `vptr` check adds additional constraints: 1. trap is off, or silently disabled 2. rtti is no, or compilation error 3. c++abi, or linking error So it's not obvious if `-fsanitizer=undefined` will have it on. https://discourse.llvm.org/t/rfc-remove-vptr-from-undefined/83830
This commit is contained in:
@@ -388,6 +388,8 @@ Moved checkers
|
||||
Sanitizers
|
||||
----------
|
||||
|
||||
- ``-fsanitize=vptr`` is no longer a part of ``-fsanitize=undefined``.
|
||||
|
||||
Python Binding Changes
|
||||
----------------------
|
||||
- Added ``Type.get_methods``, a binding for ``clang_visitCXXMethods``, which
|
||||
|
||||
@@ -214,13 +214,14 @@ Available checks are:
|
||||
the wrong dynamic type, or that its lifetime has not begun or has ended.
|
||||
Incompatible with ``-fno-rtti``. Link must be performed by ``clang++``, not
|
||||
``clang``, to make sure C++-specific parts of the runtime library and C++
|
||||
standard libraries are present.
|
||||
standard libraries are present. The check is not a part of the ``undefined``
|
||||
group. Also it does not support ``-fsanitize-trap=vptr``.
|
||||
|
||||
You can also use the following check groups:
|
||||
- ``-fsanitize=undefined``: All of the checks listed above other than
|
||||
``float-divide-by-zero``, ``unsigned-integer-overflow``,
|
||||
``implicit-conversion``, ``local-bounds`` and the ``nullability-*`` group
|
||||
of checks.
|
||||
``implicit-conversion``, ``local-bounds``, ``vptr`` and the
|
||||
``nullability-*`` group of checks.
|
||||
- ``-fsanitize=undefined-trap``: Deprecated alias of
|
||||
``-fsanitize=undefined``.
|
||||
- ``-fsanitize=implicit-integer-truncation``: Catches lossy integral
|
||||
|
||||
@@ -152,8 +152,7 @@ SANITIZER_GROUP("undefined", Undefined,
|
||||
FloatCastOverflow |
|
||||
IntegerDivideByZero | NonnullAttribute | Null | ObjectSize |
|
||||
PointerOverflow | Return | ReturnsNonnullAttribute | Shift |
|
||||
SignedIntegerOverflow | Unreachable | VLABound | Function |
|
||||
Vptr)
|
||||
SignedIntegerOverflow | Unreachable | VLABound | Function)
|
||||
|
||||
// -fsanitize=undefined-trap is an alias for -fsanitize=undefined.
|
||||
SANITIZER_GROUP("undefined-trap", UndefinedTrap, Undefined)
|
||||
|
||||
@@ -30,7 +30,8 @@ static const SanitizerMask NeedsUbsanRt =
|
||||
SanitizerKind::Undefined | SanitizerKind::Integer |
|
||||
SanitizerKind::LocalBounds | SanitizerKind::ImplicitConversion |
|
||||
SanitizerKind::Nullability | SanitizerKind::CFI |
|
||||
SanitizerKind::FloatDivideByZero | SanitizerKind::ObjCCast;
|
||||
SanitizerKind::FloatDivideByZero | SanitizerKind::ObjCCast |
|
||||
SanitizerKind::Vptr;
|
||||
static const SanitizerMask NeedsUbsanCxxRt =
|
||||
SanitizerKind::Vptr | SanitizerKind::CFI;
|
||||
static const SanitizerMask NotAllowedWithTrap = SanitizerKind::Vptr;
|
||||
@@ -53,11 +54,12 @@ static const SanitizerMask SupportsCoverage =
|
||||
SanitizerKind::FuzzerNoLink | SanitizerKind::FloatDivideByZero |
|
||||
SanitizerKind::SafeStack | SanitizerKind::ShadowCallStack |
|
||||
SanitizerKind::Thread | SanitizerKind::ObjCCast | SanitizerKind::KCFI |
|
||||
SanitizerKind::NumericalStability;
|
||||
SanitizerKind::NumericalStability | SanitizerKind::Vptr;
|
||||
static const SanitizerMask RecoverableByDefault =
|
||||
SanitizerKind::Undefined | SanitizerKind::Integer |
|
||||
SanitizerKind::ImplicitConversion | SanitizerKind::Nullability |
|
||||
SanitizerKind::FloatDivideByZero | SanitizerKind::ObjCCast;
|
||||
SanitizerKind::FloatDivideByZero | SanitizerKind::ObjCCast |
|
||||
SanitizerKind::Vptr;
|
||||
static const SanitizerMask Unrecoverable =
|
||||
SanitizerKind::Unreachable | SanitizerKind::Return;
|
||||
static const SanitizerMask AlwaysRecoverable = SanitizerKind::KernelAddress |
|
||||
@@ -65,11 +67,12 @@ static const SanitizerMask AlwaysRecoverable = SanitizerKind::KernelAddress |
|
||||
SanitizerKind::KCFI;
|
||||
static const SanitizerMask NeedsLTO = SanitizerKind::CFI;
|
||||
static const SanitizerMask TrappingSupported =
|
||||
(SanitizerKind::Undefined & ~SanitizerKind::Vptr) | SanitizerKind::Integer |
|
||||
SanitizerKind::Undefined | SanitizerKind::Integer |
|
||||
SanitizerKind::ImplicitConversion | SanitizerKind::Nullability |
|
||||
SanitizerKind::LocalBounds | SanitizerKind::CFI |
|
||||
SanitizerKind::FloatDivideByZero | SanitizerKind::ObjCCast;
|
||||
static const SanitizerMask MergeDefault = SanitizerKind::Undefined;
|
||||
static const SanitizerMask MergeDefault =
|
||||
SanitizerKind::Undefined | SanitizerKind::Vptr;
|
||||
static const SanitizerMask TrappingDefault =
|
||||
SanitizerKind::CFI | SanitizerKind::LocalBounds;
|
||||
static const SanitizerMask CFIClasses =
|
||||
@@ -195,8 +198,8 @@ static void addDefaultIgnorelists(const Driver &D, SanitizerMask Kinds,
|
||||
{"dfsan_abilist.txt", SanitizerKind::DataFlow},
|
||||
{"cfi_ignorelist.txt", SanitizerKind::CFI},
|
||||
{"ubsan_ignorelist.txt",
|
||||
SanitizerKind::Undefined | SanitizerKind::Integer |
|
||||
SanitizerKind::Nullability |
|
||||
SanitizerKind::Undefined | SanitizerKind::Vptr |
|
||||
SanitizerKind::Integer | SanitizerKind::Nullability |
|
||||
SanitizerKind::FloatDivideByZero}};
|
||||
|
||||
for (auto BL : Ignorelists) {
|
||||
|
||||
@@ -63,7 +63,7 @@
|
||||
// CHECK-UNDEFINED-MERGE5: "-fsanitize-merge=alignment,null"
|
||||
|
||||
// RUN: %clang --target=x86_64-linux-gnu -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-UNDEFINED
|
||||
// CHECK-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|function|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|vptr|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute),?){19}"}}
|
||||
// CHECK-UNDEFINED: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|function|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute),?){18}"}}
|
||||
|
||||
// RUN: %clang --target=x86_64-apple-darwin10 -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-UNDEFINED-DARWIN
|
||||
// CHECK-UNDEFINED-DARWIN: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|function|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute),?){18}"}}
|
||||
@@ -78,7 +78,7 @@
|
||||
// CHECK-UNDEFINED-WIN64-MINGW: "--dependent-lib={{[^"]*}}libclang_rt.ubsan_standalone{{(-x86_64)?}}.a"
|
||||
// CHECK-UNDEFINED-WIN-CXX: "--dependent-lib={{[^"]*}}ubsan_standalone_cxx{{[^"]*}}.lib"
|
||||
// CHECK-UNDEFINED-MSVC-SAME: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function),?){18}"}}
|
||||
// CHECK-UNDEFINED-WIN64-MINGW-SAME: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function|vptr),?){19}"}}
|
||||
// CHECK-UNDEFINED-WIN64-MINGW-SAME: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function),?){18}"}}
|
||||
|
||||
// RUN: %clang --target=i386-pc-win32 -fsanitize-coverage=bb %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-COVERAGE-WIN32
|
||||
// CHECK-COVERAGE-WIN32: "--dependent-lib={{[^"]*}}ubsan_standalone{{(-i386)?}}.lib"
|
||||
@@ -148,10 +148,11 @@
|
||||
// RUN: %clang -fsanitize=shift -fno-sanitize=shift-base %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-FSANITIZE-SHIFT-PARTIAL
|
||||
// CHECK-FSANITIZE-SHIFT-PARTIAL: "-fsanitize=shift-exponent"
|
||||
|
||||
// RUN: not %clang --target=x86_64-linux-gnu -fsanitize=vptr -fsanitize-trap=undefined %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-VPTR-TRAP-UNDEF
|
||||
// RUN: not %clang --target=x86_64-linux-gnu -fsanitize=vptr -fsanitize-undefined-trap-on-error %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-VPTR-TRAP-UNDEF
|
||||
// RUN: not %clang --target=x86_64-linux-gnu -fsanitize=vptr -fsanitize-trap=vptr %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-VPTR-TRAP-UNDEF
|
||||
// CHECK-VPTR-TRAP-UNDEF: error: invalid argument '-fsanitize=vptr' not allowed with '-fsanitize-trap=undefined'
|
||||
|
||||
// RUN: %clang --target=x86_64-linux-gnu -fsanitize=vptr -fsanitize-undefined-trap-on-error %s -###
|
||||
|
||||
// RUN: not %clang --target=x86_64-linux-gnu -fsanitize=vptr -fno-rtti %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-VPTR-NO-RTTI
|
||||
// CHECK-VPTR-NO-RTTI: '-fsanitize=vptr' not allowed with '-fno-rtti'
|
||||
|
||||
@@ -411,7 +412,7 @@
|
||||
// RUN: %clang --target=x86_64-linux-gnu %s -fsanitize=undefined -fno-sanitize-recover=undefined -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-RECOVER-UBSAN
|
||||
// RUN: %clang --target=x86_64-linux-gnu %s -fsanitize=undefined -fno-sanitize-recover=all -fsanitize-recover=thread -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-RECOVER-UBSAN
|
||||
// RUN: %clang --target=x86_64-linux-gnu %s -fsanitize=undefined -fsanitize-recover=all -fno-sanitize-recover=undefined -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-RECOVER-UBSAN
|
||||
// CHECK-RECOVER-UBSAN: "-fsanitize-recover={{((signed-integer-overflow|integer-divide-by-zero|function|shift-base|shift-exponent|vla-bound|alignment|null|vptr|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute),?){17}"}}
|
||||
// CHECK-RECOVER-UBSAN: "-fsanitize-recover={{((signed-integer-overflow|integer-divide-by-zero|function|shift-base|shift-exponent|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute),?){16}"}}
|
||||
// CHECK-NO-RECOVER-UBSAN-NOT: sanitize-recover
|
||||
|
||||
// RUN: %clang --target=x86_64-linux-gnu %s -fsanitize=undefined -fno-sanitize-recover=all -fsanitize-recover=object-size,shift-base -### 2>&1 | FileCheck %s --check-prefix=CHECK-PARTIAL-RECOVER
|
||||
@@ -624,7 +625,7 @@
|
||||
// CHECK-ASAN-IOS: -fsanitize=address
|
||||
|
||||
// RUN: %clang --target=i386-pc-openbsd -fsanitize=undefined %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-UBSAN-OPENBSD
|
||||
// CHECK-UBSAN-OPENBSD: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|function|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|vptr|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute),?){19}"}}
|
||||
// CHECK-UBSAN-OPENBSD: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|function|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute),?){18}"}}
|
||||
|
||||
// RUN: not %clang --target=i386-pc-openbsd -fsanitize=address %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-OPENBSD
|
||||
// CHECK-ASAN-OPENBSD: unsupported option '-fsanitize=address' for target 'i386-pc-openbsd'
|
||||
@@ -1066,7 +1067,7 @@
|
||||
// CHECK-UBSAN-FUNCTION-TARGET-DAG: error: unsupported option '-fsanitize=function' for target 'x86_64-sie-ps5'
|
||||
// CHECK-UBSAN-FUNCTION-MEXECUTE-ONLY-DAG: error: invalid argument '-fsanitize=function' not allowed with '-mexecute-only'
|
||||
// CHECK-UBSAN-FUNCTION-MPURE-CODE-DAG: error: invalid argument '-fsanitize=function' not allowed with '-mpure-code'
|
||||
// CHECK-UBSAN-UNDEFINED-VPTR: "-fsanitize={{((alignment|array-bounds|bool|builtin|enum|float-cast-overflow|integer-divide-by-zero|nonnull-attribute|null|pointer-overflow|return|returns-nonnull-attribute|shift-base|shift-exponent|signed-integer-overflow|unreachable|vla-bound|vptr),?){18}"}}
|
||||
// CHECK-UBSAN-UNDEFINED-VPTR: "-fsanitize={{((alignment|array-bounds|bool|builtin|enum|float-cast-overflow|integer-divide-by-zero|nonnull-attribute|null|pointer-overflow|return|returns-nonnull-attribute|shift-base|shift-exponent|signed-integer-overflow|unreachable|vla-bound),?){17}"}}
|
||||
|
||||
// * Test BareMetal toolchain sanitizer support *
|
||||
|
||||
@@ -1165,7 +1166,7 @@
|
||||
|
||||
// -fsanitize-skip-hot-cutoff=undefined=0.5
|
||||
// RUN: %clang -Werror --target=x86_64-linux-gnu -fsanitize=undefined -fsanitize-skip-hot-cutoff=undefined=0.5 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SKIP-HOT-CUTOFF1
|
||||
// CHECK-SKIP-HOT-CUTOFF1: "-fsanitize-skip-hot-cutoff={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function|vptr)=0.5(0*),?){19}"}}
|
||||
// CHECK-SKIP-HOT-CUTOFF1: "-fsanitize-skip-hot-cutoff={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function)=0.5(0*),?){18}"}}
|
||||
|
||||
// No-op: no sanitizers are specified
|
||||
// RUN: %clang -Werror --target=x86_64-linux-gnu -fsanitize-skip-hot-cutoff=undefined=0.5 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SKIP-HOT-CUTOFF2
|
||||
@@ -1174,11 +1175,11 @@
|
||||
|
||||
// Enable undefined, then cancel out integer using a cutoff of 0.0
|
||||
// RUN: %clang -Werror --target=x86_64-linux-gnu -fsanitize=undefined -fsanitize-skip-hot-cutoff=undefined=0.5,integer=0.0 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SKIP-HOT-CUTOFF3
|
||||
// CHECK-SKIP-HOT-CUTOFF3: "-fsanitize-skip-hot-cutoff={{((unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function|vptr)=0.5(0*),?){15}"}}
|
||||
// CHECK-SKIP-HOT-CUTOFF3: "-fsanitize-skip-hot-cutoff={{((unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function)=0.5(0*),?){14}"}}
|
||||
|
||||
// Enable undefined, then cancel out integer using a cutoff of 0.0, then re-enable signed-integer-overflow
|
||||
// RUN: %clang -Werror --target=x86_64-linux-gnu -fsanitize=undefined -fsanitize-skip-hot-cutoff=undefined=0.5,integer=0.0,signed-integer-overflow=0.7 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SKIP-HOT-CUTOFF4
|
||||
// CHECK-SKIP-HOT-CUTOFF4: "-fsanitize-skip-hot-cutoff={{((signed-integer-overflow|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function|vptr)=0.[57]0*,?){16}"}}
|
||||
// CHECK-SKIP-HOT-CUTOFF4: "-fsanitize-skip-hot-cutoff={{((signed-integer-overflow|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function)=0.[57]0*,?){15}"}}
|
||||
|
||||
// Check that -fsanitize-skip-hot-cutoff=undefined=0.4 does not widen the set of -fsanitize=integer checks.
|
||||
// RUN: %clang -Werror --target=x86_64-linux-gnu -fsanitize=integer -fsanitize-skip-hot-cutoff=undefined=0.4 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SKIP-HOT-CUTOFF5
|
||||
@@ -1186,7 +1187,7 @@
|
||||
|
||||
// No-op: it's allowed for the user to specify a cutoff of 0.0, though the argument is not passed along by the driver.
|
||||
// RUN: %clang -Werror --target=x86_64-linux-gnu -fsanitize=undefined -fsanitize-skip-hot-cutoff=undefined=0.0 %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-SKIP-HOT-CUTOFF6
|
||||
// CHECK-SKIP-HOT-CUTOFF6: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function|vptr),?){19}"}}
|
||||
// CHECK-SKIP-HOT-CUTOFF6: "-fsanitize={{((signed-integer-overflow|integer-divide-by-zero|shift-base|shift-exponent|unreachable|return|vla-bound|alignment|null|pointer-overflow|float-cast-overflow|array-bounds|enum|bool|builtin|returns-nonnull-attribute|nonnull-attribute|function),?){18}"}}
|
||||
// CHECK-SKIP-HOT-CUTOFF6-NOT: "-fsanitize-skip-hot-cutoff"
|
||||
|
||||
// Invalid: bad sanitizer
|
||||
|
||||
@@ -514,9 +514,19 @@
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-UBSAN-LINUX-LINK-CXX
|
||||
// CHECK-UBSAN-LINUX-LINK-CXX: "{{.*}}ld"
|
||||
// CHECK-UBSAN-LINUX-LINK-CXX-NOT: "-lstdc++"
|
||||
// CHECK-UBSAN-LINUX-LINK-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-UBSAN-LINUX-LINK-CXX-NOT: "-lstdc++"
|
||||
// CHECK-UBSAN-LINUX-LINK-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone.a" "--no-whole-archive"
|
||||
|
||||
// RUN: %clang -fsanitize=vptr -fsanitize-link-c++-runtime -### %s 2>&1 \
|
||||
// RUN: --target=i386-unknown-linux \
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-VPTR-LINUX-LINK-CXX
|
||||
// CHECK-VPTR-LINUX-LINK-CXX-NOT: "-lstdc++"
|
||||
// CHECK-VPTR-LINUX-LINK-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone.a" "--no-whole-archive"
|
||||
// CHECK-VPTR-LINUX-LINK-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-VPTR-LINUX-LINK-CXX-NOT: "-lstdc++"
|
||||
|
||||
// RUN: %clangxx -fsanitize=undefined -### %s 2>&1 \
|
||||
// RUN: --target=i386-unknown-linux -fuse-ld=ld -stdlib=platform \
|
||||
@@ -524,12 +534,23 @@
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-UBSAN-LINUX-CXX
|
||||
// CHECK-UBSAN-LINUX-CXX: "{{.*}}ld{{(.exe)?}}"
|
||||
// CHECK-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone.a" "--no-whole-archive"
|
||||
// CHECK-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-UBSAN-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone.a" "--no-whole-archive"
|
||||
// CHECK-UBSAN-LINUX-CXX: "-lstdc++"
|
||||
// CHECK-UBSAN-LINUX-CXX: "-lpthread"
|
||||
// CHECK-UBSAN-LINUX-CXX: "-lresolv"
|
||||
|
||||
// RUN: %clangxx -fsanitize=vptr -### %s 2>&1 \
|
||||
// RUN: --target=i386-unknown-linux -fuse-ld=ld -stdlib=platform \
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck}--check-prefix=CHECK-VPTR-LINUX-CXX
|
||||
// CHECK-VPTR-LINUX-CXX: "{{.*}}ld"
|
||||
// CHECK-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone.a" "--no-whole-archive"
|
||||
// CHECK-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-VPTR-LINUX-CXX-SAME: "-lstdc++"
|
||||
// CHECK-VPTR-LINUX-CXX-SAME: "-lpthread"
|
||||
// CHECK-VPTR-LINUX-CXX-SAME: "-lresolv"
|
||||
|
||||
// RUN: %clang -fsanitize=undefined -fsanitize-minimal-runtime -### %s 2>&1 \
|
||||
// RUN: --target=i386-unknown-linux -fuse-ld=ld \
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
@@ -588,11 +609,25 @@
|
||||
// CHECK-ASAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.asan.a" "--no-whole-archive"
|
||||
// CHECK-ASAN-UBSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.asan.a.syms"
|
||||
// CHECK-ASAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.asan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-ASAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-ASAN-UBSAN-LINUX-CXX: "-lstdc++"
|
||||
// CHECK-ASAN-UBSAN-LINUX-CXX: "-lpthread"
|
||||
// CHECK-ASAN-UBSAN-LINUX-CXX: "-lresolv"
|
||||
|
||||
// RUN: %clangxx -fsanitize=address,vptr -### %s 2>&1 \
|
||||
// RUN: --target=i386-unknown-linux -fuse-ld=ld -stdlib=platform \
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-ASAN-VPTR-LINUX-CXX
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX: "{{.*}}ld"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.asan_static.a" "--no-whole-archive"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.asan.a" "--no-whole-archive"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.asan.a.syms"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.asan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "-lstdc++"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "-lpthread"
|
||||
// CHECK-ASAN-VPTR-LINUX-CXX-SAME: "-lresolv"
|
||||
|
||||
// RUN: %clangxx -fsanitize=address,undefined -fno-sanitize=vptr -### %s 2>&1 \
|
||||
// RUN: --target=i386-unknown-linux -fuse-ld=ld -stdlib=platform \
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
@@ -613,11 +648,22 @@
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-MSAN-UBSAN-LINUX-CXX
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX: "{{.*}}ld{{(.exe)?}}"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.msan.a" "--no-whole-archive"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan.a.syms"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.msan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.msan_cxx.a.syms"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.msan.a" "--no-whole-archive"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.msan.a.syms"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.msan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-MSAN-UBSAN-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.msan_cxx.a.syms"
|
||||
|
||||
// RUN: %clangxx -fsanitize=memory,vptr -### %s 2>&1 \
|
||||
// RUN: --target=x86_64-unknown-linux -fuse-ld=ld \
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-MSAN-VPTR-LINUX-CXX
|
||||
// CHECK-MSAN-VPTR-LINUX-CXX: "{{.*}}ld"
|
||||
// CHECK-MSAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.msan.a" "--no-whole-archive"
|
||||
// CHECK-MSAN-VPTR-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.msan.a.syms"
|
||||
// CHECK-MSAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.msan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-MSAN-VPTR-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.msan_cxx.a.syms"
|
||||
// CHECK-MSAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
|
||||
// RUN: %clangxx -fsanitize=thread,undefined -### %s 2>&1 \
|
||||
// RUN: --target=x86_64-unknown-linux -fuse-ld=ld \
|
||||
@@ -625,11 +671,22 @@
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-TSAN-UBSAN-LINUX-CXX
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX: "{{.*}}ld{{(.exe)?}}"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.tsan.a" "--no-whole-archive"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.tsan.a.syms"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.tsan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX: "--dynamic-list={{.*}}libclang_rt.tsan_cxx.a.syms"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.tsan.a" "--no-whole-archive"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.tsan.a.syms"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.tsan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-TSAN-UBSAN-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.tsan_cxx.a.syms"
|
||||
|
||||
// RUN: %clangxx -fsanitize=thread,vptr -### %s 2>&1 \
|
||||
// RUN: --target=x86_64-unknown-linux -fuse-ld=ld \
|
||||
// RUN: -resource-dir=%S/Inputs/resource_dir \
|
||||
// RUN: --sysroot=%S/Inputs/basic_linux_tree \
|
||||
// RUN: | %{filecheck} --check-prefix=CHECK-TSAN-VPTR-LINUX-CXX
|
||||
// CHECK-TSAN-VPTR-LINUX-CXX: "{{.*}}ld"
|
||||
// CHECK-TSAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.tsan.a" "--no-whole-archive"
|
||||
// CHECK-TSAN-VPTR-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.tsan.a.syms"
|
||||
// CHECK-TSAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.tsan_cxx.a" "--no-whole-archive"
|
||||
// CHECK-TSAN-VPTR-LINUX-CXX-SAME: "--dynamic-list={{.*}}libclang_rt.tsan_cxx.a.syms"
|
||||
// CHECK-TSAN-VPTR-LINUX-CXX-SAME: "--whole-archive" "{{.*}}libclang_rt.ubsan_standalone_cxx.a" "--no-whole-archive"
|
||||
|
||||
// RUN: %clang -fsanitize=undefined -### %s 2>&1 \
|
||||
// RUN: --target=i386-unknown-linux -fuse-ld=ld \
|
||||
|
||||
Reference in New Issue
Block a user