1// Check that without suppressions, we catch the issue.
2// RUN: %clangxx_asan -O0 %s -o %t
3// RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
4
5// If the executable is started from a different location, we should still
6// find the suppression file located relative to the location of the executable.
7// RUN: rm -rf %t-dir
8// RUN: mkdir -p %t-dir
9// RUN: %clangxx_asan -O0 %s -o %t-dir/exec
10// RUN: echo "interceptor_via_fun:crash_function" > \
11// RUN: %t-dir/supp.txt
12// RUN: %env_asan_opts=suppressions='"supp.txt"' \
13// RUN: %run %t-dir/exec 2>&1 | \
14// RUN: FileCheck --check-prefix=CHECK-IGNORE %s
15// RUN: rm -rf %t-dir
16
17// If the wrong absolute path is given, we don't try to construct
18// a relative path with it.
19// RUN: %env_asan_opts=suppressions='"/absolute/path"' not %run %t 2>&1 | \
20// RUN: FileCheck --check-prefix=CHECK-WRONG-FILE-NAME %s
21
22// Test that we reject directory as filename.
23// RUN: %env_asan_opts=suppressions='"folder/only/"' not %run %t 2>&1 | \
24// RUN: FileCheck --check-prefix=CHECK-WRONG-FILE-NAME %s
25
26// FIXME: Upload suppressions to device.
27// XFAIL: android
28// UNSUPPORTED: ios
29
30#include <stdio.h>
31#include <stdlib.h>
32#include <string.h>
33
34void crash_function() {
35 char *a = (char *)malloc(size: 6);
36 free(ptr: a);
37 size_t len = strlen(s: a); // BOOM
38 fprintf(stderr, format: "strlen ignored, len = %zu\n", len);
39}
40
41int main() {
42 crash_function();
43}
44
45// CHECK-CRASH: AddressSanitizer: heap-use-after-free
46// CHECK-IGNORE-NOT: AddressSanitizer: heap-buffer-overflow
47// CHECK-IGNORE: ignored
48// CHECK-WRONG-FILE-NAME: failed to read suppressions file
49

Provided by KDAB

Privacy Policy
Improve your Profiling and Debugging skills
Find out more

source code of compiler-rt/test/asan/TestCases/suppressions-exec-relative-location.cpp