aboutsummaryrefslogtreecommitdiff
path: root/compiler_wrapper/sanitizer_flags_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'compiler_wrapper/sanitizer_flags_test.go')
-rw-r--r--compiler_wrapper/sanitizer_flags_test.go152
1 files changed, 0 insertions, 152 deletions
diff --git a/compiler_wrapper/sanitizer_flags_test.go b/compiler_wrapper/sanitizer_flags_test.go
deleted file mode 100644
index 8f50a900..00000000
--- a/compiler_wrapper/sanitizer_flags_test.go
+++ /dev/null
@@ -1,152 +0,0 @@
-// Copyright 2019 The Chromium OS Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-package main
-
-import (
- "testing"
-)
-
-func TestFilterUnsupportedSanitizerFlagsIfSanitizeGiven(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-Wl,--no-undefined", mainCc)))
- if err := verifyArgCount(cmd, 0, "-Wl,--no-undefined"); err != nil {
- t.Error(err)
- }
-
- cmd = ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-Wl,-z,defs", mainCc)))
- if err := verifyArgCount(cmd, 0, "-Wl,-z,defs"); err != nil {
- t.Error(err)
- }
-
- cmd = ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-D_FORTIFY_SOURCE=1", mainCc)))
- if err := verifyArgCount(cmd, 0, "-D_FORTIFY_SOURCE=1"); err != nil {
- t.Error(err)
- }
-
- cmd = ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", "-D_FORTIFY_SOURCE=2", mainCc)))
- if err := verifyArgCount(cmd, 0, "-D_FORTIFY_SOURCE=2"); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestFilterUnsupportedDefaultSanitizerFlagsIfSanitizeGivenForClang(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- ctx.cfg.commonFlags = []string{"-D_FORTIFY_SOURCE=1"}
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(clangX86_64, "-fsanitize=kernel-address", mainCc)))
- if err := verifyArgCount(cmd, 0, "-D_FORTIFY_SOURCE=1"); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestKeepUnsupportedDefaultSanitizerFlagsIfSanitizeGivenForGcc(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- ctx.cfg.commonFlags = []string{"-D_FORTIFY_SOURCE=1"}
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-fsanitize=kernel-address", mainCc)))
- if err := verifyArgCount(cmd, 1, "-D_FORTIFY_SOURCE=1"); err != nil {
- t.Error(err)
- }
- })
-}
-
-// TODO: This is a bug in the old wrapper to not filter
-// non user args for gcc. Fix this once we don't compare to the old wrapper anymore.
-func TestKeepSanitizerFlagsIfNoSanitizeGiven(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-Wl,--no-undefined", mainCc)))
- if err := verifyArgCount(cmd, 1, "-Wl,--no-undefined"); err != nil {
- t.Error(err)
- }
-
- cmd = ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-Wl,-z,defs", mainCc)))
- if err := verifyArgCount(cmd, 1, "-Wl,-z,defs"); err != nil {
- t.Error(err)
- }
-
- cmd = ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-D_FORTIFY_SOURCE=1", mainCc)))
- if err := verifyArgCount(cmd, 1, "-D_FORTIFY_SOURCE=1"); err != nil {
- t.Error(err)
- }
-
- cmd = ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-D_FORTIFY_SOURCE=2", mainCc)))
- if err := verifyArgCount(cmd, 1, "-D_FORTIFY_SOURCE=2"); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestKeepSanitizerFlagsIfSanitizeGivenInCommonFlags(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- ctx.cfg.commonFlags = []string{"-fsanitize=kernel-address"}
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-Wl,--no-undefined", mainCc)))
- if err := verifyArgCount(cmd, 1, "-Wl,--no-undefined"); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestAddFuzzerFlagsForClang(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(clangX86_64, "-fsanitize=fuzzer", mainCc)))
- if err := verifyArgOrder(cmd, "-fno-experimental-new-pass-manager",
- "-fsanitize=fuzzer", mainCc); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestOmitFuzzerFlagsForGcc(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(gccX86_64, "-fsanitize=fuzzer", mainCc)))
- if err := verifyArgCount(cmd, 0, "-fno-experimental-new-pass-manager"); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestAddSanitizerCoverageFlagsForClang(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(clangX86_64, "-fsanitize=address", "-fprofile-instr-generate", mainCc)))
- if err := verifyArgOrder(cmd, "-fno-experimental-new-pass-manager",
- "-fsanitize=address", "-fprofile-instr-generate", mainCc); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestOmitSanitizerCoverageFlagsForClang(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(clangX86_64, "-fsanitize=address", mainCc)))
- if err := verifyArgCount(cmd, 0, "-fno-experimental-new-pass-manager"); err != nil {
- t.Error(err)
- }
- })
-}
-
-func TestKeepSanitizerCoverageFlagsForClang(t *testing.T) {
- withTestContext(t, func(ctx *testContext) {
- cmd := ctx.must(callCompiler(ctx, ctx.cfg,
- ctx.newCommand(clangX86_64, "-fprofile-instr-generate", mainCc)))
- if err := verifyArgCount(cmd, 0, "-fno-experimental-new-pass-manager"); err != nil {
- t.Error(err)
- }
- })
-}