2012-07-31 23:43:11 +08:00
|
|
|
# -*- Python -*-
|
|
|
|
|
|
|
|
import os
|
|
|
|
|
2013-05-27 17:35:24 +08:00
|
|
|
def get_required_attr(config, attr_name):
|
|
|
|
attr_value = getattr(config, attr_name, None)
|
|
|
|
if not attr_value:
|
2013-08-10 06:14:01 +08:00
|
|
|
lit_config.fatal(
|
|
|
|
"No attribute %r in test configuration! You may need to run "
|
|
|
|
"tests from your build directory or add this attribute "
|
|
|
|
"to lit.site.cfg " % attr_name)
|
2013-05-27 17:35:24 +08:00
|
|
|
return attr_value
|
|
|
|
|
2012-07-31 23:43:11 +08:00
|
|
|
# Setup config name.
|
2014-02-14 17:22:10 +08:00
|
|
|
config.name = 'AddressSanitizer' + config.name_suffix
|
2012-07-31 23:43:11 +08:00
|
|
|
|
|
|
|
# Setup source root.
|
|
|
|
config.test_source_root = os.path.dirname(__file__)
|
|
|
|
|
2014-02-19 23:13:14 +08:00
|
|
|
# GCC-ASan doesn't link in all the necessary libraries automatically, so
|
|
|
|
# we have to do it ourselves.
|
|
|
|
if config.compiler_id == 'GNU':
|
|
|
|
extra_linkflags = ["-lpthread", "-lstdc++", "-ldl"]
|
|
|
|
else:
|
|
|
|
extra_linkflags = []
|
2012-11-06 10:31:42 +08:00
|
|
|
# Setup default compiler flags used with -fsanitize=address option.
|
2012-07-31 23:43:11 +08:00
|
|
|
# FIXME: Review the set of required flags and check if it can be reduced.
|
2014-02-19 23:13:14 +08:00
|
|
|
target_cflags = [get_required_attr(config, "target_cflags")] + extra_linkflags
|
|
|
|
target_cxxflags = config.cxx_mode_flags + target_cflags
|
2014-02-17 21:08:10 +08:00
|
|
|
clang_asan_cflags = ["-fsanitize=address",
|
|
|
|
"-mno-omit-leaf-frame-pointer",
|
|
|
|
"-fno-omit-frame-pointer",
|
|
|
|
"-fno-optimize-sibling-calls",
|
|
|
|
"-g"] + target_cflags
|
2014-02-19 23:13:14 +08:00
|
|
|
clang_asan_cxxflags = config.cxx_mode_flags + clang_asan_cflags
|
2014-02-14 17:22:10 +08:00
|
|
|
|
2014-02-14 22:06:10 +08:00
|
|
|
asan_lit_source_dir = get_required_attr(config, "asan_lit_source_dir")
|
2014-02-14 17:22:10 +08:00
|
|
|
if config.android == "TRUE":
|
|
|
|
config.available_features.add('android')
|
2014-02-14 22:06:10 +08:00
|
|
|
clang_wrapper = os.path.join(asan_lit_source_dir,
|
2014-02-14 17:22:10 +08:00
|
|
|
"android_commands", "android_compile.py") + " "
|
|
|
|
else:
|
|
|
|
clang_wrapper = ""
|
|
|
|
|
2014-02-17 21:08:10 +08:00
|
|
|
def build_invocation(compile_flags):
|
|
|
|
return " " + " ".join([clang_wrapper, config.clang] + compile_flags) + " "
|
2012-07-31 23:43:11 +08:00
|
|
|
|
2014-02-17 21:08:10 +08:00
|
|
|
config.substitutions.append( ("%clang ", build_invocation(target_cflags)) )
|
|
|
|
config.substitutions.append( ("%clangxx ", build_invocation(target_cxxflags)) )
|
|
|
|
config.substitutions.append( ("%clang_asan ", build_invocation(clang_asan_cflags)) )
|
|
|
|
config.substitutions.append( ("%clangxx_asan ", build_invocation(clang_asan_cxxflags)) )
|
2014-02-14 17:22:10 +08:00
|
|
|
|
2014-02-14 22:06:10 +08:00
|
|
|
# FIXME: De-hardcode this path.
|
|
|
|
asan_source_dir = os.path.join(
|
|
|
|
get_required_attr(config, "compiler_rt_src_root"), "lib", "asan")
|
2013-07-01 17:15:19 +08:00
|
|
|
# Setup path to asan_symbolize.py script.
|
|
|
|
asan_symbolize = os.path.join(asan_source_dir, "scripts", "asan_symbolize.py")
|
|
|
|
if not os.path.exists(asan_symbolize):
|
2013-08-10 06:14:01 +08:00
|
|
|
lit_config.fatal("Can't find script on path %r" % asan_symbolize)
|
2013-10-17 13:33:22 +08:00
|
|
|
python_exec = get_required_attr(config, "python_executable")
|
|
|
|
config.substitutions.append( ("%asan_symbolize", python_exec + " " + asan_symbolize + " ") )
|
2013-07-01 17:15:19 +08:00
|
|
|
|
2012-08-15 16:29:17 +08:00
|
|
|
# Define CHECK-%os to check for OS-dependent output.
|
|
|
|
config.substitutions.append( ('CHECK-%os', ("CHECK-" + config.host_os)))
|
|
|
|
|
2013-06-07 17:38:55 +08:00
|
|
|
config.available_features.add("asan-" + config.bits + "-bits")
|
|
|
|
|
2013-09-08 21:23:29 +08:00
|
|
|
# Turn on leak detection on 64-bit Linux.
|
|
|
|
if config.host_os == 'Linux' and config.bits == '64':
|
|
|
|
config.environment['ASAN_OPTIONS'] = 'detect_leaks=1'
|
|
|
|
|
2014-02-19 23:13:14 +08:00
|
|
|
# GCC-ASan uses dynamic runtime by default, so we have to set LD_LIBRARY_PATH
|
|
|
|
# to pick it up properly.
|
|
|
|
if config.compiler_id == 'GNU':
|
|
|
|
gcc_dir = os.path.dirname(config.clang)
|
|
|
|
libasan_dir = os.path.join(gcc_dir, "..", "lib" + config.bits)
|
|
|
|
new_ld_library_path = os.path.pathsep.join(
|
|
|
|
(libasan_dir, config.environment['LD_LIBRARY_PATH']))
|
|
|
|
config.environment['LD_LIBRARY_PATH'] = new_ld_library_path
|
|
|
|
|
2012-07-31 23:43:11 +08:00
|
|
|
# Default test suffixes.
|
|
|
|
config.suffixes = ['.c', '.cc', '.cpp']
|
2012-08-15 16:29:17 +08:00
|
|
|
|
|
|
|
# AddressSanitizer tests are currently supported on Linux and Darwin only.
|
|
|
|
if config.host_os not in ['Linux', 'Darwin']:
|
|
|
|
config.unsupported = True
|