取消gtest的地址消毒器的单位

问题描述 投票:1回答:1

我正在以我的单位运行地址消毒器。Cmake看起来像这样:

    cmake -G"Unix Makefiles" \
    -DCMAKE_CXX_COMPILER=clang++-9 \
    -DCMAKE_C_COMPILER=clang-9 \
    -DCMAKE_C_FLAGS='-fsanitize=address -fsanitize-address-use-after-scope' \
    -DCMAKE_CXX_FLAGS='-fsanitize=address -fsanitize-address-use-after-scope' \

正在运行的命令是

make clean
ASAN_OPTIONS=detect_stack_use_after_return=1 make a.out -j
ASAN_OPTIONS=detect_stack_use_after_return=1 LSAN_OPTIONS=verbosity=1 ./a.out

Unitest用gtest框架编写。

根据定义,有一些最合理的办法应该使非法访问数组边界之外。而且我想知道如何抑制这个测试

TEST_F(classA, testA) {
   some_struct a;
   a.p = 100;
   ASSERT_FALSE(&foo());
}

我在这里看到了抑制功能的选项,但我不知道如何将其应用于单一功能https://github.com/google/sanitizers/wiki/AddressSanitizer

#if defined(__clang__) || defined (__GNUC__)
# define ATTRIBUTE_NO_SANITIZE_ADDRESS __attribute__((no_sanitize_address))
#else
# define ATTRIBUTE_NO_SANITIZE_ADDRESS
#endif
...
ATTRIBUTE_NO_SANITIZE_ADDRESS
void ThisFunctionWillNotBeInstrumented() {...}
c clang googletest address-sanitizer
1个回答
0
投票

如何抑制此测试

最简单的方法可能是#ifdef

TEST_F(classA, testA) {
#if defined(__SANITIZE_ADDRESS__)
   std::cerr << "classA.testA skipped under AddressSanitizer" << std::endl;
#else
   some_struct a;
   a.p = 100;
   ASSERT_FALSE(&foo());
#endif
}

或者您可以#ifdef进行整个测试:

#if !defined(__SANITIZE_ADDRESS__)
TEST_F(classA, testA) {
   std::cerr << "classA.testA skipped under AddressSanitizer" << std::endl;
   some_struct a;
   a.p = 100;
   ASSERT_FALSE(&foo());
}
#endif
© www.soinside.com 2019 - 2024. All rights reserved.