我正在以我的单位运行地址消毒器。Cmake看起来像这样:
cmake -G"Unix Makefiles" \
-DCMAKE_CXX_COMPILER=clang++-9 \
-DCMAKE_C_COMPILER=clang-9 \
-DCMAKE_C_FLAGS='-fsanitize=address -fsanitize-address-use-after-scope' \
-DCMAKE_CXX_FLAGS='-fsanitize=address -fsanitize-address-use-after-scope' \
正在运行的命令是
make clean
ASAN_OPTIONS=detect_stack_use_after_return=1 make a.out -j
ASAN_OPTIONS=detect_stack_use_after_return=1 LSAN_OPTIONS=verbosity=1 ./a.out
Unitest用gtest框架编写。
根据定义,有一些最合理的办法应该使非法访问数组边界之外。而且我想知道如何抑制这个测试
TEST_F(classA, testA) {
some_struct a;
a.p = 100;
ASSERT_FALSE(&foo());
}
我在这里看到了抑制功能的选项,但我不知道如何将其应用于单一功能https://github.com/google/sanitizers/wiki/AddressSanitizer
#if defined(__clang__) || defined (__GNUC__)
# define ATTRIBUTE_NO_SANITIZE_ADDRESS __attribute__((no_sanitize_address))
#else
# define ATTRIBUTE_NO_SANITIZE_ADDRESS
#endif
...
ATTRIBUTE_NO_SANITIZE_ADDRESS
void ThisFunctionWillNotBeInstrumented() {...}
如何抑制此测试
最简单的方法可能是#ifdef
:
TEST_F(classA, testA) {
#if defined(__SANITIZE_ADDRESS__)
std::cerr << "classA.testA skipped under AddressSanitizer" << std::endl;
#else
some_struct a;
a.p = 100;
ASSERT_FALSE(&foo());
#endif
}
或者您可以#ifdef
进行整个测试:
#if !defined(__SANITIZE_ADDRESS__)
TEST_F(classA, testA) {
std::cerr << "classA.testA skipped under AddressSanitizer" << std::endl;
some_struct a;
a.p = 100;
ASSERT_FALSE(&foo());
}
#endif