initialization-blacklist.cpp
1.24 KB
// Test for blacklist functionality of initialization-order checker.
// RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cpp\
// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \
// RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
// RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cpp\
// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \
// RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
// RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cpp\
// RUN: %p/Helpers/initialization-blacklist-extra2.cpp \
// RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt -o %t
// RUN: %env_asan_opts=check_initialization_order=true %run %t 2>&1
// Function is defined in another TU.
int readBadGlobal();
int x = readBadGlobal(); // init-order bug.
// Function is defined in another TU.
int accessBadObject();
int y = accessBadObject(); // init-order bug.
int readBadSrcGlobal();
int z = readBadSrcGlobal(); // init-order bug.
int main(int argc, char **argv) {
return argc + x + y + z - 1;
}