1 // RUN: rm -rf %t.1 %t.2
2 // RUN: mkdir %t.1 %t.2
3 
4 // Build and use an ASan-enabled module.
5 // RUN: %clang_cc1 -fsanitize=address -fmodules -fmodules-cache-path=%t.1 \
6 // RUN:   -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
7 // RUN:   -I %S/Inputs/check-for-sanitizer-feature -verify %s
8 // RUN: ls %t.1 | count 2
9 
10 // Force a module rebuild by disabling ASan.
11 // RUN: %clang_cc1 -fmodules -fmodules-cache-path=%t.1 \
12 // RUN:   -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
13 // RUN:   -I %S/Inputs/check-for-sanitizer-feature -verify %s
14 // RUN: ls %t.1 | count 3
15 
16 // Enable ASan again: check that there is no import failure, and no rebuild.
17 // RUN: %clang_cc1 -fsanitize=address -fmodules -fmodules-cache-path=%t.1 \
18 // RUN:   -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
19 // RUN:   -I %S/Inputs/check-for-sanitizer-feature -verify %s
20 // RUN: ls %t.1 | count 3
21 
22 // Some sanitizers can not affect AST generation when enabled. Check that
23 // module rebuilds don't occur when these sanitizers are enabled.
24 //
25 // First, build without any sanitization.
26 // RUN: %clang_cc1 -fmodules -fmodules-cache-path=%t.2 \
27 // RUN:   -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
28 // RUN:   -I %S/Inputs/check-for-sanitizer-feature -verify %s
29 // RUN: ls %t.2 | count 2
30 //
31 // Next, build with sanitization, and check that a new module isn't built.
32 // RUN: %clang_cc1 -fsanitize=cfi-vcall,float-divide-by-zero,unsigned-integer-overflow,nullability-arg,null -fmodules \
33 // RUN:   -fmodules-cache-path=%t.2 \
34 // RUN:   -fmodule-map-file=%S/Inputs/check-for-sanitizer-feature/map \
35 // RUN:   -I %S/Inputs/check-for-sanitizer-feature -verify %s
36 // RUN: ls %t.2 | count 2
37 
38 // Finally, test that including enabled sanitizers in the module hash isn't
39 // required to ensure correctness of module imports.
40 //
41 // Emit a PCH with ASan enabled.
42 // RUN: %clang_cc1 -x c -fsanitize=address %S/Inputs/check-for-sanitizer-feature/check.h -emit-pch -o %t.asan_pch
43 //
44 // Import the PCH without ASan enabled (we expect an error).
45 // RUN: not %clang_cc1 -x c -include-pch %t.asan_pch %s -verify 2>&1 | FileCheck %s --check-prefix=PCH_MISMATCH
46 // PCH_MISMATCH: AST file was compiled with the target feature '-fsanitize=address' but the current translation unit is not
47 //
48 // Emit a PCH with UBSan enabled.
49 // RUN: %clang_cc1 -x c -fsanitize=null %S/Inputs/check-for-sanitizer-feature/check.h -emit-pch -o %t.ubsan_pch
50 //
51 // Import the PCH without UBSan enabled (should work just fine).
52 // RUN: %clang_cc1 -x c -include-pch %t.ubsan_pch %s -I %S/Inputs/check-for-sanitizer-feature -verify
53 
54 #include "check.h"
55 
56 #if __has_feature(address_sanitizer)
57 #if HAS_ASAN != 1
58 #error Module doesn't have the address_sanitizer feature, but main program does.
59 #endif
60 #else
61 #if HAS_ASAN != 0
62 #error Module has the address_sanitizer feature, but main program doesn't.
63 #endif
64 #endif
65 
66 // expected-no-diagnostics
67