Skip to content

Commit 63e001a

Browse files
committed
Auto merge of #138736 - azhogin:azhogin/sanitizers-target-modificators, r=rcvalle
Sanitizers target modificators Depends on bool flag fix: #138483. Some sanitizers need to be target modifiers, and some do not. For now, we should mark all sanitizers as target modifiers except for these: AddressSanitizer, LeakSanitizer For kCFI, the helper flag -Zsanitizer-cfi-normalize-integers should also be a target modifier. Many test errors was with sanizer flags inconsistent with std deps. Tests are fixed with `-C unsafe-allow-abi-mismatch`.
2 parents 7e552b4 + 280dfab commit 63e001a

File tree

69 files changed

+291
-8
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+291
-8
lines changed

compiler/rustc_metadata/src/creader.rs

+13-5
Original file line numberDiff line numberDiff line change
@@ -419,7 +419,7 @@ impl CStore {
419419
match (&left_name_val, &right_name_val) {
420420
(Some(l), Some(r)) => match l.1.opt.cmp(&r.1.opt) {
421421
cmp::Ordering::Equal => {
422-
if l.0.tech_value != r.0.tech_value {
422+
if !l.1.consistent(&tcx.sess.opts, Some(&r.1)) {
423423
report_diff(
424424
&l.0.prefix,
425425
&l.0.name,
@@ -431,20 +431,28 @@ impl CStore {
431431
right_name_val = None;
432432
}
433433
cmp::Ordering::Greater => {
434-
report_diff(&r.0.prefix, &r.0.name, None, Some(&r.1.value_name));
434+
if !r.1.consistent(&tcx.sess.opts, None) {
435+
report_diff(&r.0.prefix, &r.0.name, None, Some(&r.1.value_name));
436+
}
435437
right_name_val = None;
436438
}
437439
cmp::Ordering::Less => {
438-
report_diff(&l.0.prefix, &l.0.name, Some(&l.1.value_name), None);
440+
if !l.1.consistent(&tcx.sess.opts, None) {
441+
report_diff(&l.0.prefix, &l.0.name, Some(&l.1.value_name), None);
442+
}
439443
left_name_val = None;
440444
}
441445
},
442446
(Some(l), None) => {
443-
report_diff(&l.0.prefix, &l.0.name, Some(&l.1.value_name), None);
447+
if !l.1.consistent(&tcx.sess.opts, None) {
448+
report_diff(&l.0.prefix, &l.0.name, Some(&l.1.value_name), None);
449+
}
444450
left_name_val = None;
445451
}
446452
(None, Some(r)) => {
447-
report_diff(&r.0.prefix, &r.0.name, None, Some(&r.1.value_name));
453+
if !r.1.consistent(&tcx.sess.opts, None) {
454+
report_diff(&r.0.prefix, &r.0.name, None, Some(&r.1.value_name));
455+
}
448456
right_name_val = None;
449457
}
450458
(None, None) => break,

compiler/rustc_session/src/options.rs

+69-2
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,77 @@ pub struct TargetModifier {
8383
pub value_name: String,
8484
}
8585

86+
mod target_modifier_consistency_check {
87+
use super::*;
88+
pub(super) fn sanitizer(l: &TargetModifier, r: Option<&TargetModifier>) -> bool {
89+
let mut lparsed: SanitizerSet = Default::default();
90+
let lval = if l.value_name.is_empty() { None } else { Some(l.value_name.as_str()) };
91+
parse::parse_sanitizers(&mut lparsed, lval);
92+
93+
let mut rparsed: SanitizerSet = Default::default();
94+
let rval = r.filter(|v| !v.value_name.is_empty()).map(|v| v.value_name.as_str());
95+
parse::parse_sanitizers(&mut rparsed, rval);
96+
97+
// Some sanitizers need to be target modifiers, and some do not.
98+
// For now, we should mark all sanitizers as target modifiers except for these:
99+
// AddressSanitizer, LeakSanitizer
100+
let tmod_sanitizers = SanitizerSet::MEMORY
101+
| SanitizerSet::THREAD
102+
| SanitizerSet::HWADDRESS
103+
| SanitizerSet::CFI
104+
| SanitizerSet::MEMTAG
105+
| SanitizerSet::SHADOWCALLSTACK
106+
| SanitizerSet::KCFI
107+
| SanitizerSet::KERNELADDRESS
108+
| SanitizerSet::SAFESTACK
109+
| SanitizerSet::DATAFLOW;
110+
111+
lparsed & tmod_sanitizers == rparsed & tmod_sanitizers
112+
}
113+
pub(super) fn sanitizer_cfi_normalize_integers(
114+
opts: &Options,
115+
l: &TargetModifier,
116+
r: Option<&TargetModifier>,
117+
) -> bool {
118+
// For kCFI, the helper flag -Zsanitizer-cfi-normalize-integers should also be a target modifier
119+
if opts.unstable_opts.sanitizer.contains(SanitizerSet::KCFI) {
120+
if let Some(r) = r {
121+
return l.extend().tech_value == r.extend().tech_value;
122+
} else {
123+
return false;
124+
}
125+
}
126+
true
127+
}
128+
}
129+
86130
impl TargetModifier {
87131
pub fn extend(&self) -> ExtendedTargetModifierInfo {
88132
self.opt.reparse(&self.value_name)
89133
}
134+
// Custom consistency check for target modifiers (or default `l.tech_value == r.tech_value`)
135+
// When other is None, consistency with default value is checked
136+
pub fn consistent(&self, opts: &Options, other: Option<&TargetModifier>) -> bool {
137+
assert!(other.is_none() || self.opt == other.unwrap().opt);
138+
match self.opt {
139+
OptionsTargetModifiers::UnstableOptions(unstable) => match unstable {
140+
UnstableOptionsTargetModifiers::sanitizer => {
141+
return target_modifier_consistency_check::sanitizer(self, other);
142+
}
143+
UnstableOptionsTargetModifiers::sanitizer_cfi_normalize_integers => {
144+
return target_modifier_consistency_check::sanitizer_cfi_normalize_integers(
145+
opts, self, other,
146+
);
147+
}
148+
_ => {}
149+
},
150+
_ => {}
151+
};
152+
match other {
153+
Some(other) => self.extend().tech_value == other.extend().tech_value,
154+
None => false,
155+
}
156+
}
90157
}
91158

92159
fn tmod_push_impl(
@@ -2446,13 +2513,13 @@ options! {
24462513
remark_dir: Option<PathBuf> = (None, parse_opt_pathbuf, [UNTRACKED],
24472514
"directory into which to write optimization remarks (if not specified, they will be \
24482515
written to standard error output)"),
2449-
sanitizer: SanitizerSet = (SanitizerSet::empty(), parse_sanitizers, [TRACKED],
2516+
sanitizer: SanitizerSet = (SanitizerSet::empty(), parse_sanitizers, [TRACKED TARGET_MODIFIER],
24502517
"use a sanitizer"),
24512518
sanitizer_cfi_canonical_jump_tables: Option<bool> = (Some(true), parse_opt_bool, [TRACKED],
24522519
"enable canonical jump tables (default: yes)"),
24532520
sanitizer_cfi_generalize_pointers: Option<bool> = (None, parse_opt_bool, [TRACKED],
24542521
"enable generalizing pointer types (default: no)"),
2455-
sanitizer_cfi_normalize_integers: Option<bool> = (None, parse_opt_bool, [TRACKED],
2522+
sanitizer_cfi_normalize_integers: Option<bool> = (None, parse_opt_bool, [TRACKED TARGET_MODIFIER],
24562523
"enable normalizing integer types (default: no)"),
24572524
sanitizer_dataflow_abilist: Vec<String> = (Vec::new(), parse_comma_list, [TRACKED],
24582525
"additional ABI list files that control how shadow parameters are passed (comma separated)"),

tests/codegen/naked-asan.rs

+2
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@
44
//@ needs-sanitizer-address
55
//@ compile-flags: -Zsanitizer=address -Ctarget-feature=-crt-static
66

7+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
8+
79
#![crate_type = "lib"]
810
#![no_std]
911
#![feature(abi_x86_interrupt)]

tests/codegen/sanitizer/address-sanitizer-globals-tracking.rs

+1
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
//
2121
//@ revisions:ASAN ASAN-FAT-LTO
2222
//@ compile-flags: -Zsanitizer=address -Ctarget-feature=-crt-static
23+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
2324
//@[ASAN] compile-flags:
2425
//@[ASAN-FAT-LTO] compile-flags: -Cprefer-dynamic=false -Clto=fat
2526

tests/codegen/sanitizer/cfi/add-canonical-jump-tables-flag.rs

+2
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Ctarget-feature=-crt-static -Zsanitizer=cfi
55

6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
7+
68
#![crate_type = "lib"]
79

810
pub fn foo() {}

tests/codegen/sanitizer/cfi/add-cfi-normalize-integers-flag.rs

+2
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Ctarget-feature=-crt-static -Zsanitizer=cfi -Zsanitizer-cfi-normalize-integers
55

6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer,sanitizer-cfi-normalize-integers
7+
68
#![crate_type = "lib"]
79

810
pub fn foo() {}

tests/codegen/sanitizer/cfi/add-enable-split-lto-unit-flag.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Ctarget-feature=-crt-static -Zsanitizer=cfi
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/dbg-location-on-cfi-blocks.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static -Cdebuginfo=1
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/emit-type-checks-attr-no-sanitize.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Copt-level=0
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78
#![feature(no_sanitize)]

tests/codegen/sanitizer/cfi/emit-type-checks.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Copt-level=0
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/emit-type-metadata-attr-cfi-encoding.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Copt-level=0
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78
#![feature(cfi_encoding, extern_types)]

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-const-generics.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Copt-level=0
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89
#![feature(type_alias_impl_trait)]

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-drop-in-place.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-function-types.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-lifetimes.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Copt-level=0
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89
#![feature(type_alias_impl_trait)]

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-method-secondary-typeid.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-paths.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89
#![feature(type_alias_impl_trait)]

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-pointer-types.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-primitive-types.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-repr-transparent-types.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-sequence-types.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-trait-types.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89

tests/codegen/sanitizer/cfi/emit-type-metadata-id-itanium-cxx-abi-user-defined-types.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67

78
#![crate_type = "lib"]
89
#![feature(extern_types)]

tests/codegen/sanitizer/cfi/emit-type-metadata-itanium-cxx-abi-generalized.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Zsanitizer-cfi-generalize-pointers
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/emit-type-metadata-itanium-cxx-abi-normalized-generalized.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Zsanitizer-cfi-normalize-integers -Zsanitizer-cfi-generalize-pointers
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer,sanitizer-cfi-normalize-integers
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/emit-type-metadata-itanium-cxx-abi-normalized.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Zsanitizer-cfi-normalize-integers
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer,sanitizer-cfi-normalize-integers
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/emit-type-metadata-itanium-cxx-abi.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/emit-type-metadata-trait-objects.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Copt-level=0 -Ctarget-feature=-crt-static -Zsanitizer=cfi
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/external_weak_symbols.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
//
44
//@ needs-sanitizer-cfi
55
//@ compile-flags: -Clinker-plugin-lto -Copt-level=0 -Zsanitizer=cfi -Ctarget-feature=-crt-static
6+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
67
#![crate_type = "bin"]
78
#![feature(linkage)]
89

tests/codegen/sanitizer/cfi/generalize-pointers.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Zsanitizer-cfi-generalize-pointers -Copt-level=0
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/cfi/normalize-integers.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-cfi
44
//@ compile-flags: -Clto -Cno-prepopulate-passes -Ctarget-feature=-crt-static -Zsanitizer=cfi -Zsanitizer-cfi-normalize-integers -Copt-level=0
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer,sanitizer-cfi-normalize-integers
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/dataflow-instrument-functions.rs

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
//
33
//@ needs-sanitizer-dataflow
44
//@ compile-flags: -Copt-level=0 -Zsanitizer=dataflow
5+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
56

67
#![crate_type = "lib"]
78

tests/codegen/sanitizer/memory-track-origins.rs

+1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
//@ revisions:MSAN-0 MSAN-1 MSAN-2 MSAN-1-LTO MSAN-2-LTO
66
//
77
//@ compile-flags: -Zsanitizer=memory -Ctarget-feature=-crt-static
8+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
89
//@[MSAN-0] compile-flags:
910
//@[MSAN-1] compile-flags: -Zsanitizer-memory-track-origins=1
1011
//@[MSAN-2] compile-flags: -Zsanitizer-memory-track-origins

tests/codegen/sanitizer/no-sanitize-inlining.rs

+1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
//@ needs-sanitizer-leak
66
//@ revisions: ASAN LSAN
77
//@ compile-flags: -Copt-level=3 -Zmir-opt-level=4 -Ctarget-feature=-crt-static
8+
//@ compile-flags: -C unsafe-allow-abi-mismatch=sanitizer
89
//@[ASAN] compile-flags: -Zsanitizer=address
910
//@[LSAN] compile-flags: -Zsanitizer=leak
1011

0 commit comments

Comments
 (0)