Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add memory sanitizer CI #2254

Merged
merged 5 commits into from
Jan 22, 2025
Merged
Show file tree
Hide file tree
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
119 changes: 119 additions & 0 deletions .github/workflows/ci-unix-static-sanitized-memory.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,119 @@
# Memory sanitizer needs to be in its own file because it is slower than other sanitizers.
name: CI Unix Static Sanitized Memory
on:
push:
pull_request:
paths:
- ".github/actions/**"
- ".github/workflows/ci-unix-static-sanitized-memory.yml"

permissions:
contents: read

jobs:
build-static-sanitized-memory:
runs-on: ubuntu-latest

env:
CC: clang
CXX: clang++

steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- uses: ./.github/actions/setup-linux
if: runner.os == 'Linux'
id: setup_linux
with:
codec-aom: "LOCAL"
codec-dav1d: "LOCAL"
libyuv: "LOCAL"
extra-cache-key: memory
- uses: ./.github/actions/setup-macos
vrabaud marked this conversation as resolved.
Show resolved Hide resolved
if: runner.os == 'macOS'
id: setup_macos
with:
codec-aom: "LOCAL"
codec-dav1d: "LOCAL"
extra-cache-key: memory
- id: cache-hit
run: echo "hit=${{ (runner.os == 'Linux' && steps.setup_linux.outputs.ext-cache-hit == 'true') || (runner.os == 'macOS' && steps.setup_macos.outputs.ext-cache-hit == 'true') }}" >> "$GITHUB_OUTPUT"

- name: Build cxx and cxxabi
run: |
# clone LLVM
git clone --depth=1 --branch llvmorg-19.1.6 https://github.com/llvm/llvm-project
vrabaud marked this conversation as resolved.
Show resolved Hide resolved
# configure cmake
cmake -G Ninja -S llvm-project/runtimes -B llvm-project/msan_out \
-DCMAKE_BUILD_TYPE=Release \
-DLLVM_ENABLE_RUNTIMES="libcxx;libcxxabi;libunwind" \
-DCMAKE_C_COMPILER=clang \
-DCMAKE_CXX_COMPILER=clang++ \
-DLLVM_USE_SANITIZER=MemoryWithOrigins \
-DLIBCXXABI_USE_LLVM_UNWINDER=OFF
# build the libraries
cmake --build llvm-project/msan_out -- cxx cxxabi unwind
- name: Set FLAGS for memory sanitizer
run: |
echo "CI_CFLAGS=-fsanitize=memory -L${{ github.workspace }}/llvm-project/msan_out/lib -I${{ github.workspace }}/llvm-project/msan_out/include" >> $GITHUB_ENV
echo "CI_CXXFLAGS=-fsanitize=memory -stdlib=libc++ -L${{ github.workspace }}/llvm-project/msan_out/lib -I${{ github.workspace }}/llvm-project/msan_out/include -I${{ github.workspace }}/llvm-project/msan_out/include/c++/v1" >> $GITHUB_ENV
echo "CI_LDFLAGS=-fsanitize=memory -L${{ github.workspace }}/llvm-project/msan_out/lib -lc++abi" >> $GITHUB_ENV
echo "CI_LD_LIBRARY_PATH=$LD_LIBRARY_PATH:${{ github.workspace }}/llvm-project/msan_out/lib" >> $GITHUB_ENV

- name: Build jpeg
if: ${{ steps.cache-hit.outputs.hit == 'false' }}
working-directory: ./ext
run: |
sed -i -e 's/cmake -S \(.*\)/cmake -S \1 -DWITH_SIMD=OFF/g' libjpeg.cmd
./libjpeg.cmd
env:
CFLAGS: ${{ env.CI_CFLAGS }}
CXXFLAGS: ${{ env.CI_CXXFLAGS }}
LDFLAGS: ${{ env.CI_LDFLAGS }}
LD_LIBRARY_PATH: ${{ env.CI_LD_LIBRARY_PATH }}

- name: Build aom
if: ${{ steps.cache-hit.outputs.hit == 'false' }}
working-directory: ./ext
run: |
sed -i -e 's/cmake -G Ninja \(.*\) \.\./cmake -G Ninja \1 -DAOM_TARGET_CPU=generic -DSANITIZE=memory ../g' aom.cmd
./aom.cmd
env:
CFLAGS: ${{ env.CI_CFLAGS }}
CXXFLAGS: ${{ env.CI_CXXFLAGS }}
LDFLAGS: ${{ env.CI_LDFLAGS }}
LD_LIBRARY_PATH: ${{ env.CI_LD_LIBRARY_PATH }}

- name: Build dav1d
if: ${{ steps.cache-hit.outputs.hit == 'false' }}
working-directory: ./ext
run: |
sed -i -e 's/meson setup \(.*\) \.\./meson setup \1 -Db_sanitize=memory -Db_lundef=false -Denable_asm=false ../g' dav1d.cmd
./dav1d.cmd
env:
CFLAGS: ${{ env.CI_CFLAGS }}
CXXFLAGS: ${{ env.CI_CXXFLAGS }}
LIBRARY_PATH: ${{ env.CI_LD_LIBRARY_PATH }}

- name: Prepare libavif (cmake)
run: >
cmake -S . -B build -G Ninja
-DCMAKE_BUILD_TYPE=Debug -DBUILD_SHARED_LIBS=OFF
vrabaud marked this conversation as resolved.
Show resolved Hide resolved
-DAVIF_CODEC_AOM=LOCAL -DAVIF_CODEC_DAV1D=LOCAL
-DAVIF_JPEG=LOCAL -DAVIF_LIBSHARPYUV=LOCAL
-DAVIF_LIBYUV=LOCAL -DAVIF_ZLIBPNG=LOCAL
-DAVIF_BUILD_EXAMPLES=ON -DAVIF_BUILD_APPS=ON
-DAVIF_BUILD_TESTS=ON -DAVIF_GTEST=LOCAL
env:
CFLAGS: ${{ env.CI_CFLAGS }}
CXXFLAGS: ${{ env.CI_CXXFLAGS }}
LDFLAGS: ${{ env.CI_LDFLAGS }}
- name: Build libavif (ninja)
working-directory: ./build
run: ninja
- name: Run AVIF Tests
working-directory: ./build
run: ctest -j $(getconf _NPROCESSORS_ONLN) --output-on-failure
env:
ASAN_OPTIONS: allocator_may_return_null=1
TSAN_OPTIONS: allocator_may_return_null=1
vrabaud marked this conversation as resolved.
Show resolved Hide resolved
LD_LIBRARY_PATH: ${{ env.CI_LD_LIBRARY_PATH }}
2 changes: 1 addition & 1 deletion .github/workflows/ci-unix-static-sanitized.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ jobs:
fail-fast: false
matrix:
os: [ubuntu-latest, macos-latest]
sanitizer: [address, thread, undefined] # TODO(yguyon): Add memory
sanitizer: [address, thread, undefined]
vrabaud marked this conversation as resolved.
Show resolved Hide resolved

env:
CC: clang
Expand Down
12 changes: 12 additions & 0 deletions tests/gtest/avifallocationtest.cc
Original file line number Diff line number Diff line change
Expand Up @@ -188,13 +188,25 @@ TEST(EncodingTest, MaximumInvalidDimensions) {
AVIF_RESULT_UNSUPPORTED_DEPTH);
}

#if defined(__clang__) && defined(__has_feature)
vrabaud marked this conversation as resolved.
Show resolved Hide resolved
#if __has_feature(memory_sanitizer)
#define TEST_EXTREMES 0
#else
#define TEST_EXTREMES 1
#endif
#else
#define TEST_EXTREMES 1
#endif

#if TEST_EXTREMES
TEST(AvifAllocTest, Extremes) {
void* p1 = avifAlloc(1);
EXPECT_NE(p1, nullptr);
avifFree(p1);

EXPECT_EQ(avifAlloc(std::numeric_limits<size_t>::max()), nullptr);
}
#endif

} // namespace
} // namespace avif
Loading