blob: 3a81d10a300fb8032280bac88981906aa8a674bb [file] [log] [blame]
// Copyright 2025 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "./fuzztest/internal/sanitizer_interface.h"
#include <cstddef>
#include <string>
#include "absl/status/status.h"
#include "absl/status/statusor.h"
#include "absl/strings/str_cat.h"
#include "absl/strings/string_view.h"
#include "absl/strings/strip.h"
namespace fuzztest::internal {
absl::StatusOr<std::string> ParseCrashTypeFromSanitizerSummary(
absl::string_view error_summary) {
if (!absl::ConsumePrefix(&error_summary, "SUMMARY: ")) {
return absl::InvalidArgumentError(absl::StrCat(
"No `SUMMARY: ` prefix in sanitizer error summary: ", error_summary));
}
const size_t colon_pos = error_summary.find(": ");
if (colon_pos == error_summary.npos) {
return absl::InvalidArgumentError(absl::StrCat(
"No `: ` following the sanitizer name in sanitizer error summary: ",
error_summary));
}
error_summary.remove_prefix(colon_pos + 2);
// Explicitly handle summaries like:
// SUMMARY: AddressSanitizer: 1000 byte(s) leaked in 1000 allocation(s).
if (error_summary.find("byte(s) leaked") != error_summary.npos) {
return "memory-leak";
}
const size_t space_pos = error_summary.find(' ');
return std::string(error_summary.substr(0, space_pos));
}
} // namespace fuzztest::internal