| 1 | // Check that __asan_poison_memory_region and ASAN_OPTIONS=poison_history_size work. |
| 2 | // |
| 3 | // Poisoned access with history |
| 4 | // RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t 2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-ABC,CHECK-AC,CHECK-A |
| 5 | // |
| 6 | // Not poisoned access |
| 7 | // RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 %run %t 20 2>&1 | FileCheck %s --check-prefixes=CHECK-ABC,CHECK-B,CHECK-BDE |
| 8 | // |
| 9 | // Poisoned access with history (different stack trace) |
| 10 | // RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-ABC,CHECK-AC,CHECK-C |
| 11 | // |
| 12 | // Poisoned access without history |
| 13 | // RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-BDE,CHECK-D |
| 14 | // RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=0 not %run %t 2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-BDE,CHECK-D |
| 15 | |
| 16 | // Poisoned access with insufficient history |
| 17 | // RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1 not %run %t 2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-BDE,CHECK-E |
| 18 | |
| 19 | // TODO |
| 20 | // REQUIRES: linux |
| 21 | // UNSUPPORTED: android |
| 22 | |
| 23 | #include <stdio.h> |
| 24 | #include <stdlib.h> |
| 25 | |
| 26 | extern "C" void __asan_poison_memory_region(void *, size_t); |
| 27 | extern "C" void __asan_unpoison_memory_region(void *, size_t); |
| 28 | |
| 29 | void honey_ive_poisoned_the_memory(char *x) { |
| 30 | __asan_poison_memory_region(x, 64); // A |
| 31 | __asan_unpoison_memory_region(x + 16, 8); // B |
| 32 | __asan_poison_memory_region(x + 24, 16); // C |
| 33 | } |
| 34 | |
| 35 | void foo(char *x) { honey_ive_poisoned_the_memory(x); } |
| 36 | |
| 37 | int main(int argc, char **argv) { |
| 38 | char *x = new char[64]; |
| 39 | x[10] = 0; |
| 40 | foo(x); |
| 41 | // Bytes [ 0, 15]: poisoned by A |
| 42 | // Bytes [16, 23]: unpoisoned by B |
| 43 | // Bytes [24, 63]: poisoned by C |
| 44 | |
| 45 | int res = x[argc * 10]; // BOOOM |
| 46 | // CHECK-ACDE: ERROR: AddressSanitizer: use-after-poison |
| 47 | // CHECK-ACDE: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-2]] |
| 48 | // CHECK-B-NOT: ERROR: AddressSanitizer: use-after-poison |
| 49 | // CHECK-ABC-NOT: try the experimental setting ASAN_OPTIONS=poison_history_size= |
| 50 | // CHECK-D: try the experimental setting ASAN_OPTIONS=poison_history_size= |
| 51 | |
| 52 | // CHECK-AC: Memory was manually poisoned by thread T0: |
| 53 | // CHECK-A: honey_ive_poisoned_the_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-23]] |
| 54 | // CHECK-C: honey_ive_poisoned_the_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-22]] |
| 55 | // CHECK-AC: foo{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]] |
| 56 | // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-16]] |
| 57 | // CHECK-BDE-NOT: Memory was manually poisoned by thread T0: |
| 58 | |
| 59 | // CHECK-ABC-NOT: Try a larger value for ASAN_OPTIONS=poison_history_size= |
| 60 | // CHECK-D-NOT: Try a larger value for ASAN_OPTIONS=poison_history_size= |
| 61 | // CHECK-E: Try a larger value for ASAN_OPTIONS=poison_history_size= |
| 62 | |
| 63 | delete[] x; |
| 64 | |
| 65 | printf(format: "End of program reached\n" ); |
| 66 | // CHECK-B: End of program reached |
| 67 | |
| 68 | return 0; |
| 69 | } |
| 70 | |