1 // Test how we produce the scariness score.
4 // Case 26 loads a __asan_poison_memory_region-poisoned local variable, which is
5 // only instrumented when StackSafetyAnalysis is disabled.
6 // RUN: %clangxx_asan -O0 -mllvm -asan-use-stack-safety=0 %s -o %t
7 // On OSX and Windows, alloc_dealloc_mismatch=1 isn't 100% reliable, so it's
8 // off by default. It's safe for these tests, though, so we turn it on.
9 // RUN: export %env_asan_opts=symbolize=0:detect_stack_use_after_return=1:handle_abort=1:print_scariness=1:alloc_dealloc_mismatch=1
10 // Make sure the stack is limited (may not be the default under GNU make)
11 // RUN: ulimit -s 4096
12 // RUN: not %run %t 1 2>&1 | FileCheck %s --check-prefix=CHECK1
13 // RUN: not %run %t 2 2>&1 | FileCheck %s --check-prefix=CHECK2
14 // RUN: not %run %t 3 2>&1 | FileCheck %s --check-prefix=CHECK3
15 // RUN: not %run %t 4 2>&1 | FileCheck %s --check-prefix=CHECK4
16 // RUN: not %run %t 5 2>&1 | FileCheck %s --check-prefix=CHECK5
17 // RUN: not %run %t 6 2>&1 | FileCheck %s --check-prefix=CHECK6
18 // RUN: not %run %t 7 2>&1 | FileCheck %s --check-prefix=CHECK7
19 // RUN: not %run %t 8 2>&1 | FileCheck %s --check-prefix=CHECK8
20 // RUN: not %run %t 9 2>&1 | FileCheck %s --check-prefix=CHECK9
21 // RUN: not %run %t 10 2>&1 | FileCheck %s --check-prefix=CHECK10
22 // RUN: not %run %t 11 2>&1 | FileCheck %s --check-prefix=CHECK11
23 // RUN: not %run %t 12 2>&1 | FileCheck %s --check-prefix=CHECK12
24 // RUN: not %run %t 13 2>&1 | FileCheck %s --check-prefix=CHECK13
25 // RUN: not %run %t 14 2>&1 | FileCheck %s --check-prefix=CHECK14
26 // RUN: not %run %t 15 2>&1 | FileCheck %s --check-prefix=CHECK15
27 // RUN: not %run %t 16 2>&1 | FileCheck %s --check-prefix=CHECK16
28 // RUN: not %run %t 17 2>&1 | FileCheck %s --check-prefix=CHECK17
29 // RUN: not %run %t 18 2>&1 | FileCheck %s --check-prefix=CHECK18
30 // RUN: not %run %t 19 2>&1 | FileCheck %s --check-prefix=CHECK19
31 // RUN: not %run %t 20 2>&1 | FileCheck %s --check-prefix=CHECK20
32 // RUN: not %run %t 21 2>&1 | FileCheck %s --check-prefix=CHECK21
33 // RUN: not %run %t 22 2>&1 | FileCheck %s --check-prefix=CHECK22
34 // RUN: not %run %t 23 2>&1 | FileCheck %s --check-prefix=CHECK23
35 // RUN: not %run %t 24 2>&1 | FileCheck %s --check-prefix=CHECK24
36 // RUN: not %run %t 25 2>&1 | FileCheck %s --check-prefix=CHECK25
37 // RUN: not %run %t 26 2>&1 | FileCheck %s --check-prefix=CHECK26
38 // RUN: not %run %t 27 2>&1 | FileCheck %s --check-prefix=CHECK27
41 // RUN: %clangxx_asan -O0 %s -o %t -fsanitize-address-use-after-return=always -mllvm -asan-use-stack-safety=0
42 // On OSX and Windows, alloc_dealloc_mismatch=1 isn't 100% reliable, so it's
43 // off by default. It's safe for these tests, though, so we turn it on.
44 // RUN: export %env_asan_opts=symbolize=0:handle_abort=1:print_scariness=1:alloc_dealloc_mismatch=1
45 // Make sure the stack is limited (may not be the default under GNU make)
46 // RUN: ulimit -s 4096
47 // RUN: not %run %t 1 2>&1 | FileCheck %s --check-prefix=CHECK1
48 // RUN: not %run %t 2 2>&1 | FileCheck %s --check-prefix=CHECK2
49 // RUN: not %run %t 3 2>&1 | FileCheck %s --check-prefix=CHECK3
50 // RUN: not %run %t 4 2>&1 | FileCheck %s --check-prefix=CHECK4
51 // RUN: not %run %t 5 2>&1 | FileCheck %s --check-prefix=CHECK5
52 // RUN: not %run %t 6 2>&1 | FileCheck %s --check-prefix=CHECK6
53 // RUN: not %run %t 7 2>&1 | FileCheck %s --check-prefix=CHECK7
54 // RUN: not %run %t 8 2>&1 | FileCheck %s --check-prefix=CHECK8
55 // RUN: not %run %t 9 2>&1 | FileCheck %s --check-prefix=CHECK9
56 // RUN: not %run %t 10 2>&1 | FileCheck %s --check-prefix=CHECK10
57 // RUN: not %run %t 11 2>&1 | FileCheck %s --check-prefix=CHECK11
58 // RUN: not %run %t 12 2>&1 | FileCheck %s --check-prefix=CHECK12
59 // RUN: not %run %t 13 2>&1 | FileCheck %s --check-prefix=CHECK13
60 // RUN: not %run %t 14 2>&1 | FileCheck %s --check-prefix=CHECK14
61 // RUN: not %run %t 15 2>&1 | FileCheck %s --check-prefix=CHECK15
62 // RUN: not %run %t 16 2>&1 | FileCheck %s --check-prefix=CHECK16
63 // RUN: not %run %t 17 2>&1 | FileCheck %s --check-prefix=CHECK17
64 // RUN: not %run %t 18 2>&1 | FileCheck %s --check-prefix=CHECK18
65 // RUN: not %run %t 19 2>&1 | FileCheck %s --check-prefix=CHECK19
66 // RUN: not %run %t 20 2>&1 | FileCheck %s --check-prefix=CHECK20
67 // RUN: not %run %t 21 2>&1 | FileCheck %s --check-prefix=CHECK21
68 // RUN: not %run %t 22 2>&1 | FileCheck %s --check-prefix=CHECK22
69 // RUN: not %run %t 23 2>&1 | FileCheck %s --check-prefix=CHECK23
70 // RUN: not %run %t 24 2>&1 | FileCheck %s --check-prefix=CHECK24
71 // RUN: not %run %t 25 2>&1 | FileCheck %s --check-prefix=CHECK25
72 // RUN: not %run %t 26 2>&1 | FileCheck %s --check-prefix=CHECK26
73 // RUN: not %run %t 27 2>&1 | FileCheck %s --check-prefix=CHECK27
74 // Parts of the test are too platform-specific:
75 // REQUIRES: x86_64-target-arch
82 #include <sanitizer/asan_interface.h>
84 enum ReadOrWrite
{ Read
= 0, Write
= 1 };
91 void HeapBuferOverflow(int Idx
, ReadOrWrite w
) {
102 void HeapUseAfterFree(int Idx
, ReadOrWrite w
) {
114 void StackBufferOverflow(int Idx
, ReadOrWrite w
) {
127 static volatile T
*x
;
133 void StackUseAfterReturn(int Idx
, ReadOrWrite w
) {
135 T
*t
= LeakStack
<T
>();
150 static volatile int two
= 2;
151 for (int i
= 0; i
< two
; i
++)
155 void StackOverflow(int Idx
) {
157 static volatile int *x
;
160 StackOverflow(Idx
- 1);
163 void UseAfterPoison() {
165 __asan_poison_memory_region(buf
, sizeof(buf
));
166 static volatile int sink
;
170 int main(int argc
, char **argv
) {
173 __asan_get_shadow_mapping(&scale
, &offset
);
174 size_t grain
= 1 << scale
;
177 static volatile int zero
= 0;
178 static volatile int *zero_ptr
= 0;
179 static volatile int *wild_addr
= (int*)0x10000000; // System-dependent.
180 if (argc
!= 2) return 1;
181 int kind
= atoi(argv
[1]);
183 case 1: HeapBuferOverflow
<char>(0, Read
); break;
184 case 2: HeapBuferOverflow
<int>(0, Read
); break;
185 case 3: HeapBuferOverflow
<short>(0, Write
); break;
186 case 4: HeapBuferOverflow
<int64_t>(
187 2 * std::max(1, (int)(grain
/ sizeof(int64_t))), Write
); break;
188 case 5: HeapBuferOverflow
<S32
>(4, Write
); break;
189 case 6: HeapUseAfterFree
<char>(0, Read
); break;
190 case 7: HeapUseAfterFree
<int>(0, Write
); break;
191 case 8: HeapUseAfterFree
<int64_t>(0, Read
); break;
192 case 9: HeapUseAfterFree
<S32
>(0, Write
); break;
193 case 10: StackBufferOverflow
<char>(0, Write
); break;
194 case 11: StackBufferOverflow
<int64_t>(0, Read
); break;
197 StackBufferOverflow
<int>(16, Write
);
199 // At large shadow granularity, there is not enough redzone
200 // between stack elements to detect far-from-bounds. Pretend
201 // that this test passes.
202 fprintf(stderr
, "SCARINESS: 61 "
203 "(4-byte-write-stack-buffer-overflow-far-from-bounds)\n");
207 case 13: StackUseAfterReturn
<char>(0, Read
); break;
208 case 14: StackUseAfterReturn
<S32
>(0, Write
); break;
209 case 15: g1
[zero
+ 100] = 0; break;
210 case 16: gm
[0] = gm
[zero
+ 100 + 1]; break;
211 case 17: DoubleFree(); break;
212 case 18: StackOverflow(1000000); break;
213 case 19: *zero_ptr
= 0; break;
214 case 20: *wild_addr
= 0; break;
215 case 21: zero
= *wild_addr
; break;
216 case 22: ((void (*)(void))wild_addr
)(); break;
217 case 23: delete (new int[10]); break;
218 case 24: free((char*)malloc(100) + 10); break;
219 case 25: memcpy(arr
, arr
+10, 20); break;
220 case 26: UseAfterPoison(); break;
222 // CHECK1: SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
223 // CHECK2: SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
224 // CHECK3: SCARINESS: 33 (2-byte-write-heap-buffer-overflow)
225 // CHECK4: SCARINESS: 52 (8-byte-write-heap-buffer-overflow-far-from-bounds)
226 // CHECK5: SCARINESS: 55 (multi-byte-write-heap-buffer-overflow-far-from-bounds)
227 // CHECK6: SCARINESS: 40 (1-byte-read-heap-use-after-free)
228 // CHECK7: SCARINESS: 46 (4-byte-write-heap-use-after-free)
229 // CHECK8: SCARINESS: 51 (8-byte-read-heap-use-after-free)
230 // CHECK9: SCARINESS: 55 (multi-byte-write-heap-use-after-free)
231 // CHECK10: SCARINESS: 46 (1-byte-write-stack-buffer-overflow)
232 // CHECK11: SCARINESS: 38 (8-byte-read-stack-buffer-overflow)
233 // CHECK12: SCARINESS: 61 (4-byte-write-stack-buffer-overflow-far-from-bounds)
234 // CHECK13: SCARINESS: 50 (1-byte-read-stack-use-after-return)
235 // CHECK14: SCARINESS: 65 (multi-byte-write-stack-use-after-return)
236 // CHECK15: SCARINESS: 31 (1-byte-write-global-buffer-overflow)
237 // CHECK16: SCARINESS: 36 (multi-byte-read-global-buffer-overflow-far-from-bounds)
238 // CHECK17: SCARINESS: 42 (double-free)
239 // CHECK18: SCARINESS: 10 (stack-overflow)
240 // CHECK19: SCARINESS: 10 (null-deref)
241 // CHECK20: SCARINESS: 30 (wild-addr-write)
242 // CHECK21: SCARINESS: 20 (wild-addr-read)
243 // CHECK22: SCARINESS: 60 (wild-jump)
244 // CHECK23: SCARINESS: 10 (alloc-dealloc-mismatch)
245 // CHECK24: SCARINESS: 40 (bad-free)
246 // CHECK25: SCARINESS: 10 (memcpy-param-overlap)
247 // CHECK26: SCARINESS: 27 (4-byte-read-use-after-poison)
248 // CHECK27: SCARINESS: 10 (signal)