This reapplies 8fa66c6ca7 ([asan][windows]
Eliminate the static asan runtime on windows) for a second time.
That PR bounced off the tests because it caused failures in the other
sanitizer runtimes, these have been fixed by only building interception,
sanitizer_common, and asan with /MD, and continuing to build the rest of
the runtimes with /MT. This does mean that any usage of the static
ubsan/fuzzer/etc runtimes will mean you're mixing different runtime
library linkages in the same app, the interception, sanitizer_common,
and asan runtimes are designed for this, however it does result in some
linker warnings.
Additionally, it turns out when building in release-mode with
LLVM_ENABLE_PDBs the build system forced /OPT:ICF. This totally breaks
asan's "new" method of doing "weak" functions on windows, and so
/OPT:NOICF was explicitly added to asan's link flags.
---------
Co-authored-by: Amy Wishnousky <amyw@microsoft.com>
72 lines
2.2 KiB
C++
72 lines
2.2 KiB
C++
// Checks that the ASan debugging API for getting report information
|
|
// returns correct values.
|
|
// RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
|
|
|
|
#include <sanitizer/asan_interface.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
int main() {
|
|
// Disable stderr buffering. Needed on Windows.
|
|
setvbuf(stderr, NULL, _IONBF, 0);
|
|
|
|
char *heap_ptr = (char *)malloc(10);
|
|
free(heap_ptr);
|
|
int present = __asan_report_present();
|
|
fprintf(stderr, "%s\n", (present == 0) ? "no report" : "");
|
|
// CHECK: no report
|
|
heap_ptr[0] = 'A'; // BOOM
|
|
return 0;
|
|
}
|
|
|
|
// If we use %p with MS CRTs, it comes out all upper case. Use %08x to get
|
|
// lowercase hex.
|
|
#ifdef _WIN32
|
|
# ifdef _WIN64
|
|
# define PTR_FMT "0x%08llx"
|
|
# else
|
|
# define PTR_FMT "0x%08x"
|
|
# endif
|
|
// Solaris libc omits the leading 0x.
|
|
#elif defined(__sun__) && defined(__svr4__)
|
|
# define PTR_FMT "0x%p"
|
|
#else
|
|
# define PTR_FMT "%p"
|
|
#endif
|
|
|
|
// Required for dyld macOS 12.0+
|
|
#if (__APPLE__)
|
|
__attribute__((weak))
|
|
#endif
|
|
extern "C" void
|
|
__asan_on_error() {
|
|
int present = __asan_report_present();
|
|
void *pc = __asan_get_report_pc();
|
|
void *bp = __asan_get_report_bp();
|
|
void *sp = __asan_get_report_sp();
|
|
void *addr = __asan_get_report_address();
|
|
int is_write = __asan_get_report_access_type();
|
|
size_t access_size = __asan_get_report_access_size();
|
|
const char *description = __asan_get_report_description();
|
|
|
|
fprintf(stderr, "%s\n", (present == 1) ? "report" : "");
|
|
// CHECK: report
|
|
fprintf(stderr, "pc: " PTR_FMT "\n", pc);
|
|
// CHECK: pc: 0x[[PC:[0-9a-f]+]]
|
|
fprintf(stderr, "bp: " PTR_FMT "\n", bp);
|
|
// CHECK: bp: 0x[[BP:[0-9a-f]+]]
|
|
fprintf(stderr, "sp: " PTR_FMT "\n", sp);
|
|
// CHECK: sp: 0x[[SP:[0-9a-f]+]]
|
|
fprintf(stderr, "addr: " PTR_FMT "\n", addr);
|
|
// CHECK: addr: 0x[[ADDR:[0-9a-f]+]]
|
|
fprintf(stderr, "type: %s\n", (is_write ? "write" : "read"));
|
|
// CHECK: type: write
|
|
fprintf(stderr, "access_size: %ld\n", access_size);
|
|
// CHECK: access_size: 1
|
|
fprintf(stderr, "description: %s\n", description);
|
|
// CHECK: description: heap-use-after-free
|
|
}
|
|
|
|
// CHECK: AddressSanitizer: heap-use-after-free on address {{0x0*}}[[ADDR]] at pc {{0x0*}}[[PC]] bp {{0x0*}}[[BP]] sp {{0x0*}}[[SP]]
|
|
// CHECK: WRITE of size 1 at {{0x0*}}[[ADDR]] thread T0
|