Home | History | Annotate | Download | only in Linux
      1 // Test how we produce the scariness score.
      2 
      3 // RUN: %clangxx_asan -O0 %s -o %t
      4 // RUN: export %env_asan_opts=detect_stack_use_after_return=1:handle_abort=1:print_scariness=1
      5 // Make sure the stack is limited (may not be the default under GNU make)
      6 // RUN: ulimit -s 4096
      7 // RUN: not %run %t  1 2>&1 | FileCheck %s --check-prefix=CHECK1
      8 // RUN: not %run %t  2 2>&1 | FileCheck %s --check-prefix=CHECK2
      9 // RUN: not %run %t  3 2>&1 | FileCheck %s --check-prefix=CHECK3
     10 // RUN: not %run %t  4 2>&1 | FileCheck %s --check-prefix=CHECK4
     11 // RUN: not %run %t  5 2>&1 | FileCheck %s --check-prefix=CHECK5
     12 // RUN: not %run %t  6 2>&1 | FileCheck %s --check-prefix=CHECK6
     13 // RUN: not %run %t  7 2>&1 | FileCheck %s --check-prefix=CHECK7
     14 // RUN: not %run %t  8 2>&1 | FileCheck %s --check-prefix=CHECK8
     15 // RUN: not %run %t  9 2>&1 | FileCheck %s --check-prefix=CHECK9
     16 // RUN: not %run %t 10 2>&1 | FileCheck %s --check-prefix=CHECK10
     17 // RUN: not %run %t 11 2>&1 | FileCheck %s --check-prefix=CHECK11
     18 // RUN: not %run %t 12 2>&1 | FileCheck %s --check-prefix=CHECK12
     19 // RUN: not %run %t 13 2>&1 | FileCheck %s --check-prefix=CHECK13
     20 // RUN: not %run %t 14 2>&1 | FileCheck %s --check-prefix=CHECK14
     21 // RUN: not %run %t 15 2>&1 | FileCheck %s --check-prefix=CHECK15
     22 // RUN: not %run %t 16 2>&1 | FileCheck %s --check-prefix=CHECK16
     23 // RUN: not %run %t 17 2>&1 | FileCheck %s --check-prefix=CHECK17
     24 // RUN: not %run %t 18 2>&1 | FileCheck %s --check-prefix=CHECK18
     25 // RUN: not %run %t 19 2>&1 | FileCheck %s --check-prefix=CHECK19
     26 // RUN: not %run %t 20 2>&1 | FileCheck %s --check-prefix=CHECK20
     27 // RUN: not %run %t 21 2>&1 | FileCheck %s --check-prefix=CHECK21
     28 // RUN: not %run %t 22 2>&1 | FileCheck %s --check-prefix=CHECK22
     29 // RUN: not %run %t 23 2>&1 | FileCheck %s --check-prefix=CHECK23
     30 // RUN: not %run %t 24 2>&1 | FileCheck %s --check-prefix=CHECK24
     31 // RUN: not %run %t 25 2>&1 | FileCheck %s --check-prefix=CHECK25
     32 // RUN: not %run %t 26 2>&1 | FileCheck %s --check-prefix=CHECK26
     33 // RUN: not %run %t 27 2>&1 | FileCheck %s --check-prefix=CHECK27
     34 // Parts of the test are too platform-specific:
     35 // REQUIRES: x86_64-target-arch
     36 // REQUIRES: shell
     37 #include <stdlib.h>
     38 #include <stdio.h>
     39 #include <string.h>
     40 
     41 #include <sanitizer/asan_interface.h>
     42 
     43 enum ReadOrWrite { Read = 0, Write = 1 };
     44 
     45 struct S32 {
     46   char x[32];
     47 };
     48 
     49 template<class T>
     50 void HeapBuferOverflow(int Idx, ReadOrWrite w) {
     51   T *t = new T[100];
     52   static T sink;
     53   if (w)
     54     t[100 + Idx] = T();
     55   else
     56     sink = t[100 + Idx];
     57   delete [] t;
     58 }
     59 
     60 template<class T>
     61 void HeapUseAfterFree(int Idx, ReadOrWrite w) {
     62   T *t = new T[100];
     63   static T sink;
     64   sink = t[0];
     65   delete [] t;
     66   if (w)
     67     t[Idx] = T();
     68   else
     69     sink = t[Idx];
     70 }
     71 
     72 template<class T>
     73 void StackBufferOverflow(int Idx, ReadOrWrite w) {
     74   T t[100];
     75   static T sink;
     76   sink = t[Idx];
     77   if (w)
     78     t[100 + Idx] = T();
     79   else
     80     sink = t[100 + Idx];
     81 }
     82 
     83 template<class T>
     84 T *LeakStack() {
     85   T t[100];
     86   static volatile T *x;
     87   x = &t[0];
     88   return (T*)x;
     89 }
     90 
     91 template<class T>
     92 void StackUseAfterReturn(int Idx, ReadOrWrite w) {
     93   static T sink;
     94   T *t = LeakStack<T>();
     95   if (w)
     96     t[100 + Idx] = T();
     97   else
     98     sink = t[100 + Idx];
     99 }
    100 
    101 char    g1[100];
    102 short   g2[100];
    103 int     g4[100];
    104 int64_t g8[100];
    105 S32     gm[100];
    106 
    107 void DoubleFree() {
    108   int *x = new int;
    109   static volatile int two = 2;
    110   for (int i = 0; i < two; i++)
    111     delete x;
    112 }
    113 
    114 void StackOverflow(int Idx) {
    115   int some_stack[10000];
    116   static volatile int *x;
    117   x = &some_stack[0];
    118   if (Idx > 0)
    119     StackOverflow(Idx - 1);
    120 }
    121 
    122 void UseAfterPoison() {
    123   int buf[100];
    124   __asan_poison_memory_region(buf, sizeof(buf));
    125   static volatile int sink;
    126   sink = buf[42];
    127 }
    128 
    129 int main(int argc, char **argv) {
    130   char arr[100];
    131   static volatile int zero = 0;
    132   static volatile int *zero_ptr = 0;
    133   static volatile int *wild_addr = (int*)0x10000000; // System-dependent.
    134   if (argc != 2) return 1;
    135   int kind = atoi(argv[1]);
    136   switch (kind) {
    137     case 1: HeapBuferOverflow<char>(0, Read); break;
    138     case 2: HeapBuferOverflow<int>(0, Read); break;
    139     case 3: HeapBuferOverflow<short>(0, Write); break;
    140     case 4: HeapBuferOverflow<int64_t>(2, Write); break;
    141     case 5: HeapBuferOverflow<S32>(4, Write); break;
    142     case 6: HeapUseAfterFree<char>(0, Read); break;
    143     case 7: HeapUseAfterFree<int>(0, Write); break;
    144     case 8: HeapUseAfterFree<int64_t>(0, Read); break;
    145     case 9: HeapUseAfterFree<S32>(0, Write); break;
    146     case 10: StackBufferOverflow<char>(0, Write); break;
    147     case 11: StackBufferOverflow<int64_t>(0, Read); break;
    148     case 12: StackBufferOverflow<int>(4, Write); break;
    149     case 13: StackUseAfterReturn<char>(0, Read); break;
    150     case 14: StackUseAfterReturn<S32>(0, Write); break;
    151     case 15: g1[zero + 100] = 0; break;
    152     case 16: gm[0] = gm[zero + 100 + 1]; break;
    153     case 17: DoubleFree(); break;
    154     case 18: StackOverflow(1000000); break;
    155     case 19: *zero_ptr = 0; break;
    156     case 20: *wild_addr = 0; break;
    157     case 21: zero = *wild_addr; break;
    158     case 22: abort(); break;
    159     case 23: ((void (*)(void))wild_addr)(); break;
    160     case 24: delete (new int[10]); break;
    161     case 25: free((char*)malloc(100) + 10); break;
    162     case 26: memcpy(arr, arr+10, 20);  break;
    163     case 27: UseAfterPoison(); break;
    164     // CHECK1: SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
    165     // CHECK2: SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
    166     // CHECK3: SCARINESS: 33 (2-byte-write-heap-buffer-overflow)
    167     // CHECK4: SCARINESS: 52 (8-byte-write-heap-buffer-overflow-far-from-bounds)
    168     // CHECK5: SCARINESS: 55 (multi-byte-write-heap-buffer-overflow-far-from-bounds)
    169     // CHECK6: SCARINESS: 40 (1-byte-read-heap-use-after-free)
    170     // CHECK7: SCARINESS: 46 (4-byte-write-heap-use-after-free)
    171     // CHECK8: SCARINESS: 51 (8-byte-read-heap-use-after-free)
    172     // CHECK9: SCARINESS: 55 (multi-byte-write-heap-use-after-free)
    173     // CHECK10: SCARINESS: 46 (1-byte-write-stack-buffer-overflow)
    174     // CHECK11: SCARINESS: 38 (8-byte-read-stack-buffer-overflow)
    175     // CHECK12: SCARINESS: 61 (4-byte-write-stack-buffer-overflow-far-from-bounds)
    176     // CHECK13: SCARINESS: 50 (1-byte-read-stack-use-after-return)
    177     // CHECK14: SCARINESS: 65 (multi-byte-write-stack-use-after-return)
    178     // CHECK15: SCARINESS: 31 (1-byte-write-global-buffer-overflow)
    179     // CHECK16: SCARINESS: 36 (multi-byte-read-global-buffer-overflow-far-from-bounds)
    180     // CHECK17: SCARINESS: 42 (double-free)
    181     // CHECK18: SCARINESS: 10 (stack-overflow)
    182     // CHECK19: SCARINESS: 10 (null-deref)
    183     // CHECK20: SCARINESS: 30 (wild-addr-write)
    184     // CHECK21: SCARINESS: 20 (wild-addr-read)
    185     // CHECK22: SCARINESS: 10 (signal)
    186     // CHECK23: SCARINESS: 60 (wild-jump)
    187     // CHECK24: SCARINESS: 10 (alloc-dealloc-mismatch)
    188     // CHECK25: SCARINESS: 40 (bad-free)
    189     // CHECK26: SCARINESS: 10 (memcpy-param-overlap)
    190     // CHECK27: SCARINESS: 27 (4-byte-read-use-after-poison)
    191   }
    192 }
    193