xref: /llvm-project/compiler-rt/test/asan/TestCases/scariness_score_test.cpp (revision 7740565f56ce888f5c60d986476185477c911b25)
1 // Test how we produce the scariness score.
2 
3 // UAR Mode: runtime
4 // Case 26 loads a __asan_poison_memory_region-poisoned local variable, which is
5 // only instrumented when StackSafetyAnalysis is disabled.
6 // RUN: %clangxx_asan -O0 -mllvm -asan-use-stack-safety=0 %s -o %t
7 // On OSX and Windows, alloc_dealloc_mismatch=1 isn't 100% reliable, so it's
8 // off by default. It's safe for these tests, though, so we turn it on.
9 // RUN: export %env_asan_opts=symbolize=0:detect_stack_use_after_return=1:handle_abort=1:print_scariness=1:alloc_dealloc_mismatch=1
10 // Make sure the stack is limited (may not be the default under GNU make)
11 // RUN: ulimit -s 4096
12 // RUN: not %run %t  1 2>&1 | FileCheck %s --check-prefix=CHECK1
13 // RUN: not %run %t  2 2>&1 | FileCheck %s --check-prefix=CHECK2
14 // RUN: not %run %t  3 2>&1 | FileCheck %s --check-prefix=CHECK3
15 // RUN: not %run %t  4 2>&1 | FileCheck %s --check-prefix=CHECK4
16 // RUN: not %run %t  5 2>&1 | FileCheck %s --check-prefix=CHECK5
17 // RUN: not %run %t  6 2>&1 | FileCheck %s --check-prefix=CHECK6
18 // RUN: not %run %t  7 2>&1 | FileCheck %s --check-prefix=CHECK7
19 // RUN: not %run %t  8 2>&1 | FileCheck %s --check-prefix=CHECK8
20 // RUN: not %run %t  9 2>&1 | FileCheck %s --check-prefix=CHECK9
21 // RUN: not %run %t 10 2>&1 | FileCheck %s --check-prefix=CHECK10
22 // RUN: not %run %t 11 2>&1 | FileCheck %s --check-prefix=CHECK11
23 // RUN: not %run %t 12 2>&1 | FileCheck %s --check-prefix=CHECK12
24 // RUN: not %run %t 13 2>&1 | FileCheck %s --check-prefix=CHECK13
25 // RUN: not %run %t 14 2>&1 | FileCheck %s --check-prefix=CHECK14
26 // RUN: not %run %t 15 2>&1 | FileCheck %s --check-prefix=CHECK15
27 // RUN: not %run %t 16 2>&1 | FileCheck %s --check-prefix=CHECK16
28 // RUN: not %run %t 17 2>&1 | FileCheck %s --check-prefix=CHECK17
29 // RUN: not %run %t 18 2>&1 | FileCheck %s --check-prefix=CHECK18
30 // RUN: not %run %t 19 2>&1 | FileCheck %s --check-prefix=CHECK19
31 // RUN: not %run %t 20 2>&1 | FileCheck %s --check-prefix=CHECK20
32 // RUN: not %run %t 21 2>&1 | FileCheck %s --check-prefix=CHECK21
33 // RUN: not %run %t 22 2>&1 | FileCheck %s --check-prefix=CHECK22
34 // RUN: not %run %t 23 2>&1 | FileCheck %s --check-prefix=CHECK23
35 // RUN: not %run %t 24 2>&1 | FileCheck %s --check-prefix=CHECK24
36 // RUN: not %run %t 25 2>&1 | FileCheck %s --check-prefix=CHECK25
37 // RUN: not %run %t 26 2>&1 | FileCheck %s --check-prefix=CHECK26
38 // RUN: not %run %t 27 2>&1 | FileCheck %s --check-prefix=CHECK27
39 //
40 // UAR Mode: always
41 // RUN: %clangxx_asan -O0 %s -o %t -fsanitize-address-use-after-return=always -mllvm -asan-use-stack-safety=0
42 // On OSX and Windows, alloc_dealloc_mismatch=1 isn't 100% reliable, so it's
43 // off by default. It's safe for these tests, though, so we turn it on.
44 // RUN: export %env_asan_opts=symbolize=0:handle_abort=1:print_scariness=1:alloc_dealloc_mismatch=1
45 // Make sure the stack is limited (may not be the default under GNU make)
46 // RUN: ulimit -s 4096
47 // RUN: not %run %t  1 2>&1 | FileCheck %s --check-prefix=CHECK1
48 // RUN: not %run %t  2 2>&1 | FileCheck %s --check-prefix=CHECK2
49 // RUN: not %run %t  3 2>&1 | FileCheck %s --check-prefix=CHECK3
50 // RUN: not %run %t  4 2>&1 | FileCheck %s --check-prefix=CHECK4
51 // RUN: not %run %t  5 2>&1 | FileCheck %s --check-prefix=CHECK5
52 // RUN: not %run %t  6 2>&1 | FileCheck %s --check-prefix=CHECK6
53 // RUN: not %run %t  7 2>&1 | FileCheck %s --check-prefix=CHECK7
54 // RUN: not %run %t  8 2>&1 | FileCheck %s --check-prefix=CHECK8
55 // RUN: not %run %t  9 2>&1 | FileCheck %s --check-prefix=CHECK9
56 // RUN: not %run %t 10 2>&1 | FileCheck %s --check-prefix=CHECK10
57 // RUN: not %run %t 11 2>&1 | FileCheck %s --check-prefix=CHECK11
58 // RUN: not %run %t 12 2>&1 | FileCheck %s --check-prefix=CHECK12
59 // RUN: not %run %t 13 2>&1 | FileCheck %s --check-prefix=CHECK13
60 // RUN: not %run %t 14 2>&1 | FileCheck %s --check-prefix=CHECK14
61 // RUN: not %run %t 15 2>&1 | FileCheck %s --check-prefix=CHECK15
62 // RUN: not %run %t 16 2>&1 | FileCheck %s --check-prefix=CHECK16
63 // RUN: not %run %t 17 2>&1 | FileCheck %s --check-prefix=CHECK17
64 // RUN: not %run %t 18 2>&1 | FileCheck %s --check-prefix=CHECK18
65 // RUN: not %run %t 19 2>&1 | FileCheck %s --check-prefix=CHECK19
66 // RUN: not %run %t 20 2>&1 | FileCheck %s --check-prefix=CHECK20
67 // RUN: not %run %t 21 2>&1 | FileCheck %s --check-prefix=CHECK21
68 // RUN: not %run %t 22 2>&1 | FileCheck %s --check-prefix=CHECK22
69 // RUN: not %run %t 23 2>&1 | FileCheck %s --check-prefix=CHECK23
70 // RUN: not %run %t 24 2>&1 | FileCheck %s --check-prefix=CHECK24
71 // RUN: not %run %t 25 2>&1 | FileCheck %s --check-prefix=CHECK25
72 // RUN: not %run %t 26 2>&1 | FileCheck %s --check-prefix=CHECK26
73 // RUN: not %run %t 27 2>&1 | FileCheck %s --check-prefix=CHECK27
74 // Parts of the test are too platform-specific:
75 // REQUIRES: x86_64-target-arch
76 // REQUIRES: shell
77 #include <stdlib.h>
78 #include <stdio.h>
79 #include <string.h>
80 #include <algorithm>
81 
82 #include <sanitizer/asan_interface.h>
83 
84 enum ReadOrWrite { Read = 0, Write = 1 };
85 
86 struct S32 {
87   char x[32];
88 };
89 
90 template<class T>
HeapBuferOverflow(int Idx,ReadOrWrite w)91 void HeapBuferOverflow(int Idx, ReadOrWrite w) {
92   T *t = new T[100];
93   static T sink;
94   if (w)
95     t[100 + Idx] = T();
96   else
97     sink = t[100 + Idx];
98   delete [] t;
99 }
100 
101 template<class T>
HeapUseAfterFree(int Idx,ReadOrWrite w)102 void HeapUseAfterFree(int Idx, ReadOrWrite w) {
103   T *t = new T[100];
104   static T sink;
105   sink = t[0];
106   delete [] t;
107   if (w)
108     t[Idx] = T();
109   else
110     sink = t[Idx];
111 }
112 
113 template<class T>
StackBufferOverflow(int Idx,ReadOrWrite w)114 void StackBufferOverflow(int Idx, ReadOrWrite w) {
115   T t[100];
116   static T sink;
117   sink = t[Idx];
118   if (w)
119     t[100 + Idx] = T();
120   else
121     sink = t[100 + Idx];
122 }
123 
124 template<class T>
LeakStack()125 T *LeakStack() {
126   T t[100];
127   static volatile T *x;
128   x = &t[0];
129   return (T*)x;
130 }
131 
132 template<class T>
StackUseAfterReturn(int Idx,ReadOrWrite w)133 void StackUseAfterReturn(int Idx, ReadOrWrite w) {
134   static T sink;
135   T *t = LeakStack<T>();
136   if (w)
137     t[100 + Idx] = T();
138   else
139     sink = t[100 + Idx];
140 }
141 
142 char    g1[100];
143 short   g2[100];
144 int     g4[100];
145 int64_t g8[100];
146 S32     gm[100];
147 
DoubleFree()148 void DoubleFree() {
149   int *x = new int;
150   static volatile int two = 2;
151   for (int i = 0; i < two; i++)
152     delete x;
153 }
154 
StackOverflow(int Idx)155 void StackOverflow(int Idx) {
156   int some_stack[256];
157   static volatile int *x;
158   x = &some_stack[0];
159   if (Idx > 0)
160     StackOverflow(Idx - 1);
161 }
162 
UseAfterPoison()163 void UseAfterPoison() {
164   int buf[100];
165   __asan_poison_memory_region(buf, sizeof(buf));
166   static volatile int sink;
167   sink = buf[42];
168 }
169 
main(int argc,char ** argv)170 int main(int argc, char **argv) {
171   size_t scale;
172   size_t offset;
173   __asan_get_shadow_mapping(&scale, &offset);
174   size_t grain = 1 << scale;
175 
176   char arr[100];
177   static volatile int zero = 0;
178   static volatile int *zero_ptr = 0;
179   static volatile int *wild_addr = (int*)0x10000000; // System-dependent.
180   if (argc != 2) return 1;
181   int kind = atoi(argv[1]);
182   switch (kind) {
183     case 1: HeapBuferOverflow<char>(0, Read); break;
184     case 2: HeapBuferOverflow<int>(0, Read); break;
185     case 3: HeapBuferOverflow<short>(0, Write); break;
186     case 4: HeapBuferOverflow<int64_t>(
187         2 * std::max(1, (int)(grain / sizeof(int64_t))), Write); break;
188     case 5: HeapBuferOverflow<S32>(4, Write); break;
189     case 6: HeapUseAfterFree<char>(0, Read); break;
190     case 7: HeapUseAfterFree<int>(0, Write); break;
191     case 8: HeapUseAfterFree<int64_t>(0, Read); break;
192     case 9: HeapUseAfterFree<S32>(0, Write); break;
193     case 10: StackBufferOverflow<char>(0, Write); break;
194     case 11: StackBufferOverflow<int64_t>(0, Read); break;
195     case 12:
196       if (scale <= 3) {
197         StackBufferOverflow<int>(16, Write);
198       } else {
199         // At large shadow granularity, there is not enough redzone
200         // between stack elements to detect far-from-bounds.  Pretend
201         // that this test passes.
202         fprintf(stderr, "SCARINESS: 61 "
203                 "(4-byte-write-stack-buffer-overflow-far-from-bounds)\n");
204         return 1;
205       }
206       break;
207     case 13: StackUseAfterReturn<char>(0, Read); break;
208     case 14: StackUseAfterReturn<S32>(0, Write); break;
209     case 15: g1[zero + 100] = 0; break;
210     case 16: gm[0] = gm[zero + 100 + 1]; break;
211     case 17: DoubleFree(); break;
212     case 18: StackOverflow(1000000); break;
213     case 19: *zero_ptr = 0; break;
214     case 20: *wild_addr = 0; break;
215     case 21: zero = *wild_addr; break;
216     case 22: ((void (*)(void))wild_addr)(); break;
217     case 23: delete (new int[10]); break;
218     case 24: free((char*)malloc(100) + 10); break;
219     case 25: memcpy(arr, arr+10, 20);  break;
220     case 26: UseAfterPoison(); break;
221     case 27: abort();
222     // CHECK1: SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
223     // CHECK2: SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
224     // CHECK3: SCARINESS: 33 (2-byte-write-heap-buffer-overflow)
225     // CHECK4: SCARINESS: 52 (8-byte-write-heap-buffer-overflow-far-from-bounds)
226     // CHECK5: SCARINESS: 55 (multi-byte-write-heap-buffer-overflow-far-from-bounds)
227     // CHECK6: SCARINESS: 40 (1-byte-read-heap-use-after-free)
228     // CHECK7: SCARINESS: 46 (4-byte-write-heap-use-after-free)
229     // CHECK8: SCARINESS: 51 (8-byte-read-heap-use-after-free)
230     // CHECK9: SCARINESS: 55 (multi-byte-write-heap-use-after-free)
231     // CHECK10: SCARINESS: 46 (1-byte-write-stack-buffer-overflow)
232     // CHECK11: SCARINESS: 38 (8-byte-read-stack-buffer-overflow)
233     // CHECK12: SCARINESS: 61 (4-byte-write-stack-buffer-overflow-far-from-bounds)
234     // CHECK13: SCARINESS: 50 (1-byte-read-stack-use-after-return)
235     // CHECK14: SCARINESS: 65 (multi-byte-write-stack-use-after-return)
236     // CHECK15: SCARINESS: 31 (1-byte-write-global-buffer-overflow)
237     // CHECK16: SCARINESS: 36 (multi-byte-read-global-buffer-overflow-far-from-bounds)
238     // CHECK17: SCARINESS: 42 (double-free)
239     // CHECK18: SCARINESS: 10 (stack-overflow)
240     // CHECK19: SCARINESS: 10 (null-deref)
241     // CHECK20: SCARINESS: 30 (wild-addr-write)
242     // CHECK21: SCARINESS: 20 (wild-addr-read)
243     // CHECK22: SCARINESS: 60 (wild-jump)
244     // CHECK23: SCARINESS: 10 (alloc-dealloc-mismatch)
245     // CHECK24: SCARINESS: 40 (bad-free)
246     // CHECK25: SCARINESS: 10 (memcpy-param-overlap)
247     // CHECK26: SCARINESS: 27 (4-byte-read-use-after-poison)
248     // CHECK27: SCARINESS: 10 (signal)
249   }
250 }
251