| // Copyright 2021 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| package sanitizers_test |
| |
| import ( |
| "fmt" |
| "strings" |
| "testing" |
| ) |
| |
| func TestASAN(t *testing.T) { |
| goos, err := goEnv("GOOS") |
| if err != nil { |
| t.Fatal(err) |
| } |
| goarch, err := goEnv("GOARCH") |
| if err != nil { |
| t.Fatal(err) |
| } |
| // The asan tests require support for the -asan option. |
| if !aSanSupported(goos, goarch) { |
| t.Skipf("skipping on %s/%s; -asan option is not supported.", goos, goarch) |
| } |
| // The current implementation is only compatible with the ASan library from version |
| // v7 to v9 (See the description in src/runtime/asan/asan.go). Therefore, using the |
| // -asan option must use a compatible version of ASan library, which requires that |
| // the gcc version is not less than 7 and the clang version is not less than 9, |
| // otherwise a segmentation fault will occur. |
| if !compilerRequiredAsanVersion(goos, goarch) { |
| t.Skipf("skipping on %s/%s: too old version of compiler", goos, goarch) |
| } |
| |
| t.Parallel() |
| requireOvercommit(t) |
| config := configure("address") |
| config.skipIfCSanitizerBroken(t) |
| |
| mustRun(t, config.goCmd("build", "std")) |
| |
| cases := []struct { |
| src string |
| memoryAccessError string |
| errorLocation string |
| experiments []string |
| }{ |
| {src: "asan1_fail.go", memoryAccessError: "heap-use-after-free", errorLocation: "asan1_fail.go:25"}, |
| {src: "asan2_fail.go", memoryAccessError: "heap-buffer-overflow", errorLocation: "asan2_fail.go:31"}, |
| {src: "asan3_fail.go", memoryAccessError: "use-after-poison", errorLocation: "asan3_fail.go:13"}, |
| {src: "asan4_fail.go", memoryAccessError: "use-after-poison", errorLocation: "asan4_fail.go:13"}, |
| {src: "asan5_fail.go", memoryAccessError: "use-after-poison", errorLocation: "asan5_fail.go:18"}, |
| {src: "asan_useAfterReturn.go"}, |
| {src: "asan_unsafe_fail1.go", memoryAccessError: "use-after-poison", errorLocation: "asan_unsafe_fail1.go:25"}, |
| {src: "asan_unsafe_fail2.go", memoryAccessError: "use-after-poison", errorLocation: "asan_unsafe_fail2.go:25"}, |
| {src: "asan_unsafe_fail3.go", memoryAccessError: "use-after-poison", errorLocation: "asan_unsafe_fail3.go:18"}, |
| {src: "asan_global1_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global1_fail.go:12"}, |
| {src: "asan_global2_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global2_fail.go:19"}, |
| {src: "asan_global3_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global3_fail.go:13"}, |
| {src: "asan_global4_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global4_fail.go:21"}, |
| {src: "asan_global5.go"}, |
| {src: "arena_fail.go", memoryAccessError: "use-after-poison", errorLocation: "arena_fail.go:26", experiments: []string{"arenas"}}, |
| } |
| for _, tc := range cases { |
| tc := tc |
| name := strings.TrimSuffix(tc.src, ".go") |
| t.Run(name, func(t *testing.T) { |
| t.Parallel() |
| |
| dir := newTempDir(t) |
| defer dir.RemoveAll(t) |
| |
| outPath := dir.Join(name) |
| mustRun(t, config.goCmdWithExperiments("build", []string{"-o", outPath, srcPath(tc.src)}, tc.experiments)) |
| |
| cmd := hangProneCmd(outPath) |
| if tc.memoryAccessError != "" { |
| outb, err := cmd.CombinedOutput() |
| out := string(outb) |
| if err != nil && strings.Contains(out, tc.memoryAccessError) { |
| // This string is output if the |
| // sanitizer library needs a |
| // symbolizer program and can't find it. |
| const noSymbolizer = "external symbolizer" |
| // Check if -asan option can correctly print where the error occurred. |
| if tc.errorLocation != "" && |
| !strings.Contains(out, tc.errorLocation) && |
| !strings.Contains(out, noSymbolizer) && |
| compilerSupportsLocation() { |
| |
| t.Errorf("%#q exited without expected location of the error\n%s; got failure\n%s", strings.Join(cmd.Args, " "), tc.errorLocation, out) |
| } |
| return |
| } |
| t.Fatalf("%#q exited without expected memory access error\n%s; got failure\n%s", strings.Join(cmd.Args, " "), tc.memoryAccessError, out) |
| } |
| mustRun(t, cmd) |
| }) |
| } |
| } |
| |
| func TestASANLinkerX(t *testing.T) { |
| // Test ASAN with linker's -X flag (see issue 56175). |
| goos, err := goEnv("GOOS") |
| if err != nil { |
| t.Fatal(err) |
| } |
| goarch, err := goEnv("GOARCH") |
| if err != nil { |
| t.Fatal(err) |
| } |
| // The asan tests require support for the -asan option. |
| if !aSanSupported(goos, goarch) { |
| t.Skipf("skipping on %s/%s; -asan option is not supported.", goos, goarch) |
| } |
| if !compilerRequiredAsanVersion(goos, goarch) { |
| t.Skipf("skipping on %s/%s: too old version of compiler", goos, goarch) |
| } |
| |
| t.Parallel() |
| requireOvercommit(t) |
| config := configure("address") |
| config.skipIfCSanitizerBroken(t) |
| |
| dir := newTempDir(t) |
| defer dir.RemoveAll(t) |
| |
| var ldflags string |
| for i := 1; i <= 10; i++ { |
| ldflags += fmt.Sprintf("-X=main.S%d=%d -X=misc/cgo/testsanitizers/testdata/asan_linkerx/p.S%d=%d ", i, i, i, i) |
| } |
| |
| // build the binary |
| outPath := dir.Join("main.exe") |
| cmd := config.goCmd("build", "-ldflags="+ldflags, "-o", outPath) |
| cmd.Dir = srcPath("asan_linkerx") |
| mustRun(t, cmd) |
| |
| // run the binary |
| mustRun(t, hangProneCmd(outPath)) |
| } |