// Cross-DSO diagnostics. // The rules are: // * If the library needs diagnostics, the main executable must request at // least some diagnostics as well (to link the diagnostic runtime). // * -fsanitize-trap on the caller side overrides everything. // * otherwise, the callee decides between trap/recover/norecover. // Full-recover. // RUN: %clangxx_cfi_dso_diag -g -DSHARED_LIB %s -fPIC -shared -o %t-so.so // RUN: %clangxx_cfi_dso_diag -g %s -o %t %t-so.so // RUN: %t icv 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-DIAG \ // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER // RUN: %t i_v 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER // RUN: %t _cv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-DIAG \ // RUN: --check-prefix=VCALL-DIAG --check-prefix=ALL-RECOVER // RUN: %t ic_ 2>&1 | FileCheck %s --check-prefix=ICALL-DIAG --check-prefix=CAST-DIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=ALL-RECOVER // Trap on icall, no-recover on cast. // RUN: %clangxx_cfi_dso_diag -fsanitize-trap=cfi-icall -fno-sanitize-recover=cfi-unrelated-cast \ // RUN: -g -DSHARED_LIB %s -fPIC -shared -o %t-so.so // RUN: %clangxx_cfi_dso_diag -fsanitize-trap=cfi-icall -fno-sanitize-recover=cfi-unrelated-cast \ // RUN: -g %s -o %t %t-so.so // RUN: %expect_crash %t icv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=ICALL-FATAL // RUN: not %t _cv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-DIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=CAST-FATAL // RUN: %t __v 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-DIAG // Callee: trap on icall, no-recover on cast. // Caller: recover on everything. // The same as in the previous case, behaviour is decided by the callee. // RUN: %clangxx_cfi_dso_diag -fsanitize-trap=cfi-icall -fno-sanitize-recover=cfi-unrelated-cast \ // RUN: -g -DSHARED_LIB %s -fPIC -shared -o %t-so.so // RUN: %clangxx_cfi_dso_diag \ // RUN: -g %s -o %t %t-so.so // RUN: %expect_crash %t icv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=ICALL-FATAL // RUN: not %t _cv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-DIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=CAST-FATAL // RUN: %t __v 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-DIAG // Caller in trapping mode, callee with full diagnostic+recover. // Caller wins. // cfi-nvcall is non-trapping in the main executable to link the diagnostic runtime library. // RUN: %clangxx_cfi_dso_diag \ // RUN: -g -DSHARED_LIB %s -fPIC -shared -o %t-so.so // RUN: %clangxx_cfi_dso -fno-sanitize-trap=cfi-nvcall \ // RUN: -g %s -o %t %t-so.so // RUN: %expect_crash %t icv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=ICALL-FATAL // RUN: %expect_crash %t _cv 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=CAST-FATAL // RUN: %expect_crash %t __v 2>&1 | FileCheck %s --check-prefix=ICALL-NODIAG --check-prefix=CAST-NODIAG \ // RUN: --check-prefix=VCALL-NODIAG --check-prefix=VCALL-FATAL // REQUIRES: cxxabi #include <assert.h> #include <stdio.h> #include <string.h> struct A { virtual void f(); }; void *create_B(); #ifdef SHARED_LIB #include "../../utils.h" struct B { virtual void f(); }; void B::f() {} void *create_B() { create_derivers<B>(); return (void *)(new B()); } #else void A::f() {} int main(int argc, char *argv[]) { assert(argc == 2); assert(strlen(argv[1]) == 3); // ICALL-FATAL: =0= // CAST-FATAL: =0= // VCALL-FATAL: =0= // ALL-RECOVER: =0= fprintf(stderr, "=0=\n"); void *p; if (argv[1][0] == 'i') { // ICALL-DIAG: runtime error: control flow integrity check for type 'void *(int)' failed during indirect function call // ICALL-DIAG-NEXT: note: create_B() defined here // ICALL-NODIAG-NOT: runtime error: control flow integrity check {{.*}} during indirect function call p = ((void *(*)(int))create_B)(42); } else { p = create_B(); } // ICALL-FATAL-NOT: =1= // CAST-FATAL: =1= // VCALL-FATAL: =1= // ALL-RECOVER: =1= fprintf(stderr, "=1=\n"); A *a; if (argv[1][1] == 'c') { // CAST-DIAG: runtime error: control flow integrity check for type 'A' failed during cast to unrelated type // CAST-DIAG-NEXT: note: vtable is of type '{{(struct )?}}B' // CAST-NODIAG-NOT: runtime error: control flow integrity check {{.*}} during cast to unrelated type a = (A*)p; } else { // Invisible to CFI. memcpy(&a, &p, sizeof(a)); } // ICALL-FATAL-NOT: =2= // CAST-FATAL-NOT: =2= // VCALL-FATAL: =2= // ALL-RECOVER: =2= fprintf(stderr, "=2=\n"); // VCALL-DIAG: runtime error: control flow integrity check for type 'A' failed during virtual call // VCALL-DIAG-NEXT: note: vtable is of type '{{(struct )?}}B' // VCALL-NODIAG-NOT: runtime error: control flow integrity check {{.*}} during virtual call if (argv[1][2] == 'v') { a->f(); // UB here } // ICALL-FATAL-NOT: =3= // CAST-FATAL-NOT: =3= // VCALL-FATAL-NOT: =3= // ALL-RECOVER: =3= fprintf(stderr, "=3=\n"); } #endif