aboutsummaryrefslogtreecommitdiff
path: root/misc/cgo/testsanitizers/asan_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'misc/cgo/testsanitizers/asan_test.go')
-rw-r--r--misc/cgo/testsanitizers/asan_test.go141
1 files changed, 0 insertions, 141 deletions
diff --git a/misc/cgo/testsanitizers/asan_test.go b/misc/cgo/testsanitizers/asan_test.go
deleted file mode 100644
index 932cfb1b60..0000000000
--- a/misc/cgo/testsanitizers/asan_test.go
+++ /dev/null
@@ -1,141 +0,0 @@
-// Copyright 2021 The Go Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style
-// license that can be found in the LICENSE file.
-
-package sanitizers_test
-
-import (
- "fmt"
- "strings"
- "testing"
-)
-
-func TestASAN(t *testing.T) {
- goos, err := goEnv("GOOS")
- if err != nil {
- t.Fatal(err)
- }
- goarch, err := goEnv("GOARCH")
- if err != nil {
- t.Fatal(err)
- }
- // The asan tests require support for the -asan option.
- if !aSanSupported(goos, goarch) {
- t.Skipf("skipping on %s/%s; -asan option is not supported.", goos, goarch)
- }
- // The current implementation is only compatible with the ASan library from version
- // v7 to v9 (See the description in src/runtime/asan/asan.go). Therefore, using the
- // -asan option must use a compatible version of ASan library, which requires that
- // the gcc version is not less than 7 and the clang version is not less than 9,
- // otherwise a segmentation fault will occur.
- if !compilerRequiredAsanVersion(goos, goarch) {
- t.Skipf("skipping on %s/%s: too old version of compiler", goos, goarch)
- }
-
- t.Parallel()
- requireOvercommit(t)
- config := configure("address")
- config.skipIfCSanitizerBroken(t)
-
- mustRun(t, config.goCmd("build", "std"))
-
- cases := []struct {
- src string
- memoryAccessError string
- errorLocation string
- experiments []string
- }{
- {src: "asan1_fail.go", memoryAccessError: "heap-use-after-free", errorLocation: "asan1_fail.go:25"},
- {src: "asan2_fail.go", memoryAccessError: "heap-buffer-overflow", errorLocation: "asan2_fail.go:31"},
- {src: "asan3_fail.go", memoryAccessError: "use-after-poison", errorLocation: "asan3_fail.go:13"},
- {src: "asan4_fail.go", memoryAccessError: "use-after-poison", errorLocation: "asan4_fail.go:13"},
- {src: "asan5_fail.go", memoryAccessError: "use-after-poison", errorLocation: "asan5_fail.go:18"},
- {src: "asan_useAfterReturn.go"},
- {src: "asan_unsafe_fail1.go", memoryAccessError: "use-after-poison", errorLocation: "asan_unsafe_fail1.go:25"},
- {src: "asan_unsafe_fail2.go", memoryAccessError: "use-after-poison", errorLocation: "asan_unsafe_fail2.go:25"},
- {src: "asan_unsafe_fail3.go", memoryAccessError: "use-after-poison", errorLocation: "asan_unsafe_fail3.go:18"},
- {src: "asan_global1_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global1_fail.go:12"},
- {src: "asan_global2_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global2_fail.go:19"},
- {src: "asan_global3_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global3_fail.go:13"},
- {src: "asan_global4_fail.go", memoryAccessError: "global-buffer-overflow", errorLocation: "asan_global4_fail.go:21"},
- {src: "asan_global5.go"},
- {src: "arena_fail.go", memoryAccessError: "use-after-poison", errorLocation: "arena_fail.go:26", experiments: []string{"arenas"}},
- }
- for _, tc := range cases {
- tc := tc
- name := strings.TrimSuffix(tc.src, ".go")
- t.Run(name, func(t *testing.T) {
- t.Parallel()
-
- dir := newTempDir(t)
- defer dir.RemoveAll(t)
-
- outPath := dir.Join(name)
- mustRun(t, config.goCmdWithExperiments("build", []string{"-o", outPath, srcPath(tc.src)}, tc.experiments))
-
- cmd := hangProneCmd(outPath)
- if tc.memoryAccessError != "" {
- outb, err := cmd.CombinedOutput()
- out := string(outb)
- if err != nil && strings.Contains(out, tc.memoryAccessError) {
- // This string is output if the
- // sanitizer library needs a
- // symbolizer program and can't find it.
- const noSymbolizer = "external symbolizer"
- // Check if -asan option can correctly print where the error occurred.
- if tc.errorLocation != "" &&
- !strings.Contains(out, tc.errorLocation) &&
- !strings.Contains(out, noSymbolizer) &&
- compilerSupportsLocation() {
-
- t.Errorf("%#q exited without expected location of the error\n%s; got failure\n%s", strings.Join(cmd.Args, " "), tc.errorLocation, out)
- }
- return
- }
- t.Fatalf("%#q exited without expected memory access error\n%s; got failure\n%s", strings.Join(cmd.Args, " "), tc.memoryAccessError, out)
- }
- mustRun(t, cmd)
- })
- }
-}
-
-func TestASANLinkerX(t *testing.T) {
- // Test ASAN with linker's -X flag (see issue 56175).
- goos, err := goEnv("GOOS")
- if err != nil {
- t.Fatal(err)
- }
- goarch, err := goEnv("GOARCH")
- if err != nil {
- t.Fatal(err)
- }
- // The asan tests require support for the -asan option.
- if !aSanSupported(goos, goarch) {
- t.Skipf("skipping on %s/%s; -asan option is not supported.", goos, goarch)
- }
- if !compilerRequiredAsanVersion(goos, goarch) {
- t.Skipf("skipping on %s/%s: too old version of compiler", goos, goarch)
- }
-
- t.Parallel()
- requireOvercommit(t)
- config := configure("address")
- config.skipIfCSanitizerBroken(t)
-
- dir := newTempDir(t)
- defer dir.RemoveAll(t)
-
- var ldflags string
- for i := 1; i <= 10; i++ {
- ldflags += fmt.Sprintf("-X=main.S%d=%d -X=misc/cgo/testsanitizers/testdata/asan_linkerx/p.S%d=%d ", i, i, i, i)
- }
-
- // build the binary
- outPath := dir.Join("main.exe")
- cmd := config.goCmd("build", "-ldflags="+ldflags, "-o", outPath)
- cmd.Dir = srcPath("asan_linkerx")
- mustRun(t, cmd)
-
- // run the binary
- mustRun(t, hangProneCmd(outPath))
-}