summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--lib/asan/asan_errors.cc11
-rw-r--r--test/asan/TestCases/non-executable-pc.cpp30
2 files changed, 41 insertions, 0 deletions
diff --git a/lib/asan/asan_errors.cc b/lib/asan/asan_errors.cc
index 7829dd1dc..eb3ed0012 100644
--- a/lib/asan/asan_errors.cc
+++ b/lib/asan/asan_errors.cc
@@ -58,6 +58,16 @@ static void MaybeDumpRegisters(void *context) {
SignalContext::DumpAllRegisters(context);
}
+static void MaybeReportNonExecRegion(uptr pc) {
+ MemoryMappingLayout proc_maps(/*cache_enabled*/ true);
+ uptr start, end, protection;
+ while (proc_maps.Next(&start, &end, nullptr, nullptr, 0, &protection)) {
+ if (pc >= start && pc < end &&
+ !(protection & MemoryMappingLayout::kProtectionExecute))
+ Report("Hint: PC is at a non-executable region. Maybe a wild jump?\n");
+ }
+}
+
void ErrorDeadlySignal::Print() {
Decorator d;
Printf("%s", d.Warning());
@@ -77,6 +87,7 @@ void ErrorDeadlySignal::Print() {
if (addr < GetPageSizeCached())
Report("Hint: address points to the zero page.\n");
}
+ MaybeReportNonExecRegion(pc);
scariness.Print();
BufferedStackTrace stack;
GetStackTraceWithPcBpAndContext(&stack, kStackTraceMax, pc, bp, context,
diff --git a/test/asan/TestCases/non-executable-pc.cpp b/test/asan/TestCases/non-executable-pc.cpp
new file mode 100644
index 000000000..0c2751780
--- /dev/null
+++ b/test/asan/TestCases/non-executable-pc.cpp
@@ -0,0 +1,30 @@
+// RUN: %clangxx_asan %s -o %t
+// RUN: not %run %t 0 2>&1 | FileCheck %s
+// RUN: not %run %t n 2>&1 | FileCheck %s -check-prefix=CHECK -check-prefix=NON_EXEC
+
+#include <assert.h>
+char array[42];
+
+typedef void void_f();
+int main(int argc, char **argv) {
+ void_f *func;
+ assert(argc > 1);
+ if (argv[1][0] == '0') {
+ func = (void_f *)0x04;
+ } else {
+ assert(argv[1][0] == 'n');
+ func = (void_f *)array;
+ }
+
+ func();
+ // x86 reports the SEGV with both address=X and pc=X.
+ // On PowerPC64 ELFv1, the pointer is taken to be a function-descriptor
+ // pointer out of which three 64-bit quantities are read. This will SEGV, but
+ // the compiler is free to choose the order. As a result, the address is
+ // either X, X+0x8 or X+0x10. The pc is still in main() because it has not
+ // actually made the call when the faulting access occurs.
+ // CHECK: DEADLYSIGNAL
+ // CHECK: {{AddressSanitizer: (SEGV|access-violation).*(address|pc) }}
+ // NON_EXEC: PC is at a non-executable region. Maybe a wild jump?
+ return 0;
+}