// UNSUPPORTED: ios
// Don't re-enable until rdar://problem/62141527 is fixed.
// REQUIRES: rdar_62141527
// REQUIRES: shell
// REQUIRES: darwin_log_cmd
// RUN: %clangxx_asan -fsanitize-recover=address %s -o %t
// RUN: { %env_asan_opts=halt_on_error=0,log_to_syslog=1 %run %t > %t.process_output.txt 2>&1 & } \
// RUN: ; export TEST_PID=$! ; wait ${TEST_PID}
// Check process output.
// RUN: FileCheck %s --check-prefixes CHECK,CHECK-PROC -input-file=%t.process_output.txt
// Check syslog output. We filter recent system logs based on PID to avoid
// getting the logs of previous test runs.
// RUN: log show --debug --last 5m --predicate "processID == ${TEST_PID}" --style syslog > %t.process_syslog_output.txt
// RUN: FileCheck %s -input-file=%t.process_syslog_output.txt
#include <cassert>
#include <cstdio>
#include <cstring>
#include <sanitizer/asan_interface.h>
const int kBufferSize = 512;
char *buffer;
// `readZero` and `readOne` exist so that we can distinguish the two
// error reports based on the symbolized stacktrace.
void readZero() {
assert(__asan_address_is_poisoned(buffer));
char c = buffer[0];
printf("Read %c\n", c);
}
void readOne() {
assert(__asan_address_is_poisoned(buffer + 1));
char c = buffer[1];
printf("Read %c\n", c);
}
int main() {
buffer = static_cast<char *>(malloc(kBufferSize));
memset(static_cast<void *>(buffer), static_cast<int>('.'), kBufferSize);
assert(buffer);
// Deliberately poison `buffer` so that we have a deterministic way
// triggering two ASan reports in a row in the no halt_on_error mode (e.g. Two
// heap-use-after free in a row might not be deterministic).
__asan_poison_memory_region(buffer, kBufferSize);
// This sequence of ASan reports are designed to catch an old bug in the way
// ASan's internal syslog buffer was handled after reporting an issue.
// Previously in the no halt_on_error mode the internal buffer wasn't cleared
// after reporting an issue. When another issue was encountered everything
// that was already in the buffer would be written to the syslog again
// leading to duplicate reports in the syslog.
// First bad access.
// CHECK: use-after-poison
// CHECK-NEXT: READ of size 1
// CHECK-NEXT: #0 0x{{[0-9a-f]+}} in readZero
// CHECK: SUMMARY: {{.*}} use-after-poison {{.*}} in readZero
readZero();
// Second bad access.
// CHECK: use-after-poison
// CHECK-NEXT: READ of size 1
// CHECK-NEXT: #0 0x{{[0-9a-f]+}} in readOne
// CHECK: SUMMARY: {{.*}} use-after-poison {{.*}} in readOne
readOne();
// CHECK-PROC: DONE
printf("DONE\n");
return 0;
}