1 // RUN: %clangxx_cfi -o %t1 %s
2 // RUN: %expect_crash %run %t1 2>&1 | FileCheck --check-prefix=CFI %s
3 
4 // RUN: %clangxx_cfi -DB32 -o %t2 %s
5 // RUN: %expect_crash %run %t2 2>&1 | FileCheck --check-prefix=CFI %s
6 
7 // RUN: %clangxx_cfi -DB64 -o %t3 %s
8 // RUN: %expect_crash %run %t3 2>&1 | FileCheck --check-prefix=CFI %s
9 
10 // RUN: %clangxx_cfi -DBM -o %t4 %s
11 // RUN: %expect_crash %run %t4 2>&1 | FileCheck --check-prefix=CFI %s
12 
13 // RUN: %clangxx_cfi -O1 -o %t5 %s
14 // RUN: %expect_crash %run %t5 2>&1 | FileCheck --check-prefix=CFI %s
15 
16 // RUN: %clangxx_cfi -O1 -DB32 -o %t6 %s
17 // RUN: %expect_crash %run %t6 2>&1 | FileCheck --check-prefix=CFI %s
18 
19 // RUN: %clangxx_cfi -O1 -DB64 -o %t7 %s
20 // RUN: %expect_crash %run %t7 2>&1 | FileCheck --check-prefix=CFI %s
21 
22 // RUN: %clangxx_cfi -O1 -DBM -o %t8 %s
23 // RUN: %expect_crash %run %t8 2>&1 | FileCheck --check-prefix=CFI %s
24 
25 // RUN: %clangxx_cfi -O2 -o %t9 %s
26 // RUN: %expect_crash %run %t9 2>&1 | FileCheck --check-prefix=CFI %s
27 
28 // RUN: %clangxx_cfi -O2 -DB32 -o %t10 %s
29 // RUN: %expect_crash %run %t10 2>&1 | FileCheck --check-prefix=CFI %s
30 
31 // RUN: %clangxx_cfi -O2 -DB64 -o %t11 %s
32 // RUN: %expect_crash %run %t11 2>&1 | FileCheck --check-prefix=CFI %s
33 
34 // RUN: %clangxx_cfi -O2 -DBM -o %t12 %s
35 // RUN: %expect_crash %run %t12 2>&1 | FileCheck --check-prefix=CFI %s
36 
37 // RUN: %clangxx_cfi -O3 -o %t13 %s
38 // RUN: %expect_crash %run %t13 2>&1 | FileCheck --check-prefix=CFI %s
39 
40 // RUN: %clangxx_cfi -O3 -DB32 -o %t14 %s
41 // RUN: %expect_crash %run %t14 2>&1 | FileCheck --check-prefix=CFI %s
42 
43 // RUN: %clangxx_cfi -O3 -DB64 -o %t15 %s
44 // RUN: %expect_crash %run %t15 2>&1 | FileCheck --check-prefix=CFI %s
45 
46 // RUN: %clangxx_cfi -O3 -DBM -o %t16 %s
47 // RUN: %expect_crash %run %t16 2>&1 | FileCheck --check-prefix=CFI %s
48 
49 // RUN: %clangxx_cfi_diag -o %t17 %s
50 // RUN: %run %t17 2>&1 | FileCheck --check-prefix=CFI-DIAG %s
51 
52 // RUN: %clangxx -o %t18 %s
53 // RUN: %run %t18 2>&1 | FileCheck --check-prefix=NCFI %s
54 
55 // RUN: %clangxx_cfi -DCHECK_NO_SANITIZE_CFI -o %t19 %s
56 // RUN: %run %t19 2>&1 | FileCheck --check-prefix=NCFI %s
57 
58 // Tests that the CFI mechanism crashes the program when making a virtual call
59 // to an object of the wrong class but with a compatible vtable, by casting a
60 // pointer to such an object and attempting to make a call through it.
61 
62 // REQUIRES: cxxabi
63 
64 #include <stdio.h>
65 #include "utils.h"
66 
67 struct A {
68   virtual void f();
69 };
70 
f()71 void A::f() {}
72 
73 struct B {
74   virtual void f();
75 };
76 
f()77 void B::f() {}
78 
79 #if defined(CHECK_NO_SANITIZE_CFI)
80 __attribute__((no_sanitize("cfi")))
81 #endif
main()82 int main() {
83   create_derivers<B>();
84 
85   A *a = new A;
86   break_optimization(a);
87 
88   // CFI: 1
89   // NCFI: 1
90   fprintf(stderr, "1\n");
91 
92   // CFI-DIAG: runtime error: control flow integrity check for type 'B' failed during cast to unrelated type
93   // CFI-DIAG-NEXT: note: vtable is of type '{{(struct )?}}A'
94   // CFI-DIAG: runtime error: control flow integrity check for type 'B' failed during virtual call
95   // CFI-DIAG-NEXT: note: vtable is of type '{{(struct )?}}A'
96   ((B *)a)->f(); // UB here
97 
98   // CFI-NOT: {{^2$}}
99   // NCFI: {{^2$}}
100   fprintf(stderr, "2\n");
101 }
102