13cab2bb3Spatrick //===-- asan_noinst_test.cpp ----------------------------------------------===//
23cab2bb3Spatrick //
33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
63cab2bb3Spatrick //
73cab2bb3Spatrick //===----------------------------------------------------------------------===//
83cab2bb3Spatrick //
93cab2bb3Spatrick // This file is a part of AddressSanitizer, an address sanity checker.
103cab2bb3Spatrick //
113cab2bb3Spatrick // This test file should be compiled w/o asan instrumentation.
123cab2bb3Spatrick //===----------------------------------------------------------------------===//
133cab2bb3Spatrick 
14*810390e3Srobert #include <assert.h>
15*810390e3Srobert #include <sanitizer/allocator_interface.h>
16*810390e3Srobert #include <stdio.h>
17*810390e3Srobert #include <stdlib.h>
18*810390e3Srobert #include <string.h>  // for memset()
19*810390e3Srobert 
20*810390e3Srobert #include <algorithm>
21*810390e3Srobert #include <limits>
22*810390e3Srobert #include <vector>
23*810390e3Srobert 
243cab2bb3Spatrick #include "asan_allocator.h"
253cab2bb3Spatrick #include "asan_internal.h"
263cab2bb3Spatrick #include "asan_mapping.h"
273cab2bb3Spatrick #include "asan_test_utils.h"
283cab2bb3Spatrick 
293cab2bb3Spatrick using namespace __sanitizer;
303cab2bb3Spatrick 
313cab2bb3Spatrick // ATTENTION!
323cab2bb3Spatrick // Please don't call intercepted functions (including malloc() and friends)
333cab2bb3Spatrick // in this test. The static runtime library is linked explicitly (without
343cab2bb3Spatrick // -fsanitize=address), thus the interceptors do not work correctly on OS X.
353cab2bb3Spatrick 
363cab2bb3Spatrick // Make sure __asan_init is called before any test case is run.
373cab2bb3Spatrick struct AsanInitCaller {
AsanInitCallerAsanInitCaller383cab2bb3Spatrick   AsanInitCaller() {
393cab2bb3Spatrick     __asan_init();
403cab2bb3Spatrick   }
413cab2bb3Spatrick };
423cab2bb3Spatrick static AsanInitCaller asan_init_caller;
433cab2bb3Spatrick 
TEST(AddressSanitizer,InternalSimpleDeathTest)443cab2bb3Spatrick TEST(AddressSanitizer, InternalSimpleDeathTest) {
453cab2bb3Spatrick   EXPECT_DEATH(exit(1), "");
463cab2bb3Spatrick }
473cab2bb3Spatrick 
MallocStress(size_t n)483cab2bb3Spatrick static void MallocStress(size_t n) {
493cab2bb3Spatrick   u32 seed = my_rand();
503cab2bb3Spatrick   BufferedStackTrace stack1;
513cab2bb3Spatrick   stack1.trace_buffer[0] = 0xa123;
523cab2bb3Spatrick   stack1.trace_buffer[1] = 0xa456;
533cab2bb3Spatrick   stack1.size = 2;
543cab2bb3Spatrick 
553cab2bb3Spatrick   BufferedStackTrace stack2;
563cab2bb3Spatrick   stack2.trace_buffer[0] = 0xb123;
573cab2bb3Spatrick   stack2.trace_buffer[1] = 0xb456;
583cab2bb3Spatrick   stack2.size = 2;
593cab2bb3Spatrick 
603cab2bb3Spatrick   BufferedStackTrace stack3;
613cab2bb3Spatrick   stack3.trace_buffer[0] = 0xc123;
623cab2bb3Spatrick   stack3.trace_buffer[1] = 0xc456;
633cab2bb3Spatrick   stack3.size = 2;
643cab2bb3Spatrick 
653cab2bb3Spatrick   std::vector<void *> vec;
663cab2bb3Spatrick   for (size_t i = 0; i < n; i++) {
673cab2bb3Spatrick     if ((i % 3) == 0) {
683cab2bb3Spatrick       if (vec.empty()) continue;
693cab2bb3Spatrick       size_t idx = my_rand_r(&seed) % vec.size();
703cab2bb3Spatrick       void *ptr = vec[idx];
713cab2bb3Spatrick       vec[idx] = vec.back();
723cab2bb3Spatrick       vec.pop_back();
733cab2bb3Spatrick       __asan::asan_free(ptr, &stack1, __asan::FROM_MALLOC);
743cab2bb3Spatrick     } else {
753cab2bb3Spatrick       size_t size = my_rand_r(&seed) % 1000 + 1;
763cab2bb3Spatrick       switch ((my_rand_r(&seed) % 128)) {
773cab2bb3Spatrick         case 0: size += 1024; break;
783cab2bb3Spatrick         case 1: size += 2048; break;
793cab2bb3Spatrick         case 2: size += 4096; break;
803cab2bb3Spatrick       }
813cab2bb3Spatrick       size_t alignment = 1 << (my_rand_r(&seed) % 10 + 1);
823cab2bb3Spatrick       char *ptr = (char*)__asan::asan_memalign(alignment, size,
833cab2bb3Spatrick                                                &stack2, __asan::FROM_MALLOC);
843cab2bb3Spatrick       EXPECT_EQ(size, __asan::asan_malloc_usable_size(ptr, 0, 0));
853cab2bb3Spatrick       vec.push_back(ptr);
863cab2bb3Spatrick       ptr[0] = 0;
873cab2bb3Spatrick       ptr[size-1] = 0;
883cab2bb3Spatrick       ptr[size/2] = 0;
893cab2bb3Spatrick     }
903cab2bb3Spatrick   }
913cab2bb3Spatrick   for (size_t i = 0; i < vec.size(); i++)
923cab2bb3Spatrick     __asan::asan_free(vec[i], &stack3, __asan::FROM_MALLOC);
933cab2bb3Spatrick }
943cab2bb3Spatrick 
953cab2bb3Spatrick 
TEST(AddressSanitizer,NoInstMallocTest)963cab2bb3Spatrick TEST(AddressSanitizer, NoInstMallocTest) {
973cab2bb3Spatrick   MallocStress(ASAN_LOW_MEMORY ? 300000 : 1000000);
983cab2bb3Spatrick }
993cab2bb3Spatrick 
TEST(AddressSanitizer,ThreadedMallocStressTest)1003cab2bb3Spatrick TEST(AddressSanitizer, ThreadedMallocStressTest) {
1013cab2bb3Spatrick   const int kNumThreads = 4;
1023cab2bb3Spatrick   const int kNumIterations = (ASAN_LOW_MEMORY) ? 10000 : 100000;
1033cab2bb3Spatrick   pthread_t t[kNumThreads];
1043cab2bb3Spatrick   for (int i = 0; i < kNumThreads; i++) {
1053cab2bb3Spatrick     PTHREAD_CREATE(&t[i], 0, (void* (*)(void *x))MallocStress,
1063cab2bb3Spatrick         (void*)kNumIterations);
1073cab2bb3Spatrick   }
1083cab2bb3Spatrick   for (int i = 0; i < kNumThreads; i++) {
1093cab2bb3Spatrick     PTHREAD_JOIN(t[i], 0);
1103cab2bb3Spatrick   }
1113cab2bb3Spatrick }
1123cab2bb3Spatrick 
PrintShadow(const char * tag,uptr ptr,size_t size)1133cab2bb3Spatrick static void PrintShadow(const char *tag, uptr ptr, size_t size) {
1143cab2bb3Spatrick   fprintf(stderr, "%s shadow: %lx size % 3ld: ", tag, (long)ptr, (long)size);
1153cab2bb3Spatrick   uptr prev_shadow = 0;
1163cab2bb3Spatrick   for (sptr i = -32; i < (sptr)size + 32; i++) {
1173cab2bb3Spatrick     uptr shadow = __asan::MemToShadow(ptr + i);
1183cab2bb3Spatrick     if (i == 0 || i == (sptr)size)
1193cab2bb3Spatrick       fprintf(stderr, ".");
1203cab2bb3Spatrick     if (shadow != prev_shadow) {
1213cab2bb3Spatrick       prev_shadow = shadow;
1223cab2bb3Spatrick       fprintf(stderr, "%02x", (int)*(u8*)shadow);
1233cab2bb3Spatrick     }
1243cab2bb3Spatrick   }
1253cab2bb3Spatrick   fprintf(stderr, "\n");
1263cab2bb3Spatrick }
1273cab2bb3Spatrick 
TEST(AddressSanitizer,DISABLED_InternalPrintShadow)1283cab2bb3Spatrick TEST(AddressSanitizer, DISABLED_InternalPrintShadow) {
1293cab2bb3Spatrick   for (size_t size = 1; size <= 513; size++) {
1303cab2bb3Spatrick     char *ptr = new char[size];
1313cab2bb3Spatrick     PrintShadow("m", (uptr)ptr, size);
1323cab2bb3Spatrick     delete [] ptr;
1333cab2bb3Spatrick     PrintShadow("f", (uptr)ptr, size);
1343cab2bb3Spatrick   }
1353cab2bb3Spatrick }
1363cab2bb3Spatrick 
TEST(AddressSanitizer,QuarantineTest)1373cab2bb3Spatrick TEST(AddressSanitizer, QuarantineTest) {
1383cab2bb3Spatrick   BufferedStackTrace stack;
1393cab2bb3Spatrick   stack.trace_buffer[0] = 0x890;
1403cab2bb3Spatrick   stack.size = 1;
1413cab2bb3Spatrick 
1423cab2bb3Spatrick   const int size = 1024;
1433cab2bb3Spatrick   void *p = __asan::asan_malloc(size, &stack);
1443cab2bb3Spatrick   __asan::asan_free(p, &stack, __asan::FROM_MALLOC);
1453cab2bb3Spatrick   size_t i;
1463cab2bb3Spatrick   size_t max_i = 1 << 30;
1473cab2bb3Spatrick   for (i = 0; i < max_i; i++) {
1483cab2bb3Spatrick     void *p1 = __asan::asan_malloc(size, &stack);
1493cab2bb3Spatrick     __asan::asan_free(p1, &stack, __asan::FROM_MALLOC);
1503cab2bb3Spatrick     if (p1 == p) break;
1513cab2bb3Spatrick   }
1523cab2bb3Spatrick   EXPECT_GE(i, 10000U);
1533cab2bb3Spatrick   EXPECT_LT(i, max_i);
1543cab2bb3Spatrick }
1553cab2bb3Spatrick 
1563cab2bb3Spatrick #if !defined(__NetBSD__)
ThreadedQuarantineTestWorker(void * unused)1573cab2bb3Spatrick void *ThreadedQuarantineTestWorker(void *unused) {
1583cab2bb3Spatrick   (void)unused;
1593cab2bb3Spatrick   u32 seed = my_rand();
1603cab2bb3Spatrick   BufferedStackTrace stack;
1613cab2bb3Spatrick   stack.trace_buffer[0] = 0x890;
1623cab2bb3Spatrick   stack.size = 1;
1633cab2bb3Spatrick 
1643cab2bb3Spatrick   for (size_t i = 0; i < 1000; i++) {
1653cab2bb3Spatrick     void *p = __asan::asan_malloc(1 + (my_rand_r(&seed) % 4000), &stack);
1663cab2bb3Spatrick     __asan::asan_free(p, &stack, __asan::FROM_MALLOC);
1673cab2bb3Spatrick   }
1683cab2bb3Spatrick   return NULL;
1693cab2bb3Spatrick }
1703cab2bb3Spatrick 
1713cab2bb3Spatrick // Check that the thread local allocators are flushed when threads are
1723cab2bb3Spatrick // destroyed.
TEST(AddressSanitizer,ThreadedQuarantineTest)1733cab2bb3Spatrick TEST(AddressSanitizer, ThreadedQuarantineTest) {
1743cab2bb3Spatrick   // Run the routine once to warm up ASAN internal structures to get more
1753cab2bb3Spatrick   // predictable incremental memory changes.
1763cab2bb3Spatrick   pthread_t t;
1773cab2bb3Spatrick   PTHREAD_CREATE(&t, NULL, ThreadedQuarantineTestWorker, 0);
1783cab2bb3Spatrick   PTHREAD_JOIN(t, 0);
1793cab2bb3Spatrick 
1803cab2bb3Spatrick   const int n_threads = 3000;
1813cab2bb3Spatrick   size_t mmaped1 = __sanitizer_get_heap_size();
1823cab2bb3Spatrick   for (int i = 0; i < n_threads; i++) {
1833cab2bb3Spatrick     pthread_t t;
1843cab2bb3Spatrick     PTHREAD_CREATE(&t, NULL, ThreadedQuarantineTestWorker, 0);
1853cab2bb3Spatrick     PTHREAD_JOIN(t, 0);
1863cab2bb3Spatrick     size_t mmaped2 = __sanitizer_get_heap_size();
1873cab2bb3Spatrick     // Figure out why this much memory is required.
1883cab2bb3Spatrick     EXPECT_LT(mmaped2 - mmaped1, 320U * (1 << 20));
1893cab2bb3Spatrick   }
1903cab2bb3Spatrick }
1913cab2bb3Spatrick #endif
1923cab2bb3Spatrick 
ThreadedOneSizeMallocStress(void * unused)1933cab2bb3Spatrick void *ThreadedOneSizeMallocStress(void *unused) {
1943cab2bb3Spatrick   (void)unused;
1953cab2bb3Spatrick   BufferedStackTrace stack;
1963cab2bb3Spatrick   stack.trace_buffer[0] = 0x890;
1973cab2bb3Spatrick   stack.size = 1;
1983cab2bb3Spatrick   const size_t kNumMallocs = 1000;
1993cab2bb3Spatrick   for (int iter = 0; iter < 1000; iter++) {
2003cab2bb3Spatrick     void *p[kNumMallocs];
2013cab2bb3Spatrick     for (size_t i = 0; i < kNumMallocs; i++) {
2023cab2bb3Spatrick       p[i] = __asan::asan_malloc(32, &stack);
2033cab2bb3Spatrick     }
2043cab2bb3Spatrick     for (size_t i = 0; i < kNumMallocs; i++) {
2053cab2bb3Spatrick       __asan::asan_free(p[i], &stack, __asan::FROM_MALLOC);
2063cab2bb3Spatrick     }
2073cab2bb3Spatrick   }
2083cab2bb3Spatrick   return NULL;
2093cab2bb3Spatrick }
2103cab2bb3Spatrick 
TEST(AddressSanitizer,ThreadedOneSizeMallocStressTest)2113cab2bb3Spatrick TEST(AddressSanitizer, ThreadedOneSizeMallocStressTest) {
2123cab2bb3Spatrick   const int kNumThreads = 4;
2133cab2bb3Spatrick   pthread_t t[kNumThreads];
2143cab2bb3Spatrick   for (int i = 0; i < kNumThreads; i++) {
2153cab2bb3Spatrick     PTHREAD_CREATE(&t[i], 0, ThreadedOneSizeMallocStress, 0);
2163cab2bb3Spatrick   }
2173cab2bb3Spatrick   for (int i = 0; i < kNumThreads; i++) {
2183cab2bb3Spatrick     PTHREAD_JOIN(t[i], 0);
2193cab2bb3Spatrick   }
2203cab2bb3Spatrick }
2213cab2bb3Spatrick 
TEST(AddressSanitizer,ShadowRegionIsPoisonedTest)2223cab2bb3Spatrick TEST(AddressSanitizer, ShadowRegionIsPoisonedTest) {
2233cab2bb3Spatrick   using __asan::kHighMemEnd;
2243cab2bb3Spatrick   // Check that __asan_region_is_poisoned works for shadow regions.
2253cab2bb3Spatrick   uptr ptr = kLowShadowBeg + 200;
2263cab2bb3Spatrick   EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100));
2273cab2bb3Spatrick   ptr = kShadowGapBeg + 200;
2283cab2bb3Spatrick   EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100));
2293cab2bb3Spatrick   ptr = kHighShadowBeg + 200;
2303cab2bb3Spatrick   EXPECT_EQ(ptr, __asan_region_is_poisoned(ptr, 100));
2313cab2bb3Spatrick }
2323cab2bb3Spatrick 
2333cab2bb3Spatrick // Test __asan_load1 & friends.
2343cab2bb3Spatrick typedef void (*CB)(uptr p);
TestLoadStoreCallbacks(CB cb[2][5])235*810390e3Srobert static void TestLoadStoreCallbacks(CB cb[2][5]) {
2363cab2bb3Spatrick   uptr buggy_ptr;
2373cab2bb3Spatrick 
2383cab2bb3Spatrick   __asan_test_only_reported_buggy_pointer = &buggy_ptr;
2393cab2bb3Spatrick   BufferedStackTrace stack;
2403cab2bb3Spatrick   stack.trace_buffer[0] = 0x890;
2413cab2bb3Spatrick   stack.size = 1;
2423cab2bb3Spatrick 
2433cab2bb3Spatrick   for (uptr len = 16; len <= 32; len++) {
2443cab2bb3Spatrick     char *ptr = (char*) __asan::asan_malloc(len, &stack);
2453cab2bb3Spatrick     uptr p = reinterpret_cast<uptr>(ptr);
2463cab2bb3Spatrick     for (uptr is_write = 0; is_write <= 1; is_write++) {
2473cab2bb3Spatrick       for (uptr size_log = 0; size_log <= 4; size_log++) {
2483cab2bb3Spatrick         uptr size = 1 << size_log;
2493cab2bb3Spatrick         CB call = cb[is_write][size_log];
2503cab2bb3Spatrick         // Iterate only size-aligned offsets.
2513cab2bb3Spatrick         for (uptr offset = 0; offset <= len; offset += size) {
2523cab2bb3Spatrick           buggy_ptr = 0;
2533cab2bb3Spatrick           call(p + offset);
2543cab2bb3Spatrick           if (offset + size <= len)
2553cab2bb3Spatrick             EXPECT_EQ(buggy_ptr, 0U);
2563cab2bb3Spatrick           else
2573cab2bb3Spatrick             EXPECT_EQ(buggy_ptr, p + offset);
2583cab2bb3Spatrick         }
2593cab2bb3Spatrick       }
2603cab2bb3Spatrick     }
2613cab2bb3Spatrick     __asan::asan_free(ptr, &stack, __asan::FROM_MALLOC);
2623cab2bb3Spatrick   }
2633cab2bb3Spatrick   __asan_test_only_reported_buggy_pointer = 0;
2643cab2bb3Spatrick }
265*810390e3Srobert 
TEST(AddressSanitizer,LoadStoreCallbacks)266*810390e3Srobert TEST(AddressSanitizer, LoadStoreCallbacks) {
267*810390e3Srobert   CB cb[2][5] = {{
268*810390e3Srobert                      __asan_load1,
269*810390e3Srobert                      __asan_load2,
270*810390e3Srobert                      __asan_load4,
271*810390e3Srobert                      __asan_load8,
272*810390e3Srobert                      __asan_load16,
273*810390e3Srobert                  },
274*810390e3Srobert                  {
275*810390e3Srobert                      __asan_store1,
276*810390e3Srobert                      __asan_store2,
277*810390e3Srobert                      __asan_store4,
278*810390e3Srobert                      __asan_store8,
279*810390e3Srobert                      __asan_store16,
280*810390e3Srobert                  }};
281*810390e3Srobert   TestLoadStoreCallbacks(cb);
282*810390e3Srobert }
283*810390e3Srobert 
284*810390e3Srobert #if defined(__x86_64__) && \
285*810390e3Srobert     !(defined(SANITIZER_APPLE) || defined(SANITIZER_WINDOWS))
286*810390e3Srobert // clang-format off
287*810390e3Srobert 
288*810390e3Srobert #define CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(s, reg, op)        \
289*810390e3Srobert   void CallAsanMemoryAccessAdd##reg##op##s(uptr address) {      \
290*810390e3Srobert   asm("push  %%" #reg " \n"                                     \
291*810390e3Srobert   "mov   %[x], %%" #reg " \n"                                   \
292*810390e3Srobert   "call  __asan_check_" #op "_add_" #s "_" #reg "\n"            \
293*810390e3Srobert   "pop   %%" #reg " \n"                                         \
294*810390e3Srobert   :                                                             \
295*810390e3Srobert   : [x] "r"(address)                                            \
296*810390e3Srobert       : "r8", "rdi");                                           \
297*810390e3Srobert   }
298*810390e3Srobert 
299*810390e3Srobert #define TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(reg)            \
300*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(1, reg, load)          \
301*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(1, reg, store)         \
302*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(2, reg, load)          \
303*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(2, reg, store)         \
304*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(4, reg, load)          \
305*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(4, reg, store)         \
306*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(8, reg, load)          \
307*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(8, reg, store)         \
308*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(16, reg, load)         \
309*810390e3Srobert   CALL_ASAN_MEMORY_ACCESS_CALLBACK_ADD(16, reg, store)        \
310*810390e3Srobert                                                               \
311*810390e3Srobert   TEST(AddressSanitizer, LoadStoreCallbacksAddX86##reg) {     \
312*810390e3Srobert     CB cb[2][5] = {{                                          \
313*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##load1,   \
314*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##load2,   \
315*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##load4,   \
316*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##load8,   \
317*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##load16,  \
318*810390e3Srobert                    },                                         \
319*810390e3Srobert                    {                                          \
320*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##store1,  \
321*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##store2,  \
322*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##store4,  \
323*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##store8,  \
324*810390e3Srobert                        CallAsanMemoryAccessAdd##reg##store16, \
325*810390e3Srobert                    }};                                        \
326*810390e3Srobert     TestLoadStoreCallbacks(cb);                               \
327*810390e3Srobert   }
328*810390e3Srobert 
329*810390e3Srobert // Instantiate all but R10 and R11 callbacks. We are using PLTSafe class with
330*810390e3Srobert // the intrinsic, which guarantees that the code generation will never emit
331*810390e3Srobert // R10 or R11 callbacks.
332*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(RAX)
333*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(RBX)
334*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(RCX)
335*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(RDX)
336*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(RSI)
337*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(RDI)
338*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(RBP)
339*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(R8)
340*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(R9)
341*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(R12)
342*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(R13)
343*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(R14)
344*810390e3Srobert TEST_ASAN_MEMORY_ACCESS_CALLBACKS_ADD(R15)
345*810390e3Srobert 
346*810390e3Srobert // clang-format on
347*810390e3Srobert #endif
348