From c46178c1972a8e4ca90acd2ed85a502984df0339 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=96zg=C3=BCr?= Date: Wed, 14 Jan 2026 02:41:05 +0300 Subject: [PATCH 1/6] add asan annotation to optional --- .../__msvc_sanitizer_annotate_container.hpp | 35 ++++++++++++++ stl/inc/optional | 30 +++++++++++- tests/std/test.lst | 1 + .../std/tests/GH_005974_optional_asan/env.lst | 4 ++ .../tests/GH_005974_optional_asan/test.cpp | 48 +++++++++++++++++++ 5 files changed, 116 insertions(+), 2 deletions(-) create mode 100644 tests/std/tests/GH_005974_optional_asan/env.lst create mode 100644 tests/std/tests/GH_005974_optional_asan/test.cpp diff --git a/stl/inc/__msvc_sanitizer_annotate_container.hpp b/stl/inc/__msvc_sanitizer_annotate_container.hpp index 057d68e7c0f..887d5d7f941 100644 --- a/stl/inc/__msvc_sanitizer_annotate_container.hpp +++ b/stl/inc/__msvc_sanitizer_annotate_container.hpp @@ -20,11 +20,13 @@ _STL_DISABLE_CLANG_WARNINGS // (this will be auto-defined on unsupported platforms) // + _DISABLE_STRING_ANNOTATION: same, but for only `basic_string` // + _DISABLE_VECTOR_ANNOTATION: same, but for only `vector` +// + _DISABLE_OPTIONAL_ANNOTATION: same, but for only `optional` // - _ENABLE_STL_ANNOTATION_ON_UNSUPPORTED_PLATFORMS: Don't auto-disable ASan annotations // - _ANNOTATE_STL: Even when ASan annotations are disabled, insert the code for annotating into the STL anyways; // this is useful when building static libraries which may be linked against both ASan and non-ASan binaries. // + _ANNOTATE_STRING: same, but only for `basic_string` // + _ANNOTATE_VECTOR: same, but only for `vector` +// + _ANNOTATE_OPTIONAL: same, but only for `optional` #if !defined(_DISABLE_STL_ANNOTATION) && !defined(_ENABLE_STL_ANNOTATION_ON_UNSUPPORTED_PLATFORMS) @@ -46,6 +48,9 @@ _STL_DISABLE_CLANG_WARNINGS #ifndef _DISABLE_VECTOR_ANNOTATION #define _DISABLE_VECTOR_ANNOTATION #endif // ^^^ !defined(_DISABLE_VECTOR_ANNOTATION) ^^^ +#ifndef _DISABLE_OPTIONAL_ANNOTATION +#define _DISABLE_OPTIONAL_ANNOTATION +#endif // ^^^ !defined(_DISABLE_OPTIONAL_ANNOTATION) ^^^ #endif // ^^^ defined(_DISABLE_STL_ANNOTATION) ^^^ @@ -59,6 +64,10 @@ _STL_DISABLE_CLANG_WARNINGS #define _ANNOTATE_VECTOR #endif // ^^^ !defined(_ANNOTATE_VECTOR) ^^^ +#ifndef _ANNOTATE_OPTIONAL +#define _ANNOTATE_OPTIONAL +#endif // ^^^ !defined(_ANNOTATE_OPTIONAL) ^^^ + #endif // ^^^ defined(_ANNOTATE_STL) ^^^ #ifdef __SANITIZE_ADDRESS__ @@ -67,6 +76,8 @@ _STL_DISABLE_CLANG_WARNINGS #define _INSERT_STRING_ANNOTATION #define _ACTIVATE_VECTOR_ANNOTATION #define _INSERT_VECTOR_ANNOTATION +#define _ACTIVATE_OPTIONAL_ANNOTATION +#define _INSERT_OPTIONAL_ANNOTATION #elif defined(__clang__) // ^^^ defined(__SANITIZE_ADDRESS__) / defined(__clang__) vvv @@ -75,6 +86,8 @@ _STL_DISABLE_CLANG_WARNINGS #define _INSERT_STRING_ANNOTATION #define _ACTIVATE_VECTOR_ANNOTATION #define _INSERT_VECTOR_ANNOTATION +#define _ACTIVATE_OPTIONAL_ANNOTATION +#define _INSERT_OPTIONAL_ANNOTATION #pragma comment(linker, "/INFERASANLIBS") #endif // __has_feature(address_sanitizer) @@ -89,6 +102,10 @@ _STL_DISABLE_CLANG_WARNINGS #undef _ACTIVATE_VECTOR_ANNOTATION #undef _INSERT_VECTOR_ANNOTATION #endif // ^^^ defined(_DISABLE_VECTOR_ANNOTATION) ^^^ +#ifdef _DISABLE_OPTIONAL_ANNOTATION +#undef _ACTIVATE_OPTIONAL_ANNOTATION +#undef _INSERT_OPTIONAL_ANNOTATION +#endif // ^^^ defined(_DISABLE_OPTIONAL_ANNOTATION) ^^^ #ifdef _ANNOTATE_STRING #define _INSERT_STRING_ANNOTATION @@ -96,6 +113,9 @@ _STL_DISABLE_CLANG_WARNINGS #ifdef _ANNOTATE_VECTOR #define _INSERT_VECTOR_ANNOTATION #endif // ^^^ defined(_ANNOTATE_VECTOR) ^^^ +#ifdef _ANNOTATE_OPTIONAL +#define _INSERT_OPTIONAL_ANNOTATION +#endif // ^^^ defined(_ANNOTATE_OPTIONAL) ^^^ #ifndef _INSERT_STRING_ANNOTATION @@ -104,6 +124,9 @@ _STL_DISABLE_CLANG_WARNINGS #ifndef _INSERT_VECTOR_ANNOTATION #pragma detect_mismatch("annotate_vector", "0") #endif // ^^^ !defined(_INSERT_VECTOR_ANNOTATION) ^^^ +#ifndef _INSERT_OPTIONAL_ANNOTATION +#pragma detect_mismatch("annotate_optional", "0") +#endif // ^^^ !defined(_INSERT_OPTIONAL_ANNOTATION) ^^^ #ifdef _ACTIVATE_STRING_ANNOTATION #pragma comment(lib, "stl_asan") @@ -113,9 +136,14 @@ _STL_DISABLE_CLANG_WARNINGS #pragma comment(lib, "stl_asan") #pragma detect_mismatch("annotate_vector", "1") #endif // ^^^ defined(_ACTIVATE_VECTOR_ANNOTATION) ^^^ +#ifdef _ACTIVATE_OPTIONAL_ANNOTATION +#pragma comment(lib, "stl_asan") +#pragma detect_mismatch("annotate_optional", "1") +#endif // ^^^ defined(_ACTIVATE_OPTIONAL_ANNOTATION) ^^^ #undef _ACTIVATE_STRING_ANNOTATION #undef _ACTIVATE_VECTOR_ANNOTATION +#undef _ACTIVATE_OPTIONAL_ANNOTATION extern "C" { #ifdef _INSERT_VECTOR_ANNOTATION @@ -125,10 +153,17 @@ extern const bool _Asan_vector_should_annotate; #ifdef _INSERT_STRING_ANNOTATION extern const bool _Asan_string_should_annotate; #endif + +#ifdef _INSERT_OPTIONAL_ANNOTATION +extern const bool _Asan_optional_should_annotate; +#endif } // extern "C" #if defined(_INSERT_VECTOR_ANNOTATION) || defined(_INSERT_STRING_ANNOTATION) extern "C" { +void __cdecl __asan_poison_memory_region(void const volatile* addr, size_t size); +void __cdecl __asan_unpoison_memory_region(void const volatile* addr, size_t size); + // This must match ASan's primary declaration, which isn't marked `noexcept`. void __cdecl __sanitizer_annotate_contiguous_container( const void* _First, const void* _End, const void* _Old_last, const void* _New_last); diff --git a/stl/inc/optional b/stl/inc/optional index 8454922206e..d312fbdd8ce 100644 --- a/stl/inc/optional +++ b/stl/inc/optional @@ -13,6 +13,7 @@ _EMIT_STL_WARNING(STL4038, "The contents of are available only with C #if _HAS_CXX20 #include #endif // _HAS_CXX20 +#include <__msvc_sanitizer_annotate_container.hpp> #include #include #include @@ -74,7 +75,11 @@ struct _Optional_destruct_base { // either contains a value of _Ty or is empty ( }; bool _Has_value; - constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} {} // initialize an empty optional + constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { +#ifdef _INSERT_OPTIONAL_ANNOTATION + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); +#endif + } // initialize an empty optional template constexpr explicit _Optional_destruct_base(in_place_t, _Types&&... _Args) @@ -93,6 +98,9 @@ struct _Optional_destruct_base { // either contains a value of _Ty or is empty ( _CONSTEXPR20 void reset() noexcept { _Has_value = false; +#ifdef _INSERT_OPTIONAL_ANNOTATION + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); +#endif } }; @@ -108,6 +116,10 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o if (_Has_value) { _Value.~_Ty(); +#ifdef _INSERT_OPTIONAL_ANNOTATION + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); +#endif + #if _MSVC_STL_DESTRUCTOR_TOMBSTONES // For the non-trivially destructible case, we can set the optional to be empty. // We don't attempt to scribble over the bytes of the object's storage because that could be expensive @@ -117,7 +129,11 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o } } - constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} {} // initialize an empty optional + constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { +#ifdef _INSERT_OPTIONAL_ANNOTATION + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); +#endif + } // initialize an empty optional template constexpr explicit _Optional_destruct_base(in_place_t, _Types&&... _Args) @@ -139,6 +155,11 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o _CONSTEXPR20 void reset() noexcept { if (_Has_value) { _Value.~_Ty(); + +#ifdef _INSERT_OPTIONAL_ANNOTATION + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); +#endif + _Has_value = false; } } @@ -153,6 +174,11 @@ struct _Optional_construct_base : _Optional_destruct_base<_Ty> { _CONSTEXPR20 _Ty& _Construct(_Types&&... _Args) noexcept(is_nothrow_constructible_v<_Ty, _Types...>) { // transition from the empty to the value-containing state _STL_INTERNAL_CHECK(!this->_Has_value); + +#ifdef _INSERT_OPTIONAL_ANNOTATION + __asan_unpoison_memory_region(_STD addressof(this->_Value), sizeof(this->_Value)); +#endif + _STD _Construct_in_place(this->_Value, _STD forward<_Types>(_Args)...); this->_Has_value = true; return this->_Value; diff --git a/tests/std/test.lst b/tests/std/test.lst index 934f31f1d5e..d6f73595f63 100644 --- a/tests/std/test.lst +++ b/tests/std/test.lst @@ -277,6 +277,7 @@ tests\GH_005546_containers_size_type_cast tests\GH_005553_regex_character_translation tests\GH_005768_pow_accuracy tests\GH_005800_stable_sort_large_alignment +tests\GH_005974_optional_asan tests\LWG2381_num_get_floating_point tests\LWG2510_tag_classes tests\LWG2597_complex_branch_cut diff --git a/tests/std/tests/GH_005974_optional_asan/env.lst b/tests/std/tests/GH_005974_optional_asan/env.lst new file mode 100644 index 00000000000..2de7aab2959 --- /dev/null +++ b/tests/std/tests/GH_005974_optional_asan/env.lst @@ -0,0 +1,4 @@ +# Copyright (c) Microsoft Corporation. +# SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception + +RUNALL_INCLUDE ..\usual_17_matrix.lst diff --git a/tests/std/tests/GH_005974_optional_asan/test.cpp b/tests/std/tests/GH_005974_optional_asan/test.cpp new file mode 100644 index 00000000000..c4150005dd5 --- /dev/null +++ b/tests/std/tests/GH_005974_optional_asan/test.cpp @@ -0,0 +1,48 @@ +// Copyright (c) Microsoft Corporation. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception + +#include +#include + +struct LargePayload { + int data[4]; +}; + +void test_activation_unpoisoning() { + std::optional opt; + opt.emplace(LargePayload{1, 2, 3, 4}); + assert(opt->data[0] == 1); +} + +void test_assignment_unpoisoning() { + std::optional opt; + LargePayload val{5, 6, 7, 8}; + opt = val; + assert(opt->data[0] == 5); +} + +void test_poison_on_empty_access() { + std::optional opt; + auto* p = reinterpret_cast(&opt); + volatile int crash_val = p->data[0]; + (void) crash_val; +} + +void test_repoison_after_reset() { + std::optional opt; + opt.emplace(LargePayload{1, 1, 1, 1}); + opt.reset(); + + auto* p = reinterpret_cast(&opt); + volatile int crash_val = p->data[0]; + (void) crash_val; +} + +int main() { + test_activation_unpoisoning(); + test_assignment_unpoisoning(); + test_poison_on_empty_access(); + test_repoison_after_reset(); + + return 0; +} From ca0aa137ae5345cfef1887cd3fd49c9ccbeb2b1d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=96zg=C3=BCr?= Date: Wed, 14 Jan 2026 03:06:45 +0300 Subject: [PATCH 2/6] fix poison tests --- tests/std/tests/GH_005974_optional_asan/test.cpp | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/tests/std/tests/GH_005974_optional_asan/test.cpp b/tests/std/tests/GH_005974_optional_asan/test.cpp index c4150005dd5..fe6d3ca665a 100644 --- a/tests/std/tests/GH_005974_optional_asan/test.cpp +++ b/tests/std/tests/GH_005974_optional_asan/test.cpp @@ -23,9 +23,8 @@ void test_assignment_unpoisoning() { void test_poison_on_empty_access() { std::optional opt; - auto* p = reinterpret_cast(&opt); - volatile int crash_val = p->data[0]; - (void) crash_val; + volatile int x = opt->data[0]; + (void) x; } void test_repoison_after_reset() { @@ -33,9 +32,8 @@ void test_repoison_after_reset() { opt.emplace(LargePayload{1, 1, 1, 1}); opt.reset(); - auto* p = reinterpret_cast(&opt); - volatile int crash_val = p->data[0]; - (void) crash_val; + volatile int x = opt->data[0]; + (void) x; } int main() { From 2f78a66a1bcf748babb938c82e0b6f16591fc46a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=96zg=C3=BCr?= Date: Wed, 14 Jan 2026 15:15:25 +0300 Subject: [PATCH 3/6] use __asan_address_is_poisoned in tests --- .../tests/GH_005974_optional_asan/test.cpp | 54 +++++++++++-------- 1 file changed, 32 insertions(+), 22 deletions(-) diff --git a/tests/std/tests/GH_005974_optional_asan/test.cpp b/tests/std/tests/GH_005974_optional_asan/test.cpp index fe6d3ca665a..ed6dba5f08b 100644 --- a/tests/std/tests/GH_005974_optional_asan/test.cpp +++ b/tests/std/tests/GH_005974_optional_asan/test.cpp @@ -1,45 +1,55 @@ // Copyright (c) Microsoft Corporation. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +#include <__msvc_sanitizer_annotate_container.hpp> #include #include -struct LargePayload { - int data[4]; +#ifdef __SANITIZE_ADDRESS__ +extern "C" int __cdecl __asan_address_is_poisoned(void const volatile* addr); +#define ASAN_VERIFY_POISONED(addr) assert(__asan_address_is_poisoned((addr)) != 0) +#define ASAN_VERIFY_UNPOISONED(addr) assert(__asan_address_is_poisoned((addr)) == 0) +#else +#define ASAN_VERIFY_POISONED(addr) +#define ASAN_VERIFY_UNPOISONED(addr) +#endif + +struct Payload { + long long x; + long long y; + long long z; + long long w; }; -void test_activation_unpoisoning() { - std::optional opt; - opt.emplace(LargePayload{1, 2, 3, 4}); - assert(opt->data[0] == 1); +void test_poison_on_empty_access() { + std::optional opt; + ASAN_VERIFY_POISONED(reinterpret_cast(&opt)); } -void test_assignment_unpoisoning() { - std::optional opt; - LargePayload val{5, 6, 7, 8}; - opt = val; - assert(opt->data[0] == 5); +void test_emplace_unpoisoning() { + std::optional opt; + opt.emplace(Payload{1, 2, 3, 4}); + ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); } -void test_poison_on_empty_access() { - std::optional opt; - volatile int x = opt->data[0]; - (void) x; +void test_assignment_unpoisoning() { + std::optional opt; + Payload val{1, 2, 3, 4}; + opt = val; + ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); } void test_repoison_after_reset() { - std::optional opt; - opt.emplace(LargePayload{1, 1, 1, 1}); + std::optional opt = Payload{1, 2, 3, 4}; + ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); opt.reset(); - - volatile int x = opt->data[0]; - (void) x; + ASAN_VERIFY_POISONED(reinterpret_cast(&opt)); } int main() { - test_activation_unpoisoning(); - test_assignment_unpoisoning(); test_poison_on_empty_access(); + test_emplace_unpoisoning(); + test_assignment_unpoisoning(); test_repoison_after_reset(); return 0; From aa2197abc0d4304cf5b68fe1c4c89dcdee8e4b9b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=96zg=C3=BCr?= Date: Wed, 14 Jan 2026 16:08:48 +0300 Subject: [PATCH 4/6] fix unused var error in tests --- tests/std/tests/GH_005974_optional_asan/test.cpp | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/tests/std/tests/GH_005974_optional_asan/test.cpp b/tests/std/tests/GH_005974_optional_asan/test.cpp index ed6dba5f08b..7403dc6c7f0 100644 --- a/tests/std/tests/GH_005974_optional_asan/test.cpp +++ b/tests/std/tests/GH_005974_optional_asan/test.cpp @@ -10,8 +10,8 @@ extern "C" int __cdecl __asan_address_is_poisoned(void const volatile* addr); #define ASAN_VERIFY_POISONED(addr) assert(__asan_address_is_poisoned((addr)) != 0) #define ASAN_VERIFY_UNPOISONED(addr) assert(__asan_address_is_poisoned((addr)) == 0) #else -#define ASAN_VERIFY_POISONED(addr) -#define ASAN_VERIFY_UNPOISONED(addr) +#define ASAN_VERIFY_POISONED(addr) ((void) (addr)) +#define ASAN_VERIFY_UNPOISONED(addr) ((void) (addr)) #endif struct Payload { @@ -22,25 +22,24 @@ struct Payload { }; void test_poison_on_empty_access() { - std::optional opt; + [[maybe_unused]] std::optional opt; ASAN_VERIFY_POISONED(reinterpret_cast(&opt)); } void test_emplace_unpoisoning() { std::optional opt; - opt.emplace(Payload{1, 2, 3, 4}); + opt.emplace(Payload()); ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); } void test_assignment_unpoisoning() { - std::optional opt; - Payload val{1, 2, 3, 4}; - opt = val; + std::optional opt = std::nullopt; + opt = Payload(); ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); } void test_repoison_after_reset() { - std::optional opt = Payload{1, 2, 3, 4}; + std::optional opt = Payload(); ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); opt.reset(); ASAN_VERIFY_POISONED(reinterpret_cast(&opt)); From 2b571c3395ccdbeae0433be509f452d774e381bc Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=96zg=C3=BCr?= Date: Thu, 15 Jan 2026 20:18:07 +0300 Subject: [PATCH 5/6] add _is_constant_evaluated and should_annotate checks before annotations --- .../__msvc_sanitizer_annotate_container.hpp | 8 ++++- stl/inc/optional | 32 +++++++++++++------ stl/src/asan.cpp | 5 +-- stl/src/asan_noop.cpp | 5 +-- .../tests/GH_005974_optional_asan/test.cpp | 7 ++-- 5 files changed, 38 insertions(+), 19 deletions(-) diff --git a/stl/inc/__msvc_sanitizer_annotate_container.hpp b/stl/inc/__msvc_sanitizer_annotate_container.hpp index 887d5d7f941..9b03edf07a2 100644 --- a/stl/inc/__msvc_sanitizer_annotate_container.hpp +++ b/stl/inc/__msvc_sanitizer_annotate_container.hpp @@ -159,7 +159,7 @@ extern const bool _Asan_optional_should_annotate; #endif } // extern "C" -#if defined(_INSERT_VECTOR_ANNOTATION) || defined(_INSERT_STRING_ANNOTATION) +#if defined(_INSERT_VECTOR_ANNOTATION) || defined(_INSERT_STRING_ANNOTATION) || defined(_INSERT_OPTIONAL_ANNOTATION) extern "C" { void __cdecl __asan_poison_memory_region(void const volatile* addr, size_t size); void __cdecl __asan_unpoison_memory_region(void const volatile* addr, size_t size); @@ -178,6 +178,8 @@ void __cdecl __sanitizer_annotate_contiguous_container( #pragma comment(linker, "/alternatename:_Asan_vector_should_annotate=_Asan_vector_should_annotate_default") #pragma comment(linker, "/alternatename:#_Asan_string_should_annotate=#_Asan_string_should_annotate_default") #pragma comment(linker, "/alternatename:_Asan_string_should_annotate=_Asan_string_should_annotate_default") +#pragma comment(linker, "/alternatename:#_Asan_optional_should_annotate=#_Asan_optional_should_annotate_default") +#pragma comment(linker, "/alternatename:_Asan_optional_should_annotate=_Asan_optional_should_annotate_default") #elif defined(_M_HYBRID) #pragma comment(linker, \ "/alternatename:#__sanitizer_annotate_contiguous_container=#__sanitizer_annotate_contiguous_container_default") @@ -187,16 +189,20 @@ void __cdecl __sanitizer_annotate_contiguous_container( #pragma comment(linker, "/alternatename:__Asan_vector_should_annotate=__Asan_vector_should_annotate_default") #pragma comment(linker, "/alternatename:#_Asan_string_should_annotate=#_Asan_string_should_annotate_default") #pragma comment(linker, "/alternatename:__Asan_string_should_annotate=__Asan_string_should_annotate_default") +#pragma comment(linker, "/alternatename:#_Asan_optional_should_annotate=#_Asan_optional_should_annotate_default") +#pragma comment(linker, "/alternatename:__Asan_optional_should_annotate=__Asan_optional_should_annotate_default") #elif defined(_M_IX86) #pragma comment(linker, \ "/alternatename:___sanitizer_annotate_contiguous_container=___sanitizer_annotate_contiguous_container_default") #pragma comment(linker, "/alternatename:__Asan_vector_should_annotate=__Asan_vector_should_annotate_default") #pragma comment(linker, "/alternatename:__Asan_string_should_annotate=__Asan_string_should_annotate_default") +#pragma comment(linker, "/alternatename:__Asan_optional_should_annotate=__Asan_optional_should_annotate_default") #elif defined(_M_X64) || defined(_M_ARM64) #pragma comment(linker, \ "/alternatename:__sanitizer_annotate_contiguous_container=__sanitizer_annotate_contiguous_container_default") #pragma comment(linker, "/alternatename:_Asan_vector_should_annotate=_Asan_vector_should_annotate_default") #pragma comment(linker, "/alternatename:_Asan_string_should_annotate=_Asan_string_should_annotate_default") +#pragma comment(linker, "/alternatename:_Asan_optional_should_annotate=_Asan_optional_should_annotate_default") #else // ^^^ known architecture / unknown architecture vvv #error Unknown architecture #endif // ^^^ unknown architecture ^^^ diff --git a/stl/inc/optional b/stl/inc/optional index d312fbdd8ce..6c742c26e4c 100644 --- a/stl/inc/optional +++ b/stl/inc/optional @@ -75,11 +75,13 @@ struct _Optional_destruct_base { // either contains a value of _Ty or is empty ( }; bool _Has_value; - constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { + constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { // initialize an empty optional #ifdef _INSERT_OPTIONAL_ANNOTATION - __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); + if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); + } #endif - } // initialize an empty optional + } template constexpr explicit _Optional_destruct_base(in_place_t, _Types&&... _Args) @@ -99,7 +101,9 @@ struct _Optional_destruct_base { // either contains a value of _Ty or is empty ( _CONSTEXPR20 void reset() noexcept { _Has_value = false; #ifdef _INSERT_OPTIONAL_ANNOTATION - __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); + if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); + } #endif } }; @@ -117,7 +121,9 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o _Value.~_Ty(); #ifdef _INSERT_OPTIONAL_ANNOTATION - __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); + if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); + } #endif #if _MSVC_STL_DESTRUCTOR_TOMBSTONES @@ -129,11 +135,13 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o } } - constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { + constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { // initialize an empty optional #ifdef _INSERT_OPTIONAL_ANNOTATION - __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); + if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); + } #endif - } // initialize an empty optional + } template constexpr explicit _Optional_destruct_base(in_place_t, _Types&&... _Args) @@ -157,7 +165,9 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o _Value.~_Ty(); #ifdef _INSERT_OPTIONAL_ANNOTATION - __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Value)); + if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); + } #endif _Has_value = false; @@ -176,7 +186,9 @@ struct _Optional_construct_base : _Optional_destruct_base<_Ty> { _STL_INTERNAL_CHECK(!this->_Has_value); #ifdef _INSERT_OPTIONAL_ANNOTATION - __asan_unpoison_memory_region(_STD addressof(this->_Value), sizeof(this->_Value)); + if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + __asan_unpoison_memory_region(_STD addressof(this->_Value), sizeof(_Ty)); + } #endif _STD _Construct_in_place(this->_Value, _STD forward<_Types>(_Args)...); diff --git a/stl/src/asan.cpp b/stl/src/asan.cpp index da75de1afcd..e49b05f27f6 100644 --- a/stl/src/asan.cpp +++ b/stl/src/asan.cpp @@ -3,7 +3,8 @@ namespace std { extern "C" { - extern const bool _Asan_string_should_annotate = true; - extern const bool _Asan_vector_should_annotate = true; + extern const bool _Asan_string_should_annotate = true; + extern const bool _Asan_vector_should_annotate = true; + extern const bool _Asan_optional_should_annotate = true; } // extern "C" } // namespace std diff --git a/stl/src/asan_noop.cpp b/stl/src/asan_noop.cpp index fda89488c80..773ca3880fa 100644 --- a/stl/src/asan_noop.cpp +++ b/stl/src/asan_noop.cpp @@ -2,8 +2,9 @@ // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception extern "C" { -extern const bool _Asan_string_should_annotate_default = false; -extern const bool _Asan_vector_should_annotate_default = false; +extern const bool _Asan_string_should_annotate_default = false; +extern const bool _Asan_vector_should_annotate_default = false; +extern const bool _Asan_optional_should_annotate_default = false; void __cdecl __sanitizer_annotate_contiguous_container_default( const void*, const void*, const void*, const void*) noexcept {} diff --git a/tests/std/tests/GH_005974_optional_asan/test.cpp b/tests/std/tests/GH_005974_optional_asan/test.cpp index 7403dc6c7f0..42208e9bfa5 100644 --- a/tests/std/tests/GH_005974_optional_asan/test.cpp +++ b/tests/std/tests/GH_005974_optional_asan/test.cpp @@ -1,7 +1,6 @@ // Copyright (c) Microsoft Corporation. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception -#include <__msvc_sanitizer_annotate_container.hpp> #include #include @@ -28,18 +27,18 @@ void test_poison_on_empty_access() { void test_emplace_unpoisoning() { std::optional opt; - opt.emplace(Payload()); + opt.emplace(); ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); } void test_assignment_unpoisoning() { std::optional opt = std::nullopt; - opt = Payload(); + opt = Payload{}; ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); } void test_repoison_after_reset() { - std::optional opt = Payload(); + std::optional opt = Payload{}; ASAN_VERIFY_UNPOISONED(reinterpret_cast(&opt)); opt.reset(); ASAN_VERIFY_POISONED(reinterpret_cast(&opt)); From 297ab6762c06080467a2cf95c2e0a86324c9b1aa Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=96zg=C3=BCr?= Date: Thu, 15 Jan 2026 20:56:50 +0300 Subject: [PATCH 6/6] add constexpr test --- stl/inc/optional | 12 ++++++------ .../std/tests/GH_005974_optional_asan/test.cpp | 18 ++++++++++++++++++ 2 files changed, 24 insertions(+), 6 deletions(-) diff --git a/stl/inc/optional b/stl/inc/optional index 6c742c26e4c..8a90c37b518 100644 --- a/stl/inc/optional +++ b/stl/inc/optional @@ -77,7 +77,7 @@ struct _Optional_destruct_base { // either contains a value of _Ty or is empty ( constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { // initialize an empty optional #ifdef _INSERT_OPTIONAL_ANNOTATION - if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + if (!_STD _Is_constant_evaluated() && _Asan_optional_should_annotate) { __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); } #endif @@ -101,7 +101,7 @@ struct _Optional_destruct_base { // either contains a value of _Ty or is empty ( _CONSTEXPR20 void reset() noexcept { _Has_value = false; #ifdef _INSERT_OPTIONAL_ANNOTATION - if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + if (!_STD _Is_constant_evaluated() && _Asan_optional_should_annotate) { __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); } #endif @@ -121,7 +121,7 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o _Value.~_Ty(); #ifdef _INSERT_OPTIONAL_ANNOTATION - if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + if (!_STD _Is_constant_evaluated() && _Asan_optional_should_annotate) { __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); } #endif @@ -137,7 +137,7 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o constexpr _Optional_destruct_base() noexcept : _Dummy{}, _Has_value{false} { // initialize an empty optional #ifdef _INSERT_OPTIONAL_ANNOTATION - if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + if (!_STD _Is_constant_evaluated() && _Asan_optional_should_annotate) { __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); } #endif @@ -165,7 +165,7 @@ struct _Optional_destruct_base<_Ty, false> { // either contains a value of _Ty o _Value.~_Ty(); #ifdef _INSERT_OPTIONAL_ANNOTATION - if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + if (!_STD _Is_constant_evaluated() && _Asan_optional_should_annotate) { __asan_poison_memory_region(_STD addressof(_Value), sizeof(_Ty)); } #endif @@ -186,7 +186,7 @@ struct _Optional_construct_base : _Optional_destruct_base<_Ty> { _STL_INTERNAL_CHECK(!this->_Has_value); #ifdef _INSERT_OPTIONAL_ANNOTATION - if (_Asan_optional_should_annotate && !_STD _Is_constant_evaluated()) { + if (!_STD _Is_constant_evaluated() && _Asan_optional_should_annotate) { __asan_unpoison_memory_region(_STD addressof(this->_Value), sizeof(_Ty)); } #endif diff --git a/tests/std/tests/GH_005974_optional_asan/test.cpp b/tests/std/tests/GH_005974_optional_asan/test.cpp index 42208e9bfa5..541ecc07285 100644 --- a/tests/std/tests/GH_005974_optional_asan/test.cpp +++ b/tests/std/tests/GH_005974_optional_asan/test.cpp @@ -44,11 +44,29 @@ void test_repoison_after_reset() { ASAN_VERIFY_POISONED(reinterpret_cast(&opt)); } +constexpr bool test_constexpr() { +#if _HAS_CXX20 + bool res = true; + std::optional opt = std::nullopt; + opt = Payload{}; + opt.reset(); + opt = Payload{86, 0, 0, 0}; + res = opt->x == 86; + opt.emplace(42, 0, 0, 0); + res = res && (opt->x == 42); + return res; +#else + std::optional opt{Payload{86, 0, 0, 0}}; + return opt->x == 86; +#endif +} + int main() { test_poison_on_empty_access(); test_emplace_unpoisoning(); test_assignment_unpoisoning(); test_repoison_after_reset(); + static_assert(test_constexpr(), "constexpr test failed"); return 0; }