[compiler-rt] [asan] Add experimental 'poison_history_size' flag (PR #133175)

Thurston Dang via llvm-commits llvm-commits at lists.llvm.org
Tue Apr 1 16:59:09 PDT 2025


https://github.com/thurstond updated https://github.com/llvm/llvm-project/pull/133175

>From 4cffa15d2349de86fc3ee33d8070360fc2eedfb0 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Wed, 26 Mar 2025 02:43:38 +0000
Subject: [PATCH 01/24] [asan] Add experimental 'track_poison' flag

This adds an experimental flag that will keep track of where the manual
memory poisoning (__asan_poison_memory_region) is called from, and print
the stack trace if the poisoned region is accessed. (Currently, ASan
will tell you what code accessed a poisoned region, but not which code
set the poison.)

This implementation performs best-effort record keeping using ring buffers, as suggested by Vitaly. The size of each ring buffer is set by the track_poison flag value.
Some records may be lost in multi-threaded programs.
---
 compiler-rt/lib/asan/asan_descriptions.h      |  4 +
 compiler-rt/lib/asan/asan_errors.cpp          | 66 ++++++++++++++++-
 compiler-rt/lib/asan/asan_flags.inc           |  3 +
 compiler-rt/lib/asan/asan_poisoning.cpp       | 74 ++++++++++++++++++-
 compiler-rt/lib/asan/asan_poisoning.h         | 49 ++++++++++++
 compiler-rt/lib/asan/asan_rtl.cpp             |  2 +
 .../TestCases/use-after-poison-tracked.cpp    | 47 ++++++++++++
 7 files changed, 240 insertions(+), 5 deletions(-)
 create mode 100644 compiler-rt/test/asan/TestCases/use-after-poison-tracked.cpp

diff --git a/compiler-rt/lib/asan/asan_descriptions.h b/compiler-rt/lib/asan/asan_descriptions.h
index a614f47d461bb..6e23555b35d28 100644
--- a/compiler-rt/lib/asan/asan_descriptions.h
+++ b/compiler-rt/lib/asan/asan_descriptions.h
@@ -15,6 +15,7 @@
 #define ASAN_DESCRIPTIONS_H
 
 #include "asan_allocator.h"
+#include "asan_poisoning.h"
 #include "asan_thread.h"
 #include "sanitizer_common/sanitizer_common.h"
 #include "sanitizer_common/sanitizer_report_decorator.h"
@@ -46,6 +47,9 @@ class Decorator : public __sanitizer::SanitizerCommonDecorator {
   const char *Allocation() { return Magenta(); }
 
   const char *ShadowByte(u8 byte) {
+    if (IsPoisonTrackingMagic(byte))
+      return Blue();
+
     switch (byte) {
       case kAsanHeapLeftRedzoneMagic:
       case kAsanArrayCookieMagic:
diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index 4f112cc5d1bca..d0be3d48172da 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -12,8 +12,10 @@
 //===----------------------------------------------------------------------===//
 
 #include "asan_errors.h"
+
 #include "asan_descriptions.h"
 #include "asan_mapping.h"
+#include "asan_poisoning.h"
 #include "asan_report.h"
 #include "asan_stack.h"
 #include "sanitizer_common/sanitizer_stackdepot.h"
@@ -505,6 +507,19 @@ ErrorGeneric::ErrorGeneric(u32 tid, uptr pc_, uptr bp_, uptr sp_, uptr addr,
           far_from_bounds = AdjacentShadowValuesAreFullyPoisoned(shadow_addr);
           break;
       }
+
+      if (flags()->track_poison > 0 && IsPoisonTrackingMagic(shadow_val)) {
+        if (internal_strcmp(bug_descr, "unknown-crash") != 0) {
+          Printf(
+              "ERROR: use-after-poison tracking magic values overlap with "
+              "other constants.\n");
+          Printf("Please file a bug.\n");
+        } else {
+          bug_descr = "use-after-poison";
+          bug_type_score = 20;
+        }
+      }
+
       scariness.Scare(bug_type_score + read_after_free_bonus, bug_descr);
       if (far_from_bounds) scariness.Scare(10, "far-from-bounds");
     }
@@ -550,8 +565,12 @@ static void PrintLegend(InternalScopedString *str) {
   PrintShadowByte(str, "  Global redzone:          ", kAsanGlobalRedzoneMagic);
   PrintShadowByte(str, "  Global init order:       ",
                   kAsanInitializationOrderMagic);
-  PrintShadowByte(str, "  Poisoned by user:        ",
-                  kAsanUserPoisonedMemoryMagic);
+  // TODO: sync description with PoisonTrackingMagicValues
+  PrintShadowByte(
+      str, "  Poisoned by user:        ", kAsanUserPoisonedMemoryMagic,
+      flags()->track_poison > 0 ? " with detailed tracking using {0x80-0x8F, "
+                                  "0x90-0x9F, 0xD0-0xDF, 0xE0-0xEF}\n"
+                                : "\n");
   PrintShadowByte(str, "  Container overflow:      ",
                   kAsanContiguousContainerOOBMagic);
   PrintShadowByte(str, "  Array cookie:            ",
@@ -600,6 +619,44 @@ static void PrintShadowMemoryForAddress(uptr addr) {
   Printf("%s", str.data());
 }
 
+static void CheckPoisonRecords(uptr addr) {
+  if (!AddrIsInMem(addr))
+    return;
+  uptr shadow_addr = MemToShadow(addr);
+  unsigned char poison_magic = *(reinterpret_cast<u8 *>(shadow_addr));
+  int poison_index = PoisonTrackingMagicToIndex[poison_magic];
+
+  if (poison_index < 0 || poison_index >= NumPoisonTrackingMagicValues)
+    return;
+
+  PoisonRecordRingBuffer *PoisonRecord =
+      reinterpret_cast<PoisonRecordRingBuffer *>(PoisonRecords[poison_index]);
+  if (PoisonRecord) {
+    bool FoundMatch = false;
+
+    for (unsigned int i = 0; i < PoisonRecord->size(); i++) {
+      struct PoisonRecord Record = (*PoisonRecord)[i];
+      if (Record.begin <= addr && addr <= Record.end) {
+        FoundMatch = true;
+
+        StackTrace poison_stack = StackDepotGet(Record.stack_id);
+
+        Printf("\n");
+        Printf("Memory was manually poisoned by thread T%u:\n",
+               Record.thread_id);
+        poison_stack.Print();
+
+        break;
+      }
+    }
+
+    if (!FoundMatch) {
+      Printf("ERROR: no matching poison tracking record found.\n");
+      Printf("Try setting a larger track_poison value.\n");
+    }
+  }
+}
+
 void ErrorGeneric::Print() {
   Decorator d;
   Printf("%s", d.Error());
@@ -623,6 +680,11 @@ void ErrorGeneric::Print() {
     PrintContainerOverflowHint();
   ReportErrorSummary(bug_descr, &stack);
   PrintShadowMemoryForAddress(addr);
+
+  // This uses a range of shadow values, hence it is not convenient to make a
+  // specific error handler.
+  if (flags()->track_poison > 0)
+    CheckPoisonRecords(addr);
 }
 
 }  // namespace __asan
diff --git a/compiler-rt/lib/asan/asan_flags.inc b/compiler-rt/lib/asan/asan_flags.inc
index fad1577d912a5..2e3373f55c887 100644
--- a/compiler-rt/lib/asan/asan_flags.inc
+++ b/compiler-rt/lib/asan/asan_flags.inc
@@ -116,6 +116,9 @@ ASAN_FLAG(bool, poison_partial, true,
           "stack buffers.")
 ASAN_FLAG(bool, poison_array_cookie, true,
           "Poison (or not) the array cookie after operator new[].")
+ASAN_FLAG(int, track_poison, 0,
+          "[EXPERIMENTAL] If non-zero, record the stack trace of manual "
+          "memory poisoning calls.")
 
 // Turn off alloc/dealloc mismatch checker on Mac and Windows for now.
 // https://github.com/google/sanitizers/issues/131
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 762670632f4e0..b65d21fe2ce4c 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -20,11 +20,48 @@
 #include "sanitizer_common/sanitizer_flags.h"
 #include "sanitizer_common/sanitizer_interface_internal.h"
 #include "sanitizer_common/sanitizer_libc.h"
+#include "sanitizer_common/sanitizer_stackdepot.h"
 
 namespace __asan {
 
 static atomic_uint8_t can_poison_memory;
 
+PoisonRecordRingBuffer *PoisonRecords[NumPoisonTrackingMagicValues] = {0};
+int PoisonTrackingMagicToIndex[256] = {-1};
+
+void InitializePoisonTracking() {
+  if (flags()->track_poison <= 0)
+    return;
+
+  for (unsigned int i = 0; i < sizeof(PoisonTrackingMagicToIndex) / sizeof(int);
+       i++) {
+    PoisonTrackingMagicToIndex[i] = -1;
+  }
+
+  for (unsigned int i = 0; i < NumPoisonTrackingMagicValues; i++) {
+    int magic = PoisonTrackingIndexToMagic[i];
+    CHECK(magic > 0);
+    CHECK((unsigned int)magic <
+          sizeof(PoisonTrackingMagicToIndex) / sizeof(int));
+
+    // Necessary for AddressIsPoisoned calculations
+    CHECK((char)magic < 0);
+
+    PoisonTrackingMagicToIndex[magic] = i;
+
+    PoisonRecords[i] = PoisonRecordRingBuffer::New(flags()->track_poison);
+  }
+}
+
+bool IsPoisonTrackingMagic(int byte) {
+  return (byte >= 0 &&
+          (unsigned long)byte <
+              (sizeof(PoisonTrackingMagicToIndex) / sizeof(int)) &&
+          PoisonTrackingMagicToIndex[byte] >= 0 &&
+          PoisonTrackingMagicToIndex[byte] < NumPoisonTrackingMagicValues &&
+          PoisonTrackingIndexToMagic[PoisonTrackingMagicToIndex[byte]] == byte);
+}
+
 void SetCanPoisonMemory(bool value) {
   atomic_store(&can_poison_memory, value, memory_order_release);
 }
@@ -107,6 +144,31 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
   uptr end_addr = beg_addr + size;
   VPrintf(3, "Trying to poison memory region [%p, %p)\n", (void *)beg_addr,
           (void *)end_addr);
+
+  u32 poison_magic = kAsanUserPoisonedMemoryMagic;
+
+  GET_CALLER_PC_BP;
+  GET_STORE_STACK_TRACE_PC_BP(pc, bp);
+  // TODO: garbage collect stacks once they fall off the ring buffer?
+  // StackDepot doesn't currently have a way to delete stacks.
+  u32 stack_id = StackDepotPut(stack);
+
+  if (flags()->track_poison > 0) {
+    u32 current_tid = GetCurrentTidOrInvalid();
+    u32 poison_index = ((stack_id * 151157) ^ (current_tid * 733123)) %
+                       NumPoisonTrackingMagicValues;
+    poison_magic = PoisonTrackingIndexToMagic[poison_index];
+    PoisonRecord record{.stack_id = stack_id,
+                        .thread_id = current_tid,
+                        .begin = beg_addr,
+                        .end = end_addr};
+    // This is racy: with concurrent writes, some records may be lost,
+    // but it's a sacrifice I am willing to make for speed.
+    // The sharding across PoisonRecords reduces the likelihood of
+    // concurrent writes.
+    PoisonRecords[poison_index]->push(record);
+  }
+
   ShadowSegmentEndpoint beg(beg_addr);
   ShadowSegmentEndpoint end(end_addr);
   if (beg.chunk == end.chunk) {
@@ -119,7 +181,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
       if (beg.offset > 0) {
         *beg.chunk = Min(value, beg.offset);
       } else {
-        *beg.chunk = kAsanUserPoisonedMemoryMagic;
+        *beg.chunk = poison_magic;
       }
     }
     return;
@@ -134,10 +196,11 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
     }
     beg.chunk++;
   }
-  REAL(memset)(beg.chunk, kAsanUserPoisonedMemoryMagic, end.chunk - beg.chunk);
+
+  REAL(memset)(beg.chunk, poison_magic, end.chunk - beg.chunk);
   // Poison if byte in end.offset is unaddressable.
   if (end.value > 0 && end.value <= end.offset) {
-    *end.chunk = kAsanUserPoisonedMemoryMagic;
+    *end.chunk = poison_magic;
   }
 }
 
@@ -147,6 +210,11 @@ void __asan_unpoison_memory_region(void const volatile *addr, uptr size) {
   uptr end_addr = beg_addr + size;
   VPrintf(3, "Trying to unpoison memory region [%p, %p)\n", (void *)beg_addr,
           (void *)end_addr);
+
+  // Note: we don't need to update the poison tracking here. Since the shadow
+  // memory will be unpoisoned, the poison tracking ring buffer entries will be
+  // ignored.
+
   ShadowSegmentEndpoint beg(beg_addr);
   ShadowSegmentEndpoint end(end_addr);
   if (beg.chunk == end.chunk) {
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index b68af1086e17d..9c8c5e3a9b72a 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -10,6 +10,8 @@
 //
 // Shadow memory poisoning by ASan RTL and by user application.
 //===----------------------------------------------------------------------===//
+#ifndef ASAN_POISONING_H
+#define ASAN_POISONING_H
 
 #ifndef ASAN_POISONING_H
 #define ASAN_POISONING_H
@@ -19,9 +21,56 @@
 #include "asan_mapping.h"
 #include "sanitizer_common/sanitizer_flags.h"
 #include "sanitizer_common/sanitizer_platform.h"
+#include "sanitizer_common/sanitizer_ring_buffer.h"
+
+// For platforms which support slow unwinder only, we restrict the store context
+// size to 1, basically only storing the current pc. We do this because the slow
+// unwinder which is based on libunwind is not async signal safe and causes
+// random freezes in forking applications as well as in signal handlers.
+#define GET_STORE_STACK_TRACE_PC_BP(pc, bp)                            \
+  UNINITIALIZED BufferedStackTrace stack;                              \
+  int max_stack = 16;                                                  \
+  if (!SANITIZER_CAN_FAST_UNWIND)                                      \
+    max_stack = Min(max_stack, 1);                                     \
+  stack.Unwind(pc, bp, nullptr, common_flags()->fast_unwind_on_malloc, \
+               max_stack);
+
+#define GET_STORE_STACK_TRACE \
+  GET_STORE_STACK_TRACE_PC_BP(StackTrace::GetCurrentPc(), GET_CURRENT_FRAME())
 
 namespace __asan {
 
+// These need to be negative chars (i.e., in the range [0x80 .. 0xff]) for
+// AddressIsPoisoned calculations.
+static const int PoisonTrackingIndexToMagic[] = {
+    0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a,
+    0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, 0x91, 0x92, 0x93, 0x94, 0x95,
+    0x96, 0x97, 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, 0xd0,
+    0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 0xd9, 0xda, 0xdb,
+    0xdc, 0xdd, 0xde, 0xdf, 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6,
+    0xe7, 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef,
+};
+static const int NumPoisonTrackingMagicValues =
+    sizeof(PoisonTrackingIndexToMagic) / sizeof(int);
+
+extern int PoisonTrackingMagicToIndex[256];
+
+struct PoisonRecord {
+  unsigned int stack_id;
+  unsigned int thread_id;
+  uptr begin;
+  uptr end;
+};
+
+typedef RingBuffer<struct PoisonRecord> PoisonRecordRingBuffer;
+extern PoisonRecordRingBuffer* PoisonRecords[NumPoisonTrackingMagicValues];
+
+// Set up data structures for track_poison.
+void InitializePoisonTracking();
+
+// Is this number a magic value used for poison tracking?
+bool IsPoisonTrackingMagic(int byte);
+
 // Enable/disable memory poisoning.
 void SetCanPoisonMemory(bool value);
 bool CanPoisonMemory();
diff --git a/compiler-rt/lib/asan/asan_rtl.cpp b/compiler-rt/lib/asan/asan_rtl.cpp
index b3f6677a99cfb..44cdc2a08c461 100644
--- a/compiler-rt/lib/asan/asan_rtl.cpp
+++ b/compiler-rt/lib/asan/asan_rtl.cpp
@@ -472,6 +472,8 @@ static bool AsanInitInternal() {
   allocator_options.SetFrom(flags(), common_flags());
   InitializeAllocator(allocator_options);
 
+  InitializePoisonTracking();
+
   if (SANITIZER_START_BACKGROUND_THREAD_IN_ASAN_INTERNAL)
     MaybeStartBackgroudThread();
 
diff --git a/compiler-rt/test/asan/TestCases/use-after-poison-tracked.cpp b/compiler-rt/test/asan/TestCases/use-after-poison-tracked.cpp
new file mode 100644
index 0000000000000..c4167279f5164
--- /dev/null
+++ b/compiler-rt/test/asan/TestCases/use-after-poison-tracked.cpp
@@ -0,0 +1,47 @@
+// Check that __asan_poison_memory_region and ASAN_OPTIONS=track_poison work.
+//
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=track_poison=1000 not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-A
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=track_poison=1000     %run %t 20    2>&1 | FileCheck %s --check-prefixes=CHECK-B
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=track_poison=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-C
+
+#include <stdio.h>
+#include <stdlib.h>
+
+extern "C" void __asan_poison_memory_region(void *, size_t);
+extern "C" void __asan_unpoison_memory_region(void *, size_t);
+
+void novichok(char *x) {
+  __asan_poison_memory_region(x, 64);       // A
+  __asan_unpoison_memory_region(x + 16, 8); // B
+  __asan_poison_memory_region(x + 24, 16);  // C
+}
+
+void fsb(char *x) { novichok(x); }
+
+int main(int argc, char **argv) {
+  char *x = new char[64];
+  x[10] = 0;
+  fsb(x);
+  // Bytes [ 0, 15]: poisoned by A
+  // Bytes [16, 23]: unpoisoned by B
+  // Bytes [24, 63]: poisoned by C
+
+  int res = x[argc * 10]; // BOOOM
+  // CHECK-AC: ERROR: AddressSanitizer: use-after-poison
+  // CHECK-AC: main{{.*}}use-after-poison-tracked.cpp:[[@LINE-2]]
+  // CHECK-B-NOT: ERROR: AddressSanitizer: use-after-poison
+
+  // CHECK-AC: Memory was manually poisoned by thread T0:
+  // CHECK-A: novichok{{.*}}use-after-poison-tracked.cpp:[[@LINE-21]]
+  // CHECK-C: novichok{{.*}}use-after-poison-tracked.cpp:[[@LINE-20]]
+  // CHECK-AC: fsb{{.*}}use-after-poison-tracked.cpp:[[@LINE-18]]
+  // CHECK-AC: main{{.*}}use-after-poison-tracked.cpp:[[@LINE-14]]
+  // CHECK-B-NOT: Memory was manually poisoned by thread T0:
+
+  delete[] x;
+
+  printf("End of program reached\n");
+  // CHECK-B: End of program reached
+
+  return 0;
+}

>From 1c42b53184d53a48718d22dbb63fd59a14da35f9 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Wed, 26 Mar 2025 23:14:06 +0000
Subject: [PATCH 02/24] Use GET_STACK_TRACE (and only use it if track_poison is
 enabled)

---
 compiler-rt/lib/asan/asan_poisoning.cpp | 13 ++++++-------
 compiler-rt/lib/asan/asan_poisoning.h   | 15 ---------------
 2 files changed, 6 insertions(+), 22 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index b65d21fe2ce4c..ef2640fa0f59a 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -147,13 +147,12 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
 
   u32 poison_magic = kAsanUserPoisonedMemoryMagic;
 
-  GET_CALLER_PC_BP;
-  GET_STORE_STACK_TRACE_PC_BP(pc, bp);
-  // TODO: garbage collect stacks once they fall off the ring buffer?
-  // StackDepot doesn't currently have a way to delete stacks.
-  u32 stack_id = StackDepotPut(stack);
-
   if (flags()->track_poison > 0) {
+    GET_STACK_TRACE(/*max_size=*/ 16, /*fast=*/ false);
+    // TODO: garbage collect stacks once they fall off the ring buffer?
+    // StackDepot doesn't currently have a way to delete stacks.
+    u32 stack_id = StackDepotPut(stack);
+
     u32 current_tid = GetCurrentTidOrInvalid();
     u32 poison_index = ((stack_id * 151157) ^ (current_tid * 733123)) %
                        NumPoisonTrackingMagicValues;
@@ -162,7 +161,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
                         .thread_id = current_tid,
                         .begin = beg_addr,
                         .end = end_addr};
-    // This is racy: with concurrent writes, some records may be lost,
+    // This is a data race: with concurrent writes, some records may be lost,
     // but it's a sacrifice I am willing to make for speed.
     // The sharding across PoisonRecords reduces the likelihood of
     // concurrent writes.
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index 9c8c5e3a9b72a..310d6a578f8d7 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -23,21 +23,6 @@
 #include "sanitizer_common/sanitizer_platform.h"
 #include "sanitizer_common/sanitizer_ring_buffer.h"
 
-// For platforms which support slow unwinder only, we restrict the store context
-// size to 1, basically only storing the current pc. We do this because the slow
-// unwinder which is based on libunwind is not async signal safe and causes
-// random freezes in forking applications as well as in signal handlers.
-#define GET_STORE_STACK_TRACE_PC_BP(pc, bp)                            \
-  UNINITIALIZED BufferedStackTrace stack;                              \
-  int max_stack = 16;                                                  \
-  if (!SANITIZER_CAN_FAST_UNWIND)                                      \
-    max_stack = Min(max_stack, 1);                                     \
-  stack.Unwind(pc, bp, nullptr, common_flags()->fast_unwind_on_malloc, \
-               max_stack);
-
-#define GET_STORE_STACK_TRACE \
-  GET_STORE_STACK_TRACE_PC_BP(StackTrace::GetCurrentPc(), GET_CURRENT_FRAME())
-
 namespace __asan {
 
 // These need to be negative chars (i.e., in the range [0x80 .. 0xff]) for

>From 32a8dda11179fb56929b28d0a022613b434db9e7 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 16:11:58 +0000
Subject: [PATCH 03/24] Single poison value

---
 compiler-rt/lib/asan/asan_descriptions.h |  4 ---
 compiler-rt/lib/asan/asan_errors.cpp     | 26 +++-----------
 compiler-rt/lib/asan/asan_poisoning.cpp  | 44 +++++-------------------
 compiler-rt/lib/asan/asan_poisoning.h    | 21 ++---------
 4 files changed, 14 insertions(+), 81 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_descriptions.h b/compiler-rt/lib/asan/asan_descriptions.h
index 6e23555b35d28..a614f47d461bb 100644
--- a/compiler-rt/lib/asan/asan_descriptions.h
+++ b/compiler-rt/lib/asan/asan_descriptions.h
@@ -15,7 +15,6 @@
 #define ASAN_DESCRIPTIONS_H
 
 #include "asan_allocator.h"
-#include "asan_poisoning.h"
 #include "asan_thread.h"
 #include "sanitizer_common/sanitizer_common.h"
 #include "sanitizer_common/sanitizer_report_decorator.h"
@@ -47,9 +46,6 @@ class Decorator : public __sanitizer::SanitizerCommonDecorator {
   const char *Allocation() { return Magenta(); }
 
   const char *ShadowByte(u8 byte) {
-    if (IsPoisonTrackingMagic(byte))
-      return Blue();
-
     switch (byte) {
       case kAsanHeapLeftRedzoneMagic:
       case kAsanArrayCookieMagic:
diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index d0be3d48172da..fbc1c4bd035ae 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -508,18 +508,6 @@ ErrorGeneric::ErrorGeneric(u32 tid, uptr pc_, uptr bp_, uptr sp_, uptr addr,
           break;
       }
 
-      if (flags()->track_poison > 0 && IsPoisonTrackingMagic(shadow_val)) {
-        if (internal_strcmp(bug_descr, "unknown-crash") != 0) {
-          Printf(
-              "ERROR: use-after-poison tracking magic values overlap with "
-              "other constants.\n");
-          Printf("Please file a bug.\n");
-        } else {
-          bug_descr = "use-after-poison";
-          bug_type_score = 20;
-        }
-      }
-
       scariness.Scare(bug_type_score + read_after_free_bonus, bug_descr);
       if (far_from_bounds) scariness.Scare(10, "far-from-bounds");
     }
@@ -565,12 +553,8 @@ static void PrintLegend(InternalScopedString *str) {
   PrintShadowByte(str, "  Global redzone:          ", kAsanGlobalRedzoneMagic);
   PrintShadowByte(str, "  Global init order:       ",
                   kAsanInitializationOrderMagic);
-  // TODO: sync description with PoisonTrackingMagicValues
-  PrintShadowByte(
-      str, "  Poisoned by user:        ", kAsanUserPoisonedMemoryMagic,
-      flags()->track_poison > 0 ? " with detailed tracking using {0x80-0x8F, "
-                                  "0x90-0x9F, 0xD0-0xDF, 0xE0-0xEF}\n"
-                                : "\n");
+  PrintShadowByte(str, "  Poisoned by user:        ",
+                  kAsanUserPoisonedMemoryMagic);
   PrintShadowByte(str, "  Container overflow:      ",
                   kAsanContiguousContainerOOBMagic);
   PrintShadowByte(str, "  Array cookie:            ",
@@ -624,13 +608,11 @@ static void CheckPoisonRecords(uptr addr) {
     return;
   uptr shadow_addr = MemToShadow(addr);
   unsigned char poison_magic = *(reinterpret_cast<u8 *>(shadow_addr));
-  int poison_index = PoisonTrackingMagicToIndex[poison_magic];
 
-  if (poison_index < 0 || poison_index >= NumPoisonTrackingMagicValues)
+  if (poison_magic != kAsanUserPoisonedMemoryMagic)
     return;
 
-  PoisonRecordRingBuffer *PoisonRecord =
-      reinterpret_cast<PoisonRecordRingBuffer *>(PoisonRecords[poison_index]);
+  PoisonRecordRingBuffer *PoisonRecord = GetPoisonRecord();
   if (PoisonRecord) {
     bool FoundMatch = false;
 
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index ef2640fa0f59a..f5e69c84c5c7b 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -26,40 +26,17 @@ namespace __asan {
 
 static atomic_uint8_t can_poison_memory;
 
-PoisonRecordRingBuffer *PoisonRecords[NumPoisonTrackingMagicValues] = {0};
-int PoisonTrackingMagicToIndex[256] = {-1};
+static PoisonRecordRingBuffer *PoisonRecords = nullptr;
 
 void InitializePoisonTracking() {
   if (flags()->track_poison <= 0)
     return;
 
-  for (unsigned int i = 0; i < sizeof(PoisonTrackingMagicToIndex) / sizeof(int);
-       i++) {
-    PoisonTrackingMagicToIndex[i] = -1;
-  }
-
-  for (unsigned int i = 0; i < NumPoisonTrackingMagicValues; i++) {
-    int magic = PoisonTrackingIndexToMagic[i];
-    CHECK(magic > 0);
-    CHECK((unsigned int)magic <
-          sizeof(PoisonTrackingMagicToIndex) / sizeof(int));
-
-    // Necessary for AddressIsPoisoned calculations
-    CHECK((char)magic < 0);
-
-    PoisonTrackingMagicToIndex[magic] = i;
-
-    PoisonRecords[i] = PoisonRecordRingBuffer::New(flags()->track_poison);
-  }
+  PoisonRecords = PoisonRecordRingBuffer::New(flags()->track_poison);
 }
 
-bool IsPoisonTrackingMagic(int byte) {
-  return (byte >= 0 &&
-          (unsigned long)byte <
-              (sizeof(PoisonTrackingMagicToIndex) / sizeof(int)) &&
-          PoisonTrackingMagicToIndex[byte] >= 0 &&
-          PoisonTrackingMagicToIndex[byte] < NumPoisonTrackingMagicValues &&
-          PoisonTrackingIndexToMagic[PoisonTrackingMagicToIndex[byte]] == byte);
+PoisonRecordRingBuffer* GetPoisonRecord() {
+  return PoisonRecords;
 }
 
 void SetCanPoisonMemory(bool value) {
@@ -149,23 +126,18 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
 
   if (flags()->track_poison > 0) {
     GET_STACK_TRACE(/*max_size=*/ 16, /*fast=*/ false);
+    u32 current_tid = GetCurrentTidOrInvalid();
+
     // TODO: garbage collect stacks once they fall off the ring buffer?
     // StackDepot doesn't currently have a way to delete stacks.
     u32 stack_id = StackDepotPut(stack);
 
-    u32 current_tid = GetCurrentTidOrInvalid();
-    u32 poison_index = ((stack_id * 151157) ^ (current_tid * 733123)) %
-                       NumPoisonTrackingMagicValues;
-    poison_magic = PoisonTrackingIndexToMagic[poison_index];
     PoisonRecord record{.stack_id = stack_id,
                         .thread_id = current_tid,
                         .begin = beg_addr,
                         .end = end_addr};
-    // This is a data race: with concurrent writes, some records may be lost,
-    // but it's a sacrifice I am willing to make for speed.
-    // The sharding across PoisonRecords reduces the likelihood of
-    // concurrent writes.
-    PoisonRecords[poison_index]->push(record);
+    // TODO: mutex
+    GetPoisonRecord()->push(record);
   }
 
   ShadowSegmentEndpoint beg(beg_addr);
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index 310d6a578f8d7..bc968a1f8a38b 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -25,21 +25,6 @@
 
 namespace __asan {
 
-// These need to be negative chars (i.e., in the range [0x80 .. 0xff]) for
-// AddressIsPoisoned calculations.
-static const int PoisonTrackingIndexToMagic[] = {
-    0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a,
-    0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, 0x91, 0x92, 0x93, 0x94, 0x95,
-    0x96, 0x97, 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, 0xd0,
-    0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7, 0xd8, 0xd9, 0xda, 0xdb,
-    0xdc, 0xdd, 0xde, 0xdf, 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6,
-    0xe7, 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef,
-};
-static const int NumPoisonTrackingMagicValues =
-    sizeof(PoisonTrackingIndexToMagic) / sizeof(int);
-
-extern int PoisonTrackingMagicToIndex[256];
-
 struct PoisonRecord {
   unsigned int stack_id;
   unsigned int thread_id;
@@ -47,14 +32,12 @@ struct PoisonRecord {
   uptr end;
 };
 
-typedef RingBuffer<struct PoisonRecord> PoisonRecordRingBuffer;
-extern PoisonRecordRingBuffer* PoisonRecords[NumPoisonTrackingMagicValues];
+using PoisonRecordRingBuffer = RingBuffer<struct PoisonRecord>;
 
 // Set up data structures for track_poison.
 void InitializePoisonTracking();
 
-// Is this number a magic value used for poison tracking?
-bool IsPoisonTrackingMagic(int byte);
+PoisonRecordRingBuffer* GetPoisonRecord();
 
 // Enable/disable memory poisoning.
 void SetCanPoisonMemory(bool value);

>From f0800219e61d248a31b6867e01f6cd004201b39a Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 16:26:56 +0000
Subject: [PATCH 04/24] Add mutex

---
 compiler-rt/lib/asan/asan_errors.cpp    |  3 ++-
 compiler-rt/lib/asan/asan_poisoning.cpp | 13 ++++++++++---
 compiler-rt/lib/asan/asan_poisoning.h   |  4 +++-
 3 files changed, 15 insertions(+), 5 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index fbc1c4bd035ae..44856a659f249 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -612,7 +612,7 @@ static void CheckPoisonRecords(uptr addr) {
   if (poison_magic != kAsanUserPoisonedMemoryMagic)
     return;
 
-  PoisonRecordRingBuffer *PoisonRecord = GetPoisonRecord();
+  PoisonRecordRingBuffer *PoisonRecord = AcquirePoisonRecords();
   if (PoisonRecord) {
     bool FoundMatch = false;
 
@@ -637,6 +637,7 @@ static void CheckPoisonRecords(uptr addr) {
       Printf("Try setting a larger track_poison value.\n");
     }
   }
+  ReleasePoisonRecords();
 }
 
 void ErrorGeneric::Print() {
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index f5e69c84c5c7b..9c2e08303a989 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -26,6 +26,7 @@ namespace __asan {
 
 static atomic_uint8_t can_poison_memory;
 
+static Mutex PoisonRecordsMutex;
 static PoisonRecordRingBuffer *PoisonRecords = nullptr;
 
 void InitializePoisonTracking() {
@@ -35,10 +36,16 @@ void InitializePoisonTracking() {
   PoisonRecords = PoisonRecordRingBuffer::New(flags()->track_poison);
 }
 
-PoisonRecordRingBuffer* GetPoisonRecord() {
+PoisonRecordRingBuffer* SANITIZER_ACQUIRE(PoisonRecordsMutex) AcquirePoisonRecords() {
+  PoisonRecordsMutex.Lock();
+
   return PoisonRecords;
 }
 
+void SANITIZER_RELEASE(PoisonRecordsMutex) ReleasePoisonRecords() {
+  PoisonRecordsMutex.Unlock();
+}
+
 void SetCanPoisonMemory(bool value) {
   atomic_store(&can_poison_memory, value, memory_order_release);
 }
@@ -136,8 +143,8 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
                         .thread_id = current_tid,
                         .begin = beg_addr,
                         .end = end_addr};
-    // TODO: mutex
-    GetPoisonRecord()->push(record);
+    AcquirePoisonRecords()->push(record);
+    ReleasePoisonRecords();
   }
 
   ShadowSegmentEndpoint beg(beg_addr);
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index bc968a1f8a38b..ae941fa8b43c7 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -10,6 +10,7 @@
 //
 // Shadow memory poisoning by ASan RTL and by user application.
 //===----------------------------------------------------------------------===//
+
 #ifndef ASAN_POISONING_H
 #define ASAN_POISONING_H
 
@@ -37,7 +38,8 @@ using PoisonRecordRingBuffer = RingBuffer<struct PoisonRecord>;
 // Set up data structures for track_poison.
 void InitializePoisonTracking();
 
-PoisonRecordRingBuffer* GetPoisonRecord();
+PoisonRecordRingBuffer* AcquirePoisonRecords();
+void ReleasePoisonRecords();
 
 // Enable/disable memory poisoning.
 void SetCanPoisonMemory(bool value);

>From 7882b797fe0c8bac4e3674266f2f3627714b0441 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 16:28:12 +0000
Subject: [PATCH 05/24] clang-format

---
 compiler-rt/lib/asan/asan_errors.cpp    | 4 ++--
 compiler-rt/lib/asan/asan_poisoning.cpp | 3 ++-
 2 files changed, 4 insertions(+), 3 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index 44856a659f249..5a99eabe1716d 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -553,8 +553,8 @@ static void PrintLegend(InternalScopedString *str) {
   PrintShadowByte(str, "  Global redzone:          ", kAsanGlobalRedzoneMagic);
   PrintShadowByte(str, "  Global init order:       ",
                   kAsanInitializationOrderMagic);
-  PrintShadowByte(str, "  Poisoned by user:        ",
-                  kAsanUserPoisonedMemoryMagic);
+  PrintShadowByte(str,
+                  "  Poisoned by user:        ", kAsanUserPoisonedMemoryMagic);
   PrintShadowByte(str, "  Container overflow:      ",
                   kAsanContiguousContainerOOBMagic);
   PrintShadowByte(str, "  Array cookie:            ",
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 9c2e08303a989..a7f8473432635 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -36,7 +36,8 @@ void InitializePoisonTracking() {
   PoisonRecords = PoisonRecordRingBuffer::New(flags()->track_poison);
 }
 
-PoisonRecordRingBuffer* SANITIZER_ACQUIRE(PoisonRecordsMutex) AcquirePoisonRecords() {
+PoisonRecordRingBuffer *SANITIZER_ACQUIRE(PoisonRecordsMutex)
+    AcquirePoisonRecords() {
   PoisonRecordsMutex.Lock();
 
   return PoisonRecords;

>From 5db5a536e102c3d953f0fd22134e02ec13ea53a1 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 16:31:16 +0000
Subject: [PATCH 06/24] Cleanup

---
 compiler-rt/lib/asan/asan_errors.cpp  | 10 ++++------
 compiler-rt/lib/asan/asan_poisoning.h |  3 ---
 2 files changed, 4 insertions(+), 9 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index 5a99eabe1716d..f697f238b60e6 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -12,7 +12,6 @@
 //===----------------------------------------------------------------------===//
 
 #include "asan_errors.h"
-
 #include "asan_descriptions.h"
 #include "asan_mapping.h"
 #include "asan_poisoning.h"
@@ -118,7 +117,7 @@ void ErrorFreeNotMalloced::Print() {
 
 void ErrorAllocTypeMismatch::Print() {
   static const char *alloc_names[] = {"INVALID", "malloc", "operator new",
-                                      "operator new []"};
+.                                      "operator new []"};
   static const char *dealloc_names[] = {"INVALID", "free", "operator delete",
                                         "operator delete []"};
   CHECK_NE(alloc_type, dealloc_type);
@@ -553,8 +552,8 @@ static void PrintLegend(InternalScopedString *str) {
   PrintShadowByte(str, "  Global redzone:          ", kAsanGlobalRedzoneMagic);
   PrintShadowByte(str, "  Global init order:       ",
                   kAsanInitializationOrderMagic);
-  PrintShadowByte(str,
-                  "  Poisoned by user:        ", kAsanUserPoisonedMemoryMagic);
+  PrintShadowByte(str, "  Poisoned by user:        ",
+                  kAsanUserPoisonedMemoryMagic);
   PrintShadowByte(str, "  Container overflow:      ",
                   kAsanContiguousContainerOOBMagic);
   PrintShadowByte(str, "  Array cookie:            ",
@@ -664,8 +663,7 @@ void ErrorGeneric::Print() {
   ReportErrorSummary(bug_descr, &stack);
   PrintShadowMemoryForAddress(addr);
 
-  // This uses a range of shadow values, hence it is not convenient to make a
-  // specific error handler.
+  // This is an experimental flag, hence we don't make a special handler.
   if (flags()->track_poison > 0)
     CheckPoisonRecords(addr);
 }
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index ae941fa8b43c7..a672cf7333c73 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -14,9 +14,6 @@
 #ifndef ASAN_POISONING_H
 #define ASAN_POISONING_H
 
-#ifndef ASAN_POISONING_H
-#define ASAN_POISONING_H
-
 #include "asan_interceptors.h"
 #include "asan_internal.h"
 #include "asan_mapping.h"

>From c17cb524d93ac2b0107d85555fb4268b2389ecad Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 16:32:51 +0000
Subject: [PATCH 07/24] Simplify

---
 compiler-rt/lib/asan/asan_errors.cpp    | 3 +--
 compiler-rt/lib/asan/asan_poisoning.cpp | 6 ++----
 2 files changed, 3 insertions(+), 6 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index f697f238b60e6..8e74ef62c70ca 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -117,7 +117,7 @@ void ErrorFreeNotMalloced::Print() {
 
 void ErrorAllocTypeMismatch::Print() {
   static const char *alloc_names[] = {"INVALID", "malloc", "operator new",
-.                                      "operator new []"};
+                                      "operator new []"};
   static const char *dealloc_names[] = {"INVALID", "free", "operator delete",
                                         "operator delete []"};
   CHECK_NE(alloc_type, dealloc_type);
@@ -506,7 +506,6 @@ ErrorGeneric::ErrorGeneric(u32 tid, uptr pc_, uptr bp_, uptr sp_, uptr addr,
           far_from_bounds = AdjacentShadowValuesAreFullyPoisoned(shadow_addr);
           break;
       }
-
       scariness.Scare(bug_type_score + read_after_free_bonus, bug_descr);
       if (far_from_bounds) scariness.Scare(10, "far-from-bounds");
     }
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index a7f8473432635..06d63483345b8 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -130,8 +130,6 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
   VPrintf(3, "Trying to poison memory region [%p, %p)\n", (void *)beg_addr,
           (void *)end_addr);
 
-  u32 poison_magic = kAsanUserPoisonedMemoryMagic;
-
   if (flags()->track_poison > 0) {
     GET_STACK_TRACE(/*max_size=*/ 16, /*fast=*/ false);
     u32 current_tid = GetCurrentTidOrInvalid();
@@ -160,7 +158,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
       if (beg.offset > 0) {
         *beg.chunk = Min(value, beg.offset);
       } else {
-        *beg.chunk = poison_magic;
+        *beg.chunk = kAsanUserPoisonedMemoryMagic;
       }
     }
     return;
@@ -179,7 +177,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
   REAL(memset)(beg.chunk, poison_magic, end.chunk - beg.chunk);
   // Poison if byte in end.offset is unaddressable.
   if (end.value > 0 && end.value <= end.offset) {
-    *end.chunk = poison_magic;
+    *end.chunk = kAsanUserPoisonedMemoryMagic;
   }
 }
 

>From ae3d17b2a4a9608aec3e45a2fb9c56a3909162a1 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 16:34:09 +0000
Subject: [PATCH 08/24] Typo

---
 compiler-rt/lib/asan/asan_poisoning.cpp | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 06d63483345b8..94a6bc0c04615 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -174,7 +174,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
     beg.chunk++;
   }
 
-  REAL(memset)(beg.chunk, poison_magic, end.chunk - beg.chunk);
+  REAL(memset)(beg.chunk, kAsanUserPoisonedMemoryMagic, end.chunk - beg.chunk);
   // Poison if byte in end.offset is unaddressable.
   if (end.value > 0 && end.value <= end.offset) {
     *end.chunk = kAsanUserPoisonedMemoryMagic;

>From 4abbd69bbe530aea8a4325b948731574a138e1c0 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 16:35:12 +0000
Subject: [PATCH 09/24] Revert added newline

---
 compiler-rt/lib/asan/asan_poisoning.cpp | 1 -
 1 file changed, 1 deletion(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 94a6bc0c04615..e9d42064bb8ce 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -173,7 +173,6 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
     }
     beg.chunk++;
   }
-
   REAL(memset)(beg.chunk, kAsanUserPoisonedMemoryMagic, end.chunk - beg.chunk);
   // Poison if byte in end.offset is unaddressable.
   if (end.value > 0 && end.value <= end.offset) {

>From c0bbb3ea03557062b12a0b3bc893c182e7af79b7 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 17:12:00 +0000
Subject: [PATCH 10/24] clang-format

---
 compiler-rt/lib/asan/asan_poisoning.cpp | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index e9d42064bb8ce..379ca0d0bbee6 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -131,7 +131,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
           (void *)end_addr);
 
   if (flags()->track_poison > 0) {
-    GET_STACK_TRACE(/*max_size=*/ 16, /*fast=*/ false);
+    GET_STACK_TRACE(/*max_size=*/16, /*fast=*/false);
     u32 current_tid = GetCurrentTidOrInvalid();
 
     // TODO: garbage collect stacks once they fall off the ring buffer?

>From f5ec2002a9684f2babbfbe836c1f31f6f7ea4a12 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Thu, 27 Mar 2025 17:34:02 +0000
Subject: [PATCH 11/24] clang-format

---
 compiler-rt/lib/asan/asan_errors.cpp | 1 +
 1 file changed, 1 insertion(+)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index 8e74ef62c70ca..459b4aecb7bb5 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -12,6 +12,7 @@
 //===----------------------------------------------------------------------===//
 
 #include "asan_errors.h"
+
 #include "asan_descriptions.h"
 #include "asan_mapping.h"
 #include "asan_poisoning.h"

>From a93e41c1378b924b61d13c1e4af391e69f9b1586 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 19:28:08 +0000
Subject: [PATCH 12/24] Poison record API

---
 compiler-rt/lib/asan/asan_errors.cpp    | 36 ++++++++-----------------
 compiler-rt/lib/asan/asan_poisoning.cpp | 31 +++++++++++++++++++--
 compiler-rt/lib/asan/asan_poisoning.h   | 13 +++++----
 3 files changed, 48 insertions(+), 32 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index 459b4aecb7bb5..2a26354a1906f 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -611,32 +611,18 @@ static void CheckPoisonRecords(uptr addr) {
   if (poison_magic != kAsanUserPoisonedMemoryMagic)
     return;
 
-  PoisonRecordRingBuffer *PoisonRecord = AcquirePoisonRecords();
-  if (PoisonRecord) {
-    bool FoundMatch = false;
-
-    for (unsigned int i = 0; i < PoisonRecord->size(); i++) {
-      struct PoisonRecord Record = (*PoisonRecord)[i];
-      if (Record.begin <= addr && addr <= Record.end) {
-        FoundMatch = true;
-
-        StackTrace poison_stack = StackDepotGet(Record.stack_id);
-
-        Printf("\n");
-        Printf("Memory was manually poisoned by thread T%u:\n",
-               Record.thread_id);
-        poison_stack.Print();
-
-        break;
-      }
-    }
-
-    if (!FoundMatch) {
-      Printf("ERROR: no matching poison tracking record found.\n");
-      Printf("Try setting a larger track_poison value.\n");
-    }
+  struct PoisonRecord record;
+  if (FindPoisonRecord(addr, record)) {
+    StackTrace poison_stack = StackDepotGet(record.stack_id);
+
+    Printf("\n");
+    Printf("Memory was manually poisoned by thread T%u:\n",
+           record.thread_id);
+    poison_stack.Print();
+  } else {
+    Printf("ERROR: no matching poison tracking record found.\n");
+    Printf("Try setting a larger track_poison value.\n");
   }
-  ReleasePoisonRecords();
 }
 
 void ErrorGeneric::Print() {
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 379ca0d0bbee6..babd6388e8bf2 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -26,6 +26,8 @@ namespace __asan {
 
 static atomic_uint8_t can_poison_memory;
 
+using PoisonRecordRingBuffer = RingBuffer<struct PoisonRecord>;
+
 static Mutex PoisonRecordsMutex;
 static PoisonRecordRingBuffer *PoisonRecords = nullptr;
 
@@ -36,6 +38,7 @@ void InitializePoisonTracking() {
   PoisonRecords = PoisonRecordRingBuffer::New(flags()->track_poison);
 }
 
+/*
 PoisonRecordRingBuffer *SANITIZER_ACQUIRE(PoisonRecordsMutex)
     AcquirePoisonRecords() {
   PoisonRecordsMutex.Lock();
@@ -46,6 +49,31 @@ PoisonRecordRingBuffer *SANITIZER_ACQUIRE(PoisonRecordsMutex)
 void SANITIZER_RELEASE(PoisonRecordsMutex) ReleasePoisonRecords() {
   PoisonRecordsMutex.Unlock();
 }
+*/
+
+void AddPoisonRecord(const PoisonRecord& newRecord) {
+  PoisonRecordsMutex.Lock();
+  PoisonRecords->push(newRecord);
+  PoisonRecordsMutex.Unlock();
+}
+
+bool FindPoisonRecord(uptr addr, const PoisonRecord& match) {
+  PoisonRecordsMutex.Lock();
+
+  if (PoisonRecords) {
+    for (unsigned int i = 0; i < PoisonRecords->size(); i++) {
+      struct PoisonRecord record = (*PoisonRecords)[i];
+      if (record.begin <= addr && addr < record.end) {
+        internal_memcpy((void*)&match, (void*)&record, sizeof(struct PoisonRecord));
+        PoisonRecordsMutex.Unlock();
+        return true;
+      }
+    }
+  }
+  PoisonRecordsMutex.Unlock();
+  return false;
+}
+
 
 void SetCanPoisonMemory(bool value) {
   atomic_store(&can_poison_memory, value, memory_order_release);
@@ -142,8 +170,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
                         .thread_id = current_tid,
                         .begin = beg_addr,
                         .end = end_addr};
-    AcquirePoisonRecords()->push(record);
-    ReleasePoisonRecords();
+    AddPoisonRecord(record);
   }
 
   ShadowSegmentEndpoint beg(beg_addr);
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index a672cf7333c73..a268bf285bded 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -23,6 +23,9 @@
 
 namespace __asan {
 
+// Set up data structures for track_poison.
+void InitializePoisonTracking();
+
 struct PoisonRecord {
   unsigned int stack_id;
   unsigned int thread_id;
@@ -30,13 +33,13 @@ struct PoisonRecord {
   uptr end;
 };
 
-using PoisonRecordRingBuffer = RingBuffer<struct PoisonRecord>;
-
-// Set up data structures for track_poison.
-void InitializePoisonTracking();
-
+/*
 PoisonRecordRingBuffer* AcquirePoisonRecords();
 void ReleasePoisonRecords();
+*/
+
+void AddPoisonRecord(const PoisonRecord&);
+bool FindPoisonRecord(uptr addr, const PoisonRecord& match);
 
 // Enable/disable memory poisoning.
 void SetCanPoisonMemory(bool value);

>From b03df8ecb889b0a3860a4c703ea32b0d51b65534 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 20:57:38 +0000
Subject: [PATCH 13/24] Change flag from track_poison to poison_history_size

---
 compiler-rt/lib/asan/asan_errors.cpp          | 12 +++++++++---
 compiler-rt/lib/asan/asan_flags.inc           |  6 +++---
 compiler-rt/lib/asan/asan_poisoning.cpp       | 19 +++----------------
 compiler-rt/lib/asan/asan_poisoning.h         |  5 -----
 ....cpp => use-after-poison-history-size.cpp} | 18 +++++++++---------
 5 files changed, 24 insertions(+), 36 deletions(-)
 rename compiler-rt/test/asan/TestCases/{use-after-poison-tracked.cpp => use-after-poison-history-size.cpp} (51%)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index 2a26354a1906f..93de3a0e17afb 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -603,6 +603,14 @@ static void PrintShadowMemoryForAddress(uptr addr) {
 }
 
 static void CheckPoisonRecords(uptr addr) {
+  Printf("\n");
+
+  if (flags()->poison_history_size <= 0) {
+    Printf("HINT: to identify which code set the poison, try the experimental "
+           "ASAN_OPTIONS=poison_history_size=<size>\n");
+    return;
+  }
+
   if (!AddrIsInMem(addr))
     return;
   uptr shadow_addr = MemToShadow(addr);
@@ -615,7 +623,6 @@ static void CheckPoisonRecords(uptr addr) {
   if (FindPoisonRecord(addr, record)) {
     StackTrace poison_stack = StackDepotGet(record.stack_id);
 
-    Printf("\n");
     Printf("Memory was manually poisoned by thread T%u:\n",
            record.thread_id);
     poison_stack.Print();
@@ -650,8 +657,7 @@ void ErrorGeneric::Print() {
   PrintShadowMemoryForAddress(addr);
 
   // This is an experimental flag, hence we don't make a special handler.
-  if (flags()->track_poison > 0)
-    CheckPoisonRecords(addr);
+  CheckPoisonRecords(addr);
 }
 
 }  // namespace __asan
diff --git a/compiler-rt/lib/asan/asan_flags.inc b/compiler-rt/lib/asan/asan_flags.inc
index 2e3373f55c887..32e6d3405533d 100644
--- a/compiler-rt/lib/asan/asan_flags.inc
+++ b/compiler-rt/lib/asan/asan_flags.inc
@@ -116,9 +116,9 @@ ASAN_FLAG(bool, poison_partial, true,
           "stack buffers.")
 ASAN_FLAG(bool, poison_array_cookie, true,
           "Poison (or not) the array cookie after operator new[].")
-ASAN_FLAG(int, track_poison, 0,
-          "[EXPERIMENTAL] If non-zero, record the stack trace of manual "
-          "memory poisoning calls.")
+ASAN_FLAG(int, poison_history_size, 0,
+          "[EXPERIMENTAL] Number of most recent memory poisoning calls for "
+          "which the stack traces will be recorded.")
 
 // Turn off alloc/dealloc mismatch checker on Mac and Windows for now.
 // https://github.com/google/sanitizers/issues/131
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index babd6388e8bf2..4bd3173bb9f54 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -32,25 +32,12 @@ static Mutex PoisonRecordsMutex;
 static PoisonRecordRingBuffer *PoisonRecords = nullptr;
 
 void InitializePoisonTracking() {
-  if (flags()->track_poison <= 0)
+  if (flags()->poison_history_size <= 0)
     return;
 
-  PoisonRecords = PoisonRecordRingBuffer::New(flags()->track_poison);
+  PoisonRecords = PoisonRecordRingBuffer::New(flags()->poison_history_size);
 }
 
-/*
-PoisonRecordRingBuffer *SANITIZER_ACQUIRE(PoisonRecordsMutex)
-    AcquirePoisonRecords() {
-  PoisonRecordsMutex.Lock();
-
-  return PoisonRecords;
-}
-
-void SANITIZER_RELEASE(PoisonRecordsMutex) ReleasePoisonRecords() {
-  PoisonRecordsMutex.Unlock();
-}
-*/
-
 void AddPoisonRecord(const PoisonRecord& newRecord) {
   PoisonRecordsMutex.Lock();
   PoisonRecords->push(newRecord);
@@ -158,7 +145,7 @@ void __asan_poison_memory_region(void const volatile *addr, uptr size) {
   VPrintf(3, "Trying to poison memory region [%p, %p)\n", (void *)beg_addr,
           (void *)end_addr);
 
-  if (flags()->track_poison > 0) {
+  if (flags()->poison_history_size > 0) {
     GET_STACK_TRACE(/*max_size=*/16, /*fast=*/false);
     u32 current_tid = GetCurrentTidOrInvalid();
 
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index a268bf285bded..1035b1d4c78a5 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -33,11 +33,6 @@ struct PoisonRecord {
   uptr end;
 };
 
-/*
-PoisonRecordRingBuffer* AcquirePoisonRecords();
-void ReleasePoisonRecords();
-*/
-
 void AddPoisonRecord(const PoisonRecord&);
 bool FindPoisonRecord(uptr addr, const PoisonRecord& match);
 
diff --git a/compiler-rt/test/asan/TestCases/use-after-poison-tracked.cpp b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
similarity index 51%
rename from compiler-rt/test/asan/TestCases/use-after-poison-tracked.cpp
rename to compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
index c4167279f5164..c229ecd805682 100644
--- a/compiler-rt/test/asan/TestCases/use-after-poison-tracked.cpp
+++ b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
@@ -1,8 +1,8 @@
-// Check that __asan_poison_memory_region and ASAN_OPTIONS=track_poison work.
+// Check that __asan_poison_memory_region and ASAN_OPTIONS=poison_history_size work.
 //
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=track_poison=1000 not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-A
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=track_poison=1000     %run %t 20    2>&1 | FileCheck %s --check-prefixes=CHECK-B
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=track_poison=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-C
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-A
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000     %run %t 20    2>&1 | FileCheck %s --check-prefixes=CHECK-B
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-C
 
 #include <stdio.h>
 #include <stdlib.h>
@@ -28,14 +28,14 @@ int main(int argc, char **argv) {
 
   int res = x[argc * 10]; // BOOOM
   // CHECK-AC: ERROR: AddressSanitizer: use-after-poison
-  // CHECK-AC: main{{.*}}use-after-poison-tracked.cpp:[[@LINE-2]]
+  // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-2]]
   // CHECK-B-NOT: ERROR: AddressSanitizer: use-after-poison
 
   // CHECK-AC: Memory was manually poisoned by thread T0:
-  // CHECK-A: novichok{{.*}}use-after-poison-tracked.cpp:[[@LINE-21]]
-  // CHECK-C: novichok{{.*}}use-after-poison-tracked.cpp:[[@LINE-20]]
-  // CHECK-AC: fsb{{.*}}use-after-poison-tracked.cpp:[[@LINE-18]]
-  // CHECK-AC: main{{.*}}use-after-poison-tracked.cpp:[[@LINE-14]]
+  // CHECK-A: novichok{{.*}}use-after-poison-history-size.cpp:[[@LINE-21]]
+  // CHECK-C: novichok{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]]
+  // CHECK-AC: fsb{{.*}}use-after-poison-history-size.cpp:[[@LINE-18]]
+  // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-14]]
   // CHECK-B-NOT: Memory was manually poisoned by thread T0:
 
   delete[] x;

>From c94f53ce444998198372d1843a53e74102011221 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 21:08:11 +0000
Subject: [PATCH 14/24] Lazy initialize poison tracking data structure

---
 compiler-rt/lib/asan/asan_errors.cpp    | 11 +++++++----
 compiler-rt/lib/asan/asan_poisoning.cpp |  8 +++-----
 compiler-rt/lib/asan/asan_rtl.cpp       |  2 --
 3 files changed, 10 insertions(+), 11 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index 93de3a0e17afb..b01b0d7948300 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -622,10 +622,13 @@ static void CheckPoisonRecords(uptr addr) {
   struct PoisonRecord record;
   if (FindPoisonRecord(addr, record)) {
     StackTrace poison_stack = StackDepotGet(record.stack_id);
-
-    Printf("Memory was manually poisoned by thread T%u:\n",
-           record.thread_id);
-    poison_stack.Print();
+    if (poison_stack.size == 0) {
+      Printf("ERROR: stack depot did not have a matching stack.\n");
+    } else {
+      Printf("Memory was manually poisoned by thread T%u:\n",
+             record.thread_id);
+      poison_stack.Print();
+    }
   } else {
     Printf("ERROR: no matching poison tracking record found.\n");
     Printf("Try setting a larger track_poison value.\n");
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 4bd3173bb9f54..99b033f8031dd 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -31,15 +31,13 @@ using PoisonRecordRingBuffer = RingBuffer<struct PoisonRecord>;
 static Mutex PoisonRecordsMutex;
 static PoisonRecordRingBuffer *PoisonRecords = nullptr;
 
-void InitializePoisonTracking() {
+void AddPoisonRecord(const PoisonRecord& newRecord) {
   if (flags()->poison_history_size <= 0)
     return;
 
-  PoisonRecords = PoisonRecordRingBuffer::New(flags()->poison_history_size);
-}
-
-void AddPoisonRecord(const PoisonRecord& newRecord) {
   PoisonRecordsMutex.Lock();
+  if (PoisonRecords == nullptr)
+    PoisonRecords = PoisonRecordRingBuffer::New(flags()->poison_history_size);
   PoisonRecords->push(newRecord);
   PoisonRecordsMutex.Unlock();
 }
diff --git a/compiler-rt/lib/asan/asan_rtl.cpp b/compiler-rt/lib/asan/asan_rtl.cpp
index 44cdc2a08c461..b3f6677a99cfb 100644
--- a/compiler-rt/lib/asan/asan_rtl.cpp
+++ b/compiler-rt/lib/asan/asan_rtl.cpp
@@ -472,8 +472,6 @@ static bool AsanInitInternal() {
   allocator_options.SetFrom(flags(), common_flags());
   InitializeAllocator(allocator_options);
 
-  InitializePoisonTracking();
-
   if (SANITIZER_START_BACKGROUND_THREAD_IN_ASAN_INTERNAL)
     MaybeStartBackgroudThread();
 

>From 826d2f287680e59a1aecd880af31e0202fd16b04 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 21:11:26 +0000
Subject: [PATCH 15/24] Fork handler

---
 compiler-rt/lib/asan/asan_poisoning.cpp | 7 +++++++
 compiler-rt/lib/asan/asan_poisoning.h   | 3 +++
 compiler-rt/lib/asan/asan_posix.cpp     | 2 ++
 3 files changed, 12 insertions(+)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 99b033f8031dd..eac3dd0deefb3 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -59,6 +59,13 @@ bool FindPoisonRecord(uptr addr, const PoisonRecord& match) {
   return false;
 }
 
+void SANITIZER_ACQUIRE(PoisonRecordsMutex) AcquirePoisonRecords() {
+  PoisonRecordsMutex.Lock();
+}
+
+void SANITIZER_RELEASE(PoisonRecordsMutex) ReleasePoisonRecords() {
+  PoisonRecordsMutex.Unlock();
+}
 
 void SetCanPoisonMemory(bool value) {
   atomic_store(&can_poison_memory, value, memory_order_release);
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index 1035b1d4c78a5..ead63d04d8708 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -36,6 +36,9 @@ struct PoisonRecord {
 void AddPoisonRecord(const PoisonRecord&);
 bool FindPoisonRecord(uptr addr, const PoisonRecord& match);
 
+void AcquirePoisonRecords();
+void ReleasePoisonRecords();
+
 // Enable/disable memory poisoning.
 void SetCanPoisonMemory(bool value);
 bool CanPoisonMemory();
diff --git a/compiler-rt/lib/asan/asan_posix.cpp b/compiler-rt/lib/asan/asan_posix.cpp
index 39685696a0d0d..af80f011155af 100644
--- a/compiler-rt/lib/asan/asan_posix.cpp
+++ b/compiler-rt/lib/asan/asan_posix.cpp
@@ -158,9 +158,11 @@ static void BeforeFork() {
   __lsan::LockThreads();
   __lsan::LockAllocator();
   StackDepotLockBeforeFork();
+  AcquirePoisonRecords();
 }
 
 static void AfterFork(bool fork_child) {
+  ReleasePoisonRecords();
   StackDepotUnlockAfterFork(fork_child);
   // `_lsan` functions defined regardless of `CAN_SANITIZE_LEAKS` and unlock
   // the stuff we need.

>From 9d07a0ca4218466441fa2c4a03669aa28167705f Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 21:15:49 +0000
Subject: [PATCH 16/24] Use u32

---
 compiler-rt/lib/asan/asan_poisoning.h | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index ead63d04d8708..6043c8965185e 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -27,8 +27,8 @@ namespace __asan {
 void InitializePoisonTracking();
 
 struct PoisonRecord {
-  unsigned int stack_id;
-  unsigned int thread_id;
+  u32 stack_id;
+  u32 thread_id;
   uptr begin;
   uptr end;
 };

>From 140b9192c7a70c9c9a36f8412998f0d3f6c24c14 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 21:24:11 +0000
Subject: [PATCH 17/24] Formatting

---
 compiler-rt/lib/asan/asan_errors.cpp    | 11 ++++---
 compiler-rt/lib/asan/asan_poisoning.cpp | 44 ++++++++++++++-----------
 compiler-rt/lib/asan/asan_poisoning.h   |  2 +-
 3 files changed, 32 insertions(+), 25 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index b01b0d7948300..aa82828f6b0ad 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -606,8 +606,12 @@ static void CheckPoisonRecords(uptr addr) {
   Printf("\n");
 
   if (flags()->poison_history_size <= 0) {
-    Printf("HINT: to identify which code set the poison, try the experimental "
-           "ASAN_OPTIONS=poison_history_size=<size>\n");
+    Printf(
+        "NOTE: the stack trace above identifies the code that *accessed* "
+        "the poisoned memory.\n");
+    Printf(
+        "To identify the code that *poisoned* the memory, try the "
+        "experimental setting ASAN_OPTIONS=poison_history_size=<size>\n");
     return;
   }
 
@@ -625,8 +629,7 @@ static void CheckPoisonRecords(uptr addr) {
     if (poison_stack.size == 0) {
       Printf("ERROR: stack depot did not have a matching stack.\n");
     } else {
-      Printf("Memory was manually poisoned by thread T%u:\n",
-             record.thread_id);
+      Printf("Memory was manually poisoned by thread T%u:\n", record.thread_id);
       poison_stack.Print();
     }
   } else {
diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index eac3dd0deefb3..a20659defacaa 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -24,47 +24,51 @@
 
 namespace __asan {
 
-static atomic_uint8_t can_poison_memory;
-
 using PoisonRecordRingBuffer = RingBuffer<struct PoisonRecord>;
 
-static Mutex PoisonRecordsMutex;
-static PoisonRecordRingBuffer *PoisonRecords = nullptr;
+static atomic_uint8_t can_poison_memory;
+
+static Mutex poison_records_mutex;
+static PoisonRecordRingBuffer *poison_records = nullptr;
 
-void AddPoisonRecord(const PoisonRecord& newRecord) {
+void AddPoisonRecord(const PoisonRecord &new_record) {
   if (flags()->poison_history_size <= 0)
     return;
 
-  PoisonRecordsMutex.Lock();
-  if (PoisonRecords == nullptr)
-    PoisonRecords = PoisonRecordRingBuffer::New(flags()->poison_history_size);
-  PoisonRecords->push(newRecord);
-  PoisonRecordsMutex.Unlock();
+  poison_records_mutex.Lock();
+
+  if (poison_records == nullptr)
+    poison_records = PoisonRecordRingBuffer::New(flags()->poison_history_size);
+
+  poison_records->push(new_record);
+
+  poison_records_mutex.Unlock();
 }
 
 bool FindPoisonRecord(uptr addr, const PoisonRecord& match) {
-  PoisonRecordsMutex.Lock();
+  poison_records_mutex.Lock();
 
-  if (PoisonRecords) {
-    for (unsigned int i = 0; i < PoisonRecords->size(); i++) {
-      struct PoisonRecord record = (*PoisonRecords)[i];
+  if (poison_records) {
+    for (unsigned int i = 0; i < poison_records->size(); i++) {
+      struct PoisonRecord record = (*poison_records)[i];
       if (record.begin <= addr && addr < record.end) {
         internal_memcpy((void*)&match, (void*)&record, sizeof(struct PoisonRecord));
-        PoisonRecordsMutex.Unlock();
+        poison_records_mutex.Unlock();
         return true;
       }
     }
   }
-  PoisonRecordsMutex.Unlock();
+
+  poison_records_mutex.Unlock();
   return false;
 }
 
-void SANITIZER_ACQUIRE(PoisonRecordsMutex) AcquirePoisonRecords() {
-  PoisonRecordsMutex.Lock();
+void SANITIZER_ACQUIRE(poison_records_mutex) AcquirePoisonRecords() {
+  poison_records_mutex.Lock();
 }
 
-void SANITIZER_RELEASE(PoisonRecordsMutex) ReleasePoisonRecords() {
-  PoisonRecordsMutex.Unlock();
+void SANITIZER_RELEASE(poison_records_mutex) ReleasePoisonRecords() {
+  poison_records_mutex.Unlock();
 }
 
 void SetCanPoisonMemory(bool value) {
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index 6043c8965185e..568483c4f7867 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -33,7 +33,7 @@ struct PoisonRecord {
   uptr end;
 };
 
-void AddPoisonRecord(const PoisonRecord&);
+void AddPoisonRecord(const PoisonRecord& new_record);
 bool FindPoisonRecord(uptr addr, const PoisonRecord& match);
 
 void AcquirePoisonRecords();

>From 17e4077b21276777ffd6c9afb7015c3d684be468 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 21:48:21 +0000
Subject: [PATCH 18/24] Humorless test case

---
 .../asan/TestCases/use-after-poison-history-size.cpp | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
index c229ecd805682..7062b28e484c5 100644
--- a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
+++ b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
@@ -10,18 +10,18 @@
 extern "C" void __asan_poison_memory_region(void *, size_t);
 extern "C" void __asan_unpoison_memory_region(void *, size_t);
 
-void novichok(char *x) {
+void i_poisoned_your_memory(char *x) {
   __asan_poison_memory_region(x, 64);       // A
   __asan_unpoison_memory_region(x + 16, 8); // B
   __asan_poison_memory_region(x + 24, 16);  // C
 }
 
-void fsb(char *x) { novichok(x); }
+void foo(char *x) { i_poisoned_your_memory(x); }
 
 int main(int argc, char **argv) {
   char *x = new char[64];
   x[10] = 0;
-  fsb(x);
+  foo(x);
   // Bytes [ 0, 15]: poisoned by A
   // Bytes [16, 23]: unpoisoned by B
   // Bytes [24, 63]: poisoned by C
@@ -32,9 +32,9 @@ int main(int argc, char **argv) {
   // CHECK-B-NOT: ERROR: AddressSanitizer: use-after-poison
 
   // CHECK-AC: Memory was manually poisoned by thread T0:
-  // CHECK-A: novichok{{.*}}use-after-poison-history-size.cpp:[[@LINE-21]]
-  // CHECK-C: novichok{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]]
-  // CHECK-AC: fsb{{.*}}use-after-poison-history-size.cpp:[[@LINE-18]]
+  // CHECK-A: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-21]]
+  // CHECK-C: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]]
+  // CHECK-AC: foo{{.*}}use-after-poison-history-size.cpp:[[@LINE-18]]
   // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-14]]
   // CHECK-B-NOT: Memory was manually poisoned by thread T0:
 

>From 249774b7d8e6e118f5f7cf492d94916ff1621f2a Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 22:06:37 +0000
Subject: [PATCH 19/24] Fix output and improve test

---
 compiler-rt/lib/asan/asan_errors.cpp          | 20 ++++++------
 .../use-after-poison-history-size.cpp         | 31 +++++++++++++------
 2 files changed, 31 insertions(+), 20 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_errors.cpp b/compiler-rt/lib/asan/asan_errors.cpp
index aa82828f6b0ad..a8e195cef3ac0 100644
--- a/compiler-rt/lib/asan/asan_errors.cpp
+++ b/compiler-rt/lib/asan/asan_errors.cpp
@@ -603,6 +603,14 @@ static void PrintShadowMemoryForAddress(uptr addr) {
 }
 
 static void CheckPoisonRecords(uptr addr) {
+  if (!AddrIsInMem(addr))
+    return;
+  uptr shadow_addr = MemToShadow(addr);
+  unsigned char poison_magic = *(reinterpret_cast<u8 *>(shadow_addr));
+
+  if (poison_magic != kAsanUserPoisonedMemoryMagic)
+    return;
+
   Printf("\n");
 
   if (flags()->poison_history_size <= 0) {
@@ -611,18 +619,10 @@ static void CheckPoisonRecords(uptr addr) {
         "the poisoned memory.\n");
     Printf(
         "To identify the code that *poisoned* the memory, try the "
-        "experimental setting ASAN_OPTIONS=poison_history_size=<size>\n");
+        "experimental setting ASAN_OPTIONS=poison_history_size=<size>.\n");
     return;
   }
 
-  if (!AddrIsInMem(addr))
-    return;
-  uptr shadow_addr = MemToShadow(addr);
-  unsigned char poison_magic = *(reinterpret_cast<u8 *>(shadow_addr));
-
-  if (poison_magic != kAsanUserPoisonedMemoryMagic)
-    return;
-
   struct PoisonRecord record;
   if (FindPoisonRecord(addr, record)) {
     StackTrace poison_stack = StackDepotGet(record.stack_id);
@@ -634,7 +634,7 @@ static void CheckPoisonRecords(uptr addr) {
     }
   } else {
     Printf("ERROR: no matching poison tracking record found.\n");
-    Printf("Try setting a larger track_poison value.\n");
+    Printf("Try a larger value for ASAN_OPTIONS=poison_history_size=<size>.\n");
   }
 }
 
diff --git a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
index 7062b28e484c5..5d7e9246555d5 100644
--- a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
+++ b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
@@ -1,8 +1,17 @@
 // Check that __asan_poison_memory_region and ASAN_OPTIONS=poison_history_size work.
 //
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-A
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000     %run %t 20    2>&1 | FileCheck %s --check-prefixes=CHECK-B
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-AC,CHECK-C
+// Poisoned access with history
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACD,CHECK-ABC,CHECK-AC,CHECK-A
+//
+// Not poisoned access
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000     %run %t 20    2>&1 | FileCheck %s --check-prefixes=CHECK-ABC,CHECK-B,CHECK-BD
+//
+// Poisoned access with history (different stack trace)
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-ABC,CHECK-ACD,CHECK-AC,CHECK-C
+//
+// Poisoned access without history
+// RUN: %clangxx_asan -O0 %s -o %t &&                                           not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACD,CHECK-BD,CHECK-D
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=0    not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACD,CHECK-BD,CHECK-D
 
 #include <stdio.h>
 #include <stdlib.h>
@@ -27,16 +36,18 @@ int main(int argc, char **argv) {
   // Bytes [24, 63]: poisoned by C
 
   int res = x[argc * 10]; // BOOOM
-  // CHECK-AC: ERROR: AddressSanitizer: use-after-poison
-  // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-2]]
+  // CHECK-ACD: ERROR: AddressSanitizer: use-after-poison
+  // CHECK-ACD: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-2]]
   // CHECK-B-NOT: ERROR: AddressSanitizer: use-after-poison
+  // CHECK-ABC-NOT: try the experimental setting ASAN_OPTIONS=poison_history_size=
+  // CHECK-D: try the experimental setting ASAN_OPTIONS=poison_history_size=
 
   // CHECK-AC: Memory was manually poisoned by thread T0:
-  // CHECK-A: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-21]]
-  // CHECK-C: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]]
-  // CHECK-AC: foo{{.*}}use-after-poison-history-size.cpp:[[@LINE-18]]
-  // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-14]]
-  // CHECK-B-NOT: Memory was manually poisoned by thread T0:
+  // CHECK-A: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-23]]
+  // CHECK-C: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-22]]
+  // CHECK-AC: foo{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]]
+  // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-16]]
+  // CHECK-BD-NOT: Memory was manually poisoned by thread T0:
 
   delete[] x;
 

>From 19c3dfe5bf747aec09a9f93dd9d4752db6feefb3 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 22:29:53 +0000
Subject: [PATCH 20/24] Add test case of Poisoned access with insufficient
 history

---
 .../use-after-poison-history-size.cpp         | 23 ++++++++++++-------
 1 file changed, 15 insertions(+), 8 deletions(-)

diff --git a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
index 5d7e9246555d5..b44cf84fa2ee1 100644
--- a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
+++ b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
@@ -1,17 +1,20 @@
 // Check that __asan_poison_memory_region and ASAN_OPTIONS=poison_history_size work.
 //
 // Poisoned access with history
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACD,CHECK-ABC,CHECK-AC,CHECK-A
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-ABC,CHECK-AC,CHECK-A
 //
 // Not poisoned access
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000     %run %t 20    2>&1 | FileCheck %s --check-prefixes=CHECK-ABC,CHECK-B,CHECK-BD
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000     %run %t 20    2>&1 | FileCheck %s --check-prefixes=CHECK-ABC,CHECK-B,CHECK-BDE
 //
 // Poisoned access with history (different stack trace)
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-ABC,CHECK-ACD,CHECK-AC,CHECK-C
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1000 not %run %t 30 30 2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-ABC,CHECK-AC,CHECK-C
 //
 // Poisoned access without history
-// RUN: %clangxx_asan -O0 %s -o %t &&                                           not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACD,CHECK-BD,CHECK-D
-// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=0    not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACD,CHECK-BD,CHECK-D
+// RUN: %clangxx_asan -O0 %s -o %t &&                                           not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-BDE,CHECK-D
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=0    not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-BDE,CHECK-D
+
+// Poisoned access with insufficient history
+// RUN: %clangxx_asan -O0 %s -o %t && env ASAN_OPTIONS=poison_history_size=1    not %run %t       2>&1 | FileCheck %s --check-prefixes=CHECK-ACDE,CHECK-BDE,CHECK-E
 
 #include <stdio.h>
 #include <stdlib.h>
@@ -36,8 +39,8 @@ int main(int argc, char **argv) {
   // Bytes [24, 63]: poisoned by C
 
   int res = x[argc * 10]; // BOOOM
-  // CHECK-ACD: ERROR: AddressSanitizer: use-after-poison
-  // CHECK-ACD: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-2]]
+  // CHECK-ACDE: ERROR: AddressSanitizer: use-after-poison
+  // CHECK-ACDE: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-2]]
   // CHECK-B-NOT: ERROR: AddressSanitizer: use-after-poison
   // CHECK-ABC-NOT: try the experimental setting ASAN_OPTIONS=poison_history_size=
   // CHECK-D: try the experimental setting ASAN_OPTIONS=poison_history_size=
@@ -47,7 +50,11 @@ int main(int argc, char **argv) {
   // CHECK-C: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-22]]
   // CHECK-AC: foo{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]]
   // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-16]]
-  // CHECK-BD-NOT: Memory was manually poisoned by thread T0:
+  // CHECK-BDE-NOT: Memory was manually poisoned by thread T0:
+
+  // CHECK-ABC-NOT: Try a larger value for ASAN_OPTIONS=poison_history_size=
+  // CHECK-D-NOT: Try a larger value for ASAN_OPTIONS=poison_history_size=
+  // CHECK-E: Try a larger value for ASAN_OPTIONS=poison_history_size=
 
   delete[] x;
 

>From 3d2ee1d34349443b73b7edfc520b3648ae493384 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 22:37:00 +0000
Subject: [PATCH 21/24] Update test case and formatting

---
 compiler-rt/lib/asan/asan_poisoning.cpp                   | 5 +++--
 .../test/asan/TestCases/use-after-poison-history-size.cpp | 8 ++++----
 2 files changed, 7 insertions(+), 6 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index a20659defacaa..8ab6f3aed48a8 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -45,14 +45,15 @@ void AddPoisonRecord(const PoisonRecord &new_record) {
   poison_records_mutex.Unlock();
 }
 
-bool FindPoisonRecord(uptr addr, const PoisonRecord& match) {
+bool FindPoisonRecord(uptr addr, const PoisonRecord &match) {
   poison_records_mutex.Lock();
 
   if (poison_records) {
     for (unsigned int i = 0; i < poison_records->size(); i++) {
       struct PoisonRecord record = (*poison_records)[i];
       if (record.begin <= addr && addr < record.end) {
-        internal_memcpy((void*)&match, (void*)&record, sizeof(struct PoisonRecord));
+        internal_memcpy((void*)&match, (void*)&record,
+                        sizeof(struct PoisonRecord));
         poison_records_mutex.Unlock();
         return true;
       }
diff --git a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
index b44cf84fa2ee1..a279fe657b87c 100644
--- a/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
+++ b/compiler-rt/test/asan/TestCases/use-after-poison-history-size.cpp
@@ -22,13 +22,13 @@
 extern "C" void __asan_poison_memory_region(void *, size_t);
 extern "C" void __asan_unpoison_memory_region(void *, size_t);
 
-void i_poisoned_your_memory(char *x) {
+void honey_ive_poisoned_the_memory(char *x) {
   __asan_poison_memory_region(x, 64);       // A
   __asan_unpoison_memory_region(x + 16, 8); // B
   __asan_poison_memory_region(x + 24, 16);  // C
 }
 
-void foo(char *x) { i_poisoned_your_memory(x); }
+void foo(char *x) { honey_ive_poisoned_the_memory(x); }
 
 int main(int argc, char **argv) {
   char *x = new char[64];
@@ -46,8 +46,8 @@ int main(int argc, char **argv) {
   // CHECK-D: try the experimental setting ASAN_OPTIONS=poison_history_size=
 
   // CHECK-AC: Memory was manually poisoned by thread T0:
-  // CHECK-A: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-23]]
-  // CHECK-C: i_poisoned_your_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-22]]
+  // CHECK-A: honey_ive_poisoned_the_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-23]]
+  // CHECK-C: honey_ive_poisoned_the_memory{{.*}}use-after-poison-history-size.cpp:[[@LINE-22]]
   // CHECK-AC: foo{{.*}}use-after-poison-history-size.cpp:[[@LINE-20]]
   // CHECK-AC: main{{.*}}use-after-poison-history-size.cpp:[[@LINE-16]]
   // CHECK-BDE-NOT: Memory was manually poisoned by thread T0:

>From b6be8ed69d33e58b7a5202179cb44e774218ee69 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 23:01:25 +0000
Subject: [PATCH 22/24] clang-format

---
 compiler-rt/lib/asan/asan_poisoning.cpp | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 8ab6f3aed48a8..8b6f3bc2c6777 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -52,7 +52,7 @@ bool FindPoisonRecord(uptr addr, const PoisonRecord &match) {
     for (unsigned int i = 0; i < poison_records->size(); i++) {
       struct PoisonRecord record = (*poison_records)[i];
       if (record.begin <= addr && addr < record.end) {
-        internal_memcpy((void*)&match, (void*)&record,
+        internal_memcpy((void *)&match, (void *)&record,
                         sizeof(struct PoisonRecord));
         poison_records_mutex.Unlock();
         return true;

>From 1c4f2265ee061b41cbdd70352f29988ef0c63d8f Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 23:57:17 +0000
Subject: [PATCH 23/24] Remove unused function declaration

---
 compiler-rt/lib/asan/asan_poisoning.h | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index 568483c4f7867..d7581d1e2d020 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -23,9 +23,6 @@
 
 namespace __asan {
 
-// Set up data structures for track_poison.
-void InitializePoisonTracking();
-
 struct PoisonRecord {
   u32 stack_id;
   u32 thread_id;

>From ec2a866ba77e9f5bc13ce6e132839c591f127832 Mon Sep 17 00:00:00 2001
From: Thurston Dang <thurston at google.com>
Date: Tue, 1 Apr 2025 23:58:39 +0000
Subject: [PATCH 24/24] Move #include

---
 compiler-rt/lib/asan/asan_poisoning.cpp | 1 +
 compiler-rt/lib/asan/asan_poisoning.h   | 1 -
 2 files changed, 1 insertion(+), 1 deletion(-)

diff --git a/compiler-rt/lib/asan/asan_poisoning.cpp b/compiler-rt/lib/asan/asan_poisoning.cpp
index 8b6f3bc2c6777..e7321ab040800 100644
--- a/compiler-rt/lib/asan/asan_poisoning.cpp
+++ b/compiler-rt/lib/asan/asan_poisoning.cpp
@@ -20,6 +20,7 @@
 #include "sanitizer_common/sanitizer_flags.h"
 #include "sanitizer_common/sanitizer_interface_internal.h"
 #include "sanitizer_common/sanitizer_libc.h"
+#include "sanitizer_common/sanitizer_ring_buffer.h"
 #include "sanitizer_common/sanitizer_stackdepot.h"
 
 namespace __asan {
diff --git a/compiler-rt/lib/asan/asan_poisoning.h b/compiler-rt/lib/asan/asan_poisoning.h
index d7581d1e2d020..a168982f71171 100644
--- a/compiler-rt/lib/asan/asan_poisoning.h
+++ b/compiler-rt/lib/asan/asan_poisoning.h
@@ -19,7 +19,6 @@
 #include "asan_mapping.h"
 #include "sanitizer_common/sanitizer_flags.h"
 #include "sanitizer_common/sanitizer_platform.h"
-#include "sanitizer_common/sanitizer_ring_buffer.h"
 
 namespace __asan {
 



More information about the llvm-commits mailing list