[ASan/Win] Use the new function interception approach to handle function wrappers...
[blocksruntime.git] / test / asan / TestCases / Windows / dll_malloc_left_oob.cc
blobcc96dd4f04c9618527e306f3110d2b653be606e2
1 // RUN: %clangxx_asan -O0 %p/dll_host.cc -Fe%t
2 // RUN: %clangxx_asan -LD -O0 %s -Fe%t.dll
3 // FIXME: 'cat' is needed due to PR19744.
4 // RUN: not %run %t %t.dll 2>&1 | cat | FileCheck %s
6 #include <malloc.h>
7 extern "C" __declspec(dllexport)
8 int test_function() {
9 char *buffer = (char*)malloc(42);
10 buffer[-1] = 42;
11 // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
12 // CHECK: WRITE of size 1 at [[ADDR]] thread T0
13 // CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-3]]
14 // CHECK-NEXT: main {{.*}}dll_host.cc
16 // CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
17 // CHECK-LABEL: allocated by thread T0 here:
18 // CHECK-NEXT: malloc
19 // CHECK-NEXT: test_function {{.*}}dll_malloc_left_oob.cc:[[@LINE-10]]
20 // CHECK-NEXT: main {{.*}}dll_host.cc
21 // CHECK-LABEL: SUMMARY
22 free(buffer);
23 return 0;