[ASan/Win] Use the new function interception approach to handle function wrappers...
[blocksruntime.git] / test / asan / TestCases / use-after-poison.cc
blobf117661ce974dfcbd6817f95f4e5c4242fc6570a
1 // Check that __asan_poison_memory_region works.
2 // RUN: %clangxx_asan -O0 %s -o %t && not %run %t 2>&1 | FileCheck %s
3 //
4 // Check that we can disable it
5 // RUN: ASAN_OPTIONS=allow_user_poisoning=0 %run %t
7 #include <stdlib.h>
9 extern "C" void __asan_poison_memory_region(void *, size_t);
11 int main(int argc, char **argv) {
12 char *x = new char[16];
13 x[10] = 0;
14 __asan_poison_memory_region(x, 16);
15 int res = x[argc * 10]; // BOOOM
16 // CHECK: ERROR: AddressSanitizer: use-after-poison
17 // CHECK: main{{.*}}use-after-poison.cc:[[@LINE-2]]
18 delete [] x;
19 return res;