1 | // Main executable is uninstrumented, but linked to ASan runtime. |
2 | // Regression test for https://code.google.com/p/address-sanitizer/issues/detail?id=357. |
3 | |
4 | // RUN: %clangxx -g -O0 %s -c -o %t.o |
5 | // RUN: %clangxx_asan -g -O0 %t.o -o %t |
6 | // RUN: %run %t 2>&1 | FileCheck %s |
7 | |
8 | #include <stdio.h> |
9 | #include <stdlib.h> |
10 | #include <string.h> |
11 | |
12 | #include "sanitizer/asan_interface.h" |
13 | #if __has_feature(ptrauth_calls) |
14 | # include <ptrauth.h> |
15 | #endif |
16 | |
17 | void test_shadow(char *p, size_t size) { |
18 | fprintf(stderr, format: "p = %p\n" , p); |
19 | char *q = (char *)__asan_region_is_poisoned(beg: p, size); |
20 | fprintf(stderr, format: "=%zd=\n" , q ? q - p : -1); |
21 | } |
22 | |
23 | int main(int argc, char *argv[]) { |
24 | char *p = (char *)malloc(size: 10000); |
25 | test_shadow(p, size: 100); |
26 | free(ptr: p); |
27 | // CHECK: =-1= |
28 | |
29 | char *mainptr; |
30 | #if __has_feature(ptrauth_calls) |
31 | mainptr = (char *)ptrauth_strip((void *)&main, ptrauth_key_return_address); |
32 | #else |
33 | mainptr = (char *)&main; |
34 | #endif |
35 | test_shadow(p: mainptr, size: 1); |
36 | // CHECK: =-1= |
37 | |
38 | test_shadow(p: (char *)&p, size: 1); |
39 | // CHECK: =-1= |
40 | |
41 | return 0; |
42 | } |
43 | |