| 1 | // Test that fake stack (introduced by ASan's use-after-return mode) is included |
| 2 | // in the root set. |
| 3 | // RUN: %clangxx_lsan %s -O2 -o %t |
| 4 | // RUN: env ASAN_OPTIONS=detect_stack_use_after_return=1 %env_lsan_opts="report_objects=1:use_registers=0:use_stacks=0" not %run %t 2>&1 | FileCheck %s |
| 5 | // RUN: env ASAN_OPTIONS=detect_stack_use_after_return=1 %env_lsan_opts="report_objects=1:use_registers=0:use_stacks=1" %run %t 2>&1 |
| 6 | // RUN: env ASAN_OPTIONS=detect_stack_use_after_return=1 %env_lsan_opts="" %run %t 2>&1 |
| 7 | |
| 8 | // Investigate why it does not fail with use_stack=0 |
| 9 | // UNSUPPORTED: arm-linux || armhf-linux |
| 10 | |
| 11 | #include <stdio.h> |
| 12 | #include <stdlib.h> |
| 13 | #include "sanitizer_common/print_address.h" |
| 14 | |
| 15 | int main() { |
| 16 | void *stack_var = malloc(size: 1337); |
| 17 | print_address("Test alloc: " , 1, stack_var); |
| 18 | // Take pointer to variable, to ensure it's not optimized into a register. |
| 19 | print_address("Stack var at: " , 1, &stack_var); |
| 20 | // Do not return from main to prevent the pointer from going out of scope. |
| 21 | exit(status: 0); |
| 22 | } |
| 23 | // CHECK: Test alloc: [[ADDR:0x[0-9,a-f]+]] |
| 24 | // CHECK: LeakSanitizer: detected memory leaks |
| 25 | // CHECK: [[ADDR]] (1337 bytes) |
| 26 | // CHECK: SUMMARY: {{.*}}Sanitizer: |
| 27 | |