1 // RUN: %clangxx_asan -O %s -o %t
2 // RUN: not %run %t crash 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
3 // RUN: not %run %t bad-bounds 2>&1 | FileCheck --check-prefix=CHECK-BAD-BOUNDS %s
4 // RUN: not %run %t odd-alignment 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
5 // RUN: not %run %t odd-alignment-end 2>&1 | FileCheck --check-prefix=CHECK-CRASH %s
6 // RUN: %env_asan_opts=detect_container_overflow=0 %run %t crash
8 // Test crash due to __sanitizer_annotate_contiguous_container.
14 void __sanitizer_annotate_contiguous_container(const void *beg
, const void *end
,
19 static volatile int one
= 1;
24 __sanitizer_annotate_contiguous_container(&t
[0], &t
[0] + 100, &t
[0] + 100,
26 // CHECK-CRASH: AddressSanitizer: container-overflow
27 // CHECK-CRASH: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0
28 return (int)t
[60 * one
]; // Touches the poisoned memory.
33 // CHECK-BAD-BOUNDS: ERROR: AddressSanitizer: bad parameters to __sanitizer_annotate_contiguous_container
34 __sanitizer_annotate_contiguous_container(&t
[0], &t
[0] + 100, &t
[0] + 101,
41 __sanitizer_annotate_contiguous_container(&t
[1], &t
[0] + 100, &t
[0] + 100,
43 return (int)t
[60 * one
]; // Touches the poisoned memory.
46 int OddAlignmentEnd() {
49 __sanitizer_annotate_contiguous_container(&t
[0], &t
[0] + 98, &t
[0] + 98,
51 return (int)t
[60 * one
]; // Touches the poisoned memory.
54 int main(int argc
, char **argv
) {
56 if (!strcmp(argv
[1], "crash"))
58 else if (!strcmp(argv
[1], "bad-bounds"))
60 else if (!strcmp(argv
[1], "odd-alignment"))
61 return OddAlignment();
62 else if (!strcmp(argv
[1], "odd-alignment-end"))
63 return OddAlignmentEnd();