1 // RUN: %clangxx_cfi -o %t1 %s
2 // RUN: %expect_crash %run %t1 2>&1 | FileCheck --check-prefix=CFI %s
4 // RUN: %clangxx_cfi -DB32 -o %t2 %s
5 // RUN: %expect_crash %run %t2 2>&1 | FileCheck --check-prefix=CFI %s
7 // RUN: %clangxx_cfi -DB64 -o %t3 %s
8 // RUN: %expect_crash %run %t3 2>&1 | FileCheck --check-prefix=CFI %s
10 // RUN: %clangxx_cfi -DBM -o %t4 %s
11 // RUN: %expect_crash %run %t4 2>&1 | FileCheck --check-prefix=CFI %s
13 // RUN: %clangxx -o %t5 %s
14 // RUN: %run %t5 2>&1 | FileCheck --check-prefix=NCFI %s
16 // RUN: %clangxx_cfi_diag -o %t6 %s
17 // RUN: %run %t6 2>&1 | FileCheck --check-prefix=CFI-DIAG %s
19 // Tests that the CFI enforcement also applies to virtual destructor calls made
43 break_optimization(a
);
47 fprintf(stderr
, "1\n");
49 // CFI-DIAG: runtime error: control flow integrity check for type 'B' failed during virtual call
50 // CFI-DIAG-NEXT: note: vtable is of type '{{(struct )?}}A'
51 delete (B
*)a
; // UB here
55 fprintf(stderr
, "2\n");