[OptTable] Fix typo VALUE => VALUES (NFCI) (#121523)
[llvm-project.git] / compiler-rt / test / asan / TestCases / pass-struct-byval-uar.cpp
blob254ca29380e4816d98c891d69c3513a98cb128a6
1 // Test that use-after-return works with arguments passed by value.
2 // RUN: %clangxx_asan -O0 %s -o %t
3 // RUN: %env_asan_opts=detect_stack_use_after_return=0 %run %t 2>&1 | \
4 // RUN: FileCheck --check-prefix=CHECK-NO-UAR %s
5 // RUN: not %env_asan_opts=detect_stack_use_after_return=1 %run %t 2>&1 | \
6 // RUN: FileCheck --check-prefix=CHECK-UAR %s
7 // RUN: %clangxx_asan -O0 %s -o %t -fsanitize-address-use-after-return=never && \
8 // RUN: %run %t 2>&1 | FileCheck --check-prefix=CHECK-NO-UAR %s
9 // RUN: %clangxx_asan -O0 %s -o %t -fsanitize-address-use-after-return=always && \
10 // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-UAR %s
12 // On several architectures, the IR does not use byval arguments for foo() and
13 // instead creates a copy in main() and gives foo() a pointer to the copy. In
14 // that case, ASAN has nothing to poison on return from foo() and will not
15 // detect the UAR.
16 // REQUIRES: x86_64-target-arch, linux, !android
18 #include <cstdio>
20 struct A {
21 int a[8];
24 A *foo(A a) {
25 return &a;
28 int main() {
29 A *a = foo(A());
30 a->a[0] = 7;
31 std::fprintf(stderr, "\n"); // Ensures some output is generated for FileCheck
32 // to verify in the case where UAR is not
33 // detected.
36 // CHECK-NO-UAR-NOT: ERROR: AddressSanitizer: stack-use-after-return
37 // CHECK-NO-UAR-NOT: WRITE of size 4 at
38 // CHECK-NO-UAR-NOT: Memory access at offset {{[0-9]+}} is inside this variable
40 // CHECK-UAR: ERROR: AddressSanitizer: stack-use-after-return
41 // CHECK-UAR: WRITE of size 4 at
42 // CHECK-UAR: Memory access at offset {{[0-9]+}} is inside this variable