xref: /llvm-project/compiler-rt/test/lsan/TestCases/use_after_return.cpp (revision eb3be66028eac88098e0186cff80e0421949dd69)
1 // Test that fake stack (introduced by ASan's use-after-return mode) is included
2 // in the root set.
3 // RUN: %clangxx_lsan %s -O2 -o %t
4 // RUN: env ASAN_OPTIONS=detect_stack_use_after_return=1 %env_lsan_opts="report_objects=1:use_registers=0:use_stacks=0" not %run %t 2>&1 | FileCheck %s
5 // RUN: env ASAN_OPTIONS=detect_stack_use_after_return=1 %env_lsan_opts="report_objects=1:use_registers=0:use_stacks=1" %run %t 2>&1
6 // RUN: env ASAN_OPTIONS=detect_stack_use_after_return=1 %env_lsan_opts="" %run %t 2>&1
7 
8 // Investigate why it does not fail with use_stack=0
9 // UNSUPPORTED: arm-linux || armhf-linux
10 
11 #include <stdio.h>
12 #include <stdlib.h>
13 #include "sanitizer_common/print_address.h"
14 
main()15 int main() {
16   void *stack_var = malloc(1337);
17   print_address("Test alloc: ", 1, stack_var);
18   // Take pointer to variable, to ensure it's not optimized into a register.
19   print_address("Stack var at: ", 1, &stack_var);
20   // Do not return from main to prevent the pointer from going out of scope.
21   exit(0);
22 }
23 // CHECK: Test alloc: [[ADDR:0x[0-9,a-f]+]]
24 // CHECK: LeakSanitizer: detected memory leaks
25 // CHECK: [[ADDR]] (1337 bytes)
26 // CHECK: SUMMARY: {{.*}}Sanitizer:
27