summaryrefslogtreecommitdiff
path: root/test/asan/TestCases/Posix/asan_symbolize_script/plugin_wrong_frame_number_bug.cpp
blob: d4450d35b741ad7cd1b5d9872158fa8148c4314c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
// This test case checks for an old bug when using plug-ins that caused
// the stack numbering to be incorrect.

// RUN: %clangxx_asan -O0 -g %s -o %t
// RUN: %env_asan_opts=symbolize=0 not %run %t DUMMY_ARG > %t.asan_report 2>&1
// RUN: %asan_symbolize --log-level debug --log-dest %t_debug_log_output.txt -l %t.asan_report --plugins %S/plugin_wrong_frame_number_bug.py > %t.asan_report_sym
// RUN: FileCheck --input-file=%t.asan_report_sym %s

#include <stdlib.h>

int* p;
extern "C" {

void bug() {
  free(p);
}

void foo(bool call_bug) {
  if (call_bug)
    bug();
}

// This indirection exists so that the call stack
// is reliably large enough.
void do_access_impl() {
  *p = 42;
}

void do_access() {
  do_access_impl();
}

int main(int argc, char** argv) {
  p = (int*) malloc(sizeof(p));
  foo(argc > 1);
  do_access();
  free(p);
  return 0;
}
}

// Check that the numbering of the stackframes is correct.

// CHECK: AddressSanitizer: heap-use-after-free
// CHECK-NEXT: WRITE of size
// CHECK-NEXT: #0 0x{{[0-9a-fA-F]+}}
// CHECK-NEXT: #1 0x{{[0-9a-fA-F]+}} in do_access
// CHECK-NEXT: #2 0x{{[0-9a-fA-F]+}} in main