186277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// Make sure symbolization works even if the path to the .exe file changes.
286277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: mkdir %t || true
386277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: %clang_cl_asan -O0 %s -Fe%t/symbols_path.exe
486277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: not %run %t/symbols_path.exe 2>&1 | FileCheck %s
586277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: mkdir %t2 || true
686277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: mv %t/* %t2
786277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: not %run %t2/symbols_path.exe 2>&1 | FileCheck %s
886277eb844c4983c81de62d7c050e92fe7155788Stephen Hines
986277eb844c4983c81de62d7c050e92fe7155788Stephen Hines#include <malloc.h>
1086277eb844c4983c81de62d7c050e92fe7155788Stephen Hines
1186277eb844c4983c81de62d7c050e92fe7155788Stephen Hinesint main() {
1286277eb844c4983c81de62d7c050e92fe7155788Stephen Hines  char *buffer = (char*)malloc(42);
1386277eb844c4983c81de62d7c050e92fe7155788Stephen Hines  buffer[-1] = 42;
1486277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
1586277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: WRITE of size 1 at [[ADDR]] thread T0
1686277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK-NEXT: {{#0 .* main .*symbols_path.cc}}:[[@LINE-3]]
1786277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region
1886277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: allocated by thread T0 here:
1986277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK-NEXT: {{#0 .* malloc }}
2086277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK-NEXT: {{#1 .* main .*symbols_path.cc}}:[[@LINE-8]]
2186277eb844c4983c81de62d7c050e92fe7155788Stephen Hines  free(buffer);
2286277eb844c4983c81de62d7c050e92fe7155788Stephen Hines}
23