186277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// Make sure symbolization works even if the path to the .exe file changes. 286277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: mkdir %t || true 386277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: %clang_cl_asan -O0 %s -Fe%t/symbols_path.exe 486277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: not %run %t/symbols_path.exe 2>&1 | FileCheck %s 586277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: mkdir %t2 || true 686277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: mv %t/* %t2 786277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// RUN: not %run %t2/symbols_path.exe 2>&1 | FileCheck %s 886277eb844c4983c81de62d7c050e92fe7155788Stephen Hines 986277eb844c4983c81de62d7c050e92fe7155788Stephen Hines#include <malloc.h> 1086277eb844c4983c81de62d7c050e92fe7155788Stephen Hines 1186277eb844c4983c81de62d7c050e92fe7155788Stephen Hinesint main() { 1286277eb844c4983c81de62d7c050e92fe7155788Stephen Hines char *buffer = (char*)malloc(42); 1386277eb844c4983c81de62d7c050e92fe7155788Stephen Hines buffer[-1] = 42; 1486277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] 1586277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: WRITE of size 1 at [[ADDR]] thread T0 1686277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK-NEXT: {{#0 .* main .*symbols_path.cc}}:[[@LINE-3]] 1786277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: [[ADDR]] is located 1 bytes to the left of 42-byte region 1886277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK: allocated by thread T0 here: 1986277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK-NEXT: {{#0 .* malloc }} 2086277eb844c4983c81de62d7c050e92fe7155788Stephen Hines// CHECK-NEXT: {{#1 .* main .*symbols_path.cc}}:[[@LINE-8]] 2186277eb844c4983c81de62d7c050e92fe7155788Stephen Hines free(buffer); 2286277eb844c4983c81de62d7c050e92fe7155788Stephen Hines} 23