xref: /aosp_15_r20/external/compiler-rt/test/asan/TestCases/printf-3.c (revision 7c3d14c8b49c529e04be81a3ce6f5cc23712e4c6)
1*7c3d14c8STreehugger Robot // RUN: %clang_asan -O2 %s -o %t
2*7c3d14c8STreehugger Robot // RUN: %env_asan_opts=check_printf=1 not %run %t 2>&1 | FileCheck --check-prefix=CHECK-ON %s
3*7c3d14c8STreehugger Robot // RUN: %env_asan_opts=check_printf=0 %run %t 2>&1 | FileCheck --check-prefix=CHECK-OFF %s
4*7c3d14c8STreehugger Robot // RUN: not %run %t 2>&1 | FileCheck --check-prefix=CHECK-ON %s
5*7c3d14c8STreehugger Robot 
6*7c3d14c8STreehugger Robot // FIXME: printf is not intercepted on Windows yet.
7*7c3d14c8STreehugger Robot // XFAIL: win32
8*7c3d14c8STreehugger Robot 
9*7c3d14c8STreehugger Robot #include <stdio.h>
main()10*7c3d14c8STreehugger Robot int main() {
11*7c3d14c8STreehugger Robot #ifdef _MSC_VER
12*7c3d14c8STreehugger Robot   // FIXME: The test raises a dialog even though it's XFAILd.
13*7c3d14c8STreehugger Robot   return 42;
14*7c3d14c8STreehugger Robot #endif
15*7c3d14c8STreehugger Robot   volatile char c = '0';
16*7c3d14c8STreehugger Robot   volatile int x = 12;
17*7c3d14c8STreehugger Robot   volatile float f = 1.239;
18*7c3d14c8STreehugger Robot   volatile char s[] = "34";
19*7c3d14c8STreehugger Robot   volatile int n[1];
20*7c3d14c8STreehugger Robot   printf("%c %d %.3f %s%n\n", c, x, f, s, &n[1]);
21*7c3d14c8STreehugger Robot   return 0;
22*7c3d14c8STreehugger Robot   // Check that %n is sanitized.
23*7c3d14c8STreehugger Robot   // CHECK-ON: stack-buffer-overflow
24*7c3d14c8STreehugger Robot   // CHECK-ON-NOT: 0 12 1.239 34
25*7c3d14c8STreehugger Robot   // CHECK-OFF: 0 12 1.239 34
26*7c3d14c8STreehugger Robot }
27