1// Test that small memcpy works correctly.
2
3// RUN: %clangxx_asan %s -o %t
4// RUN: not %run %t 8 24 2>&1 | FileCheck %s --check-prefix=CHECK
5// RUN: not %run %t 16 32 2>&1 | FileCheck %s --check-prefix=CHECK
6// RUN: not %run %t 24 40 2>&1 | FileCheck %s --check-prefix=CHECK
7// RUN: not %run %t 32 48 2>&1 | FileCheck %s --check-prefix=CHECK
8// RUN: not %run %t 40 56 2>&1 | FileCheck %s --check-prefix=CHECK
9// RUN: not %run %t 48 64 2>&1 | FileCheck %s --check-prefix=CHECK
10// REQUIRES: shadow-scale-3
11#include <assert.h>
12#include <string.h>
13#include <stdlib.h>
14#include <stdio.h>
15
16#include <sanitizer/asan_interface.h>
17
18int main(int argc, char **argv) {
19 assert(argc == 3);
20 size_t poison_from = atoi(nptr: argv[1]);
21 size_t poison_to = atoi(nptr: argv[2]);
22 assert(poison_from <= poison_to);
23 char A1[64], A2[64];
24 fprintf(stderr, format: "%zd %zd\n", poison_from, poison_to - poison_from);
25 __asan_poison_memory_region(addr: &A1[0] + poison_from, size: poison_to - poison_from);
26 memcpy(dest: A1, src: A2, n: sizeof(A1));
27// CHECK: AddressSanitizer: use-after-poison
28 return 0;
29}
30

source code of compiler-rt/test/asan/TestCases/small_memcpy_test.cpp