Files
clang-p2996/compiler-rt/test/ubsan/TestCases/Pointer/index-overflow.cpp
Vedant Kumar 41dfc4f1fa [ubsan] Runtime support for pointer overflow checking
Patch by John Regehr and Will Dietz!

Differential Revision: https://reviews.llvm.org/D20323

llvm-svn: 304461
2017-06-01 19:40:59 +00:00

20 lines
508 B
C++

// RUN: %clangxx -fsanitize=pointer-overflow %s -o %t
// RUN: %t 1 2>&1 | FileCheck %s --check-prefix=ERR
// RUN: %t 0 2>&1 | FileCheck %s --check-prefix=SAFE
// RUN: %t -1 2>&1 | FileCheck %s --check-prefix=SAFE
#include <stdio.h>
#include <stdint.h>
#include <stdlib.h>
int main(int argc, char *argv[]) {
// SAFE-NOT: runtime error
// ERR: runtime error: pointer index expression with base {{.*}} overflowed to
char *p = (char *)(UINTPTR_MAX);
printf("%p\n", p + atoi(argv[1]));
return 0;
}