This reapplies 8fa66c6ca7 ([asan][windows]
Eliminate the static asan runtime on windows) for a second time.
That PR bounced off the tests because it caused failures in the other
sanitizer runtimes, these have been fixed by only building interception,
sanitizer_common, and asan with /MD, and continuing to build the rest of
the runtimes with /MT. This does mean that any usage of the static
ubsan/fuzzer/etc runtimes will mean you're mixing different runtime
library linkages in the same app, the interception, sanitizer_common,
and asan runtimes are designed for this, however it does result in some
linker warnings.
Additionally, it turns out when building in release-mode with
LLVM_ENABLE_PDBs the build system forced /OPT:ICF. This totally breaks
asan's "new" method of doing "weak" functions on windows, and so
/OPT:NOICF was explicitly added to asan's link flags.
---------
Co-authored-by: Amy Wishnousky <amyw@microsoft.com>
23 lines
819 B
C++
23 lines
819 B
C++
// Make sure symbolization works even if the path to the .exe file changes.
|
|
// RUN: mkdir %t || true
|
|
// RUN: %clang_cl_asan %Od %s %Fe%t/symbols_path.exe
|
|
// RUN: not %run %t/symbols_path.exe 2>&1 | FileCheck %s
|
|
// RUN: mkdir %t2 || true
|
|
// RUN: mv %t/* %t2
|
|
// RUN: not %run %t2/symbols_path.exe 2>&1 | FileCheck %s
|
|
|
|
#include <malloc.h>
|
|
|
|
int main() {
|
|
char *buffer = (char*)malloc(42);
|
|
buffer[-1] = 42;
|
|
// CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
|
|
// CHECK: WRITE of size 1 at [[ADDR]] thread T0
|
|
// CHECK-NEXT: {{#0 .* main .*symbols_path.cpp}}:[[@LINE-3]]
|
|
// CHECK: [[ADDR]] is located 1 bytes before 42-byte region
|
|
// CHECK: allocated by thread T0 here:
|
|
// CHECK-NEXT: {{#0 .* malloc}}
|
|
// CHECK: {{ #[1-3] .* main .*symbols_path.cpp}}:[[@LINE-8]]
|
|
free(buffer);
|
|
}
|