// Test for LeakSanitizer+AddressSanitizer of different sizes.
// REQUIRES: leak-detection
//
// RUN: %clangxx_asan -O0 %s -o %t
// RUN: not %run %t 0 2>&1 | FileCheck %s
// RUN: not %run %t 1 2>&1 | FileCheck %s
// RUN: not %run %t 1000 2>&1 | FileCheck %s
// RUN: not %run %t 1000000 2>&1 | FileCheck %s
// RUN: not %run %t 10000000 2>&1 | FileCheck %s
#include <cstdlib>
#include <stdio.h>
#include <thread>
int *t;
__attribute__((noopt)) void leak(int n) {
#if defined(__ANDROID__) || defined(__BIONIC__)
// Bionic does not acutally allocate when n==0, hence
// there would not be a leak.
// Re-adjust n so the test can pass.
if (n == 0)
n = 1;
#endif
// Repeat few times to make sure that at least one pointer is
// not somewhere on the stack.
for (int i = 0; i < 10; ++i) {
t = new int[n];
printf("t: %p\n", t);
t = 0;
}
}
int main(int argc, char **argv) {
leak(atoi(argv[1]));
}
// CHECK: LeakSanitizer: detected memory leaks