// RUN: %clang_cl_asan -Od %s -Fe%t /MD // RUN: %env_asan_opts=windows_hook_rtl_allocators=true not %run %t 2>&1 | FileCheck %s // UNSUPPORTED: asan-64-bits // REQUIRES: asan-rtl-heap-interception #include #include using AllocateFunctionPtr = PVOID(__stdcall *)(PVOID, ULONG, SIZE_T); using FreeFunctionPtr = PVOID(__stdcall *)(PVOID, ULONG, PVOID); int main() { HMODULE NtDllHandle = GetModuleHandle("ntdll.dll"); if (!NtDllHandle) { puts("Couldn't load ntdll??"); return -1; } auto RtlAllocateHeap_ptr = (AllocateFunctionPtr)GetProcAddress(NtDllHandle, "RtlAllocateHeap"); if (RtlAllocateHeap_ptr == 0) { puts("Couldn't RtlAllocateHeap"); return -1; } char *buffer; buffer = (char *)RtlAllocateHeap_ptr(GetProcessHeap(), 0, 32), buffer[33] = 'a'; // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 }