1*673dc3d4SNico Weber // RUN: %clang_cl_asan -Od %s -Fe%t
2*673dc3d4SNico Weber // RUN: not %run %t 2>&1 | FileCheck %s
3*673dc3d4SNico Weber 
4*673dc3d4SNico Weber #include <stdio.h>
5*673dc3d4SNico Weber 
main()6*673dc3d4SNico Weber int main() {
7*673dc3d4SNico Weber   int subscript = -1;
8*673dc3d4SNico Weber   char buffer[42];
9*673dc3d4SNico Weber   buffer[subscript] = 42;
10*673dc3d4SNico Weber // CHECK: AddressSanitizer: stack-buffer-underflow on address [[ADDR:0x[0-9a-f]+]]
11*673dc3d4SNico Weber // CHECK: WRITE of size 1 at [[ADDR]] thread T0
12*673dc3d4SNico Weber // CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}}:[[@LINE-3]]
13*673dc3d4SNico Weber // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset [[OFFSET:.*]] in frame
14*673dc3d4SNico Weber // CHECK-NEXT: {{#0 .* main .*stack_array_left_oob.cpp}}
15*673dc3d4SNico Weber // CHECK: 'buffer'{{.*}} <== Memory access at offset [[OFFSET]] underflows this variable
16*673dc3d4SNico Weber }
17