Home | History | Annotate | Download | only in TestCases
      1 // Check that ASan correctly detects SEGV on the zero page.
      2 // RUN: %clangxx_asan %s -o %t && not %run %t 2>&1 | FileCheck %s
      3 
      4 typedef void void_f();
      5 int main() {
      6   void_f *func = (void_f *)0x4;
      7   func();
      8   // x86 reports the SEGV with both address=4 and pc=4.
      9   // On PowerPC64 ELFv1, the pointer is taken to be a function-descriptor
     10   // pointer out of which three 64-bit quantities are read. This will SEGV, but
     11   // the compiler is free to choose the order. As a result, the address is
     12   // either 0x4, 0xc or 0x14. The pc is still in main() because it has not
     13   // actually made the call when the faulting access occurs.
     14   // CHECK: {{AddressSanitizer: (SEGV|access-violation).*(address|pc) 0x0*[4c]}}
     15   return 0;
     16 }
     17