summaryrefslogtreecommitdiff
path: root/test/asan/TestCases/zero_page_pc.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'test/asan/TestCases/zero_page_pc.cpp')
-rw-r--r--test/asan/TestCases/zero_page_pc.cpp16
1 files changed, 16 insertions, 0 deletions
diff --git a/test/asan/TestCases/zero_page_pc.cpp b/test/asan/TestCases/zero_page_pc.cpp
new file mode 100644
index 000000000..ba35df880
--- /dev/null
+++ b/test/asan/TestCases/zero_page_pc.cpp
@@ -0,0 +1,16 @@
+// Check that ASan correctly detects SEGV on the zero page.
+// RUN: %clangxx_asan %s -o %t && not %run %t 2>&1 | FileCheck %s
+
+typedef void void_f();
+int main() {
+ void_f *func = (void_f *)0x4;
+ func();
+ // x86 reports the SEGV with both address=4 and pc=4.
+ // On PowerPC64 ELFv1, the pointer is taken to be a function-descriptor
+ // pointer out of which three 64-bit quantities are read. This will SEGV, but
+ // the compiler is free to choose the order. As a result, the address is
+ // either 0x4, 0xc or 0x14. The pc is still in main() because it has not
+ // actually made the call when the faulting access occurs.
+ // CHECK: {{AddressSanitizer: (SEGV|access-violation).*(address|pc) 0x0*[4c]}}
+ return 0;
+}