blob: 925cbc63a305fa88302eba1e5959c8af05be8a1c [file] [log] [blame]
Stephen Hines6d186232014-11-26 17:56:19 -08001// Check that ASan correctly detects SEGV on the zero page.
2// RUN: %clangxx_asan %s -o %t && not %run %t 2>&1 | FileCheck %s
3
4typedef void void_f();
5int main() {
6 void_f *func = (void_f *)0x4;
7 func();
8 // x86 reports the SEGV with both address=4 and pc=4.
Stephen Hines86277eb2015-03-23 12:06:32 -07009 // On PowerPC64 ELFv1, the pointer is taken to be a function-descriptor
10 // pointer out of which three 64-bit quantities are read. This will SEGV, but
11 // the compiler is free to choose the order. As a result, the address is
12 // either 0x4, 0xc or 0x14. The pc is still in main() because it has not
13 // actually made the call when the faulting access occurs.
14 // CHECK: {{AddressSanitizer: SEGV.*(address|pc) 0x0*[4c]}}
Stephen Hines6d186232014-11-26 17:56:19 -080015 return 0;
16}