Summary: This involved various fixes: - Move a test that uses ulimit to Posix. - Add a few "REQUIRES: shell" lines to tests using backtick subshell evaluation. - The MSVC CRT buffers stdio if the output is a pipe by default. Some tests need that disabled to avoid interleaving test stdio with asan output. - MSVC headers provide _alloca instead of alloca (go figure), so add a portability macro to the two alloca tests. - XFAIL tests that rely on accurate symbols, we need to pass more flags to make that work. - MSVC's printf implementation of %p uses upper case letters and doesn't add 0x, so do that manually. - Accept "SEGV" or "access-violation" reports in crash tests. Reviewers: samsonov Subscribers: tberghammer, danalbert, llvm-commits, srhines Differential Revision: http://reviews.llvm.org/D12019 llvm-svn: 245073
17 lines
721 B
C++
17 lines
721 B
C++
// Check that ASan correctly detects SEGV on the zero page.
|
|
// RUN: %clangxx_asan %s -o %t && not %run %t 2>&1 | FileCheck %s
|
|
|
|
typedef void void_f();
|
|
int main() {
|
|
void_f *func = (void_f *)0x4;
|
|
func();
|
|
// x86 reports the SEGV with both address=4 and pc=4.
|
|
// On PowerPC64 ELFv1, the pointer is taken to be a function-descriptor
|
|
// pointer out of which three 64-bit quantities are read. This will SEGV, but
|
|
// the compiler is free to choose the order. As a result, the address is
|
|
// either 0x4, 0xc or 0x14. The pc is still in main() because it has not
|
|
// actually made the call when the faulting access occurs.
|
|
// CHECK: {{AddressSanitizer: (SEGV|access-violation).*(address|pc) 0x0*[4c]}}
|
|
return 0;
|
|
}
|