1 // Test to make sure basic initialization order errors are caught.
2
3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-bug-extra2.cc -o %t
4 // RUN: env ASAN_OPTIONS=check_initialization_order=true not %run %t 2>&1 | FileCheck %s
5
6 // Do not test with optimization -- the error may be optimized away.
7
8 // FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=186
9 // XFAIL: darwin
10
11 #include <cstdio>
12
13 // The structure of the test is:
14 // "x", "y", "z" are dynamically initialized globals.
15 // Value of "x" depends on "y", value of "y" depends on "z".
16 // "x" and "z" are defined in this TU, "y" is defined in another one.
17 // Thus we shoud stably report initialization order fiasco independently of
18 // the translation unit order.
19
initZ()20 int initZ() {
21 return 5;
22 }
23 int z = initZ();
24
25 // 'y' is a dynamically initialized global residing in a different TU. This
26 // dynamic initializer will read the value of 'y' before main starts. The
27 // result is undefined behavior, which should be caught by initialization order
28 // checking.
29 extern int y;
initX()30 int __attribute__((noinline)) initX() {
31 return y + 1;
32 // CHECK: {{AddressSanitizer: initialization-order-fiasco}}
33 // CHECK: {{READ of size .* at 0x.* thread T0}}
34 // CHECK: {{0x.* is located 0 bytes inside of global variable .*(y|z).*}}
35 }
36
37 // This initializer begins our initialization order problems.
38 static int x = initX();
39
main()40 int main() {
41 // ASan should have caused an exit before main runs.
42 printf("PASS\n");
43 // CHECK-NOT: PASS
44 return 0;
45 }
46