// Test to make sure basic initialization order errors are caught. // RUN: %clangxx_asan %min_macos_deployment_target=10.11 -O0 %s %p/Helpers/initialization-bug-extra2.cpp -o %t-INIT-ORDER-EXE // RUN: %env_asan_opts=check_initialization_order=true not %run %t-INIT-ORDER-EXE 2>&1 | FileCheck %s // Do not test with optimization -- the error may be optimized away. // FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=186 // XFAIL: windows-msvc #include // The structure of the test is: // "x", "y", "z" are dynamically initialized globals. // Value of "x" depends on "y", value of "y" depends on "z". // "x" and "z" are defined in this TU, "y" is defined in another one. // Thus we shoud stably report initialization order fiasco independently of // the translation unit order. int initZ() { return 5; } int z = initZ(); // 'y' is a dynamically initialized global residing in a different TU. This // dynamic initializer will read the value of 'y' before main starts. The // result is undefined behavior, which should be caught by initialization order // checking. extern int y; int __attribute__((noinline)) initX() { return y + 1; // CHECK: {{AddressSanitizer: initialization-order-fiasco}} // CHECK: {{READ of size .* at 0x.* thread T0}} // CHECK: {{0x.* is located 0 bytes inside of global variable .*(y|z).*}} // CHECK: registered at: // CHECK: 0x{{.*}} in __asan_register_globals } // This initializer begins our initialization order problems. static int x = initX(); int main() { // ASan should have caused an exit before main runs. printf("PASS\n"); // CHECK-NOT: PASS return 0; }