// Regression test for // https://code.google.com/p/address-sanitizer/issues/detail?id=180 // RUN: %clangxx_asan -O0 %s -o %t && ASAN_OPTIONS=allow_user_segv_handler=true not %t 2>&1 | FileCheck %s // RUN: %clangxx_asan -O2 %s -o %t && ASAN_OPTIONS=allow_user_segv_handler=true not %t 2>&1 | FileCheck %s #include #include struct sigaction user_sigaction; struct sigaction original_sigaction; void User_OnSIGSEGV(int signum, siginfo_t *siginfo, void *context) { fprintf(stderr, "User sigaction called\n"); if (original_sigaction.sa_flags | SA_SIGINFO) original_sigaction.sa_sigaction(signum, siginfo, context); else original_sigaction.sa_handler(signum); } int DoSEGV() { volatile int *x = 0; return *x; } int main() { user_sigaction.sa_sigaction = User_OnSIGSEGV; user_sigaction.sa_flags = SA_SIGINFO; #if defined(__APPLE__) && !defined(__LP64__) // On 32-bit Darwin KERN_PROTECTION_FAILURE (SIGBUS) is delivered. int signum = SIGBUS; #else // On 64-bit Darwin KERN_INVALID_ADDRESS (SIGSEGV) is delivered. // On Linux SIGSEGV is delivered as well. int signum = SIGSEGV; #endif if (sigaction(signum, &user_sigaction, &original_sigaction)) { perror("sigaction"); return 1; } fprintf(stderr, "User sigaction installed\n"); return DoSEGV(); } // CHECK: User sigaction installed // CHECK-NEXT: User sigaction called // CHECK-NEXT: ASAN:SIGSEGV // CHECK: AddressSanitizer: SEGV on unknown address