1 | void foo() {} |
2 | |
3 | int main() { |
4 | //% self.filecheck("c", "braa.c") |
5 | // CHECK: stop reason = EXC_BAD_ACCESS |
6 | // |
7 | // TODO: We need call site info support for indirect calls to make this work. |
8 | // CHECK-NOT: pointer authentication failure |
9 | asm volatile ( |
10 | "mov x9, #0xbad \n" |
11 | "braa %[target], x9 \n" |
12 | /* Outputs */ : |
13 | /* Inputs */ : [target] "r" (&foo) |
14 | /* Clobbers */ : "x9" |
15 | ); |
16 | |
17 | return 1; |
18 | } |
19 | |
20 | // Expected codegen and exception message without ptrauth diagnostics: |
21 | // * thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x2000000100007f9c) |
22 | // frame #0: 0x0000000100007f9c braa`foo |
23 | // braa`foo: |
24 | // 0x100007f9c <+0>: ret |
25 | // |
26 | // braa`main: |
27 | // 0x100007fa0 <+0>: nop |
28 | // 0x100007fa4 <+4>: ldr x8, #0x5c |
29 | // 0x100007fa8 <+8>: mov x9, #0xbad |
30 | |