1 | int main() { |
2 | //% self.filecheck("c", "ldraa.c") |
3 | // CHECK: EXC_BAD_ACCESS |
4 | // CHECK-NEXT: Note: Possible pointer authentication failure detected. |
5 | // CHECK-NEXT: Found authenticated load instruction at address=0x{{.*}} (ldraa.c:[[@LINE+3]]:3). |
6 | long long foo = 0; |
7 | |
8 | asm volatile ( |
9 | "ldraa x9, [%[target]] \n" |
10 | /* Outputs */ : |
11 | /* Inputs */ : [target] "r" (&foo) |
12 | /* Clobbers */ : |
13 | ); |
14 | |
15 | return 1; |
16 | } |
17 | |
18 | // Expected codegen, register state, and exception message without ptrauth diagnostics: |
19 | // * thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x2000016fdffc38) |
20 | // frame #0: 0x0000000100007fa8 ldraa`main + 12 |
21 | // ldraa`main: |
22 | // -> 0x100007fa8 <+12>: ldraa x9, [x8] |
23 | // 0x100007fac <+16>: orr w0, wzr, #0x1 |
24 | // 0x100007fb0 <+20>: add sp, sp, #0x10 ; =0x10 |
25 | // 0x100007fb4 <+24>: ret |
26 | // Target 0: (ldraa) stopped. |
27 | // (lldb) p/x $x8 |
28 | // (unsigned long) $0 = 0x000000016fdffc38 |
29 | // (lldb) x/8 $x8 |
30 | // 0x16fdffc38: 0x00000000 0x00000000 0x80254f30 0x00000001 |
31 | // 0x16fdffc48: 0x00000000 0x00000000 0x00000000 0x00000000 |
32 | |