2014-07-22 19:46:24 +08:00
|
|
|
// RUN: %clangxx_asan -O %s -o %t && %run %t
|
|
|
|
|
|
|
|
#include <assert.h>
|
|
|
|
#include <setjmp.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <sanitizer/asan_interface.h>
|
|
|
|
|
|
|
|
static jmp_buf buf;
|
|
|
|
|
2014-07-22 20:25:51 +08:00
|
|
|
int main() {
|
2014-07-22 19:46:24 +08:00
|
|
|
char x[32];
|
|
|
|
fprintf(stderr, "\nTestLongJmp\n");
|
|
|
|
fprintf(stderr, "Before: %p poisoned: %d\n", &x,
|
|
|
|
__asan_address_is_poisoned(x + 32));
|
|
|
|
assert(__asan_address_is_poisoned(x + 32));
|
|
|
|
if (0 == setjmp(buf))
|
|
|
|
longjmp(buf, 1);
|
|
|
|
fprintf(stderr, "After: %p poisoned: %d\n", &x,
|
|
|
|
__asan_address_is_poisoned(x + 32));
|
|
|
|
// FIXME: Invert this assertion once we fix
|
|
|
|
// https://code.google.com/p/address-sanitizer/issues/detail?id=258
|
2014-12-03 08:08:41 +08:00
|
|
|
// This assertion works only w/o UAR.
|
|
|
|
if (!__asan_get_current_fake_stack())
|
|
|
|
assert(!__asan_address_is_poisoned(x + 32));
|
2014-07-22 19:46:24 +08:00
|
|
|
}
|