• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // RUN: %clangxx_asan -O %s -o %t && %run %t
2 
3 #include <assert.h>
4 #include <stdio.h>
5 #include <sanitizer/asan_interface.h>
6 
7 __attribute__((noinline))
Throw()8 void Throw() {
9   int local;
10   fprintf(stderr, "Throw:  %p\n", &local);
11   throw 1;
12 }
13 
14 __attribute__((noinline))
ThrowAndCatch()15 void ThrowAndCatch() {
16   int local;
17   try {
18     Throw();
19   } catch(...) {
20     fprintf(stderr, "Catch:  %p\n", &local);
21   }
22 }
23 
TestThrow()24 void TestThrow() {
25   char x[32];
26   fprintf(stderr, "Before: %p poisoned: %d\n", &x,
27           __asan_address_is_poisoned(x + 32));
28   assert(__asan_address_is_poisoned(x + 32));
29   ThrowAndCatch();
30   fprintf(stderr, "After:  %p poisoned: %d\n",  &x,
31           __asan_address_is_poisoned(x + 32));
32   // FIXME: Invert this assertion once we fix
33   // https://code.google.com/p/address-sanitizer/issues/detail?id=258
34   // This assertion works only w/o UAR.
35   if (!__asan_get_current_fake_stack())
36     assert(!__asan_address_is_poisoned(x + 32));
37 }
38 
TestThrowInline()39 void TestThrowInline() {
40   char x[32];
41   fprintf(stderr, "Before: %p poisoned: %d\n", &x,
42           __asan_address_is_poisoned(x + 32));
43   assert(__asan_address_is_poisoned(x + 32));
44   try {
45     Throw();
46   } catch(...) {
47     fprintf(stderr, "Catch\n");
48   }
49   fprintf(stderr, "After:  %p poisoned: %d\n",  &x,
50           __asan_address_is_poisoned(x + 32));
51   // FIXME: Invert this assertion once we fix
52   // https://code.google.com/p/address-sanitizer/issues/detail?id=258
53   // This assertion works only w/o UAR.
54   if (!__asan_get_current_fake_stack())
55     assert(!__asan_address_is_poisoned(x + 32));
56 }
57 
main(int argc,char ** argv)58 int main(int argc, char **argv) {
59   TestThrowInline();
60   TestThrow();
61 }
62