1*7c3d14c8STreehugger Robot // RUN: %clangxx_asan -O %s -o %t && %run %t 2*7c3d14c8STreehugger Robot 3*7c3d14c8STreehugger Robot #include <assert.h> 4*7c3d14c8STreehugger Robot #include <setjmp.h> 5*7c3d14c8STreehugger Robot #include <stdio.h> 6*7c3d14c8STreehugger Robot #include <sanitizer/asan_interface.h> 7*7c3d14c8STreehugger Robot 8*7c3d14c8STreehugger Robot static jmp_buf buf; 9*7c3d14c8STreehugger Robot main()10*7c3d14c8STreehugger Robotint main() { 11*7c3d14c8STreehugger Robot char x[32]; 12*7c3d14c8STreehugger Robot fprintf(stderr, "\nTestLongJmp\n"); 13*7c3d14c8STreehugger Robot fprintf(stderr, "Before: %p poisoned: %d\n", &x, 14*7c3d14c8STreehugger Robot __asan_address_is_poisoned(x + 32)); 15*7c3d14c8STreehugger Robot assert(__asan_address_is_poisoned(x + 32)); 16*7c3d14c8STreehugger Robot if (0 == setjmp(buf)) 17*7c3d14c8STreehugger Robot longjmp(buf, 1); 18*7c3d14c8STreehugger Robot fprintf(stderr, "After: %p poisoned: %d\n", &x, 19*7c3d14c8STreehugger Robot __asan_address_is_poisoned(x + 32)); 20*7c3d14c8STreehugger Robot // FIXME: Invert this assertion once we fix 21*7c3d14c8STreehugger Robot // https://code.google.com/p/address-sanitizer/issues/detail?id=258 22*7c3d14c8STreehugger Robot // This assertion works only w/o UAR. 23*7c3d14c8STreehugger Robot if (!__asan_get_current_fake_stack()) 24*7c3d14c8STreehugger Robot assert(!__asan_address_is_poisoned(x + 32)); 25*7c3d14c8STreehugger Robot } 26