// RUN: %clang_cl_asan -O0 %p/dll_host.cc -Fe%t // // Check both -GS and -GS- builds: // RUN: %clang_cl_asan -LD -O0 %s -Fe%t.dll // RUN: %run %t %t.dll // // RUN: %clang_cl_asan -LD -O0 %s -Fe%t.dll // RUN: %run %t %t.dll #include <windows.h> #include <assert.h> #include <stdio.h> // Should just "#include <sanitizer/asan_interface.h>" when C++ exceptions are // supported and we don't need to use CL. extern "C" bool __asan_address_is_poisoned(void *p); void ThrowAndCatch(); __declspec(noinline) void Throw() { int local, zero = 0; fprintf(stderr, "Throw: %p\n", &local); local = 5 / zero; } __declspec(noinline) void ThrowAndCatch() { int local; __try { Throw(); } __except(EXCEPTION_EXECUTE_HANDLER) { fprintf(stderr, "__except: %p\n", &local); } } extern "C" __declspec(dllexport) int test_function() { char x[32]; fprintf(stderr, "Before: %p poisoned: %d\n", &x, __asan_address_is_poisoned(x + 32)); assert(__asan_address_is_poisoned(x + 32)); ThrowAndCatch(); fprintf(stderr, "After: %p poisoned: %d\n", &x, __asan_address_is_poisoned(x + 32)); // FIXME: Invert this assertion once we fix // https://code.google.com/p/address-sanitizer/issues/detail?id=258 assert(!__asan_address_is_poisoned(x + 32)); return 0; }