diff options
Diffstat (limited to 'src/pal/tests/palsuite/exception_handling/pal_except/test3/test3.cpp')
-rw-r--r-- | src/pal/tests/palsuite/exception_handling/pal_except/test3/test3.cpp | 120 |
1 files changed, 120 insertions, 0 deletions
diff --git a/src/pal/tests/palsuite/exception_handling/pal_except/test3/test3.cpp b/src/pal/tests/palsuite/exception_handling/pal_except/test3/test3.cpp new file mode 100644 index 0000000000..0137697774 --- /dev/null +++ b/src/pal/tests/palsuite/exception_handling/pal_except/test3/test3.cpp @@ -0,0 +1,120 @@ +// Licensed to the .NET Foundation under one or more agreements. +// The .NET Foundation licenses this file to you under the MIT license. +// See the LICENSE file in the project root for more information. + +/*===================================================================== +** +** Source: test3.c (exception_handling\pal_except\test3) +** +** Purpose: Test to make sure the PAL_EXCEPT block is executed +** after an exception occurs in the PAL_TRY block +** that calls a function that contains +** another PAL_TRY-PAL_EXCEPT block +** +** +**===================================================================*/ +#include <palsuite.h> + +/* Execution flags */ +BOOL bTry = FALSE; +BOOL bExcept = FALSE; +BOOL bTry_function = FALSE; +BOOL bExcept_function = FALSE; + +/* + * Helper function that contains a PAL_TRY-PAL_EXCEPT block + */ +void Helper() +{ + /* Nested PAL_TRY */ + PAL_TRY + { + int *lp = 0x00000000; + + bTry_function = TRUE; + + *lp = 13; /* causes an access violation exception */ + + Fail("ERROR: code was executed after the function's access violation.\n"); + + } + PAL_EXCEPT(EXCEPTION_EXECUTE_HANDLER) + { + if (!bTry) + { + Fail("ERROR: Nested PAL_EXCEPT was hit without " + "the function's PAL_TRY being hit.\n"); + } + bExcept_function = TRUE; + } + PAL_ENDTRY; +} + +int __cdecl main(int argc, char *argv[]) +{ + if (0 != PAL_Initialize(argc, argv)) + { + return FAIL; + } + + PAL_TRY + { + int* p = 0x00000000; /* NULL pointer */ + + bTry = TRUE; /* indicate we hit the PAL_TRY block */ + + Helper(); + + *p = 13; /* causes an access violation exception */ + + Fail("ERROR: code was executed after the access violation.\n"); + } + PAL_EXCEPT(EXCEPTION_EXECUTE_HANDLER) + { + if (!bTry) + { + Fail("ERROR: PAL_EXCEPT was hit without PAL_TRY being hit.\n"); + } + if (!bExcept_function) + { + Fail("ERROR: PAL_EXCEPT was hit without " + "function's PAL_EXCEPT being hit.\n"); + } + + bExcept = TRUE; /* indicate we hit the PAL_EXCEPT block */ + } + PAL_ENDTRY; + + if (!bTry) + { + Trace("ERROR: the code in the PAL_TRY block was not executed.\n"); + } + + if (!bExcept) + { + Trace("ERROR: the code in the PAL_EXCEPT block was not executed.\n"); + } + + if (!bTry_function) + { + Trace("ERROR: the code in the " + "function's PAL_TRY block was not executed.\n"); + } + + if (!bExcept_function) + { + Trace("ERROR: the code in the " + "function's PAL_EXCEPT block was not executed.\n"); + } + + /* did we hit all the code blocks? */ + if(!bTry || !bExcept || + !bTry_function || !bExcept_function) + { + Fail(""); + } + + PAL_Terminate(); + return PASS; + +} |