These tests were recently enabled and have never worked on this builder. Three tests were sensitive to line number changes: test/msan/Linux/obstack.cc test/msan/chained_origin.cc test/msan/chained_origin_memcpy.cc and this sensitivity will be addressed in a follow-up patch. Of these, obstack.cc's sensitivity to line numbers is unexplained since it already uses [[@LINE]]. llvm-svn: 278671
43 lines
1.4 KiB
C++
43 lines
1.4 KiB
C++
// RUN: %clangxx_msan -DPRE1 -O0 %s -o %t && not %run %t 2>&1
|
|
// RUN: %clangxx_msan -DPRE2 -O0 %s -o %t && not %run %t 2>&1
|
|
// RUN: %clangxx_msan -DPRE3 -O0 %s -o %t && not %run %t 2>&1
|
|
// RUN: %clangxx_msan -O0 %s -o %t && %run %t 2>&1
|
|
|
|
// XFAIL: target-is-mips64el
|
|
|
|
#include <assert.h>
|
|
#include <signal.h>
|
|
#include <string.h>
|
|
|
|
#include <sanitizer/linux_syscall_hooks.h>
|
|
#include <sanitizer/msan_interface.h>
|
|
|
|
struct my_kernel_sigaction {
|
|
long handler, flags, restorer;
|
|
uint64_t mask[20]; // larger than any known platform
|
|
};
|
|
|
|
int main() {
|
|
my_kernel_sigaction act = {}, oldact = {};
|
|
|
|
#if defined(PRE1)
|
|
__msan_poison(&act.handler, sizeof(act.handler));
|
|
__sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
|
|
#elif defined(PRE2)
|
|
__msan_poison(&act.flags, sizeof(act.flags));
|
|
__sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
|
|
#elif defined(PRE3)
|
|
__msan_poison(&act.mask, 1);
|
|
__sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
|
|
#else
|
|
// Uninit past the end of the mask is ignored.
|
|
__msan_poison(((char *)&act.mask) + 5, 1);
|
|
__sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 5);
|
|
|
|
memset(&act, 0, sizeof(act));
|
|
__msan_poison(&oldact, sizeof(oldact));
|
|
__sanitizer_syscall_post_rt_sigaction(0, SIGUSR1, &act, &oldact, 5);
|
|
assert(__msan_test_shadow(&oldact, sizeof(oldact)) == sizeof(long)*3 + 5);
|
|
#endif
|
|
}
|