// RUN: %clangxx_msan -fno-sanitize-memory-param-retval -O0 -g %s -o %t && %run %t // RUN: %clangxx_msan -fno-sanitize-memory-param-retval -DPOISON -O0 -g %s -o %t && not %run %t 2>&1 | FileCheck %s #include #include #include #include #include #include #include constexpr size_t kSize1 = 27; constexpr size_t kSize2 = 7; bool seen2; void dummy(long a, long b, long c, long d, long e) {} void poison_stack_and_param() { char x[10000]; int y; dummy(y, y, y, y, y); } __attribute__((always_inline)) int cmp(long a, long b) { if (a < b) return -1; else if (a > b) return 1; else return 0; } int compar2(const void *a, const void *b) { assert(a); assert(b); __msan_check_mem_is_initialized(a, sizeof(long)); __msan_check_mem_is_initialized(b, sizeof(long)); seen2 = true; poison_stack_and_param(); return cmp(*(long *)a, *(long *)b); } int compar1(const void *a, const void *b) { assert(a); assert(b); __msan_check_mem_is_initialized(a, sizeof(long)); __msan_check_mem_is_initialized(b, sizeof(long)); long *p = new long[kSize2]; // kind of random for (int i = 0; i < kSize2; ++i) p[i] = i * 2 + (i % 3 - 1) * 3; qsort(p, kSize1, sizeof(long), compar2); __msan_check_mem_is_initialized(p, sizeof(long) * kSize2); delete[] p; poison_stack_and_param(); return cmp(*(long *)a, *(long *)b); } int main(int argc, char *argv[]) { long *p = new long[kSize1]; // kind of random for (int i = 0; i < kSize1; ++i) p[i] = i * 2 + (i % 3 - 1) * 3; poison_stack_and_param(); #ifdef POISON __msan_poison(p + 1, sizeof(long)); // CHECK: Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside [{{.*}}, 8) #endif qsort(p, kSize1, sizeof(long), compar1); __msan_check_mem_is_initialized(p, sizeof(long) * kSize1); assert(seen2); delete[] p; p = new long[0]; qsort(p, 0, sizeof(long), compar1); delete[] p; qsort(nullptr, 0, sizeof(long), compar1); return 0; }