// RUN: %clangxx_msan %s -o %t // RUN: %run %t --disable-checks 0 2>&1 | FileCheck --check-prefix=DISABLED --allow-empty %s // RUN: %run %t --disable-checks 1 2>&1 | FileCheck --check-prefix=DISABLED --allow-empty %s // RUN: %run %t --disable-checks 2 2>&1 | FileCheck --check-prefix=DISABLED --allow-empty %s // RUN: %run %t --disable-checks 3 2>&1 | FileCheck --check-prefix=DISABLED --allow-empty %s // RUN: not %run %t --reenable-checks 0 2>&1 | FileCheck --check-prefix=CASE-0 %s // RUN: not %run %t --reenable-checks 1 2>&1 | FileCheck --check-prefix=CASE-1 %s // RUN: not %run %t --reenable-checks 2 2>&1 | FileCheck --check-prefix=CASE-2 %s // RUN: not %run %t --reenable-checks 3 2>&1 | FileCheck --check-prefix=CASE-3 %s #include #include #include #include #include int main(int argc, char *argv[]) { assert(argc == 3); __msan_scoped_disable_interceptor_checks(); if (strcmp(argv[1], "--reenable-checks") == 0) __msan_scoped_enable_interceptor_checks(); char uninit[7]; switch (argv[2][0]) { case '0': { char *copy = strndup(uninit, sizeof(uninit)); // BOOM free(copy); break; // CASE-0: Uninitialized bytes in __interceptor_strndup } case '1': { puts(uninit); // BOOM puts(uninit); // Ensure previous call did not enable interceptor checks. break; // CASE-1: Uninitialized bytes in __interceptor_puts } case '2': { int cmp = memcmp(uninit, uninit, sizeof(uninit)); // BOOM break; // CASE-2: Uninitialized bytes in __interceptor_memcmp } case '3': { size_t len = strlen(uninit); // BOOM break; // CASE-3: Uninitialized bytes in __interceptor_strlen } default: assert(0); } // DISABLED-NOT: Uninitialized bytes return 0; }