summaryrefslogtreecommitdiff
path: root/test/msan/dso-origin.cc
blob: 7f62449842cead897c73999eb9281f1e7bfae4bf (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
// Build a library with origin tracking and an executable w/o origin tracking.
// Test that origin tracking is enabled at runtime.
// RUN: %clangxx_msan -fsanitize-memory-track-origins -O0 %s -DBUILD_SO -fPIC -shared -o %t-so.so
// RUN: %clangxx_msan -O0 %s %t-so.so -o %t && not %run %t 2>&1 | FileCheck %s

#ifdef BUILD_SO

#include <stdlib.h>

extern "C" {
void my_access(int *p) {
  volatile int tmp;
  // Force initialize-ness check.
  if (*p)
    tmp = 1;
}

void *my_alloc(unsigned sz) {
  return malloc(sz);
}
}  // extern "C"

#else  // BUILD_SO

#include <stdlib.h>

extern "C" {
void my_access(int *p);
void *my_alloc(unsigned sz);
}

int main(int argc, char **argv) {
  int *x = (int *)my_alloc(sizeof(int));
  my_access(x);
  delete x;

  // CHECK: WARNING: MemorySanitizer: use-of-uninitialized-value
  // CHECK: {{#0 0x.* in my_access .*dso-origin.cc:}}
  // CHECK: {{#1 0x.* in main .*dso-origin.cc:}}[[@LINE-5]]
  // CHECK: Uninitialized value was created by a heap allocation
  // CHECK: {{#0 0x.* in .*malloc}}
  // CHECK: {{#1 0x.* in my_alloc .*dso-origin.cc:}}
  // CHECK: {{#2 0x.* in main .*dso-origin.cc:}}[[@LINE-10]]
  // CHECK: SUMMARY: MemorySanitizer: use-of-uninitialized-value {{.*dso-origin.cc:.* my_access}}
  return 0;
}

#endif  // BUILD_SO