summaryrefslogtreecommitdiff
path: root/test/msan/getaddrinfo.cc
blob: 0518cf4733d0f2cd818f2127d82f39cd1fe34242 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
// RUN: %clangxx_msan -m64 -O0 %s -o %t && %t

#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>
#include <stdlib.h>

void poison_stack_ahead() {
  char buf[100000];
  // With -O0 this poisons a large chunk of stack.
}

int main(void) {
  poison_stack_ahead();

  struct addrinfo *ai;

  // This should trigger loading of libnss_dns and friends.
  // Those libraries are typically uninstrumented.They will call strlen() on a
  // stack-allocated buffer, which is very likely to be poisoned. Test that we
  // don't report this as an UMR.
  int res = getaddrinfo("not-in-etc-hosts", NULL, NULL, &ai);
  return 0;
}