| 1 | // RUN: %clangxx_msan -fsanitize-memory-track-origins=2 -O1 %s -o %t && %run %t 2>&1 | FileCheck %s |
| 2 | |
| 3 | #include <pthread.h> |
| 4 | #include <sanitizer/msan_interface.h> |
| 5 | #include <signal.h> |
| 6 | #include <stdint.h> |
| 7 | #include <stdio.h> |
| 8 | #include <ucontext.h> |
| 9 | #include <unistd.h> |
| 10 | |
| 11 | void handler(int sig, siginfo_t *info, void *uctx) { |
| 12 | __msan_check_mem_is_initialized(x: uctx, size: sizeof(ucontext_t)); |
| 13 | #if defined(__GLIBC__) && defined(__x86_64__) |
| 14 | auto *mctx = &static_cast<ucontext_t *>(uctx)->uc_mcontext; |
| 15 | if (auto *fpregs = mctx->fpregs) { |
| 16 | // The member names differ across header versions, but the actual layout |
| 17 | // is always the same. So avoid using members, just use arithmetic. |
| 18 | const uint32_t *after_xmm = |
| 19 | reinterpret_cast<const uint32_t *>(fpregs + 1) - 24; |
| 20 | if (after_xmm[12] == FP_XSTATE_MAGIC1) { |
| 21 | auto *xstate = reinterpret_cast<_xstate *>(mctx->fpregs); |
| 22 | __msan_check_mem_is_initialized(x: xstate, size: sizeof(*xstate)); |
| 23 | } |
| 24 | } |
| 25 | #endif |
| 26 | } |
| 27 | |
| 28 | __attribute__((noinline)) void poison_stack() { |
| 29 | char buf[64 << 10]; |
| 30 | printf(format: "buf: %p-%p\n" , buf, buf + sizeof(buf)); |
| 31 | } |
| 32 | |
| 33 | int main(int argc, char **argv) { |
| 34 | struct sigaction act = {}; |
| 35 | act.sa_sigaction = handler; |
| 36 | act.sa_flags = SA_SIGINFO; |
| 37 | sigaction(SIGPROF, act: &act, oact: 0); |
| 38 | poison_stack(); |
| 39 | pthread_kill(threadid: pthread_self(), SIGPROF); |
| 40 | return 0; |
| 41 | } |
| 42 | |
| 43 | // CHECK-NOT: WARNING: MemorySanitizer: |
| 44 | |