| 1 | // RUN: %clangxx_msan -O0 %s -o %t && %run %t |
| 2 | |
| 3 | #include <sys/types.h> |
| 4 | #include <sys/socket.h> |
| 5 | #include <netdb.h> |
| 6 | #include <stdlib.h> |
| 7 | |
| 8 | void poison_stack_ahead() { |
| 9 | char buf[100000]; |
| 10 | // With -O0 this poisons a large chunk of stack. |
| 11 | } |
| 12 | |
| 13 | int main(void) { |
| 14 | poison_stack_ahead(); |
| 15 | |
| 16 | struct addrinfo *ai; |
| 17 | |
| 18 | // This should trigger loading of libnss_dns and friends. |
| 19 | // Those libraries are typically uninstrumented.They will call strlen() on a |
| 20 | // stack-allocated buffer, which is very likely to be poisoned. Test that we |
| 21 | // don't report this as an UMR. |
| 22 | int res = getaddrinfo(name: "not-in-etc-hosts" , NULL, NULL, pai: &ai); |
| 23 | return 0; |
| 24 | } |
| 25 | |