44 lines
1.3 KiB
C++
44 lines
1.3 KiB
C++
// RUN: %clangxx_msan -fsanitize-memory-track-origins=2 -O1 %s -o %t && %run %t 2>&1 | FileCheck %s
|
|
|
|
#include <pthread.h>
|
|
#include <sanitizer/msan_interface.h>
|
|
#include <signal.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <ucontext.h>
|
|
#include <unistd.h>
|
|
|
|
void handler(int sig, siginfo_t *info, void *uctx) {
|
|
__msan_check_mem_is_initialized(uctx, sizeof(ucontext_t));
|
|
#if defined(__GLIBC__) && defined(__x86_64__)
|
|
auto *mctx = &static_cast<ucontext_t *>(uctx)->uc_mcontext;
|
|
if (auto *fpregs = mctx->fpregs) {
|
|
// The member names differ across header versions, but the actual layout
|
|
// is always the same. So avoid using members, just use arithmetic.
|
|
const uint32_t *after_xmm =
|
|
reinterpret_cast<const uint32_t *>(fpregs + 1) - 24;
|
|
if (after_xmm[12] == FP_XSTATE_MAGIC1) {
|
|
auto *xstate = reinterpret_cast<_xstate *>(mctx->fpregs);
|
|
__msan_check_mem_is_initialized(xstate, sizeof(*xstate));
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
|
|
__attribute__((noinline)) void poison_stack() {
|
|
char buf[64 << 10];
|
|
printf("buf: %p-%p\n", buf, buf + sizeof(buf));
|
|
}
|
|
|
|
int main(int argc, char **argv) {
|
|
struct sigaction act = {};
|
|
act.sa_sigaction = handler;
|
|
act.sa_flags = SA_SIGINFO;
|
|
sigaction(SIGPROF, &act, 0);
|
|
poison_stack();
|
|
pthread_kill(pthread_self(), SIGPROF);
|
|
return 0;
|
|
}
|
|
|
|
// CHECK-NOT: WARNING: MemorySanitizer:
|