普通文本  |  41行  |  1.33 KB

// RUN: %clangxx_msan -DPRE1 -O0 %s -o %t && not %run %t 2>&1
// RUN: %clangxx_msan -DPRE2 -O0 %s -o %t && not %run %t 2>&1
// RUN: %clangxx_msan -DPRE3 -O0 %s -o %t && not %run %t 2>&1
// RUN: %clangxx_msan -O0 %s -o %t && %run %t 2>&1

#include <assert.h>
#include <signal.h>
#include <string.h>

#include <sanitizer/linux_syscall_hooks.h>
#include <sanitizer/msan_interface.h>

struct my_kernel_sigaction {
  long handler, flags, restorer;
  uint64_t mask[20]; // larger than any known platform
};

int main() {
  my_kernel_sigaction act = {}, oldact = {};

#if defined(PRE1)
  __msan_poison(&act.handler, sizeof(act.handler));
  __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
#elif defined(PRE2)
  __msan_poison(&act.flags, sizeof(act.flags));
  __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
#elif defined(PRE3)
  __msan_poison(&act.mask, 1);
  __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
#else
  // Uninit past the end of the mask is ignored.
  __msan_poison(((char *)&act.mask) + 5, 1);
  __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 5);

  memset(&act, 0, sizeof(act));
  __msan_poison(&oldact, sizeof(oldact));
  __sanitizer_syscall_post_rt_sigaction(0, SIGUSR1, &act, &oldact, 5);
  assert(__msan_test_shadow(&oldact, sizeof(oldact)) == sizeof(long)*3 + 5);
#endif
}