blob: bf2526ce4228ba7c0e366c50ae35d28a99cab4f2 [file] [log] [blame]
// __NO_INLINE__ is defined so bsearch needs interceptor.
// RUN: %clangxx_msan -O0 -g %s -o %t && %run %t
// RUN: %clangxx_msan -DPOISON_DATA -O0 -g %s -o %t && not %run %t 2>&1 | FileCheck %s
// RUN: %clangxx_msan -DPOISON_KEY -O0 -g %s -o %t && not %run %t 2>&1 | FileCheck %s
// __NO_INLINE__ is undefined so bsearch should be inlined and instrumented and still work as expected.
// RUN: %clangxx_msan -O2 -g %s -o %t && %run %t
// RUN: %clangxx_msan -DPOISON_DATA -O2 -g %s -o %t && not %run %t 2>&1 | FileCheck %s
// RUN: %clangxx_msan -DPOISON_KEY -O2 -g %s -o %t && not %run %t 2>&1 | FileCheck %s
#include <assert.h>
#include <stdlib.h>
#include <sanitizer/msan_interface.h>
long z;
__attribute__((noinline, optnone)) void
poison_msan_param_tls(long a, long b, long c, long d, long e, long f) {
z = a + b + c + d + e + f;
}
static int compar(const void *a, const void *b) {
int r = *(const long *)a - *(const long *)b;
long x;
__msan_poison(&x, sizeof(x));
poison_msan_param_tls(x, x, x, x, x, x);
return r;
}
int main(int argc, char *argv[]) {
constexpr size_t SZ = 27;
long p[SZ + 1];
for (int i = 0; i < SZ + 1; ++i)
p[i] = i;
p[SZ] = SZ / 3;
#if defined(POISON_DATA)
__msan_poison(p, sizeof(long) * SZ / 2);
#elif defined(POISON_KEY)
__msan_poison(p + SZ, sizeof(long));
#endif
const long *r = (const long *)bsearch(p + SZ, p, SZ, sizeof(long), compar);
// CHECK: MemorySanitizer: use-of-uninitialized-value
assert(r == p + SZ / 3);
return 0;
}