1 //===-- msan_test.cc ------------------------------------------------------===//
3 // The LLVM Compiler Infrastructure
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
8 //===----------------------------------------------------------------------===//
10 // This file is a part of MemorySanitizer.
12 // MemorySanitizer unit tests.
13 //===----------------------------------------------------------------------===//
15 #ifndef MSAN_EXTERNAL_TEST_CONFIG
16 #include "msan_test_config.h"
17 #endif // MSAN_EXTERNAL_TEST_CONFIG
19 #include "sanitizer_common/tests/sanitizer_test_utils.h"
21 #include "sanitizer/allocator_interface.h"
22 #include "sanitizer/msan_interface.h"
24 #if defined(__FreeBSD__)
25 # define _KERNEL // To declare 'shminfo' structure.
29 // <sys/shm.h> doesn't declare these functions in _KERNEL mode.
30 void *shmat(int, const void *, int);
31 int shmget(key_t, size_t, int);
32 int shmctl(int, int, struct shmid_ds *);
33 int shmdt(const void *);
44 #include <arpa/inet.h>
52 #include <sys/types.h>
55 #include <sys/resource.h>
56 #include <sys/ioctl.h>
57 #include <sys/statvfs.h>
58 #include <sys/utsname.h>
62 #include <sys/socket.h>
68 #if defined(__NetBSD__)
70 # include <netinet/in.h>
72 # include <sys/mount.h>
73 # include <sys/sysctl.h>
75 # include <net/if_ether.h>
76 #elif defined(__FreeBSD__)
78 # include <netinet/in.h>
79 # include <pthread_np.h>
81 # include <sys/mount.h>
82 # include <sys/sysctl.h>
83 # include <net/ethernet.h>
84 # define f_namelen f_namemax // FreeBSD names this statfs field so.
85 # define cpu_set_t cpuset_t
87 // FreeBSD's <ssp/string.h> defines mempcpy() to be a macro expanding into
88 // a __builtin___mempcpy_chk() call, but since Msan RTL defines it as an
89 // ordinary function, we can declare it here to complete the tests.
90 void *mempcpy(void *dest, const void *src, size_t n);
94 # include <sys/sysinfo.h>
97 # include <netinet/ether.h>
98 # if defined(__linux__)
103 #if defined(__i386__) || defined(__x86_64__)
104 # include <emmintrin.h>
105 # define MSAN_HAS_M128 1
107 # define MSAN_HAS_M128 0
111 # include <immintrin.h>
114 #if defined(__FreeBSD__) || defined(__NetBSD__)
115 # define FILE_TO_READ "/bin/cat"
116 # define DIR_TO_READ "/bin"
117 # define SUBFILE_TO_READ "cat"
118 # define SYMLINK_TO_READ "/usr/bin/tar"
119 # define SUPERUSER_GROUP "wheel"
121 # define FILE_TO_READ "/proc/self/stat"
122 # define DIR_TO_READ "/proc/self"
123 # define SUBFILE_TO_READ "stat"
124 # define SYMLINK_TO_READ "/proc/self/exe"
125 # define SUPERUSER_GROUP "root"
128 static uintptr_t GetPageSize() {
129 return sysconf(_SC_PAGESIZE);
132 const size_t kMaxPathLength = 4096;
134 typedef unsigned char U1;
135 typedef unsigned short U2; // NOLINT
136 typedef unsigned int U4;
137 typedef unsigned long long U8; // NOLINT
138 typedef signed char S1;
139 typedef signed short S2; // NOLINT
140 typedef signed int S4;
141 typedef signed long long S8; // NOLINT
142 #define NOINLINE __attribute__((noinline))
143 #define INLINE __attribute__((always_inline))
145 static bool TrackingOrigins() {
147 __msan_set_origin(&x, sizeof(x), 0x1234);
148 U4 origin = __msan_get_origin(&x);
149 __msan_set_origin(&x, sizeof(x), 0);
150 return __msan_origin_is_descendant_or_same(origin, 0x1234);
153 #define EXPECT_ORIGIN(expected, origin) \
154 EXPECT_TRUE(__msan_origin_is_descendant_or_same((origin), (expected)))
156 #define EXPECT_UMR(action) \
158 __msan_set_expect_umr(1); \
160 __msan_set_expect_umr(0); \
163 #define EXPECT_UMR_O(action, origin) \
165 __msan_set_expect_umr(1); \
167 __msan_set_expect_umr(0); \
168 if (TrackingOrigins()) EXPECT_ORIGIN(origin, __msan_get_umr_origin()); \
171 #define EXPECT_POISONED(x) ExpectPoisoned(x)
174 void ExpectPoisoned(const T& t) {
175 EXPECT_NE(-1, __msan_test_shadow((void*)&t, sizeof(t)));
178 #define EXPECT_POISONED_O(x, origin) \
179 ExpectPoisonedWithOrigin(x, origin)
182 void ExpectPoisonedWithOrigin(const T& t, unsigned origin) {
183 EXPECT_NE(-1, __msan_test_shadow((void*)&t, sizeof(t)));
184 if (TrackingOrigins()) EXPECT_ORIGIN(origin, __msan_get_origin((void *)&t));
187 #define EXPECT_NOT_POISONED(x) EXPECT_EQ(true, TestForNotPoisoned((x)))
188 #define EXPECT_NOT_POISONED2(data, size) \
189 EXPECT_EQ(true, TestForNotPoisoned((data), (size)))
191 bool TestForNotPoisoned(const void *data, size_t size) {
192 return __msan_test_shadow(data, size) == -1;
196 bool TestForNotPoisoned(const T& t) {
197 return TestForNotPoisoned((void *)&t, sizeof(t));
200 static U8 poisoned_array[100];
202 T *GetPoisoned(int i = 0, T val = 0) {
203 T *res = (T*)&poisoned_array[i];
205 __msan_poison(&poisoned_array[i], sizeof(T));
210 T *GetPoisonedO(int i, U4 origin, T val = 0) {
211 T *res = (T*)&poisoned_array[i];
213 __msan_poison(&poisoned_array[i], sizeof(T));
214 __msan_set_origin(&poisoned_array[i], sizeof(T), origin);
219 T Poisoned(T v = 0, T s = (T)(-1)) {
220 __msan_partial_poison(&v, &s, sizeof(T));
224 template<class T> NOINLINE T ReturnPoisoned() { return *GetPoisoned<T>(); }
226 static volatile int g_one = 1;
227 static volatile int g_zero = 0;
228 static volatile int g_0 = 0;
229 static volatile int g_1 = 1;
234 // Check that malloc poisons memory.
235 // A lot of tests below depend on this.
236 TEST(MemorySanitizerSanity, PoisonInMalloc) {
237 int *x = (int*)malloc(sizeof(int));
242 TEST(MemorySanitizer, NegativeTest1) {
243 S4 *x = GetPoisoned<S4>();
246 EXPECT_NOT_POISONED(*x);
249 TEST(MemorySanitizer, PositiveTest1) {
251 EXPECT_POISONED(*GetPoisoned<S1>());
252 EXPECT_POISONED(*GetPoisoned<S2>());
253 EXPECT_POISONED(*GetPoisoned<S4>());
254 EXPECT_POISONED(*GetPoisoned<S8>());
257 EXPECT_POISONED(*GetPoisoned<S1>());
258 EXPECT_POISONED(*GetPoisoned<S1>());
259 EXPECT_POISONED(*GetPoisoned<S1>());
261 EXPECT_POISONED(*GetPoisoned<S2>());
262 EXPECT_POISONED(*GetPoisoned<S2>());
263 EXPECT_POISONED(*GetPoisoned<S2>());
265 EXPECT_POISONED(*GetPoisoned<S4>());
266 EXPECT_POISONED(*GetPoisoned<S4>());
267 EXPECT_POISONED(*GetPoisoned<S4>());
269 EXPECT_POISONED(*GetPoisoned<S8>());
270 EXPECT_POISONED(*GetPoisoned<S8>());
271 EXPECT_POISONED(*GetPoisoned<S8>());
274 EXPECT_POISONED(*GetPoisoned<U1>());
275 EXPECT_POISONED(*GetPoisoned<U1>());
276 EXPECT_POISONED(*GetPoisoned<U1>());
277 EXPECT_POISONED(*GetPoisoned<U2>());
278 EXPECT_POISONED(*GetPoisoned<U2>());
279 EXPECT_POISONED(*GetPoisoned<U4>());
282 EXPECT_POISONED(- *GetPoisoned<S4>());
284 EXPECT_UMR(a_s4[g_zero] = 100 / *GetPoisoned<S4>(0, 1));
287 a_s4[g_zero] = 1 - *GetPoisoned<S4>();
288 a_s4[g_zero] = 1 + *GetPoisoned<S4>();
291 TEST(MemorySanitizer, Phi1) {
294 c = *GetPoisoned<S4>();
296 break_optimization(0);
302 TEST(MemorySanitizer, Phi2) {
303 S4 i = *GetPoisoned<S4>();
305 EXPECT_UMR(for (; i < g_one; i++););
309 NOINLINE void Arg1ExpectUMR(S4 a1) { EXPECT_POISONED(a1); }
310 NOINLINE void Arg2ExpectUMR(S4 a1, S4 a2) { EXPECT_POISONED(a2); }
311 NOINLINE void Arg3ExpectUMR(S1 a1, S4 a2, S8 a3) { EXPECT_POISONED(a3); }
313 TEST(MemorySanitizer, ArgTest) {
314 Arg1ExpectUMR(*GetPoisoned<S4>());
315 Arg2ExpectUMR(0, *GetPoisoned<S4>());
316 Arg3ExpectUMR(0, 1, *GetPoisoned<S8>());
320 TEST(MemorySanitizer, CallAndRet) {
321 ReturnPoisoned<S1>();
322 ReturnPoisoned<S2>();
323 ReturnPoisoned<S4>();
324 ReturnPoisoned<S8>();
326 EXPECT_POISONED(ReturnPoisoned<S1>());
327 EXPECT_POISONED(ReturnPoisoned<S2>());
328 EXPECT_POISONED(ReturnPoisoned<S4>());
329 EXPECT_POISONED(ReturnPoisoned<S8>());
332 // malloc() in the following test may be optimized to produce a compile-time
333 // undef value. Check that we trap on the volatile assignment anyway.
334 TEST(MemorySanitizer, DISABLED_MallocNoIdent) {
335 S4 *x = (int*)malloc(sizeof(S4));
340 TEST(MemorySanitizer, Malloc) {
341 S4 *x = (int*)Ident(malloc(sizeof(S4)));
346 TEST(MemorySanitizer, Realloc) {
347 S4 *x = (int*)Ident(realloc(0, sizeof(S4)));
348 EXPECT_POISONED(x[0]);
350 x = (int*)Ident(realloc(x, 2 * sizeof(S4)));
351 EXPECT_NOT_POISONED(x[0]); // Ok, was inited before.
352 EXPECT_POISONED(x[1]);
353 x = (int*)Ident(realloc(x, 3 * sizeof(S4)));
354 EXPECT_NOT_POISONED(x[0]); // Ok, was inited before.
355 EXPECT_POISONED(x[2]);
356 EXPECT_POISONED(x[1]);
357 x[2] = 1; // Init this here. Check that after realloc it is poisoned again.
358 x = (int*)Ident(realloc(x, 2 * sizeof(S4)));
359 EXPECT_NOT_POISONED(x[0]); // Ok, was inited before.
360 EXPECT_POISONED(x[1]);
361 x = (int*)Ident(realloc(x, 3 * sizeof(S4)));
362 EXPECT_POISONED(x[1]);
363 EXPECT_POISONED(x[2]);
367 TEST(MemorySanitizer, Calloc) {
368 S4 *x = (int*)Ident(calloc(1, sizeof(S4)));
369 EXPECT_NOT_POISONED(*x); // Should not be poisoned.
374 TEST(MemorySanitizer, CallocReturnsZeroMem) {
375 size_t sizes[] = {16, 1000, 10000, 100000, 2100000};
376 for (size_t s = 0; s < sizeof(sizes)/sizeof(sizes[0]); s++) {
377 size_t size = sizes[s];
378 for (size_t iter = 0; iter < 5; iter++) {
379 char *x = Ident((char*)calloc(1, size));
381 EXPECT_EQ(x[size - 1], 0);
382 EXPECT_EQ(x[size / 2], 0);
383 EXPECT_EQ(x[size / 3], 0);
384 EXPECT_EQ(x[size / 4], 0);
385 memset(x, 0x42, size);
391 TEST(MemorySanitizer, AndOr) {
392 U4 *p = GetPoisoned<U4>();
393 // We poison two bytes in the midle of a 4-byte word to make the test
394 // correct regardless of endianness.
397 EXPECT_NOT_POISONED(*p & 0x00ffff00);
398 EXPECT_NOT_POISONED(*p & 0x00ff0000);
399 EXPECT_NOT_POISONED(*p & 0x0000ff00);
400 EXPECT_POISONED(*p & 0xff000000);
401 EXPECT_POISONED(*p & 0x000000ff);
402 EXPECT_POISONED(*p & 0x0000ffff);
403 EXPECT_POISONED(*p & 0xffff0000);
405 EXPECT_NOT_POISONED(*p | 0xff0000ff);
406 EXPECT_NOT_POISONED(*p | 0xff00ffff);
407 EXPECT_NOT_POISONED(*p | 0xffff00ff);
408 EXPECT_POISONED(*p | 0xff000000);
409 EXPECT_POISONED(*p | 0x000000ff);
410 EXPECT_POISONED(*p | 0x0000ffff);
411 EXPECT_POISONED(*p | 0xffff0000);
413 EXPECT_POISONED(*GetPoisoned<bool>() & *GetPoisoned<bool>());
417 static bool applyNot(T value, T shadow) {
418 __msan_partial_poison(&value, &shadow, sizeof(T));
422 TEST(MemorySanitizer, Not) {
423 EXPECT_NOT_POISONED(applyNot<U4>(0x0, 0x0));
424 EXPECT_NOT_POISONED(applyNot<U4>(0xFFFFFFFF, 0x0));
425 EXPECT_POISONED(applyNot<U4>(0xFFFFFFFF, 0xFFFFFFFF));
426 EXPECT_NOT_POISONED(applyNot<U4>(0xFF000000, 0x0FFFFFFF));
427 EXPECT_NOT_POISONED(applyNot<U4>(0xFF000000, 0x00FFFFFF));
428 EXPECT_NOT_POISONED(applyNot<U4>(0xFF000000, 0x0000FFFF));
429 EXPECT_NOT_POISONED(applyNot<U4>(0xFF000000, 0x00000000));
430 EXPECT_POISONED(applyNot<U4>(0xFF000000, 0xFF000000));
431 EXPECT_NOT_POISONED(applyNot<U4>(0xFF800000, 0xFF000000));
432 EXPECT_POISONED(applyNot<U4>(0x00008000, 0x00008000));
434 EXPECT_NOT_POISONED(applyNot<U1>(0x0, 0x0));
435 EXPECT_NOT_POISONED(applyNot<U1>(0xFF, 0xFE));
436 EXPECT_NOT_POISONED(applyNot<U1>(0xFF, 0x0));
437 EXPECT_POISONED(applyNot<U1>(0xFF, 0xFF));
439 EXPECT_POISONED(applyNot<void*>((void*)0xFFFFFF, (void*)(-1)));
440 EXPECT_NOT_POISONED(applyNot<void*>((void*)0xFFFFFF, (void*)(-2)));
443 TEST(MemorySanitizer, Shift) {
444 U4 *up = GetPoisoned<U4>();
447 EXPECT_NOT_POISONED(*up >> 30);
448 EXPECT_NOT_POISONED(*up >> 24);
449 EXPECT_POISONED(*up >> 23);
450 EXPECT_POISONED(*up >> 10);
452 EXPECT_NOT_POISONED(*up << 30);
453 EXPECT_NOT_POISONED(*up << 24);
454 EXPECT_POISONED(*up << 23);
455 EXPECT_POISONED(*up << 10);
458 EXPECT_NOT_POISONED(*sp >> 30);
459 EXPECT_NOT_POISONED(*sp >> 24);
460 EXPECT_POISONED(*sp >> 23);
461 EXPECT_POISONED(*sp >> 10);
463 sp = GetPoisoned<S4>();
466 EXPECT_POISONED(*sp >> 31);
468 EXPECT_POISONED(100 >> *GetPoisoned<S4>());
469 EXPECT_POISONED(100U >> *GetPoisoned<S4>());
472 NOINLINE static int GetPoisonedZero() {
475 __msan_poison(zero, sizeof(*zero));
481 TEST(MemorySanitizer, LoadFromDirtyAddress) {
484 EXPECT_UMR(break_optimization((void*)(U8)a[GetPoisonedZero()]));
488 TEST(MemorySanitizer, StoreToDirtyAddress) {
490 EXPECT_UMR(a[GetPoisonedZero()] = 0);
491 break_optimization(a);
496 NOINLINE void StackTestFunc() {
503 break_optimization(&p4);
504 break_optimization(&ok4);
505 break_optimization(&p2);
506 break_optimization(&ok2);
507 break_optimization(&p1);
508 break_optimization(&ok1);
513 EXPECT_NOT_POISONED(ok1);
514 EXPECT_NOT_POISONED(ok2);
515 EXPECT_NOT_POISONED(ok4);
518 TEST(MemorySanitizer, StackTest) {
522 NOINLINE void StackStressFunc() {
524 break_optimization(foo);
527 TEST(MemorySanitizer, DISABLED_StackStressTest) {
528 for (int i = 0; i < 1000000; i++)
533 void TestFloatingPoint() {
536 break_optimization(&g);
537 T *x = GetPoisoned<T>();
538 T *y = GetPoisoned<T>(1);
540 EXPECT_POISONED((long long)*x);
541 EXPECT_POISONED((int)*x);
548 TEST(MemorySanitizer, FloatingPointTest) {
549 TestFloatingPoint<float>();
550 TestFloatingPoint<double>();
553 TEST(MemorySanitizer, DynMem) {
555 S4 *y = GetPoisoned<S4>();
556 memcpy(y, &x, g_one * sizeof(S4));
557 EXPECT_NOT_POISONED(*y);
560 static char *DynRetTestStr;
562 TEST(MemorySanitizer, DynRet) {
563 ReturnPoisoned<S8>();
564 EXPECT_NOT_POISONED(atoi("0"));
567 TEST(MemorySanitizer, DynRet1) {
568 ReturnPoisoned<S8>();
576 LargeStruct LargeRetTest() {
578 res.x[0] = *GetPoisoned<S4>();
579 res.x[1] = *GetPoisoned<S4>();
580 res.x[2] = *GetPoisoned<S4>();
581 res.x[3] = *GetPoisoned<S4>();
582 res.x[4] = *GetPoisoned<S4>();
583 res.x[5] = *GetPoisoned<S4>();
584 res.x[6] = *GetPoisoned<S4>();
585 res.x[7] = *GetPoisoned<S4>();
586 res.x[8] = *GetPoisoned<S4>();
587 res.x[9] = *GetPoisoned<S4>();
591 TEST(MemorySanitizer, strcmp) {
594 strncpy(s1, "foo", 10);
597 EXPECT_GT(strcmp(s1, s2), 0);
600 EXPECT_UMR(res = strcmp(s1, s2));
601 EXPECT_NOT_POISONED(res);
602 EXPECT_EQ(strncmp(s1, s2, 1), 0);
605 TEST(MemorySanitizer, LargeRet) {
606 LargeStruct a = LargeRetTest();
607 EXPECT_POISONED(a.x[0]);
608 EXPECT_POISONED(a.x[9]);
611 TEST(MemorySanitizer, strerror) {
612 char *buf = strerror(EINVAL);
613 EXPECT_NOT_POISONED(strlen(buf));
614 buf = strerror(123456);
615 EXPECT_NOT_POISONED(strlen(buf));
618 TEST(MemorySanitizer, strerror_r) {
621 char *res = (char*) (size_t) strerror_r(EINVAL, buf, sizeof(buf));
623 if (!res) res = buf; // POSIX version success.
624 EXPECT_NOT_POISONED(strlen(res));
627 TEST(MemorySanitizer, fread) {
628 char *x = new char[32];
629 FILE *f = fopen(FILE_TO_READ, "r");
630 ASSERT_TRUE(f != NULL);
632 EXPECT_NOT_POISONED(x[0]);
633 EXPECT_NOT_POISONED(x[16]);
634 EXPECT_NOT_POISONED(x[31]);
639 TEST(MemorySanitizer, read) {
640 char *x = new char[32];
641 int fd = open(FILE_TO_READ, O_RDONLY);
643 int sz = read(fd, x, 32);
645 EXPECT_NOT_POISONED(x[0]);
646 EXPECT_NOT_POISONED(x[16]);
647 EXPECT_NOT_POISONED(x[31]);
652 TEST(MemorySanitizer, pread) {
653 char *x = new char[32];
654 int fd = open(FILE_TO_READ, O_RDONLY);
656 int sz = pread(fd, x, 32, 0);
658 EXPECT_NOT_POISONED(x[0]);
659 EXPECT_NOT_POISONED(x[16]);
660 EXPECT_NOT_POISONED(x[31]);
665 TEST(MemorySanitizer, readv) {
668 iov[0].iov_base = buf + 1;
670 iov[1].iov_base = buf + 10;
671 iov[1].iov_len = 2000;
672 int fd = open(FILE_TO_READ, O_RDONLY);
674 int sz = readv(fd, iov, 2);
676 ASSERT_LE(sz, 5 + 2000);
677 ASSERT_GT((size_t)sz, iov[0].iov_len);
678 EXPECT_POISONED(buf[0]);
679 EXPECT_NOT_POISONED(buf[1]);
680 EXPECT_NOT_POISONED(buf[5]);
681 EXPECT_POISONED(buf[6]);
682 EXPECT_POISONED(buf[9]);
683 EXPECT_NOT_POISONED(buf[10]);
684 EXPECT_NOT_POISONED(buf[10 + (sz - 1) - 5]);
685 EXPECT_POISONED(buf[11 + (sz - 1) - 5]);
689 TEST(MemorySanitizer, preadv) {
692 iov[0].iov_base = buf + 1;
694 iov[1].iov_base = buf + 10;
695 iov[1].iov_len = 2000;
696 int fd = open(FILE_TO_READ, O_RDONLY);
698 int sz = preadv(fd, iov, 2, 3);
700 ASSERT_LE(sz, 5 + 2000);
701 ASSERT_GT((size_t)sz, iov[0].iov_len);
702 EXPECT_POISONED(buf[0]);
703 EXPECT_NOT_POISONED(buf[1]);
704 EXPECT_NOT_POISONED(buf[5]);
705 EXPECT_POISONED(buf[6]);
706 EXPECT_POISONED(buf[9]);
707 EXPECT_NOT_POISONED(buf[10]);
708 EXPECT_NOT_POISONED(buf[10 + (sz - 1) - 5]);
709 EXPECT_POISONED(buf[11 + (sz - 1) - 5]);
714 TEST(MemorySanitizer, DISABLED_ioctl) {
716 EXPECT_EQ(ioctl(2, TIOCGWINSZ, &ws), 0);
717 EXPECT_NOT_POISONED(ws.ws_col);
720 TEST(MemorySanitizer, readlink) {
721 char *x = new char[1000];
722 readlink(SYMLINK_TO_READ, x, 1000);
723 EXPECT_NOT_POISONED(x[0]);
727 TEST(MemorySanitizer, readlinkat) {
728 char *x = new char[1000];
729 readlinkat(AT_FDCWD, SYMLINK_TO_READ, x, 1000);
730 EXPECT_NOT_POISONED(x[0]);
734 TEST(MemorySanitizer, stat) {
735 struct stat* st = new struct stat;
736 int res = stat(FILE_TO_READ, st);
738 EXPECT_NOT_POISONED(st->st_dev);
739 EXPECT_NOT_POISONED(st->st_mode);
740 EXPECT_NOT_POISONED(st->st_size);
743 TEST(MemorySanitizer, fstatat) {
744 struct stat* st = new struct stat;
745 int dirfd = open(DIR_TO_READ, O_RDONLY);
747 int res = fstatat(dirfd, SUBFILE_TO_READ, st, 0);
749 EXPECT_NOT_POISONED(st->st_dev);
750 EXPECT_NOT_POISONED(st->st_mode);
751 EXPECT_NOT_POISONED(st->st_size);
755 #if !defined(__NetBSD__)
756 TEST(MemorySanitizer, statfs) {
758 int res = statfs("/", &st);
760 EXPECT_NOT_POISONED(st.f_type);
761 EXPECT_NOT_POISONED(st.f_bfree);
762 EXPECT_NOT_POISONED(st.f_namelen);
766 TEST(MemorySanitizer, statvfs) {
768 int res = statvfs("/", &st);
770 EXPECT_NOT_POISONED(st.f_bsize);
771 EXPECT_NOT_POISONED(st.f_blocks);
772 EXPECT_NOT_POISONED(st.f_bfree);
773 EXPECT_NOT_POISONED(st.f_namemax);
776 TEST(MemorySanitizer, fstatvfs) {
778 int fd = open("/", O_RDONLY | O_DIRECTORY);
779 int res = fstatvfs(fd, &st);
781 EXPECT_NOT_POISONED(st.f_bsize);
782 EXPECT_NOT_POISONED(st.f_blocks);
783 EXPECT_NOT_POISONED(st.f_bfree);
784 EXPECT_NOT_POISONED(st.f_namemax);
788 TEST(MemorySanitizer, pipe) {
789 int* pipefd = new int[2];
790 int res = pipe(pipefd);
792 EXPECT_NOT_POISONED(pipefd[0]);
793 EXPECT_NOT_POISONED(pipefd[1]);
798 TEST(MemorySanitizer, pipe2) {
799 int* pipefd = new int[2];
800 int res = pipe2(pipefd, O_NONBLOCK);
802 EXPECT_NOT_POISONED(pipefd[0]);
803 EXPECT_NOT_POISONED(pipefd[1]);
808 TEST(MemorySanitizer, socketpair) {
810 int res = socketpair(AF_UNIX, SOCK_STREAM, 0, sv);
812 EXPECT_NOT_POISONED(sv[0]);
813 EXPECT_NOT_POISONED(sv[1]);
818 TEST(MemorySanitizer, poll) {
819 int* pipefd = new int[2];
820 int res = pipe(pipefd);
824 res = write(pipefd[1], &data, 1);
828 fds[0].fd = pipefd[0];
829 fds[0].events = POLLIN;
830 fds[1].fd = pipefd[1];
831 fds[1].events = POLLIN;
832 res = poll(fds, 2, 500);
834 EXPECT_NOT_POISONED(fds[0].revents);
835 EXPECT_NOT_POISONED(fds[1].revents);
841 #if !defined (__FreeBSD__) && !defined (__NetBSD__)
842 TEST(MemorySanitizer, ppoll) {
843 int* pipefd = new int[2];
844 int res = pipe(pipefd);
848 res = write(pipefd[1], &data, 1);
852 fds[0].fd = pipefd[0];
853 fds[0].events = POLLIN;
854 fds[1].fd = pipefd[1];
855 fds[1].events = POLLIN;
858 res = ppoll(fds, 2, NULL, &ss);
860 EXPECT_NOT_POISONED(fds[0].revents);
861 EXPECT_NOT_POISONED(fds[1].revents);
868 TEST(MemorySanitizer, poll_positive) {
869 int* pipefd = new int[2];
870 int res = pipe(pipefd);
874 fds[0].fd = pipefd[0];
875 fds[0].events = POLLIN;
876 // fds[1].fd uninitialized
877 fds[1].events = POLLIN;
878 EXPECT_UMR(poll(fds, 2, 0));
884 TEST(MemorySanitizer, bind_getsockname) {
885 int sock = socket(AF_UNIX, SOCK_STREAM, 0);
887 struct sockaddr_in sai;
888 memset(&sai, 0, sizeof(sai));
889 sai.sin_family = AF_UNIX;
890 int res = bind(sock, (struct sockaddr *)&sai, sizeof(sai));
895 EXPECT_UMR(getsockname(sock, (struct sockaddr *)&buf, &addrlen));
897 addrlen = sizeof(buf);
898 res = getsockname(sock, (struct sockaddr *)&buf, &addrlen);
899 EXPECT_NOT_POISONED(addrlen);
900 EXPECT_NOT_POISONED(buf[0]);
901 EXPECT_NOT_POISONED(buf[addrlen - 1]);
902 EXPECT_POISONED(buf[addrlen]);
908 virtual ~SocketAddr() = default;
909 virtual struct sockaddr *ptr() = 0;
910 virtual size_t size() const = 0;
912 template <class... Args>
913 static std::unique_ptr<SocketAddr> Create(int family, Args... args);
916 class SocketAddr4 : public SocketAddr {
918 SocketAddr4() { EXPECT_POISONED(sai_); }
919 explicit SocketAddr4(uint16_t port) {
920 memset(&sai_, 0, sizeof(sai_));
921 sai_.sin_family = AF_INET;
922 sai_.sin_port = port;
923 sai_.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
926 sockaddr *ptr() override { return reinterpret_cast<sockaddr *>(&sai_); }
928 size_t size() const override { return sizeof(sai_); }
934 class SocketAddr6 : public SocketAddr {
936 SocketAddr6() { EXPECT_POISONED(sai_); }
937 explicit SocketAddr6(uint16_t port) {
938 memset(&sai_, 0, sizeof(sai_));
939 sai_.sin6_family = AF_INET6;
940 sai_.sin6_port = port;
941 sai_.sin6_addr = in6addr_loopback;
944 sockaddr *ptr() override { return reinterpret_cast<sockaddr *>(&sai_); }
946 size_t size() const override { return sizeof(sai_); }
952 template <class... Args>
953 std::unique_ptr<SocketAddr> SocketAddr::Create(int family, Args... args) {
954 if (family == AF_INET)
955 return std::unique_ptr<SocketAddr>(new SocketAddr4(args...));
956 return std::unique_ptr<SocketAddr>(new SocketAddr6(args...));
959 class MemorySanitizerIpTest : public ::testing::TestWithParam<int> {
961 void SetUp() override {
962 ASSERT_TRUE(GetParam() == AF_INET || GetParam() == AF_INET6);
965 template <class... Args>
966 std::unique_ptr<SocketAddr> CreateSockAddr(Args... args) const {
967 return SocketAddr::Create(GetParam(), args...);
970 int CreateSocket(int socket_type) const {
971 return socket(GetParam(), socket_type, 0);
975 std::vector<int> GetAvailableIpSocketFamilies() {
976 std::vector<int> result;
978 for (int i : {AF_INET, AF_INET6}) {
979 int s = socket(i, SOCK_STREAM, 0);
981 auto sai = SocketAddr::Create(i, 0);
982 if (bind(s, sai->ptr(), sai->size()) == 0) result.push_back(i);
990 INSTANTIATE_TEST_CASE_P(IpTests, MemorySanitizerIpTest,
991 ::testing::ValuesIn(GetAvailableIpSocketFamilies()));
993 TEST_P(MemorySanitizerIpTest, accept) {
994 int listen_socket = CreateSocket(SOCK_STREAM);
995 ASSERT_LT(0, listen_socket);
997 auto sai = CreateSockAddr(0);
998 int res = bind(listen_socket, sai->ptr(), sai->size());
1001 res = listen(listen_socket, 1);
1004 socklen_t sz = sai->size();
1005 res = getsockname(listen_socket, sai->ptr(), &sz);
1007 ASSERT_EQ(sai->size(), sz);
1009 int connect_socket = CreateSocket(SOCK_STREAM);
1010 ASSERT_LT(0, connect_socket);
1011 res = fcntl(connect_socket, F_SETFL, O_NONBLOCK);
1013 res = connect(connect_socket, sai->ptr(), sai->size());
1014 // On FreeBSD this connection completes immediately.
1017 ASSERT_EQ(EINPROGRESS, errno);
1020 __msan_poison(sai->ptr(), sai->size());
1021 int new_sock = accept(listen_socket, sai->ptr(), &sz);
1022 ASSERT_LT(0, new_sock);
1023 ASSERT_EQ(sai->size(), sz);
1024 EXPECT_NOT_POISONED2(sai->ptr(), sai->size());
1026 __msan_poison(sai->ptr(), sai->size());
1027 res = getpeername(new_sock, sai->ptr(), &sz);
1029 ASSERT_EQ(sai->size(), sz);
1030 EXPECT_NOT_POISONED2(sai->ptr(), sai->size());
1033 close(connect_socket);
1034 close(listen_socket);
1037 TEST_P(MemorySanitizerIpTest, recvmsg) {
1038 int server_socket = CreateSocket(SOCK_DGRAM);
1039 ASSERT_LT(0, server_socket);
1041 auto sai = CreateSockAddr(0);
1042 int res = bind(server_socket, sai->ptr(), sai->size());
1045 socklen_t sz = sai->size();
1046 res = getsockname(server_socket, sai->ptr(), &sz);
1048 ASSERT_EQ(sai->size(), sz);
1050 int client_socket = CreateSocket(SOCK_DGRAM);
1051 ASSERT_LT(0, client_socket);
1053 auto client_sai = CreateSockAddr(0);
1054 res = bind(client_socket, client_sai->ptr(), client_sai->size());
1057 sz = client_sai->size();
1058 res = getsockname(client_socket, client_sai->ptr(), &sz);
1060 ASSERT_EQ(client_sai->size(), sz);
1062 const char *s = "message text";
1064 iov.iov_base = (void *)s;
1065 iov.iov_len = strlen(s) + 1;
1067 memset(&msg, 0, sizeof(msg));
1068 msg.msg_name = sai->ptr();
1069 msg.msg_namelen = sai->size();
1072 res = sendmsg(client_socket, &msg, 0);
1076 struct iovec recv_iov;
1077 recv_iov.iov_base = (void *)&buf;
1078 recv_iov.iov_len = sizeof(buf);
1079 auto recv_sai = CreateSockAddr();
1080 struct msghdr recv_msg;
1081 memset(&recv_msg, 0, sizeof(recv_msg));
1082 recv_msg.msg_name = recv_sai->ptr();
1083 recv_msg.msg_namelen = recv_sai->size();
1084 recv_msg.msg_iov = &recv_iov;
1085 recv_msg.msg_iovlen = 1;
1086 res = recvmsg(server_socket, &recv_msg, 0);
1089 ASSERT_EQ(recv_sai->size(), recv_msg.msg_namelen);
1090 EXPECT_NOT_POISONED2(recv_sai->ptr(), recv_sai->size());
1091 EXPECT_STREQ(s, buf);
1093 close(server_socket);
1094 close(client_socket);
1097 #define EXPECT_HOSTENT_NOT_POISONED(he) \
1099 EXPECT_NOT_POISONED(*(he)); \
1100 ASSERT_NE((void *)0, (he)->h_name); \
1101 ASSERT_NE((void *)0, (he)->h_aliases); \
1102 ASSERT_NE((void *)0, (he)->h_addr_list); \
1103 EXPECT_NOT_POISONED(strlen((he)->h_name)); \
1104 char **p = (he)->h_aliases; \
1106 EXPECT_NOT_POISONED(strlen(*p)); \
1109 char **q = (he)->h_addr_list; \
1111 EXPECT_NOT_POISONED(*q[0]); \
1114 EXPECT_NOT_POISONED(*q); \
1117 TEST(MemorySanitizer, gethostent) {
1118 struct hostent *he = gethostent();
1119 ASSERT_NE((void *)NULL, he);
1120 EXPECT_HOSTENT_NOT_POISONED(he);
1123 #ifndef MSAN_TEST_DISABLE_GETHOSTBYNAME
1125 TEST(MemorySanitizer, gethostbyname) {
1126 struct hostent *he = gethostbyname("localhost");
1127 ASSERT_NE((void *)NULL, he);
1128 EXPECT_HOSTENT_NOT_POISONED(he);
1131 #endif // MSAN_TEST_DISABLE_GETHOSTBYNAME
1133 TEST(MemorySanitizer, getaddrinfo) {
1134 struct addrinfo *ai;
1135 struct addrinfo hints;
1136 memset(&hints, 0, sizeof(hints));
1137 hints.ai_family = AF_INET;
1138 int res = getaddrinfo("localhost", NULL, &hints, &ai);
1140 EXPECT_NOT_POISONED(*ai);
1141 ASSERT_EQ(sizeof(sockaddr_in), ai->ai_addrlen);
1142 EXPECT_NOT_POISONED(*(sockaddr_in *)ai->ai_addr);
1145 TEST(MemorySanitizer, getnameinfo) {
1146 struct sockaddr_in sai;
1147 memset(&sai, 0, sizeof(sai));
1148 sai.sin_family = AF_INET;
1150 sai.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
1153 int res = getnameinfo((struct sockaddr *)&sai, sizeof(sai), host,
1154 sizeof(host), serv, sizeof(serv), 0);
1156 EXPECT_NOT_POISONED(host[0]);
1157 EXPECT_POISONED(host[sizeof(host) - 1]);
1159 ASSERT_NE(0U, strlen(host));
1160 EXPECT_NOT_POISONED(serv[0]);
1161 EXPECT_POISONED(serv[sizeof(serv) - 1]);
1162 ASSERT_NE(0U, strlen(serv));
1165 TEST(MemorySanitizer, gethostbyname2) {
1166 struct hostent *he = gethostbyname2("localhost", AF_INET);
1167 ASSERT_NE((void *)NULL, he);
1168 EXPECT_HOSTENT_NOT_POISONED(he);
1171 TEST(MemorySanitizer, gethostbyaddr) {
1172 in_addr_t addr = inet_addr("127.0.0.1");
1173 EXPECT_NOT_POISONED(addr);
1174 struct hostent *he = gethostbyaddr(&addr, sizeof(addr), AF_INET);
1175 ASSERT_NE((void *)NULL, he);
1176 EXPECT_HOSTENT_NOT_POISONED(he);
1179 #if !defined(__NetBSD__)
1180 TEST(MemorySanitizer, gethostent_r) {
1183 struct hostent *result;
1185 int res = gethostent_r(&he, buf, sizeof(buf), &result, &err);
1187 EXPECT_NOT_POISONED(result);
1188 ASSERT_NE((void *)NULL, result);
1189 EXPECT_HOSTENT_NOT_POISONED(result);
1190 EXPECT_NOT_POISONED(err);
1194 #if !defined(__NetBSD__)
1195 TEST(MemorySanitizer, gethostbyname_r) {
1198 struct hostent *result;
1200 int res = gethostbyname_r("localhost", &he, buf, sizeof(buf), &result, &err);
1202 EXPECT_NOT_POISONED(result);
1203 ASSERT_NE((void *)NULL, result);
1204 EXPECT_HOSTENT_NOT_POISONED(result);
1205 EXPECT_NOT_POISONED(err);
1209 #if !defined(__NetBSD__)
1210 TEST(MemorySanitizer, gethostbyname_r_bad_host_name) {
1213 struct hostent *result;
1215 int res = gethostbyname_r("bad-host-name", &he, buf, sizeof(buf), &result, &err);
1216 ASSERT_EQ((struct hostent *)0, result);
1217 EXPECT_NOT_POISONED(err);
1221 #if !defined(__NetBSD__)
1222 TEST(MemorySanitizer, gethostbyname_r_erange) {
1225 struct hostent *result;
1227 gethostbyname_r("localhost", &he, buf, sizeof(buf), &result, &err);
1228 ASSERT_EQ(ERANGE, errno);
1229 EXPECT_NOT_POISONED(err);
1233 #if !defined(__NetBSD__)
1234 TEST(MemorySanitizer, gethostbyname2_r) {
1237 struct hostent *result;
1239 int res = gethostbyname2_r("localhost", AF_INET, &he, buf, sizeof(buf),
1242 EXPECT_NOT_POISONED(result);
1243 ASSERT_NE((void *)NULL, result);
1244 EXPECT_HOSTENT_NOT_POISONED(result);
1245 EXPECT_NOT_POISONED(err);
1249 #if !defined(__NetBSD__)
1250 TEST(MemorySanitizer, gethostbyaddr_r) {
1253 struct hostent *result;
1255 in_addr_t addr = inet_addr("127.0.0.1");
1256 EXPECT_NOT_POISONED(addr);
1257 int res = gethostbyaddr_r(&addr, sizeof(addr), AF_INET, &he, buf, sizeof(buf),
1260 EXPECT_NOT_POISONED(result);
1261 ASSERT_NE((void *)NULL, result);
1262 EXPECT_HOSTENT_NOT_POISONED(result);
1263 EXPECT_NOT_POISONED(err);
1267 TEST(MemorySanitizer, getsockopt) {
1268 int sock = socket(AF_UNIX, SOCK_STREAM, 0);
1270 socklen_t sz = sizeof(l[0]);
1271 int res = getsockopt(sock, SOL_SOCKET, SO_LINGER, &l[0], &sz);
1273 ASSERT_EQ(sizeof(l[0]), sz);
1274 EXPECT_NOT_POISONED(l[0]);
1275 EXPECT_POISONED(*(char *)(l + 1));
1278 TEST(MemorySanitizer, getcwd) {
1279 char path[PATH_MAX + 1];
1280 char* res = getcwd(path, sizeof(path));
1281 ASSERT_TRUE(res != NULL);
1282 EXPECT_NOT_POISONED(path[0]);
1285 TEST(MemorySanitizer, getcwd_gnu) {
1286 char* res = getcwd(NULL, 0);
1287 ASSERT_TRUE(res != NULL);
1288 EXPECT_NOT_POISONED(res[0]);
1292 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1293 TEST(MemorySanitizer, get_current_dir_name) {
1294 char* res = get_current_dir_name();
1295 ASSERT_TRUE(res != NULL);
1296 EXPECT_NOT_POISONED(res[0]);
1301 TEST(MemorySanitizer, shmctl) {
1302 int id = shmget(IPC_PRIVATE, 4096, 0644 | IPC_CREAT);
1306 int res = shmctl(id, IPC_STAT, &ds);
1308 EXPECT_NOT_POISONED(ds);
1310 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1312 res = shmctl(id, IPC_INFO, (struct shmid_ds *)&si);
1314 EXPECT_NOT_POISONED(si);
1316 struct shm_info s_i;
1317 res = shmctl(id, SHM_INFO, (struct shmid_ds *)&s_i);
1319 EXPECT_NOT_POISONED(s_i);
1322 res = shmctl(id, IPC_RMID, 0);
1326 TEST(MemorySanitizer, shmat) {
1327 const int kShmSize = 4096;
1328 void *mapping_start = mmap(NULL, kShmSize + SHMLBA, PROT_READ | PROT_WRITE,
1329 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
1330 ASSERT_NE(MAP_FAILED, mapping_start);
1332 void *p = (void *)(((unsigned long)mapping_start + SHMLBA - 1) / SHMLBA * SHMLBA);
1333 // p is now SHMLBA-aligned;
1335 ((char *)p)[10] = *GetPoisoned<U1>();
1336 ((char *)p)[kShmSize - 1] = *GetPoisoned<U1>();
1338 int res = munmap(mapping_start, kShmSize + SHMLBA);
1341 int id = shmget(IPC_PRIVATE, kShmSize, 0644 | IPC_CREAT);
1344 void *q = shmat(id, p, 0);
1347 EXPECT_NOT_POISONED(((char *)q)[0]);
1348 EXPECT_NOT_POISONED(((char *)q)[10]);
1349 EXPECT_NOT_POISONED(((char *)q)[kShmSize - 1]);
1354 res = shmctl(id, IPC_RMID, 0);
1358 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1359 TEST(MemorySanitizer, random_r) {
1362 memset(z, 0, sizeof(z));
1364 struct random_data buf;
1365 memset(&buf, 0, sizeof(buf));
1367 int res = initstate_r(0, z, sizeof(z), &buf);
1370 res = random_r(&buf, &x);
1372 EXPECT_NOT_POISONED(x);
1376 TEST(MemorySanitizer, confstr) {
1378 size_t res = confstr(_CS_PATH, buf, sizeof(buf));
1379 ASSERT_GT(res, sizeof(buf));
1380 EXPECT_NOT_POISONED(buf[0]);
1381 EXPECT_NOT_POISONED(buf[sizeof(buf) - 1]);
1384 res = confstr(_CS_PATH, buf2, sizeof(buf2));
1385 ASSERT_LT(res, sizeof(buf2));
1386 EXPECT_NOT_POISONED(buf2[0]);
1387 EXPECT_NOT_POISONED(buf2[res - 1]);
1388 EXPECT_POISONED(buf2[res]);
1389 ASSERT_EQ(res, strlen(buf2) + 1);
1392 TEST(MemorySanitizer, opendir) {
1393 DIR *dir = opendir(".");
1396 char name[10] = ".";
1397 __msan_poison(name, sizeof(name));
1398 EXPECT_UMR(dir = opendir(name));
1402 TEST(MemorySanitizer, readdir) {
1403 DIR *dir = opendir(".");
1404 struct dirent *d = readdir(dir);
1405 ASSERT_TRUE(d != NULL);
1406 EXPECT_NOT_POISONED(d->d_name[0]);
1410 TEST(MemorySanitizer, readdir_r) {
1411 DIR *dir = opendir(".");
1414 int res = readdir_r(dir, &d, &pd);
1416 EXPECT_NOT_POISONED(pd);
1417 EXPECT_NOT_POISONED(d.d_name[0]);
1421 TEST(MemorySanitizer, realpath) {
1422 const char* relpath = ".";
1423 char path[PATH_MAX + 1];
1424 char* res = realpath(relpath, path);
1425 ASSERT_TRUE(res != NULL);
1426 EXPECT_NOT_POISONED(path[0]);
1429 TEST(MemorySanitizer, realpath_null) {
1430 const char* relpath = ".";
1431 char* res = realpath(relpath, NULL);
1432 printf("%d, %s\n", errno, strerror(errno));
1433 ASSERT_TRUE(res != NULL);
1434 EXPECT_NOT_POISONED(res[0]);
1438 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1439 TEST(MemorySanitizer, canonicalize_file_name) {
1440 const char* relpath = ".";
1441 char* res = canonicalize_file_name(relpath);
1442 ASSERT_TRUE(res != NULL);
1443 EXPECT_NOT_POISONED(res[0]);
1448 extern char **environ;
1450 TEST(MemorySanitizer, setenv) {
1451 setenv("AAA", "BBB", 1);
1452 for (char **envp = environ; *envp; ++envp) {
1453 EXPECT_NOT_POISONED(*envp);
1454 EXPECT_NOT_POISONED(*envp[0]);
1458 TEST(MemorySanitizer, putenv) {
1459 char s[] = "AAA=BBB";
1461 for (char **envp = environ; *envp; ++envp) {
1462 EXPECT_NOT_POISONED(*envp);
1463 EXPECT_NOT_POISONED(*envp[0]);
1467 TEST(MemorySanitizer, memcpy) {
1468 char* x = new char[2];
1469 char* y = new char[2];
1471 x[1] = *GetPoisoned<char>();
1473 EXPECT_NOT_POISONED(y[0]);
1474 EXPECT_POISONED(y[1]);
1477 void TestUnalignedMemcpy(unsigned left, unsigned right, bool src_is_aligned,
1478 bool src_is_poisoned, bool dst_is_poisoned) {
1479 fprintf(stderr, "%s(%d, %d, %d, %d, %d)\n", __func__, left, right,
1480 src_is_aligned, src_is_poisoned, dst_is_poisoned);
1482 const unsigned sz = 20;
1483 U4 dst_origin, src_origin;
1484 char *dst = (char *)malloc(sz);
1485 if (dst_is_poisoned)
1486 dst_origin = __msan_get_origin(dst);
1490 char *src = (char *)malloc(sz);
1491 if (src_is_poisoned)
1492 src_origin = __msan_get_origin(src);
1496 memcpy(dst + left, src_is_aligned ? src + left : src, sz - left - right);
1498 for (unsigned i = 0; i < (left & (~3U)); ++i)
1499 if (dst_is_poisoned)
1500 EXPECT_POISONED_O(dst[i], dst_origin);
1502 EXPECT_NOT_POISONED(dst[i]);
1504 for (unsigned i = 0; i < (right & (~3U)); ++i)
1505 if (dst_is_poisoned)
1506 EXPECT_POISONED_O(dst[sz - i - 1], dst_origin);
1508 EXPECT_NOT_POISONED(dst[sz - i - 1]);
1510 for (unsigned i = left; i < sz - right; ++i)
1511 if (src_is_poisoned)
1512 EXPECT_POISONED_O(dst[i], src_origin);
1514 EXPECT_NOT_POISONED(dst[i]);
1520 TEST(MemorySanitizer, memcpy_unaligned) {
1521 for (int i = 0; i < 10; ++i)
1522 for (int j = 0; j < 10; ++j)
1523 for (int aligned = 0; aligned < 2; ++aligned)
1524 for (int srcp = 0; srcp < 2; ++srcp)
1525 for (int dstp = 0; dstp < 2; ++dstp)
1526 TestUnalignedMemcpy(i, j, aligned, srcp, dstp);
1529 TEST(MemorySanitizer, memmove) {
1530 char* x = new char[2];
1531 char* y = new char[2];
1533 x[1] = *GetPoisoned<char>();
1535 EXPECT_NOT_POISONED(y[0]);
1536 EXPECT_POISONED(y[1]);
1539 TEST(MemorySanitizer, memccpy_nomatch) {
1540 char* x = new char[5];
1541 char* y = new char[5];
1543 memccpy(y, x, 'd', 4);
1544 EXPECT_NOT_POISONED(y[0]);
1545 EXPECT_NOT_POISONED(y[1]);
1546 EXPECT_NOT_POISONED(y[2]);
1547 EXPECT_NOT_POISONED(y[3]);
1548 EXPECT_POISONED(y[4]);
1553 TEST(MemorySanitizer, memccpy_match) {
1554 char* x = new char[5];
1555 char* y = new char[5];
1557 memccpy(y, x, 'b', 4);
1558 EXPECT_NOT_POISONED(y[0]);
1559 EXPECT_NOT_POISONED(y[1]);
1560 EXPECT_POISONED(y[2]);
1561 EXPECT_POISONED(y[3]);
1562 EXPECT_POISONED(y[4]);
1567 TEST(MemorySanitizer, memccpy_nomatch_positive) {
1568 char* x = new char[5];
1569 char* y = new char[5];
1571 EXPECT_UMR(memccpy(y, x, 'd', 5));
1576 TEST(MemorySanitizer, memccpy_match_positive) {
1577 char* x = new char[5];
1578 char* y = new char[5];
1581 EXPECT_UMR(memccpy(y, x, 'b', 5));
1586 TEST(MemorySanitizer, bcopy) {
1587 char* x = new char[2];
1588 char* y = new char[2];
1590 x[1] = *GetPoisoned<char>();
1592 EXPECT_NOT_POISONED(y[0]);
1593 EXPECT_POISONED(y[1]);
1596 TEST(MemorySanitizer, strdup) {
1597 char buf[4] = "abc";
1598 __msan_poison(buf + 2, sizeof(*buf));
1599 char *x = strdup(buf);
1600 EXPECT_NOT_POISONED(x[0]);
1601 EXPECT_NOT_POISONED(x[1]);
1602 EXPECT_POISONED(x[2]);
1603 EXPECT_NOT_POISONED(x[3]);
1607 TEST(MemorySanitizer, strndup) {
1608 char buf[4] = "abc";
1609 __msan_poison(buf + 2, sizeof(*buf));
1611 EXPECT_UMR(x = strndup(buf, 3));
1612 EXPECT_NOT_POISONED(x[0]);
1613 EXPECT_NOT_POISONED(x[1]);
1614 EXPECT_POISONED(x[2]);
1615 EXPECT_NOT_POISONED(x[3]);
1617 // Check handling of non 0 terminated strings.
1619 __msan_poison(buf + 3, sizeof(*buf));
1620 EXPECT_UMR(x = strndup(buf + 3, 1));
1621 EXPECT_POISONED(x[0]);
1622 EXPECT_NOT_POISONED(x[1]);
1626 TEST(MemorySanitizer, strndup_short) {
1627 char buf[4] = "abc";
1628 __msan_poison(buf + 1, sizeof(*buf));
1629 __msan_poison(buf + 2, sizeof(*buf));
1631 EXPECT_UMR(x = strndup(buf, 2));
1632 EXPECT_NOT_POISONED(x[0]);
1633 EXPECT_POISONED(x[1]);
1634 EXPECT_NOT_POISONED(x[2]);
1639 template<class T, int size>
1640 void TestOverlapMemmove() {
1644 memmove(x, x + 1, (size - 1) * sizeof(T));
1645 EXPECT_NOT_POISONED(x[1]);
1646 EXPECT_POISONED(x[0]);
1647 EXPECT_POISONED(x[2]);
1651 TEST(MemorySanitizer, overlap_memmove) {
1652 TestOverlapMemmove<U1, 10>();
1653 TestOverlapMemmove<U1, 1000>();
1654 TestOverlapMemmove<U8, 4>();
1655 TestOverlapMemmove<U8, 1000>();
1658 TEST(MemorySanitizer, strcpy) { // NOLINT
1659 char* x = new char[3];
1660 char* y = new char[3];
1662 x[1] = *GetPoisoned<char>(1, 1);
1664 strcpy(y, x); // NOLINT
1665 EXPECT_NOT_POISONED(y[0]);
1666 EXPECT_POISONED(y[1]);
1667 EXPECT_NOT_POISONED(y[2]);
1670 TEST(MemorySanitizer, strncpy) { // NOLINT
1671 char* x = new char[3];
1672 char* y = new char[5];
1674 x[1] = *GetPoisoned<char>(1, 1);
1676 strncpy(y, x, 4); // NOLINT
1677 EXPECT_NOT_POISONED(y[0]);
1678 EXPECT_POISONED(y[1]);
1679 EXPECT_NOT_POISONED(y[2]);
1680 EXPECT_NOT_POISONED(y[3]);
1681 EXPECT_POISONED(y[4]);
1684 TEST(MemorySanitizer, stpcpy) { // NOLINT
1685 char* x = new char[3];
1686 char* y = new char[3];
1688 x[1] = *GetPoisoned<char>(1, 1);
1690 char *res = stpcpy(y, x); // NOLINT
1691 ASSERT_EQ(res, y + 2);
1692 EXPECT_NOT_POISONED(y[0]);
1693 EXPECT_POISONED(y[1]);
1694 EXPECT_NOT_POISONED(y[2]);
1697 TEST(MemorySanitizer, strcat) { // NOLINT
1701 __msan_poison(b + 1, 1);
1703 EXPECT_NOT_POISONED(a[3]);
1704 EXPECT_POISONED(a[4]);
1705 EXPECT_NOT_POISONED(a[5]);
1706 EXPECT_NOT_POISONED(a[6]);
1707 EXPECT_POISONED(a[7]);
1710 TEST(MemorySanitizer, strncat) { // NOLINT
1714 __msan_poison(b + 1, 1);
1716 EXPECT_NOT_POISONED(a[3]);
1717 EXPECT_POISONED(a[4]);
1718 EXPECT_NOT_POISONED(a[5]);
1719 EXPECT_NOT_POISONED(a[6]);
1720 EXPECT_POISONED(a[7]);
1723 TEST(MemorySanitizer, strncat_overflow) { // NOLINT
1727 __msan_poison(b + 1, 1);
1729 EXPECT_NOT_POISONED(a[3]);
1730 EXPECT_POISONED(a[4]);
1731 EXPECT_NOT_POISONED(a[5]);
1732 EXPECT_POISONED(a[6]);
1733 EXPECT_POISONED(a[7]);
1736 TEST(MemorySanitizer, wcscat) {
1738 wchar_t b[] = L"def";
1742 EXPECT_EQ(6U, wcslen(a));
1743 EXPECT_POISONED(a[7]);
1746 __msan_poison(b + 1, sizeof(wchar_t));
1747 EXPECT_UMR(wcscat(a, b));
1749 __msan_unpoison(b + 1, sizeof(wchar_t));
1750 __msan_poison(a + 2, sizeof(wchar_t));
1751 EXPECT_UMR(wcscat(a, b));
1754 TEST(MemorySanitizer, wcsncat) {
1756 wchar_t b[] = L"def";
1760 EXPECT_EQ(6U, wcslen(a));
1761 EXPECT_POISONED(a[7]);
1764 __msan_poison(a + 4, sizeof(wchar_t) * 6);
1766 EXPECT_EQ(5U, wcslen(a));
1767 EXPECT_POISONED(a[6]);
1770 __msan_poison(b + 1, sizeof(wchar_t));
1771 EXPECT_UMR(wcsncat(a, b, 2));
1773 __msan_unpoison(b + 1, sizeof(wchar_t));
1774 __msan_poison(a + 2, sizeof(wchar_t));
1775 EXPECT_UMR(wcsncat(a, b, 2));
1778 #define TEST_STRTO_INT(func_name, char_type, str_prefix) \
1779 TEST(MemorySanitizer, func_name) { \
1781 EXPECT_EQ(1U, func_name(str_prefix##"1", &e, 10)); \
1782 EXPECT_NOT_POISONED((S8)e); \
1785 #define TEST_STRTO_FLOAT(func_name, char_type, str_prefix) \
1786 TEST(MemorySanitizer, func_name) { \
1788 EXPECT_NE(0, func_name(str_prefix##"1.5", &e)); \
1789 EXPECT_NOT_POISONED((S8)e); \
1792 #define TEST_STRTO_FLOAT_LOC(func_name, char_type, str_prefix) \
1793 TEST(MemorySanitizer, func_name) { \
1794 locale_t loc = newlocale(LC_NUMERIC_MASK, "C", (locale_t)0); \
1796 EXPECT_NE(0, func_name(str_prefix##"1.5", &e, loc)); \
1797 EXPECT_NOT_POISONED((S8)e); \
1801 #define TEST_STRTO_INT_LOC(func_name, char_type, str_prefix) \
1802 TEST(MemorySanitizer, func_name) { \
1803 locale_t loc = newlocale(LC_NUMERIC_MASK, "C", (locale_t)0); \
1805 ASSERT_EQ(1U, func_name(str_prefix##"1", &e, 10, loc)); \
1806 EXPECT_NOT_POISONED((S8)e); \
1810 TEST_STRTO_INT(strtol, char, )
1811 TEST_STRTO_INT(strtoll, char, )
1812 TEST_STRTO_INT(strtoul, char, )
1813 TEST_STRTO_INT(strtoull, char, )
1814 TEST_STRTO_INT(strtouq, char, )
1816 TEST_STRTO_FLOAT(strtof, char, )
1817 TEST_STRTO_FLOAT(strtod, char, )
1818 TEST_STRTO_FLOAT(strtold, char, )
1820 TEST_STRTO_FLOAT_LOC(strtof_l, char, )
1821 TEST_STRTO_FLOAT_LOC(strtod_l, char, )
1822 TEST_STRTO_FLOAT_LOC(strtold_l, char, )
1824 TEST_STRTO_INT_LOC(strtol_l, char, )
1825 TEST_STRTO_INT_LOC(strtoll_l, char, )
1826 TEST_STRTO_INT_LOC(strtoul_l, char, )
1827 TEST_STRTO_INT_LOC(strtoull_l, char, )
1829 TEST_STRTO_INT(wcstol, wchar_t, L)
1830 TEST_STRTO_INT(wcstoll, wchar_t, L)
1831 TEST_STRTO_INT(wcstoul, wchar_t, L)
1832 TEST_STRTO_INT(wcstoull, wchar_t, L)
1834 TEST_STRTO_FLOAT(wcstof, wchar_t, L)
1835 TEST_STRTO_FLOAT(wcstod, wchar_t, L)
1836 TEST_STRTO_FLOAT(wcstold, wchar_t, L)
1838 TEST_STRTO_FLOAT_LOC(wcstof_l, wchar_t, L)
1839 TEST_STRTO_FLOAT_LOC(wcstod_l, wchar_t, L)
1840 TEST_STRTO_FLOAT_LOC(wcstold_l, wchar_t, L)
1842 TEST_STRTO_INT_LOC(wcstol_l, wchar_t, L)
1843 TEST_STRTO_INT_LOC(wcstoll_l, wchar_t, L)
1844 TEST_STRTO_INT_LOC(wcstoul_l, wchar_t, L)
1845 TEST_STRTO_INT_LOC(wcstoull_l, wchar_t, L)
1848 TEST(MemorySanitizer, strtoimax) {
1850 ASSERT_EQ(1, strtoimax("1", &e, 10));
1851 EXPECT_NOT_POISONED((S8) e);
1854 TEST(MemorySanitizer, strtoumax) {
1856 ASSERT_EQ(1U, strtoumax("1", &e, 10));
1857 EXPECT_NOT_POISONED((S8) e);
1861 extern "C" float __strtof_l(const char *nptr, char **endptr, locale_t loc);
1862 TEST_STRTO_FLOAT_LOC(__strtof_l, char, )
1863 extern "C" double __strtod_l(const char *nptr, char **endptr, locale_t loc);
1864 TEST_STRTO_FLOAT_LOC(__strtod_l, char, )
1865 extern "C" long double __strtold_l(const char *nptr, char **endptr,
1867 TEST_STRTO_FLOAT_LOC(__strtold_l, char, )
1869 extern "C" float __wcstof_l(const wchar_t *nptr, wchar_t **endptr, locale_t loc);
1870 TEST_STRTO_FLOAT_LOC(__wcstof_l, wchar_t, L)
1871 extern "C" double __wcstod_l(const wchar_t *nptr, wchar_t **endptr, locale_t loc);
1872 TEST_STRTO_FLOAT_LOC(__wcstod_l, wchar_t, L)
1873 extern "C" long double __wcstold_l(const wchar_t *nptr, wchar_t **endptr,
1875 TEST_STRTO_FLOAT_LOC(__wcstold_l, wchar_t, L)
1878 TEST(MemorySanitizer, modf) {
1881 EXPECT_NOT_POISONED(y);
1884 TEST(MemorySanitizer, modff) {
1887 EXPECT_NOT_POISONED(y);
1890 TEST(MemorySanitizer, modfl) {
1893 EXPECT_NOT_POISONED(y);
1896 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1897 TEST(MemorySanitizer, sincos) {
1899 sincos(0.2, &s, &c);
1900 EXPECT_NOT_POISONED(s);
1901 EXPECT_NOT_POISONED(c);
1905 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1906 TEST(MemorySanitizer, sincosf) {
1908 sincosf(0.2, &s, &c);
1909 EXPECT_NOT_POISONED(s);
1910 EXPECT_NOT_POISONED(c);
1914 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1915 TEST(MemorySanitizer, sincosl) {
1917 sincosl(0.2, &s, &c);
1918 EXPECT_NOT_POISONED(s);
1919 EXPECT_NOT_POISONED(c);
1923 TEST(MemorySanitizer, remquo) {
1925 double res = remquo(29.0, 3.0, &quo);
1926 ASSERT_NE(0.0, res);
1927 EXPECT_NOT_POISONED(quo);
1930 TEST(MemorySanitizer, remquof) {
1932 float res = remquof(29.0, 3.0, &quo);
1933 ASSERT_NE(0.0, res);
1934 EXPECT_NOT_POISONED(quo);
1937 #if !defined(__NetBSD__)
1938 TEST(MemorySanitizer, remquol) {
1940 long double res = remquof(29.0, 3.0, &quo);
1941 ASSERT_NE(0.0, res);
1942 EXPECT_NOT_POISONED(quo);
1946 TEST(MemorySanitizer, lgamma) {
1947 double res = lgamma(1.1);
1948 ASSERT_NE(0.0, res);
1949 EXPECT_NOT_POISONED(signgam);
1952 TEST(MemorySanitizer, lgammaf) {
1953 float res = lgammaf(1.1);
1954 ASSERT_NE(0.0, res);
1955 EXPECT_NOT_POISONED(signgam);
1958 #if !defined(__NetBSD__)
1959 TEST(MemorySanitizer, lgammal) {
1960 long double res = lgammal(1.1);
1961 ASSERT_NE(0.0, res);
1962 EXPECT_NOT_POISONED(signgam);
1966 TEST(MemorySanitizer, lgamma_r) {
1968 double res = lgamma_r(1.1, &sgn);
1969 ASSERT_NE(0.0, res);
1970 EXPECT_NOT_POISONED(sgn);
1973 TEST(MemorySanitizer, lgammaf_r) {
1975 float res = lgammaf_r(1.1, &sgn);
1976 ASSERT_NE(0.0, res);
1977 EXPECT_NOT_POISONED(sgn);
1980 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1981 TEST(MemorySanitizer, lgammal_r) {
1983 long double res = lgammal_r(1.1, &sgn);
1984 ASSERT_NE(0.0, res);
1985 EXPECT_NOT_POISONED(sgn);
1989 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
1990 TEST(MemorySanitizer, drand48_r) {
1991 struct drand48_data buf;
1994 drand48_r(&buf, &d);
1995 EXPECT_NOT_POISONED(d);
1999 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
2000 TEST(MemorySanitizer, lrand48_r) {
2001 struct drand48_data buf;
2004 lrand48_r(&buf, &d);
2005 EXPECT_NOT_POISONED(d);
2009 TEST(MemorySanitizer, sprintf) { // NOLINT
2011 break_optimization(buff);
2012 EXPECT_POISONED(buff[0]);
2013 int res = sprintf(buff, "%d", 1234567); // NOLINT
2015 ASSERT_EQ(buff[0], '1');
2016 ASSERT_EQ(buff[1], '2');
2017 ASSERT_EQ(buff[2], '3');
2018 ASSERT_EQ(buff[6], '7');
2019 ASSERT_EQ(buff[7], 0);
2020 EXPECT_POISONED(buff[8]);
2023 TEST(MemorySanitizer, snprintf) {
2025 break_optimization(buff);
2026 EXPECT_POISONED(buff[0]);
2027 int res = snprintf(buff, sizeof(buff), "%d", 1234567);
2029 ASSERT_EQ(buff[0], '1');
2030 ASSERT_EQ(buff[1], '2');
2031 ASSERT_EQ(buff[2], '3');
2032 ASSERT_EQ(buff[6], '7');
2033 ASSERT_EQ(buff[7], 0);
2034 EXPECT_POISONED(buff[8]);
2037 TEST(MemorySanitizer, swprintf) {
2039 ASSERT_EQ(4U, sizeof(wchar_t));
2040 break_optimization(buff);
2041 EXPECT_POISONED(buff[0]);
2042 int res = swprintf(buff, 9, L"%d", 1234567);
2044 ASSERT_EQ(buff[0], '1');
2045 ASSERT_EQ(buff[1], '2');
2046 ASSERT_EQ(buff[2], '3');
2047 ASSERT_EQ(buff[6], '7');
2048 ASSERT_EQ(buff[7], L'\0');
2049 EXPECT_POISONED(buff[8]);
2052 TEST(MemorySanitizer, asprintf) { // NOLINT
2054 EXPECT_POISONED(pbuf);
2055 int res = asprintf(&pbuf, "%d", 1234567); // NOLINT
2057 EXPECT_NOT_POISONED(pbuf);
2058 ASSERT_EQ(pbuf[0], '1');
2059 ASSERT_EQ(pbuf[1], '2');
2060 ASSERT_EQ(pbuf[2], '3');
2061 ASSERT_EQ(pbuf[6], '7');
2062 ASSERT_EQ(pbuf[7], 0);
2066 TEST(MemorySanitizer, mbstowcs) {
2067 const char *x = "abc";
2069 int res = mbstowcs(buff, x, 2);
2071 EXPECT_EQ(L'a', buff[0]);
2072 EXPECT_EQ(L'b', buff[1]);
2073 EXPECT_POISONED(buff[2]);
2074 res = mbstowcs(buff, x, 10);
2076 EXPECT_NOT_POISONED(buff[3]);
2079 TEST(MemorySanitizer, wcstombs) {
2080 const wchar_t *x = L"abc";
2082 int res = wcstombs(buff, x, 4);
2084 EXPECT_EQ(buff[0], 'a');
2085 EXPECT_EQ(buff[1], 'b');
2086 EXPECT_EQ(buff[2], 'c');
2089 TEST(MemorySanitizer, wcsrtombs) {
2090 const wchar_t *x = L"abc";
2091 const wchar_t *p = x;
2094 memset(&mbs, 0, sizeof(mbs));
2095 int res = wcsrtombs(buff, &p, 4, &mbs);
2097 EXPECT_EQ(buff[0], 'a');
2098 EXPECT_EQ(buff[1], 'b');
2099 EXPECT_EQ(buff[2], 'c');
2100 EXPECT_EQ(buff[3], '\0');
2101 EXPECT_POISONED(buff[4]);
2104 TEST(MemorySanitizer, wcsnrtombs) {
2105 const wchar_t *x = L"abc";
2106 const wchar_t *p = x;
2109 memset(&mbs, 0, sizeof(mbs));
2110 int res = wcsnrtombs(buff, &p, 2, 4, &mbs);
2112 EXPECT_EQ(buff[0], 'a');
2113 EXPECT_EQ(buff[1], 'b');
2114 EXPECT_POISONED(buff[2]);
2117 TEST(MemorySanitizer, wcrtomb) {
2121 memset(&mbs, 0, sizeof(mbs));
2122 size_t res = wcrtomb(buff, x, &mbs);
2123 EXPECT_EQ(res, (size_t)1);
2124 EXPECT_EQ(buff[0], 'a');
2127 TEST(MemorySanitizer, wmemset) {
2129 break_optimization(x);
2130 EXPECT_POISONED(x[0]);
2131 wmemset(x, L'A', 10);
2132 EXPECT_EQ(x[0], L'A');
2133 EXPECT_EQ(x[9], L'A');
2134 EXPECT_POISONED(x[10]);
2137 TEST(MemorySanitizer, mbtowc) {
2138 const char *x = "abc";
2140 int res = mbtowc(&wx, x, 3);
2142 EXPECT_NOT_POISONED(wx);
2145 TEST(MemorySanitizer, mbrtowc) {
2149 size_t res = mbrtowc(&wc, "\377", 1, &mbs);
2150 EXPECT_EQ(res, -1ULL);
2152 res = mbrtowc(&wc, "abc", 3, &mbs);
2153 EXPECT_GT(res, 0ULL);
2154 EXPECT_NOT_POISONED(wc);
2157 TEST(MemorySanitizer, wcsftime) {
2159 time_t t = time(NULL);
2161 struct tm *tmres = localtime_r(&t, &tms);
2162 ASSERT_NE((void *)0, tmres);
2163 size_t res = wcsftime(x, sizeof(x) / sizeof(x[0]), L"%Y-%m-%d", tmres);
2164 EXPECT_GT(res, 0UL);
2165 EXPECT_EQ(res, wcslen(x));
2168 TEST(MemorySanitizer, gettimeofday) {
2171 break_optimization(&tv);
2172 break_optimization(&tz);
2173 ASSERT_EQ(16U, sizeof(tv));
2174 ASSERT_EQ(8U, sizeof(tz));
2175 EXPECT_POISONED(tv.tv_sec);
2176 EXPECT_POISONED(tv.tv_usec);
2177 EXPECT_POISONED(tz.tz_minuteswest);
2178 EXPECT_POISONED(tz.tz_dsttime);
2179 ASSERT_EQ(0, gettimeofday(&tv, &tz));
2180 EXPECT_NOT_POISONED(tv.tv_sec);
2181 EXPECT_NOT_POISONED(tv.tv_usec);
2182 EXPECT_NOT_POISONED(tz.tz_minuteswest);
2183 EXPECT_NOT_POISONED(tz.tz_dsttime);
2186 TEST(MemorySanitizer, clock_gettime) {
2188 EXPECT_POISONED(tp.tv_sec);
2189 EXPECT_POISONED(tp.tv_nsec);
2190 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &tp));
2191 EXPECT_NOT_POISONED(tp.tv_sec);
2192 EXPECT_NOT_POISONED(tp.tv_nsec);
2195 TEST(MemorySanitizer, clock_getres) {
2197 EXPECT_POISONED(tp.tv_sec);
2198 EXPECT_POISONED(tp.tv_nsec);
2199 ASSERT_EQ(0, clock_getres(CLOCK_REALTIME, 0));
2200 EXPECT_POISONED(tp.tv_sec);
2201 EXPECT_POISONED(tp.tv_nsec);
2202 ASSERT_EQ(0, clock_getres(CLOCK_REALTIME, &tp));
2203 EXPECT_NOT_POISONED(tp.tv_sec);
2204 EXPECT_NOT_POISONED(tp.tv_nsec);
2207 TEST(MemorySanitizer, getitimer) {
2208 struct itimerval it1, it2;
2210 EXPECT_POISONED(it1.it_interval.tv_sec);
2211 EXPECT_POISONED(it1.it_interval.tv_usec);
2212 EXPECT_POISONED(it1.it_value.tv_sec);
2213 EXPECT_POISONED(it1.it_value.tv_usec);
2214 res = getitimer(ITIMER_VIRTUAL, &it1);
2216 EXPECT_NOT_POISONED(it1.it_interval.tv_sec);
2217 EXPECT_NOT_POISONED(it1.it_interval.tv_usec);
2218 EXPECT_NOT_POISONED(it1.it_value.tv_sec);
2219 EXPECT_NOT_POISONED(it1.it_value.tv_usec);
2221 it1.it_interval.tv_sec = it1.it_value.tv_sec = 10000;
2222 it1.it_interval.tv_usec = it1.it_value.tv_usec = 0;
2224 res = setitimer(ITIMER_VIRTUAL, &it1, &it2);
2226 EXPECT_NOT_POISONED(it2.it_interval.tv_sec);
2227 EXPECT_NOT_POISONED(it2.it_interval.tv_usec);
2228 EXPECT_NOT_POISONED(it2.it_value.tv_sec);
2229 EXPECT_NOT_POISONED(it2.it_value.tv_usec);
2231 // Check that old_value can be 0, and disable the timer.
2232 memset(&it1, 0, sizeof(it1));
2233 res = setitimer(ITIMER_VIRTUAL, &it1, 0);
2237 TEST(MemorySanitizer, setitimer_null) {
2238 setitimer(ITIMER_VIRTUAL, 0, 0);
2239 // Not testing the return value, since it the behaviour seems to differ
2240 // between libc implementations and POSIX.
2241 // Should never crash, though.
2244 TEST(MemorySanitizer, time) {
2247 time_t t2 = time(&t);
2248 ASSERT_NE(t2, (time_t)-1);
2249 EXPECT_NOT_POISONED(t);
2252 TEST(MemorySanitizer, strptime) {
2254 char *p = strptime("11/1/2013-05:39", "%m/%d/%Y-%H:%M", &time);
2255 ASSERT_TRUE(p != NULL);
2256 EXPECT_NOT_POISONED(time.tm_sec);
2257 EXPECT_NOT_POISONED(time.tm_hour);
2258 EXPECT_NOT_POISONED(time.tm_year);
2261 TEST(MemorySanitizer, localtime) {
2263 struct tm *time = localtime(&t);
2264 ASSERT_TRUE(time != NULL);
2265 EXPECT_NOT_POISONED(time->tm_sec);
2266 EXPECT_NOT_POISONED(time->tm_hour);
2267 EXPECT_NOT_POISONED(time->tm_year);
2268 EXPECT_NOT_POISONED(time->tm_isdst);
2269 EXPECT_NE(0U, strlen(time->tm_zone));
2272 TEST(MemorySanitizer, localtime_r) {
2275 struct tm *res = localtime_r(&t, &time);
2276 ASSERT_TRUE(res != NULL);
2277 EXPECT_NOT_POISONED(time.tm_sec);
2278 EXPECT_NOT_POISONED(time.tm_hour);
2279 EXPECT_NOT_POISONED(time.tm_year);
2280 EXPECT_NOT_POISONED(time.tm_isdst);
2281 EXPECT_NE(0U, strlen(time.tm_zone));
2284 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
2285 /* Creates a temporary file with contents similar to /etc/fstab to be used
2286 with getmntent{_r}. */
2287 class TempFstabFile {
2289 TempFstabFile() : fd (-1) { }
2296 snprintf(tmpfile, sizeof(tmpfile), "/tmp/msan.getmntent.tmp.XXXXXX");
2298 fd = mkstemp(tmpfile);
2302 const char entry[] = "/dev/root / ext4 errors=remount-ro 0 1";
2303 size_t entrylen = sizeof(entry);
2305 size_t bytesWritten = write(fd, entry, entrylen);
2306 if (entrylen != bytesWritten)
2312 const char* FileName(void) {
2322 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
2323 TEST(MemorySanitizer, getmntent) {
2324 TempFstabFile fstabtmp;
2325 ASSERT_TRUE(fstabtmp.Create());
2326 FILE *fp = setmntent(fstabtmp.FileName(), "r");
2328 struct mntent *mnt = getmntent(fp);
2329 ASSERT_TRUE(mnt != NULL);
2330 ASSERT_NE(0U, strlen(mnt->mnt_fsname));
2331 ASSERT_NE(0U, strlen(mnt->mnt_dir));
2332 ASSERT_NE(0U, strlen(mnt->mnt_type));
2333 ASSERT_NE(0U, strlen(mnt->mnt_opts));
2334 EXPECT_NOT_POISONED(mnt->mnt_freq);
2335 EXPECT_NOT_POISONED(mnt->mnt_passno);
2340 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
2341 TEST(MemorySanitizer, getmntent_r) {
2342 TempFstabFile fstabtmp;
2343 ASSERT_TRUE(fstabtmp.Create());
2344 FILE *fp = setmntent(fstabtmp.FileName(), "r");
2346 struct mntent mntbuf;
2348 struct mntent *mnt = getmntent_r(fp, &mntbuf, buf, sizeof(buf));
2349 ASSERT_TRUE(mnt != NULL);
2350 ASSERT_NE(0U, strlen(mnt->mnt_fsname));
2351 ASSERT_NE(0U, strlen(mnt->mnt_dir));
2352 ASSERT_NE(0U, strlen(mnt->mnt_type));
2353 ASSERT_NE(0U, strlen(mnt->mnt_opts));
2354 EXPECT_NOT_POISONED(mnt->mnt_freq);
2355 EXPECT_NOT_POISONED(mnt->mnt_passno);
2360 #if !defined(__NetBSD__)
2361 TEST(MemorySanitizer, ether) {
2362 const char *asc = "11:22:33:44:55:66";
2363 struct ether_addr *paddr = ether_aton(asc);
2364 EXPECT_NOT_POISONED(*paddr);
2366 struct ether_addr addr;
2367 paddr = ether_aton_r(asc, &addr);
2368 ASSERT_EQ(paddr, &addr);
2369 EXPECT_NOT_POISONED(addr);
2371 char *s = ether_ntoa(&addr);
2372 ASSERT_NE(0U, strlen(s));
2375 s = ether_ntoa_r(&addr, buf);
2377 ASSERT_NE(0U, strlen(buf));
2381 TEST(MemorySanitizer, mmap) {
2382 const int size = 4096;
2384 p1 = mmap(0, size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANON, -1, 0);
2385 __msan_poison(p1, size);
2387 for (int i = 0; i < 1000; i++) {
2388 p2 = mmap(0, size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANON, -1, 0);
2395 EXPECT_NOT_POISONED(*(char*)p2);
2400 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
2401 // FIXME: enable and add ecvt.
2402 // FIXME: check why msandr does nt handle fcvt.
2403 TEST(MemorySanitizer, fcvt) {
2405 break_optimization(&a);
2406 break_optimization(&b);
2409 char *str = fcvt(12345.6789, 10, &a, &b);
2410 EXPECT_NOT_POISONED(a);
2411 EXPECT_NOT_POISONED(b);
2412 ASSERT_NE(nullptr, str);
2413 EXPECT_NOT_POISONED(str[0]);
2414 ASSERT_NE(0U, strlen(str));
2418 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
2419 TEST(MemorySanitizer, fcvt_long) {
2421 break_optimization(&a);
2422 break_optimization(&b);
2425 char *str = fcvt(111111112345.6789, 10, &a, &b);
2426 EXPECT_NOT_POISONED(a);
2427 EXPECT_NOT_POISONED(b);
2428 ASSERT_NE(nullptr, str);
2429 EXPECT_NOT_POISONED(str[0]);
2430 ASSERT_NE(0U, strlen(str));
2434 TEST(MemorySanitizer, memchr) {
2436 break_optimization(x);
2437 EXPECT_POISONED(x[0]);
2440 EXPECT_UMR(res = memchr(x, '2', 10));
2441 EXPECT_NOT_POISONED(res);
2444 res = memchr(x, '2', 10);
2445 EXPECT_EQ(&x[2], res);
2446 EXPECT_UMR(res = memchr(x, '3', 10));
2447 EXPECT_NOT_POISONED(res);
2450 TEST(MemorySanitizer, memrchr) {
2452 break_optimization(x);
2453 EXPECT_POISONED(x[0]);
2456 EXPECT_UMR(res = memrchr(x, '9', 10));
2457 EXPECT_NOT_POISONED(res);
2460 res = memrchr(x, '0', 2);
2461 EXPECT_EQ(&x[0], res);
2462 EXPECT_UMR(res = memrchr(x, '7', 10));
2463 EXPECT_NOT_POISONED(res);
2466 TEST(MemorySanitizer, frexp) {
2468 x = *GetPoisoned<int>();
2469 double r = frexp(1.1, &x);
2470 EXPECT_NOT_POISONED(r);
2471 EXPECT_NOT_POISONED(x);
2473 x = *GetPoisoned<int>();
2474 float rf = frexpf(1.1, &x);
2475 EXPECT_NOT_POISONED(rf);
2476 EXPECT_NOT_POISONED(x);
2478 x = *GetPoisoned<int>();
2479 double rl = frexpl(1.1, &x);
2480 EXPECT_NOT_POISONED(rl);
2481 EXPECT_NOT_POISONED(x);
2488 void SigactionHandler(int signo, siginfo_t* si, void* uc) {
2489 ASSERT_EQ(signo, SIGPROF);
2490 ASSERT_TRUE(si != NULL);
2491 EXPECT_NOT_POISONED(si->si_errno);
2492 EXPECT_NOT_POISONED(si->si_pid);
2493 #ifdef _UC_MACHINE_PC
2494 EXPECT_NOT_POISONED(_UC_MACHINE_PC((ucontext_t*)uc));
2497 # if defined(__x86_64__)
2498 EXPECT_NOT_POISONED(((ucontext_t*)uc)->uc_mcontext.gregs[REG_RIP]);
2499 # elif defined(__i386__)
2500 EXPECT_NOT_POISONED(((ucontext_t*)uc)->uc_mcontext.gregs[REG_EIP]);
2507 TEST(MemorySanitizer, sigaction) {
2508 struct sigaction act = {};
2509 struct sigaction oldact = {};
2510 struct sigaction origact = {};
2512 sigaction(SIGPROF, 0, &origact);
2514 act.sa_flags |= SA_SIGINFO;
2515 act.sa_sigaction = &SigactionHandler;
2516 sigaction(SIGPROF, &act, 0);
2518 kill(getpid(), SIGPROF);
2520 act.sa_flags &= ~SA_SIGINFO;
2521 act.sa_handler = SIG_DFL;
2522 sigaction(SIGPROF, &act, 0);
2524 act.sa_flags &= ~SA_SIGINFO;
2525 act.sa_handler = SIG_IGN;
2526 sigaction(SIGPROF, &act, &oldact);
2527 EXPECT_FALSE(oldact.sa_flags & SA_SIGINFO);
2528 EXPECT_EQ(SIG_DFL, oldact.sa_handler);
2529 kill(getpid(), SIGPROF);
2531 act.sa_flags |= SA_SIGINFO;
2532 act.sa_sigaction = &SigactionHandler;
2533 sigaction(SIGPROF, &act, &oldact);
2534 EXPECT_FALSE(oldact.sa_flags & SA_SIGINFO);
2535 EXPECT_EQ(SIG_IGN, oldact.sa_handler);
2536 kill(getpid(), SIGPROF);
2538 act.sa_flags &= ~SA_SIGINFO;
2539 act.sa_handler = SIG_DFL;
2540 sigaction(SIGPROF, &act, &oldact);
2541 EXPECT_TRUE(oldact.sa_flags & SA_SIGINFO);
2542 EXPECT_EQ(&SigactionHandler, oldact.sa_sigaction);
2545 sigaction(SIGPROF, &origact, 0);
2551 TEST(MemorySanitizer, sigemptyset) {
2554 int res = sigemptyset(&s);
2556 EXPECT_NOT_POISONED(s);
2559 TEST(MemorySanitizer, sigfillset) {
2562 int res = sigfillset(&s);
2564 EXPECT_NOT_POISONED(s);
2567 TEST(MemorySanitizer, sigpending) {
2570 int res = sigpending(&s);
2572 EXPECT_NOT_POISONED(s);
2575 TEST(MemorySanitizer, sigprocmask) {
2578 int res = sigprocmask(SIG_BLOCK, 0, &s);
2580 EXPECT_NOT_POISONED(s);
2583 struct StructWithDtor {
2587 NOINLINE StructWithDtor::~StructWithDtor() {
2588 break_optimization(0);
2591 TEST(MemorySanitizer, Invoke) {
2592 StructWithDtor s; // Will cause the calls to become invokes.
2593 EXPECT_NOT_POISONED(0);
2594 EXPECT_POISONED(*GetPoisoned<int>());
2595 EXPECT_NOT_POISONED(0);
2596 EXPECT_POISONED(*GetPoisoned<int>());
2597 EXPECT_POISONED(ReturnPoisoned<S4>());
2600 TEST(MemorySanitizer, ptrtoint) {
2601 // Test that shadow is propagated through pointer-to-integer conversion.
2602 unsigned char c = 0;
2603 __msan_poison(&c, 1);
2604 uintptr_t u = (uintptr_t)c << 8;
2605 EXPECT_NOT_POISONED(u & 0xFF00FF);
2606 EXPECT_POISONED(u & 0xFF00);
2608 break_optimization(&u);
2611 break_optimization(&p);
2613 EXPECT_NOT_POISONED(((uintptr_t)p) & 0xFF00FF);
2614 EXPECT_POISONED(((uintptr_t)p) & 0xFF00);
2617 static void vaargsfn2(int guard, ...) {
2619 va_start(vl, guard);
2620 EXPECT_NOT_POISONED(va_arg(vl, int));
2621 EXPECT_NOT_POISONED(va_arg(vl, int));
2622 EXPECT_NOT_POISONED(va_arg(vl, int));
2623 EXPECT_POISONED(va_arg(vl, double));
2627 static void vaargsfn(int guard, ...) {
2629 va_start(vl, guard);
2630 EXPECT_NOT_POISONED(va_arg(vl, int));
2631 EXPECT_POISONED(va_arg(vl, int));
2632 // The following call will overwrite __msan_param_tls.
2633 // Checks after it test that arg shadow was somehow saved across the call.
2634 vaargsfn2(1, 2, 3, 4, *GetPoisoned<double>());
2635 EXPECT_NOT_POISONED(va_arg(vl, int));
2636 EXPECT_POISONED(va_arg(vl, int));
2640 TEST(MemorySanitizer, VAArgTest) {
2641 int* x = GetPoisoned<int>();
2642 int* y = GetPoisoned<int>(4);
2643 vaargsfn(1, 13, *x, 42, *y);
2646 static void vaargsfn_many(int guard, ...) {
2648 va_start(vl, guard);
2649 EXPECT_NOT_POISONED(va_arg(vl, int));
2650 EXPECT_POISONED(va_arg(vl, int));
2651 EXPECT_NOT_POISONED(va_arg(vl, int));
2652 EXPECT_NOT_POISONED(va_arg(vl, int));
2653 EXPECT_NOT_POISONED(va_arg(vl, int));
2654 EXPECT_NOT_POISONED(va_arg(vl, int));
2655 EXPECT_NOT_POISONED(va_arg(vl, int));
2656 EXPECT_NOT_POISONED(va_arg(vl, int));
2657 EXPECT_NOT_POISONED(va_arg(vl, int));
2658 EXPECT_POISONED(va_arg(vl, int));
2662 TEST(MemorySanitizer, VAArgManyTest) {
2663 int* x = GetPoisoned<int>();
2664 int* y = GetPoisoned<int>(4);
2665 vaargsfn_many(1, 2, *x, 3, 4, 5, 6, 7, 8, 9, *y);
2668 static void vaargsfn_manyfix(int g1, int g2, int g3, int g4, int g5, int g6, int g7, int g8, int g9, ...) {
2671 EXPECT_NOT_POISONED(va_arg(vl, int));
2672 EXPECT_POISONED(va_arg(vl, int));
2676 TEST(MemorySanitizer, VAArgManyFixTest) {
2677 int* x = GetPoisoned<int>();
2678 int* y = GetPoisoned<int>();
2679 vaargsfn_manyfix(1, *x, 3, 4, 5, 6, 7, 8, 9, 10, *y);
2682 static void vaargsfn_pass2(va_list vl) {
2683 EXPECT_NOT_POISONED(va_arg(vl, int));
2684 EXPECT_NOT_POISONED(va_arg(vl, int));
2685 EXPECT_POISONED(va_arg(vl, int));
2688 static void vaargsfn_pass(int guard, ...) {
2690 va_start(vl, guard);
2691 EXPECT_POISONED(va_arg(vl, int));
2696 TEST(MemorySanitizer, VAArgPass) {
2697 int* x = GetPoisoned<int>();
2698 int* y = GetPoisoned<int>(4);
2699 vaargsfn_pass(1, *x, 2, 3, *y);
2702 static void vaargsfn_copy2(va_list vl) {
2703 EXPECT_NOT_POISONED(va_arg(vl, int));
2704 EXPECT_POISONED(va_arg(vl, int));
2707 static void vaargsfn_copy(int guard, ...) {
2709 va_start(vl, guard);
2710 EXPECT_NOT_POISONED(va_arg(vl, int));
2711 EXPECT_POISONED(va_arg(vl, int));
2714 vaargsfn_copy2(vl2);
2715 EXPECT_NOT_POISONED(va_arg(vl, int));
2716 EXPECT_POISONED(va_arg(vl, int));
2720 TEST(MemorySanitizer, VAArgCopy) {
2721 int* x = GetPoisoned<int>();
2722 int* y = GetPoisoned<int>(4);
2723 vaargsfn_copy(1, 2, *x, 3, *y);
2726 static void vaargsfn_ptr(int guard, ...) {
2728 va_start(vl, guard);
2729 EXPECT_NOT_POISONED(va_arg(vl, int*));
2730 EXPECT_POISONED(va_arg(vl, int*));
2731 EXPECT_NOT_POISONED(va_arg(vl, int*));
2732 EXPECT_POISONED(va_arg(vl, double*));
2736 TEST(MemorySanitizer, VAArgPtr) {
2737 int** x = GetPoisoned<int*>();
2738 double** y = GetPoisoned<double*>(8);
2740 vaargsfn_ptr(1, &z, *x, &z, *y);
2743 static void vaargsfn_overflow(int guard, ...) {
2745 va_start(vl, guard);
2746 EXPECT_NOT_POISONED(va_arg(vl, int));
2747 EXPECT_NOT_POISONED(va_arg(vl, int));
2748 EXPECT_POISONED(va_arg(vl, int));
2749 EXPECT_NOT_POISONED(va_arg(vl, int));
2750 EXPECT_NOT_POISONED(va_arg(vl, int));
2751 EXPECT_NOT_POISONED(va_arg(vl, int));
2753 EXPECT_NOT_POISONED(va_arg(vl, double));
2754 EXPECT_NOT_POISONED(va_arg(vl, double));
2755 EXPECT_NOT_POISONED(va_arg(vl, double));
2756 EXPECT_POISONED(va_arg(vl, double));
2757 EXPECT_NOT_POISONED(va_arg(vl, double));
2758 EXPECT_POISONED(va_arg(vl, int*));
2759 EXPECT_NOT_POISONED(va_arg(vl, double));
2760 EXPECT_NOT_POISONED(va_arg(vl, double));
2762 EXPECT_POISONED(va_arg(vl, int));
2763 EXPECT_POISONED(va_arg(vl, double));
2764 EXPECT_POISONED(va_arg(vl, int*));
2766 EXPECT_NOT_POISONED(va_arg(vl, int));
2767 EXPECT_NOT_POISONED(va_arg(vl, double));
2768 EXPECT_NOT_POISONED(va_arg(vl, int*));
2770 EXPECT_POISONED(va_arg(vl, int));
2771 EXPECT_POISONED(va_arg(vl, double));
2772 EXPECT_POISONED(va_arg(vl, int*));
2777 TEST(MemorySanitizer, VAArgOverflow) {
2778 int* x = GetPoisoned<int>();
2779 double* y = GetPoisoned<double>(8);
2780 int** p = GetPoisoned<int*>(16);
2782 vaargsfn_overflow(1,
2784 1.1, 2.2, 3.3, *y, 5.5, *p, 7.7, 8.8,
2785 // the following args will overflow for sure
2791 static void vaargsfn_tlsoverwrite2(int guard, ...) {
2793 va_start(vl, guard);
2794 for (int i = 0; i < 20; ++i)
2795 EXPECT_NOT_POISONED(va_arg(vl, int));
2799 static void vaargsfn_tlsoverwrite(int guard, ...) {
2800 // This call will overwrite TLS contents unless it's backed up somewhere.
2801 vaargsfn_tlsoverwrite2(2,
2805 42, 42, 42, 42, 42); // 20x
2807 va_start(vl, guard);
2808 for (int i = 0; i < 20; ++i)
2809 EXPECT_POISONED(va_arg(vl, int));
2813 TEST(MemorySanitizer, VAArgTLSOverwrite) {
2814 int* x = GetPoisoned<int>();
2815 vaargsfn_tlsoverwrite(1,
2819 *x, *x, *x, *x, *x); // 20x
2823 struct StructByVal {
2824 int a, b, c, d, e, f;
2827 static void vaargsfn_structbyval(int guard, ...) {
2829 va_start(vl, guard);
2831 StructByVal s = va_arg(vl, StructByVal);
2832 EXPECT_NOT_POISONED(s.a);
2833 EXPECT_POISONED(s.b);
2834 EXPECT_NOT_POISONED(s.c);
2835 EXPECT_POISONED(s.d);
2836 EXPECT_NOT_POISONED(s.e);
2837 EXPECT_POISONED(s.f);
2840 StructByVal s = va_arg(vl, StructByVal);
2841 EXPECT_NOT_POISONED(s.a);
2842 EXPECT_POISONED(s.b);
2843 EXPECT_NOT_POISONED(s.c);
2844 EXPECT_POISONED(s.d);
2845 EXPECT_NOT_POISONED(s.e);
2846 EXPECT_POISONED(s.f);
2851 TEST(MemorySanitizer, VAArgStructByVal) {
2854 s.b = *GetPoisoned<int>();
2856 s.d = *GetPoisoned<int>();
2858 s.f = *GetPoisoned<int>();
2859 vaargsfn_structbyval(0, s, s);
2862 NOINLINE void StructByValTestFunc(struct StructByVal s) {
2863 EXPECT_NOT_POISONED(s.a);
2864 EXPECT_POISONED(s.b);
2865 EXPECT_NOT_POISONED(s.c);
2866 EXPECT_POISONED(s.d);
2867 EXPECT_NOT_POISONED(s.e);
2868 EXPECT_POISONED(s.f);
2871 NOINLINE void StructByValTestFunc1(struct StructByVal s) {
2872 StructByValTestFunc(s);
2875 NOINLINE void StructByValTestFunc2(int z, struct StructByVal s) {
2876 StructByValTestFunc(s);
2879 TEST(MemorySanitizer, StructByVal) {
2880 // Large aggregates are passed as "byval" pointer argument in LLVM.
2881 struct StructByVal s;
2883 s.b = *GetPoisoned<int>();
2885 s.d = *GetPoisoned<int>();
2887 s.f = *GetPoisoned<int>();
2888 StructByValTestFunc(s);
2889 StructByValTestFunc1(s);
2890 StructByValTestFunc2(0, s);
2895 NOINLINE __m128i m128Eq(__m128i *a, __m128i *b) { return _mm_cmpeq_epi16(*a, *b); }
2896 NOINLINE __m128i m128Lt(__m128i *a, __m128i *b) { return _mm_cmplt_epi16(*a, *b); }
2897 TEST(MemorySanitizer, m128) {
2898 __m128i a = _mm_set1_epi16(0x1234);
2899 __m128i b = _mm_set1_epi16(0x7890);
2900 EXPECT_NOT_POISONED(m128Eq(&a, &b));
2901 EXPECT_NOT_POISONED(m128Lt(&a, &b));
2903 // FIXME: add more tests for __m128i.
2904 #endif // MSAN_HAS_M128
2906 // We should not complain when copying this poisoned hole.
2907 struct StructWithHole {
2913 NOINLINE StructWithHole ReturnStructWithHole() {
2915 __msan_poison(&res, sizeof(res));
2921 TEST(MemorySanitizer, StructWithHole) {
2922 StructWithHole a = ReturnStructWithHole();
2923 break_optimization(&a);
2927 NOINLINE T ReturnStruct() {
2929 __msan_poison(&res, sizeof(res));
2935 NOINLINE void TestReturnStruct() {
2936 T s1 = ReturnStruct<T>();
2937 EXPECT_NOT_POISONED(s1.a);
2938 EXPECT_POISONED(s1.b);
2971 TEST(MemorySanitizer, IntStruct3) {
2972 TestReturnStruct<SSS1>();
2973 TestReturnStruct<SSS2>();
2974 TestReturnStruct<SSS3>();
2975 TestReturnStruct<SSS4>();
2976 TestReturnStruct<SSS5>();
2977 TestReturnStruct<SSS6>();
2978 TestReturnStruct<SSS7>();
2979 TestReturnStruct<SSS8>();
2989 NOINLINE LongStruct ReturnLongStruct1() {
2991 __msan_poison(&res, sizeof(res));
2992 res.a1 = res.a2 = res.a4 = res.a8 = 111;
2993 // leaves b1, .., b8 poisoned.
2997 NOINLINE LongStruct ReturnLongStruct2() {
2999 __msan_poison(&res, sizeof(res));
3000 res.b1 = res.b2 = res.b4 = res.b8 = 111;
3001 // leaves a1, .., a8 poisoned.
3005 TEST(MemorySanitizer, LongStruct) {
3006 LongStruct s1 = ReturnLongStruct1();
3007 __msan_print_shadow(&s1, sizeof(s1));
3008 EXPECT_NOT_POISONED(s1.a1);
3009 EXPECT_NOT_POISONED(s1.a2);
3010 EXPECT_NOT_POISONED(s1.a4);
3011 EXPECT_NOT_POISONED(s1.a8);
3013 EXPECT_POISONED(s1.b1);
3014 EXPECT_POISONED(s1.b2);
3015 EXPECT_POISONED(s1.b4);
3016 EXPECT_POISONED(s1.b8);
3018 LongStruct s2 = ReturnLongStruct2();
3019 __msan_print_shadow(&s2, sizeof(s2));
3020 EXPECT_NOT_POISONED(s2.b1);
3021 EXPECT_NOT_POISONED(s2.b2);
3022 EXPECT_NOT_POISONED(s2.b4);
3023 EXPECT_NOT_POISONED(s2.b8);
3025 EXPECT_POISONED(s2.a1);
3026 EXPECT_POISONED(s2.a2);
3027 EXPECT_POISONED(s2.a4);
3028 EXPECT_POISONED(s2.a8);
3031 #if defined(__FreeBSD__) || defined(__NetBSD__)
3032 #define MSAN_TEST_PRLIMIT 0
3033 #elif defined(__GLIBC__)
3034 #define MSAN_TEST_PRLIMIT __GLIBC_PREREQ(2, 13)
3036 #define MSAN_TEST_PRLIMIT 1
3039 TEST(MemorySanitizer, getrlimit) {
3040 struct rlimit limit;
3041 __msan_poison(&limit, sizeof(limit));
3042 int result = getrlimit(RLIMIT_DATA, &limit);
3043 ASSERT_EQ(result, 0);
3044 EXPECT_NOT_POISONED(limit.rlim_cur);
3045 EXPECT_NOT_POISONED(limit.rlim_max);
3047 #if MSAN_TEST_PRLIMIT
3048 struct rlimit limit2;
3049 __msan_poison(&limit2, sizeof(limit2));
3050 result = prlimit(getpid(), RLIMIT_DATA, &limit, &limit2);
3051 ASSERT_EQ(result, 0);
3052 EXPECT_NOT_POISONED(limit2.rlim_cur);
3053 EXPECT_NOT_POISONED(limit2.rlim_max);
3055 __msan_poison(&limit, sizeof(limit));
3056 result = prlimit(getpid(), RLIMIT_DATA, nullptr, &limit);
3057 ASSERT_EQ(result, 0);
3058 EXPECT_NOT_POISONED(limit.rlim_cur);
3059 EXPECT_NOT_POISONED(limit.rlim_max);
3061 result = prlimit(getpid(), RLIMIT_DATA, &limit, nullptr);
3062 ASSERT_EQ(result, 0);
3066 TEST(MemorySanitizer, getrusage) {
3067 struct rusage usage;
3068 __msan_poison(&usage, sizeof(usage));
3069 int result = getrusage(RUSAGE_SELF, &usage);
3070 ASSERT_EQ(result, 0);
3071 EXPECT_NOT_POISONED(usage.ru_utime.tv_sec);
3072 EXPECT_NOT_POISONED(usage.ru_utime.tv_usec);
3073 EXPECT_NOT_POISONED(usage.ru_stime.tv_sec);
3074 EXPECT_NOT_POISONED(usage.ru_stime.tv_usec);
3075 EXPECT_NOT_POISONED(usage.ru_maxrss);
3076 EXPECT_NOT_POISONED(usage.ru_minflt);
3077 EXPECT_NOT_POISONED(usage.ru_majflt);
3078 EXPECT_NOT_POISONED(usage.ru_inblock);
3079 EXPECT_NOT_POISONED(usage.ru_oublock);
3080 EXPECT_NOT_POISONED(usage.ru_nvcsw);
3081 EXPECT_NOT_POISONED(usage.ru_nivcsw);
3084 #if defined(__FreeBSD__) || defined(__NetBSD__)
3085 static void GetProgramPath(char *buf, size_t sz) {
3086 #if defined(__FreeBSD__)
3087 int mib[4] = { CTL_KERN, KERN_PROC, KERN_PROC_PATHNAME, -1 };
3088 #elif defined(__NetBSD__)
3089 int mib[4] = { CTL_KERN, KERN_PROC_ARGS, -1, KERN_PROC_PATHNAME};
3091 int res = sysctl(mib, 4, buf, &sz, NULL, 0);
3094 #elif defined(__GLIBC__)
3095 static void GetProgramPath(char *buf, size_t sz) {
3096 extern char *program_invocation_name;
3097 int res = snprintf(buf, sz, "%s", program_invocation_name);
3099 ASSERT_LT((size_t)res, sz);
3102 # error "TODO: port this"
3105 static void dladdr_testfn() {}
3107 TEST(MemorySanitizer, dladdr) {
3109 __msan_poison(&info, sizeof(info));
3110 int result = dladdr((const void*)dladdr_testfn, &info);
3111 ASSERT_NE(result, 0);
3112 EXPECT_NOT_POISONED((unsigned long)info.dli_fname);
3114 EXPECT_NOT_POISONED(strlen(info.dli_fname));
3115 EXPECT_NOT_POISONED((unsigned long)info.dli_fbase);
3116 EXPECT_NOT_POISONED((unsigned long)info.dli_sname);
3118 EXPECT_NOT_POISONED(strlen(info.dli_sname));
3119 EXPECT_NOT_POISONED((unsigned long)info.dli_saddr);
3122 #ifndef MSAN_TEST_DISABLE_DLOPEN
3124 static int dl_phdr_callback(struct dl_phdr_info *info, size_t size, void *data) {
3126 EXPECT_NOT_POISONED(info->dlpi_addr);
3127 EXPECT_NOT_POISONED(strlen(info->dlpi_name));
3128 EXPECT_NOT_POISONED(info->dlpi_phnum);
3129 for (int i = 0; i < info->dlpi_phnum; ++i)
3130 EXPECT_NOT_POISONED(info->dlpi_phdr[i]);
3134 // Compute the path to our loadable DSO. We assume it's in the same
3135 // directory. Only use string routines that we intercept so far to do this.
3136 static void GetPathToLoadable(char *buf, size_t sz) {
3137 char program_path[kMaxPathLength];
3138 GetProgramPath(program_path, sizeof(program_path));
3140 const char *last_slash = strrchr(program_path, '/');
3141 ASSERT_NE(nullptr, last_slash);
3142 size_t dir_len = (size_t)(last_slash - program_path);
3143 #if defined(__x86_64__)
3144 static const char basename[] = "libmsan_loadable.x86_64.so";
3145 #elif defined(__MIPSEB__) || defined(MIPSEB)
3146 static const char basename[] = "libmsan_loadable.mips64.so";
3147 #elif defined(__mips64)
3148 static const char basename[] = "libmsan_loadable.mips64el.so";
3149 #elif defined(__aarch64__)
3150 static const char basename[] = "libmsan_loadable.aarch64.so";
3151 #elif defined(__powerpc64__) && __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
3152 static const char basename[] = "libmsan_loadable.powerpc64.so";
3153 #elif defined(__powerpc64__) && __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
3154 static const char basename[] = "libmsan_loadable.powerpc64le.so";
3156 int res = snprintf(buf, sz, "%.*s/%s",
3157 (int)dir_len, program_path, basename);
3159 ASSERT_LT((size_t)res, sz);
3162 TEST(MemorySanitizer, dl_iterate_phdr) {
3163 char path[kMaxPathLength];
3164 GetPathToLoadable(path, sizeof(path));
3166 // Having at least one dlopen'ed library in the process makes this more
3168 void *lib = dlopen(path, RTLD_LAZY);
3169 ASSERT_NE((void*)0, lib);
3172 int result = dl_iterate_phdr(dl_phdr_callback, &count);
3173 ASSERT_GT(count, 0);
3178 TEST(MemorySanitizer, dlopen) {
3179 char path[kMaxPathLength];
3180 GetPathToLoadable(path, sizeof(path));
3182 // We need to clear shadow for globals when doing dlopen. In order to test
3183 // this, we have to poison the shadow for the DSO before we load it. In
3184 // general this is difficult, but the loader tends to reload things in the
3185 // same place, so we open, close, and then reopen. The global should always
3186 // start out clean after dlopen.
3187 for (int i = 0; i < 2; i++) {
3188 void *lib = dlopen(path, RTLD_LAZY);
3190 printf("dlerror: %s\n", dlerror());
3191 ASSERT_TRUE(lib != NULL);
3193 void **(*get_dso_global)() = (void **(*)())dlsym(lib, "get_dso_global");
3194 ASSERT_TRUE(get_dso_global != NULL);
3195 void **dso_global = get_dso_global();
3196 EXPECT_NOT_POISONED(*dso_global);
3197 __msan_poison(dso_global, sizeof(*dso_global));
3198 EXPECT_POISONED(*dso_global);
3203 // Regression test for a crash in dlopen() interceptor.
3204 TEST(MemorySanitizer, dlopenFailed) {
3205 const char *path = "/libmsan_loadable_does_not_exist.so";
3206 void *lib = dlopen(path, RTLD_LAZY);
3207 ASSERT_TRUE(lib == NULL);
3210 #endif // MSAN_TEST_DISABLE_DLOPEN
3212 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
3213 TEST(MemorySanitizer, sched_getaffinity) {
3215 int res = sched_getaffinity(getpid(), sizeof(mask), &mask);
3217 EXPECT_NOT_POISONED(mask);
3221 TEST(MemorySanitizer, scanf) {
3222 const char *input = "42 hello";
3224 char* s = new char[7];
3225 int res = sscanf(input, "%d %5s", d, s);
3226 printf("res %d\n", res);
3228 EXPECT_NOT_POISONED(*d);
3229 EXPECT_NOT_POISONED(s[0]);
3230 EXPECT_NOT_POISONED(s[1]);
3231 EXPECT_NOT_POISONED(s[2]);
3232 EXPECT_NOT_POISONED(s[3]);
3233 EXPECT_NOT_POISONED(s[4]);
3234 EXPECT_NOT_POISONED(s[5]);
3235 EXPECT_POISONED(s[6]);
3240 static void *SimpleThread_threadfn(void* data) {
3244 TEST(MemorySanitizer, SimpleThread) {
3247 int res = pthread_create(&t, NULL, SimpleThread_threadfn, NULL);
3249 EXPECT_NOT_POISONED(t);
3250 res = pthread_join(t, &p);
3252 EXPECT_NOT_POISONED(p);
3256 static void *SmallStackThread_threadfn(void* data) {
3260 #ifdef PTHREAD_STACK_MIN
3261 # define SMALLSTACKSIZE PTHREAD_STACK_MIN
3262 # define SMALLPRESTACKSIZE PTHREAD_STACK_MIN
3264 # define SMALLSTACKSIZE 64 * 1024
3265 # define SMALLPRESTACKSIZE 16 * 1024
3268 TEST(MemorySanitizer, SmallStackThread) {
3269 pthread_attr_t attr;
3273 res = pthread_attr_init(&attr);
3275 res = pthread_attr_setstacksize(&attr, SMALLSTACKSIZE);
3277 res = pthread_create(&t, &attr, SmallStackThread_threadfn, NULL);
3279 res = pthread_join(t, &p);
3281 res = pthread_attr_destroy(&attr);
3285 TEST(MemorySanitizer, SmallPreAllocatedStackThread) {
3286 pthread_attr_t attr;
3289 res = pthread_attr_init(&attr);
3292 const size_t kStackSize = SMALLPRESTACKSIZE;
3293 res = posix_memalign(&stack, 4096, kStackSize);
3295 res = pthread_attr_setstack(&attr, stack, kStackSize);
3297 res = pthread_create(&t, &attr, SmallStackThread_threadfn, NULL);
3299 res = pthread_join(t, NULL);
3301 res = pthread_attr_destroy(&attr);
3305 TEST(MemorySanitizer, pthread_attr_get) {
3306 pthread_attr_t attr;
3308 res = pthread_attr_init(&attr);
3312 res = pthread_attr_getdetachstate(&attr, &v);
3314 EXPECT_NOT_POISONED(v);
3318 res = pthread_attr_getguardsize(&attr, &v);
3320 EXPECT_NOT_POISONED(v);
3323 struct sched_param v;
3324 res = pthread_attr_getschedparam(&attr, &v);
3326 EXPECT_NOT_POISONED(v);
3330 res = pthread_attr_getschedpolicy(&attr, &v);
3332 EXPECT_NOT_POISONED(v);
3336 res = pthread_attr_getinheritsched(&attr, &v);
3338 EXPECT_NOT_POISONED(v);
3342 res = pthread_attr_getscope(&attr, &v);
3344 EXPECT_NOT_POISONED(v);
3348 res = pthread_attr_getstacksize(&attr, &v);
3350 EXPECT_NOT_POISONED(v);
3355 res = pthread_attr_getstack(&attr, &v, &w);
3357 EXPECT_NOT_POISONED(v);
3358 EXPECT_NOT_POISONED(w);
3360 #if !defined(__NetBSD__)
3363 res = pthread_attr_getaffinity_np(&attr, sizeof(v), &v);
3365 EXPECT_NOT_POISONED(v);
3368 res = pthread_attr_destroy(&attr);
3372 TEST(MemorySanitizer, pthread_getschedparam) {
3374 struct sched_param param;
3375 int res = pthread_getschedparam(pthread_self(), &policy, ¶m);
3377 EXPECT_NOT_POISONED(policy);
3378 EXPECT_NOT_POISONED(param.sched_priority);
3381 TEST(MemorySanitizer, pthread_key_create) {
3383 int res = pthread_key_create(&key, NULL);
3385 EXPECT_NOT_POISONED(key);
3386 res = pthread_key_delete(key);
3391 struct SignalCondArg {
3392 pthread_cond_t* cond;
3393 pthread_mutex_t* mu;
3397 void *SignalCond(void *param) {
3398 SignalCondArg *arg = reinterpret_cast<SignalCondArg *>(param);
3399 pthread_mutex_lock(arg->mu);
3401 pthread_cond_broadcast(arg->cond);
3403 pthread_cond_signal(arg->cond);
3404 pthread_mutex_unlock(arg->mu);
3409 TEST(MemorySanitizer, pthread_cond_wait) {
3410 pthread_cond_t cond;
3412 SignalCondArg args = {&cond, &mu, false};
3413 pthread_cond_init(&cond, 0);
3414 pthread_mutex_init(&mu, 0);
3415 pthread_mutex_lock(&mu);
3419 pthread_create(&thr, 0, SignalCond, &args);
3420 int res = pthread_cond_wait(&cond, &mu);
3422 pthread_join(thr, 0);
3425 args.broadcast = true;
3426 pthread_create(&thr, 0, SignalCond, &args);
3427 res = pthread_cond_wait(&cond, &mu);
3429 pthread_join(thr, 0);
3431 pthread_mutex_unlock(&mu);
3432 pthread_mutex_destroy(&mu);
3433 pthread_cond_destroy(&cond);
3436 TEST(MemorySanitizer, tmpnam) {
3438 char *res = tmpnam(s);
3440 EXPECT_NOT_POISONED(strlen(res));
3443 TEST(MemorySanitizer, tempnam) {
3444 char *res = tempnam(NULL, "zzz");
3445 EXPECT_NOT_POISONED(strlen(res));
3449 TEST(MemorySanitizer, posix_memalign) {
3452 int res = posix_memalign(&p, 4096, 13);
3454 EXPECT_NOT_POISONED(p);
3455 EXPECT_EQ(0U, (uintptr_t)p % 4096);
3459 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
3460 TEST(MemorySanitizer, memalign) {
3461 void *p = memalign(4096, 13);
3462 EXPECT_EQ(0U, (uintptr_t)p % 4096);
3467 TEST(MemorySanitizer, valloc) {
3468 void *a = valloc(100);
3469 uintptr_t PageSize = GetPageSize();
3470 EXPECT_EQ(0U, (uintptr_t)a % PageSize);
3474 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
3475 TEST(MemorySanitizer, pvalloc) {
3476 uintptr_t PageSize = GetPageSize();
3477 void *p = pvalloc(PageSize + 100);
3478 EXPECT_EQ(0U, (uintptr_t)p % PageSize);
3479 EXPECT_EQ(2 * PageSize, __sanitizer_get_allocated_size(p));
3482 p = pvalloc(0); // pvalloc(0) should allocate at least one page.
3483 EXPECT_EQ(0U, (uintptr_t)p % PageSize);
3484 EXPECT_EQ(PageSize, __sanitizer_get_allocated_size(p));
3489 TEST(MemorySanitizer, inet_pton) {
3490 const char *s = "1:0:0:0:0:0:0:8";
3491 unsigned char buf[sizeof(struct in6_addr)];
3492 int res = inet_pton(AF_INET6, s, buf);
3494 EXPECT_NOT_POISONED(buf[0]);
3495 EXPECT_NOT_POISONED(buf[sizeof(struct in6_addr) - 1]);
3497 char s_out[INET6_ADDRSTRLEN];
3498 EXPECT_POISONED(s_out[3]);
3499 const char *q = inet_ntop(AF_INET6, buf, s_out, INET6_ADDRSTRLEN);
3500 ASSERT_NE((void*)0, q);
3501 EXPECT_NOT_POISONED(s_out[3]);
3504 TEST(MemorySanitizer, inet_aton) {
3505 const char *s = "127.0.0.1";
3506 struct in_addr in[2];
3507 int res = inet_aton(s, in);
3509 EXPECT_NOT_POISONED(in[0]);
3510 EXPECT_POISONED(*(char *)(in + 1));
3513 TEST(MemorySanitizer, uname) {
3515 int res = uname(&u);
3517 EXPECT_NOT_POISONED(strlen(u.sysname));
3518 EXPECT_NOT_POISONED(strlen(u.nodename));
3519 EXPECT_NOT_POISONED(strlen(u.release));
3520 EXPECT_NOT_POISONED(strlen(u.version));
3521 EXPECT_NOT_POISONED(strlen(u.machine));
3524 TEST(MemorySanitizer, gethostname) {
3526 int res = gethostname(buf, 100);
3528 EXPECT_NOT_POISONED(strlen(buf));
3531 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
3532 TEST(MemorySanitizer, sysinfo) {
3533 struct sysinfo info;
3534 int res = sysinfo(&info);
3536 EXPECT_NOT_POISONED(info);
3540 TEST(MemorySanitizer, getpwuid) {
3541 struct passwd *p = getpwuid(0); // root
3542 ASSERT_TRUE(p != NULL);
3543 EXPECT_NOT_POISONED(p->pw_name);
3544 ASSERT_TRUE(p->pw_name != NULL);
3545 EXPECT_NOT_POISONED(p->pw_name[0]);
3546 EXPECT_NOT_POISONED(p->pw_uid);
3547 ASSERT_EQ(0U, p->pw_uid);
3550 TEST(MemorySanitizer, getpwuid_r) {
3552 struct passwd *pwdres;
3554 int res = getpwuid_r(0, &pwd, buf, sizeof(buf), &pwdres);
3556 EXPECT_NOT_POISONED(pwd.pw_name);
3557 ASSERT_TRUE(pwd.pw_name != NULL);
3558 EXPECT_NOT_POISONED(pwd.pw_name[0]);
3559 EXPECT_NOT_POISONED(pwd.pw_uid);
3560 ASSERT_EQ(0U, pwd.pw_uid);
3561 EXPECT_NOT_POISONED(pwdres);
3564 TEST(MemorySanitizer, getpwnam_r) {
3566 struct passwd *pwdres;
3568 int res = getpwnam_r("root", &pwd, buf, sizeof(buf), &pwdres);
3570 EXPECT_NOT_POISONED(pwd.pw_name);
3571 ASSERT_TRUE(pwd.pw_name != NULL);
3572 EXPECT_NOT_POISONED(pwd.pw_name[0]);
3573 EXPECT_NOT_POISONED(pwd.pw_uid);
3574 ASSERT_EQ(0U, pwd.pw_uid);
3575 EXPECT_NOT_POISONED(pwdres);
3578 TEST(MemorySanitizer, getpwnam_r_positive) {
3580 struct passwd *pwdres;
3582 strncpy(s, "abcd", 5);
3583 __msan_poison(s, 5);
3586 EXPECT_UMR(res = getpwnam_r(s, &pwd, buf, sizeof(buf), &pwdres));
3589 TEST(MemorySanitizer, getgrnam_r) {
3591 struct group *grpres;
3593 int res = getgrnam_r(SUPERUSER_GROUP, &grp, buf, sizeof(buf), &grpres);
3595 // Note that getgrnam_r() returns 0 if the matching group is not found.
3596 ASSERT_NE(nullptr, grpres);
3597 EXPECT_NOT_POISONED(grp.gr_name);
3598 ASSERT_TRUE(grp.gr_name != NULL);
3599 EXPECT_NOT_POISONED(grp.gr_name[0]);
3600 EXPECT_NOT_POISONED(grp.gr_gid);
3601 EXPECT_NOT_POISONED(grpres);
3604 TEST(MemorySanitizer, getpwent) {
3606 struct passwd *p = getpwent();
3607 ASSERT_TRUE(p != NULL);
3608 EXPECT_NOT_POISONED(p->pw_name);
3609 ASSERT_TRUE(p->pw_name != NULL);
3610 EXPECT_NOT_POISONED(p->pw_name[0]);
3611 EXPECT_NOT_POISONED(p->pw_uid);
3614 TEST(MemorySanitizer, getpwent_r) {
3616 struct passwd *pwdres;
3619 int res = getpwent_r(&pwd, buf, sizeof(buf), &pwdres);
3621 EXPECT_NOT_POISONED(pwd.pw_name);
3622 ASSERT_TRUE(pwd.pw_name != NULL);
3623 EXPECT_NOT_POISONED(pwd.pw_name[0]);
3624 EXPECT_NOT_POISONED(pwd.pw_uid);
3625 EXPECT_NOT_POISONED(pwdres);
3628 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
3629 TEST(MemorySanitizer, fgetpwent) {
3630 FILE *fp = fopen("/etc/passwd", "r");
3631 struct passwd *p = fgetpwent(fp);
3632 ASSERT_TRUE(p != NULL);
3633 EXPECT_NOT_POISONED(p->pw_name);
3634 ASSERT_TRUE(p->pw_name != NULL);
3635 EXPECT_NOT_POISONED(p->pw_name[0]);
3636 EXPECT_NOT_POISONED(p->pw_uid);
3641 TEST(MemorySanitizer, getgrent) {
3643 struct group *p = getgrent();
3644 ASSERT_TRUE(p != NULL);
3645 EXPECT_NOT_POISONED(p->gr_name);
3646 ASSERT_TRUE(p->gr_name != NULL);
3647 EXPECT_NOT_POISONED(p->gr_name[0]);
3648 EXPECT_NOT_POISONED(p->gr_gid);
3651 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
3652 TEST(MemorySanitizer, fgetgrent) {
3653 FILE *fp = fopen("/etc/group", "r");
3654 struct group *grp = fgetgrent(fp);
3655 ASSERT_TRUE(grp != NULL);
3656 EXPECT_NOT_POISONED(grp->gr_name);
3657 ASSERT_TRUE(grp->gr_name != NULL);
3658 EXPECT_NOT_POISONED(grp->gr_name[0]);
3659 EXPECT_NOT_POISONED(grp->gr_gid);
3660 for (char **p = grp->gr_mem; *p; ++p) {
3661 EXPECT_NOT_POISONED((*p)[0]);
3662 EXPECT_TRUE(strlen(*p) > 0);
3668 TEST(MemorySanitizer, getgrent_r) {
3670 struct group *grpres;
3673 int res = getgrent_r(&grp, buf, sizeof(buf), &grpres);
3675 EXPECT_NOT_POISONED(grp.gr_name);
3676 ASSERT_TRUE(grp.gr_name != NULL);
3677 EXPECT_NOT_POISONED(grp.gr_name[0]);
3678 EXPECT_NOT_POISONED(grp.gr_gid);
3679 EXPECT_NOT_POISONED(grpres);
3682 #if !defined(__FreeBSD__) && !defined(__NetBSD__)
3683 TEST(MemorySanitizer, fgetgrent_r) {
3684 FILE *fp = fopen("/etc/group", "r");
3686 struct group *grpres;
3689 int res = fgetgrent_r(fp, &grp, buf, sizeof(buf), &grpres);
3691 EXPECT_NOT_POISONED(grp.gr_name);
3692 ASSERT_TRUE(grp.gr_name != NULL);
3693 EXPECT_NOT_POISONED(grp.gr_name[0]);
3694 EXPECT_NOT_POISONED(grp.gr_gid);
3695 EXPECT_NOT_POISONED(grpres);
3700 TEST(MemorySanitizer, getgroups) {
3701 int n = getgroups(0, 0);
3702 gid_t *gids = new gid_t[n];
3703 int res = getgroups(n, gids);
3705 for (int i = 0; i < n; ++i)
3706 EXPECT_NOT_POISONED(gids[i]);
3709 TEST(MemorySanitizer, getgroups_zero) {
3711 int n = getgroups(0, &group);
3715 TEST(MemorySanitizer, getgroups_negative) {
3717 int n = getgroups(-1, 0);
3720 n = getgroups(-1, 0);
3724 TEST(MemorySanitizer, wordexp) {
3726 int res = wordexp("a b c", &w, 0);
3728 ASSERT_EQ(3U, w.we_wordc);
3729 ASSERT_STREQ("a", w.we_wordv[0]);
3730 ASSERT_STREQ("b", w.we_wordv[1]);
3731 ASSERT_STREQ("c", w.we_wordv[2]);
3735 static bool applySlt(T value, T shadow) {
3736 __msan_partial_poison(&value, &shadow, sizeof(T));
3737 volatile bool zzz = true;
3738 // This "|| zzz" trick somehow makes LLVM emit "icmp slt" instead of
3739 // a shift-and-trunc to get at the highest bit.
3740 volatile bool v = value < 0 || zzz;
3744 TEST(MemorySanitizer, SignedCompareWithZero) {
3745 EXPECT_NOT_POISONED(applySlt<S4>(0xF, 0xF));
3746 EXPECT_NOT_POISONED(applySlt<S4>(0xF, 0xFF));
3747 EXPECT_NOT_POISONED(applySlt<S4>(0xF, 0xFFFFFF));
3748 EXPECT_NOT_POISONED(applySlt<S4>(0xF, 0x7FFFFFF));
3749 EXPECT_UMR(applySlt<S4>(0xF, 0x80FFFFFF));
3750 EXPECT_UMR(applySlt<S4>(0xF, 0xFFFFFFFF));
3753 template <class T, class S>
3754 static T poisoned(T Va, S Sa) {
3755 char SIZE_CHECK1[(ssize_t)sizeof(T) - (ssize_t)sizeof(S)];
3756 char SIZE_CHECK2[(ssize_t)sizeof(S) - (ssize_t)sizeof(T)];
3759 __msan_partial_poison(&a, &Sa, sizeof(T));
3763 TEST(MemorySanitizer, ICmpRelational) {
3764 EXPECT_NOT_POISONED(poisoned(0, 0) < poisoned(0, 0));
3765 EXPECT_NOT_POISONED(poisoned(0U, 0) < poisoned(0U, 0));
3766 EXPECT_NOT_POISONED(poisoned(0LL, 0LLU) < poisoned(0LL, 0LLU));
3767 EXPECT_NOT_POISONED(poisoned(0LLU, 0LLU) < poisoned(0LLU, 0LLU));
3768 EXPECT_POISONED(poisoned(0xFF, 0xFF) < poisoned(0xFF, 0xFF));
3769 EXPECT_POISONED(poisoned(0xFFFFFFFFU, 0xFFFFFFFFU) <
3770 poisoned(0xFFFFFFFFU, 0xFFFFFFFFU));
3771 EXPECT_POISONED(poisoned(-1, 0xFFFFFFFFU) <
3772 poisoned(-1, 0xFFFFFFFFU));
3774 EXPECT_NOT_POISONED(poisoned(0, 0) <= poisoned(0, 0));
3775 EXPECT_NOT_POISONED(poisoned(0U, 0) <= poisoned(0U, 0));
3776 EXPECT_NOT_POISONED(poisoned(0LL, 0LLU) <= poisoned(0LL, 0LLU));
3777 EXPECT_NOT_POISONED(poisoned(0LLU, 0LLU) <= poisoned(0LLU, 0LLU));
3778 EXPECT_POISONED(poisoned(0xFF, 0xFF) <= poisoned(0xFF, 0xFF));
3779 EXPECT_POISONED(poisoned(0xFFFFFFFFU, 0xFFFFFFFFU) <=
3780 poisoned(0xFFFFFFFFU, 0xFFFFFFFFU));
3781 EXPECT_POISONED(poisoned(-1, 0xFFFFFFFFU) <=
3782 poisoned(-1, 0xFFFFFFFFU));
3784 EXPECT_NOT_POISONED(poisoned(0, 0) > poisoned(0, 0));
3785 EXPECT_NOT_POISONED(poisoned(0U, 0) > poisoned(0U, 0));
3786 EXPECT_NOT_POISONED(poisoned(0LL, 0LLU) > poisoned(0LL, 0LLU));
3787 EXPECT_NOT_POISONED(poisoned(0LLU, 0LLU) > poisoned(0LLU, 0LLU));
3788 EXPECT_POISONED(poisoned(0xFF, 0xFF) > poisoned(0xFF, 0xFF));
3789 EXPECT_POISONED(poisoned(0xFFFFFFFFU, 0xFFFFFFFFU) >
3790 poisoned(0xFFFFFFFFU, 0xFFFFFFFFU));
3791 EXPECT_POISONED(poisoned(-1, 0xFFFFFFFFU) >
3792 poisoned(-1, 0xFFFFFFFFU));
3794 EXPECT_NOT_POISONED(poisoned(0, 0) >= poisoned(0, 0));
3795 EXPECT_NOT_POISONED(poisoned(0U, 0) >= poisoned(0U, 0));
3796 EXPECT_NOT_POISONED(poisoned(0LL, 0LLU) >= poisoned(0LL, 0LLU));
3797 EXPECT_NOT_POISONED(poisoned(0LLU, 0LLU) >= poisoned(0LLU, 0LLU));
3798 EXPECT_POISONED(poisoned(0xFF, 0xFF) >= poisoned(0xFF, 0xFF));
3799 EXPECT_POISONED(poisoned(0xFFFFFFFFU, 0xFFFFFFFFU) >=
3800 poisoned(0xFFFFFFFFU, 0xFFFFFFFFU));
3801 EXPECT_POISONED(poisoned(-1, 0xFFFFFFFFU) >=
3802 poisoned(-1, 0xFFFFFFFFU));
3804 EXPECT_POISONED(poisoned(6, 0xF) > poisoned(7, 0));
3805 EXPECT_POISONED(poisoned(0xF, 0xF) > poisoned(7, 0));
3806 // Note that "icmp op X, Y" is approximated with "or shadow(X), shadow(Y)"
3807 // and therefore may generate false positives in some cases, e.g. the
3809 // EXPECT_NOT_POISONED(poisoned(-1, 0x80000000U) >= poisoned(-1, 0U));
3813 TEST(MemorySanitizer, ICmpVectorRelational) {
3814 EXPECT_NOT_POISONED(
3815 _mm_cmplt_epi16(poisoned(_mm_set1_epi16(0), _mm_set1_epi16(0)),
3816 poisoned(_mm_set1_epi16(0), _mm_set1_epi16(0))));
3817 EXPECT_NOT_POISONED(
3818 _mm_cmplt_epi16(poisoned(_mm_set1_epi32(0), _mm_set1_epi32(0)),
3819 poisoned(_mm_set1_epi32(0), _mm_set1_epi32(0))));
3821 _mm_cmplt_epi16(poisoned(_mm_set1_epi16(0), _mm_set1_epi16(0xFFFF)),
3822 poisoned(_mm_set1_epi16(0), _mm_set1_epi16(0xFFFF))));
3823 EXPECT_POISONED(_mm_cmpgt_epi16(poisoned(_mm_set1_epi16(6), _mm_set1_epi16(0xF)),
3824 poisoned(_mm_set1_epi16(7), _mm_set1_epi16(0))));
3827 TEST(MemorySanitizer, stmxcsr_ldmxcsr) {
3828 U4 x = _mm_getcsr();
3829 EXPECT_NOT_POISONED(x);
3833 __msan_poison(&x, sizeof(x));
3834 U4 origin = __LINE__;
3835 __msan_set_origin(&x, sizeof(x), origin);
3836 EXPECT_UMR_O(_mm_setcsr(x), origin);
3840 // Volatile bitfield store is implemented as load-mask-store
3841 // Test that we don't warn on the store of (uninitialized) padding.
3842 struct VolatileBitfieldStruct {
3843 volatile unsigned x : 1;
3847 TEST(MemorySanitizer, VolatileBitfield) {
3848 VolatileBitfieldStruct *S = new VolatileBitfieldStruct;
3850 EXPECT_NOT_POISONED((unsigned)S->x);
3851 EXPECT_POISONED((unsigned)S->y);
3854 TEST(MemorySanitizer, UnalignedLoad) {
3855 char x[32] __attribute__((aligned(8)));
3856 U4 origin = __LINE__;
3857 for (unsigned i = 0; i < sizeof(x) / 4; ++i)
3858 __msan_set_origin(x + 4 * i, 4, origin + i);
3860 memset(x + 8, 0, 16);
3861 EXPECT_POISONED_O(__sanitizer_unaligned_load16(x + 6), origin + 1);
3862 EXPECT_POISONED_O(__sanitizer_unaligned_load16(x + 7), origin + 1);
3863 EXPECT_NOT_POISONED(__sanitizer_unaligned_load16(x + 8));
3864 EXPECT_NOT_POISONED(__sanitizer_unaligned_load16(x + 9));
3865 EXPECT_NOT_POISONED(__sanitizer_unaligned_load16(x + 22));
3866 EXPECT_POISONED_O(__sanitizer_unaligned_load16(x + 23), origin + 6);
3867 EXPECT_POISONED_O(__sanitizer_unaligned_load16(x + 24), origin + 6);
3869 EXPECT_POISONED_O(__sanitizer_unaligned_load32(x + 4), origin + 1);
3870 EXPECT_POISONED_O(__sanitizer_unaligned_load32(x + 7), origin + 1);
3871 EXPECT_NOT_POISONED(__sanitizer_unaligned_load32(x + 8));
3872 EXPECT_NOT_POISONED(__sanitizer_unaligned_load32(x + 9));
3873 EXPECT_NOT_POISONED(__sanitizer_unaligned_load32(x + 20));
3874 EXPECT_POISONED_O(__sanitizer_unaligned_load32(x + 21), origin + 6);
3875 EXPECT_POISONED_O(__sanitizer_unaligned_load32(x + 24), origin + 6);
3877 EXPECT_POISONED_O(__sanitizer_unaligned_load64(x), origin);
3878 EXPECT_POISONED_O(__sanitizer_unaligned_load64(x + 1), origin);
3879 EXPECT_POISONED_O(__sanitizer_unaligned_load64(x + 7), origin + 1);
3880 EXPECT_NOT_POISONED(__sanitizer_unaligned_load64(x + 8));
3881 EXPECT_NOT_POISONED(__sanitizer_unaligned_load64(x + 9));
3882 EXPECT_NOT_POISONED(__sanitizer_unaligned_load64(x + 16));
3883 EXPECT_POISONED_O(__sanitizer_unaligned_load64(x + 17), origin + 6);
3884 EXPECT_POISONED_O(__sanitizer_unaligned_load64(x + 21), origin + 6);
3885 EXPECT_POISONED_O(__sanitizer_unaligned_load64(x + 24), origin + 6);
3888 TEST(MemorySanitizer, UnalignedStore16) {
3889 char x[5] __attribute__((aligned(4)));
3891 U4 origin = __LINE__;
3892 __msan_poison(&y2, 1);
3893 __msan_set_origin(&y2, 1, origin);
3895 __sanitizer_unaligned_store16(x + 1, y2);
3896 EXPECT_POISONED_O(x[0], origin);
3897 EXPECT_POISONED_O(x[1], origin);
3898 EXPECT_NOT_POISONED(x[2]);
3899 EXPECT_POISONED_O(x[3], origin);
3902 TEST(MemorySanitizer, UnalignedStore32) {
3903 char x[8] __attribute__((aligned(4)));
3905 U4 origin = __LINE__;
3906 __msan_poison(&y4, 2);
3907 __msan_set_origin(&y4, 2, origin);
3909 __sanitizer_unaligned_store32(x + 3, y4);
3910 EXPECT_POISONED_O(x[0], origin);
3911 EXPECT_POISONED_O(x[1], origin);
3912 EXPECT_POISONED_O(x[2], origin);
3913 EXPECT_POISONED_O(x[3], origin);
3914 EXPECT_POISONED_O(x[4], origin);
3915 EXPECT_NOT_POISONED(x[5]);
3916 EXPECT_NOT_POISONED(x[6]);
3917 EXPECT_POISONED_O(x[7], origin);
3920 TEST(MemorySanitizer, UnalignedStore64) {
3921 char x[16] __attribute__((aligned(8)));
3923 U4 origin = __LINE__;
3924 __msan_poison(&y8, 3);
3925 __msan_poison(((char *)&y8) + sizeof(y8) - 2, 1);
3926 __msan_set_origin(&y8, 8, origin);
3928 __sanitizer_unaligned_store64(x + 3, y8);
3929 EXPECT_POISONED_O(x[0], origin);
3930 EXPECT_POISONED_O(x[1], origin);
3931 EXPECT_POISONED_O(x[2], origin);
3932 EXPECT_POISONED_O(x[3], origin);
3933 EXPECT_POISONED_O(x[4], origin);
3934 EXPECT_POISONED_O(x[5], origin);
3935 EXPECT_NOT_POISONED(x[6]);
3936 EXPECT_NOT_POISONED(x[7]);
3937 EXPECT_NOT_POISONED(x[8]);
3938 EXPECT_POISONED_O(x[9], origin);
3939 EXPECT_NOT_POISONED(x[10]);
3940 EXPECT_POISONED_O(x[11], origin);
3943 TEST(MemorySanitizer, UnalignedStore16_precise) {
3944 char x[8] __attribute__((aligned(4)));
3946 U4 originx1 = __LINE__;
3947 U4 originx2 = __LINE__;
3948 U4 originy = __LINE__;
3949 __msan_poison(x, sizeof(x));
3950 __msan_set_origin(x, 4, originx1);
3951 __msan_set_origin(x + 4, 4, originx2);
3952 __msan_poison(((char *)&y) + 1, 1);
3953 __msan_set_origin(&y, sizeof(y), originy);
3955 __sanitizer_unaligned_store16(x + 3, y);
3956 EXPECT_POISONED_O(x[0], originx1);
3957 EXPECT_POISONED_O(x[1], originx1);
3958 EXPECT_POISONED_O(x[2], originx1);
3959 EXPECT_NOT_POISONED(x[3]);
3960 EXPECT_POISONED_O(x[4], originy);
3961 EXPECT_POISONED_O(x[5], originy);
3962 EXPECT_POISONED_O(x[6], originy);
3963 EXPECT_POISONED_O(x[7], originy);
3966 TEST(MemorySanitizer, UnalignedStore16_precise2) {
3967 char x[8] __attribute__((aligned(4)));
3969 U4 originx1 = __LINE__;
3970 U4 originx2 = __LINE__;
3971 U4 originy = __LINE__;
3972 __msan_poison(x, sizeof(x));
3973 __msan_set_origin(x, 4, originx1);
3974 __msan_set_origin(x + 4, 4, originx2);
3975 __msan_poison(((char *)&y), 1);
3976 __msan_set_origin(&y, sizeof(y), originy);
3978 __sanitizer_unaligned_store16(x + 3, y);
3979 EXPECT_POISONED_O(x[0], originy);
3980 EXPECT_POISONED_O(x[1], originy);
3981 EXPECT_POISONED_O(x[2], originy);
3982 EXPECT_POISONED_O(x[3], originy);
3983 EXPECT_NOT_POISONED(x[4]);
3984 EXPECT_POISONED_O(x[5], originx2);
3985 EXPECT_POISONED_O(x[6], originx2);
3986 EXPECT_POISONED_O(x[7], originx2);
3989 TEST(MemorySanitizer, UnalignedStore64_precise) {
3990 char x[12] __attribute__((aligned(8)));
3992 U4 originx1 = __LINE__;
3993 U4 originx2 = __LINE__;
3994 U4 originx3 = __LINE__;
3995 U4 originy = __LINE__;
3996 __msan_poison(x, sizeof(x));
3997 __msan_set_origin(x, 4, originx1);
3998 __msan_set_origin(x + 4, 4, originx2);
3999 __msan_set_origin(x + 8, 4, originx3);
4000 __msan_poison(((char *)&y) + 1, 1);
4001 __msan_poison(((char *)&y) + 7, 1);
4002 __msan_set_origin(&y, sizeof(y), originy);
4004 __sanitizer_unaligned_store64(x + 2, y);
4005 EXPECT_POISONED_O(x[0], originy);
4006 EXPECT_POISONED_O(x[1], originy);
4007 EXPECT_NOT_POISONED(x[2]);
4008 EXPECT_POISONED_O(x[3], originy);
4010 EXPECT_NOT_POISONED(x[4]);
4011 EXPECT_NOT_POISONED(x[5]);
4012 EXPECT_NOT_POISONED(x[6]);
4013 EXPECT_NOT_POISONED(x[7]);
4015 EXPECT_NOT_POISONED(x[8]);
4016 EXPECT_POISONED_O(x[9], originy);
4017 EXPECT_POISONED_O(x[10], originy);
4018 EXPECT_POISONED_O(x[11], originy);
4021 TEST(MemorySanitizer, UnalignedStore64_precise2) {
4022 char x[12] __attribute__((aligned(8)));
4024 U4 originx1 = __LINE__;
4025 U4 originx2 = __LINE__;
4026 U4 originx3 = __LINE__;
4027 U4 originy = __LINE__;
4028 __msan_poison(x, sizeof(x));
4029 __msan_set_origin(x, 4, originx1);
4030 __msan_set_origin(x + 4, 4, originx2);
4031 __msan_set_origin(x + 8, 4, originx3);
4032 __msan_poison(((char *)&y) + 3, 3);
4033 __msan_set_origin(&y, sizeof(y), originy);
4035 __sanitizer_unaligned_store64(x + 2, y);
4036 EXPECT_POISONED_O(x[0], originx1);
4037 EXPECT_POISONED_O(x[1], originx1);
4038 EXPECT_NOT_POISONED(x[2]);
4039 EXPECT_NOT_POISONED(x[3]);
4041 EXPECT_NOT_POISONED(x[4]);
4042 EXPECT_POISONED_O(x[5], originy);
4043 EXPECT_POISONED_O(x[6], originy);
4044 EXPECT_POISONED_O(x[7], originy);
4046 EXPECT_NOT_POISONED(x[8]);
4047 EXPECT_NOT_POISONED(x[9]);
4048 EXPECT_POISONED_O(x[10], originx3);
4049 EXPECT_POISONED_O(x[11], originx3);
4052 #if (defined(__x86_64__) && defined(__clang__))
4054 typedef U1 V16x8 __attribute__((__vector_size__(16)));
4055 typedef U2 V8x16 __attribute__((__vector_size__(16)));
4056 typedef U4 V4x32 __attribute__((__vector_size__(16)));
4057 typedef U8 V2x64 __attribute__((__vector_size__(16)));
4058 typedef U4 V8x32 __attribute__((__vector_size__(32)));
4059 typedef U8 V4x64 __attribute__((__vector_size__(32)));
4060 typedef U4 V2x32 __attribute__((__vector_size__(8)));
4061 typedef U2 V4x16 __attribute__((__vector_size__(8)));
4062 typedef U1 V8x8 __attribute__((__vector_size__(8)));
4064 V8x16 shift_sse2_left_scalar(V8x16 x, U4 y) {
4065 return _mm_slli_epi16(x, y);
4068 V8x16 shift_sse2_left(V8x16 x, V8x16 y) {
4069 return _mm_sll_epi16(x, y);
4072 TEST(VectorShiftTest, sse2_left_scalar) {
4073 V8x16 v = {Poisoned<U2>(0, 3), Poisoned<U2>(0, 7), 2, 3, 4, 5, 6, 7};
4074 V8x16 u = shift_sse2_left_scalar(v, 2);
4075 EXPECT_POISONED(u[0]);
4076 EXPECT_POISONED(u[1]);
4077 EXPECT_NOT_POISONED(u[0] | (3U << 2));
4078 EXPECT_NOT_POISONED(u[1] | (7U << 2));
4080 EXPECT_NOT_POISONED(u);
4083 TEST(VectorShiftTest, sse2_left_scalar_by_uninit) {
4084 V8x16 v = {0, 1, 2, 3, 4, 5, 6, 7};
4085 V8x16 u = shift_sse2_left_scalar(v, Poisoned<U4>());
4086 EXPECT_POISONED(u[0]);
4087 EXPECT_POISONED(u[1]);
4088 EXPECT_POISONED(u[2]);
4089 EXPECT_POISONED(u[3]);
4090 EXPECT_POISONED(u[4]);
4091 EXPECT_POISONED(u[5]);
4092 EXPECT_POISONED(u[6]);
4093 EXPECT_POISONED(u[7]);
4096 TEST(VectorShiftTest, sse2_left) {
4097 V8x16 v = {Poisoned<U2>(0, 3), Poisoned<U2>(0, 7), 2, 3, 4, 5, 6, 7};
4098 // Top 64 bits of shift count don't affect the result.
4099 V2x64 s = {2, Poisoned<U8>()};
4100 V8x16 u = shift_sse2_left(v, s);
4101 EXPECT_POISONED(u[0]);
4102 EXPECT_POISONED(u[1]);
4103 EXPECT_NOT_POISONED(u[0] | (3U << 2));
4104 EXPECT_NOT_POISONED(u[1] | (7U << 2));
4106 EXPECT_NOT_POISONED(u);
4109 TEST(VectorShiftTest, sse2_left_by_uninit) {
4110 V8x16 v = {Poisoned<U2>(0, 3), Poisoned<U2>(0, 7), 2, 3, 4, 5, 6, 7};
4111 V2x64 s = {Poisoned<U8>(), Poisoned<U8>()};
4112 V8x16 u = shift_sse2_left(v, s);
4113 EXPECT_POISONED(u[0]);
4114 EXPECT_POISONED(u[1]);
4115 EXPECT_POISONED(u[2]);
4116 EXPECT_POISONED(u[3]);
4117 EXPECT_POISONED(u[4]);
4118 EXPECT_POISONED(u[5]);
4119 EXPECT_POISONED(u[6]);
4120 EXPECT_POISONED(u[7]);
4124 V4x32 shift_avx2_left(V4x32 x, V4x32 y) {
4125 return _mm_sllv_epi32(x, y);
4127 // This is variable vector shift that's only available starting with AVX2.
4128 // V4x32 shift_avx2_left(V4x32 x, V4x32 y) {
4129 TEST(VectorShiftTest, avx2_left) {
4130 V4x32 v = {Poisoned<U2>(0, 3), Poisoned<U2>(0, 7), 2, 3};
4131 V4x32 s = {2, Poisoned<U4>(), 3, Poisoned<U4>()};
4132 V4x32 u = shift_avx2_left(v, s);
4133 EXPECT_POISONED(u[0]);
4134 EXPECT_NOT_POISONED(u[0] | (~7U));
4135 EXPECT_POISONED(u[1]);
4136 EXPECT_POISONED(u[1] | (~31U));
4137 EXPECT_NOT_POISONED(u[2]);
4138 EXPECT_POISONED(u[3]);
4139 EXPECT_POISONED(u[3] | (~31U));
4144 TEST(VectorPackTest, sse2_packssdw_128) {
4145 const unsigned S2_max = (1 << 15) - 1;
4146 V4x32 a = {Poisoned<U4>(0, 0xFF0000), Poisoned<U4>(0, 0xFFFF0000),
4148 V4x32 b = {Poisoned<U4>(0, 0xFF), S2_max + 10000, Poisoned<U4>(0, 0xFF00),
4151 V8x16 c = _mm_packs_epi32(a, b);
4153 EXPECT_POISONED(c[0]);
4154 EXPECT_POISONED(c[1]);
4155 EXPECT_NOT_POISONED(c[2]);
4156 EXPECT_NOT_POISONED(c[3]);
4157 EXPECT_POISONED(c[4]);
4158 EXPECT_NOT_POISONED(c[5]);
4159 EXPECT_POISONED(c[6]);
4160 EXPECT_NOT_POISONED(c[7]);
4162 EXPECT_EQ(c[2], S2_max);
4164 EXPECT_EQ(c[5], S2_max);
4165 EXPECT_EQ(c[7], S2_max);
4168 TEST(VectorPackTest, mmx_packuswb) {
4169 const unsigned U1_max = (1 << 8) - 1;
4170 V4x16 a = {Poisoned<U2>(0, 0xFF00), Poisoned<U2>(0, 0xF000U), U1_max + 100,
4172 V4x16 b = {Poisoned<U2>(0, 0xFF), U1_max - 1, Poisoned<U2>(0, 0xF), U1_max};
4173 V8x8 c = _mm_packs_pu16(a, b);
4175 EXPECT_POISONED(c[0]);
4176 EXPECT_POISONED(c[1]);
4177 EXPECT_NOT_POISONED(c[2]);
4178 EXPECT_NOT_POISONED(c[3]);
4179 EXPECT_POISONED(c[4]);
4180 EXPECT_NOT_POISONED(c[5]);
4181 EXPECT_POISONED(c[6]);
4182 EXPECT_NOT_POISONED(c[7]);
4184 EXPECT_EQ(c[2], U1_max);
4186 EXPECT_EQ(c[5], U1_max - 1);
4187 EXPECT_EQ(c[7], U1_max);
4190 TEST(VectorSadTest, sse2_psad_bw) {
4191 V16x8 a = {Poisoned<U1>(), 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15};
4192 V16x8 b = {100, 101, 102, 103, 104, 105, 106, 107,
4193 108, 109, 110, 111, 112, 113, 114, 115};
4194 V2x64 c = _mm_sad_epu8(a, b);
4196 EXPECT_POISONED(c[0]);
4197 EXPECT_NOT_POISONED(c[1]);
4199 EXPECT_EQ(800U, c[1]);
4202 TEST(VectorMaddTest, mmx_pmadd_wd) {
4203 V4x16 a = {Poisoned<U2>(), 1, 2, 3};
4204 V4x16 b = {100, 101, 102, 103};
4205 V2x32 c = _mm_madd_pi16(a, b);
4207 EXPECT_POISONED(c[0]);
4208 EXPECT_NOT_POISONED(c[1]);
4210 EXPECT_EQ((unsigned)(2 * 102 + 3 * 103), c[1]);
4213 TEST(VectorCmpTest, mm_cmpneq_ps) {
4215 c = _mm_cmpneq_ps(V4x32{Poisoned<U4>(), 1, 2, 3}, V4x32{4, 5, Poisoned<U4>(), 6});
4216 EXPECT_POISONED(c[0]);
4217 EXPECT_NOT_POISONED(c[1]);
4218 EXPECT_POISONED(c[2]);
4219 EXPECT_NOT_POISONED(c[3]);
4221 c = _mm_cmpneq_ps(V4x32{0, 1, 2, 3}, V4x32{4, 5, 6, 7});
4222 EXPECT_NOT_POISONED(c);
4225 TEST(VectorCmpTest, mm_cmpneq_sd) {
4227 c = _mm_cmpneq_sd(V2x64{Poisoned<U8>(), 1}, V2x64{2, 3});
4228 EXPECT_POISONED(c[0]);
4229 c = _mm_cmpneq_sd(V2x64{1, 2}, V2x64{Poisoned<U8>(), 3});
4230 EXPECT_POISONED(c[0]);
4231 c = _mm_cmpneq_sd(V2x64{1, 2}, V2x64{3, 4});
4232 EXPECT_NOT_POISONED(c[0]);
4233 c = _mm_cmpneq_sd(V2x64{1, Poisoned<U8>()}, V2x64{2, Poisoned<U8>()});
4234 EXPECT_NOT_POISONED(c[0]);
4235 c = _mm_cmpneq_sd(V2x64{1, Poisoned<U8>()}, V2x64{1, Poisoned<U8>()});
4236 EXPECT_NOT_POISONED(c[0]);
4239 TEST(VectorCmpTest, builtin_ia32_ucomisdlt) {
4241 c = __builtin_ia32_ucomisdlt(V2x64{Poisoned<U8>(), 1}, V2x64{2, 3});
4243 c = __builtin_ia32_ucomisdlt(V2x64{1, 2}, V2x64{Poisoned<U8>(), 3});
4245 c = __builtin_ia32_ucomisdlt(V2x64{1, 2}, V2x64{3, 4});
4246 EXPECT_NOT_POISONED(c);
4247 c = __builtin_ia32_ucomisdlt(V2x64{1, Poisoned<U8>()}, V2x64{2, Poisoned<U8>()});
4248 EXPECT_NOT_POISONED(c);
4249 c = __builtin_ia32_ucomisdlt(V2x64{1, Poisoned<U8>()}, V2x64{1, Poisoned<U8>()});
4250 EXPECT_NOT_POISONED(c);
4253 #endif // defined(__x86_64__) && defined(__clang__)
4255 TEST(MemorySanitizerOrigins, SetGet) {
4256 EXPECT_EQ(TrackingOrigins(), !!__msan_get_track_origins());
4257 if (!TrackingOrigins()) return;
4259 __msan_set_origin(&x, sizeof(x), 1234);
4260 EXPECT_ORIGIN(1234U, __msan_get_origin(&x));
4261 __msan_set_origin(&x, sizeof(x), 5678);
4262 EXPECT_ORIGIN(5678U, __msan_get_origin(&x));
4263 __msan_set_origin(&x, sizeof(x), 0);
4264 EXPECT_ORIGIN(0U, __msan_get_origin(&x));
4274 TEST(MemorySanitizerOrigins, InitializedStoreDoesNotChangeOrigin) {
4275 if (!TrackingOrigins()) return;
4278 U4 origin = rand(); // NOLINT
4279 s.a = *GetPoisonedO<U2>(0, origin);
4280 EXPECT_ORIGIN(origin, __msan_get_origin(&s.a));
4281 EXPECT_ORIGIN(origin, __msan_get_origin(&s.b));
4284 EXPECT_ORIGIN(origin, __msan_get_origin(&s.a));
4285 EXPECT_ORIGIN(origin, __msan_get_origin(&s.b));
4289 template<class T, class BinaryOp>
4291 void BinaryOpOriginTest(BinaryOp op) {
4292 U4 ox = rand(); //NOLINT
4293 U4 oy = rand(); //NOLINT
4294 T *x = GetPoisonedO<T>(0, ox, 0);
4295 T *y = GetPoisonedO<T>(1, oy, 0);
4296 T *z = GetPoisonedO<T>(2, 0, 0);
4299 U4 origin = __msan_get_origin(z);
4300 EXPECT_POISONED_O(*z, origin);
4301 EXPECT_EQ(true, __msan_origin_is_descendant_or_same(origin, ox) ||
4302 __msan_origin_is_descendant_or_same(origin, oy));
4304 // y is poisoned, x is not.
4306 *y = *GetPoisonedO<T>(1, oy);
4307 break_optimization(x);
4308 __msan_set_origin(z, sizeof(*z), 0);
4310 EXPECT_POISONED_O(*z, oy);
4311 EXPECT_ORIGIN(oy, __msan_get_origin(z));
4313 // x is poisoned, y is not.
4314 *x = *GetPoisonedO<T>(0, ox);
4316 break_optimization(y);
4317 __msan_set_origin(z, sizeof(*z), 0);
4319 EXPECT_POISONED_O(*z, ox);
4320 EXPECT_ORIGIN(ox, __msan_get_origin(z));
4323 template<class T> INLINE T XOR(const T &a, const T&b) { return a ^ b; }
4324 template<class T> INLINE T ADD(const T &a, const T&b) { return a + b; }
4325 template<class T> INLINE T SUB(const T &a, const T&b) { return a - b; }
4326 template<class T> INLINE T MUL(const T &a, const T&b) { return a * b; }
4327 template<class T> INLINE T AND(const T &a, const T&b) { return a & b; }
4328 template<class T> INLINE T OR (const T &a, const T&b) { return a | b; }
4330 TEST(MemorySanitizerOrigins, BinaryOp) {
4331 if (!TrackingOrigins()) return;
4332 BinaryOpOriginTest<S8>(XOR<S8>);
4333 BinaryOpOriginTest<U8>(ADD<U8>);
4334 BinaryOpOriginTest<S4>(SUB<S4>);
4335 BinaryOpOriginTest<S4>(MUL<S4>);
4336 BinaryOpOriginTest<U4>(OR<U4>);
4337 BinaryOpOriginTest<U4>(AND<U4>);
4338 BinaryOpOriginTest<double>(ADD<U4>);
4339 BinaryOpOriginTest<float>(ADD<S4>);
4340 BinaryOpOriginTest<double>(ADD<double>);
4341 BinaryOpOriginTest<float>(ADD<double>);
4344 TEST(MemorySanitizerOrigins, Unary) {
4345 if (!TrackingOrigins()) return;
4346 EXPECT_POISONED_O(*GetPoisonedO<S8>(0, __LINE__), __LINE__);
4347 EXPECT_POISONED_O(*GetPoisonedO<S8>(0, __LINE__), __LINE__);
4348 EXPECT_POISONED_O(*GetPoisonedO<S8>(0, __LINE__), __LINE__);
4349 EXPECT_POISONED_O(*GetPoisonedO<S8>(0, __LINE__), __LINE__);
4351 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4352 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4353 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4354 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4356 EXPECT_POISONED_O(*GetPoisonedO<U4>(0, __LINE__), __LINE__);
4357 EXPECT_POISONED_O(*GetPoisonedO<U4>(0, __LINE__), __LINE__);
4358 EXPECT_POISONED_O(*GetPoisonedO<U4>(0, __LINE__), __LINE__);
4359 EXPECT_POISONED_O(*GetPoisonedO<U4>(0, __LINE__), __LINE__);
4361 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4362 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4363 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4364 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4366 EXPECT_POISONED_O((void*)*GetPoisonedO<S8>(0, __LINE__), __LINE__);
4367 EXPECT_POISONED_O((U8)*GetPoisonedO<void*>(0, __LINE__), __LINE__);
4370 TEST(MemorySanitizerOrigins, EQ) {
4371 if (!TrackingOrigins()) return;
4372 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__) <= 11, __LINE__);
4373 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__) == 11, __LINE__);
4374 EXPECT_POISONED_O(*GetPoisonedO<float>(0, __LINE__) == 1.1, __LINE__);
4377 TEST(MemorySanitizerOrigins, DIV) {
4378 if (!TrackingOrigins()) return;
4379 EXPECT_POISONED_O(*GetPoisonedO<U8>(0, __LINE__) / 100, __LINE__);
4380 unsigned o = __LINE__;
4381 EXPECT_UMR_O(volatile unsigned y = 100 / *GetPoisonedO<S4>(0, o, 1), o);
4384 TEST(MemorySanitizerOrigins, SHIFT) {
4385 if (!TrackingOrigins()) return;
4386 EXPECT_POISONED_O(*GetPoisonedO<U8>(0, __LINE__) >> 10, __LINE__);
4387 EXPECT_POISONED_O(*GetPoisonedO<S8>(0, __LINE__) >> 10, __LINE__);
4388 EXPECT_POISONED_O(*GetPoisonedO<S8>(0, __LINE__) << 10, __LINE__);
4389 EXPECT_POISONED_O(10U << *GetPoisonedO<U8>(0, __LINE__), __LINE__);
4390 EXPECT_POISONED_O(-10 >> *GetPoisonedO<S8>(0, __LINE__), __LINE__);
4391 EXPECT_POISONED_O(-10 << *GetPoisonedO<S8>(0, __LINE__), __LINE__);
4394 template<class T, int N>
4401 __msan_poison(x, N * sizeof(T));
4402 __msan_set_origin(x, N * sizeof(T), ox);
4403 __msan_set_origin(y, N * sizeof(T), 777777);
4404 __msan_set_origin(z, N * sizeof(T), 888888);
4405 EXPECT_NOT_POISONED(x);
4406 memcpy(y, x, N * sizeof(T));
4407 EXPECT_POISONED_O(y[0], ox);
4408 EXPECT_POISONED_O(y[N/2], ox);
4409 EXPECT_POISONED_O(y[N-1], ox);
4410 EXPECT_NOT_POISONED(x);
4411 #if !defined(__NetBSD__)
4412 void *res = mempcpy(q, x, N * sizeof(T));
4413 ASSERT_EQ(q + N, res);
4414 EXPECT_POISONED_O(q[0], ox);
4415 EXPECT_POISONED_O(q[N/2], ox);
4416 EXPECT_POISONED_O(q[N-1], ox);
4417 EXPECT_NOT_POISONED(x);
4419 memmove(z, x, N * sizeof(T));
4420 EXPECT_POISONED_O(z[0], ox);
4421 EXPECT_POISONED_O(z[N/2], ox);
4422 EXPECT_POISONED_O(z[N-1], ox);
4425 TEST(MemorySanitizerOrigins, LargeMemCpy) {
4426 if (!TrackingOrigins()) return;
4427 MemCpyTest<U1, 10000>();
4428 MemCpyTest<U8, 10000>();
4431 TEST(MemorySanitizerOrigins, SmallMemCpy) {
4432 if (!TrackingOrigins()) return;
4433 MemCpyTest<U8, 1>();
4434 MemCpyTest<U8, 2>();
4435 MemCpyTest<U8, 3>();
4438 TEST(MemorySanitizerOrigins, Select) {
4439 if (!TrackingOrigins()) return;
4440 EXPECT_NOT_POISONED(g_one ? 1 : *GetPoisonedO<S4>(0, __LINE__));
4441 EXPECT_POISONED_O(*GetPoisonedO<S4>(0, __LINE__), __LINE__);
4443 break_optimization(&x);
4444 x = g_1 ? *GetPoisonedO<S4>(0, __LINE__) : 0;
4446 EXPECT_POISONED_O(g_1 ? *GetPoisonedO<S4>(0, __LINE__) : 1, __LINE__);
4447 EXPECT_POISONED_O(g_0 ? 1 : *GetPoisonedO<S4>(0, __LINE__), __LINE__);
4450 NOINLINE int RetvalOriginTest(U4 origin) {
4452 break_optimization(a);
4453 __msan_set_origin(a, sizeof(*a), origin);
4459 TEST(MemorySanitizerOrigins, Retval) {
4460 if (!TrackingOrigins()) return;
4461 EXPECT_POISONED_O(RetvalOriginTest(__LINE__), __LINE__);
4464 NOINLINE void ParamOriginTest(int param, U4 origin) {
4465 EXPECT_POISONED_O(param, origin);
4468 TEST(MemorySanitizerOrigins, Param) {
4469 if (!TrackingOrigins()) return;
4471 U4 origin = __LINE__;
4472 break_optimization(a);
4473 __msan_set_origin(a, sizeof(*a), origin);
4474 ParamOriginTest(*a, origin);
4478 TEST(MemorySanitizerOrigins, Invoke) {
4479 if (!TrackingOrigins()) return;
4480 StructWithDtor s; // Will cause the calls to become invokes.
4481 EXPECT_POISONED_O(RetvalOriginTest(__LINE__), __LINE__);
4484 TEST(MemorySanitizerOrigins, strlen) {
4486 break_optimization(&alignment);
4487 char x[4] = {'a', 'b', 0, 0};
4488 __msan_poison(&x[2], 1);
4489 U4 origin = __LINE__;
4490 __msan_set_origin(x, sizeof(x), origin);
4491 EXPECT_UMR_O(volatile unsigned y = strlen(x), origin);
4494 TEST(MemorySanitizerOrigins, wcslen) {
4495 wchar_t w[3] = {'a', 'b', 0};
4496 U4 origin = __LINE__;
4497 __msan_set_origin(w, sizeof(w), origin);
4498 __msan_poison(&w[2], sizeof(wchar_t));
4499 EXPECT_UMR_O(volatile unsigned y = wcslen(w), origin);
4503 TEST(MemorySanitizerOrigins, StoreIntrinsic) {
4505 U4 origin = __LINE__;
4506 __msan_set_origin(&x, sizeof(x), origin);
4507 __msan_poison(&x, sizeof(x));
4508 _mm_storeu_ps((float*)&y, x);
4509 EXPECT_POISONED_O(y, origin);
4513 NOINLINE void RecursiveMalloc(int depth) {
4516 if ((count % (1024 * 1024)) == 0)
4517 printf("RecursiveMalloc: %d\n", count);
4520 break_optimization(x1);
4521 break_optimization(x2);
4523 RecursiveMalloc(depth-1);
4524 RecursiveMalloc(depth-1);
4530 TEST(MemorySanitizer, Select) {
4532 int volatile* p = &x;
4537 TEST(MemorySanitizer, SelectPartial) {
4538 // Precise instrumentation of select.
4539 // Some bits of the result do not depend on select condition, and must stay
4540 // initialized even if select condition is not. These are the bits that are
4541 // equal and initialized in both left and right select arguments.
4543 U4 x_s = 0xFFFF0000U;
4544 __msan_partial_poison(&x, &x_s, sizeof(x));
4547 __msan_poison(&cond, sizeof(cond));
4548 U4 z = cond ? x : y;
4549 __msan_print_shadow(&z, sizeof(z));
4550 EXPECT_POISONED(z & 0xFFU);
4551 EXPECT_NOT_POISONED(z & 0xFF00U);
4552 EXPECT_POISONED(z & 0xFF0000U);
4553 EXPECT_POISONED(z & 0xFF000000U);
4554 EXPECT_EQ(0xAB00U, z & 0xFF00U);
4557 TEST(MemorySanitizerStress, DISABLED_MallocStackTrace) {
4558 RecursiveMalloc(22);
4561 TEST(MemorySanitizerAllocator, get_estimated_allocated_size) {
4562 size_t sizes[] = {0, 20, 5000, 1<<20};
4563 for (size_t i = 0; i < sizeof(sizes) / sizeof(*sizes); ++i) {
4564 size_t alloc_size = __sanitizer_get_estimated_allocated_size(sizes[i]);
4565 EXPECT_EQ(alloc_size, sizes[i]);
4569 TEST(MemorySanitizerAllocator, get_allocated_size_and_ownership) {
4570 char *array = reinterpret_cast<char*>(malloc(100));
4571 int *int_ptr = new int;
4573 EXPECT_TRUE(__sanitizer_get_ownership(array));
4574 EXPECT_EQ(100U, __sanitizer_get_allocated_size(array));
4576 EXPECT_TRUE(__sanitizer_get_ownership(int_ptr));
4577 EXPECT_EQ(sizeof(*int_ptr), __sanitizer_get_allocated_size(int_ptr));
4579 void *wild_addr = reinterpret_cast<void*>(0x1);
4580 EXPECT_FALSE(__sanitizer_get_ownership(wild_addr));
4581 EXPECT_EQ(0U, __sanitizer_get_allocated_size(wild_addr));
4583 EXPECT_FALSE(__sanitizer_get_ownership(array + 50));
4584 EXPECT_EQ(0U, __sanitizer_get_allocated_size(array + 50));
4586 // NULL is a valid argument for GetAllocatedSize but is not owned.
4587 EXPECT_FALSE(__sanitizer_get_ownership(NULL));
4588 EXPECT_EQ(0U, __sanitizer_get_allocated_size(NULL));
4591 EXPECT_FALSE(__sanitizer_get_ownership(array));
4592 EXPECT_EQ(0U, __sanitizer_get_allocated_size(array));
4597 TEST(MemorySanitizer, MlockTest) {
4598 EXPECT_EQ(0, mlockall(MCL_CURRENT));
4599 EXPECT_EQ(0, mlock((void*)0x12345, 0x5678));
4600 EXPECT_EQ(0, munlockall());
4601 EXPECT_EQ(0, munlock((void*)0x987, 0x654));
4604 // Test that LargeAllocator unpoisons memory before releasing it to the OS.
4605 TEST(MemorySanitizer, LargeAllocatorUnpoisonsOnFree) {
4606 void *p = malloc(1024 * 1024);
4609 typedef void *(*mmap_fn)(void *, size_t, int, int, int, off_t);
4610 mmap_fn real_mmap = (mmap_fn)dlsym(RTLD_NEXT, "mmap");
4612 // Allocate the page that was released to the OS in free() with the real mmap,
4613 // bypassing the interceptor.
4614 char *q = (char *)real_mmap(p, 4096, PROT_READ | PROT_WRITE,
4615 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
4616 ASSERT_NE((char *)0, q);
4618 ASSERT_TRUE(q <= p);
4619 ASSERT_TRUE(q + 4096 > p);
4621 EXPECT_NOT_POISONED(q[0]);
4622 EXPECT_NOT_POISONED(q[10]);
4623 EXPECT_NOT_POISONED(q[100]);
4628 #if SANITIZER_TEST_HAS_MALLOC_USABLE_SIZE
4629 TEST(MemorySanitizer, MallocUsableSizeTest) {
4630 const size_t kArraySize = 100;
4631 char *array = Ident((char*)malloc(kArraySize));
4632 int *int_ptr = Ident(new int);
4633 EXPECT_EQ(0U, malloc_usable_size(NULL));
4634 EXPECT_EQ(kArraySize, malloc_usable_size(array));
4635 EXPECT_EQ(sizeof(int), malloc_usable_size(int_ptr));
4639 #endif // SANITIZER_TEST_HAS_MALLOC_USABLE_SIZE