unpoison_param.cpp
1.47 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
// Tests that __msan_unpoison_param() works as specified. To prevent MSan
// instrumentation from modifying parameter shadow before each call to foo(), we
// compile main() without MSan.
// RUN: %clangxx_msan -fno-sanitize=memory -c %s -o %t-main.o
// RUN: %clangxx_msan %t-main.o %s -o %t
// RUN: %run %t
#include <assert.h>
#include <sanitizer/msan_interface.h>
#if __has_feature(memory_sanitizer)
__attribute__((noinline)) int bar(int a, int b) {
volatile int zero = 0;
return zero;
}
int foo(int a, int b, int unpoisoned_params) {
if (unpoisoned_params == 0) {
assert(__msan_test_shadow(&a, sizeof(a)) == 0);
assert(__msan_test_shadow(&b, sizeof(b)) == 0);
} else if (unpoisoned_params == 1) {
assert(__msan_test_shadow(&a, sizeof(a)) == -1);
assert(__msan_test_shadow(&b, sizeof(b)) == 0);
} else if (unpoisoned_params == 2) {
assert(__msan_test_shadow(&a, sizeof(a)) == -1);
assert(__msan_test_shadow(&b, sizeof(b)) == -1);
}
// Poisons parameter shadow in TLS so that the next call from uninstrumented
// main has params 1 and 2 poisoned no matter what.
int x, y;
return bar(x, y);
}
#else
int foo(int, int, int);
int main() {
foo(0, 0, 2); // Poison parameters for next call.
foo(0, 0, 0); // Check that both params are poisoned.
__msan_unpoison_param(1);
foo(0, 0, 1); // Check that only first param is unpoisoned.
__msan_unpoison_param(2);
foo(0, 0, 2); // Check that first and second params are unpoisoned.
return 0;
}
#endif