1 // RUN: %clangxx_msan -DPRE1 -O0 %s -o %t && not %run %t 2>&1
2 // RUN: %clangxx_msan -DPRE2 -O0 %s -o %t && not %run %t 2>&1
3 // RUN: %clangxx_msan -DPRE3 -O0 %s -o %t && not %run %t 2>&1
4 // RUN: %clangxx_msan -O0 %s -o %t && %run %t 2>&1
5 
6 #include <assert.h>
7 #include <signal.h>
8 #include <string.h>
9 
10 #include <sanitizer/linux_syscall_hooks.h>
11 #include <sanitizer/msan_interface.h>
12 
13 struct my_kernel_sigaction {
14 #if defined(__mips__)
15   long flags, handler;
16 #else
17   long handler, flags, restorer;
18 #endif
19   uint64_t mask[20]; // larger than any known platform
20 };
21 
main()22 int main() {
23   my_kernel_sigaction act = {}, oldact = {};
24 
25 #if defined(PRE1)
26   __msan_poison(&act.handler, sizeof(act.handler));
27   __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
28 #elif defined(PRE2)
29   __msan_poison(&act.flags, sizeof(act.flags));
30   __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
31 #elif defined(PRE3)
32   __msan_poison(&act.mask, 1);
33   __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 20 * 8);
34 #else
35   // Uninit past the end of the mask is ignored.
36   __msan_poison(((char *)&act.mask) + 5, 1);
37   __sanitizer_syscall_pre_rt_sigaction(SIGUSR1, &act, &oldact, 5);
38 
39   memset(&act, 0, sizeof(act));
40   __msan_poison(&oldact, sizeof(oldact));
41   __sanitizer_syscall_post_rt_sigaction(0, SIGUSR1, &act, &oldact, 5);
42 #if defined(__mips__)
43   assert(__msan_test_shadow(&oldact, sizeof(oldact)) == sizeof(long)*2 + 5);
44 #else
45   assert(__msan_test_shadow(&oldact, sizeof(oldact)) == sizeof(long)*3 + 5);
46 #endif
47 #endif
48 }
49