1// RUN: %clangxx_msan -O0 -g -DPOSITIVE %s -o %t
2// RUN: not %run %t 2>&1 | FileCheck %s
3// RUN: MSAN_OPTIONS=verbosity=1 not %run %t 2>&1 | \
4// RUN: FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-VERBOSE
5
6// RUN: %clangxx_msan -O0 -g %s -o %t && %run %t
7
8#include <sanitizer/msan_interface.h>
9
10int main(void) {
11 char p[32] = {};
12 __msan_poison(a: p + 10, size: 2);
13
14 __msan_check_mem_is_initialized(x: p, size: 10);
15 __msan_check_mem_is_initialized(x: p + 12, size: 30);
16#ifdef POSITIVE
17 __msan_check_mem_is_initialized(p + 5, 20);
18 // CHECK: Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside [0x{{.*}}, 20)
19 // CHECK-VERBOSE: Shadow map [0x{{.*}}, 0x{{.*}}) of [0x{{.*}}, 0x{{.*}}), 20 bytes:
20 // CHECK-VERBOSE: 0x{{.*}}: ..000000 0000ffff 00000000 00000000
21 // CHECK-VERBOSE: 0x{{.*}}: 00000000 00...... ........ ........
22
23 // CHECK: WARNING: MemorySanitizer: use-of-uninitialized-value
24 // CHECK: #0 0x{{.*}}in main{{.*}}msan_check_mem_is_initialized.cpp:[[@LINE-7]]
25#endif
26 return 0;
27}
28
29

source code of compiler-rt/test/msan/msan_check_mem_is_initialized.cpp