Home | History | Annotate | Download | only in lit_tests
      1 // RUN: %clangxx_msan -m64 -O0 %s -o %t && %t
      2 
      3 #include <sys/types.h>
      4 #include <sys/socket.h>
      5 #include <netdb.h>
      6 #include <stdlib.h>
      7 
      8 void poison_stack_ahead() {
      9   char buf[100000];
     10   // With -O0 this poisons a large chunk of stack.
     11 }
     12 
     13 int main(void) {
     14   poison_stack_ahead();
     15 
     16   struct addrinfo *ai;
     17 
     18   // This should trigger loading of libnss_dns and friends.
     19   // Those libraries are typically uninstrumented.They will call strlen() on a
     20   // stack-allocated buffer, which is very likely to be poisoned. Test that we
     21   // don't report this as an UMR.
     22   int res = getaddrinfo("not-in-etc-hosts", NULL, NULL, &ai);
     23   return 0;
     24 }
     25