diff options
author | Evgeniy Stepanov <eugeni.stepanov@gmail.com> | 2014-07-03 11:56:30 +0000 |
---|---|---|
committer | Evgeniy Stepanov <eugeni.stepanov@gmail.com> | 2014-07-03 11:56:30 +0000 |
commit | d0303aab2e9a9d65542d7964c4a6cee416c83fc3 (patch) | |
tree | ba099f0a96b9950b8bb1e7cc04b7616889cce0b3 /test/msan | |
parent | c3c39843d38a41b90a12c3e1787007528bd178b3 (diff) |
[msan] Stop propagating shadow in blacklisted functions.
With this change all values passed through blacklisted functions
become fully initialized. Previous behavior was to initialize all
loads in blacklisted functions, but apply normal shadow propagation
logic for all other operation.
This makes blacklist applicable in a wider range of situations.
It also makes code for blacklisted functions a lot shorter, which
works as yet another workaround for PR17409.
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@212268 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'test/msan')
-rw-r--r-- | test/msan/no_sanitize_memory_prop.cc | 17 |
1 files changed, 4 insertions, 13 deletions
diff --git a/test/msan/no_sanitize_memory_prop.cc b/test/msan/no_sanitize_memory_prop.cc index b41e8a151..4275ebbf7 100644 --- a/test/msan/no_sanitize_memory_prop.cc +++ b/test/msan/no_sanitize_memory_prop.cc @@ -1,16 +1,9 @@ // RUN: %clangxx_msan -m64 -O0 %s -o %t && %run %t >%t.out 2>&1 -// RUN: %clangxx_msan -m64 -O1 %s -o %t && not %run %t >%t.out 2>&1 -// RUN: FileCheck %s < %t.out -// RUN: %clangxx_msan -m64 -O2 %s -o %t && not %run %t >%t.out 2>&1 -// RUN: FileCheck %s < %t.out -// RUN: %clangxx_msan -m64 -O3 %s -o %t && not %run %t >%t.out 2>&1 -// RUN: FileCheck %s < %t.out +// RUN: %clangxx_msan -m64 -O1 %s -o %t && %run %t >%t.out 2>&1 +// RUN: %clangxx_msan -m64 -O2 %s -o %t && %run %t >%t.out 2>&1 +// RUN: %clangxx_msan -m64 -O3 %s -o %t && %run %t >%t.out 2>&1 -// Test that (no_sanitize_memory) functions propagate shadow. - -// Note that at -O0 there is no report, because 'x' in 'f' is spilled to the -// stack, and then loaded back as a fully initialiazed value (due to -// no_sanitize_memory attribute). +// Test that (no_sanitize_memory) functions DO NOT propagate shadow. #include <stdlib.h> #include <stdio.h> @@ -25,8 +18,6 @@ int main(void) { int x; int * volatile p = &x; int y = f(*p); - // CHECK: WARNING: MemorySanitizer: use-of-uninitialized-value - // CHECK: {{#0 0x.* in main .*no_sanitize_memory_prop.cc:}}[[@LINE+1]] if (y) exit(0); return 0; |