1 // RUN: %clangxx_msan -m64 -O0 %s -o %t && %run %t >%t.out 2>&1
2 // RUN: %clangxx_msan -m64 -O1 %s -o %t && not %run %t >%t.out 2>&1
3 // RUN: FileCheck %s < %t.out
4 // RUN: %clangxx_msan -m64 -O2 %s -o %t && not %run %t >%t.out 2>&1
5 // RUN: FileCheck %s < %t.out
6 // RUN: %clangxx_msan -m64 -O3 %s -o %t && not %run %t >%t.out 2>&1
7 // RUN: FileCheck %s < %t.out
9 // Test that (no_sanitize_memory) functions propagate shadow.
11 // Note that at -O0 there is no report, because 'x' in 'f' is spilled to the
12 // stack, and then loaded back as a fully initialiazed value (due to
13 // no_sanitize_memory attribute).
18 __attribute__((noinline
))
19 __attribute__((no_sanitize_memory
))
26 int * volatile p
= &x
;
28 // CHECK: WARNING: MemorySanitizer: use-of-uninitialized-value
29 // CHECK: {{#0 0x.* in main .*no_sanitize_memory_prop.cc:}}[[@LINE+1]]