Fix MemorySanitizer.ptrtoint test on big-endian targets.

llvm-svn: 260749
This commit is contained in:
Evgeniy Stepanov 2016-02-12 22:00:22 +00:00
parent 79a886be06
commit e1556e5dd5
1 changed files with 12 additions and 6 deletions

View File

@ -2389,13 +2389,19 @@ TEST(MemorySanitizer, Invoke) {
TEST(MemorySanitizer, ptrtoint) { TEST(MemorySanitizer, ptrtoint) {
// Test that shadow is propagated through pointer-to-integer conversion. // Test that shadow is propagated through pointer-to-integer conversion.
void* p = (void*)0xABCD; unsigned char c = 0;
__msan_poison(((char*)&p) + 1, sizeof(p)); __msan_poison(&c, 1);
EXPECT_NOT_POISONED((((uintptr_t)p) & 0xFF) == 0); uintptr_t u = (uintptr_t)c << 8;
EXPECT_NOT_POISONED(u & 0xFF00FF);
EXPECT_POISONED(u & 0xFF00);
void* q = (void*)0xABCD; break_optimization(&u);
__msan_poison(&q, sizeof(q) - 1); void* p = (void*)u;
EXPECT_POISONED((((uintptr_t)q) & 0xFF) == 0);
break_optimization(&p);
EXPECT_POISONED(p);
EXPECT_NOT_POISONED(((uintptr_t)p) & 0xFF00FF);
EXPECT_POISONED(((uintptr_t)p) & 0xFF00);
} }
static void vaargsfn2(int guard, ...) { static void vaargsfn2(int guard, ...) {