1; Test asan internal compiler flags: 2; -asan-instrument-dynamic-allocas 3 4; RUN: opt < %s -asan -asan-module -enable-new-pm=0 -asan-instrument-dynamic-allocas -S | FileCheck %s --check-prefix=CHECK-ALLOCA 5; RUN: opt < %s -passes='asan-pipeline' -asan-instrument-dynamic-allocas -S | FileCheck %s --check-prefix=CHECK-ALLOCA 6target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64" 7target triple = "x86_64-unknown-linux-gnu" 8 9define void @foo(i32 %len) sanitize_address { 10entry: 11; CHECK-ALLOCA-LABEL: define void @foo 12; CHECK-ALLOCA: __asan_alloca_poison 13; CHECK-ALLOCA: __asan_allocas_unpoison 14; CHECK-ALLOCA: ret void 15 %0 = alloca i32, align 4 16 %1 = alloca i8* 17 store volatile i32 %len, i32* %0, align 4 18 %2 = load i32, i32* %0, align 4 19 %3 = zext i32 %2 to i64 20 %4 = alloca i8, i64 %3, align 32 21 store volatile i8 0, i8* %4 22 ret void 23} 24 25; Test that dynamic alloca is not used for inalloca variables. 26define void @has_inalloca() uwtable sanitize_address { 27; CHECK-ALLOCA-LABEL: define void @has_inalloca 28; CHECK-ALLOCA-NOT: __asan_alloca_poison 29; CHECK-ALLOCA-NOT: __asan_alloca_unpoison 30; CHECK-ALLOCA: ret void 31entry: 32 %t = alloca inalloca i32 33 store i32 42, i32* %t 34 call void @pass_inalloca(i32* inalloca %t) 35 ret void 36} 37 38declare void @pass_inalloca(i32* inalloca) 39