• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1; This test checks that we are not instrumenting direct inbound stack accesses.
2; RUN: opt < %s -asan -asan-module -asan-opt-stack -S | FileCheck %s
3
4target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
5target triple = "x86_64-unknown-linux-gnu"
6
7;@sink = global i32* null, align 4
8
9; Ignore direct inbounds stack access.
10define void @foo() uwtable sanitize_address {
11entry:
12  %a = alloca i32, align 4
13  store i32 42, i32* %a, align 4
14  ret void
15; CHECK-LABEL: define void @foo
16; CHECK-NOT: __asan_report
17; CHECK: ret void
18}
19
20; Don't ignore dynamic indexing.
21define void @baz(i64 %i) sanitize_address {
22entry:
23  %a = alloca [10 x i32], align 4
24  %e = getelementptr inbounds [10 x i32], [10 x i32]* %a, i32 0, i64 %i
25  store i32 42, i32* %e, align 4
26  ret void
27; CHECK-LABEL: define void @baz
28; CHECK: __asan_report
29; CHECK: ret void
30}
31
32define void @bar() sanitize_address {
33entry:
34  %a = alloca [10 x i32], align 4
35  %e = getelementptr inbounds [10 x i32], [10 x i32]* %a, i32 0, i64 12
36  store i32 42, i32* %e, align 4
37  ret void
38; CHECK-LABEL: define void @bar
39; CHECK: __asan_report
40; CHECK: ret void
41}
42
43define void @endoftests() sanitize_address {
44entry:
45  ret void
46; CHECK-LABEL: define void @endoftests
47}
48
49