1 ; This test checks that we are not instrumenting direct inbound stack accesses. 2 ; RUN: opt < %s -asan -asan-module -asan-opt-stack -S | FileCheck %s 3 ; RUN: opt < %s -asan -asan-module -asan-opt-stack -asan-mapping-scale=5 -S | FileCheck %s 4 5 target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128" 6 target triple = "x86_64-unknown-linux-gnu" 7 8 ;@sink = global i32* null, align 4 9 10 ; Ignore direct inbounds stack access. 11 define void @foo() uwtable sanitize_address { 12 entry: 13 %a = alloca i32, align 4 14 store i32 42, i32* %a, align 4 15 ret void 16 ; CHECK-LABEL: define void @foo 17 ; CHECK-NOT: __asan_report 18 ; CHECK: ret void 19 } 20 21 ; Don't ignore dynamic indexing. 22 define void @baz(i64 %i) sanitize_address { 23 entry: 24 %a = alloca [10 x i32], align 4 25 %e = getelementptr inbounds [10 x i32], [10 x i32]* %a, i32 0, i64 %i 26 store i32 42, i32* %e, align 4 27 ret void 28 ; CHECK-LABEL: define void @baz 29 ; CHECK: __asan_report 30 ; CHECK: ret void 31 } 32 33 define void @bar() sanitize_address { 34 entry: 35 %a = alloca [10 x i32], align 4 36 %e = getelementptr inbounds [10 x i32], [10 x i32]* %a, i32 0, i64 12 37 store i32 42, i32* %e, align 4 38 ret void 39 ; CHECK-LABEL: define void @bar 40 ; CHECK: __asan_report 41 ; CHECK: ret void 42 } 43 44 define void @endoftests() sanitize_address { 45 entry: 46 ret void 47 ; CHECK-LABEL: define void @endoftests 48 } 49 50