Home | History | Annotate | Download | only in AddressSanitizer
      1 ; This test checks that we are not instrumenting direct inbound stack accesses.
      2 ; RUN: opt < %s -asan -asan-module -asan-opt-stack -S | FileCheck %s
      3 ; RUN: opt < %s -asan -asan-module -asan-opt-stack -asan-mapping-scale=5 -S | FileCheck %s
      4 
      5 target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
      6 target triple = "x86_64-unknown-linux-gnu"
      7 
      8 ;@sink = global i32* null, align 4
      9 
     10 ; Ignore direct inbounds stack access.
     11 define void @foo() uwtable sanitize_address {
     12 entry:
     13   %a = alloca i32, align 4
     14   store i32 42, i32* %a, align 4
     15   ret void
     16 ; CHECK-LABEL: define void @foo
     17 ; CHECK-NOT: __asan_report
     18 ; CHECK: ret void
     19 }
     20 
     21 ; Don't ignore dynamic indexing.
     22 define void @baz(i64 %i) sanitize_address {
     23 entry:
     24   %a = alloca [10 x i32], align 4
     25   %e = getelementptr inbounds [10 x i32], [10 x i32]* %a, i32 0, i64 %i
     26   store i32 42, i32* %e, align 4
     27   ret void
     28 ; CHECK-LABEL: define void @baz
     29 ; CHECK: __asan_report
     30 ; CHECK: ret void
     31 }
     32 
     33 define void @bar() sanitize_address {
     34 entry:
     35   %a = alloca [10 x i32], align 4
     36   %e = getelementptr inbounds [10 x i32], [10 x i32]* %a, i32 0, i64 12
     37   store i32 42, i32* %e, align 4
     38   ret void
     39 ; CHECK-LABEL: define void @bar
     40 ; CHECK: __asan_report
     41 ; CHECK: ret void
     42 }
     43 
     44 define void @endoftests() sanitize_address {
     45 entry:
     46   ret void
     47 ; CHECK-LABEL: define void @endoftests
     48 }
     49 
     50