diff options
Diffstat (limited to 'llvm/test')
| -rw-r--r-- | llvm/test/Instrumentation/AddressSanitizer/stack_dynamic_alloca.ll | 42 | ||||
| -rw-r--r-- | llvm/test/Instrumentation/AddressSanitizer/stack_layout.ll | 20 |
2 files changed, 58 insertions, 4 deletions
diff --git a/llvm/test/Instrumentation/AddressSanitizer/stack_dynamic_alloca.ll b/llvm/test/Instrumentation/AddressSanitizer/stack_dynamic_alloca.ll new file mode 100644 index 00000000000..43711b7a1f2 --- /dev/null +++ b/llvm/test/Instrumentation/AddressSanitizer/stack_dynamic_alloca.ll @@ -0,0 +1,42 @@ +; RUN: opt < %s -asan -asan-module -asan-stack-dynamic-alloca \ +; RUN: -asan-use-after-return -S | FileCheck %s +target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128" +target triple = "x86_64-unknown-linux-gnu" + +define void @Func1() sanitize_address { +entry: +; CHECK-LABEL: Func1 + +; CHECK: entry: +; CHECK: load i32* @__asan_option_detect_stack_use_after_return + +; CHECK: <label>:[[UAR_ENABLED_BB:[0-9]+]] +; CHECK: [[FAKE_STACK_RT:%[0-9]+]] = call i64 @__asan_stack_malloc_ + +; CHECK: <label>:[[FAKE_STACK_BB:[0-9]+]] +; CHECK: [[FAKE_STACK:%[0-9]+]] = phi i64 [ 0, %entry ], [ [[FAKE_STACK_RT]], %[[UAR_ENABLED_BB]] ] +; CHECK: icmp eq i64 [[FAKE_STACK]], 0 + +; CHECK: <label>:[[NO_FAKE_STACK_BB:[0-9]+]] +; CHECK: %MyAlloca = alloca i8, i64 +; CHECK: [[ALLOCA:%[0-9]+]] = ptrtoint i8* %MyAlloca + +; CHECK: phi i64 [ [[FAKE_STACK]], %[[FAKE_STACK_BB]] ], [ [[ALLOCA]], %[[NO_FAKE_STACK_BB]] ] + +; CHECK: ret void + + %XXX = alloca [20 x i8], align 1 + ret void +} + +; Test that dynamic alloca is not used for functions with inline assembly. +define void @Func2() sanitize_address { +entry: +; CHECK-LABEL: Func2 +; CHECK: alloca [96 x i8] +; CHECK: ret void + + %XXX = alloca [20 x i8], align 1 + call void asm sideeffect "mov %%rbx, %%rcx", "~{dirflag},~{fpsr},~{flags}"() nounwind + ret void +} diff --git a/llvm/test/Instrumentation/AddressSanitizer/stack_layout.ll b/llvm/test/Instrumentation/AddressSanitizer/stack_layout.ll index c027acf3e4f..97e3bbb5872 100644 --- a/llvm/test/Instrumentation/AddressSanitizer/stack_layout.ll +++ b/llvm/test/Instrumentation/AddressSanitizer/stack_layout.ll @@ -1,6 +1,9 @@ ; Test the ASan's stack layout. ; More tests in tests/Transforms/Utils/ASanStackFrameLayoutTest.cpp -; RUN: opt < %s -asan -asan-module -S | FileCheck %s +; RUN: opt < %s -asan -asan-module -asan-stack-dynamic-alloca=0 -S \ +; RUN: | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-STATIC +; RUN: opt < %s -asan -asan-module -asan-stack-dynamic-alloca=1 -S \ +; RUN: | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-DYNAMIC target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128" target triple = "x86_64-unknown-linux-gnu" @@ -14,7 +17,10 @@ declare void @Use(i8*) define void @Func1() sanitize_address { entry: ; CHECK-LABEL: Func1 -; CHECK: alloca [192 x i8] + +; CHECK-STATIC: alloca [192 x i8] +; CHECK-DYNAMIC: alloca i8, i64 192 + ; CHECK-NOT: alloca ; CHECK: ret void %XXX = alloca [10 x i8], align 1 @@ -26,7 +32,10 @@ entry: define void @Func2() sanitize_address { entry: ; CHECK-LABEL: Func2 -; CHECK: alloca [864 x i8] + +; CHECK-STATIC: alloca [864 x i8] +; CHECK-DYNAMIC: alloca i8, i64 864 + ; CHECK-NOT: alloca ; CHECK: ret void %AAA = alloca [5 x i8], align 1 @@ -39,7 +48,10 @@ entry: define void @Func3() sanitize_address { entry: ; CHECK-LABEL: Func3 -; CHECK: alloca [768 x i8] + +; CHECK-STATIC: alloca [768 x i8] +; CHECK-DYNAMIC: alloca i8, i64 768 + ; CHECK-NOT: alloca ; CHECK: ret void %AAA = alloca [128 x i8], align 16 |

