mirror of
https://github.com/capstone-engine/llvm-capstone.git
synced 2024-12-13 19:24:21 +00:00
5a3d6ce956
Allow `-fsanitize=kcfi` to be enabled with `-fsanitize-coverage=` modes such as `trace-{pc,cmp}`. Link: https://github.com/ClangBuiltLinux/linux/issues/1743 Reviewed By: MaskRay Differential Revision: https://reviews.llvm.org/D138458
106 lines
4.5 KiB
C
106 lines
4.5 KiB
C
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK
|
|
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=address -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,ASAN
|
|
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=bounds -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,BOUNDS
|
|
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=memory -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,MSAN
|
|
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=thread -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,TSAN
|
|
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=undefined -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,UBSAN
|
|
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=kcfi -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,KCFI
|
|
|
|
int x[10];
|
|
extern void (*f)(void);
|
|
|
|
// CHECK-LABEL: define dso_local void @foo(
|
|
void foo(int n) {
|
|
// CHECK-DAG: call void @__sanitizer_cov_trace_pc
|
|
// CHECK-DAG: call void @__sanitizer_cov_trace_const_cmp
|
|
// ASAN-DAG: call void @__asan_report_store
|
|
// MSAN-DAG: call void @__msan_warning
|
|
// BOUNDS-DAG: call void @__ubsan_handle_out_of_bounds
|
|
// TSAN-DAG: call void @__tsan_func_entry
|
|
// UBSAN-DAG: call void @__ubsan_handle
|
|
if (n)
|
|
x[n] = 42;
|
|
// KCFI-DAG: call void %[[#]]() [ "kcfi"(i32 {{.*}}) ]
|
|
f();
|
|
}
|
|
|
|
static inline __attribute__((__always_inline__)) void always_inlined_fn(int n) {
|
|
if (n)
|
|
x[n] = 42;
|
|
}
|
|
// CHECK-LABEL: define dso_local void @test_always_inline(
|
|
void test_always_inline(int n) {
|
|
// CHECK-DAG: call void @__sanitizer_cov_trace_pc
|
|
// CHECK-DAG: call void @__sanitizer_cov_trace_const_cmp
|
|
always_inlined_fn(n);
|
|
}
|
|
|
|
// CHECK-LABEL: define dso_local void @test_no_sanitize_coverage(
|
|
__attribute__((no_sanitize("coverage"))) void test_no_sanitize_coverage(int n) {
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_pc
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
|
|
// ASAN-DAG: call void @__asan_report_store
|
|
// MSAN-DAG: call void @__msan_warning
|
|
// BOUNDS-DAG: call void @__ubsan_handle_out_of_bounds
|
|
// TSAN-DAG: call void @__tsan_func_entry
|
|
// UBSAN-DAG: call void @__ubsan_handle
|
|
if (n)
|
|
x[n] = 42;
|
|
// KCFI-DAG: call void %[[#]]() [ "kcfi"(i32 {{.*}}) ]
|
|
f();
|
|
}
|
|
|
|
|
|
// CHECK-LABEL: define dso_local void @test_no_sanitize_combined(
|
|
__attribute__((no_sanitize("address", "memory", "thread", "bounds", "undefined", "coverage")))
|
|
void test_no_sanitize_combined(int n) {
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_pc
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
|
|
// ASAN-NOT: call void @__asan_report_store
|
|
// MSAN-NOT: call void @__msan_warning
|
|
// BOUNDS-NOT: call void @__ubsan_handle_out_of_bounds
|
|
// BOUNDS-NOT: call void @llvm.trap()
|
|
// TSAN-NOT: call void @__tsan_func_entry
|
|
// UBSAN-NOT: call void @__ubsan_handle
|
|
if (n)
|
|
x[n] = 42;
|
|
}
|
|
|
|
// CHECK-LABEL: define dso_local void @test_no_sanitize_separate(
|
|
__attribute__((no_sanitize("address")))
|
|
__attribute__((no_sanitize("memory")))
|
|
__attribute__((no_sanitize("thread")))
|
|
__attribute__((no_sanitize("bounds")))
|
|
__attribute__((no_sanitize("undefined")))
|
|
__attribute__((no_sanitize("coverage")))
|
|
void test_no_sanitize_separate(int n) {
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_pc
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
|
|
// ASAN-NOT: call void @__asan_report_store
|
|
// MSAN-NOT: call void @__msan_warning
|
|
// BOUNDS-NOT: call void @__ubsan_handle_out_of_bounds
|
|
// BOUNDS-NOT: call void @llvm.trap()
|
|
// TSAN-NOT: call void @__tsan_func_entry
|
|
// UBSAN-NOT: call void @__ubsan_handle
|
|
if (n)
|
|
x[n] = 42;
|
|
}
|
|
|
|
// CHECK-LABEL: define dso_local void @test_no_sanitize_kcfi(
|
|
__attribute__((no_sanitize("kcfi", "coverage")))
|
|
void test_no_sanitize_kcfi(void) {
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace
|
|
// KCFI-NOT: call void %[[#]]() [ "kcfi"(i32 {{.*}}) ]
|
|
f();
|
|
}
|
|
|
|
// CHECK-LABEL: define dso_local void @test_no_sanitize_always_inline(
|
|
__attribute__((no_sanitize("coverage")))
|
|
void test_no_sanitize_always_inline(int n) {
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_pc
|
|
// CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
|
|
always_inlined_fn(n);
|
|
}
|
|
|
|
// CHECK-LABEL: declare void
|