1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
  
     | 
    
      // RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S                       -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=address    -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,ASAN
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=bounds     -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,BOUNDS
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=memory     -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,MSAN
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=thread     -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,TSAN
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=undefined  -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,UBSAN
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=kcfi       -fsanitize-coverage=trace-pc,trace-cmp -o - | FileCheck %s --check-prefixes=CHECK,KCFI
// RUN: %clang %s -target x86_64-unknown-linux-gnu -emit-llvm -S -fsanitize=cfi        -fsanitize-coverage=trace-pc,trace-cmp -flto -fvisibility=default -fno-sanitize-trap=cfi -fno-sanitize-ignorelist -resource-dir=/dev/null -o - | FileCheck %s --check-prefixes=CHECK,CFI
int x[10];
extern void (*f)(void);
// CHECK-LABEL: define dso_local void @foo(
void foo(int n) {
  // CHECK-DAG: call void @__sanitizer_cov_trace_pc
  // CHECK-DAG: call void @__sanitizer_cov_trace_const_cmp
  // ASAN-DAG: call void @__asan_report_store
  // MSAN-DAG: call void @__msan_warning
  // BOUNDS-DAG: call void @__ubsan_handle_out_of_bounds
  // TSAN-DAG: call void @__tsan_func_entry
  // UBSAN-DAG: call void @__ubsan_handle
  if (n)
    x[n] = 42;
  // KCFI-DAG: call void %[[#]]() [ "kcfi"(i32 {{.*}}) ]
  // CFI-DAG: call void @__ubsan_handle_cfi_check_fail_abort
  f();
}
static inline __attribute__((__always_inline__)) void always_inlined_fn(int n) {
  if (n)
    x[n] = 42;
}
// CHECK-LABEL: define dso_local void @test_always_inline(
void test_always_inline(int n) {
  // CHECK-DAG: call void @__sanitizer_cov_trace_pc
  // CHECK-DAG: call void @__sanitizer_cov_trace_const_cmp
  always_inlined_fn(n);
}
// CHECK-LABEL: define dso_local void @test_no_sanitize_coverage(
__attribute__((no_sanitize("coverage"))) void test_no_sanitize_coverage(int n) {
  // CHECK-NOT: call void @__sanitizer_cov_trace_pc
  // CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
  // ASAN-DAG: call void @__asan_report_store
  // MSAN-DAG: call void @__msan_warning
  // BOUNDS-DAG: call void @__ubsan_handle_out_of_bounds
  // TSAN-DAG: call void @__tsan_func_entry
  // UBSAN-DAG: call void @__ubsan_handle
  if (n)
    x[n] = 42;
  // KCFI-DAG: call void %[[#]]() [ "kcfi"(i32 {{.*}}) ]
  // CFI-DAG: call void @__ubsan_handle_cfi_check_fail_abort
  f();
}
// CHECK-LABEL: define dso_local void @test_no_sanitize_combined(
__attribute__((no_sanitize("address", "memory", "thread", "bounds", "undefined", "coverage")))
void test_no_sanitize_combined(int n) {
  // CHECK-NOT: call void @__sanitizer_cov_trace_pc
  // CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
  // ASAN-NOT: call void @__asan_report_store
  // MSAN-NOT: call void @__msan_warning
  // BOUNDS-NOT: call void @__ubsan_handle_out_of_bounds
  // BOUNDS-NOT: call void @llvm.trap()
  // TSAN-NOT: call void @__tsan_func_entry
  // UBSAN-NOT: call void @__ubsan_handle
  if (n)
    x[n] = 42;
}
// CHECK-LABEL: define dso_local void @test_no_sanitize_separate(
__attribute__((no_sanitize("address")))
__attribute__((no_sanitize("memory")))
__attribute__((no_sanitize("thread")))
__attribute__((no_sanitize("bounds")))
__attribute__((no_sanitize("undefined")))
__attribute__((no_sanitize("coverage")))
void test_no_sanitize_separate(int n) {
  // CHECK-NOT: call void @__sanitizer_cov_trace_pc
  // CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
  // ASAN-NOT: call void @__asan_report_store
  // MSAN-NOT: call void @__msan_warning
  // BOUNDS-NOT: call void @__ubsan_handle_out_of_bounds
  // BOUNDS-NOT: call void @llvm.trap()
  // TSAN-NOT: call void @__tsan_func_entry
  // UBSAN-NOT: call void @__ubsan_handle
  if (n)
    x[n] = 42;
}
// CHECK-LABEL: define dso_local void @test_no_sanitize_kcfi(
__attribute__((no_sanitize("kcfi", "coverage")))
void test_no_sanitize_kcfi(void) {
  // CHECK-NOT: call void @__sanitizer_cov_trace
  // KCFI-NOT: call void %[[#]]() [ "kcfi"(i32 {{.*}}) ]
  f();
}
// CHECK-LABEL: define dso_local void @test_no_sanitize_cfi(
__attribute__((no_sanitize("cfi", "coverage")))
void test_no_sanitize_cfi(void) {
  // CHECK-NOT: call void @__sanitizer_cov_trace
  // CFI-NOT: call void @__ubsan_handle_cfi_check_fail_abort
  f();
}
// CHECK-LABEL: define dso_local void @test_no_sanitize_always_inline(
__attribute__((no_sanitize("coverage")))
void test_no_sanitize_always_inline(int n) {
  // CHECK-NOT: call void @__sanitizer_cov_trace_pc
  // CHECK-NOT: call void @__sanitizer_cov_trace_const_cmp
  always_inlined_fn(n);
}
// CHECK-LABEL: declare void
 
     |