mirror of
https://github.com/c64scene-ar/llvm-6502.git
synced 2024-12-15 20:29:48 +00:00
abb3335f6d
Summary: This change moves asan-coverage instrumentation into a separate Module pass. The other part of the change in clang introduces a new flag -fsanitize-coverage=N. Another small patch will update tests in compiler-rt. With this patch no functionality change is expected except for the flag name. The following changes will make the coverage instrumentation work with tsan/msan Test Plan: Run regression tests, chromium. Reviewers: nlewycky, samsonov Reviewed By: nlewycky, samsonov Subscribers: llvm-commits Differential Revision: http://reviews.llvm.org/D6152 git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@221718 91177308-0d34-0410-b5e6-96231b3b80d8
89 lines
3.8 KiB
LLVM
89 lines
3.8 KiB
LLVM
; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK2
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | FileCheck %s --check-prefix=CHECK1
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK3
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
|
|
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 \
|
|
; RUN: -S | FileCheck %s --check-prefix=CHECK2
|
|
; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 \
|
|
; RUN: -S | FileCheck %s --check-prefix=CHECK1
|
|
|
|
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64"
|
|
target triple = "x86_64-unknown-linux-gnu"
|
|
define void @foo(i32* %a) sanitize_address {
|
|
entry:
|
|
%tobool = icmp eq i32* %a, null
|
|
br i1 %tobool, label %if.end, label %if.then
|
|
|
|
if.then: ; preds = %entry
|
|
store i32 0, i32* %a, align 4
|
|
br label %if.end
|
|
|
|
if.end: ; preds = %entry, %if.then
|
|
ret void
|
|
}
|
|
|
|
; CHECK0-NOT: call void @__sanitizer_cov(
|
|
; CHECK0-NOT: call void @__sanitizer_cov_module_init(
|
|
|
|
; CHECK1-LABEL: define void @foo
|
|
; CHECK1: %0 = load atomic i8* @__sancov_gen_cov_foo monotonic, align 1
|
|
; CHECK1: %1 = icmp eq i8 0, %0
|
|
; CHECK1: br i1 %1, label %2, label %3
|
|
; CHECK1: call void @__sanitizer_cov
|
|
; CHECK1-NOT: call void @__sanitizer_cov
|
|
; CHECK1: store atomic i8 1, i8* @__sancov_gen_cov_foo monotonic, align 1
|
|
|
|
; CHECK1-LABEL: define internal void @sancov.module_ctor
|
|
; CHECK1-NOT: ret
|
|
; CHECK1: call void @__sanitizer_cov_module_init(i64 2)
|
|
; CHECK1: ret
|
|
|
|
|
|
; CHECK2-LABEL: define void @foo
|
|
; CHECK2: call void @__sanitizer_cov
|
|
; CHECK2: call void @__sanitizer_cov
|
|
; CHECK2: call void @__sanitizer_cov
|
|
; CHECK2-NOT: call void @__sanitizer_cov
|
|
; CHECK2: ret void
|
|
|
|
; CHECK2-LABEL: define internal void @sancov.module_ctor
|
|
; CHECK2-NOT: ret
|
|
; CHECK2: call void @__sanitizer_cov_module_init(i64 4)
|
|
; CHECK2: ret
|
|
|
|
; CHECK3-LABEL: define void @foo
|
|
; CHECK3: call void @__sanitizer_cov
|
|
; CHECK3: call void @__sanitizer_cov
|
|
; CHECK3: call void @__sanitizer_cov
|
|
; CHECK3: call void @__sanitizer_cov
|
|
; CHECK3-NOT: call void @__sanitizer_cov
|
|
; CHECK3: ret void
|
|
|
|
|
|
%struct.StructWithVptr = type { i32 (...)** }
|
|
|
|
define void @CallViaVptr(%struct.StructWithVptr* %foo) uwtable sanitize_address {
|
|
entry:
|
|
%0 = bitcast %struct.StructWithVptr* %foo to void (%struct.StructWithVptr*)***
|
|
%vtable = load void (%struct.StructWithVptr*)*** %0, align 8
|
|
%1 = load void (%struct.StructWithVptr*)** %vtable, align 8
|
|
tail call void %1(%struct.StructWithVptr* %foo)
|
|
tail call void %1(%struct.StructWithVptr* %foo)
|
|
tail call void asm sideeffect "", ""()
|
|
ret void
|
|
}
|
|
|
|
; We expect to see two calls to __sanitizer_cov_indir_call16
|
|
; with different values of second argument.
|
|
; CHECK4-LABEL: define void @CallViaVptr
|
|
; CHECK4: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE:.*]])
|
|
; CHECK4-NOT: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE]])
|
|
; CHECK4: ret void
|