mirror of
https://github.com/RPCS3/llvm-mirror.git
synced 2024-11-23 19:23:23 +01:00
92a77f4b5e
Under NPM, the asan-globals-md analysis is required but cannot be run within the asan function pass due to module analyses not being able to run from a function pass. So this pins all tests using "-asan" to the legacy PM and adds a corresponding RUN line with -passes='require<asan-globals-md>,function(asan)'. Now all tests in Instrumentation/AddressSanitizer pass when -enable-new-pm is by default on. Tests were automatically converted using the following python script and failures were manually fixed up. import sys for i in sys.argv: with open(i, 'r') as f: s = f.read() with open(i, 'w') as f: for l in s.splitlines(): if "RUN:" in l and ' -asan -asan-module ' in l and '\\' not in l: f.write(l.replace(' -asan -asan-module ', ' -asan -asan-module -enable-new-pm=0 ')) f.write('\n') f.write(l.replace(' -asan -asan-module ', " -passes='require<asan-globals-md>,function(asan),module(asan-module)' ")) f.write('\n') elif "RUN:" in l and ' -asan ' in l and '\\' not in l: f.write(l.replace(' -asan ', ' -asan -enable-new-pm=0 ')) f.write('\n') f.write(l.replace(' -asan ', " -passes='require<asan-globals-md>,function(asan)' ")) f.write('\n') else: f.write(l) f.write('\n') See https://bugs.llvm.org/show_bug.cgi?id=46611. Reviewed By: vitalybuka Differential Revision: https://reviews.llvm.org/D83921
57 lines
2.8 KiB
LLVM
57 lines
2.8 KiB
LLVM
; This check verifies that arguments passed by value get redzones.
|
|
; RUN: opt < %s -asan -enable-new-pm=0 -asan-realign-stack=32 -S | FileCheck %s
|
|
; RUN: opt < %s -passes='asan-function-pipeline' -asan-realign-stack=32 -S | FileCheck %s
|
|
; RUN: opt < %s -asan -enable-new-pm=0 -asan-realign-stack=32 -asan-force-dynamic-shadow -S | FileCheck %s
|
|
; RUN: opt < %s -passes='asan-function-pipeline' -asan-realign-stack=32 -asan-force-dynamic-shadow -S | FileCheck %s
|
|
; RUN: opt < %s -asan -enable-new-pm=0 -asan-realign-stack=32 -asan-mapping-scale=5 -S | FileCheck %s
|
|
; RUN: opt < %s -passes='asan-function-pipeline' -asan-realign-stack=32 -asan-mapping-scale=5 -S | FileCheck %s
|
|
; RUN: opt < %s -asan -enable-new-pm=0 -asan-realign-stack=32 -asan-force-dynamic-shadow -asan-mapping-scale=5 -S | FileCheck %s
|
|
; RUN: opt < %s -passes='asan-function-pipeline' -asan-realign-stack=32 -asan-force-dynamic-shadow -asan-mapping-scale=5 -S | FileCheck %s
|
|
|
|
|
|
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64"
|
|
target triple = "x86_64-unknown-linux-gnu"
|
|
|
|
%struct.A = type { [8 x i32] }
|
|
|
|
declare i32 @bar(%struct.A*)
|
|
|
|
; Test behavior for named argument with explicit alignment. The memcpy and
|
|
; alloca alignments should match the explicit alignment of 64.
|
|
define void @foo(%struct.A* byval align 64 %a) sanitize_address {
|
|
entry:
|
|
; CHECK-LABEL: foo
|
|
; CHECK: call i64 @__asan_stack_malloc
|
|
; CHECK: alloca i8, i64 {{.*}} align 64
|
|
; CHECK: [[copyPtr:%[^ \t]+]] = inttoptr i64 %{{[^ \t]+}} to %struct.A*
|
|
; CHECK: [[copyBytePtr:%[^ \t]+]] = bitcast %struct.A* [[copyPtr]]
|
|
; CHECK: [[aBytePtr:%[^ \t]+]] = bitcast %struct.A* %a
|
|
; CHECK: call void @llvm.memcpy{{[^%]+}}[[copyBytePtr]]{{[^%]+}} align 64 [[aBytePtr]],{{[^,]+}},
|
|
; CHECK: call i32 @bar(%struct.A* [[copyPtr]])
|
|
; CHECK: ret void
|
|
|
|
%call = call i32 @bar(%struct.A* %a)
|
|
ret void
|
|
}
|
|
|
|
; Test behavior for unnamed argument without explicit alignment. In this case,
|
|
; the first argument is referenced by the identifier %0 and the ABI requires a
|
|
; minimum alignment of 4 bytes since struct.A contains i32s which have 4-byte
|
|
; alignment. However, the alloca alignment will be 32 since that is the value
|
|
; passed via the -asan-realign-stack option, which is greater than 4.
|
|
define void @baz(%struct.A* byval) sanitize_address {
|
|
entry:
|
|
; CHECK-LABEL: baz
|
|
; CHECK: call i64 @__asan_stack_malloc
|
|
; CHECK: alloca i8, i64 {{.*}} align 32
|
|
; CHECK: [[copyPtr:%[^ \t]+]] = inttoptr i64 %{{[^ \t]+}} to %struct.A*
|
|
; CHECK: [[copyBytePtr:%[^ \t]+]] = bitcast %struct.A* [[copyPtr]]
|
|
; CHECK: [[aBytePtr:%[^ \t]+]] = bitcast %struct.A* %0
|
|
; CHECK: call void @llvm.memcpy{{[^%]+}}[[copyBytePtr]]{{[^%]+}} align 4 [[aBytePtr]],{{[^,]+}}
|
|
; CHECK: call i32 @bar(%struct.A* [[copyPtr]])
|
|
; CHECK: ret void
|
|
|
|
%call = call i32 @bar(%struct.A* %0)
|
|
ret void
|
|
}
|