mirror of
https://github.com/RPCS3/llvm-mirror.git
synced 2024-11-24 19:52:54 +01:00
a6c64717ba
Summary: This patch is adding the support for a shadow memory with dynamically allocated address range. The compiler-rt needs to export a symbol containing the shadow memory range. This is required to support ASAN on windows 64-bits. Reviewers: kcc, rnk, vitalybuka Subscribers: zaks.anna, kubabrecka, dberris, llvm-commits, chrisha Differential Revision: https://reviews.llvm.org/D23354 llvm-svn: 282881
36 lines
1.1 KiB
LLVM
36 lines
1.1 KiB
LLVM
; Test basic address sanitizer instrumentation.
|
|
;
|
|
; RUN: opt -asan -asan-module -S < %s | FileCheck %s
|
|
|
|
target triple = "x86_64-pc-windows-msvc"
|
|
; CHECK: @llvm.global_ctors = {{.*}}@asan.module_ctor
|
|
|
|
define i32 @test_load(i32* %a) sanitize_address {
|
|
; First instrumentation in the function must be to load the dynamic shadow
|
|
; address into a local variable.
|
|
; CHECK-LABEL: @test_load
|
|
; CHECK: entry:
|
|
; CHECK-NEXT: %[[SHADOW:[^ ]*]] = load i64, i64* @__asan_shadow_memory_dynamic_address
|
|
|
|
; Shadow address is loaded and added into the whole offset computation.
|
|
; CHECK add i64 %{{.*}}, %[[SHADOW] ]
|
|
|
|
entry:
|
|
%tmp1 = load i32, i32* %a, align 4
|
|
ret i32 %tmp1
|
|
}
|
|
|
|
define i32 @__asan_options(i32* %a) sanitize_address {
|
|
; Asan functions are not instrumented. Asan function may be called by
|
|
; __asan_init before the shadow initialisation, which may lead to incorrect
|
|
; behavior of the instrumented code.
|
|
; CHECK-LABEL: @__asan_options
|
|
; CHECK: entry:
|
|
; CHECK-NEXT: %tmp1 = load i32, i32* %a, align 4
|
|
; CHECK-NEXT: ret i32 %tmp1
|
|
|
|
entry:
|
|
%tmp1 = load i32, i32* %a, align 4
|
|
ret i32 %tmp1
|
|
}
|