forked from OSchip/llvm-project
				
			
		
			
				
	
	
		
			156 lines
		
	
	
		
			6.7 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			156 lines
		
	
	
		
			6.7 KiB
		
	
	
	
		
			C++
		
	
	
	
| int DefinedInDifferentFile(int *a);
 | |
| // RUN: echo "int DefinedInDifferentFile(int *a) { return *a; }" > %t.extra-source.cpp
 | |
| // RUN: echo "struct S { S(){} ~S(){} };" >> %t.extra-source.cpp
 | |
| // RUN: echo "S glob_array[5];" >> %t.extra-source.cpp
 | |
| 
 | |
| // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -disable-O0-optnone -emit-llvm -o - %s -include %t.extra-source.cpp | FileCheck -check-prefix=WITHOUT %s
 | |
| // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -disable-O0-optnone -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address | FileCheck -check-prefix=ASAN %s
 | |
| 
 | |
| // RUN: echo "fun:*BlacklistedFunction*" > %t.func.blacklist
 | |
| // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -disable-O0-optnone -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.func.blacklist | FileCheck -check-prefix=BLFUNC %s
 | |
| 
 | |
| // The blacklist file uses regexps, so escape backslashes, which are common in
 | |
| // Windows paths.
 | |
| // RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t.file.blacklist
 | |
| // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -disable-O0-optnone -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.file.blacklist | FileCheck -check-prefix=BLFILE %s
 | |
| 
 | |
| // The sanitize_address attribute should be attached to functions
 | |
| // when AddressSanitizer is enabled, unless no_sanitize_address attribute
 | |
| // is present.
 | |
| 
 | |
| // Attributes for function defined in different source file:
 | |
| // WITHOUT: DefinedInDifferentFile{{.*}} [[NOATTR:#[0-9]+]]
 | |
| // BLFILE:  DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
 | |
| // BLFUNC:  DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
 | |
| // ASAN:    DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
 | |
| 
 | |
| // Check that functions generated for global in different source file are
 | |
| // not blacklisted.
 | |
| // WITHOUT: @__cxx_global_var_init{{.*}}[[NOATTR:#[0-9]+]]
 | |
| // WITHOUT: @__cxx_global_array_dtor{{.*}}[[NOATTR]]
 | |
| // BLFILE: @__cxx_global_var_init{{.*}}[[WITH:#[0-9]+]]
 | |
| // BLFILE: @__cxx_global_array_dtor{{.*}}[[WITH]]
 | |
| // BLFUNC: @__cxx_global_var_init{{.*}}[[WITH:#[0-9]+]]
 | |
| // BLFUNC: @__cxx_global_array_dtor{{.*}}[[WITH]]
 | |
| // ASAN: @__cxx_global_var_init{{.*}}[[WITH:#[0-9]+]]
 | |
| // ASAN: @__cxx_global_array_dtor{{.*}}[[WITH]]
 | |
| 
 | |
| 
 | |
| // WITHOUT:  NoAddressSafety1{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
 | |
| // BLFUNC:  NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
 | |
| // ASAN:  NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
 | |
| __attribute__((no_sanitize_address))
 | |
| int NoAddressSafety1(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  NoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  NoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  NoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| // ASAN:  NoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| __attribute__((no_sanitize_address))
 | |
| int NoAddressSafety2(int *a);
 | |
| int NoAddressSafety2(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  NoAddressSafety3{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  NoAddressSafety3{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  NoAddressSafety3{{.*}}) [[NOATTR]]
 | |
| // ASAN:  NoAddressSafety3{{.*}}) [[NOATTR]]
 | |
| [[gnu::no_sanitize_address]]
 | |
| int NoAddressSafety3(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  NoAddressSafety4{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  NoAddressSafety4{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  NoAddressSafety4{{.*}}) [[NOATTR]]
 | |
| // ASAN:  NoAddressSafety4{{.*}}) [[NOATTR]]
 | |
| [[gnu::no_sanitize_address]]
 | |
| int NoAddressSafety4(int *a);
 | |
| int NoAddressSafety4(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  NoAddressSafety5{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  NoAddressSafety5{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  NoAddressSafety5{{.*}}) [[NOATTR]]
 | |
| // ASAN:  NoAddressSafety5{{.*}}) [[NOATTR]]
 | |
| __attribute__((no_sanitize("address")))
 | |
| int NoAddressSafety5(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  NoAddressSafety6{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  NoAddressSafety6{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  NoAddressSafety6{{.*}}) [[NOATTR]]
 | |
| // ASAN:  NoAddressSafety6{{.*}}) [[NOATTR]]
 | |
| __attribute__((no_sanitize("address")))
 | |
| int NoAddressSafety6(int *a);
 | |
| int NoAddressSafety6(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  AddressSafetyOk{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  AddressSafetyOk{{.*}}) [[NOATTR]]
 | |
| // BLFUNC: AddressSafetyOk{{.*}}) [[WITH]]
 | |
| // ASAN: AddressSafetyOk{{.*}}) [[WITH]]
 | |
| int AddressSafetyOk(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  BlacklistedFunction{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  BlacklistedFunction{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  BlacklistedFunction{{.*}}) [[NOATTR]]
 | |
| // ASAN:  BlacklistedFunction{{.*}}) [[WITH]]
 | |
| int BlacklistedFunction(int *a) { return *a; }
 | |
| 
 | |
| #define GENERATE_FUNC(name) \
 | |
|     int name(int *a) { return *a; }
 | |
| // WITHOUT: GeneratedFunction{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  GeneratedFunction{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  GeneratedFunction{{.*}}) [[WITH]]
 | |
| // ASAN:    GeneratedFunction{{.*}}) [[WITH]]
 | |
| GENERATE_FUNC(GeneratedFunction)
 | |
| 
 | |
| #define GENERATE_NAME(name) name##_generated
 | |
| // WITHOUT: Function_generated{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  Function_generated{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  Function_generated{{.*}}) [[WITH]]
 | |
| // ASAN:    Function_generated{{.*}}) [[WITH]]
 | |
| int GENERATE_NAME(Function)(int *a) { return *a; }
 | |
| 
 | |
| // WITHOUT:  TemplateAddressSafetyOk{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  TemplateAddressSafetyOk{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  TemplateAddressSafetyOk{{.*}}) [[WITH]]
 | |
| // ASAN: TemplateAddressSafetyOk{{.*}}) [[WITH]]
 | |
| template<int i>
 | |
| int TemplateAddressSafetyOk() { return i; }
 | |
| 
 | |
| // WITHOUT:  TemplateNoAddressSafety1{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  TemplateNoAddressSafety1{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  TemplateNoAddressSafety1{{.*}}) [[NOATTR]]
 | |
| // ASAN: TemplateNoAddressSafety1{{.*}}) [[NOATTR]]
 | |
| template<int i>
 | |
| __attribute__((no_sanitize_address))
 | |
| int TemplateNoAddressSafety1() { return i; }
 | |
| 
 | |
| // WITHOUT:  TemplateNoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| // BLFILE:  TemplateNoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| // BLFUNC:  TemplateNoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| // ASAN: TemplateNoAddressSafety2{{.*}}) [[NOATTR]]
 | |
| template<int i>
 | |
| __attribute__((no_sanitize("address")))
 | |
| int TemplateNoAddressSafety2() { return i; }
 | |
| 
 | |
| int force_instance = TemplateAddressSafetyOk<42>()
 | |
|                    + TemplateNoAddressSafety1<42>()
 | |
|                    + TemplateNoAddressSafety2<42>();
 | |
| 
 | |
| // Check that __cxx_global_var_init* get the sanitize_address attribute.
 | |
| int global1 = 0;
 | |
| int global2 = *(int*)((char*)&global1+1);
 | |
| // WITHOUT: @__cxx_global_var_init{{.*}}[[NOATTR]]
 | |
| // BLFILE: @__cxx_global_var_init{{.*}}[[NOATTR:#[0-9]+]]
 | |
| // BLFUNC: @__cxx_global_var_init{{.*}}[[WITH]]
 | |
| // ASAN: @__cxx_global_var_init{{.*}}[[WITH]]
 | |
| 
 | |
| // WITHOUT: attributes [[NOATTR]] = { noinline nounwind{{.*}} }
 | |
| 
 | |
| // BLFILE: attributes [[WITH]] = { noinline nounwind sanitize_address{{.*}} }
 | |
| // BLFILE: attributes [[NOATTR]] = { noinline nounwind{{.*}} }
 | |
| 
 | |
| // BLFUNC: attributes [[WITH]] = { noinline nounwind sanitize_address{{.*}} }
 | |
| // BLFUNC: attributes [[NOATTR]] = { noinline nounwind{{.*}} }
 | |
| 
 | |
| // ASAN: attributes [[WITH]] = { noinline nounwind sanitize_address{{.*}} }
 | |
| // ASAN: attributes [[NOATTR]] = { noinline nounwind{{.*}} }
 |