xref: /llvm-project/llvm/test/Instrumentation/AddressSanitizer/instrument-dynamic-allocas.ll (revision 855fe35064674c4601ea9c659a015cacdcec9f63)
1; Test asan internal compiler flags:
2;   -asan-instrument-dynamic-allocas
3
4; RUN: opt < %s -passes=asan -asan-instrument-dynamic-allocas -S | FileCheck %s --check-prefix=CHECK-ALLOCA
5target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64"
6target triple = "x86_64-unknown-linux-gnu"
7
8define void @foo(i32 %len) sanitize_address {
9entry:
10; CHECK-ALLOCA-LABEL: define void @foo
11; CHECK-ALLOCA: __asan_alloca_poison
12; CHECK-ALLOCA: __asan_allocas_unpoison
13; CHECK-ALLOCA: ret void
14  %0 = alloca i32, align 4
15  %1 = alloca ptr
16  store volatile i32 %len, ptr %0, align 4
17  %2 = load i32, ptr %0, align 4
18  %3 = zext i32 %2 to i64
19  %4 = alloca i8, i64 %3, align 32
20  store volatile i8 0, ptr %4
21  ret void
22}
23
24; Test that dynamic alloca is not used for inalloca variables.
25define void @has_inalloca() uwtable sanitize_address {
26; CHECK-ALLOCA-LABEL: define void @has_inalloca
27; CHECK-ALLOCA-NOT: __asan_alloca_poison
28; CHECK-ALLOCA-NOT: __asan_alloca_unpoison
29; CHECK-ALLOCA: ret void
30entry:
31  %t = alloca inalloca i32
32  store i32 42, ptr %t
33  call void @pass_inalloca(ptr inalloca(i32) %t)
34  ret void
35}
36
37declare void @pass_inalloca(ptr inalloca(i32))
38