1; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0 2; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1 3; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 4; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK2 5; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 6; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 7; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK3 8; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4 9; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s --check-prefix=CHECK_TRACE_PC 10; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc-guard -S | FileCheck %s --check-prefix=CHECK_TRACE_PC_GUARD 11; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1 -S | FileCheck %s --check-prefix=CHECK-8BIT 12 13; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 \ 14; RUN: -S | FileCheck %s --check-prefix=CHECK2 15; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 \ 16; RUN: -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 17; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-prune-blocks=1 -S | FileCheck %s --check-prefix=CHECKPRUNE 18 19target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64" 20target triple = "x86_64-unknown-linux-gnu" 21define void @foo(i32* %a) sanitize_address { 22entry: 23 %tobool = icmp eq i32* %a, null 24 br i1 %tobool, label %if.end, label %if.then 25 26 if.then: ; preds = %entry 27 store i32 0, i32* %a, align 4 28 br label %if.end 29 30 if.end: ; preds = %entry, %if.then 31 ret void 32} 33 34; CHECK0-NOT: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor } 35; CHECK1: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null } 36; CHECK2: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null } 37 38; CHECK0-NOT: call void @__sanitizer_cov( 39; CHECK0-NOT: call void @__sanitizer_cov_module_init( 40 41; CHECK1-LABEL: define void @foo 42; CHECK1: %0 = load atomic i32, i32* {{.*}} monotonic, align 4, !nosanitize 43; CHECK1: %1 = icmp sge i32 0, %0 44; CHECK1: br i1 %1, label %2, label %3 45; CHECK1: call void @__sanitizer_cov(i32*{{.*}}) 46; CHECK1: call void asm sideeffect "", ""() 47; CHECK1-NOT: call void @__sanitizer_cov 48; CHECK1: ret void 49 50; CHECK1-LABEL: define internal void @sancov.module_ctor 51; CHECK1-NOT: ret 52; CHECK1: call void @__sanitizer_cov_module_init({{.*}}, i64 2, {{.*}}@__sancov_gen_modname 53; CHECK1: ret 54 55; CHECK_WITH_CHECK-LABEL: define void @foo 56; CHECK_WITH_CHECK: __sanitizer_cov_with_check 57; CHECK_WITH_CHECK: ret void 58; CHECK_WITH_CHECK-LABEL: define internal void @sancov.module_ctor 59; CHECK_WITH_CHECK-NOT: ret 60; CHECK_WITH_CHECK: call void @__sanitizer_cov_module_init({{.*}}, i64 3, 61; CHECK_WITH_CHECK: ret 62 63; CHECK2-LABEL: define void @foo 64; CHECK2: call void @__sanitizer_cov 65; CHECK2: call void asm sideeffect "", ""() 66; CHECK2: call void @__sanitizer_cov 67; CHECK2: call void asm sideeffect "", ""() 68; CHECK2: call void asm sideeffect "", ""() 69; CHECK2-NOT: call void @__sanitizer_cov 70; CHECK2: ret void 71 72; CHECK2-LABEL: define internal void @sancov.module_ctor 73; CHECK2-NOT: ret 74; CHECK2: call void @__sanitizer_cov_module_init({{.*}}, i64 3, 75; CHECK2: ret 76 77; CHECK3-LABEL: define void @foo 78; CHECK3: call void @__sanitizer_cov 79; CHECK3: call void @__sanitizer_cov 80; CHECK3-NOT: ret void 81; CHECK3: call void @__sanitizer_cov 82; CHECK3-NOT: call void @__sanitizer_cov 83; CHECK3: ret void 84 85; test -sanitizer-coverage-8bit-counters=1 86; CHECK-8BIT-LABEL: define void @foo 87 88; CHECK-8BIT: [[V11:%[0-9]*]] = load i8{{.*}}!nosanitize 89; CHECK-8BIT: [[V12:%[0-9]*]] = add i8 [[V11]], 1 90; CHECK-8BIT: store i8 [[V12]]{{.*}}!nosanitize 91; CHECK-8BIT: [[V21:%[0-9]*]] = load i8{{.*}}!nosanitize 92; CHECK-8BIT: [[V22:%[0-9]*]] = add i8 [[V21]], 1 93; CHECK-8BIT: store i8 [[V22]]{{.*}}!nosanitize 94; CHECK-8BIT: [[V31:%[0-9]*]] = load i8{{.*}}!nosanitize 95; CHECK-8BIT: [[V32:%[0-9]*]] = add i8 [[V31]], 1 96; CHECK-8BIT: store i8 [[V32]]{{.*}}!nosanitize 97; CHECK-8BIT: [[V41:%[0-9]*]] = load i8{{.*}}!nosanitize 98; CHECK-8BIT: [[V42:%[0-9]*]] = add i8 [[V41]], 1 99; CHECK-8BIT: store i8 [[V42]]{{.*}}!nosanitize 100 101; CHECK-8BIT: ret void 102 103 104%struct.StructWithVptr = type { i32 (...)** } 105 106define void @CallViaVptr(%struct.StructWithVptr* %foo) uwtable sanitize_address { 107entry: 108 %0 = bitcast %struct.StructWithVptr* %foo to void (%struct.StructWithVptr*)*** 109 %vtable = load void (%struct.StructWithVptr*)**, void (%struct.StructWithVptr*)*** %0, align 8 110 %1 = load void (%struct.StructWithVptr*)*, void (%struct.StructWithVptr*)** %vtable, align 8 111 tail call void %1(%struct.StructWithVptr* %foo) 112 tail call void %1(%struct.StructWithVptr* %foo) 113 tail call void asm sideeffect "", ""() 114 ret void 115} 116 117; We expect to see two calls to __sanitizer_cov_indir_call16 118; with different values of second argument. 119; CHECK4-LABEL: define void @CallViaVptr 120; CHECK4: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE:.*]]) 121; CHECK4-NOT: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE]]) 122; CHECK4: ret void 123 124; CHECK_TRACE_PC-LABEL: define void @foo 125; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc 126; CHECK_TRACE_PC: call void asm sideeffect "", ""() 127; CHECK_TRACE_PC: ret void 128 129; CHECK_TRACE_PC-LABEL: define void @CallViaVptr 130; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc_indir 131; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc_indir 132; CHECK_TRACE_PC: ret void 133 134; CHECK_TRACE_PC_GUARD-LABEL: define void @foo 135; CHECK_TRACE_PC_GUARD: call void @__sanitizer_cov_trace_pc 136; CHECK_TRACE_PC_GUARD: call void asm sideeffect "", ""() 137; CHECK_TRACE_PC_GUARD: ret void 138 139; CHECK_TRACE_PC_GUARD-LABEL: define void @CallViaVptr 140; CHECK_TRACE_PC_GUARD: call void @__sanitizer_cov_trace_pc_indir 141; CHECK_TRACE_PC_GUARD: call void @__sanitizer_cov_trace_pc_indir 142; CHECK_TRACE_PC_GUARD: ret void 143 144; CHECK_TRACE_PC_GUARD-LABEL: define internal void @sancov.module_ctor() comdat 145 146define void @call_unreachable() uwtable sanitize_address { 147entry: 148 unreachable 149} 150 151; CHECK4-LABEL: define void @call_unreachable 152; CHECK4-NOT: __sanitizer_cov 153; CHECK4: unreachable 154 155; CHECKPRUNE-LABEL: define void @foo 156; CHECKPRUNE: call void @__sanitizer_cov 157; CHECKPRUNE: call void @__sanitizer_cov 158; CHECKPRUNE: call void @__sanitizer_cov 159; CHECKPRUNE-NOT: call void @__sanitizer_cov 160; CHECKPRUNE: ret void 161