xref: /llvm-project/llvm/test/Instrumentation/SanitizerCoverage/coverage.ll (revision 401d3693286103fd76d622ee9cd8f8a7df934bdd)
1; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
2; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
3; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK
4; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK2
5; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0  -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK
6; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1  -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK
7; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK3
8; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
9; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc  -S | FileCheck %s --check-prefix=CHECK_TRACE_PC
10; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc-guard  -S | FileCheck %s --check-prefix=CHECK_TRACE_PC_GUARD
11; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1  -S | FileCheck %s --check-prefix=CHECK-8BIT
12
13; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 \
14; RUN:      -S | FileCheck %s --check-prefix=CHECK2
15; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 \
16; RUN:      -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK
17; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-prune-blocks=1 -S | FileCheck %s --check-prefix=CHECKPRUNE
18
19target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64"
20target triple = "x86_64-unknown-linux-gnu"
21define void @foo(i32* %a) sanitize_address {
22entry:
23  %tobool = icmp eq i32* %a, null
24  br i1 %tobool, label %if.end, label %if.then
25
26  if.then:                                          ; preds = %entry
27  store i32 0, i32* %a, align 4
28  br label %if.end
29
30  if.end:                                           ; preds = %entry, %if.then
31  ret void
32}
33
34; CHECK0-NOT: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor }
35; CHECK1: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null }
36; CHECK2: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null }
37
38; CHECK0-NOT: call void @__sanitizer_cov(
39; CHECK0-NOT: call void @__sanitizer_cov_module_init(
40
41; CHECK1-LABEL: define void @foo
42; CHECK1: %0 = load atomic i32, i32* {{.*}} monotonic, align 4, !nosanitize
43; CHECK1: %1 = icmp sge i32 0, %0
44; CHECK1: br i1 %1, label %2, label %3
45; CHECK1: call void @__sanitizer_cov(i32*{{.*}})
46; CHECK1: call void asm sideeffect "", ""()
47; CHECK1-NOT: call void @__sanitizer_cov
48; CHECK1: ret void
49
50; CHECK1-LABEL: define internal void @sancov.module_ctor
51; CHECK1-NOT: ret
52; CHECK1: call void @__sanitizer_cov_module_init({{.*}}, i64 2, {{.*}}@__sancov_gen_modname
53; CHECK1: ret
54
55; CHECK_WITH_CHECK-LABEL: define void @foo
56; CHECK_WITH_CHECK: __sanitizer_cov_with_check
57; CHECK_WITH_CHECK: ret void
58; CHECK_WITH_CHECK-LABEL: define internal void @sancov.module_ctor
59; CHECK_WITH_CHECK-NOT: ret
60; CHECK_WITH_CHECK: call void @__sanitizer_cov_module_init({{.*}}, i64 3,
61; CHECK_WITH_CHECK: ret
62
63; CHECK2-LABEL: define void @foo
64; CHECK2: call void @__sanitizer_cov
65; CHECK2: call void asm sideeffect "", ""()
66; CHECK2: call void @__sanitizer_cov
67; CHECK2: call void asm sideeffect "", ""()
68; CHECK2: call void asm sideeffect "", ""()
69; CHECK2-NOT: call void @__sanitizer_cov
70; CHECK2: ret void
71
72; CHECK2-LABEL: define internal void @sancov.module_ctor
73; CHECK2-NOT: ret
74; CHECK2: call void @__sanitizer_cov_module_init({{.*}}, i64 3,
75; CHECK2: ret
76
77; CHECK3-LABEL: define void @foo
78; CHECK3: call void @__sanitizer_cov
79; CHECK3: call void @__sanitizer_cov
80; CHECK3-NOT: ret void
81; CHECK3: call void @__sanitizer_cov
82; CHECK3-NOT: call void @__sanitizer_cov
83; CHECK3: ret void
84
85; test -sanitizer-coverage-8bit-counters=1
86; CHECK-8BIT-LABEL: define void @foo
87
88; CHECK-8BIT: [[V11:%[0-9]*]] = load i8{{.*}}!nosanitize
89; CHECK-8BIT: [[V12:%[0-9]*]] = add i8 [[V11]], 1
90; CHECK-8BIT: store i8 [[V12]]{{.*}}!nosanitize
91; CHECK-8BIT: [[V21:%[0-9]*]] = load i8{{.*}}!nosanitize
92; CHECK-8BIT: [[V22:%[0-9]*]] = add i8 [[V21]], 1
93; CHECK-8BIT: store i8 [[V22]]{{.*}}!nosanitize
94; CHECK-8BIT: [[V31:%[0-9]*]] = load i8{{.*}}!nosanitize
95; CHECK-8BIT: [[V32:%[0-9]*]] = add i8 [[V31]], 1
96; CHECK-8BIT: store i8 [[V32]]{{.*}}!nosanitize
97; CHECK-8BIT: [[V41:%[0-9]*]] = load i8{{.*}}!nosanitize
98; CHECK-8BIT: [[V42:%[0-9]*]] = add i8 [[V41]], 1
99; CHECK-8BIT: store i8 [[V42]]{{.*}}!nosanitize
100
101; CHECK-8BIT: ret void
102
103
104%struct.StructWithVptr = type { i32 (...)** }
105
106define void @CallViaVptr(%struct.StructWithVptr* %foo) uwtable sanitize_address {
107entry:
108  %0 = bitcast %struct.StructWithVptr* %foo to void (%struct.StructWithVptr*)***
109  %vtable = load void (%struct.StructWithVptr*)**, void (%struct.StructWithVptr*)*** %0, align 8
110  %1 = load void (%struct.StructWithVptr*)*, void (%struct.StructWithVptr*)** %vtable, align 8
111  tail call void %1(%struct.StructWithVptr* %foo)
112  tail call void %1(%struct.StructWithVptr* %foo)
113  tail call void asm sideeffect "", ""()
114  ret void
115}
116
117; We expect to see two calls to __sanitizer_cov_indir_call16
118; with different values of second argument.
119; CHECK4-LABEL: define void @CallViaVptr
120; CHECK4: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE:.*]])
121; CHECK4-NOT: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE]])
122; CHECK4: ret void
123
124; CHECK_TRACE_PC-LABEL: define void @foo
125; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc
126; CHECK_TRACE_PC: call void asm sideeffect "", ""()
127; CHECK_TRACE_PC: ret void
128
129; CHECK_TRACE_PC-LABEL: define void @CallViaVptr
130; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc_indir
131; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc_indir
132; CHECK_TRACE_PC: ret void
133
134; CHECK_TRACE_PC_GUARD-LABEL: define void @foo
135; CHECK_TRACE_PC_GUARD: call void @__sanitizer_cov_trace_pc
136; CHECK_TRACE_PC_GUARD: call void asm sideeffect "", ""()
137; CHECK_TRACE_PC_GUARD: ret void
138
139; CHECK_TRACE_PC_GUARD-LABEL: define void @CallViaVptr
140; CHECK_TRACE_PC_GUARD: call void @__sanitizer_cov_trace_pc_indir
141; CHECK_TRACE_PC_GUARD: call void @__sanitizer_cov_trace_pc_indir
142; CHECK_TRACE_PC_GUARD: ret void
143
144; CHECK_TRACE_PC_GUARD-LABEL: define internal void @sancov.module_ctor() comdat
145
146define void @call_unreachable() uwtable sanitize_address {
147entry:
148  unreachable
149}
150
151; CHECK4-LABEL: define void @call_unreachable
152; CHECK4-NOT: __sanitizer_cov
153; CHECK4: unreachable
154
155; CHECKPRUNE-LABEL: define void @foo
156; CHECKPRUNE: call void @__sanitizer_cov
157; CHECKPRUNE: call void @__sanitizer_cov
158; CHECKPRUNE: call void @__sanitizer_cov
159; CHECKPRUNE-NOT: call void @__sanitizer_cov
160; CHECKPRUNE: ret void
161