xref: /llvm-project/llvm/test/Instrumentation/SanitizerCoverage/coverage.ll (revision 5971f18133cbdece6012b3e0f54ae85877e4306f)
1; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0
2; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1
3; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK2
4; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK2
5; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0  -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK
6; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1  -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK
7; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK3
8; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4
9; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc  -S | FileCheck %s --check-prefix=CHECK_TRACE_PC_INDIR
10; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-8bit-counters=1  -S | FileCheck %s --check-prefix=CHECK-8BIT
11
12; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 \
13; RUN:      -S | FileCheck %s --check-prefix=CHECK2
14; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 \
15; RUN:      -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK
16; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-prune-blocks=1 -S | FileCheck %s --check-prefix=CHECKPRUNE
17
18target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64"
19target triple = "x86_64-unknown-linux-gnu"
20define void @foo(i32* %a) sanitize_address {
21entry:
22  %tobool = icmp eq i32* %a, null
23  br i1 %tobool, label %if.end, label %if.then
24
25  if.then:                                          ; preds = %entry
26  store i32 0, i32* %a, align 4
27  br label %if.end
28
29  if.end:                                           ; preds = %entry, %if.then
30  ret void
31}
32
33; CHECK0-NOT: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor }
34; CHECK1: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null }
35; CHECK2: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null }
36
37; CHECK0-NOT: call void @__sanitizer_cov(
38; CHECK0-NOT: call void @__sanitizer_cov_module_init(
39
40; CHECK1-LABEL: define void @foo
41; CHECK1: %0 = load atomic i32, i32* {{.*}} monotonic, align 4, !nosanitize
42; CHECK1: %1 = icmp sge i32 0, %0
43; CHECK1: br i1 %1, label %2, label %3
44; CHECK1: call void @__sanitizer_cov(i32*{{.*}})
45; CHECK1: call void asm sideeffect "", ""()
46; CHECK1-NOT: call void @__sanitizer_cov
47; CHECK1: ret void
48
49; CHECK1-LABEL: define internal void @sancov.module_ctor
50; CHECK1-NOT: ret
51; CHECK1: call void @__sanitizer_cov_module_init({{.*}}, i64 2,
52; CHECK1: ret
53
54; CHECK_WITH_CHECK-LABEL: define void @foo
55; CHECK_WITH_CHECK: __sanitizer_cov_with_check
56; CHECK_WITH_CHECK: ret void
57; CHECK_WITH_CHECK-LABEL: define internal void @sancov.module_ctor
58; CHECK_WITH_CHECK-NOT: ret
59; CHECK_WITH_CHECK: call void @__sanitizer_cov_module_init({{.*}}, i64 4,
60; CHECK_WITH_CHECK: ret
61
62; CHECK2-LABEL: define void @foo
63; CHECK2: call void @__sanitizer_cov
64; CHECK2: call void asm sideeffect "", ""()
65; CHECK2: call void @__sanitizer_cov
66; CHECK2: call void asm sideeffect "", ""()
67; CHECK2: call void @__sanitizer_cov
68; CHECK2: call void asm sideeffect "", ""()
69; CHECK2-NOT: call void @__sanitizer_cov
70; CHECK2: ret void
71
72; CHECK2-LABEL: define internal void @sancov.module_ctor
73; CHECK2-NOT: ret
74; CHECK2: call void @__sanitizer_cov_module_init({{.*}}, i64 4,
75; CHECK2: ret
76
77; CHECK3-LABEL: define void @foo
78; CHECK3: call void @__sanitizer_cov
79; CHECK3: call void @__sanitizer_cov
80; CHECK3: call void @__sanitizer_cov
81; CHECK3-NOT: ret void
82; CHECK3: call void @__sanitizer_cov
83; CHECK3-NOT: call void @__sanitizer_cov
84; CHECK3: ret void
85
86; test -sanitizer-coverage-8bit-counters=1
87; CHECK-8BIT-LABEL: define void @foo
88
89; CHECK-8BIT: [[V11:%[0-9]*]] = load i8{{.*}}!nosanitize
90; CHECK-8BIT: [[V12:%[0-9]*]] = add i8 [[V11]], 1
91; CHECK-8BIT: store i8 [[V12]]{{.*}}!nosanitize
92; CHECK-8BIT: [[V21:%[0-9]*]] = load i8{{.*}}!nosanitize
93; CHECK-8BIT: [[V22:%[0-9]*]] = add i8 [[V21]], 1
94; CHECK-8BIT: store i8 [[V22]]{{.*}}!nosanitize
95; CHECK-8BIT: [[V31:%[0-9]*]] = load i8{{.*}}!nosanitize
96; CHECK-8BIT: [[V32:%[0-9]*]] = add i8 [[V31]], 1
97; CHECK-8BIT: store i8 [[V32]]{{.*}}!nosanitize
98; CHECK-8BIT: [[V41:%[0-9]*]] = load i8{{.*}}!nosanitize
99; CHECK-8BIT: [[V42:%[0-9]*]] = add i8 [[V41]], 1
100; CHECK-8BIT: store i8 [[V42]]{{.*}}!nosanitize
101
102; CHECK-8BIT: ret void
103
104
105%struct.StructWithVptr = type { i32 (...)** }
106
107define void @CallViaVptr(%struct.StructWithVptr* %foo) uwtable sanitize_address {
108entry:
109  %0 = bitcast %struct.StructWithVptr* %foo to void (%struct.StructWithVptr*)***
110  %vtable = load void (%struct.StructWithVptr*)**, void (%struct.StructWithVptr*)*** %0, align 8
111  %1 = load void (%struct.StructWithVptr*)*, void (%struct.StructWithVptr*)** %vtable, align 8
112  tail call void %1(%struct.StructWithVptr* %foo)
113  tail call void %1(%struct.StructWithVptr* %foo)
114  tail call void asm sideeffect "", ""()
115  ret void
116}
117
118; We expect to see two calls to __sanitizer_cov_indir_call16
119; with different values of second argument.
120; CHECK4-LABEL: define void @CallViaVptr
121; CHECK4: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE:.*]])
122; CHECK4-NOT: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE]])
123; CHECK4: ret void
124
125; CHECK_TRACE_PC_INDIR-LABEL: define void @CallViaVptr
126; CHECK_TRACE_PC_INDIR: call void @__sanitizer_cov_trace_pc_indir
127; CHECK_TRACE_PC_INDIR: call void @__sanitizer_cov_trace_pc_indir
128; CHECK_TRACE_PC_INDIR: ret void
129
130define void @call_unreachable() uwtable sanitize_address {
131entry:
132  unreachable
133}
134
135; CHECK4-LABEL: define void @call_unreachable
136; CHECK4-NOT: __sanitizer_cov
137; CHECK4: unreachable
138
139; CHECKPRUNE-LABEL: define void @foo
140; CHECKPRUNE: call void @__sanitizer_cov
141; CHECKPRUNE: call void asm sideeffect "", ""()
142; CHECKPRUNE: call void @__sanitizer_cov
143; CHECKPRUNE: call void asm sideeffect "", ""()
144; CHECKPRUNE-NOT: call void @__sanitizer_cov
145; CHECKPRUNE: ret void
146