1; RUN: opt < %s -sancov -sanitizer-coverage-level=0 -S | FileCheck %s --check-prefix=CHECK0 2; RUN: opt < %s -sancov -sanitizer-coverage-level=1 -S | FileCheck %s --check-prefix=CHECK1 3; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 4; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK2 5; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=0 -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 6; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 7; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-block-threshold=10 -S | FileCheck %s --check-prefix=CHECK3 8; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -S | FileCheck %s --check-prefix=CHECK4 9; RUN: opt < %s -sancov -sanitizer-coverage-level=4 -sanitizer-coverage-trace-pc -S | FileCheck %s --check-prefix=CHECK_TRACE_PC 10 11; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=10 \ 12; RUN: -S | FileCheck %s --check-prefix=CHECK2 13; RUN: opt < %s -sancov -sanitizer-coverage-level=2 -sanitizer-coverage-block-threshold=1 \ 14; RUN: -S | FileCheck %s --check-prefix=CHECK_WITH_CHECK 15; RUN: opt < %s -sancov -sanitizer-coverage-level=3 -sanitizer-coverage-prune-blocks=1 -S | FileCheck %s --check-prefix=CHECKPRUNE 16 17target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64" 18target triple = "x86_64-unknown-linux-gnu" 19define void @foo(i32* %a) sanitize_address { 20entry: 21 %tobool = icmp eq i32* %a, null 22 br i1 %tobool, label %if.end, label %if.then 23 24 if.then: ; preds = %entry 25 store i32 0, i32* %a, align 4 26 br label %if.end 27 28 if.end: ; preds = %entry, %if.then 29 ret void 30} 31 32; CHECK0-NOT: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor } 33; CHECK1: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null } 34; CHECK2: @llvm.global_ctors = {{.*}}{ i32 2, void ()* @sancov.module_ctor, i8* null } 35 36; CHECK0-NOT: call void @__sanitizer_cov( 37; CHECK0-NOT: call void @__sanitizer_cov_module_init( 38 39; CHECK1-LABEL: define void @foo 40; CHECK1: %0 = load atomic i32, i32* {{.*}} monotonic, align 4, !nosanitize 41; CHECK1: %1 = icmp sge i32 0, %0 42; CHECK1: br i1 %1, label %2, label %3 43; CHECK1: call void @__sanitizer_cov(i32*{{.*}}) 44; CHECK1: call void asm sideeffect "", ""() 45; CHECK1-NOT: call void @__sanitizer_cov 46; CHECK1: ret void 47 48; CHECK1-LABEL: define internal void @sancov.module_ctor 49; CHECK1-NOT: ret 50; CHECK1: call void @__sanitizer_cov_module_init({{.*}}, i64 2, {{.*}}@__sancov_gen_modname 51; CHECK1: ret 52 53; CHECK_WITH_CHECK-LABEL: define void @foo 54; CHECK_WITH_CHECK: __sanitizer_cov_with_check 55; CHECK_WITH_CHECK: ret void 56; CHECK_WITH_CHECK-LABEL: define internal void @sancov.module_ctor 57; CHECK_WITH_CHECK-NOT: ret 58; CHECK_WITH_CHECK: call void @__sanitizer_cov_module_init({{.*}}, i64 3, 59; CHECK_WITH_CHECK: ret 60 61; CHECK2-LABEL: define void @foo 62; CHECK2: call void @__sanitizer_cov 63; CHECK2: call void asm sideeffect "", ""() 64; CHECK2: call void @__sanitizer_cov 65; CHECK2: call void asm sideeffect "", ""() 66; CHECK2: call void asm sideeffect "", ""() 67; CHECK2-NOT: call void @__sanitizer_cov 68; CHECK2: ret void 69 70; CHECK2-LABEL: define internal void @sancov.module_ctor 71; CHECK2-NOT: ret 72; CHECK2: call void @__sanitizer_cov_module_init({{.*}}, i64 3, 73; CHECK2: ret 74 75; CHECK3-LABEL: define void @foo 76; CHECK3: call void @__sanitizer_cov 77; CHECK3: call void @__sanitizer_cov 78; CHECK3-NOT: ret void 79; CHECK3: call void @__sanitizer_cov 80; CHECK3-NOT: call void @__sanitizer_cov 81; CHECK3: ret void 82 83%struct.StructWithVptr = type { i32 (...)** } 84 85define void @CallViaVptr(%struct.StructWithVptr* %foo) uwtable sanitize_address { 86entry: 87 %0 = bitcast %struct.StructWithVptr* %foo to void (%struct.StructWithVptr*)*** 88 %vtable = load void (%struct.StructWithVptr*)**, void (%struct.StructWithVptr*)*** %0, align 8 89 %1 = load void (%struct.StructWithVptr*)*, void (%struct.StructWithVptr*)** %vtable, align 8 90 tail call void %1(%struct.StructWithVptr* %foo) 91 tail call void %1(%struct.StructWithVptr* %foo) 92 tail call void asm sideeffect "", ""() 93 ret void 94} 95 96; We expect to see two calls to __sanitizer_cov_indir_call16 97; with different values of second argument. 98; CHECK4-LABEL: define void @CallViaVptr 99; CHECK4: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE:.*]]) 100; CHECK4-NOT: call void @__sanitizer_cov_indir_call16({{.*}},[[CACHE]]) 101; CHECK4: ret void 102 103; CHECK_TRACE_PC-LABEL: define void @foo 104; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc 105; CHECK_TRACE_PC: call void asm sideeffect "", ""() 106; CHECK_TRACE_PC: ret void 107 108; CHECK_TRACE_PC-LABEL: define void @CallViaVptr 109; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc_indir 110; CHECK_TRACE_PC: call void @__sanitizer_cov_trace_pc_indir 111; CHECK_TRACE_PC: ret void 112 113define void @call_unreachable() uwtable sanitize_address { 114entry: 115 unreachable 116} 117 118; CHECK4-LABEL: define void @call_unreachable 119; CHECK4-NOT: __sanitizer_cov 120; CHECK4: unreachable 121 122; CHECKPRUNE-LABEL: define void @foo 123; CHECKPRUNE: call void @__sanitizer_cov 124; CHECKPRUNE: call void @__sanitizer_cov 125; CHECKPRUNE: call void @__sanitizer_cov 126; CHECKPRUNE-NOT: call void @__sanitizer_cov 127; CHECKPRUNE: ret void 128