|
@@ -1,9 +1,16 @@
|
|
-// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s | FileCheck -check-prefix=WITHOUT %s
|
|
|
|
-// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=address | FileCheck -check-prefix=ASAN %s
|
|
|
|
-// RUN: echo "src:%s" > %t.file.blacklist
|
|
|
|
|
|
+int DefinedInDifferentFile(int *a);
|
|
|
|
+// RUN: echo "int DefinedInDifferentFile(int *a) { return *a; }" > %t.extra-source.cpp
|
|
|
|
+// RUN: echo "struct S { S(){} ~S(){} };" >> %t.extra-source.cpp
|
|
|
|
+// RUN: echo "S glob_array[5];" >> %t.extra-source.cpp
|
|
|
|
+
|
|
|
|
+// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp | FileCheck -check-prefix=WITHOUT %s
|
|
|
|
+// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address | FileCheck -check-prefix=ASAN %s
|
|
|
|
+
|
|
// RUN: echo "fun:*BlacklistedFunction*" > %t.func.blacklist
|
|
// RUN: echo "fun:*BlacklistedFunction*" > %t.func.blacklist
|
|
-// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=address -fsanitize-blacklist=%t.file.blacklist | FileCheck -check-prefix=BLFILE %s
|
|
|
|
-// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=address -fsanitize-blacklist=%t.func.blacklist | FileCheck -check-prefix=BLFUNC %s
|
|
|
|
|
|
+// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.func.blacklist | FileCheck -check-prefix=BLFUNC %s
|
|
|
|
+
|
|
|
|
+// RUN: echo "src:%s" > %t.file.blacklist
|
|
|
|
+// RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.file.blacklist | FileCheck -check-prefix=BLFILE %s
|
|
|
|
|
|
// FIXME: %t.file.blacklist is like "src:x:\path\to\clang\test\CodeGen\address-safety-attr.cpp"
|
|
// FIXME: %t.file.blacklist is like "src:x:\path\to\clang\test\CodeGen\address-safety-attr.cpp"
|
|
// REQUIRES: shell
|
|
// REQUIRES: shell
|
|
@@ -12,7 +19,25 @@
|
|
// when AddressSanitizer is enabled, unless no_sanitize_address attribute
|
|
// when AddressSanitizer is enabled, unless no_sanitize_address attribute
|
|
// is present.
|
|
// is present.
|
|
|
|
|
|
-// WITHOUT: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
|
|
|
|
|
|
+// Attributes for function defined in different source file:
|
|
|
|
+// WITHOUT: DefinedInDifferentFile{{.*}} [[NOATTR:#[0-9]+]]
|
|
|
|
+// BLFILE: DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
|
|
|
|
+// BLFUNC: DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
|
|
|
|
+// ASAN: DefinedInDifferentFile{{.*}} [[WITH:#[0-9]+]]
|
|
|
|
+
|
|
|
|
+// Check that functions generated for global in different source file are
|
|
|
|
+// not blacklisted.
|
|
|
|
+// WITHOUT: @__cxx_global_var_init{{.*}}[[NOATTR_NO_TF:#[0-9]+]]
|
|
|
|
+// WITHOUT: @__cxx_global_array_dtor{{.*}}[[NOATTR_NO_TF]]
|
|
|
|
+// BLFILE: @__cxx_global_var_init{{.*}}[[WITH_NO_TF:#[0-9]+]]
|
|
|
|
+// BLFILE: @__cxx_global_array_dtor{{.*}}[[WITH_NO_TF]]
|
|
|
|
+// BLFUNC: @__cxx_global_var_init{{.*}}[[WITH_NO_TF:#[0-9]+]]
|
|
|
|
+// BLFUNC: @__cxx_global_array_dtor{{.*}}[[WITH_NO_TF]]
|
|
|
|
+// ASAN: @__cxx_global_var_init{{.*}}[[WITH_NO_TF:#[0-9]+]]
|
|
|
|
+// ASAN: @__cxx_global_array_dtor{{.*}}[[WITH_NO_TF]]
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+// WITHOUT: NoAddressSafety1{{.*}}) [[NOATTR]]
|
|
// BLFILE: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
|
|
// BLFILE: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
|
|
// BLFUNC: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
|
|
// BLFUNC: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
|
|
// ASAN: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
|
|
// ASAN: NoAddressSafety1{{.*}}) [[NOATTR:#[0-9]+]]
|
|
@@ -29,8 +54,8 @@ int NoAddressSafety2(int *a) { return *a; }
|
|
|
|
|
|
// WITHOUT: AddressSafetyOk{{.*}}) [[NOATTR]]
|
|
// WITHOUT: AddressSafetyOk{{.*}}) [[NOATTR]]
|
|
// BLFILE: AddressSafetyOk{{.*}}) [[NOATTR]]
|
|
// BLFILE: AddressSafetyOk{{.*}}) [[NOATTR]]
|
|
-// BLFUNC: AddressSafetyOk{{.*}}) [[WITH:#[0-9]+]]
|
|
|
|
-// ASAN: AddressSafetyOk{{.*}}) [[WITH:#[0-9]+]]
|
|
|
|
|
|
+// BLFUNC: AddressSafetyOk{{.*}}) [[WITH]]
|
|
|
|
+// ASAN: AddressSafetyOk{{.*}}) [[WITH]]
|
|
int AddressSafetyOk(int *a) { return *a; }
|
|
int AddressSafetyOk(int *a) { return *a; }
|
|
|
|
|
|
// WITHOUT: BlacklistedFunction{{.*}}) [[NOATTR]]
|
|
// WITHOUT: BlacklistedFunction{{.*}}) [[NOATTR]]
|
|
@@ -60,21 +85,23 @@ int force_instance = TemplateAddressSafetyOk<42>()
|
|
// Check that __cxx_global_var_init* get the sanitize_address attribute.
|
|
// Check that __cxx_global_var_init* get the sanitize_address attribute.
|
|
int global1 = 0;
|
|
int global1 = 0;
|
|
int global2 = *(int*)((char*)&global1+1);
|
|
int global2 = *(int*)((char*)&global1+1);
|
|
-// WITHOUT: @__cxx_global_var_init{{.*}}[[NOATTR_NO_TF:#[0-9]+]]
|
|
|
|
|
|
+// WITHOUT: @__cxx_global_var_init{{.*}}[[NOATTR_NO_TF]]
|
|
// BLFILE: @__cxx_global_var_init{{.*}}[[NOATTR_NO_TF:#[0-9]+]]
|
|
// BLFILE: @__cxx_global_var_init{{.*}}[[NOATTR_NO_TF:#[0-9]+]]
|
|
-// BLFUNC: @__cxx_global_var_init{{.*}}[[WITH_NO_TF:#[0-9]+]]
|
|
|
|
-// ASAN: @__cxx_global_var_init{{.*}}[[WITH_NO_TF:#[0-9]+]]
|
|
|
|
|
|
+// BLFUNC: @__cxx_global_var_init{{.*}}[[WITH_NO_TF]]
|
|
|
|
+// ASAN: @__cxx_global_var_init{{.*}}[[WITH_NO_TF]]
|
|
|
|
|
|
// WITHOUT: attributes [[NOATTR]] = { nounwind{{.*}} }
|
|
// WITHOUT: attributes [[NOATTR]] = { nounwind{{.*}} }
|
|
// WITHOUT: attributes [[NOATTR_NO_TF]] = { nounwind }
|
|
// WITHOUT: attributes [[NOATTR_NO_TF]] = { nounwind }
|
|
|
|
|
|
-// BLFILE: attributes [[NOATTR]] = { nounwind{{.*}} }
|
|
|
|
|
|
+// BLFILE: attributes [[WITH]] = { nounwind sanitize_address{{.*}} }
|
|
|
|
+// BLFILE: attributes [[WITH_NO_TF]] = { nounwind sanitize_address }
|
|
// BLFILE: attributes [[NOATTR_NO_TF]] = { nounwind }
|
|
// BLFILE: attributes [[NOATTR_NO_TF]] = { nounwind }
|
|
|
|
+// BLFILE: attributes [[NOATTR]] = { nounwind{{.*}} }
|
|
|
|
|
|
-// BLFUNC: attributes [[NOATTR]] = { nounwind{{.*}} }
|
|
|
|
// BLFUNC: attributes [[WITH]] = { nounwind sanitize_address{{.*}} }
|
|
// BLFUNC: attributes [[WITH]] = { nounwind sanitize_address{{.*}} }
|
|
// BLFUNC: attributes [[WITH_NO_TF]] = { nounwind sanitize_address }
|
|
// BLFUNC: attributes [[WITH_NO_TF]] = { nounwind sanitize_address }
|
|
|
|
+// BLFUNC: attributes [[NOATTR]] = { nounwind{{.*}} }
|
|
|
|
|
|
-// ASAN: attributes [[NOATTR]] = { nounwind{{.*}} }
|
|
|
|
// ASAN: attributes [[WITH]] = { nounwind sanitize_address{{.*}} }
|
|
// ASAN: attributes [[WITH]] = { nounwind sanitize_address{{.*}} }
|
|
// ASAN: attributes [[WITH_NO_TF]] = { nounwind sanitize_address }
|
|
// ASAN: attributes [[WITH_NO_TF]] = { nounwind sanitize_address }
|
|
|
|
+// ASAN: attributes [[NOATTR]] = { nounwind{{.*}} }
|