| // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOBL %s |
| |
| // Check that blacklisting cfi and cfi-vcall work correctly |
| // RUN: echo "[cfi-vcall]" > %t.vcall.txt |
| // RUN: echo "type:std::*" >> %t.vcall.txt |
| // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -fsanitize-blacklist=%t.vcall.txt -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOSTD %s |
| // |
| // RUN: echo "[cfi]" > %t.cfi.txt |
| // RUN: echo "type:std::*" >> %t.cfi.txt |
| // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -fsanitize-blacklist=%t.cfi.txt -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOSTD %s |
| |
| // Check that blacklisting non-vcall modes does not affect vcalls |
| // RUN: echo "[cfi-icall|cfi-nvcall|cfi-cast-strict|cfi-derived-cast|cfi-unrelated-cast]" > %t.other.txt |
| // RUN: echo "type:std::*" >> %t.other.txt |
| // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -fsanitize-blacklist=%t.other.txt -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOBL %s |
| |
| struct S1 { |
| virtual void f(); |
| }; |
| |
| namespace std { |
| |
| struct S2 { |
| virtual void f(); |
| }; |
| |
| } |
| |
| // CHECK: define{{.*}}s1f |
| // NOBL: llvm.type.test |
| // NOSTD: llvm.type.test |
| void s1f(S1 *s1) { |
| s1->f(); |
| } |
| |
| // CHECK: define{{.*}}s2f |
| // NOBL: llvm.type.test |
| // NOSTD-NOT: llvm.type.test |
| void s2f(std::S2 *s2) { |
| s2->f(); |
| } |