| // RUN: echo "int extra_global;" > %t.extra-source.cpp |
| // RUN: echo "global:*ignorelisted_global*" > %t.ignorelist |
| // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-ignorelist=%t.ignorelist -emit-llvm -o - %s | FileCheck %s --check-prefixes=CHECK,GLOBS,ASAN |
| // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=kernel-address -fsanitize-ignorelist=%t.ignorelist -emit-llvm -o - %s | FileCheck %s --check-prefixes=CHECK,GLOBS,KASAN |
| // The ignorelist file uses regexps, so Windows path backslashes. |
| // RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t.ignorelist-src |
| // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-ignorelist=%t.ignorelist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=IGNORELIST-SRC |
| // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=kernel-address -fsanitize-ignorelist=%t.ignorelist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=IGNORELIST-SRC |
| |
| int global; |
| int dyn_init_global = global; |
| int __attribute__((no_sanitize("address"))) attributed_global; |
| int __attribute__((disable_sanitizer_instrumentation)) disable_instrumentation_global; |
| int ignorelisted_global; |
| extern int __attribute__((no_sanitize("address"))) external_global; |
| |
| int __attribute__((section("__DATA, __common"))) sectioned_global; // KASAN - ignore globals in a section |
| extern "C" { |
| int __special_global; // KASAN - ignore globals with __-prefix |
| } |
| |
| void func() { |
| static int static_var = 0; |
| const char *literal = "Hello, world!"; |
| external_global = 1; |
| } |
| |
| // GLOBS: @{{.*}}extra_global{{.*}} ={{.*}} global |
| // GLOBS-NOT: no_sanitize_address |
| // GLOBS: @{{.*}}global{{.*}} ={{.*}} global |
| // GLOBS-NOT: no_sanitize_address |
| // GLOBS: @{{.*}}dyn_init_global{{.*}} ={{.*}} global {{.*}}, sanitize_address_dyninit |
| // GLOBS-NOT: no_sanitize_address |
| |
| // GLOBS: @{{.*}}attributed_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // GLOBS: @{{.*}}disable_instrumentation_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // GLOBS: @{{.*}}ignorelisted_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| |
| // ASAN: @{{.*}}sectioned_global{{.*}} ={{.*}} global { i32, [28 x i8] }{{.*}}, align 32 |
| // ASAN-NOT: no_sanitize_address |
| // ASAN: @{{.*}}__special_global{{.*}} ={{.*}} global { i32, [28 x i8] }{{.*}}, align 32 |
| // ASAN-NOT: no_sanitize_address |
| |
| /// Note: No attribute is added by the IR pass, but the type didn't change, so |
| /// that checks our assertions that the globals didn't get instrumented. |
| // KASAN: @{{.*}}sectioned_global{{.*}} ={{.*}} global i32 {{.*}} |
| // KASAN: @{{.*}}__special_global{{.*}} ={{.*}} global i32 {{.*}} |
| |
| // GLOBS: @{{[^ ]*}}static_var{{[^ ]*}} ={{.*}} global {{.*}} |
| // GLOBS-NOT: no_sanitize_address |
| // GLOBS: @{{.*}} = {{.*}}c"Hello, world!\00" |
| // GLOBS-NOT: no_sanitize_address |
| |
| // GLOBS: @{{.*}}external_global{{.*}} ={{.*}} no_sanitize_address |
| |
| /// Without -fasynchronous-unwind-tables, ctor and dtor get the uwtable attribute. |
| // CHECK-LABEL: define internal void @asan.module_ctor() #[[#ATTR:]] { |
| // ASAN-NEXT: call void @__asan_init |
| // ASAN-NEXT: call void @__asan_version_mismatch_check |
| // KASAN-NOT: call void @__asan_init |
| // KASAN-NOT: call void @__asan_version_mismatch_check |
| // ASAN-NEXT: call void @__asan_register_globals({{.*}}, i{{32|64}} 7) |
| // KASAN-NEXT: call void @__asan_register_globals({{.*}}, i{{32|64}} 5) |
| // CHECK-NEXT: ret void |
| |
| // CHECK: define internal void @asan.module_dtor() #[[#ATTR]] { |
| // CHECK-NEXT: call void @__asan_unregister_globals |
| // CHECK-NEXT: ret void |
| |
| // CHECK: attributes #[[#ATTR]] = { nounwind } |
| |
| /// If -fasynchronous-unwind-tables, set the module flag "uwtable". ctor/dtor |
| /// will thus get the uwtable attribute. |
| // RUN: %clang_cc1 -emit-llvm -fsanitize=address -funwind-tables=2 -o - %s | FileCheck %s --check-prefixes=UWTABLE |
| // UWTABLE: define internal void @asan.module_dtor() #[[#ATTR:]] { |
| // UWTABLE: attributes #[[#ATTR]] = { nounwind uwtable } |
| // UWTABLE: ![[#]] = !{i32 7, !"uwtable", i32 2} |
| |
| // IGNORELIST-SRC: @{{.*}}extra_global{{.*}} ={{.*}} global |
| // IGNORELIST-SRC-NOT: no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}dyn_init_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}attributed_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}disable_instrumentation_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}ignorelisted_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}sectioned_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}__special_global{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}static_var{{.*}} ={{.*}} global {{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}} ={{.*}} c"Hello, world!\00"{{.*}} no_sanitize_address |
| // IGNORELIST-SRC: @{{.*}}external_global{{.*}} ={{.*}} no_sanitize_address |