xref: /aosp_15_r20/external/llvm/test/Instrumentation/AddressSanitizer/stack-poisoning.ll (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker; RUN: opt < %s -asan -asan-module -asan-use-after-return -S | FileCheck --check-prefix=CHECK-UAR %s
2*9880d681SAndroid Build Coastguard Worker; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -S | FileCheck --check-prefix=CHECK-PLAIN %s
3*9880d681SAndroid Build Coastguard Workertarget datalayout = "e-i64:64-f80:128-s:64-n8:16:32:64-S128"
4*9880d681SAndroid Build Coastguard Workertarget triple = "x86_64-unknown-linux-gnu"
5*9880d681SAndroid Build Coastguard Worker
6*9880d681SAndroid Build Coastguard Workerdeclare void @Foo(i8*)
7*9880d681SAndroid Build Coastguard Worker
8*9880d681SAndroid Build Coastguard Workerdefine void @Bar() uwtable sanitize_address {
9*9880d681SAndroid Build Coastguard Workerentry:
10*9880d681SAndroid Build Coastguard Worker; CHECK-PLAIN-LABEL: Bar
11*9880d681SAndroid Build Coastguard Worker; CHECK-PLAIN-NOT: label
12*9880d681SAndroid Build Coastguard Worker; CHECK-PLAIN: ret void
13*9880d681SAndroid Build Coastguard Worker
14*9880d681SAndroid Build Coastguard Worker; CHECK-UAR-LABEL: Bar
15*9880d681SAndroid Build Coastguard Worker; CHECK-UAR: load i32, i32* @__asan_option_detect_stack_use_after_return
16*9880d681SAndroid Build Coastguard Worker; CHECK-UAR: label
17*9880d681SAndroid Build Coastguard Worker; CHECK-UAR: call i64 @__asan_stack_malloc_1
18*9880d681SAndroid Build Coastguard Worker; CHECK-UAR: label
19*9880d681SAndroid Build Coastguard Worker; CHECK-UAR: call void @Foo
20*9880d681SAndroid Build Coastguard Worker; If LocalStackBase != OrigStackBase
21*9880d681SAndroid Build Coastguard Worker; CHECK-UAR: label
22*9880d681SAndroid Build Coastguard Worker; Then Block: poison the entire frame.
23*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR: store i64 -723401728380766731
24*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR: store i64 -723401728380766731
25*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR: store i8 0
26*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR-NOT: store
27*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR: label
28*9880d681SAndroid Build Coastguard Worker; Else Block: no UAR frame. Only unpoison the redzones.
29*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR: store i64 0
30*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR: store i32 0
31*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR-NOT: store
32*9880d681SAndroid Build Coastguard Worker  ; CHECK-UAR: label
33*9880d681SAndroid Build Coastguard Worker; Done, no more stores.
34*9880d681SAndroid Build Coastguard Worker; CHECK-UAR-NOT: store
35*9880d681SAndroid Build Coastguard Worker; CHECK-UAR: ret void
36*9880d681SAndroid Build Coastguard Worker
37*9880d681SAndroid Build Coastguard Worker  %x = alloca [20 x i8], align 16
38*9880d681SAndroid Build Coastguard Worker  %arraydecay = getelementptr inbounds [20 x i8], [20 x i8]* %x, i64 0, i64 0
39*9880d681SAndroid Build Coastguard Worker  call void @Foo(i8* %arraydecay)
40*9880d681SAndroid Build Coastguard Worker  ret void
41*9880d681SAndroid Build Coastguard Worker}
42*9880d681SAndroid Build Coastguard Worker
43*9880d681SAndroid Build Coastguard Worker
44