stack-poisoning.ll 1.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243
  1. ; RUN: opt < %s -asan -asan-module -asan-use-after-return -S | FileCheck --check-prefix=CHECK-UAR %s
  2. ; RUN: opt < %s -asan -asan-module -asan-use-after-return=0 -S | FileCheck --check-prefix=CHECK-PLAIN %s
  3. target datalayout = "e-i64:64-f80:128-s:64-n8:16:32:64-S128"
  4. target triple = "x86_64-unknown-linux-gnu"
  5. declare void @Foo(i8*)
  6. define void @Bar() uwtable sanitize_address {
  7. entry:
  8. ; CHECK-PLAIN-LABEL: Bar
  9. ; CHECK-PLAIN-NOT: label
  10. ; CHECK-PLAIN: ret void
  11. ; CHECK-UAR-LABEL: Bar
  12. ; CHECK-UAR: load i32, i32* @__asan_option_detect_stack_use_after_return
  13. ; CHECK-UAR: label
  14. ; CHECK-UAR: call i64 @__asan_stack_malloc_1
  15. ; CHECK-UAR: label
  16. ; CHECK-UAR: call void @Foo
  17. ; If LocalStackBase != OrigStackBase
  18. ; CHECK-UAR: label
  19. ; Then Block: poison the entire frame.
  20. ; CHECK-UAR: store i64 -723401728380766731
  21. ; CHECK-UAR: store i64 -723401728380766731
  22. ; CHECK-UAR: store i8 0
  23. ; CHECK-UAR-NOT: store
  24. ; CHECK-UAR: label
  25. ; Else Block: no UAR frame. Only unpoison the redzones.
  26. ; CHECK-UAR: store i64 0
  27. ; CHECK-UAR: store i32 0
  28. ; CHECK-UAR-NOT: store
  29. ; CHECK-UAR: label
  30. ; Done, no more stores.
  31. ; CHECK-UAR-NOT: store
  32. ; CHECK-UAR: ret void
  33. %x = alloca [20 x i8], align 16
  34. %arraydecay = getelementptr inbounds [20 x i8], [20 x i8]* %x, i64 0, i64 0
  35. call void @Foo(i8* %arraydecay)
  36. ret void
  37. }