summaryrefslogtreecommitdiffstats
path: root/test/CodeGen/address-safety-attr-kasan.cpp
blob: c84ba88291dac965f8889eeebc1ffefd382d5cf6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
// Make sure the sanitize_address attribute is emitted when using both ASan and KASan.
// Also document that __attribute__((no_sanitize_address)) doesn't disable KASan instrumentation.

/// RUN: %clang_cc1 -triple i386-unknown-linux -emit-llvm -o - %s | FileCheck -check-prefix=CHECK-NOASAN %s
/// RUN: %clang_cc1 -triple i386-unknown-linux -fsanitize=address -emit-llvm -o - %s | FileCheck -check-prefix=CHECK-ASAN %s
/// RUN: %clang_cc1 -triple i386-unknown-linux -fsanitize=kernel-address -emit-llvm -o - %s | FileCheck -check-prefix=CHECK-KASAN %s

int HasSanitizeAddress() {
  return 1;
}
// CHECK-NOASAN: {{Function Attrs: nounwind$}}
// CHECK-ASAN: Function Attrs: nounwind sanitize_address
// CHECK-KASAN: Function Attrs: nounwind sanitize_address

__attribute__((no_sanitize("address")))
int NoSanitizeQuoteAddress() {
  return 0;
}
// CHECK-NOASAN: {{Function Attrs: nounwind$}}
// CHECK-ASAN: {{Function Attrs: nounwind$}}
// CHECK-KASAN: {{Function Attrs: nounwind sanitize_address$}}

__attribute__((no_sanitize_address))
int NoSanitizeAddress() {
  return 0;
}
// CHECK-NOASAN: {{Function Attrs: nounwind$}}
// CHECK-ASAN: {{Function Attrs: nounwind$}}
// CHECK-KASAN: {{Function Attrs: nounwind sanitize_address$}}

__attribute__((no_sanitize("kernel-address")))
int NoSanitizeKernelAddress() {
  return 0;
}

// CHECK-NOASAN: {{Function Attrs: nounwind$}}
// CHECK-ASAN: {{Function Attrs: nounwind sanitize_address$}}
// CHECK-KASAN: {{Function Attrs: nounwind$}}