Skip to content

Commit fe7f5f9

Browse files
authored
[NFC][Intrumentation] Don't brake long RUN: lines (#112281)
I find multiline 'RUN:' statements hard to read. ` *\\\n; RUN: *` -> ` ` for ./llvm/test/Instrumentation/
1 parent 7d7fb7c commit fe7f5f9

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+112
-265
lines changed

llvm/test/Instrumentation/AddressSanitizer/asan-detect-invalid-pointer-pair.ll

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,6 @@
1-
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-cmp -S \
2-
; RUN: | FileCheck %s --check-prefixes=CMP,NOSUB,ALL
3-
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-sub -S \
4-
; RUN: | FileCheck %s --check-prefixes=SUB,NOCMP,ALL
5-
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-pair -S \
6-
; RUN: | FileCheck %s --check-prefixes=CMP,SUB,ALL
1+
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-cmp -S | FileCheck %s --check-prefixes=CMP,NOSUB,ALL
2+
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-sub -S | FileCheck %s --check-prefixes=SUB,NOCMP,ALL
3+
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-pair -S | FileCheck %s --check-prefixes=CMP,SUB,ALL
74
; Support instrumentation of invalid pointer pair detection.
85

96
target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"

llvm/test/Instrumentation/AddressSanitizer/asan-funclet.ll

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,8 @@
11
; NOTE: Assertions have been autogenerated by utils/update_test_checks.py UTC_ARGS: --version 4
22

33
; Test appropriate tagging of funclet for function calls generated by asan.
4-
; RUN: opt -S -passes=asan,win-eh-prepare -asan-use-stack-safety=0 -asan-max-inline-poisoning-size=0 \
5-
; RUN: -asan-detect-invalid-pointer-cmp -asan-detect-invalid-pointer-sub -asan-use-after-scope < %s | FileCheck %s --check-prefixes=CHECK,CHECK-INLINE
6-
; RUN: opt -S -passes=asan,win-eh-prepare -asan-use-stack-safety=0 -asan-max-inline-poisoning-size=0 -asan-instrumentation-with-call-threshold=0 \
7-
; RUN: -asan-detect-invalid-pointer-cmp -asan-detect-invalid-pointer-sub -asan-use-after-scope < %s | FileCheck %s --check-prefixes=CHECK,CHECK-OUTLINE
4+
; RUN: opt -S -passes=asan,win-eh-prepare -asan-use-stack-safety=0 -asan-max-inline-poisoning-size=0 -asan-detect-invalid-pointer-cmp -asan-detect-invalid-pointer-sub -asan-use-after-scope < %s | FileCheck %s --check-prefixes=CHECK,CHECK-INLINE
5+
; RUN: opt -S -passes=asan,win-eh-prepare -asan-use-stack-safety=0 -asan-max-inline-poisoning-size=0 -asan-instrumentation-with-call-threshold=0 -asan-detect-invalid-pointer-cmp -asan-detect-invalid-pointer-sub -asan-use-after-scope < %s | FileCheck %s --check-prefixes=CHECK,CHECK-OUTLINE
86

97
; REQUIRES: x86-registered-target
108

llvm/test/Instrumentation/AddressSanitizer/asan-masked-load-store.ll

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
; NOTE: Assertions have been autogenerated by utils/update_test_checks.py
2-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -S \
3-
; RUN: | FileCheck %s
4-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -asan-instrument-reads=0 -asan-instrument-writes=0 -S \
5-
; RUN: | FileCheck %s -check-prefix=DISABLED
2+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -S | FileCheck %s
3+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -asan-instrument-reads=0 -asan-instrument-writes=0 -S | FileCheck %s -check-prefix=DISABLED
64

75
; Support ASan instrumentation for constant-mask llvm.masked.{load,store}
86

llvm/test/Instrumentation/AddressSanitizer/asan-optimize-callbacks.ll

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,5 @@
1-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 \
2-
; RUN: -asan-optimize-callbacks -S | FileCheck %s --check-prefixes=LOAD,STORE
3-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 \
4-
; RUN: -asan-optimize-callbacks --asan-kernel -S | \
5-
; RUN: FileCheck %s --check-prefixes=LOAD-KERNEL,STORE-KERNEL
1+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -asan-optimize-callbacks -S | FileCheck %s --check-prefixes=LOAD,STORE
2+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -asan-optimize-callbacks --asan-kernel -S | FileCheck %s --check-prefixes=LOAD-KERNEL,STORE-KERNEL
63

74
target triple = "x86_64-unknown-linux-gnu"
85

llvm/test/Instrumentation/AddressSanitizer/asan-vp-load-store.ll

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
; NOTE: Assertions have been autogenerated by utils/update_test_checks.py
2-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -S \
3-
; RUN: | FileCheck %s
4-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -asan-instrument-reads=0 -asan-instrument-writes=0 -S \
5-
; RUN: | FileCheck %s -check-prefix=DISABLED
2+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -S | FileCheck %s
3+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -asan-instrument-reads=0 -asan-instrument-writes=0 -S | FileCheck %s -check-prefix=DISABLED
64

75
; Support ASan instrumentation for constant-mask llvm.vp.{load,store}
86

llvm/test/Instrumentation/AddressSanitizer/freebsd.ll

Lines changed: 7 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,10 @@
1-
; RUN: opt < %s -passes=asan -S \
2-
; RUN: -mtriple=i386-unknown-freebsd \
3-
; RUN: -data-layout="e-m:e-p:32:32-f64:32:64-f80:32-n8:16:32-S128" | \
4-
; RUN: FileCheck --check-prefix=CHECK-32 %s
5-
6-
; RUN: opt < %s -passes=asan -S \
7-
; RUN: -mtriple=x86_64-unknown-freebsd \
8-
; RUN: -data-layout="e-m:e-i64:64-f80:128-n8:16:32:64-S128" | \
9-
; RUN: FileCheck --check-prefix=CHECK-64 %s
10-
11-
; RUN: opt < %s -passes=asan -S \
12-
; RUN: -mtriple=aarch64-unknown-freebsd \
13-
; RUN: -data-layout="e-m:e-i8:8:32-i16:16:32-i64:64-i128:128-n32:64-S128" | \
14-
; RUN: FileCheck --check-prefix=CHECK-AARCH64 %s
15-
16-
; RUN: opt < %s -passes=asan -S \
17-
; RUN: -mtriple=mips64-unknown-freebsd \
18-
; RUN: -data-layout="E-m:e-i64:64-n32:64-S128" | \
19-
; RUN: FileCheck --check-prefix=CHECK-MIPS64 %s
1+
; RUN: opt < %s -passes=asan -S -mtriple=i386-unknown-freebsd -data-layout="e-m:e-p:32:32-f64:32:64-f80:32-n8:16:32-S128" | FileCheck --check-prefix=CHECK-32 %s
2+
3+
; RUN: opt < %s -passes=asan -S -mtriple=x86_64-unknown-freebsd -data-layout="e-m:e-i64:64-f80:128-n8:16:32:64-S128" | FileCheck --check-prefix=CHECK-64 %s
4+
5+
; RUN: opt < %s -passes=asan -S -mtriple=aarch64-unknown-freebsd -data-layout="e-m:e-i8:8:32-i16:16:32-i64:64-i128:128-n32:64-S128" | FileCheck --check-prefix=CHECK-AARCH64 %s
6+
7+
; RUN: opt < %s -passes=asan -S -mtriple=mips64-unknown-freebsd -data-layout="E-m:e-i64:64-n32:64-S128" | FileCheck --check-prefix=CHECK-MIPS64 %s
208

219
define i32 @read_4_bytes(ptr %a) sanitize_address {
2210
entry:

llvm/test/Instrumentation/AddressSanitizer/no-global-ctors.ll

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,10 @@
11
; Check Default behaviour still emits ctors
2-
; RUN: opt < %s -passes=asan -S | \
3-
; RUN: FileCheck -check-prefix=CHECK-DEFAULT %s
2+
; RUN: opt < %s -passes=asan -S | FileCheck -check-prefix=CHECK-DEFAULT %s
43
; CHECK-DEFAULT: llvm.global_ctor{{.+}}asan.module_ctor
54
; CHECK-DEFAULT: define internal void @asan.module_ctor
65

76
; Check with ctor emission disabled
8-
; RUN: opt < %s -passes=asan \
9-
; RUN: -asan-constructor-kind=none -S | \
10-
; RUN: FileCheck %s
7+
; RUN: opt < %s -passes=asan -asan-constructor-kind=none -S | FileCheck %s
118
; CHECK-NOT: llvm.global_ctor{{.+}}asan.module_ctor
129
; CHECK-NOT: define internal void @asan.module_ctor
1310

llvm/test/Instrumentation/AddressSanitizer/no_global_dtors.ll

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,10 @@
11
; Check Default behaviour still emits dtors
2-
; RUN: opt < %s -passes=asan -S | \
3-
; RUN: FileCheck -check-prefix=CHECK-DEFAULT %s
2+
; RUN: opt < %s -passes=asan -S | FileCheck -check-prefix=CHECK-DEFAULT %s
43
; CHECK-DEFAULT: llvm.global_dtor{{.+}}asan.module_dtor
54
; CHECK-DEFAULT: define internal void @asan.module_dtor
65

76
; Check with dtor emission disabled
8-
; RUN: opt < %s -passes=asan \
9-
; RUN: -asan-destructor-kind=none -S | \
10-
; RUN: FileCheck %s
7+
; RUN: opt < %s -passes=asan -asan-destructor-kind=none -S | FileCheck %s
118
; CHECK-NOT: llvm.global_dtor{{.+}}asan.module_dtor
129
; CHECK-NOT: define internal void @asan.module_dtor
1310

llvm/test/Instrumentation/AddressSanitizer/stack_dynamic_alloca.ll

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,7 @@
1-
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-use-stack-safety=0 \
2-
; RUN: -asan-use-after-return=runtime -S | FileCheck %s \
3-
; RUN: --check-prefixes=CHECK,CHECK-RUNTIME
4-
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-mapping-scale=5 -asan-use-stack-safety=0 \
5-
; RUN: -asan-use-after-return=runtime -S | FileCheck %s \
6-
; RUN: --check-prefixes=CHECK,CHECK-RUNTIME
7-
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-use-stack-safety=0 \
8-
; RUN: -asan-use-after-return=always -S | FileCheck %s \
9-
; RUN: --check-prefixes=CHECK,CHECK-ALWAYS \
10-
; RUN: --implicit-check-not=__asan_option_detect_stack_use_after_return
11-
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-use-stack-safety=0 \
12-
; RUN: -asan-use-after-return=always -S | FileCheck %s \
13-
; RUN: --check-prefixes=CHECK,CHECK-ALWAYS \
14-
; RUN: --implicit-check-not=__asan_option_detect_stack_use_after_return
1+
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-use-stack-safety=0 -asan-use-after-return=runtime -S | FileCheck %s --check-prefixes=CHECK,CHECK-RUNTIME
2+
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-mapping-scale=5 -asan-use-stack-safety=0 -asan-use-after-return=runtime -S | FileCheck %s --check-prefixes=CHECK,CHECK-RUNTIME
3+
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-use-stack-safety=0 -asan-use-after-return=always -S | FileCheck %s --check-prefixes=CHECK,CHECK-ALWAYS --implicit-check-not=__asan_option_detect_stack_use_after_return
4+
; RUN: opt < %s -passes=asan -asan-stack-dynamic-alloca -asan-use-stack-safety=0 -asan-use-after-return=always -S | FileCheck %s --check-prefixes=CHECK,CHECK-ALWAYS --implicit-check-not=__asan_option_detect_stack_use_after_return
155
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
166
target triple = "x86_64-unknown-linux-gnu"
177

llvm/test/Instrumentation/AddressSanitizer/stack_layout.ll

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
11
; Test the ASan's stack layout.
22
; More tests in tests/Transforms/Utils/ASanStackFrameLayoutTest.cpp
3-
; RUN: opt < %s -passes=asan -asan-use-stack-safety=0 -asan-stack-dynamic-alloca=0 -asan-use-after-scope -S \
4-
; RUN: | FileCheck %s --check-prefixes=CHECK,CHECK-STATIC
5-
; RUN: opt < %s -passes=asan -asan-use-stack-safety=0 -asan-stack-dynamic-alloca=1 -asan-use-after-scope -S \
6-
; RUN: | FileCheck %s --check-prefixes=CHECK,CHECK-DYNAMIC
3+
; RUN: opt < %s -passes=asan -asan-use-stack-safety=0 -asan-stack-dynamic-alloca=0 -asan-use-after-scope -S | FileCheck %s --check-prefixes=CHECK,CHECK-STATIC
4+
; RUN: opt < %s -passes=asan -asan-use-stack-safety=0 -asan-stack-dynamic-alloca=1 -asan-use-after-scope -S | FileCheck %s --check-prefixes=CHECK,CHECK-DYNAMIC
75

86
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
97
target triple = "x86_64-unknown-linux-gnu"

llvm/test/Instrumentation/AddressSanitizer/ubsan.ll

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
11
; ASan shouldn't instrument code added by UBSan.
22

33
; RUN: opt < %s -passes=asan -S | FileCheck %s
4-
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-cmp -S \
5-
; RUN: | FileCheck %s --check-prefixes=NOCMP
4+
; RUN: opt < %s -passes=asan -asan-detect-invalid-pointer-cmp -S | FileCheck %s --check-prefixes=NOCMP
65

76
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64"
87
target triple = "x86_64-unknown-linux-gnu"

llvm/test/Instrumentation/AddressSanitizer/vector-load-store.ll

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
; NOTE: Assertions have been autogenerated by utils/update_test_checks.py
2-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=100 -S \
3-
; RUN: | FileCheck %s
4-
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -S \
5-
; RUN: | FileCheck %s -check-prefix=CALLS
2+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=100 -S | FileCheck %s
3+
; RUN: opt < %s -passes=asan -asan-instrumentation-with-call-threshold=0 -S | FileCheck %s -check-prefix=CALLS
64

75
target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
86

llvm/test/Instrumentation/AddressSanitizer/with-ifunc.ll

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,13 @@
11
; Test -asan-with-ifunc flag.
22
;
3-
; RUN: opt -passes=asan -S -asan-with-ifunc=0 < %s | \
4-
; RUN: FileCheck %s --check-prefixes=CHECK,CHECK-NOIFUNC
5-
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 < %s | \
6-
; RUN: FileCheck %s --check-prefixes=CHECK,CHECK-IFUNC
7-
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=1 < %s | \
8-
; RUN: FileCheck %s --check-prefixes=CHECK,CHECK-IFUNC-NOREMAT
3+
; RUN: opt -passes=asan -S -asan-with-ifunc=0 < %s | FileCheck %s --check-prefixes=CHECK,CHECK-NOIFUNC
4+
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 < %s | FileCheck %s --check-prefixes=CHECK,CHECK-IFUNC
5+
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=1 < %s | FileCheck %s --check-prefixes=CHECK,CHECK-IFUNC-NOREMAT
96

107
; Pre-Lollipop Android does not support ifunc.
11-
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv7-linux-android20 < %s | \
12-
; RUN: FileCheck %s --check-prefixes=CHECK,CHECK-NOIFUNC
13-
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv7-linux-android < %s | \
14-
; RUN: FileCheck %s --check-prefixes=CHECK,CHECK-NOIFUNC
15-
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv7-linux-android21 < %s | \
16-
; RUN: FileCheck %s --check-prefixes=CHECK,CHECK-IFUNC
8+
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv7-linux-android20 < %s | FileCheck %s --check-prefixes=CHECK,CHECK-NOIFUNC
9+
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv7-linux-android < %s | FileCheck %s --check-prefixes=CHECK,CHECK-NOIFUNC
10+
; RUN: opt -passes=asan -S -asan-with-ifunc=1 -asan-with-ifunc-suppress-remat=0 -mtriple=armv7-linux-android21 < %s | FileCheck %s --check-prefixes=CHECK,CHECK-IFUNC
1711

1812
target datalayout = "e-m:e-p:32:32-i64:64-v128:64:128-a:0:32-n32-S64"
1913
target triple = "armv7--linux-android22"

llvm/test/Instrumentation/HWAddressSanitizer/prologue.ll

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,13 @@
11
; NOTE: Assertions have been autogenerated by utils/update_test_checks.py UTC_ARGS: --check-globals --global-value-regex "![0-9]+" --version 2
22
; Test -hwasan-with-ifunc flag.
33
;
4-
; RUN: opt -passes=hwasan -S < %s | \
5-
; RUN: FileCheck %s
6-
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=tls -hwasan-record-stack-history=instr < %s | \
7-
; RUN: FileCheck %s --check-prefixes=NOIFUNC-TLS-HISTORY
8-
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=tls -hwasan-record-stack-history=none < %s | \
9-
; RUN: FileCheck %s --check-prefixes=NOIFUNC-TLS-NOHISTORY
10-
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=global -hwasan-with-frame-record=0 < %s | \
11-
; RUN: FileCheck %s --check-prefixes=NOIFUNC-NOTLS
12-
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=ifunc -hwasan-with-frame-record=0 < %s | \
13-
; RUN: FileCheck %s --check-prefixes=IFUNC-NOTLS
14-
; RUN: opt -passes=hwasan -S -mtriple=aarch64-fuchsia < %s | \
15-
; RUN: FileCheck %s --check-prefixes=FUCHSIA
16-
; RUN: opt -passes=hwasan -S -mtriple=aarch64-fuchsia -hwasan-record-stack-history=libcall < %s | \
17-
; RUN: FileCheck %s --check-prefixes=FUCHSIA-LIBCALL
4+
; RUN: opt -passes=hwasan -S < %s | FileCheck %s
5+
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=tls -hwasan-record-stack-history=instr < %s | FileCheck %s --check-prefixes=NOIFUNC-TLS-HISTORY
6+
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=tls -hwasan-record-stack-history=none < %s | FileCheck %s --check-prefixes=NOIFUNC-TLS-NOHISTORY
7+
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=global -hwasan-with-frame-record=0 < %s | FileCheck %s --check-prefixes=NOIFUNC-NOTLS
8+
; RUN: opt -passes=hwasan -S -hwasan-mapping-offset-dynamic=ifunc -hwasan-with-frame-record=0 < %s | FileCheck %s --check-prefixes=IFUNC-NOTLS
9+
; RUN: opt -passes=hwasan -S -mtriple=aarch64-fuchsia < %s | FileCheck %s --check-prefixes=FUCHSIA
10+
; RUN: opt -passes=hwasan -S -mtriple=aarch64-fuchsia -hwasan-record-stack-history=libcall < %s | FileCheck %s --check-prefixes=FUCHSIA-LIBCALL
1811

1912
target datalayout = "e-m:e-i8:8:32-i16:16:32-i64:64-i128:128-n32:64-S128"
2013
target triple = "aarch64--linux-android22"

llvm/test/Instrumentation/HWAddressSanitizer/stack-coloring.ll

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,8 @@
11
; Test that storage for allocas with disjoint lifetimes is reused with
22
; use-after-scope.
33

4-
; RUN: opt -S -passes=hwasan %s -hwasan-use-after-scope -o - | \
5-
; RUN: llc -no-stack-coloring=false -o - | \
6-
; RUN: FileCheck %s --check-prefix=COLOR
7-
; RUN: opt -S -passes=hwasan -hwasan-use-after-scope %s -o - | \
8-
; RUN: llc -no-stack-coloring=true -o - | \
9-
; RUN: FileCheck %s --check-prefix=NOCOLOR
4+
; RUN: opt -S -passes=hwasan %s -hwasan-use-after-scope -o - | llc -no-stack-coloring=false -o - | FileCheck %s --check-prefix=COLOR
5+
; RUN: opt -S -passes=hwasan -hwasan-use-after-scope %s -o - | llc -no-stack-coloring=true -o - | FileCheck %s --check-prefix=NOCOLOR
106

117
target datalayout = "e-m:e-i8:8:32-i16:16:32-i64:64-i128:128-n32:64-S128"
128
target triple = "aarch64-unknown-linux-android29"

llvm/test/Instrumentation/HWAddressSanitizer/use-after-scope.ll

Lines changed: 6 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,12 @@
11
; NOTE: Assertions have been autogenerated by utils/update_test_checks.py
22
; REQUIRES: aarch64-registered-target, x86-registered-target
3-
; RUN: opt -mtriple=x86_64-unknown-linux-gnu -passes=hwasan \
4-
; RUN: -hwasan-use-after-scope=1 -hwasan-generate-tags-with-calls -S < %s | \
5-
; RUN: FileCheck %s --check-prefixes=X86-SCOPE
6-
; RUN: opt -mtriple=x86_64-unknown-linux-gnu -passes=hwasan \
7-
; RUN: -hwasan-use-after-scope=0 -hwasan-generate-tags-with-calls -S < %s | \
8-
; RUN: FileCheck %s --check-prefixes=X86-NOSCOPE
3+
; RUN: opt -mtriple=x86_64-unknown-linux-gnu -passes=hwasan -hwasan-use-after-scope=1 -hwasan-generate-tags-with-calls -S < %s | FileCheck %s --check-prefixes=X86-SCOPE
4+
; RUN: opt -mtriple=x86_64-unknown-linux-gnu -passes=hwasan -hwasan-use-after-scope=0 -hwasan-generate-tags-with-calls -S < %s | FileCheck %s --check-prefixes=X86-NOSCOPE
95

10-
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan \
11-
; RUN: -hwasan-use-after-scope=1 -hwasan-generate-tags-with-calls -S < %s | \
12-
; RUN: FileCheck %s --check-prefixes=AARCH64-SCOPE
13-
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan \
14-
; RUN: -hwasan-use-after-scope=0 -hwasan-generate-tags-with-calls -S < %s | \
15-
; RUN: FileCheck %s --check-prefixes=AARCH64-NOSCOPE
16-
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan \
17-
; RUN: -hwasan-use-after-scope=1 -hwasan-generate-tags-with-calls \
18-
; RUN: -hwasan-use-short-granules=1 -S < %s | \
19-
; RUN: FileCheck %s --check-prefixes=AARCH64-SHORT-SCOPE
20-
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan \
21-
; RUN: -hwasan-use-after-scope=0 -hwasan-generate-tags-with-calls \
22-
; RUN: -hwasan-use-short-granules=1 -S < %s | \
23-
; RUN: FileCheck %s --check-prefixes=AARCH64-SHORT-NOSCOPE
6+
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan -hwasan-use-after-scope=1 -hwasan-generate-tags-with-calls -S < %s | FileCheck %s --check-prefixes=AARCH64-SCOPE
7+
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan -hwasan-use-after-scope=0 -hwasan-generate-tags-with-calls -S < %s | FileCheck %s --check-prefixes=AARCH64-NOSCOPE
8+
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan -hwasan-use-after-scope=1 -hwasan-generate-tags-with-calls -hwasan-use-short-granules=1 -S < %s | FileCheck %s --check-prefixes=AARCH64-SHORT-SCOPE
9+
; RUN: opt -mtriple=aarch64-unknown-linux-android29 -passes=hwasan -hwasan-use-after-scope=0 -hwasan-generate-tags-with-calls -hwasan-use-short-granules=1 -S < %s | FileCheck %s --check-prefixes=AARCH64-SHORT-NOSCOPE
2410

2511

2612
define dso_local i32 @standard_lifetime() local_unnamed_addr sanitize_hwaddress {

0 commit comments

Comments
 (0)