llvm-for-llvmta/tools/clang/test/CodeGen/catch-nullptr-and-nonzero-o...

35 lines
1.6 KiB
C

// RUN: %clang_cc1 -x c -fsanitize=pointer-overflow -fsanitize-recover=pointer-overflow -emit-llvm %s -o - -triple x86_64-linux-gnu | FileCheck %s -implicit-check-not="call void @__ubsan_handle_pointer_overflow"
// RUN: %clang_cc1 -x c -fno-delete-null-pointer-checks -fsanitize=pointer-overflow -fsanitize-recover=pointer-overflow -emit-llvm %s -o - -triple x86_64-linux-gnu | FileCheck %s -implicit-check-not="call void @__ubsan_handle_pointer_overflow"
// RUN: %clang_cc1 -x c++ -fsanitize=pointer-overflow -fsanitize-recover=pointer-overflow -emit-llvm %s -o - -triple x86_64-linux-gnu | FileCheck %s -implicit-check-not="call void @__ubsan_handle_pointer_overflow"
// RUN: %clang_cc1 -x c++ -fno-delete-null-pointer-checks -fsanitize=pointer-overflow -fsanitize-recover=pointer-overflow -emit-llvm %s -o - -triple x86_64-linux-gnu | FileCheck %s -implicit-check-not="call void @__ubsan_handle_pointer_overflow"
#ifdef __cplusplus
extern "C" {
#endif
// CHECK-LABEL: @baseline
char *baseline(char *base, unsigned long offset) {
// CHECK: call void @__ubsan_handle_pointer_overflow(
return base + offset;
}
// CHECK-LABEL: @blacklist_0
__attribute__((no_sanitize("undefined"))) char *blacklist_0(char *base, unsigned long offset) {
return base + offset;
}
// CHECK-LABEL: @blacklist_1
__attribute__((no_sanitize("pointer-overflow"))) char *blacklist_1(char *base, unsigned long offset) {
return base + offset;
}
// CHECK-LABEL: @ignore_non_default_address_space
__attribute__((address_space(1))) char *ignore_non_default_address_space(__attribute__((address_space(1))) char *base, unsigned long offset) {
return base + offset;
}
#ifdef __cplusplus
}
#endif