; This test checks that we are not instrumenting sanitizer code.
; RUN: opt < %s -passes='module(sancov-module)' -sanitizer-coverage-level=3 -sanitizer-coverage-control-flow -S | FileCheck %s
target datalayout = "e-m:e-i64:64-f80:128-n8:16:32:64-S128"
target triple = "x86_64-unknown-linux-gnu"
; Function with sanitize_address is instrumented.
; Function Attrs: nounwind uwtable
define void @instr_sa(ptr %a) sanitize_address {
entry:
%tmp1 = load i32, ptr %a, align 4
%tmp2 = add i32 %tmp1, 1
store i32 %tmp2, ptr %a, align 4
ret void
}
; CHECK-LABEL: @instr_sa
; CHECK: call void @__sanitizer_cov_trace_pc_guard(
; Function with disable_sanitizer_instrumentation is not instrumented.
; Function Attrs: nounwind uwtable
define void @noinstr_dsi(ptr %a) disable_sanitizer_instrumentation {
entry:
%tmp1 = load i32, ptr %a, align 4
%tmp2 = add i32 %tmp1, 1
store i32 %tmp2, ptr %a, align 4
ret void
}
; CHECK-LABEL: @noinstr_dsi
; CHECK-NOT: call void @__sanitizer_cov_trace_pc_guard(
; disable_sanitizer_instrumentation takes precedence over sanitize_address.
; Function Attrs: nounwind uwtable
define void @noinstr_dsi_sa(ptr %a) disable_sanitizer_instrumentation sanitize_address {
entry:
%tmp1 = load i32, ptr %a, align 4
%tmp2 = add i32 %tmp1, 1
store i32 %tmp2, ptr %a, align 4
ret void
}
; CHECK-LABEL: @noinstr_dsi_sa
; CHECK-NOT: call void @__sanitizer_cov_trace_pc_guard(