
Implement -sanitizer-coverage-gated-trace-callbacks to gate the invocation of the tracing callbacks based on the value of a global variable, which is stored in a specific section. When this option is enabled, the instrumentation will not call into the runtime-provided callbacks for tracing, thus only incurring in a trivial branch without going through a function call. It is up to the runtime to toggle the value of the global variable in order to enable tracing. This option is only supported for trace-pc-guard. Note: will add additional support for trace-cmp in a follow up PR. Patch by Filippo Bigarella rdar://101626834
43 lines
2.5 KiB
C
43 lines
2.5 KiB
C
// RUN: %clang %s -target arm64-apple-darwin -emit-llvm -S -fsanitize-coverage=trace-pc-guard -mllvm -sanitizer-coverage-gated-trace-callbacks=1 -o - | FileCheck %s --check-prefixes=CHECK,GATED
|
|
// RUN: %clang %s -target arm64-apple-darwin -emit-llvm -S -fsanitize-coverage=trace-pc-guard -mllvm -sanitizer-coverage-gated-trace-callbacks=0 -o - | FileCheck %s --check-prefixes=CHECK,PLAIN
|
|
// RUN: not %clang %s -target arm64-apple-darwin -emit-llvm -S -fsanitize-coverage=trace-pc -mllvm -sanitizer-coverage-gated-trace-callbacks=1 -o /dev/null 2>&1 | FileCheck %s --check-prefixes=INCOMPATIBLE
|
|
// RUN: not %clang %s -target arm64-apple-darwin -emit-llvm -S -fsanitize-coverage=inline-8bit-counters -mllvm -sanitizer-coverage-gated-trace-callbacks=1 -o /dev/null 2>&1 | FileCheck %s --check-prefixes=INCOMPATIBLE
|
|
// RUN: not %clang %s -target arm64-apple-darwin -emit-llvm -S -fsanitize-coverage=inline-bool-flag -mllvm -sanitizer-coverage-gated-trace-callbacks=1 -o /dev/null 2>&1 | FileCheck %s --check-prefixes=INCOMPATIBLE
|
|
|
|
// Verify that we do not emit the __sancov_gate section for "plain" trace-pc-guard
|
|
// GATED: section "__DATA,__sancov_gate"
|
|
// PLAIN-NOT: section "__DATA,__sancov_gate"
|
|
|
|
// Produce an error for all incompatible sanitizer coverage modes.
|
|
// INCOMPATIBLE: error: 'sanitizer-coverage-gated-trace-callbacks' is only supported with trace-pc-guard
|
|
|
|
int x[10];
|
|
|
|
// CHECK: define{{.*}} void @foo
|
|
void foo(int n, int m) {
|
|
// COM: Verify that we're emitting the call to __sanitizer_cov_trace_pc_guard upon
|
|
// COM: checking the value of __sancov_should_track.
|
|
// GATED: [[VAL:%.*]] = load i64, {{.*}}@__sancov_should_track
|
|
// GATED-NOT: [[VAL:%.*]] = load i64, i64* @__sancov_should_track
|
|
// GATED-NEXT: [[CMP:%.*]] = icmp ne i64 [[VAL]], 0
|
|
// GATED-NEXT: br i1 [[CMP]], label %[[L_TRUE:.*]], label %[[L_FALSE:.*]], !prof [[WEIGHTS:!.+]]
|
|
// GATED: [[L_TRUE]]:
|
|
// GATED-NEXT: call void @__sanitizer_cov_trace_pc_guard
|
|
// GATED: br i1 [[CMP]], label %[[L_TRUE_2:.*]], label %[[L_FALSE_2:.*]]
|
|
// GATED: [[L_TRUE_2]]:
|
|
// GATED-NEXT: call void @__sanitizer_cov_trace_pc_guard
|
|
// GATED: [[WEIGHTS]] = !{!"branch_weights", i32 1, i32 100000}
|
|
|
|
// COM: With the non-gated instrumentation, we should not emit the
|
|
// COM: __sancov_should_track global.
|
|
// PLAIN-NOT: __sancov_should_track
|
|
// But we should still be emitting the calls to the callback.
|
|
// PLAIN: call void @__sanitizer_cov_trace_pc_guard
|
|
if (n) {
|
|
x[n] = 42;
|
|
if (m) {
|
|
x[m] = 41;
|
|
}
|
|
}
|
|
}
|