| 1 | // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOBL %s |
| 2 | |
| 3 | // Check that blacklisting cfi and cfi-vcall work correctly |
| 4 | // RUN: echo "[cfi-vcall]" > %t.vcall.txt |
| 5 | // RUN: echo "type:std::*" >> %t.vcall.txt |
| 6 | // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -fsanitize-blacklist=%t.vcall.txt -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOSTD %s |
| 7 | // |
| 8 | // RUN: echo "[cfi]" > %t.cfi.txt |
| 9 | // RUN: echo "type:std::*" >> %t.cfi.txt |
| 10 | // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -fsanitize-blacklist=%t.cfi.txt -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOSTD %s |
| 11 | |
| 12 | // Check that blacklisting non-vcall modes does not affect vcalls |
| 13 | // RUN: echo "[cfi-icall|cfi-nvcall|cfi-cast-strict|cfi-derived-cast|cfi-unrelated-cast]" > %t.other.txt |
| 14 | // RUN: echo "type:std::*" >> %t.other.txt |
| 15 | // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -fsanitize-blacklist=%t.other.txt -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOBL %s |
| 16 | |
| 17 | struct S1 { |
| 18 | virtual void f(); |
| 19 | }; |
| 20 | |
| 21 | namespace std { |
| 22 | |
| 23 | struct S2 { |
| 24 | virtual void f(); |
| 25 | }; |
| 26 | |
| 27 | } |
| 28 | |
| 29 | // CHECK: define{{.*}}s1f |
| 30 | // NOBL: llvm.type.test |
| 31 | // NOSTD: llvm.type.test |
| 32 | void s1f(S1 *s1) { |
| 33 | s1->f(); |
| 34 | } |
| 35 | |
| 36 | // CHECK: define{{.*}}s2f |
| 37 | // NOBL: llvm.type.test |
| 38 | // NOSTD-NOT: llvm.type.test |
| 39 | void s2f(std::S2 *s2) { |
| 40 | s2->f(); |
| 41 | } |
| 42 | |