Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1352)

Unified Diff: tests_lit/assembler/x86/sandboxing.ll

Issue 1559243002: Suzero. X8664. NaCl Sandboxing. (Closed) Base URL: https://chromium.googlesource.com/native_client/pnacl-subzero.git@master
Patch Set: Addresses comments. Created 4 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: tests_lit/assembler/x86/sandboxing.ll
diff --git a/tests_lit/assembler/x86/sandboxing.ll b/tests_lit/assembler/x86/sandboxing.ll
index 3233d574a3faf61e2f31a2f8d188a9421919ea09..b6142897d5eb60ef4ca03b09f5cd29138d922abb 100644
--- a/tests_lit/assembler/x86/sandboxing.ll
+++ b/tests_lit/assembler/x86/sandboxing.ll
@@ -7,6 +7,10 @@
; RUN: -allow-externally-defined-symbols \
; RUN: -ffunction-sections | FileCheck %s
+; RUN: %p2i -i %s --sandbox --filetype=obj --disassemble --target=x8664 \
+; RUN: --args -Om1 -allow-externally-defined-symbols \
+; RUN: -ffunction-sections | FileCheck %s --check-prefix X8664
+
declare void @call_target()
@global_byte = internal global [1 x i8] zeroinitializer
@global_short = internal global [2 x i8] zeroinitializer
@@ -22,6 +26,10 @@ entry:
; CHECK: nop
; CHECK: 1b: {{.*}} call 1c
; CHECK-NEXT: 20:
+; X8664-LABEL: test_direct_call
+; X8664: push {{.*}}$local$__0
+; X8664: jmp {{.*}} call_target
+; X8664: {{0+}}20 <{{.*}}$local$__0>:
; An indirect call sequence uses the right mask and register-call sequence.
define internal void @test_indirect_call(i32 %target) {
@@ -36,8 +44,14 @@ entry:
; CHECK: 1b: {{.*}} and [[REG]],0xffffffe0
; CHECK-NEXT: call [[REG]]
; CHECk-NEXT: 20:
+; X8664-LABEL: test_indirect_call
+; X8664: push {{.*}}$local$__0
+; X8664: {{.*}} and e[[REG:..]],0xffffffe0
+; X8664: add r[[REG]],r15
+; X8664: jmp r[[REG]]
+; X8664: {{0+}}20 <{{.*}}$local$__0>:
-; A return sequences uses the right pop / mask / jmp sequence.
+; A return sequence uses the right pop / mask / jmp sequence.
define internal void @test_ret() {
entry:
ret void
@@ -46,6 +60,11 @@ entry:
; CHECK: pop ecx
; CHECK-NEXT: and ecx,0xffffffe0
; CHECK-NEXT: jmp ecx
+; X8664-LABEL: test_ret
+; X8664: pop rcx
+; X8664: and ecx,0xffffffe0
+; X8664: add rcx,r15
+; X8664: jmp rcx
; A perfectly packed bundle should not have nops at the end.
define internal void @packed_bundle() {
@@ -239,6 +258,66 @@ entry:
; CHECK: 5b: {{.*}} and [[REG]],0xffffffe0
; CHECK-NEXT: 5e: {{.*}} call [[REG]]
+; Tests the pad_to_end bundle alignment with no padding bytes needed.
+define internal void @bundle_lock_pad_to_end_padding_0(i32 %arg0, i32 %arg1,
+ i32 %arg3, i32 %arg4,
+ i32 %arg5, i32 %arg6) {
+ call void @call_target()
+ ; bundle boundary
+ %x = add i32 %arg5, %arg6 ; 12 bytes
+ %y = trunc i32 %x to i16 ; 10 bytes
+ call void @call_target() ; 10 bytes
+ ; bundle boundary
+ ret void
+}
+; X8664-LABEL: bundle_lock_pad_to_end_padding_0
Jim Stichnoth 2016/01/14 00:09:52 I suggest adding CHECK-LABEL lines just to ensure
John 2016/01/14 23:18:25 Done.
+; X8664: <{{.*}}$local$__0>:
+; X8664: 56: {{.*}} push {{.*}}$local$__1
+; X8664: 5b: {{.*}} jmp {{.*}} call_target
+; X8664: 60: {{.*}} add
+
+; Tests the pad_to_end bundle alignment with 11 padding bytes needed, and some
+; instructions before the call.
+define internal void @bundle_lock_pad_to_end_padding_11(i32 %arg0, i32 %arg1,
+ i32 %arg3, i32 %arg4,
+ i32 %arg5, i32 %arg6) {
+ call void @call_target()
+ ; bundle boundary
+ %x = add i32 %arg5, %arg6 ; 11 bytes
+ call void @call_target() ; 10 bytes
+ ; 11 bytes of nop
+ ; bundle boundary
+ ret void
+}
+; X8664-LABEL: bundle_lock_pad_to_end_padding_11
+; X8664: <{{.*}}$local$__0>:
+; X8664: 4b: {{.*}} push {{.*}}$local$__1
+; X8664: 50: {{.*}} jmp {{.*}} call_target
+; X8664: 55: {{.*}} nop
+; X8664: 5d: {{.*}} nop
+; X8664: 60: {{.*}} add
+
+; Tests the pad_to_end bundle alignment with 22 padding bytes needed, and no
+; instructions before the call.
+define internal void @bundle_lock_pad_to_end_padding_22(i32 %arg0, i32 %arg1,
+ i32 %arg3, i32 %arg4,
+ i32 %arg5, i32 %arg6) {
+ call void @call_target()
+ ; bundle boundary
+ call void @call_target() ; 10 bytes
+ ; 22 bytes of nop
+ ; bundle boundary
+ ret void
+}
+; X8664-LABEL: bundle_lock_pad_to_end_padding_22
+; X8664: <{{.*}}$local$__0>:
+; X8664: 40: {{.*}} push {{.*}}$local$__1
+; X8664: 45: {{.*}} jmp {{.*}} call_target
+; X8664: 4a: {{.*}} nop
+; X8664: 52: {{.*}} nop
+; X8664: 5a: {{.*}} nop
+; X8664: 60: {{.*}} add
+
; Stack adjustment state during an argument push sequence gets
; properly checkpointed and restored during the two passes, as
; observed by the stack adjustment for accessing stack-allocated

Powered by Google App Engine
This is Rietveld 408576698