[LLVMbugs] [Bug 18865] New: ARMLoadStoreOptimizer should be disable when Address Sanitizer is enable

bugzilla-daemon at llvm.org bugzilla-daemon at llvm.org
Sun Feb 16 22:30:31 PST 2014


http://llvm.org/bugs/show_bug.cgi?id=18865

            Bug ID: 18865
           Summary: ARMLoadStoreOptimizer should be disable when Address
                    Sanitizer is enable
           Product: libraries
           Version: trunk
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: Backend: ARM
          Assignee: unassignedbugs at nondot.org
          Reporter: manjian2006 at gmail.com
                CC: llvmbugs at cs.uiuc.edu
    Classification: Unclassified

Created attachment 12076
  --> http://llvm.org/bugs/attachment.cgi?id=12076&action=edit
source that cause bug

test code is in the uploaded attachment.
clang -Os -target arm-linux-androideabi -march=armv7-a -fsanitize=address
-mthumb -S /tmp/1.cpp

illegal code generated:
=>    lsrs    r6, r4, #3
    ldr    r1, [r1, r0]
    add    r0, r2
    str    r0, [r4, #4]
    str    r1, [r4, #8]
    movw    r1, #62208
    movw    r0, #61937
    movt    r1, #62451
    add.w    r5, r4, #16
=>    stm.w    r6, {r0, r1}

r4 stores the results of __asan_stack_malloc_1,r6 is the shadow memory address
of r4.Since r4 is a stack address,which is aligned to 64 bits when the target
is ARM, the right swift will result in a address not aligned to 32 bits.So
stm.w will result in alignment fault (A3.2.1).
The code is from FunctionStackPoisoner::poisonRedZones in 
lib/Transforms/Instrumentation/AddressSanitizer.cpp.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140217/489359fc/attachment.html>


More information about the llvm-bugs mailing list