[LLVMbugs] [Bug 20292] New: x86_stdcallcc: Assertion hit when passing more than 2^16 bytes on the stack

bugzilla-daemon at llvm.org bugzilla-daemon at llvm.org
Sun Jul 13 14:31:42 PDT 2014


http://llvm.org/bugs/show_bug.cgi?id=20292

            Bug ID: 20292
           Summary: x86_stdcallcc: Assertion hit when passing more than
                    2^16 bytes on the stack
           Product: libraries
           Version: trunk
          Hardware: PC
                OS: All
            Status: NEW
          Severity: normal
          Priority: P
         Component: Backend: X86
          Assignee: unassignedbugs at nondot.org
          Reporter: code at klickverbot.at
                CC: llvmbugs at cs.uiuc.edu
    Classification: Unclassified

Generating code for the following piece of IR currently asserts as
X86TargetLowering::LowerReturn tries to fit the number of bytes to pop on
function exit into a 16 bit constant:

---
target datalayout =
"e-p:32:32:32-S128-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:32:64-f16:16:16-f32:32:32-f64:32:64-f128:128:128-v64:64:64-v128:128:128-a0:0:64-f80:32:32-n8:16:32"
target triple = "i386-unknown-linux-gnu"

%bar = type { [16385 x i32] }

define x86_stdcallcc void @foo(%bar* byval %s_arg) {
  ret void
}
---

Of course, passing such a large object on the stack is rather nonsensical, but
I think this is somewhat problematic as IR that passes the validator/… silently
leads to wrong code being generated ("ret $4") when LLVM is built without
assertions.

Is it worth supporting this, or should there simply be a fatal error in
X86TargetLowering::LowerReturn when encountering such large sizes?

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20140713/ff05408a/attachment.html>


More information about the llvm-bugs mailing list