[LLVMbugs] [Bug 22694] New: Sanitizer blacklist broken with preprocessed source

bugzilla-daemon at llvm.org bugzilla-daemon at llvm.org
Wed Feb 25 06:10:29 PST 2015


http://llvm.org/bugs/show_bug.cgi?id=22694

            Bug ID: 22694
           Summary: Sanitizer blacklist broken with preprocessed source
           Product: compiler-rt
           Version: unspecified
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: compiler-rt
          Assignee: unassignedbugs at nondot.org
          Reporter: eugeni.stepanov at gmail.com
                CC: llvmbugs at cs.uiuc.edu
    Classification: Unclassified

1.ii:

# 1 "1.cc"
# 1 "<built-in>" 1
# 1 "<built-in>" 3
# 344 "<built-in>" 3
# 1 "<command line>" 1
# 1 "<built-in>" 2
# 1 "1.cc" 2
void f() {}

blacklist:

src:*1.cc

$ clang++ -fsanitize=address -fsanitize-blacklist=blacklist 1.ii -S -emit-llvm
-o - | grep -A 1 Function\ Attrs
; Function Attrs: nounwind sanitize_address uwtable
define void @_Z1fv() #0 {

Blacklist did not apply. The code in SanitizerBlacklist.cpp tried to match
"1.ii" against the blacklist.

It looks like we need to use getPresumedLoc instead of getFileLoc, but it may
not be that simple (will we lose macro expansion then?).

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20150225/ab3d850c/attachment.html>


More information about the llvm-bugs mailing list