[LLVMbugs] [Bug 22694] New: Sanitizer blacklist broken with preprocessed source
bugzilla-daemon at llvm.org
bugzilla-daemon at llvm.org
Wed Feb 25 06:10:29 PST 2015
http://llvm.org/bugs/show_bug.cgi?id=22694
Bug ID: 22694
Summary: Sanitizer blacklist broken with preprocessed source
Product: compiler-rt
Version: unspecified
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P
Component: compiler-rt
Assignee: unassignedbugs at nondot.org
Reporter: eugeni.stepanov at gmail.com
CC: llvmbugs at cs.uiuc.edu
Classification: Unclassified
1.ii:
# 1 "1.cc"
# 1 "<built-in>" 1
# 1 "<built-in>" 3
# 344 "<built-in>" 3
# 1 "<command line>" 1
# 1 "<built-in>" 2
# 1 "1.cc" 2
void f() {}
blacklist:
src:*1.cc
$ clang++ -fsanitize=address -fsanitize-blacklist=blacklist 1.ii -S -emit-llvm
-o - | grep -A 1 Function\ Attrs
; Function Attrs: nounwind sanitize_address uwtable
define void @_Z1fv() #0 {
Blacklist did not apply. The code in SanitizerBlacklist.cpp tried to match
"1.ii" against the blacklist.
It looks like we need to use getPresumedLoc instead of getFileLoc, but it may
not be that simple (will we lose macro expansion then?).
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20150225/ab3d850c/attachment.html>
More information about the llvm-bugs
mailing list