[llvm] r310241 - [asan] Disable checking of arguments passed by value for --asan-force-dynamic-shadow
Kuba Mracek via llvm-commits
llvm-commits at lists.llvm.org
Mon Aug 7 08:18:34 PDT 2017
Please merge into release_50.
Thanks,
Kuba
> On 7 Aug 2017, at 00:12, Vitaly Buka via llvm-commits <llvm-commits at lists.llvm.org> wrote:
>
> Author: vitalybuka
> Date: Mon Aug 7 00:12:34 2017
> New Revision: 310241
>
> URL: http://llvm.org/viewvc/llvm-project?rev=310241&view=rev
> Log:
> [asan] Disable checking of arguments passed by value for --asan-force-dynamic-shadow
>
> Fails with "Instruction does not dominate all uses!"
>
> Modified:
> llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp
> llvm/trunk/test/Instrumentation/AddressSanitizer/stack-poisoning-byval-args.ll
>
> Modified: llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp
> URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp?rev=310241&r1=310240&r2=310241&view=diff
> ==============================================================================
> --- llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp (original)
> +++ llvm/trunk/lib/Transforms/Instrumentation/AddressSanitizer.cpp Mon Aug 7 00:12:34 2017
> @@ -756,7 +756,8 @@ struct FunctionStackPoisoner : public In
> bool runOnFunction() {
> if (!ClStack) return false;
>
> - if (ClRedzoneByvalArgs) copyArgsPassedByValToAllocas();
> + if (ClRedzoneByvalArgs && !ClForceDynamicShadow)
> + copyArgsPassedByValToAllocas();
>
> // Collect alloca, ret, lifetime instructions etc.
> for (BasicBlock *BB : depth_first(&F.getEntryBlock())) visit(*BB);
>
> Modified: llvm/trunk/test/Instrumentation/AddressSanitizer/stack-poisoning-byval-args.ll
> URL: http://llvm.org/viewvc/llvm-project/llvm/trunk/test/Instrumentation/AddressSanitizer/stack-poisoning-byval-args.ll?rev=310241&r1=310240&r2=310241&view=diff
> ==============================================================================
> --- llvm/trunk/test/Instrumentation/AddressSanitizer/stack-poisoning-byval-args.ll (original)
> +++ llvm/trunk/test/Instrumentation/AddressSanitizer/stack-poisoning-byval-args.ll Mon Aug 7 00:12:34 2017
> @@ -1,5 +1,7 @@
> ; This check verifies that arguments passed by value get redzones.
> ; RUN: opt < %s -asan -asan-realign-stack=32 -S | FileCheck %s
> +; RUN: opt < %s -asan -asan-realign-stack=32 -asan-force-dynamic-shadow -S | FileCheck %s --check-prefixes=CHECK-FDS
> +
>
> target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64"
> target triple = "x86_64-unknown-linux-gnu"
> @@ -8,6 +10,8 @@ target triple = "x86_64-unknown-linux-gn
>
> declare i32 @bar(%struct.A*)
>
> +; CHECK-FDS-NOT: {{\.byval}}
> +
> ; Test behavior for named argument with explicit alignment. The memcpy and
> ; alloca alignments should match the explicit alignment of 64.
> define void @foo(%struct.A* byval align 64 %a) sanitize_address {
>
>
> _______________________________________________
> llvm-commits mailing list
> llvm-commits at lists.llvm.org
> http://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-commits
More information about the llvm-commits
mailing list