[PATCH] D130503: [ASan] Use stack safety analysis to optimize allocas instrumentation.
Vitaly Buka via Phabricator via llvm-commits
llvm-commits at lists.llvm.org
Tue Jul 26 18:48:31 PDT 2022
This revision was landed with ongoing or failed builds.
This revision was automatically updated to reflect the committed changes.
Closed by commit rGd6e1e0a0190d: [ASan] Use stack safety analysis to optimize allocas instrumentation. (authored by kstoimenov, committed by vitalybuka).
Repository:
rG LLVM Github Monorepo
CHANGES SINCE LAST ACTION
https://reviews.llvm.org/D130503/new/
https://reviews.llvm.org/D130503
Files:
llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp
llvm/test/Instrumentation/AddressSanitizer/asan-stack-safety.ll
Index: llvm/test/Instrumentation/AddressSanitizer/asan-stack-safety.ll
===================================================================
--- llvm/test/Instrumentation/AddressSanitizer/asan-stack-safety.ll
+++ llvm/test/Instrumentation/AddressSanitizer/asan-stack-safety.ll
@@ -6,7 +6,7 @@
; CHECK-LABEL: define i32 @load
define i32 @load() sanitize_address {
%buf = alloca [10 x i8], align 1
- ; CHECK: call i64 @__asan_stack_malloc
+ ; NOSAFETY: call i64 @__asan_stack_malloc
%arrayidx = getelementptr inbounds [10 x i8], [10 x i8]* %buf, i64 0, i64 0
%1 = load i8, i8* %arrayidx, align 1
; NOSAFETY: call void @__asan_load1
@@ -16,17 +16,30 @@
; CHECK-LABEL: define i32 @store
define i32 @store() sanitize_address {
%buf = alloca [10 x i8], align 1
- ; CHECK: call i64 @__asan_stack_malloc
+ ; NOSAFETY: call i64 @__asan_stack_malloc
%arrayidx = getelementptr inbounds [10 x i8], [10 x i8]* %buf, i64 0, i64 0
store i8 0, i8* %arrayidx
; NOSAFETY: call void @__asan_store1
ret i32 0
}
+; CHECK-LABEL: define i32 @unsafe_alloca
+define i32 @unsafe_alloca(i32 %i) sanitize_address {
+ %buf.sroa.0 = alloca [10 x i8], align 4
+ ; CHECK: call i64 @__asan_stack_malloc
+ %ptr = getelementptr [10 x i8], [10 x i8]* %buf.sroa.0, i32 %i, i32 0
+ store volatile i8 0, i8* %ptr, align 4
+ ; CHECK: call void @__asan_store1
+ %ptr2 = getelementptr [10 x i8], [10 x i8]* %buf.sroa.0, i32 0, i32 0
+ store volatile i8 0, i8* %ptr2, align 4
+ ; NOSAFETY: call void @__asan_store1
+ ret i32 0
+}
+
; CHECK-LABEL: define void @atomicrmw
define void @atomicrmw() sanitize_address {
%buf = alloca [10 x i8], align 1
- ; CHECK: call i64 @__asan_stack_malloc
+ ; NOSAFETY: call i64 @__asan_stack_malloc
%arrayidx = getelementptr inbounds [10 x i8], [10 x i8]* %buf, i64 0, i64 0
%1 = atomicrmw add i8* %arrayidx, i8 1 seq_cst
; NOSAFETY: call void @__asan_store1
@@ -36,7 +49,7 @@
; CHECK-LABEL: define void @cmpxchg
define void @cmpxchg(i8 %compare_to, i8 %new_value) sanitize_address {
%buf = alloca [10 x i8], align 1
- ; CHECK: call i64 @__asan_stack_malloc
+ ; NOSAFETY: call i64 @__asan_stack_malloc
%arrayidx = getelementptr inbounds [10 x i8], [10 x i8]* %buf, i64 0, i64 0
%1 = cmpxchg i8* %arrayidx, i8 %compare_to, i8 %new_value seq_cst seq_cst
; NOSAFETY: call void @__asan_store1
Index: llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp
===================================================================
--- llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp
+++ llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp
@@ -1232,7 +1232,9 @@
// dynamic alloca instrumentation for them as well.
!AI.isUsedWithInAlloca() &&
// swifterror allocas are register promoted by ISel
- !AI.isSwiftError());
+ !AI.isSwiftError() &&
+ // safe allocas are not interesting
+ !(SSGI && SSGI->isSafe(AI)));
ProcessedAllocas[&AI] = IsInteresting;
return IsInteresting;
-------------- next part --------------
A non-text attachment was scrubbed...
Name: D130503.447909.patch
Type: text/x-patch
Size: 2998 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20220727/c075acb4/attachment.bin>
More information about the llvm-commits
mailing list