diff options
author | Kostya Serebryany <kcc@google.com> | 2011-11-18 01:41:06 +0000 |
---|---|---|
committer | Kostya Serebryany <kcc@google.com> | 2011-11-18 01:41:06 +0000 |
commit | 5a3a9c937198084498a196dae856ac5a5a005bcc (patch) | |
tree | f8c99f080c4fa10ae614d10667ede760097bbf01 /lib/Transforms/Instrumentation | |
parent | 424fe0e422826f4962b58428b6aef48e1a66c30a (diff) | |
download | llvm-5a3a9c937198084498a196dae856ac5a5a005bcc.tar.gz llvm-5a3a9c937198084498a196dae856ac5a5a005bcc.tar.bz2 llvm-5a3a9c937198084498a196dae856ac5a5a005bcc.tar.xz |
[asan] workaround for reg alloc bug 11395: don't instrument functions with large chunks of inline assembler
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@144962 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'lib/Transforms/Instrumentation')
-rw-r--r-- | lib/Transforms/Instrumentation/AddressSanitizer.cpp | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/lib/Transforms/Instrumentation/AddressSanitizer.cpp b/lib/Transforms/Instrumentation/AddressSanitizer.cpp index f9c10f38bf..e12da86723 100644 --- a/lib/Transforms/Instrumentation/AddressSanitizer.cpp +++ b/lib/Transforms/Instrumentation/AddressSanitizer.cpp @@ -179,6 +179,7 @@ struct AddressSanitizer : public ModulePass { void PoisonStack(const ArrayRef<AllocaInst*> &AllocaVec, IRBuilder<> IRB, Value *ShadowBase, bool DoPoison); + bool LooksLikeCodeInBug11395(Instruction *I); Module *CurrentModule; LLVMContext *C; @@ -784,6 +785,17 @@ void AddressSanitizer::PoisonStack(const ArrayRef<AllocaInst*> &AllocaVec, } } +// Workaround for bug 11395: we don't want to instrument stack in functions +// with large assembly blobs (32-bit only), otherwise reg alloc may crash. +bool AddressSanitizer::LooksLikeCodeInBug11395(Instruction *I) { + if (LongSize != 32) return false; + CallInst *CI = dyn_cast<CallInst>(I); + if (!CI || !CI->isInlineAsm()) return false; + if (CI->getNumArgOperands() <= 5) return false; + // We have inline assembly with quite a few arguments. + return true; +} + // Find all static Alloca instructions and put // poisoned red zones around all of them. // Then unpoison everything back before the function returns. @@ -810,6 +822,7 @@ bool AddressSanitizer::poisonStackInFunction(Module &M, Function &F) { BasicBlock &BB = *FI; for (BasicBlock::iterator BI = BB.begin(), BE = BB.end(); BI != BE; ++BI) { + if (LooksLikeCodeInBug11395(BI)) return false; if (isa<ReturnInst>(BI)) { RetVec.push_back(BI); continue; |