See the bug report at https://github.com/google/sanitizers/issues/691. When a dynamic alloca has a constant size, ASan instrumentation will treat it as a regular dynamic alloca (insert calls to poison and unpoison), but the backend will turn it into a regular stack variable. The poisoning/unpoisoning is then broken. This patch will treat such allocas as static. Differential Revision: http://reviews.llvm.org/D21509 llvm-svn: 273888 |
||
|---|---|---|
| .. | ||
| AddressSanitizer.cpp | ||
| BoundsChecking.cpp | ||
| CFGMST.h | ||
| CMakeLists.txt | ||
| DataFlowSanitizer.cpp | ||
| EfficiencySanitizer.cpp | ||
| GCOVProfiling.cpp | ||
| IndirectCallPromotion.cpp | ||
| IndirectCallSiteVisitor.h | ||
| InstrProfiling.cpp | ||
| Instrumentation.cpp | ||
| LLVMBuild.txt | ||
| MaximumSpanningTree.h | ||
| MemorySanitizer.cpp | ||
| PGOInstrumentation.cpp | ||
| SanitizerCoverage.cpp | ||
| ThreadSanitizer.cpp | ||