Enable -fsanitize=use-after-return by default under -fsanitize=address
Summary: We enable ASAN's use-after-return instrumentation at compile-time, but still keep it disabled at run-time. This enables the users to flip the flag at run-time using environment variable ASAN_OPTIONS=detect_stack_use_after_return=1 instead of using a separate build. If UAR detection is disabled at run-time, this extra compile-time instrumentation costs very small slowdown. On SPEC 2006 14 tests are not affected at all, 4 tests get ~ 1% slowdown and 453.povray gets 4%. Reviewers: samsonov Reviewed By: samsonov CC: llvm-commits Differential Revision: http://llvm-reviews.chandlerc.com/D1741 llvm-svn: 191186
This commit is contained in:
parent
c4aab49c84
commit
bedc616804
|
@ -211,11 +211,11 @@ unsigned SanitizerArgs::parse(const char *Value) {
|
|||
#define SANITIZER_GROUP(NAME, ID, ALIAS) .Case(NAME, ID)
|
||||
#include "clang/Basic/Sanitizers.def"
|
||||
.Default(SanitizeKind());
|
||||
// Assume -fsanitize=address implies -fsanitize=init-order.
|
||||
// Assume -fsanitize=address implies -fsanitize=init-order,use-after-return.
|
||||
// FIXME: This should be either specified in Sanitizers.def, or go away when
|
||||
// we get rid of "-fsanitize=init-order" flag at all.
|
||||
// we get rid of "-fsanitize=init-order,use-after-return" flags at all.
|
||||
if (ParsedKind & Address)
|
||||
ParsedKind |= InitOrder;
|
||||
ParsedKind |= InitOrder | UseAfterReturn;
|
||||
return ParsedKind;
|
||||
}
|
||||
|
||||
|
|
|
@ -16,12 +16,15 @@
|
|||
// RUN: %clang -target x86_64-linux-gnu -fsanitize=address-full %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-FULL
|
||||
// CHECK-ASAN-FULL: "-fsanitize={{((address|init-order|use-after-return|use-after-scope),?){4}"}}
|
||||
|
||||
// RUN: %clang -target x86_64-linux-gnu -fno-sanitize=init-order -fsanitize=address %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-IMPLIED-INIT-ORDER
|
||||
// CHECK-ASAN-IMPLIED-INIT-ORDER: "-fsanitize={{((address|init-order),?){2}"}}
|
||||
// RUN: %clang -target x86_64-linux-gnu -fno-sanitize=init-order,use-after-return -fsanitize=address %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-IMPLIED-INIT-ORDER-UAR
|
||||
// CHECK-ASAN-IMPLIED-INIT-ORDER-UAR: "-fsanitize={{((address|init-order|use-after-return),?){3}"}}
|
||||
|
||||
// RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fno-sanitize=init-order %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-NO-IMPLIED-INIT-ORDER
|
||||
// CHECK-ASAN-NO-IMPLIED-INIT-ORDER-NOT: init-order
|
||||
|
||||
// RUN: %clang -target x86_64-linux-gnu -fsanitize=address -fno-sanitize=use-after-return %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-ASAN-NO-IMPLIED-UAR
|
||||
// CHECK-ASAN-NO-IMPLIED-UAR-NOT: use-after-return
|
||||
|
||||
// RUN: %clang -target x86_64-linux-gnu -fcatch-undefined-behavior -fno-sanitize-undefined-trap-on-error %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-UNDEFINED-NO-TRAP-ERROR
|
||||
// CHECK-UNDEFINED-NO-TRAP-ERROR: '-fcatch-undefined-behavior' not allowed with '-fno-sanitize-undefined-trap-on-error'
|
||||
|
||||
|
|
Loading…
Reference in New Issue