https://bugs.llvm.org/show_bug.cgi?id=44129
Bug ID: 44129
Summary: stack-probe fails to probe correctly due to overflow
if stack is greater than 4GB
Product: libraries
Version: 9.0
Hardware: PC
OS: Windows NT
Status: NEW
Severity: enhancement
Priority: P
Component: Backend: X86
Assignee: unassignedb...@nondot.org
Reporter: simonas+llvm....@kazlauskas.me
CC: craig.top...@gmail.com, llvm-bugs@lists.llvm.org,
llvm-...@redking.me.uk, spatel+l...@rotateright.com
Given this example
```
target triple = "x86_64-unknown-linux-gnu"
define void @foo() unnamed_addr #0 {
start:
%b = alloca i64, align 8
%c = alloca [4294967295 x i8], align 1
ret void
}
attributes #0 = { nonlazybind uwtable "probe-stack"="probe_stack"
"target-cpu"="x86-64" }
```
which when compiled with `llc -filetype=asm test.ll -o -` will output:
```
foo:
movl $8, %eax
callq probe_stack
...
```
Note that the probe size has overflowed and we are now probing just for 8
bytes.
--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
llvm-bugs mailing list
llvm-bugs@lists.llvm.org
https://lists.llvm.org/cgi-bin/mailman/listinfo/llvm-bugs