
Upon further investigation and discussion, this is actually the opposite direction from what we should be taking, and this direction wouldn't solve the motivational problem anyway. Additionally, some more (polly) tests have escaped being updated. So, let's just take a step back here. This reverts commit f3190dedeef9da2109ea57e4cb372f295ff53b88. This reverts commit 749581d21f2b3f53e4fca4eb8728c942d646893b. This reverts commit f3df87d57e096143670e0fd396e81d43393a2dd2. This reverts commit ab1dbcecd6f0969976fafd62af34730436ad5944.
124 lines
4.3 KiB
C
124 lines
4.3 KiB
C
// RUN: %clang_cc1 -x c -triple x86_64-apple-darwin10 -w -emit-llvm -o - %s -fsanitize=pointer-overflow | FileCheck %s --check-prefixes=CHECK,CHECK-C
|
|
// RUN: %clang_cc1 -x c++ -triple x86_64-apple-darwin10 -w -emit-llvm -o - %s -fsanitize=pointer-overflow | FileCheck %s --check-prefixes=CHECK,CHECK-CPP
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
// CHECK-LABEL: define{{.*}} void @fixed_len_array
|
|
void fixed_len_array(int k) {
|
|
// CHECK: getelementptr inbounds [10 x [10 x i32]], [10 x [10 x i32]]* [[ARR:%.*]], i64 0, i64 [[IDXPROM:%.*]]
|
|
// CHECK-NEXT: [[SMUL:%.*]] = call { i64, i1 } @llvm.smul.with.overflow.i64(i64 40, i64 [[IDXPROM]]), !nosanitize
|
|
// CHECK-NEXT: [[SMULOFLOW:%.*]] = extractvalue { i64, i1 } [[SMUL]], 1, !nosanitize
|
|
// CHECK-NEXT: [[SMULVAL:%.*]] = extractvalue { i64, i1 } [[SMUL]], 0, !nosanitize
|
|
// CHECK-NEXT: [[BASE:%.*]] = ptrtoint [10 x [10 x i32]]* [[ARR]] to i64, !nosanitize
|
|
// CHECK-NEXT: [[COMPGEP:%.*]] = add i64 [[BASE]], [[SMULVAL]], !nosanitize
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}, i64 [[BASE]], i64 [[COMPGEP]]){{.*}}, !nosanitize
|
|
|
|
// CHECK: getelementptr inbounds [10 x i32], [10 x i32]* {{.*}}, i64 0, i64 [[IDXPROM1:%.*]]
|
|
// CHECK-NEXT: @llvm.smul.with.overflow.i64(i64 4, i64 [[IDXPROM1]]), !nosanitize
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
|
|
int arr[10][10];
|
|
arr[k][k];
|
|
}
|
|
|
|
// CHECK-LABEL: define{{.*}} void @variable_len_array
|
|
void variable_len_array(int n, int k) {
|
|
// CHECK: getelementptr inbounds i32, i32* {{.*}}, i64 [[IDXPROM:%.*]]
|
|
// CHECK-NEXT: @llvm.smul.with.overflow.i64(i64 4, i64 [[IDXPROM]]), !nosanitize
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
|
|
// CHECK: getelementptr inbounds i32, i32* {{.*}}, i64 [[IDXPROM1:%.*]]
|
|
// CHECK-NEXT: @llvm.smul.with.overflow.i64(i64 4, i64 [[IDXPROM1]]), !nosanitize
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
|
|
int arr[n][n];
|
|
arr[k][k];
|
|
}
|
|
|
|
// CHECK-LABEL: define{{.*}} void @pointer_array
|
|
void pointer_array(int **arr, int k) {
|
|
// CHECK: @llvm.smul.with.overflow.i64(i64 8, i64 {{.*}}), !nosanitize
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
|
|
// CHECK: @llvm.smul.with.overflow.i64(i64 4, i64 {{.*}}), !nosanitize
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
|
|
arr[k][k];
|
|
}
|
|
|
|
// CHECK-LABEL: define{{.*}} void @pointer_array_unsigned_indices
|
|
void pointer_array_unsigned_indices(int **arr, unsigned k) {
|
|
// CHECK: icmp uge
|
|
// CHECK-NOT: select
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
// CHECK: icmp uge
|
|
// CHECK-NOT: select
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
arr[k][k];
|
|
}
|
|
|
|
// CHECK-LABEL: define{{.*}} void @pointer_array_mixed_indices
|
|
void pointer_array_mixed_indices(int **arr, int i, unsigned j) {
|
|
// CHECK: select
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
// CHECK-NOT: select
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
arr[i][j];
|
|
}
|
|
|
|
struct S1 {
|
|
int pad1;
|
|
union {
|
|
char leaf;
|
|
struct S1 *link;
|
|
} u;
|
|
struct S1 *arr;
|
|
};
|
|
|
|
// TODO: Currently, structure GEPs are not checked, so there are several
|
|
// potentially unsafe GEPs here which we don't instrument.
|
|
//
|
|
// CHECK-LABEL: define{{.*}} void @struct_index
|
|
void struct_index(struct S1 *p) {
|
|
// CHECK: getelementptr inbounds %struct.S1, %struct.S1* [[P:%.*]], i64 10
|
|
// CHECK-NEXT: [[BASE:%.*]] = ptrtoint %struct.S1* [[P]] to i64, !nosanitize
|
|
// CHECK-NEXT: [[COMPGEP:%.*]] = add i64 [[BASE]], 240, !nosanitize
|
|
// CHECK: select
|
|
// CHECK: @__ubsan_handle_pointer_overflow{{.*}} i64 [[BASE]], i64 [[COMPGEP]]) {{.*}}, !nosanitize
|
|
|
|
// CHECK-NOT: @__ubsan_handle_pointer_overflow
|
|
|
|
p->arr[10].u.link->u.leaf;
|
|
}
|
|
|
|
typedef void (*funcptr_t)(void);
|
|
|
|
// CHECK-LABEL: define{{.*}} void @function_pointer_arith
|
|
void function_pointer_arith(funcptr_t *p, int k) {
|
|
// CHECK: add i64 {{.*}}, 8, !nosanitize
|
|
// CHECK-NOT: select
|
|
// CHECK: @__ubsan_handle_pointer_overflow{{.*}}
|
|
++p;
|
|
|
|
// CHECK: @llvm.smul.with.overflow.i64(i64 8, i64 {{.*}}), !nosanitize
|
|
// CHECK: select
|
|
// CHECK: call void @__ubsan_handle_pointer_overflow{{.*}}
|
|
p + k;
|
|
}
|
|
|
|
// CHECK-LABEL: define{{.*}} void @dont_emit_checks_for_no_op_GEPs
|
|
// CHECK-C: __ubsan_handle_pointer_overflow
|
|
// CHECK-CPP-NOT: __ubsan_handle_pointer_overflow
|
|
void dont_emit_checks_for_no_op_GEPs(char *p) {
|
|
&p[0];
|
|
|
|
int arr[10][10];
|
|
&arr[0][0];
|
|
}
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|