|
25 | 25 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_500:.*]] = {{.*}}, i32 500, i32 15 } } |
26 | 26 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_700:.*]] = {{.*}}, i32 700, i32 15 } } |
27 | 27 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_800:.*]] = {{.*}}, i32 800, i32 15 } } |
28 | | -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_900:.*]] = {{.*}}, i32 900, i32 15 } } |
29 | | -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1100:.*]] = {{.*}}, i32 1100, i32 15 } } |
30 | | -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1200:.*]] = {{.*}}, i32 1200, i32 15 } } |
31 | | -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1300:.*]] = {{.*}}, i32 1300, i32 15 } } |
32 | | -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1500:.*]] = {{.*}}, i32 1500, i32 15 } } |
33 | | -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1600:.*]] = {{.*}}, i32 1600, i32 15 } } |
34 | 28 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1700:.*]] = {{.*}}, i32 1700, i32 15 } } |
35 | 29 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1800:.*]] = {{.*}}, i32 1800, i32 20 } } |
36 | 30 |
|
@@ -225,172 +219,6 @@ char *nullptr_allones_BAD(void) { |
225 | 219 |
|
226 | 220 | //------------------------------------------------------------------------------ |
227 | 221 |
|
228 | | -char *one_var(unsigned long offset) { |
229 | | - // CHECK: define{{.*}} ptr @one_var(i64 noundef %[[OFFSET:.*]]) |
230 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
231 | | - // CHECK-NEXT: %[[OFFSET_ADDR:.*]] = alloca i64, align 8 |
232 | | - // CHECK-NEXT: store i64 %[[OFFSET]], ptr %[[OFFSET_ADDR]], align 8 |
233 | | - // CHECK-NEXT: %[[OFFSET_RELOADED:.*]] = load i64, ptr %[[OFFSET_ADDR]], align 8 |
234 | | - // CHECK-NEXT: %[[ADD_PTR:.*]] = getelementptr inbounds nuw i8, ptr inttoptr (i64 1 to ptr), i64 %[[OFFSET_RELOADED]] |
235 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_AGGREGATE:.*]] = call { i64, i1 } @llvm.smul.with.overflow.i64(i64 1, i64 %[[OFFSET_RELOADED]]), !nosanitize |
236 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_OVERFLOWED:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 1, !nosanitize |
237 | | - // CHECK-SANITIZE-NEXT: %[[OR_OV:.+]] = or i1 %[[COMPUTED_OFFSET_OVERFLOWED]], false, !nosanitize |
238 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 0, !nosanitize |
239 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP:.*]] = add i64 1, %[[COMPUTED_OFFSET]], !nosanitize |
240 | | - // CHECK-SANITIZE-NEXT: %[[OTHER_IS_NOT_NULL:.*]] = icmp ne ptr inttoptr (i64 1 to ptr), null |
241 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_NOT_NULL:.*]] = icmp ne i64 %[[COMPUTED_GEP]], 0, !nosanitize |
242 | | - // CHECK-SANITIZE-NEXT: %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL:.*]] = icmp eq i1 %[[OTHER_IS_NOT_NULL]], %[[COMPUTED_GEP_IS_NOT_NULL]], !nosanitize |
243 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW:.*]] = xor i1 %[[OR_OV]], true, !nosanitize |
244 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_UGE_BASE:.*]] = icmp uge i64 %[[COMPUTED_GEP]], 1, !nosanitize |
245 | | - // CHECK-SANITIZE-NEXT: %[[GEP_DID_NOT_OVERFLOW:.*]] = and i1 %[[COMPUTED_GEP_IS_UGE_BASE]], %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW]], !nosanitize |
246 | | - // CHECK-SANITIZE-NEXT: %[[GEP_IS_OKAY:.*]] = and i1 %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL]], %[[GEP_DID_NOT_OVERFLOW]], !nosanitize |
247 | | - // CHECK-SANITIZE-NEXT: br i1 %[[GEP_IS_OKAY]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
248 | | - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
249 | | - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_900]], i64 1, i64 %[[COMPUTED_GEP]]) |
250 | | - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_900]], i64 1, i64 %[[COMPUTED_GEP]]) |
251 | | - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
252 | | - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
253 | | - // CHECK-SANITIZE: [[CONT]]: |
254 | | - // CHECK-NEXT: ret ptr %[[ADD_PTR]] |
255 | | - static char *const base = (char *)1; |
256 | | -#line 900 |
257 | | - return base + offset; |
258 | | -} |
259 | | - |
260 | | -char *one_zero(void) { |
261 | | - // CHECK: define{{.*}} ptr @one_zero() |
262 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
263 | | - // CHECK-NEXT: ret ptr inttoptr (i64 1 to ptr) |
264 | | - static char *const base = (char *)1; |
265 | | - static const unsigned long offset = 0; |
266 | | -#line 1000 |
267 | | - return base + offset; |
268 | | -} |
269 | | - |
270 | | -char *one_one_OK(void) { |
271 | | - // CHECK: define{{.*}} ptr @one_one_OK() |
272 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
273 | | - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 1 to ptr), null, !nosanitize |
274 | | - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) to i64), i64 1), i64 1), 0, !nosanitize |
275 | | - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
276 | | - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
277 | | - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
278 | | - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1100]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) to i64), i64 1), i64 1)) |
279 | | - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1100]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) to i64), i64 1), i64 1)) |
280 | | - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
281 | | - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
282 | | - // CHECK-SANITIZE: [[CONT]]: |
283 | | - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) |
284 | | - static char *const base = (char *)1; |
285 | | - static const unsigned long offset = 1; |
286 | | -#line 1100 |
287 | | - return base + offset; |
288 | | -} |
289 | | - |
290 | | -char *one_allones_BAD(void) { |
291 | | - // CHECK: define{{.*}} ptr @one_allones_BAD() |
292 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
293 | | - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 1 to ptr), null, !nosanitize |
294 | | - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) to i64), i64 1), i64 1), 0, !nosanitize |
295 | | - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
296 | | - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
297 | | - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
298 | | - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1200]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) to i64), i64 1), i64 1)) |
299 | | - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1200]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) to i64), i64 1), i64 1)) |
300 | | - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
301 | | - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
302 | | - // CHECK-SANITIZE: [[CONT]]: |
303 | | - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) |
304 | | - static char *const base = (char *)1; |
305 | | - static const unsigned long offset = -1; |
306 | | -#line 1200 |
307 | | - return base + offset; |
308 | | -} |
309 | | - |
310 | | -//------------------------------------------------------------------------------ |
311 | | - |
312 | | -char *allones_var(unsigned long offset) { |
313 | | - // CHECK: define{{.*}} ptr @allones_var(i64 noundef %[[OFFSET:.*]]) |
314 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
315 | | - // CHECK-NEXT: %[[OFFSET_ADDR:.*]] = alloca i64, align 8 |
316 | | - // CHECK-NEXT: store i64 %[[OFFSET]], ptr %[[OFFSET_ADDR]], align 8 |
317 | | - // CHECK-NEXT: %[[OFFSET_RELOADED:.*]] = load i64, ptr %[[OFFSET_ADDR]], align 8 |
318 | | - // CHECK-NEXT: %[[ADD_PTR:.*]] = getelementptr inbounds nuw i8, ptr inttoptr (i64 -1 to ptr), i64 %[[OFFSET_RELOADED]] |
319 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_AGGREGATE:.*]] = call { i64, i1 } @llvm.smul.with.overflow.i64(i64 1, i64 %[[OFFSET_RELOADED]]), !nosanitize |
320 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_OVERFLOWED:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 1, !nosanitize |
321 | | - // CHECK-SANITIZE-NEXT: %[[OR_OV:.+]] = or i1 %[[COMPUTED_OFFSET_OVERFLOWED]], false, !nosanitize |
322 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 0, !nosanitize |
323 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP:.*]] = add i64 -1, %[[COMPUTED_OFFSET]], !nosanitize |
324 | | - // CHECK-SANITIZE-NEXT: %[[OTHER_IS_NOT_NULL:.*]] = icmp ne ptr inttoptr (i64 -1 to ptr), null, !nosanitize |
325 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_NOT_NULL:.*]] = icmp ne i64 %[[COMPUTED_GEP]], 0, !nosanitize |
326 | | - // CHECK-SANITIZE-NEXT: %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL:.*]] = icmp eq i1 %[[OTHER_IS_NOT_NULL]], %[[COMPUTED_GEP_IS_NOT_NULL]], !nosanitize |
327 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW:.*]] = xor i1 %[[OR_OV]], true, !nosanitize |
328 | | - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_UGE_BASE:.*]] = icmp uge i64 %[[COMPUTED_GEP]], -1, !nosanitize |
329 | | - // CHECK-SANITIZE-NEXT: %[[GEP_DID_NOT_OVERFLOW:.*]] = and i1 %[[COMPUTED_GEP_IS_UGE_BASE]], %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW]], !nosanitize |
330 | | - // CHECK-SANITIZE-NEXT: %[[GEP_IS_OKAY:.*]] = and i1 %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL]], %[[GEP_DID_NOT_OVERFLOW]], !nosanitize |
331 | | - // CHECK-SANITIZE-NEXT: br i1 %[[GEP_IS_OKAY]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
332 | | - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
333 | | - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1300]], i64 -1, i64 %[[COMPUTED_GEP]]) |
334 | | - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1300]], i64 -1, i64 %[[COMPUTED_GEP]]) |
335 | | - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
336 | | - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
337 | | - // CHECK-SANITIZE: [[CONT]]: |
338 | | - // CHECK-NEXT: ret ptr %[[ADD_PTR]] |
339 | | - static char *const base = (char *)-1; |
340 | | -#line 1300 |
341 | | - return base + offset; |
342 | | -} |
343 | | - |
344 | | -char *allones_zero_OK(void) { |
345 | | - // CHECK: define{{.*}} ptr @allones_zero_OK() |
346 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
347 | | - // CHECK-NEXT: ret ptr inttoptr (i64 -1 to ptr) |
348 | | - static char *const base = (char *)-1; |
349 | | - static const unsigned long offset = 0; |
350 | | -#line 1400 |
351 | | - return base + offset; |
352 | | -} |
353 | | - |
354 | | -char *allones_one_BAD(void) { |
355 | | - // CHECK: define{{.*}} ptr @allones_one_BAD() |
356 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
357 | | - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 -1 to ptr), null, !nosanitize |
358 | | - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) to i64), i64 -1), i64 -1), 0, !nosanitize |
359 | | - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
360 | | - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
361 | | - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
362 | | - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1500]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) to i64), i64 -1), i64 -1)) |
363 | | - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1500]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) to i64), i64 -1), i64 -1)) |
364 | | - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
365 | | - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
366 | | - // CHECK-SANITIZE: [[CONT]]: |
367 | | - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) |
368 | | - static char *const base = (char *)-1; |
369 | | - static const unsigned long offset = 1; |
370 | | -#line 1500 |
371 | | - return base + offset; |
372 | | -} |
373 | | - |
374 | | -char *allones_allones_OK(void) { |
375 | | - // CHECK: define{{.*}} ptr @allones_allones_OK() |
376 | | - // CHECK-NEXT: [[ENTRY:.*]]: |
377 | | - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 -1 to ptr), null, !nosanitize |
378 | | - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) to i64), i64 -1), i64 -1), 0, !nosanitize |
379 | | - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
380 | | - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
381 | | - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
382 | | - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1600]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) to i64), i64 -1), i64 -1)) |
383 | | - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1600]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) to i64), i64 -1), i64 -1)) |
384 | | - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
385 | | - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
386 | | - // CHECK-SANITIZE: [[CONT]]: |
387 | | - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) |
388 | | - static char *const base = (char *)-1; |
389 | | - static const unsigned long offset = -1; |
390 | | -#line 1600 |
391 | | - return base + offset; |
392 | | -} |
393 | | - |
394 | 222 | // C++ does not allow void* arithmetic even as a GNU extension. Replace void* |
395 | 223 | // with char* in that case to keep test expectations the same. |
396 | 224 | #ifdef __cplusplus |
|
0 commit comments