|
25 | 25 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_500:.*]] = {{.*}}, i32 500, i32 15 } }
|
26 | 26 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_700:.*]] = {{.*}}, i32 700, i32 15 } }
|
27 | 27 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_800:.*]] = {{.*}}, i32 800, i32 15 } }
|
28 |
| -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_900:.*]] = {{.*}}, i32 900, i32 15 } } |
29 |
| -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1100:.*]] = {{.*}}, i32 1100, i32 15 } } |
30 |
| -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1200:.*]] = {{.*}}, i32 1200, i32 15 } } |
31 |
| -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1300:.*]] = {{.*}}, i32 1300, i32 15 } } |
32 |
| -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1500:.*]] = {{.*}}, i32 1500, i32 15 } } |
33 |
| -// CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1600:.*]] = {{.*}}, i32 1600, i32 15 } } |
34 | 28 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1700:.*]] = {{.*}}, i32 1700, i32 15 } }
|
35 | 29 | // CHECK-SANITIZE-ANYRECOVER-DAG: @[[LINE_1800:.*]] = {{.*}}, i32 1800, i32 20 } }
|
36 | 30 |
|
@@ -225,172 +219,6 @@ char *nullptr_allones_BAD(void) {
|
225 | 219 |
|
226 | 220 | //------------------------------------------------------------------------------
|
227 | 221 |
|
228 |
| -char *one_var(unsigned long offset) { |
229 |
| - // CHECK: define{{.*}} ptr @one_var(i64 noundef %[[OFFSET:.*]]) |
230 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
231 |
| - // CHECK-NEXT: %[[OFFSET_ADDR:.*]] = alloca i64, align 8 |
232 |
| - // CHECK-NEXT: store i64 %[[OFFSET]], ptr %[[OFFSET_ADDR]], align 8 |
233 |
| - // CHECK-NEXT: %[[OFFSET_RELOADED:.*]] = load i64, ptr %[[OFFSET_ADDR]], align 8 |
234 |
| - // CHECK-NEXT: %[[ADD_PTR:.*]] = getelementptr inbounds nuw i8, ptr inttoptr (i64 1 to ptr), i64 %[[OFFSET_RELOADED]] |
235 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_AGGREGATE:.*]] = call { i64, i1 } @llvm.smul.with.overflow.i64(i64 1, i64 %[[OFFSET_RELOADED]]), !nosanitize |
236 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_OVERFLOWED:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 1, !nosanitize |
237 |
| - // CHECK-SANITIZE-NEXT: %[[OR_OV:.+]] = or i1 %[[COMPUTED_OFFSET_OVERFLOWED]], false, !nosanitize |
238 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 0, !nosanitize |
239 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP:.*]] = add i64 1, %[[COMPUTED_OFFSET]], !nosanitize |
240 |
| - // CHECK-SANITIZE-NEXT: %[[OTHER_IS_NOT_NULL:.*]] = icmp ne ptr inttoptr (i64 1 to ptr), null |
241 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_NOT_NULL:.*]] = icmp ne i64 %[[COMPUTED_GEP]], 0, !nosanitize |
242 |
| - // CHECK-SANITIZE-NEXT: %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL:.*]] = icmp eq i1 %[[OTHER_IS_NOT_NULL]], %[[COMPUTED_GEP_IS_NOT_NULL]], !nosanitize |
243 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW:.*]] = xor i1 %[[OR_OV]], true, !nosanitize |
244 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_UGE_BASE:.*]] = icmp uge i64 %[[COMPUTED_GEP]], 1, !nosanitize |
245 |
| - // CHECK-SANITIZE-NEXT: %[[GEP_DID_NOT_OVERFLOW:.*]] = and i1 %[[COMPUTED_GEP_IS_UGE_BASE]], %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW]], !nosanitize |
246 |
| - // CHECK-SANITIZE-NEXT: %[[GEP_IS_OKAY:.*]] = and i1 %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL]], %[[GEP_DID_NOT_OVERFLOW]], !nosanitize |
247 |
| - // CHECK-SANITIZE-NEXT: br i1 %[[GEP_IS_OKAY]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
248 |
| - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
249 |
| - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_900]], i64 1, i64 %[[COMPUTED_GEP]]) |
250 |
| - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_900]], i64 1, i64 %[[COMPUTED_GEP]]) |
251 |
| - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
252 |
| - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
253 |
| - // CHECK-SANITIZE: [[CONT]]: |
254 |
| - // CHECK-NEXT: ret ptr %[[ADD_PTR]] |
255 |
| - static char *const base = (char *)1; |
256 |
| -#line 900 |
257 |
| - return base + offset; |
258 |
| -} |
259 |
| - |
260 |
| -char *one_zero(void) { |
261 |
| - // CHECK: define{{.*}} ptr @one_zero() |
262 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
263 |
| - // CHECK-NEXT: ret ptr inttoptr (i64 1 to ptr) |
264 |
| - static char *const base = (char *)1; |
265 |
| - static const unsigned long offset = 0; |
266 |
| -#line 1000 |
267 |
| - return base + offset; |
268 |
| -} |
269 |
| - |
270 |
| -char *one_one_OK(void) { |
271 |
| - // CHECK: define{{.*}} ptr @one_one_OK() |
272 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
273 |
| - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 1 to ptr), null, !nosanitize |
274 |
| - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) to i64), i64 1), i64 1), 0, !nosanitize |
275 |
| - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
276 |
| - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
277 |
| - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
278 |
| - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1100]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) to i64), i64 1), i64 1)) |
279 |
| - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1100]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) to i64), i64 1), i64 1)) |
280 |
| - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
281 |
| - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
282 |
| - // CHECK-SANITIZE: [[CONT]]: |
283 |
| - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 1) |
284 |
| - static char *const base = (char *)1; |
285 |
| - static const unsigned long offset = 1; |
286 |
| -#line 1100 |
287 |
| - return base + offset; |
288 |
| -} |
289 |
| - |
290 |
| -char *one_allones_BAD(void) { |
291 |
| - // CHECK: define{{.*}} ptr @one_allones_BAD() |
292 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
293 |
| - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 1 to ptr), null, !nosanitize |
294 |
| - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) to i64), i64 1), i64 1), 0, !nosanitize |
295 |
| - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
296 |
| - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
297 |
| - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
298 |
| - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1200]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) to i64), i64 1), i64 1)) |
299 |
| - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1200]], i64 1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) to i64), i64 1), i64 1)) |
300 |
| - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
301 |
| - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
302 |
| - // CHECK-SANITIZE: [[CONT]]: |
303 |
| - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 1 to ptr), i64 -1) |
304 |
| - static char *const base = (char *)1; |
305 |
| - static const unsigned long offset = -1; |
306 |
| -#line 1200 |
307 |
| - return base + offset; |
308 |
| -} |
309 |
| - |
310 |
| -//------------------------------------------------------------------------------ |
311 |
| - |
312 |
| -char *allones_var(unsigned long offset) { |
313 |
| - // CHECK: define{{.*}} ptr @allones_var(i64 noundef %[[OFFSET:.*]]) |
314 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
315 |
| - // CHECK-NEXT: %[[OFFSET_ADDR:.*]] = alloca i64, align 8 |
316 |
| - // CHECK-NEXT: store i64 %[[OFFSET]], ptr %[[OFFSET_ADDR]], align 8 |
317 |
| - // CHECK-NEXT: %[[OFFSET_RELOADED:.*]] = load i64, ptr %[[OFFSET_ADDR]], align 8 |
318 |
| - // CHECK-NEXT: %[[ADD_PTR:.*]] = getelementptr inbounds nuw i8, ptr inttoptr (i64 -1 to ptr), i64 %[[OFFSET_RELOADED]] |
319 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_AGGREGATE:.*]] = call { i64, i1 } @llvm.smul.with.overflow.i64(i64 1, i64 %[[OFFSET_RELOADED]]), !nosanitize |
320 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_OVERFLOWED:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 1, !nosanitize |
321 |
| - // CHECK-SANITIZE-NEXT: %[[OR_OV:.+]] = or i1 %[[COMPUTED_OFFSET_OVERFLOWED]], false, !nosanitize |
322 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET:.*]] = extractvalue { i64, i1 } %[[COMPUTED_OFFSET_AGGREGATE]], 0, !nosanitize |
323 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP:.*]] = add i64 -1, %[[COMPUTED_OFFSET]], !nosanitize |
324 |
| - // CHECK-SANITIZE-NEXT: %[[OTHER_IS_NOT_NULL:.*]] = icmp ne ptr inttoptr (i64 -1 to ptr), null, !nosanitize |
325 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_NOT_NULL:.*]] = icmp ne i64 %[[COMPUTED_GEP]], 0, !nosanitize |
326 |
| - // CHECK-SANITIZE-NEXT: %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL:.*]] = icmp eq i1 %[[OTHER_IS_NOT_NULL]], %[[COMPUTED_GEP_IS_NOT_NULL]], !nosanitize |
327 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW:.*]] = xor i1 %[[OR_OV]], true, !nosanitize |
328 |
| - // CHECK-SANITIZE-NEXT: %[[COMPUTED_GEP_IS_UGE_BASE:.*]] = icmp uge i64 %[[COMPUTED_GEP]], -1, !nosanitize |
329 |
| - // CHECK-SANITIZE-NEXT: %[[GEP_DID_NOT_OVERFLOW:.*]] = and i1 %[[COMPUTED_GEP_IS_UGE_BASE]], %[[COMPUTED_OFFSET_DID_NOT_OVERFLOW]], !nosanitize |
330 |
| - // CHECK-SANITIZE-NEXT: %[[GEP_IS_OKAY:.*]] = and i1 %[[BOTH_POINTERS_ARE_NULL_OR_BOTH_ARE_NONNULL]], %[[GEP_DID_NOT_OVERFLOW]], !nosanitize |
331 |
| - // CHECK-SANITIZE-NEXT: br i1 %[[GEP_IS_OKAY]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
332 |
| - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
333 |
| - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1300]], i64 -1, i64 %[[COMPUTED_GEP]]) |
334 |
| - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1300]], i64 -1, i64 %[[COMPUTED_GEP]]) |
335 |
| - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
336 |
| - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
337 |
| - // CHECK-SANITIZE: [[CONT]]: |
338 |
| - // CHECK-NEXT: ret ptr %[[ADD_PTR]] |
339 |
| - static char *const base = (char *)-1; |
340 |
| -#line 1300 |
341 |
| - return base + offset; |
342 |
| -} |
343 |
| - |
344 |
| -char *allones_zero_OK(void) { |
345 |
| - // CHECK: define{{.*}} ptr @allones_zero_OK() |
346 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
347 |
| - // CHECK-NEXT: ret ptr inttoptr (i64 -1 to ptr) |
348 |
| - static char *const base = (char *)-1; |
349 |
| - static const unsigned long offset = 0; |
350 |
| -#line 1400 |
351 |
| - return base + offset; |
352 |
| -} |
353 |
| - |
354 |
| -char *allones_one_BAD(void) { |
355 |
| - // CHECK: define{{.*}} ptr @allones_one_BAD() |
356 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
357 |
| - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 -1 to ptr), null, !nosanitize |
358 |
| - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) to i64), i64 -1), i64 -1), 0, !nosanitize |
359 |
| - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
360 |
| - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
361 |
| - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
362 |
| - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1500]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) to i64), i64 -1), i64 -1)) |
363 |
| - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1500]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) to i64), i64 -1), i64 -1)) |
364 |
| - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
365 |
| - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
366 |
| - // CHECK-SANITIZE: [[CONT]]: |
367 |
| - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 1) |
368 |
| - static char *const base = (char *)-1; |
369 |
| - static const unsigned long offset = 1; |
370 |
| -#line 1500 |
371 |
| - return base + offset; |
372 |
| -} |
373 |
| - |
374 |
| -char *allones_allones_OK(void) { |
375 |
| - // CHECK: define{{.*}} ptr @allones_allones_OK() |
376 |
| - // CHECK-NEXT: [[ENTRY:.*]]: |
377 |
| - // CHECK-SANITIZE-NEXT: %[[CMP1:.*]] = icmp ne ptr inttoptr (i64 -1 to ptr), null, !nosanitize |
378 |
| - // CHECK-SANITIZE-NEXT: %[[CMP2:.*]] = icmp ne i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) to i64), i64 -1), i64 -1), 0, !nosanitize |
379 |
| - // CHECK-SANITIZE-NEXT: %[[COND:.*]] = icmp eq i1 %[[CMP1]], %[[CMP2]], !nosanitize |
380 |
| - // CHECK-SANITIZE-NEXT: br i1 %[[COND]], label %[[CONT:.*]], label %[[HANDLER_POINTER_OVERFLOW:[^,]+]],{{.*}} !nosanitize |
381 |
| - // CHECK-SANITIZE: [[HANDLER_POINTER_OVERFLOW]]: |
382 |
| - // CHECK-SANITIZE-NORECOVER-NEXT: call void @__ubsan_handle_pointer_overflow_abort(ptr @[[LINE_1600]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) to i64), i64 -1), i64 -1)) |
383 |
| - // CHECK-SANITIZE-RECOVER-NEXT: call void @__ubsan_handle_pointer_overflow(ptr @[[LINE_1600]], i64 -1, i64 add (i64 sub (i64 ptrtoint (ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) to i64), i64 -1), i64 -1)) |
384 |
| - // CHECK-SANITIZE-TRAP-NEXT: call void @llvm.ubsantrap(i8 19){{.*}}, !nosanitize |
385 |
| - // CHECK-SANITIZE-UNREACHABLE-NEXT: unreachable, !nosanitize |
386 |
| - // CHECK-SANITIZE: [[CONT]]: |
387 |
| - // CHECK-NEXT: ret ptr getelementptr inbounds nuw (i8, ptr inttoptr (i64 -1 to ptr), i64 -1) |
388 |
| - static char *const base = (char *)-1; |
389 |
| - static const unsigned long offset = -1; |
390 |
| -#line 1600 |
391 |
| - return base + offset; |
392 |
| -} |
393 |
| - |
394 | 222 | // C++ does not allow void* arithmetic even as a GNU extension. Replace void*
|
395 | 223 | // with char* in that case to keep test expectations the same.
|
396 | 224 | #ifdef __cplusplus
|
|
0 commit comments