From 0ca032b03dc3a862670461651b3a950d1f14991b Mon Sep 17 00:00:00 2001 From: Kostya Serebryany Date: Mon, 6 Feb 2012 22:48:56 +0000 Subject: [PATCH] The patch resolves the conflict between AddressSanitizer and load widening (GVN). The problem initially reported by Mozilla folks (http://code.google.com/p/address-sanitizer/issues/detail?id=20), but it also prevents us from enabling LLVM bootstrap with AddressSanitizer. git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@149925 91177308-0d34-0410-b5e6-96231b3b80d8 --- lib/Analysis/MemoryDependenceAnalysis.cpp | 8 ++++ .../AddressSanitizer/asan-vs-gvn.ll | 43 +++++++++++++++++++ 2 files changed, 51 insertions(+) create mode 100644 test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll diff --git a/lib/Analysis/MemoryDependenceAnalysis.cpp b/lib/Analysis/MemoryDependenceAnalysis.cpp index 30f8d94698f..cfaf2da6ce5 100644 --- a/lib/Analysis/MemoryDependenceAnalysis.cpp +++ b/lib/Analysis/MemoryDependenceAnalysis.cpp @@ -323,6 +323,14 @@ getLoadLoadClobberFullWidthSize(const Value *MemLocBase, int64_t MemLocOffs, !TD.fitsInLegalInteger(NewLoadByteSize*8)) return 0; + if (LIOffs+NewLoadByteSize > MemLocEnd && + LI->getParent()->getParent()->hasFnAttr(Attribute::AddressSafety)) { + // We will be reading past the location accessed by the original program. + // While this is safe in a regular build, Address Safety analysis tools + // may start reporting false warnings. So, don't do widening. + return 0; + } + // If a load of this width would include all of MemLoc, then we succeed. if (LIOffs+NewLoadByteSize >= MemLocEnd) return NewLoadByteSize; diff --git a/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll b/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll new file mode 100644 index 00000000000..e7a57136323 --- /dev/null +++ b/test/Instrumentation/AddressSanitizer/asan-vs-gvn.ll @@ -0,0 +1,43 @@ +; RUN: opt < %s -basicaa -gvn -asan -S | FileCheck %s +; ASAN conflicts with load widening iff the widened load accesses data out of bounds +; (while the original unwidened loads do not). +; http://code.google.com/p/address-sanitizer/issues/detail?id=20#c1 + + +; 32-bit little endian target. +target datalayout = "e-p:32:32:32-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:32:64-f32:32:32-f64:32:64-v64:64:64-v128:128:128-a0:0:64-f80:128:128-n8:16:32" + +%struct_of_7_bytes_4_aligned = type { i32, i8, i8, i8} + +@f = global %struct_of_7_bytes_4_aligned zeroinitializer, align 4 + +; Accessing bytes 4 and 6, not ok to widen to i32 if address_safety is set. + +define i32 @test_widening_bad(i8* %P) nounwind ssp noredzone address_safety { +entry: + %tmp = load i8* getelementptr inbounds (%struct_of_7_bytes_4_aligned* @f, i64 0, i32 1), align 4 + %conv = zext i8 %tmp to i32 + %tmp1 = load i8* getelementptr inbounds (%struct_of_7_bytes_4_aligned* @f, i64 0, i32 3), align 1 + %conv2 = zext i8 %tmp1 to i32 + %add = add nsw i32 %conv, %conv2 + ret i32 %add +; CHECK: @test_widening_bad +; CHECK: __asan_report_load1 +; CHECK: __asan_report_load1 +; CHECK-ret i32 +} + +;; Accessing byets 4 and 5. Ok to widen to i16. + +define i32 @test_widening_ok(i8* %P) nounwind ssp noredzone address_safety { +entry: + %tmp = load i8* getelementptr inbounds (%struct_of_7_bytes_4_aligned* @f, i64 0, i32 1), align 4 + %conv = zext i8 %tmp to i32 + %tmp1 = load i8* getelementptr inbounds (%struct_of_7_bytes_4_aligned* @f, i64 0, i32 2), align 1 + %conv2 = zext i8 %tmp1 to i32 + %add = add nsw i32 %conv, %conv2 + ret i32 %add +; CHECK: @test_widening_ok +; CHECK: __asan_report_load1 +; CHECK-ret i32 +}