mirror of
https://github.com/RPCS3/llvm-mirror.git
synced 2024-11-22 10:42:39 +01:00
[MSAN] Never allow checking calls to __sanitizer_unaligned_{load,store}
These functions expect the caller to always pass shadows over TLS. Differential Revision: https://reviews.llvm.org/D84351
This commit is contained in:
parent
b85e3d578d
commit
8c1506c928
@ -3551,6 +3551,12 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
|
||||
maybeMarkSanitizerLibraryCallNoBuiltin(Call, TLI);
|
||||
}
|
||||
IRBuilder<> IRB(&CB);
|
||||
bool MayCheckCall = ClEagerChecks;
|
||||
if (Function *Func = CB.getCalledFunction()) {
|
||||
// __sanitizer_unaligned_{load,store} functions may be called by users
|
||||
// and always expects shadows in the TLS. So don't check them.
|
||||
MayCheckCall &= !Func->getName().startswith("__sanitizer_unaligned_");
|
||||
}
|
||||
|
||||
unsigned ArgOffset = 0;
|
||||
LLVM_DEBUG(dbgs() << " CallSite: " << CB << "\n");
|
||||
@ -3576,7 +3582,7 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
|
||||
|
||||
bool ByVal = CB.paramHasAttr(i, Attribute::ByVal);
|
||||
bool NoUndef = CB.paramHasAttr(i, Attribute::NoUndef);
|
||||
bool EagerCheck = ClEagerChecks && !ByVal && NoUndef;
|
||||
bool EagerCheck = MayCheckCall && !ByVal && NoUndef;
|
||||
|
||||
if (EagerCheck) {
|
||||
insertShadowCheck(A, &CB);
|
||||
@ -3632,7 +3638,7 @@ struct MemorySanitizerVisitor : public InstVisitor<MemorySanitizerVisitor> {
|
||||
if (isa<CallInst>(CB) && cast<CallInst>(CB).isMustTailCall())
|
||||
return;
|
||||
|
||||
if (ClEagerChecks && CB.hasRetAttr(Attribute::NoUndef)) {
|
||||
if (MayCheckCall && CB.hasRetAttr(Attribute::NoUndef)) {
|
||||
setShadow(&CB, getCleanShadow(&CB));
|
||||
setOrigin(&CB, getCleanOrigin());
|
||||
return;
|
||||
|
@ -0,0 +1,30 @@
|
||||
; RUN: opt < %s -msan-eager-checks -msan-check-access-address=0 -S -passes=msan 2>&1 | FileCheck %s
|
||||
; RUN: opt < %s -msan-eager-checks -msan-check-access-address=0 -msan-track-origins=2 -S -passes=msan 2>&1 | FileCheck %s -check-prefixes=CHECK,CHECK-ORIGIN
|
||||
; RUN: opt < %s -msan-eager-checks -msan -msan-check-access-address=0 -S | FileCheck %s
|
||||
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128-n8:16:32:64-S128"
|
||||
target triple = "x86_64-unknown-linux-gnu"
|
||||
|
||||
declare noundef i8 @__sanitizer_unaligned_load8(i8* noundef)
|
||||
declare void @__sanitizer_unaligned_store8(i8* noundef, i8 noundef)
|
||||
|
||||
define noundef i8 @unaligned_load(i8* noundef %ptr) sanitize_memory {
|
||||
; CHECK: @unaligned_load(i8* {{.*}}[[PTR:%.+]])
|
||||
; CHECK: store i64 0, {{.*}} @__msan_param_tls
|
||||
; CHECK: [[VAL:%.*]] = call noundef i8 @__sanitizer_unaligned_load8(i8* noundef [[PTR]])
|
||||
%val = call noundef i8 @__sanitizer_unaligned_load8(i8* noundef %ptr)
|
||||
; CHECK: load {{.*}} @__msan_retval_tls
|
||||
; CHECK-ORIGIN: load {{.*}} @__msan_retval_origin_tls
|
||||
; CHECK: call void @__msan_warning_{{.*}}noreturn
|
||||
; CHECK: ret i8 [[VAL]]
|
||||
ret i8 %val
|
||||
}
|
||||
|
||||
define void @unaligned_store(i8* noundef %ptr, i8 noundef %val) sanitize_memory {
|
||||
; CHECK: @unaligned_store(i8* {{.*}}[[PTR:%.+]], i8 {{.*}}[[VAL:%.+]])
|
||||
; CHECK: store i64 0, {{.*}} @__msan_param_tls
|
||||
; CHECK: store i8 0, {{.*}} @__msan_param_tls
|
||||
; CHECK: call void @__sanitizer_unaligned_store8(i8* noundef [[PTR]], i8 noundef [[VAL]])
|
||||
call void @__sanitizer_unaligned_store8(i8* noundef %ptr, i8 noundef %val)
|
||||
; CHECK: ret void
|
||||
ret void
|
||||
}
|
Loading…
Reference in New Issue
Block a user