Hi! I've noticed we don't sanitize aggregate arguments of calls.
Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok for trunk? For asms I'm not 100% sure, the arguments might be unused in the asm, or used only conditionally etc. 2017-06-07 Jakub Jelinek <ja...@redhat.com> PR middle-end/81005 * ubsan.c (instrument_null): Avoid pointless code temporary. (pass_ubsan::execute): Instrument aggregate arguments of calls. * c-c++-common/ubsan/align-10.c: New test. * c-c++-common/ubsan/null-13.c: New test. --- gcc/ubsan.c.jj 2017-05-21 15:46:13.000000000 +0200 +++ gcc/ubsan.c 2017-06-07 14:14:27.883227570 +0200 @@ -1212,8 +1212,7 @@ instrument_null (gimple_stmt_iterator gs if (TREE_CODE (t) == ADDR_EXPR) t = TREE_OPERAND (t, 0); tree base = get_base_address (t); - const enum tree_code code = TREE_CODE (base); - if (code == MEM_REF + if (TREE_CODE (base) == MEM_REF && TREE_CODE (TREE_OPERAND (base, 0)) == SSA_NAME) instrument_mem_ref (t, base, &gsi, is_lhs); } @@ -2003,6 +2002,20 @@ pass_ubsan::execute (function *fun) instrument_null (gsi, true); if (gimple_assign_single_p (stmt)) instrument_null (gsi, false); + if (is_gimple_call (stmt)) + { + unsigned args_num = gimple_call_num_args (stmt); + for (unsigned i = 0; i < args_num; ++i) + { + tree arg = gimple_call_arg (stmt, i); + if (is_gimple_reg (arg) || is_gimple_min_invariant (arg)) + continue; + tree base = get_base_address (arg); + if (TREE_CODE (base) == MEM_REF + && TREE_CODE (TREE_OPERAND (base, 0)) == SSA_NAME) + instrument_mem_ref (arg, base, &gsi, false); + } + } } if (flag_sanitize & (SANITIZE_BOOL | SANITIZE_ENUM) --- gcc/testsuite/c-c++-common/ubsan/align-10.c.jj 2017-06-07 15:32:18.545409340 +0200 +++ gcc/testsuite/c-c++-common/ubsan/align-10.c 2017-06-07 17:06:44.000000000 +0200 @@ -0,0 +1,39 @@ +/* Limit this to known non-strict alignment targets. */ +/* { dg-do run { target { i?86-*-linux* x86_64-*-linux* } } } */ +/* { dg-options "-O -fsanitize=alignment -fsanitize-recover=alignment" } */ + +struct R { int a; } r; +struct S { struct R a; char b; long long c; short d[10]; }; +struct T { char a; long long b; }; +struct U { char a; int b; int c; long long d; struct S e; struct T f; } __attribute__((packed)); +struct V { long long a; struct S b; struct T c; struct U u; } v; + +__attribute__((noinline, noclone)) int +bar (int x, struct R y, struct R z) +{ + return x + y.a; +} + +__attribute__((noinline, noclone)) int +foo (struct S *p, struct S *q) +{ + int i = bar (0, r, r); + i += bar (1, p->a, r); + i += bar (2, r, q->a); + return i; +} + +int +main () +{ + char *p = (char *) &v.u.e; + struct S *q, *r; + asm volatile ("" : "=r" (q) : "0" (p)); + asm volatile ("" : "=r" (r) : "0" (p)); + if (foo (q, r) != 3) + __builtin_abort (); + return 0; +} + +/* { dg-output "\.c:21:\[0-9]*: \[^\n\r]*member access within misaligned address 0x\[0-9a-fA-F]* for type 'struct S', which requires \[48] byte alignment.*" } */ +/* { dg-output "\.c:22:\[0-9]*: \[^\n\r]*member access within misaligned address 0x\[0-9a-fA-F]* for type 'struct S', which requires \[48] byte alignment" } */ --- gcc/testsuite/c-c++-common/ubsan/null-13.c.jj 2017-06-07 14:21:27.460145351 +0200 +++ gcc/testsuite/c-c++-common/ubsan/null-13.c 2017-06-07 16:54:18.576027478 +0200 @@ -0,0 +1,37 @@ +/* { dg-do run } */ +/* { dg-options "-fsanitize=null -fno-sanitize-recover=null -w" } */ +/* { dg-shouldfail "ubsan" } */ + +struct S { + int i; + long long j; + long long m; +}; +union U { + int k; + struct S l; +}; + +__attribute__((noinline, noclone)) int +foo (struct S s) +{ + return s.i + s.j + s.m; +} + +__attribute__((noinline, noclone)) int +bar (union U *u) +{ + foo (u->l); +} + +union U v; + +int +main (void) +{ + union U *u = 0; + asm volatile ("" : "+r" (u) : "r" (&v) : "memory"); + return bar (u); +} + +/* { dg-output "member access within null pointer of type 'union U'" } */ Jakub