Hi!

The sanopt maybe_optimize_ubsan_ptr_ifn optimization behaves differently
on 32-bit and on 64-bit targets when using similar arguments maximum or
minimum of ptrdiff_t or values close to it.

The problem is that UHWI is 64-bit, regardless of whether addresses are
64-bit or 32-bit, so for 32-bit targets get_inner_reference returns
NULL offset and all the offset is in pbitpos, while on 64-bit targets
where such large offsets in bytes would fit into shwi, but in bits won't
fit, we return INTEGER_CST offset and often 0 pbitpos.

The following patch handles such offset, so that the sanopt behaves the
same way, and adjusts the testcase (which really should have just 14
matches, the 3 lines with comment changes are already covered by the
overflow check on p = b - SMAX;).

Bootstrapped/regtested on x86_64-linux and i686-linux, ok for trunk?

2018-03-13  Jakub Jelinek  <ja...@redhat.com>

        PR sanitizer/83392
        * sanopt.c (maybe_optimize_ubsan_ptr_ifn): Handle also
        INTEGER_CST offset, add it together with bitpos / 8 and
        sign extend based on POINTER_SIZE.

        * c-c++-common/ubsan/ptr-overflow-sanitization-1.c: Adjust expected
        check count from 17 to 14.

--- gcc/sanopt.c.jj     2018-03-02 00:15:54.670780980 +0100
+++ gcc/sanopt.c        2018-03-13 16:54:49.905621373 +0100
@@ -486,12 +486,17 @@ maybe_optimize_ubsan_ptr_ifn (sanopt_ctx
       HOST_WIDE_INT bitpos;
       base = get_inner_reference (base, &bitsize, &pbitpos, &offset, &mode,
                                  &unsignedp, &reversep, &volatilep);
-      if (offset == NULL_TREE
+      if ((offset == NULL_TREE || TREE_CODE (offset) == INTEGER_CST)
          && DECL_P (base)
          && pbitpos.is_constant (&bitpos))
        {
          gcc_assert (!DECL_REGISTER (base));
-         offset_int expr_offset = bitpos / BITS_PER_UNIT;
+         offset_int expr_offset;
+         if (offset)
+           expr_offset = wi::to_offset (offset) + bitpos / BITS_PER_UNIT;
+         else
+           expr_offset = bitpos / BITS_PER_UNIT;
+         expr_offset = wi::sext (expr_offset, POINTER_SIZE);
          offset_int total_offset = expr_offset + cur_offset;
          if (total_offset != wi::sext (total_offset, POINTER_SIZE))
            {
@@ -511,7 +516,7 @@ maybe_optimize_ubsan_ptr_ifn (sanopt_ctx
              && (!is_global_var (base) || decl_binds_to_current_def_p (base)))
            {
              offset_int base_size = wi::to_offset (DECL_SIZE_UNIT (base));
-             if (bitpos >= 0
+             if (!wi::neg_p (expr_offset)
                  && wi::les_p (total_offset, base_size))
                {
                  if (!wi::neg_p (total_offset)
@@ -532,7 +537,7 @@ maybe_optimize_ubsan_ptr_ifn (sanopt_ctx
             */
 
          bool sign_cur_offset = !wi::neg_p (cur_offset);
-         bool sign_expr_offset = bitpos >= 0;
+         bool sign_expr_offset = !wi::neg_p (expr_offset);
 
          tree base_addr
            = build1 (ADDR_EXPR, build_pointer_type (TREE_TYPE (base)), base);
--- gcc/testsuite/c-c++-common/ubsan/ptr-overflow-sanitization-1.c.jj   
2017-10-11 22:37:52.798901780 +0200
+++ gcc/testsuite/c-c++-common/ubsan/ptr-overflow-sanitization-1.c      
2018-03-13 17:00:18.947808006 +0100
@@ -25,9 +25,9 @@ void foo(void)
   p2 = p + 2;
 
   p = b - SMAX; /* pointer overflow check is needed */
-  p2 = p + (SMAX - 2); /* b - 2: pointer overflow check is needed */
-  p2 = p + (SMAX - 1); /* b - 1: pointer overflow check is needed */
-  p2 = p + SMAX; /* b: pointer overflow check is needed */
+  p2 = p + (SMAX - 2); /* b - 2: no need to check this  */
+  p2 = p + (SMAX - 1); /* b - 1: no need to check this */
+  p2 = p + SMAX; /* b: no need to check this */
   p2++; /* b + 1 */
 
   p = c;
@@ -75,4 +75,4 @@ void negative_to_negative (char *ptr)
   p2 += 5;
 }
 
-/* { dg-final { scan-tree-dump-times "__ubsan_handle_pointer_overflow" 17 
"optimized" } } */
+/* { dg-final { scan-tree-dump-times "__ubsan_handle_pointer_overflow" 14 
"optimized" } } */

        Jakub

Reply via email to