Hi!

Working virtually out of Pago Pago right now.

In C++, falling through the end of a function that returns a value
without returning a value is undefined behavior (unlike C?), so this patch
implements instrumentation of it.

Ok for trunk? 

2013-11-21  Jakub Jelinek  <ja...@redhat.com>

        * ubsan.c (ubsan_source_location): Don't crash on
        unknown locations.
        (ubsan_pass): Ignore clobber stmts.

        * sanitizer.def (BUILT_IN_UBSAN_HANDLE_MISSING_RETURN): New built-in.
        * opts.c (common_handle_option): Add -fsanitize=return.
        * flag-types.h (enum sanitize_code): Add SANITIZE_RETURN and
        or it into SANITIZE_UNDEFINED.
c-family/
        * c-ubsan.h (ubsan_instrument_return): New prototype.
        * c-ubsan.c (ubsan_instrument_return): New function.
cp/
        * cp-gimplify.c: Include target.h and c-family/c-ubsan.h.
        (cp_genericize): Handle -fsanitize=return.
testsuite/
        * g++.dg/ubsan/return-1.C: New test.
        * g++.dg/ubsan/return-2.C: New test.

--- gcc/ubsan.c.jj      2013-11-22 01:40:03.000000000 +0100
+++ gcc/ubsan.c 2013-11-22 10:05:29.491725405 +0100
@@ -227,8 +227,8 @@ ubsan_source_location (location_t loc)
   xloc = expand_location (loc);
 
   /* Fill in the values from LOC.  */
-  size_t len = strlen (xloc.file);
-  tree str = build_string (len + 1, xloc.file);
+  size_t len = xloc.file ? strlen (xloc.file) : 0;
+  tree str = build_string (len + 1, xloc.file ? xloc.file : "");
   TREE_TYPE (str) = build_array_type (char_type_node,
                                      build_index_type (size_int (len)));
   TREE_READONLY (str) = 1;
@@ -642,7 +642,7 @@ ubsan_pass (void)
        {
          struct walk_stmt_info wi;
          gimple stmt = gsi_stmt (gsi);
-         if (is_gimple_debug (stmt))
+         if (is_gimple_debug (stmt) || gimple_clobber_p (stmt))
            {
              gsi_next (&gsi);
              continue;
--- gcc/sanitizer.def.jj        2013-11-22 01:40:03.000000000 +0100
+++ gcc/sanitizer.def   2013-11-22 09:44:03.818203700 +0100
@@ -297,6 +297,10 @@ DEF_SANITIZER_BUILTIN(BUILT_IN_UBSAN_HAN
                      "__ubsan_handle_builtin_unreachable",
                      BT_FN_VOID_PTR,
                      ATTR_COLD_NORETURN_NOTHROW_LEAF_LIST)
+DEF_SANITIZER_BUILTIN(BUILT_IN_UBSAN_HANDLE_MISSING_RETURN,
+                     "__ubsan_handle_missing_return",
+                     BT_FN_VOID_PTR,
+                     ATTR_NORETURN_NOTHROW_LEAF_LIST)
 DEF_SANITIZER_BUILTIN(BUILT_IN_UBSAN_HANDLE_VLA_BOUND_NOT_POSITIVE,
                      "__ubsan_handle_vla_bound_not_positive",
                      BT_FN_VOID_PTR_PTR,
--- gcc/opts.c.jj       2013-11-22 01:40:05.000000000 +0100
+++ gcc/opts.c  2013-11-22 09:08:12.537971216 +0100
@@ -1457,6 +1457,7 @@ common_handle_option (struct gcc_options
              { "unreachable", SANITIZE_UNREACHABLE,
                sizeof "unreachable" - 1 },
              { "vla-bound", SANITIZE_VLA, sizeof "vla-bound" - 1 },
+             { "return", SANITIZE_RETURN, sizeof "return" - 1 },
              { "null", SANITIZE_NULL, sizeof "null" - 1 },
              { NULL, 0, 0 }
            };
--- gcc/flag-types.h.jj 2013-11-22 01:40:03.000000000 +0100
+++ gcc/flag-types.h    2013-11-22 09:07:29.150236112 +0100
@@ -212,8 +212,9 @@ enum sanitize_code {
   SANITIZE_UNREACHABLE = 1 << 4,
   SANITIZE_VLA = 1 << 5,
   SANITIZE_NULL = 1 << 6,
+  SANITIZE_RETURN = 1 << 8,
   SANITIZE_UNDEFINED = SANITIZE_SHIFT | SANITIZE_DIVIDE | SANITIZE_UNREACHABLE
-                      | SANITIZE_VLA | SANITIZE_NULL
+                      | SANITIZE_VLA | SANITIZE_NULL | SANITIZE_RETURN
 };
 
 /* flag_vtable_verify initialization levels. */
--- gcc/c-family/c-ubsan.h.jj   2013-11-12 11:31:11.000000000 +0100
+++ gcc/c-family/c-ubsan.h      2013-11-22 09:38:31.654851809 +0100
@@ -24,5 +24,6 @@ along with GCC; see the file COPYING3.
 extern tree ubsan_instrument_division (location_t, tree, tree);
 extern tree ubsan_instrument_shift (location_t, enum tree_code, tree, tree);
 extern tree ubsan_instrument_vla (location_t, tree);
+extern tree ubsan_instrument_return (location_t);
 
 #endif  /* GCC_C_UBSAN_H  */
--- gcc/c-family/c-ubsan.c.jj   2013-11-19 21:56:20.000000000 +0100
+++ gcc/c-family/c-ubsan.c      2013-11-22 09:52:31.810642606 +0100
@@ -179,3 +179,14 @@ ubsan_instrument_vla (location_t loc, tr
 
   return t;
 }
+
+/* Instrument missing return in C++ functions returning non-void.  */
+
+tree
+ubsan_instrument_return (location_t loc)
+{
+  tree data = ubsan_create_data ("__ubsan_missing_return_data", loc,
+                                NULL,NULL_TREE);
+  tree t = builtin_decl_explicit (BUILT_IN_UBSAN_HANDLE_MISSING_RETURN);
+  return build_call_expr_loc (loc, t, 1, build_fold_addr_expr_loc (loc, data));
+}
--- gcc/cp/cp-gimplify.c.jj     2013-11-19 21:56:25.000000000 +0100
+++ gcc/cp/cp-gimplify.c        2013-11-22 09:53:49.852263241 +0100
@@ -34,6 +34,8 @@ along with GCC; see the file COPYING3.
 #include "pointer-set.h"
 #include "flags.h"
 #include "splay-tree.h"
+#include "target.h"
+#include "c-family/c-ubsan.h"
 
 /* Forward declarations.  */
 
@@ -1235,6 +1237,54 @@ cp_genericize (tree fndecl)
      walk_tree's hash functionality.  */
   cp_genericize_tree (&DECL_SAVED_TREE (fndecl));
 
+  if ((flag_sanitize & SANITIZE_RETURN)
+      && !VOID_TYPE_P (TREE_TYPE (TREE_TYPE (fndecl)))
+      && !DECL_CONSTRUCTOR_P (fndecl)
+      && !DECL_DESTRUCTOR_P (fndecl)
+      && targetm.warn_func_return (fndecl))
+    {
+      tree t = DECL_SAVED_TREE (fndecl);
+      while (t)
+       {
+         switch (TREE_CODE (t))
+           {
+           case BIND_EXPR:
+             t = BIND_EXPR_BODY (t);
+             continue;
+           case TRY_FINALLY_EXPR:
+             t = TREE_OPERAND (t, 0);
+             continue;
+           case STATEMENT_LIST:
+             {
+               tree_stmt_iterator i = tsi_last (t);
+               if (!tsi_end_p (i))
+                 {
+                   t = tsi_stmt (i);
+                   continue;
+                 }
+             }
+             break;
+           case RETURN_EXPR:
+             t = NULL_TREE;
+             break;
+           default:
+             break;
+           }
+         break;
+       }
+      if (t)
+       {
+         t = DECL_SAVED_TREE (fndecl);
+         if (TREE_CODE (t) == BIND_EXPR
+             && TREE_CODE (BIND_EXPR_BODY (t)) == STATEMENT_LIST)
+           {
+             tree_stmt_iterator i = tsi_last (BIND_EXPR_BODY (t));
+             t = ubsan_instrument_return (DECL_SOURCE_LOCATION (fndecl));
+             tsi_link_after (&i, t, TSI_NEW_STMT);
+           }
+       }
+    }
+
   /* Do everything else.  */
   c_genericize (fndecl);
 
--- gcc/testsuite/g++.dg/ubsan/return-1.C.jj    2013-11-22 10:09:27.730525521 
+0100
+++ gcc/testsuite/g++.dg/ubsan/return-1.C       2013-11-22 10:20:25.124405610 
+0100
@@ -0,0 +1,27 @@
+// { dg-do run }
+// { dg-options "-fsanitize=return" }
+// { dg-shouldfail "ubsan" }
+
+struct S { S (); ~S (); };
+
+S::S () {}
+S::~S () {}
+
+int
+foo (int x)
+{
+  S a;
+  {
+    S b;
+    if (x)
+      return 1;
+  }
+}
+
+int
+main ()
+{
+  foo (0);
+}
+
+// { dg-output "execution reached the end of a value-returning function 
without returning a value" }
--- gcc/testsuite/g++.dg/ubsan/return-2.C.jj    2013-11-22 10:09:31.050510359 
+0100
+++ gcc/testsuite/g++.dg/ubsan/return-2.C       2013-11-22 10:09:23.734570198 
+0100
@@ -0,0 +1,25 @@
+// { dg-do run }
+// { dg-options "-fsanitize=return" }
+
+struct S { S (); ~S (); };
+
+S::S () {}
+S::~S () {}
+
+int
+foo (int x)
+{
+  S a;
+  {
+    S b;
+    if (x)
+      return 1;
+  }
+}
+
+int
+main ()
+{
+  foo (1);
+  foo (14);
+}

        Jakub

Reply via email to