https://gcc.gnu.org/bugzilla/show_bug.cgi?id=77966

            Bug ID: 77966
           Summary: Corrupt function with -fsanitize-coverage=trace-pc
           Product: gcc
           Version: 6.2.1
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: c
          Assignee: unassigned at gcc dot gnu.org
          Reporter: jpoimboe at redhat dot com
  Target Milestone: ---

In the Linux kernel, we found another case (other than bug 70646) where a
couple of functions are getting corrupted.  Arnd Bergmann reduced it down to a
simple test case, and I've reduced it slightly further:

$ cat test.c
typedef int spinlock_t;
extern unsigned int ioread32(void *);

struct vnic_wq_ctrl {
        unsigned int error_status;
};

struct vnic_wq {
        struct vnic_wq_ctrl *ctrl;
} mempool_t;

struct snic {
        unsigned int wq_count;
        __attribute__ ((__aligned__)) struct vnic_wq wq[1];
        spinlock_t wq_lock[1];
};

unsigned int snic_log_q_error_err_status;

void snic_log_q_error(struct snic *snic)
{
        unsigned int i;
        for (i = 0; i < snic->wq_count; i++)
                snic_log_q_error_err_status =
ioread32(&snic->wq[i].ctrl->error_status);
}

$ gcc -O2 -fno-reorder-blocks -fsanitize-coverage=trace-pc -c test.c -o test.o
$ objdump -dr test.o

test.o:     file format elf64-x86-64


Disassembly of section .text:

0000000000000000 <snic_log_q_error>:
   0:   53                      push   %rbx
   1:   48 89 fb                mov    %rdi,%rbx
   4:   e8 00 00 00 00          callq  9 <snic_log_q_error+0x9>
                        5: R_X86_64_PC32        __sanitizer_cov_trace_pc-0x4
   9:   8b 03                   mov    (%rbx),%eax
   b:   85 c0                   test   %eax,%eax
   d:   75 09                   jne    18 <snic_log_q_error+0x18>
   f:   5b                      pop    %rbx
  10:   e9 00 00 00 00          jmpq   15 <snic_log_q_error+0x15>
                        11: R_X86_64_PC32       __sanitizer_cov_trace_pc-0x4
  15:   0f 1f 00                nopl   (%rax)
  18:   e8 00 00 00 00          callq  1d <snic_log_q_error+0x1d>
                        19: R_X86_64_PC32       __sanitizer_cov_trace_pc-0x4
  1d:   48 8b 7b 10             mov    0x10(%rbx),%rdi
  21:   e8 00 00 00 00          callq  26 <snic_log_q_error+0x26>
                        22: R_X86_64_PC32       ioread32-0x4
  26:   83 3b 01                cmpl   $0x1,(%rbx)
  29:   89 05 00 00 00 00       mov    %eax,0x0(%rip)        # 2f
<snic_log_q_error+0x2f>
                        2b: R_X86_64_PC32       snic_log_q_error_err_status-0x4
  2f:   76 de                   jbe    f <snic_log_q_error+0xf>
  31:   e8 00 00 00 00          callq  36 <snic_log_q_error+0x36>
                        32: R_X86_64_PC32       __sanitizer_cov_trace_pc-0x4

Notice how the function ends unexpectedly after the last call to
__sanitizer_cov_trace_pc().

$ gcc -v
Using built-in specs.
COLLECT_GCC=/usr/bin/gcc
COLLECT_LTO_WRAPPER=/usr/libexec/gcc/x86_64-redhat-linux/6.2.1/lto-wrapper
Target: x86_64-redhat-linux
Configured with: ../configure --enable-bootstrap
--enable-languages=c,c++,objc,obj-c++,fortran,ada,go,lto --prefix=/usr
--mandir=/usr/share/man --infodir=/usr/share/info
--with-bugurl=http://bugzilla.redhat.com/bugzilla --enable-shared
--enable-threads=posix --enable-checking=release --enable-multilib
--with-system-zlib --enable-__cxa_atexit --disable-libunwind-exceptions
--enable-gnu-unique-object --enable-linker-build-id
--with-linker-hash-style=gnu --enable-plugin --enable-initfini-array
--disable-libgcj --with-isl --enable-libmpx --enable-gnu-indirect-function
--with-tune=generic --with-arch_32=i686 --build=x86_64-redhat-linux
Thread model: posix
gcc version 6.2.1 20160916 (Red Hat 6.2.1-2) (GCC)

Reply via email to