2014-08-02 05:35:28 +08:00
|
|
|
//===--- SanitizerMetadata.cpp - Blacklist for sanitizers -----------------===//
|
|
|
|
//
|
2019-01-19 16:50:56 +08:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2014-08-02 05:35:28 +08:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// Class which emits metadata consumed by sanitizer instrumentation passes.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "SanitizerMetadata.h"
|
|
|
|
#include "CodeGenModule.h"
|
2014-10-18 06:37:33 +08:00
|
|
|
#include "clang/AST/Type.h"
|
2014-08-02 05:35:28 +08:00
|
|
|
#include "llvm/ADT/StringRef.h"
|
|
|
|
#include "llvm/IR/Constants.h"
|
|
|
|
|
|
|
|
using namespace clang;
|
|
|
|
using namespace CodeGen;
|
|
|
|
|
|
|
|
SanitizerMetadata::SanitizerMetadata(CodeGenModule &CGM) : CGM(CGM) {}
|
|
|
|
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-16 04:02:23 +08:00
|
|
|
static bool isAsanHwasanOrMemTag(const SanitizerSet& SS) {
|
|
|
|
return SS.hasOneOf(SanitizerKind::Address | SanitizerKind::KernelAddress |
|
|
|
|
SanitizerKind::HWAddress | SanitizerKind::KernelHWAddress |
|
|
|
|
SanitizerKind::MemTag);
|
|
|
|
}
|
|
|
|
|
2014-08-02 05:35:28 +08:00
|
|
|
void SanitizerMetadata::reportGlobalToASan(llvm::GlobalVariable *GV,
|
|
|
|
SourceLocation Loc, StringRef Name,
|
2014-10-18 06:37:33 +08:00
|
|
|
QualType Ty, bool IsDynInit,
|
|
|
|
bool IsBlacklisted) {
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-16 04:02:23 +08:00
|
|
|
if (!isAsanHwasanOrMemTag(CGM.getLangOpts().Sanitize))
|
2014-08-02 05:35:28 +08:00
|
|
|
return;
|
2014-10-18 06:37:33 +08:00
|
|
|
IsDynInit &= !CGM.isInSanitizerBlacklist(GV, Loc, Ty, "init");
|
|
|
|
IsBlacklisted |= CGM.isInSanitizerBlacklist(GV, Loc, Ty);
|
2014-08-02 05:35:28 +08:00
|
|
|
|
2014-12-10 02:39:32 +08:00
|
|
|
llvm::Metadata *LocDescr = nullptr;
|
|
|
|
llvm::Metadata *GlobalName = nullptr;
|
2014-08-02 05:35:28 +08:00
|
|
|
llvm::LLVMContext &VMContext = CGM.getLLVMContext();
|
|
|
|
if (!IsBlacklisted) {
|
|
|
|
// Don't generate source location and global name if it is blacklisted -
|
|
|
|
// it won't be instrumented anyway.
|
2014-08-02 08:35:50 +08:00
|
|
|
LocDescr = getLocationMetadata(Loc);
|
|
|
|
if (!Name.empty())
|
|
|
|
GlobalName = llvm::MDString::get(VMContext, Name);
|
2014-08-02 05:35:28 +08:00
|
|
|
}
|
|
|
|
|
2014-12-10 02:39:32 +08:00
|
|
|
llvm::Metadata *GlobalMetadata[] = {
|
|
|
|
llvm::ConstantAsMetadata::get(GV), LocDescr, GlobalName,
|
|
|
|
llvm::ConstantAsMetadata::get(
|
|
|
|
llvm::ConstantInt::get(llvm::Type::getInt1Ty(VMContext), IsDynInit)),
|
|
|
|
llvm::ConstantAsMetadata::get(llvm::ConstantInt::get(
|
|
|
|
llvm::Type::getInt1Ty(VMContext), IsBlacklisted))};
|
2014-08-02 05:35:28 +08:00
|
|
|
|
|
|
|
llvm::MDNode *ThisGlobal = llvm::MDNode::get(VMContext, GlobalMetadata);
|
|
|
|
llvm::NamedMDNode *AsanGlobals =
|
|
|
|
CGM.getModule().getOrInsertNamedMetadata("llvm.asan.globals");
|
|
|
|
AsanGlobals->addOperand(ThisGlobal);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SanitizerMetadata::reportGlobalToASan(llvm::GlobalVariable *GV,
|
|
|
|
const VarDecl &D, bool IsDynInit) {
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-16 04:02:23 +08:00
|
|
|
if (!isAsanHwasanOrMemTag(CGM.getLangOpts().Sanitize))
|
2014-08-02 05:35:28 +08:00
|
|
|
return;
|
|
|
|
std::string QualName;
|
|
|
|
llvm::raw_string_ostream OS(QualName);
|
|
|
|
D.printQualifiedName(OS);
|
2016-10-15 03:55:09 +08:00
|
|
|
|
|
|
|
bool IsBlacklisted = false;
|
|
|
|
for (auto Attr : D.specific_attrs<NoSanitizeAttr>())
|
|
|
|
if (Attr->getMask() & SanitizerKind::Address)
|
|
|
|
IsBlacklisted = true;
|
|
|
|
reportGlobalToASan(GV, D.getLocation(), OS.str(), D.getType(), IsDynInit,
|
|
|
|
IsBlacklisted);
|
2014-08-02 05:35:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void SanitizerMetadata::disableSanitizerForGlobal(llvm::GlobalVariable *GV) {
|
|
|
|
// For now, just make sure the global is not modified by the ASan
|
|
|
|
// instrumentation.
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-16 04:02:23 +08:00
|
|
|
if (isAsanHwasanOrMemTag(CGM.getLangOpts().Sanitize))
|
2014-10-18 06:37:33 +08:00
|
|
|
reportGlobalToASan(GV, SourceLocation(), "", QualType(), false, true);
|
2014-08-02 05:35:28 +08:00
|
|
|
}
|
2014-08-02 08:35:50 +08:00
|
|
|
|
2014-08-26 10:29:59 +08:00
|
|
|
void SanitizerMetadata::disableSanitizerForInstruction(llvm::Instruction *I) {
|
2014-12-10 02:39:32 +08:00
|
|
|
I->setMetadata(CGM.getModule().getMDKindID("nosanitize"),
|
|
|
|
llvm::MDNode::get(CGM.getLLVMContext(), None));
|
2014-08-26 10:29:59 +08:00
|
|
|
}
|
|
|
|
|
2014-08-02 08:35:50 +08:00
|
|
|
llvm::MDNode *SanitizerMetadata::getLocationMetadata(SourceLocation Loc) {
|
|
|
|
PresumedLoc PLoc = CGM.getContext().getSourceManager().getPresumedLoc(Loc);
|
|
|
|
if (!PLoc.isValid())
|
|
|
|
return nullptr;
|
|
|
|
llvm::LLVMContext &VMContext = CGM.getLLVMContext();
|
2014-12-10 02:39:32 +08:00
|
|
|
llvm::Metadata *LocMetadata[] = {
|
2014-08-02 08:35:50 +08:00
|
|
|
llvm::MDString::get(VMContext, PLoc.getFilename()),
|
2014-12-10 02:39:32 +08:00
|
|
|
llvm::ConstantAsMetadata::get(llvm::ConstantInt::get(
|
|
|
|
llvm::Type::getInt32Ty(VMContext), PLoc.getLine())),
|
|
|
|
llvm::ConstantAsMetadata::get(llvm::ConstantInt::get(
|
|
|
|
llvm::Type::getInt32Ty(VMContext), PLoc.getColumn())),
|
2014-08-02 08:35:50 +08:00
|
|
|
};
|
|
|
|
return llvm::MDNode::get(VMContext, LocMetadata);
|
|
|
|
}
|