2014-10-18 06:37:33 +08:00
|
|
|
// RUN: echo "int extra_global;" > %t.extra-source.cpp
|
2021-11-17 20:40:55 +08:00
|
|
|
// RUN: echo "global:*ignorelisted_global*" > %t.ignorelist
|
|
|
|
// RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-ignorelist=%t.ignorelist -emit-llvm -o - %s | FileCheck %s --check-prefixes=CHECK,ASAN
|
|
|
|
// RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=kernel-address -fsanitize-ignorelist=%t.ignorelist -emit-llvm -o - %s | FileCheck %s --check-prefixes=CHECK,KASAN
|
|
|
|
// The ignorelist file uses regexps, so Windows path backslashes.
|
|
|
|
// RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t.ignorelist-src
|
|
|
|
// RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-ignorelist=%t.ignorelist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=IGNORELIST-SRC
|
|
|
|
// RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=kernel-address -fsanitize-ignorelist=%t.ignorelist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=IGNORELIST-SRC
|
2014-07-03 00:54:41 +08:00
|
|
|
|
|
|
|
int global;
|
|
|
|
int dyn_init_global = global;
|
2016-10-15 03:55:09 +08:00
|
|
|
int __attribute__((no_sanitize("address"))) attributed_global;
|
2021-11-17 20:40:55 +08:00
|
|
|
int ignorelisted_global;
|
2014-07-03 00:54:41 +08:00
|
|
|
|
2020-06-11 01:55:51 +08:00
|
|
|
int __attribute__((section("__DATA, __common"))) sectioned_global; // KASAN - ignore globals in a section
|
2020-06-10 21:01:40 +08:00
|
|
|
extern "C" {
|
2020-06-11 01:55:51 +08:00
|
|
|
int __special_global; // KASAN - ignore globals with __-prefix
|
2020-06-10 21:01:40 +08:00
|
|
|
}
|
|
|
|
|
2014-07-03 00:54:41 +08:00
|
|
|
void func() {
|
|
|
|
static int static_var = 0;
|
|
|
|
const char *literal = "Hello, world!";
|
|
|
|
}
|
|
|
|
|
2021-05-20 10:18:49 +08:00
|
|
|
// ASAN: sectioned_global{{.*}} global { i32, [28 x i8] }{{.*}}, align 32
|
2020-06-11 02:20:23 +08:00
|
|
|
// KASAN: sectioned_global{{.*}} global i32
|
2021-05-20 10:18:49 +08:00
|
|
|
// ASAN: @__special_global{{.*}} global { i32, [28 x i8] }{{.*}}, align 32
|
2020-06-11 02:20:23 +08:00
|
|
|
// KASAN: @__special_global{{.*}} global i32
|
2020-06-10 21:01:40 +08:00
|
|
|
|
[IR][sanitizer] Set nounwind on module ctor/dtor, additionally set uwtable if -fasynchronous-unwind-tables
On ELF targets, if a function has uwtable or personality, or does not have
nounwind (`needsUnwindTableEntry`), it marks that `.eh_frame` is needed in the module.
Then, a function gets `.eh_frame` if `needsUnwindTableEntry` or `-g[123]` is specified.
(i.e. If -g[123], every function gets `.eh_frame`.
This behavior is strange but that is the status quo on GCC and Clang.)
Let's take asan as an example. Other sanitizers are similar.
`asan.module_[cd]tor` has no attribute. `needsUnwindTableEntry` returns true,
so every function gets `.eh_frame` if `-g[123]` is specified.
This is the root cause that
`-fno-exceptions -fno-asynchronous-unwind-tables -g` produces .debug_frame
while
`-fno-exceptions -fno-asynchronous-unwind-tables -g -fsanitize=address` produces .eh_frame.
This patch
* sets the nounwind attribute on sanitizer module ctor/dtor.
* let Clang emit a module flag metadata "uwtable" for -fasynchronous-unwind-tables. If "uwtable" is set, sanitizer module ctor/dtor additionally get the uwtable attribute.
The "uwtable" mechanism is generic: synthesized functions not cloned/specialized
from existing ones should consider `Function::createWithDefaultAttr` instead of
`Function::create` if they want to get some default attributes which
have more of module semantics.
Other candidates: "frame-pointer" (https://github.com/ClangBuiltLinux/linux/issues/955
https://github.com/ClangBuiltLinux/linux/issues/1238), dso_local, etc.
Differential Revision: https://reviews.llvm.org/D100251
2021-04-22 06:58:20 +08:00
|
|
|
/// Without -fasynchronous-unwind-tables, ctor and dtor get the uwtable attribute.
|
|
|
|
// CHECK-LABEL: define internal void @asan.module_ctor() #[[#ATTR:]] {
|
2020-06-10 21:01:40 +08:00
|
|
|
// ASAN-NEXT: call void @__asan_init
|
|
|
|
// ASAN-NEXT: call void @__asan_version_mismatch_check
|
|
|
|
// KASAN-NOT: call void @__asan_init
|
|
|
|
// KASAN-NOT: call void @__asan_version_mismatch_check
|
2020-06-11 01:55:51 +08:00
|
|
|
// ASAN-NEXT: call void @__asan_register_globals({{.*}}, i{{32|64}} 7)
|
2020-06-10 21:01:40 +08:00
|
|
|
// KASAN-NEXT: call void @__asan_register_globals({{.*}}, i{{32|64}} 5)
|
|
|
|
// CHECK-NEXT: ret void
|
|
|
|
|
[IR][sanitizer] Set nounwind on module ctor/dtor, additionally set uwtable if -fasynchronous-unwind-tables
On ELF targets, if a function has uwtable or personality, or does not have
nounwind (`needsUnwindTableEntry`), it marks that `.eh_frame` is needed in the module.
Then, a function gets `.eh_frame` if `needsUnwindTableEntry` or `-g[123]` is specified.
(i.e. If -g[123], every function gets `.eh_frame`.
This behavior is strange but that is the status quo on GCC and Clang.)
Let's take asan as an example. Other sanitizers are similar.
`asan.module_[cd]tor` has no attribute. `needsUnwindTableEntry` returns true,
so every function gets `.eh_frame` if `-g[123]` is specified.
This is the root cause that
`-fno-exceptions -fno-asynchronous-unwind-tables -g` produces .debug_frame
while
`-fno-exceptions -fno-asynchronous-unwind-tables -g -fsanitize=address` produces .eh_frame.
This patch
* sets the nounwind attribute on sanitizer module ctor/dtor.
* let Clang emit a module flag metadata "uwtable" for -fasynchronous-unwind-tables. If "uwtable" is set, sanitizer module ctor/dtor additionally get the uwtable attribute.
The "uwtable" mechanism is generic: synthesized functions not cloned/specialized
from existing ones should consider `Function::createWithDefaultAttr` instead of
`Function::create` if they want to get some default attributes which
have more of module semantics.
Other candidates: "frame-pointer" (https://github.com/ClangBuiltLinux/linux/issues/955
https://github.com/ClangBuiltLinux/linux/issues/1238), dso_local, etc.
Differential Revision: https://reviews.llvm.org/D100251
2021-04-22 06:58:20 +08:00
|
|
|
// CHECK: define internal void @asan.module_dtor() #[[#ATTR]] {
|
2020-06-10 21:01:40 +08:00
|
|
|
// CHECK-NEXT: call void @__asan_unregister_globals
|
|
|
|
// CHECK-NEXT: ret void
|
|
|
|
|
[IR][sanitizer] Set nounwind on module ctor/dtor, additionally set uwtable if -fasynchronous-unwind-tables
On ELF targets, if a function has uwtable or personality, or does not have
nounwind (`needsUnwindTableEntry`), it marks that `.eh_frame` is needed in the module.
Then, a function gets `.eh_frame` if `needsUnwindTableEntry` or `-g[123]` is specified.
(i.e. If -g[123], every function gets `.eh_frame`.
This behavior is strange but that is the status quo on GCC and Clang.)
Let's take asan as an example. Other sanitizers are similar.
`asan.module_[cd]tor` has no attribute. `needsUnwindTableEntry` returns true,
so every function gets `.eh_frame` if `-g[123]` is specified.
This is the root cause that
`-fno-exceptions -fno-asynchronous-unwind-tables -g` produces .debug_frame
while
`-fno-exceptions -fno-asynchronous-unwind-tables -g -fsanitize=address` produces .eh_frame.
This patch
* sets the nounwind attribute on sanitizer module ctor/dtor.
* let Clang emit a module flag metadata "uwtable" for -fasynchronous-unwind-tables. If "uwtable" is set, sanitizer module ctor/dtor additionally get the uwtable attribute.
The "uwtable" mechanism is generic: synthesized functions not cloned/specialized
from existing ones should consider `Function::createWithDefaultAttr` instead of
`Function::create` if they want to get some default attributes which
have more of module semantics.
Other candidates: "frame-pointer" (https://github.com/ClangBuiltLinux/linux/issues/955
https://github.com/ClangBuiltLinux/linux/issues/1238), dso_local, etc.
Differential Revision: https://reviews.llvm.org/D100251
2021-04-22 06:58:20 +08:00
|
|
|
// CHECK: attributes #[[#ATTR]] = { nounwind }
|
|
|
|
|
|
|
|
/// If -fasynchronous-unwind-tables, set the module flag "uwtable". ctor/dtor
|
|
|
|
/// will thus get the uwtable attribute.
|
2021-09-24 07:15:40 +08:00
|
|
|
// RUN: %clang_cc1 -emit-llvm -fsanitize=address -funwind-tables=2 -o - %s | FileCheck %s --check-prefixes=UWTABLE
|
[IR][sanitizer] Set nounwind on module ctor/dtor, additionally set uwtable if -fasynchronous-unwind-tables
On ELF targets, if a function has uwtable or personality, or does not have
nounwind (`needsUnwindTableEntry`), it marks that `.eh_frame` is needed in the module.
Then, a function gets `.eh_frame` if `needsUnwindTableEntry` or `-g[123]` is specified.
(i.e. If -g[123], every function gets `.eh_frame`.
This behavior is strange but that is the status quo on GCC and Clang.)
Let's take asan as an example. Other sanitizers are similar.
`asan.module_[cd]tor` has no attribute. `needsUnwindTableEntry` returns true,
so every function gets `.eh_frame` if `-g[123]` is specified.
This is the root cause that
`-fno-exceptions -fno-asynchronous-unwind-tables -g` produces .debug_frame
while
`-fno-exceptions -fno-asynchronous-unwind-tables -g -fsanitize=address` produces .eh_frame.
This patch
* sets the nounwind attribute on sanitizer module ctor/dtor.
* let Clang emit a module flag metadata "uwtable" for -fasynchronous-unwind-tables. If "uwtable" is set, sanitizer module ctor/dtor additionally get the uwtable attribute.
The "uwtable" mechanism is generic: synthesized functions not cloned/specialized
from existing ones should consider `Function::createWithDefaultAttr` instead of
`Function::create` if they want to get some default attributes which
have more of module semantics.
Other candidates: "frame-pointer" (https://github.com/ClangBuiltLinux/linux/issues/955
https://github.com/ClangBuiltLinux/linux/issues/1238), dso_local, etc.
Differential Revision: https://reviews.llvm.org/D100251
2021-04-22 06:58:20 +08:00
|
|
|
// UWTABLE: define internal void @asan.module_dtor() #[[#ATTR:]] {
|
|
|
|
// UWTABLE: attributes #[[#ATTR]] = { nounwind uwtable }
|
|
|
|
// UWTABLE: ![[#]] = !{i32 7, !"uwtable", i32 1}
|
|
|
|
|
2021-12-11 06:28:36 +08:00
|
|
|
// CHECK: !llvm.asan.globals = !{![[EXTRA_GLOBAL:[0-9]+]], ![[GLOBAL:[0-9]+]], ![[DYN_INIT_GLOBAL:[0-9]+]], ![[ATTR_GLOBAL:[0-9]+]], ![[IGNORELISTED_GLOBAL:[0-9]+]], ![[SECTIONED_GLOBAL:[0-9]+]], ![[SPECIAL_GLOBAL:[0-9]+]], ![[STATIC_VAR:[0-9]+]], ![[LITERAL:[0-9]+]]}
|
2014-12-16 03:10:08 +08:00
|
|
|
// CHECK: ![[EXTRA_GLOBAL]] = !{{{.*}} ![[EXTRA_GLOBAL_LOC:[0-9]+]], !"extra_global", i1 false, i1 false}
|
|
|
|
// CHECK: ![[EXTRA_GLOBAL_LOC]] = !{!"{{.*}}extra-source.cpp", i32 1, i32 5}
|
|
|
|
// CHECK: ![[GLOBAL]] = !{{{.*}} ![[GLOBAL_LOC:[0-9]+]], !"global", i1 false, i1 false}
|
2020-06-10 21:01:40 +08:00
|
|
|
// CHECK: ![[GLOBAL_LOC]] = !{!"{{.*}}asan-globals.cpp", i32 10, i32 5}
|
2014-12-16 03:10:08 +08:00
|
|
|
// CHECK: ![[DYN_INIT_GLOBAL]] = !{{{.*}} ![[DYN_INIT_LOC:[0-9]+]], !"dyn_init_global", i1 true, i1 false}
|
2020-06-10 21:01:40 +08:00
|
|
|
// CHECK: ![[DYN_INIT_LOC]] = !{!"{{.*}}asan-globals.cpp", i32 11, i32 5}
|
2021-12-11 06:28:36 +08:00
|
|
|
// CHECK: ![[ATTR_GLOBAL]] = !{{{.*}}, null, null, i1 false, i1 true}
|
|
|
|
// CHECK: ![[IGNORELISTED_GLOBAL]] = !{{{.*}}, null, null, i1 false, i1 true}
|
2020-06-10 21:01:40 +08:00
|
|
|
// CHECK: ![[SECTIONED_GLOBAL]] = !{{{.*}} ![[SECTIONED_GLOBAL_LOC:[0-9]+]], !"sectioned_global", i1 false, i1 false}
|
2021-12-11 06:28:36 +08:00
|
|
|
// CHECK: ![[SECTIONED_GLOBAL_LOC]] = !{!"{{.*}}asan-globals.cpp", i32 15, i32 50}
|
2020-06-10 21:01:40 +08:00
|
|
|
// CHECK: ![[SPECIAL_GLOBAL]] = !{{{.*}} ![[SPECIAL_GLOBAL_LOC:[0-9]+]], !"__special_global", i1 false, i1 false}
|
2021-12-11 06:28:36 +08:00
|
|
|
// CHECK: ![[SPECIAL_GLOBAL_LOC]] = !{!"{{.*}}asan-globals.cpp", i32 17, i32 5}
|
2014-12-16 03:10:08 +08:00
|
|
|
// CHECK: ![[STATIC_VAR]] = !{{{.*}} ![[STATIC_LOC:[0-9]+]], !"static_var", i1 false, i1 false}
|
2021-12-11 06:28:36 +08:00
|
|
|
// CHECK: ![[STATIC_LOC]] = !{!"{{.*}}asan-globals.cpp", i32 21, i32 14}
|
2014-12-16 03:10:08 +08:00
|
|
|
// CHECK: ![[LITERAL]] = !{{{.*}} ![[LITERAL_LOC:[0-9]+]], !"<string literal>", i1 false, i1 false}
|
2021-12-11 06:28:36 +08:00
|
|
|
// CHECK: ![[LITERAL_LOC]] = !{!"{{.*}}asan-globals.cpp", i32 22, i32 25}
|
2014-07-08 07:34:34 +08:00
|
|
|
|
2021-12-11 06:28:36 +08:00
|
|
|
// IGNORELIST-SRC: !llvm.asan.globals = !{![[EXTRA_GLOBAL:[0-9]+]], ![[GLOBAL:[0-9]+]], ![[DYN_INIT_GLOBAL:[0-9]+]], ![[ATTR_GLOBAL:[0-9]+]], ![[IGNORELISTED_GLOBAL:[0-9]+]], ![[SECTIONED_GLOBAL:[0-9]+]], ![[SPECIAL_GLOBAL:[0-9]+]], ![[STATIC_VAR:[0-9]+]], ![[LITERAL:[0-9]+]]}
|
2021-11-17 20:40:55 +08:00
|
|
|
// IGNORELIST-SRC: ![[EXTRA_GLOBAL]] = !{{{.*}} ![[EXTRA_GLOBAL_LOC:[0-9]+]], !"extra_global", i1 false, i1 false}
|
|
|
|
// IGNORELIST-SRC: ![[EXTRA_GLOBAL_LOC]] = !{!"{{.*}}extra-source.cpp", i32 1, i32 5}
|
|
|
|
// IGNORELIST-SRC: ![[GLOBAL]] = !{{{.*}} null, null, i1 false, i1 true}
|
|
|
|
// IGNORELIST-SRC: ![[DYN_INIT_GLOBAL]] = !{{{.*}} null, null, i1 true, i1 true}
|
2021-12-11 06:28:36 +08:00
|
|
|
// IGNORELIST-SRC: ![[ATTR_GLOBAL]] = !{{{.*}}, null, null, i1 false, i1 true}
|
|
|
|
// IGNORELIST-SRC: ![[IGNORELISTED_GLOBAL]] = !{{{.*}}, null, null, i1 false, i1 true}
|
2021-11-17 20:40:55 +08:00
|
|
|
// IGNORELIST-SRC: ![[SECTIONED_GLOBAL]] = !{{{.*}} null, null, i1 false, i1 true}
|
|
|
|
// IGNORELIST-SRC: ![[SPECIAL_GLOBAL]] = !{{{.*}} null, null, i1 false, i1 true}
|
|
|
|
// IGNORELIST-SRC: ![[STATIC_VAR]] = !{{{.*}} null, null, i1 false, i1 true}
|
|
|
|
// IGNORELIST-SRC: ![[LITERAL]] = !{{{.*}} null, null, i1 false, i1 true}
|