2011-11-16 09:35:23 +08:00
|
|
|
//===-- AddressSanitizer.cpp - memory error detector ------------*- C++ -*-===//
|
|
|
|
//
|
|
|
|
// The LLVM Compiler Infrastructure
|
|
|
|
//
|
|
|
|
// This file is distributed under the University of Illinois Open Source
|
|
|
|
// License. See LICENSE.TXT for details.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
|
|
// Details of the algorithm:
|
|
|
|
// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
|
|
|
|
#define DEBUG_TYPE "asan"
|
|
|
|
|
2012-12-04 00:50:05 +08:00
|
|
|
#include "llvm/Transforms/Instrumentation.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include "llvm/ADT/ArrayRef.h"
|
2012-12-27 16:50:58 +08:00
|
|
|
#include "llvm/ADT/DenseMap.h"
|
2012-12-25 20:04:36 +08:00
|
|
|
#include "llvm/ADT/DepthFirstIterator.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include "llvm/ADT/OwningPtr.h"
|
|
|
|
#include "llvm/ADT/SmallSet.h"
|
|
|
|
#include "llvm/ADT/SmallString.h"
|
|
|
|
#include "llvm/ADT/SmallVector.h"
|
2013-10-16 22:06:14 +08:00
|
|
|
#include "llvm/ADT/Statistic.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include "llvm/ADT/StringExtras.h"
|
2012-05-23 19:52:12 +08:00
|
|
|
#include "llvm/ADT/Triple.h"
|
2012-12-12 22:31:53 +08:00
|
|
|
#include "llvm/DIBuilder.h"
|
2013-01-02 19:36:10 +08:00
|
|
|
#include "llvm/IR/DataLayout.h"
|
|
|
|
#include "llvm/IR/Function.h"
|
|
|
|
#include "llvm/IR/IRBuilder.h"
|
|
|
|
#include "llvm/IR/InlineAsm.h"
|
|
|
|
#include "llvm/IR/IntrinsicInst.h"
|
|
|
|
#include "llvm/IR/LLVMContext.h"
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
#include "llvm/IR/MDBuilder.h"
|
2013-01-02 19:36:10 +08:00
|
|
|
#include "llvm/IR/Module.h"
|
|
|
|
#include "llvm/IR/Type.h"
|
2012-12-25 20:04:36 +08:00
|
|
|
#include "llvm/InstVisitor.h"
|
2013-02-20 20:35:15 +08:00
|
|
|
#include "llvm/Support/CallSite.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include "llvm/Support/CommandLine.h"
|
|
|
|
#include "llvm/Support/DataTypes.h"
|
|
|
|
#include "llvm/Support/Debug.h"
|
2013-06-03 22:46:56 +08:00
|
|
|
#include "llvm/Support/Endian.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include "llvm/Support/system_error.h"
|
2013-12-06 17:00:17 +08:00
|
|
|
#include "llvm/Transforms/Utils/ASanStackFrameLayout.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include "llvm/Transforms/Utils/BasicBlockUtils.h"
|
2013-06-26 17:18:17 +08:00
|
|
|
#include "llvm/Transforms/Utils/Cloning.h"
|
2012-12-12 22:31:53 +08:00
|
|
|
#include "llvm/Transforms/Utils/Local.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include "llvm/Transforms/Utils/ModuleUtils.h"
|
2013-07-10 06:02:49 +08:00
|
|
|
#include "llvm/Transforms/Utils/SpecialCaseList.h"
|
2011-11-16 09:35:23 +08:00
|
|
|
#include <algorithm>
|
2012-12-04 00:50:05 +08:00
|
|
|
#include <string>
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
using namespace llvm;
|
|
|
|
|
|
|
|
static const uint64_t kDefaultShadowScale = 3;
|
|
|
|
static const uint64_t kDefaultShadowOffset32 = 1ULL << 29;
|
|
|
|
static const uint64_t kDefaultShadowOffset64 = 1ULL << 44;
|
2014-02-24 21:40:24 +08:00
|
|
|
static const uint64_t kSmallX86_64ShadowOffset = 0x7FFF8000; // < 2G.
|
2013-01-23 20:54:55 +08:00
|
|
|
static const uint64_t kPPC64_ShadowOffset64 = 1ULL << 41;
|
2013-06-03 22:46:56 +08:00
|
|
|
static const uint64_t kMIPS32_ShadowOffset32 = 0x0aaa8000;
|
2014-02-10 15:37:04 +08:00
|
|
|
static const uint64_t kFreeBSD_ShadowOffset32 = 1ULL << 30;
|
|
|
|
static const uint64_t kFreeBSD_ShadowOffset64 = 1ULL << 46;
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2013-09-10 21:16:56 +08:00
|
|
|
static const size_t kMinStackMallocSize = 1 << 6; // 64B
|
2011-11-16 09:35:23 +08:00
|
|
|
static const size_t kMaxStackMallocSize = 1 << 16; // 64K
|
|
|
|
static const uintptr_t kCurrentStackFrameMagic = 0x41B58AB3;
|
|
|
|
static const uintptr_t kRetiredStackFrameMagic = 0x45E0360E;
|
|
|
|
|
2013-07-16 09:17:10 +08:00
|
|
|
static const char *const kAsanModuleCtorName = "asan.module_ctor";
|
|
|
|
static const char *const kAsanModuleDtorName = "asan.module_dtor";
|
|
|
|
static const int kAsanCtorAndCtorPriority = 1;
|
|
|
|
static const char *const kAsanReportErrorTemplate = "__asan_report_";
|
|
|
|
static const char *const kAsanReportLoadN = "__asan_report_load_n";
|
|
|
|
static const char *const kAsanReportStoreN = "__asan_report_store_n";
|
|
|
|
static const char *const kAsanRegisterGlobalsName = "__asan_register_globals";
|
2013-08-05 21:19:49 +08:00
|
|
|
static const char *const kAsanUnregisterGlobalsName =
|
|
|
|
"__asan_unregister_globals";
|
2013-07-16 09:17:10 +08:00
|
|
|
static const char *const kAsanPoisonGlobalsName = "__asan_before_dynamic_init";
|
|
|
|
static const char *const kAsanUnpoisonGlobalsName = "__asan_after_dynamic_init";
|
|
|
|
static const char *const kAsanInitName = "__asan_init_v3";
|
2013-11-15 15:16:09 +08:00
|
|
|
static const char *const kAsanCovName = "__sanitizer_cov";
|
2013-07-16 09:17:10 +08:00
|
|
|
static const char *const kAsanHandleNoReturnName = "__asan_handle_no_return";
|
2013-09-10 21:16:56 +08:00
|
|
|
static const int kMaxAsanStackMallocSizeClass = 10;
|
|
|
|
static const char *const kAsanStackMallocNameTemplate = "__asan_stack_malloc_";
|
|
|
|
static const char *const kAsanStackFreeNameTemplate = "__asan_stack_free_";
|
2013-07-16 09:17:10 +08:00
|
|
|
static const char *const kAsanGenPrefix = "__asan_gen_";
|
|
|
|
static const char *const kAsanPoisonStackMemoryName =
|
|
|
|
"__asan_poison_stack_memory";
|
|
|
|
static const char *const kAsanUnpoisonStackMemoryName =
|
2012-12-04 09:34:23 +08:00
|
|
|
"__asan_unpoison_stack_memory";
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2013-09-18 22:07:14 +08:00
|
|
|
static const char *const kAsanOptionDetectUAR =
|
|
|
|
"__asan_option_detect_stack_use_after_return";
|
|
|
|
|
2013-09-18 08:11:27 +08:00
|
|
|
#ifndef NDEBUG
|
2013-09-17 20:14:50 +08:00
|
|
|
static const int kAsanStackAfterReturnMagic = 0xf5;
|
2013-09-18 08:11:27 +08:00
|
|
|
#endif
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2012-07-17 00:15:40 +08:00
|
|
|
// Accesses sizes are powers of two: 1, 2, 4, 8, 16.
|
|
|
|
static const size_t kNumberOfAccessSizes = 5;
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
// Command-line flags.
|
|
|
|
|
|
|
|
// This flag may need to be replaced with -f[no-]asan-reads.
|
|
|
|
static cl::opt<bool> ClInstrumentReads("asan-instrument-reads",
|
|
|
|
cl::desc("instrument read instructions"), cl::Hidden, cl::init(true));
|
|
|
|
static cl::opt<bool> ClInstrumentWrites("asan-instrument-writes",
|
|
|
|
cl::desc("instrument write instructions"), cl::Hidden, cl::init(true));
|
2012-05-30 17:04:06 +08:00
|
|
|
static cl::opt<bool> ClInstrumentAtomics("asan-instrument-atomics",
|
|
|
|
cl::desc("instrument atomic instructions (rmw, cmpxchg)"),
|
|
|
|
cl::Hidden, cl::init(true));
|
2012-08-15 16:58:58 +08:00
|
|
|
static cl::opt<bool> ClAlwaysSlowPath("asan-always-slow-path",
|
|
|
|
cl::desc("use instrumentation with slow path for all accesses"),
|
|
|
|
cl::Hidden, cl::init(false));
|
2012-07-17 00:15:40 +08:00
|
|
|
// This flag limits the number of instructions to be instrumented
|
2012-06-28 17:34:41 +08:00
|
|
|
// in any given BB. Normally, this should be set to unlimited (INT_MAX),
|
|
|
|
// but due to http://llvm.org/bugs/show_bug.cgi?id=12652 we temporary
|
|
|
|
// set it to 10000.
|
|
|
|
static cl::opt<int> ClMaxInsnsToInstrumentPerBB("asan-max-ins-per-bb",
|
|
|
|
cl::init(10000),
|
|
|
|
cl::desc("maximal number of instructions to instrument in any given BB"),
|
|
|
|
cl::Hidden);
|
2011-11-16 09:35:23 +08:00
|
|
|
// This flag may need to be replaced with -f[no]asan-stack.
|
|
|
|
static cl::opt<bool> ClStack("asan-stack",
|
|
|
|
cl::desc("Handle stack memory"), cl::Hidden, cl::init(true));
|
|
|
|
// This flag may need to be replaced with -f[no]asan-use-after-return.
|
|
|
|
static cl::opt<bool> ClUseAfterReturn("asan-use-after-return",
|
|
|
|
cl::desc("Check return-after-free"), cl::Hidden, cl::init(false));
|
|
|
|
// This flag may need to be replaced with -f[no]asan-globals.
|
|
|
|
static cl::opt<bool> ClGlobals("asan-globals",
|
|
|
|
cl::desc("Handle global objects"), cl::Hidden, cl::init(true));
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
static cl::opt<int> ClCoverage("asan-coverage",
|
|
|
|
cl::desc("ASan coverage. 0: none, 1: entry block, 2: all blocks"),
|
|
|
|
cl::Hidden, cl::init(false));
|
2012-08-21 16:24:25 +08:00
|
|
|
static cl::opt<bool> ClInitializers("asan-initialization-order",
|
|
|
|
cl::desc("Handle C++ initializer order"), cl::Hidden, cl::init(false));
|
2011-11-16 09:35:23 +08:00
|
|
|
static cl::opt<bool> ClMemIntrin("asan-memintrin",
|
|
|
|
cl::desc("Handle memset/memcpy/memmove"), cl::Hidden, cl::init(true));
|
2013-12-06 17:00:17 +08:00
|
|
|
static cl::opt<unsigned> ClRealignStack("asan-realign-stack",
|
|
|
|
cl::desc("Realign stack to the value of this flag (power of two)"),
|
|
|
|
cl::Hidden, cl::init(32));
|
2012-12-04 03:09:26 +08:00
|
|
|
static cl::opt<std::string> ClBlacklistFile("asan-blacklist",
|
|
|
|
cl::desc("File containing the list of objects to ignore "
|
2011-11-16 09:35:23 +08:00
|
|
|
"during instrumentation"), cl::Hidden);
|
|
|
|
|
2013-06-26 17:18:17 +08:00
|
|
|
// This is an experimental feature that will allow to choose between
|
|
|
|
// instrumented and non-instrumented code at link-time.
|
|
|
|
// If this option is on, just before instrumenting a function we create its
|
|
|
|
// clone; if the function is not changed by asan the clone is deleted.
|
|
|
|
// If we end up with a clone, we put the instrumented function into a section
|
|
|
|
// called "ASAN" and the uninstrumented function into a section called "NOASAN".
|
|
|
|
//
|
|
|
|
// This is still a prototype, we need to figure out a way to keep two copies of
|
|
|
|
// a function so that the linker can easily choose one of them.
|
|
|
|
static cl::opt<bool> ClKeepUninstrumented("asan-keep-uninstrumented-functions",
|
|
|
|
cl::desc("Keep uninstrumented copies of functions"),
|
|
|
|
cl::Hidden, cl::init(false));
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
// These flags allow to change the shadow mapping.
|
|
|
|
// The shadow mapping looks like
|
|
|
|
// Shadow = (Mem >> scale) + (1 << offset_log)
|
|
|
|
static cl::opt<int> ClMappingScale("asan-mapping-scale",
|
|
|
|
cl::desc("scale of asan shadow mapping"), cl::Hidden, cl::init(0));
|
|
|
|
|
|
|
|
// Optimization flags. Not user visible, used mostly for testing
|
|
|
|
// and benchmarking the tool.
|
|
|
|
static cl::opt<bool> ClOpt("asan-opt",
|
|
|
|
cl::desc("Optimize instrumentation"), cl::Hidden, cl::init(true));
|
|
|
|
static cl::opt<bool> ClOptSameTemp("asan-opt-same-temp",
|
|
|
|
cl::desc("Instrument the same temp just once"), cl::Hidden,
|
|
|
|
cl::init(true));
|
|
|
|
static cl::opt<bool> ClOptGlobals("asan-opt-globals",
|
|
|
|
cl::desc("Don't instrument scalar globals"), cl::Hidden, cl::init(true));
|
|
|
|
|
2012-11-30 02:14:24 +08:00
|
|
|
static cl::opt<bool> ClCheckLifetime("asan-check-lifetime",
|
|
|
|
cl::desc("Use llvm.lifetime intrinsics to insert extra checks"),
|
|
|
|
cl::Hidden, cl::init(false));
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
// Debug flags.
|
|
|
|
static cl::opt<int> ClDebug("asan-debug", cl::desc("debug"), cl::Hidden,
|
|
|
|
cl::init(0));
|
|
|
|
static cl::opt<int> ClDebugStack("asan-debug-stack", cl::desc("debug stack"),
|
|
|
|
cl::Hidden, cl::init(0));
|
|
|
|
static cl::opt<std::string> ClDebugFunc("asan-debug-func",
|
|
|
|
cl::Hidden, cl::desc("Debug func"));
|
|
|
|
static cl::opt<int> ClDebugMin("asan-debug-min", cl::desc("Debug min inst"),
|
|
|
|
cl::Hidden, cl::init(-1));
|
|
|
|
static cl::opt<int> ClDebugMax("asan-debug-max", cl::desc("Debug man inst"),
|
|
|
|
cl::Hidden, cl::init(-1));
|
|
|
|
|
2013-10-16 22:06:14 +08:00
|
|
|
STATISTIC(NumInstrumentedReads, "Number of instrumented reads");
|
|
|
|
STATISTIC(NumInstrumentedWrites, "Number of instrumented writes");
|
|
|
|
STATISTIC(NumOptimizedAccessesToGlobalArray,
|
|
|
|
"Number of optimized accesses to global arrays");
|
|
|
|
STATISTIC(NumOptimizedAccessesToGlobalVar,
|
|
|
|
"Number of optimized accesses to global vars");
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
namespace {
|
2012-11-20 21:00:01 +08:00
|
|
|
/// A set of dynamically initialized globals extracted from metadata.
|
|
|
|
class SetOfDynamicallyInitializedGlobals {
|
|
|
|
public:
|
|
|
|
void Init(Module& M) {
|
|
|
|
// Clang generates metadata identifying all dynamically initialized globals.
|
|
|
|
NamedMDNode *DynamicGlobals =
|
|
|
|
M.getNamedMetadata("llvm.asan.dynamically_initialized_globals");
|
|
|
|
if (!DynamicGlobals)
|
|
|
|
return;
|
|
|
|
for (int i = 0, n = DynamicGlobals->getNumOperands(); i < n; ++i) {
|
|
|
|
MDNode *MDN = DynamicGlobals->getOperand(i);
|
|
|
|
assert(MDN->getNumOperands() == 1);
|
|
|
|
Value *VG = MDN->getOperand(0);
|
|
|
|
// The optimizer may optimize away a global entirely, in which case we
|
|
|
|
// cannot instrument access to it.
|
|
|
|
if (!VG)
|
|
|
|
continue;
|
|
|
|
DynInitGlobals.insert(cast<GlobalVariable>(VG));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
bool Contains(GlobalVariable *G) { return DynInitGlobals.count(G) != 0; }
|
|
|
|
private:
|
|
|
|
SmallSet<GlobalValue*, 32> DynInitGlobals;
|
|
|
|
};
|
|
|
|
|
2013-01-16 21:23:28 +08:00
|
|
|
/// This struct defines the shadow mapping using the rule:
|
2013-01-23 20:54:55 +08:00
|
|
|
/// shadow = (mem >> Scale) ADD-or-OR Offset.
|
2013-01-16 21:23:28 +08:00
|
|
|
struct ShadowMapping {
|
|
|
|
int Scale;
|
|
|
|
uint64_t Offset;
|
2013-01-23 20:54:55 +08:00
|
|
|
bool OrShadowOffset;
|
2013-01-16 21:23:28 +08:00
|
|
|
};
|
|
|
|
|
2014-01-16 18:19:12 +08:00
|
|
|
static ShadowMapping getShadowMapping(const Module &M, int LongSize) {
|
2013-01-17 19:12:32 +08:00
|
|
|
llvm::Triple TargetTriple(M.getTargetTriple());
|
|
|
|
bool IsAndroid = TargetTriple.getEnvironment() == llvm::Triple::Android;
|
2014-02-24 21:40:24 +08:00
|
|
|
// bool IsMacOSX = TargetTriple.getOS() == llvm::Triple::MacOSX;
|
2014-02-10 15:37:04 +08:00
|
|
|
bool IsFreeBSD = TargetTriple.getOS() == llvm::Triple::FreeBSD;
|
2014-02-24 21:40:24 +08:00
|
|
|
bool IsLinux = TargetTriple.getOS() == llvm::Triple::Linux;
|
2013-07-26 09:35:43 +08:00
|
|
|
bool IsPPC64 = TargetTriple.getArch() == llvm::Triple::ppc64 ||
|
|
|
|
TargetTriple.getArch() == llvm::Triple::ppc64le;
|
2013-02-12 19:11:02 +08:00
|
|
|
bool IsX86_64 = TargetTriple.getArch() == llvm::Triple::x86_64;
|
2013-06-03 22:46:56 +08:00
|
|
|
bool IsMIPS32 = TargetTriple.getArch() == llvm::Triple::mips ||
|
|
|
|
TargetTriple.getArch() == llvm::Triple::mipsel;
|
2013-01-16 21:23:28 +08:00
|
|
|
|
|
|
|
ShadowMapping Mapping;
|
|
|
|
|
2014-02-24 21:40:24 +08:00
|
|
|
if (LongSize == 32) {
|
|
|
|
if (IsAndroid)
|
|
|
|
Mapping.Offset = 0;
|
|
|
|
else if (IsMIPS32)
|
|
|
|
Mapping.Offset = kMIPS32_ShadowOffset32;
|
|
|
|
else if (IsFreeBSD)
|
|
|
|
Mapping.Offset = kFreeBSD_ShadowOffset32;
|
|
|
|
else
|
|
|
|
Mapping.Offset = kDefaultShadowOffset32;
|
|
|
|
} else { // LongSize == 64
|
|
|
|
if (IsPPC64)
|
|
|
|
Mapping.Offset = kPPC64_ShadowOffset64;
|
|
|
|
else if (IsFreeBSD)
|
|
|
|
Mapping.Offset = kFreeBSD_ShadowOffset64;
|
|
|
|
else if (IsLinux && IsX86_64)
|
|
|
|
Mapping.Offset = kSmallX86_64ShadowOffset;
|
|
|
|
else
|
|
|
|
Mapping.Offset = kDefaultShadowOffset64;
|
2013-01-16 21:23:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
Mapping.Scale = kDefaultShadowScale;
|
|
|
|
if (ClMappingScale) {
|
|
|
|
Mapping.Scale = ClMappingScale;
|
|
|
|
}
|
|
|
|
|
2014-02-24 21:40:24 +08:00
|
|
|
// OR-ing shadow offset if more efficient (at least on x86) if the offset
|
|
|
|
// is a power of two, but on ppc64 we have to use add since the shadow
|
|
|
|
// offset is not necessary 1/8-th of the address space.
|
|
|
|
Mapping.OrShadowOffset = !IsPPC64 && !(Mapping.Offset & (Mapping.Offset - 1));
|
|
|
|
|
2013-01-16 21:23:28 +08:00
|
|
|
return Mapping;
|
2012-11-22 11:18:50 +08:00
|
|
|
}
|
|
|
|
|
2013-01-16 21:23:28 +08:00
|
|
|
static size_t RedzoneSizeForScale(int MappingScale) {
|
2012-11-22 11:18:50 +08:00
|
|
|
// Redzone used for stack and globals is at least 32 bytes.
|
|
|
|
// For scales 6 and 7, the redzone has to be 64 and 128 bytes respectively.
|
2013-01-16 21:23:28 +08:00
|
|
|
return std::max(32U, 1U << MappingScale);
|
2012-11-22 11:18:50 +08:00
|
|
|
}
|
2012-11-20 21:00:01 +08:00
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
/// AddressSanitizer: instrument the code in module to find memory bugs.
|
2012-10-15 22:20:06 +08:00
|
|
|
struct AddressSanitizer : public FunctionPass {
|
2013-03-14 20:38:58 +08:00
|
|
|
AddressSanitizer(bool CheckInitOrder = true,
|
2012-11-30 02:14:24 +08:00
|
|
|
bool CheckUseAfterReturn = false,
|
2012-12-04 03:09:26 +08:00
|
|
|
bool CheckLifetime = false,
|
2014-01-16 18:19:12 +08:00
|
|
|
StringRef BlacklistFile = StringRef())
|
2012-11-30 02:14:24 +08:00
|
|
|
: FunctionPass(ID),
|
|
|
|
CheckInitOrder(CheckInitOrder || ClInitializers),
|
|
|
|
CheckUseAfterReturn(CheckUseAfterReturn || ClUseAfterReturn),
|
2012-12-04 03:09:26 +08:00
|
|
|
CheckLifetime(CheckLifetime || ClCheckLifetime),
|
|
|
|
BlacklistFile(BlacklistFile.empty() ? ClBlacklistFile
|
2014-01-16 18:19:12 +08:00
|
|
|
: BlacklistFile) {}
|
2012-11-28 18:31:36 +08:00
|
|
|
virtual const char *getPassName() const {
|
|
|
|
return "AddressSanitizerFunctionPass";
|
|
|
|
}
|
2012-10-15 22:20:06 +08:00
|
|
|
void instrumentMop(Instruction *I);
|
2013-02-19 19:29:21 +08:00
|
|
|
void instrumentAddress(Instruction *OrigIns, Instruction *InsertBefore,
|
|
|
|
Value *Addr, uint32_t TypeSize, bool IsWrite,
|
|
|
|
Value *SizeArgument);
|
2012-07-17 00:15:40 +08:00
|
|
|
Value *createSlowPathCmp(IRBuilder<> &IRB, Value *AddrLong,
|
|
|
|
Value *ShadowValue, uint32_t TypeSize);
|
2012-08-14 22:04:51 +08:00
|
|
|
Instruction *generateCrashCode(Instruction *InsertBefore, Value *Addr,
|
2013-02-19 19:29:21 +08:00
|
|
|
bool IsWrite, size_t AccessSizeIndex,
|
|
|
|
Value *SizeArgument);
|
2012-10-15 22:20:06 +08:00
|
|
|
bool instrumentMemIntrinsic(MemIntrinsic *MI);
|
|
|
|
void instrumentMemIntrinsicParam(Instruction *OrigIns, Value *Addr,
|
2012-07-17 00:15:40 +08:00
|
|
|
Value *Size,
|
2011-11-16 09:35:23 +08:00
|
|
|
Instruction *InsertBefore, bool IsWrite);
|
|
|
|
Value *memToShadow(Value *Shadow, IRBuilder<> &IRB);
|
2012-10-15 22:20:06 +08:00
|
|
|
bool runOnFunction(Function &F);
|
2012-01-31 07:50:10 +08:00
|
|
|
bool maybeInsertAsanInitAtFunctionEntry(Function &F);
|
2012-10-15 22:20:06 +08:00
|
|
|
virtual bool doInitialization(Module &M);
|
2011-11-16 09:35:23 +08:00
|
|
|
static char ID; // Pass identification, replacement for typeid
|
|
|
|
|
|
|
|
private:
|
2012-11-29 17:54:21 +08:00
|
|
|
void initializeCallbacks(Module &M);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2012-08-21 16:24:25 +08:00
|
|
|
bool ShouldInstrumentGlobal(GlobalVariable *G);
|
2011-11-18 09:41:06 +08:00
|
|
|
bool LooksLikeCodeInBug11395(Instruction *I);
|
2012-08-21 16:24:25 +08:00
|
|
|
void FindDynamicInitializers(Module &M);
|
2013-10-16 22:06:14 +08:00
|
|
|
bool GlobalIsLinkerInitialized(GlobalVariable *G);
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
bool InjectCoverage(Function &F, const ArrayRef<BasicBlock*> AllBlocks);
|
|
|
|
void InjectCoverageAtBlock(Function &F, BasicBlock &BB);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2012-11-30 02:14:24 +08:00
|
|
|
bool CheckInitOrder;
|
|
|
|
bool CheckUseAfterReturn;
|
|
|
|
bool CheckLifetime;
|
2013-01-17 19:12:32 +08:00
|
|
|
SmallString<64> BlacklistFile;
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
LLVMContext *C;
|
2014-02-21 08:06:31 +08:00
|
|
|
DataLayout *DL;
|
2011-11-16 09:35:23 +08:00
|
|
|
int LongSize;
|
|
|
|
Type *IntptrTy;
|
2013-01-16 21:23:28 +08:00
|
|
|
ShadowMapping Mapping;
|
2011-11-16 09:35:23 +08:00
|
|
|
Function *AsanCtorFunction;
|
|
|
|
Function *AsanInitFunction;
|
2012-10-15 22:20:06 +08:00
|
|
|
Function *AsanHandleNoReturnFunc;
|
2013-11-15 15:16:09 +08:00
|
|
|
Function *AsanCovFunction;
|
2013-07-10 06:02:49 +08:00
|
|
|
OwningPtr<SpecialCaseList> BL;
|
2012-07-16 22:09:42 +08:00
|
|
|
// This array is indexed by AccessIsWrite and log2(AccessSize).
|
|
|
|
Function *AsanErrorCallback[2][kNumberOfAccessSizes];
|
2013-02-19 19:29:21 +08:00
|
|
|
// This array is indexed by AccessIsWrite.
|
|
|
|
Function *AsanErrorCallbackSized[2];
|
2012-07-20 17:54:50 +08:00
|
|
|
InlineAsm *EmptyAsm;
|
2012-11-20 21:00:01 +08:00
|
|
|
SetOfDynamicallyInitializedGlobals DynamicallyInitializedGlobals;
|
2012-12-25 20:04:36 +08:00
|
|
|
|
|
|
|
friend struct FunctionStackPoisoner;
|
2011-11-16 09:35:23 +08:00
|
|
|
};
|
2012-07-17 00:15:40 +08:00
|
|
|
|
2012-11-28 18:31:36 +08:00
|
|
|
class AddressSanitizerModule : public ModulePass {
|
2012-11-22 11:18:50 +08:00
|
|
|
public:
|
2013-03-14 20:38:58 +08:00
|
|
|
AddressSanitizerModule(bool CheckInitOrder = true,
|
2014-01-16 18:19:12 +08:00
|
|
|
StringRef BlacklistFile = StringRef())
|
2012-11-30 02:14:24 +08:00
|
|
|
: ModulePass(ID),
|
2012-12-04 03:09:26 +08:00
|
|
|
CheckInitOrder(CheckInitOrder || ClInitializers),
|
|
|
|
BlacklistFile(BlacklistFile.empty() ? ClBlacklistFile
|
2014-01-16 18:19:12 +08:00
|
|
|
: BlacklistFile) {}
|
2012-11-28 18:31:36 +08:00
|
|
|
bool runOnModule(Module &M);
|
|
|
|
static char ID; // Pass identification, replacement for typeid
|
|
|
|
virtual const char *getPassName() const {
|
|
|
|
return "AddressSanitizerModule";
|
|
|
|
}
|
2012-12-04 09:34:23 +08:00
|
|
|
|
2012-11-22 11:18:50 +08:00
|
|
|
private:
|
2012-12-25 20:28:20 +08:00
|
|
|
void initializeCallbacks(Module &M);
|
|
|
|
|
2012-11-22 11:18:50 +08:00
|
|
|
bool ShouldInstrumentGlobal(GlobalVariable *G);
|
2013-03-26 21:05:41 +08:00
|
|
|
void createInitializerPoisonCalls(Module &M, GlobalValue *ModuleName);
|
2013-12-06 17:00:17 +08:00
|
|
|
size_t MinRedzoneSizeForGlobal() const {
|
2013-01-16 21:23:28 +08:00
|
|
|
return RedzoneSizeForScale(Mapping.Scale);
|
|
|
|
}
|
2012-11-22 11:18:50 +08:00
|
|
|
|
2012-11-30 02:14:24 +08:00
|
|
|
bool CheckInitOrder;
|
2012-12-04 03:09:26 +08:00
|
|
|
SmallString<64> BlacklistFile;
|
2013-01-17 19:12:32 +08:00
|
|
|
|
2013-07-10 06:02:49 +08:00
|
|
|
OwningPtr<SpecialCaseList> BL;
|
2012-11-22 11:18:50 +08:00
|
|
|
SetOfDynamicallyInitializedGlobals DynamicallyInitializedGlobals;
|
|
|
|
Type *IntptrTy;
|
|
|
|
LLVMContext *C;
|
2014-02-21 08:06:31 +08:00
|
|
|
DataLayout *DL;
|
2013-01-16 21:23:28 +08:00
|
|
|
ShadowMapping Mapping;
|
2012-12-25 20:28:20 +08:00
|
|
|
Function *AsanPoisonGlobals;
|
|
|
|
Function *AsanUnpoisonGlobals;
|
|
|
|
Function *AsanRegisterGlobals;
|
|
|
|
Function *AsanUnregisterGlobals;
|
2012-11-22 11:18:50 +08:00
|
|
|
};
|
|
|
|
|
2012-12-25 20:04:36 +08:00
|
|
|
// Stack poisoning does not play well with exception handling.
|
|
|
|
// When an exception is thrown, we essentially bypass the code
|
|
|
|
// that unpoisones the stack. This is why the run-time library has
|
|
|
|
// to intercept __cxa_throw (as well as longjmp, etc) and unpoison the entire
|
|
|
|
// stack in the interceptor. This however does not work inside the
|
|
|
|
// actual function which catches the exception. Most likely because the
|
|
|
|
// compiler hoists the load of the shadow value somewhere too high.
|
|
|
|
// This causes asan to report a non-existing bug on 453.povray.
|
|
|
|
// It sounds like an LLVM bug.
|
|
|
|
struct FunctionStackPoisoner : public InstVisitor<FunctionStackPoisoner> {
|
|
|
|
Function &F;
|
|
|
|
AddressSanitizer &ASan;
|
|
|
|
DIBuilder DIB;
|
|
|
|
LLVMContext *C;
|
|
|
|
Type *IntptrTy;
|
|
|
|
Type *IntptrPtrTy;
|
2013-01-16 21:23:28 +08:00
|
|
|
ShadowMapping Mapping;
|
2012-12-25 20:04:36 +08:00
|
|
|
|
|
|
|
SmallVector<AllocaInst*, 16> AllocaVec;
|
|
|
|
SmallVector<Instruction*, 8> RetVec;
|
|
|
|
unsigned StackAlignment;
|
|
|
|
|
2013-09-10 21:16:56 +08:00
|
|
|
Function *AsanStackMallocFunc[kMaxAsanStackMallocSizeClass + 1],
|
|
|
|
*AsanStackFreeFunc[kMaxAsanStackMallocSizeClass + 1];
|
2012-12-25 20:04:36 +08:00
|
|
|
Function *AsanPoisonStackMemoryFunc, *AsanUnpoisonStackMemoryFunc;
|
|
|
|
|
2012-12-27 16:50:58 +08:00
|
|
|
// Stores a place and arguments of poisoning/unpoisoning call for alloca.
|
|
|
|
struct AllocaPoisonCall {
|
|
|
|
IntrinsicInst *InsBefore;
|
2013-11-18 22:53:55 +08:00
|
|
|
AllocaInst *AI;
|
2012-12-27 16:50:58 +08:00
|
|
|
uint64_t Size;
|
|
|
|
bool DoPoison;
|
|
|
|
};
|
|
|
|
SmallVector<AllocaPoisonCall, 8> AllocaPoisonCallVec;
|
|
|
|
|
|
|
|
// Maps Value to an AllocaInst from which the Value is originated.
|
|
|
|
typedef DenseMap<Value*, AllocaInst*> AllocaForValueMapTy;
|
|
|
|
AllocaForValueMapTy AllocaForValue;
|
|
|
|
|
2012-12-25 20:04:36 +08:00
|
|
|
FunctionStackPoisoner(Function &F, AddressSanitizer &ASan)
|
|
|
|
: F(F), ASan(ASan), DIB(*F.getParent()), C(ASan.C),
|
|
|
|
IntptrTy(ASan.IntptrTy), IntptrPtrTy(PointerType::get(IntptrTy, 0)),
|
2013-01-16 21:23:28 +08:00
|
|
|
Mapping(ASan.Mapping),
|
2013-12-06 17:00:17 +08:00
|
|
|
StackAlignment(1 << Mapping.Scale) {}
|
2012-12-25 20:04:36 +08:00
|
|
|
|
|
|
|
bool runOnFunction() {
|
|
|
|
if (!ClStack) return false;
|
|
|
|
// Collect alloca, ret, lifetime instructions etc.
|
|
|
|
for (df_iterator<BasicBlock*> DI = df_begin(&F.getEntryBlock()),
|
|
|
|
DE = df_end(&F.getEntryBlock()); DI != DE; ++DI) {
|
|
|
|
BasicBlock *BB = *DI;
|
|
|
|
visit(*BB);
|
|
|
|
}
|
|
|
|
if (AllocaVec.empty()) return false;
|
|
|
|
|
|
|
|
initializeCallbacks(*F.getParent());
|
|
|
|
|
|
|
|
poisonStack();
|
|
|
|
|
|
|
|
if (ClDebugStack) {
|
|
|
|
DEBUG(dbgs() << F);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finds all static Alloca instructions and puts
|
|
|
|
// poisoned red zones around all of them.
|
|
|
|
// Then unpoison everything back before the function returns.
|
|
|
|
void poisonStack();
|
|
|
|
|
|
|
|
// ----------------------- Visitors.
|
|
|
|
/// \brief Collect all Ret instructions.
|
|
|
|
void visitReturnInst(ReturnInst &RI) {
|
|
|
|
RetVec.push_back(&RI);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// \brief Collect Alloca instructions we want (and can) handle.
|
|
|
|
void visitAllocaInst(AllocaInst &AI) {
|
2012-12-27 16:50:58 +08:00
|
|
|
if (!isInterestingAlloca(AI)) return;
|
2012-12-25 20:04:36 +08:00
|
|
|
|
|
|
|
StackAlignment = std::max(StackAlignment, AI.getAlignment());
|
|
|
|
AllocaVec.push_back(&AI);
|
|
|
|
}
|
|
|
|
|
2012-12-27 16:50:58 +08:00
|
|
|
/// \brief Collect lifetime intrinsic calls to check for use-after-scope
|
|
|
|
/// errors.
|
|
|
|
void visitIntrinsicInst(IntrinsicInst &II) {
|
|
|
|
if (!ASan.CheckLifetime) return;
|
|
|
|
Intrinsic::ID ID = II.getIntrinsicID();
|
|
|
|
if (ID != Intrinsic::lifetime_start &&
|
|
|
|
ID != Intrinsic::lifetime_end)
|
|
|
|
return;
|
|
|
|
// Found lifetime intrinsic, add ASan instrumentation if necessary.
|
|
|
|
ConstantInt *Size = dyn_cast<ConstantInt>(II.getArgOperand(0));
|
|
|
|
// If size argument is undefined, don't do anything.
|
|
|
|
if (Size->isMinusOne()) return;
|
|
|
|
// Check that size doesn't saturate uint64_t and can
|
|
|
|
// be stored in IntptrTy.
|
|
|
|
const uint64_t SizeValue = Size->getValue().getLimitedValue();
|
|
|
|
if (SizeValue == ~0ULL ||
|
|
|
|
!ConstantInt::isValueValidForType(IntptrTy, SizeValue))
|
|
|
|
return;
|
|
|
|
// Find alloca instruction that corresponds to llvm.lifetime argument.
|
|
|
|
AllocaInst *AI = findAllocaForValue(II.getArgOperand(1));
|
|
|
|
if (!AI) return;
|
|
|
|
bool DoPoison = (ID == Intrinsic::lifetime_end);
|
2013-11-18 22:53:55 +08:00
|
|
|
AllocaPoisonCall APC = {&II, AI, SizeValue, DoPoison};
|
2012-12-27 16:50:58 +08:00
|
|
|
AllocaPoisonCallVec.push_back(APC);
|
|
|
|
}
|
|
|
|
|
2012-12-25 20:04:36 +08:00
|
|
|
// ---------------------- Helpers.
|
|
|
|
void initializeCallbacks(Module &M);
|
|
|
|
|
2012-12-27 16:50:58 +08:00
|
|
|
// Check if we want (and can) handle this alloca.
|
2013-08-10 04:53:48 +08:00
|
|
|
bool isInterestingAlloca(AllocaInst &AI) const {
|
2013-12-06 17:00:17 +08:00
|
|
|
return (!AI.isArrayAllocation() && AI.isStaticAlloca() &&
|
|
|
|
AI.getAllocatedType()->isSized() &&
|
|
|
|
// alloca() may be called with 0 size, ignore it.
|
|
|
|
getAllocaSizeInBytes(&AI) > 0);
|
2012-12-27 16:50:58 +08:00
|
|
|
}
|
|
|
|
|
2013-08-10 04:53:48 +08:00
|
|
|
uint64_t getAllocaSizeInBytes(AllocaInst *AI) const {
|
2012-12-25 20:04:36 +08:00
|
|
|
Type *Ty = AI->getAllocatedType();
|
2014-02-21 08:06:31 +08:00
|
|
|
uint64_t SizeInBytes = ASan.DL->getTypeAllocSize(Ty);
|
2012-12-25 20:04:36 +08:00
|
|
|
return SizeInBytes;
|
|
|
|
}
|
2012-12-27 16:50:58 +08:00
|
|
|
/// Finds alloca where the value comes from.
|
|
|
|
AllocaInst *findAllocaForValue(Value *V);
|
2013-12-06 17:00:17 +08:00
|
|
|
void poisonRedZones(const ArrayRef<uint8_t> ShadowBytes, IRBuilder<> &IRB,
|
2012-12-25 20:04:36 +08:00
|
|
|
Value *ShadowBase, bool DoPoison);
|
2013-08-10 04:53:48 +08:00
|
|
|
void poisonAlloca(Value *V, uint64_t Size, IRBuilder<> &IRB, bool DoPoison);
|
2013-09-17 20:14:50 +08:00
|
|
|
|
|
|
|
void SetShadowToStackAfterReturnInlined(IRBuilder<> &IRB, Value *ShadowBase,
|
|
|
|
int Size);
|
2012-12-25 20:04:36 +08:00
|
|
|
};
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
} // namespace
|
|
|
|
|
|
|
|
char AddressSanitizer::ID = 0;
|
|
|
|
INITIALIZE_PASS(AddressSanitizer, "asan",
|
|
|
|
"AddressSanitizer: detects use-after-free and out-of-bounds bugs.",
|
|
|
|
false, false)
|
2012-11-30 02:14:24 +08:00
|
|
|
FunctionPass *llvm::createAddressSanitizerFunctionPass(
|
2012-12-04 03:09:26 +08:00
|
|
|
bool CheckInitOrder, bool CheckUseAfterReturn, bool CheckLifetime,
|
2014-01-16 18:19:12 +08:00
|
|
|
StringRef BlacklistFile) {
|
2012-11-30 02:14:24 +08:00
|
|
|
return new AddressSanitizer(CheckInitOrder, CheckUseAfterReturn,
|
2014-01-16 18:19:12 +08:00
|
|
|
CheckLifetime, BlacklistFile);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-11-28 18:31:36 +08:00
|
|
|
char AddressSanitizerModule::ID = 0;
|
|
|
|
INITIALIZE_PASS(AddressSanitizerModule, "asan-module",
|
|
|
|
"AddressSanitizer: detects use-after-free and out-of-bounds bugs."
|
|
|
|
"ModulePass", false, false)
|
2012-12-04 03:09:26 +08:00
|
|
|
ModulePass *llvm::createAddressSanitizerModulePass(
|
2014-01-16 18:19:12 +08:00
|
|
|
bool CheckInitOrder, StringRef BlacklistFile) {
|
|
|
|
return new AddressSanitizerModule(CheckInitOrder, BlacklistFile);
|
2012-01-23 19:22:43 +08:00
|
|
|
}
|
|
|
|
|
2012-07-17 01:12:07 +08:00
|
|
|
static size_t TypeSizeToSizeIndex(uint32_t TypeSize) {
|
2013-05-25 06:23:49 +08:00
|
|
|
size_t Res = countTrailingZeros(TypeSize / 8);
|
2012-07-17 01:12:07 +08:00
|
|
|
assert(Res < kNumberOfAccessSizes);
|
|
|
|
return Res;
|
|
|
|
}
|
|
|
|
|
2013-08-07 06:52:42 +08:00
|
|
|
// \brief Create a constant for Str so that we can pass it to the run-time lib.
|
2013-12-25 22:22:15 +08:00
|
|
|
static GlobalVariable *createPrivateGlobalForString(
|
|
|
|
Module &M, StringRef Str, bool AllowMerging) {
|
2012-02-05 10:29:43 +08:00
|
|
|
Constant *StrConst = ConstantDataArray::getString(M.getContext(), Str);
|
2014-02-20 01:23:20 +08:00
|
|
|
// We use private linkage for module-local strings. If they can be merged
|
|
|
|
// with another one, we set the unnamed_addr attribute.
|
2013-12-25 22:22:15 +08:00
|
|
|
GlobalVariable *GV =
|
|
|
|
new GlobalVariable(M, StrConst->getType(), true,
|
2014-02-20 01:23:20 +08:00
|
|
|
GlobalValue::PrivateLinkage, StrConst, kAsanGenPrefix);
|
|
|
|
if (AllowMerging)
|
|
|
|
GV->setUnnamedAddr(true);
|
2013-03-18 17:38:39 +08:00
|
|
|
GV->setAlignment(1); // Strings may not be merged w/o setting align 1.
|
|
|
|
return GV;
|
2012-11-20 22:16:08 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool GlobalWasGeneratedByAsan(GlobalVariable *G) {
|
|
|
|
return G->getName().find(kAsanGenPrefix) == 0;
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
Value *AddressSanitizer::memToShadow(Value *Shadow, IRBuilder<> &IRB) {
|
|
|
|
// Shadow >> scale
|
2013-01-16 21:23:28 +08:00
|
|
|
Shadow = IRB.CreateLShr(Shadow, Mapping.Scale);
|
|
|
|
if (Mapping.Offset == 0)
|
2011-11-16 09:35:23 +08:00
|
|
|
return Shadow;
|
|
|
|
// (Shadow >> scale) | offset
|
2013-01-23 20:54:55 +08:00
|
|
|
if (Mapping.OrShadowOffset)
|
|
|
|
return IRB.CreateOr(Shadow, ConstantInt::get(IntptrTy, Mapping.Offset));
|
|
|
|
else
|
|
|
|
return IRB.CreateAdd(Shadow, ConstantInt::get(IntptrTy, Mapping.Offset));
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-07-17 00:15:40 +08:00
|
|
|
void AddressSanitizer::instrumentMemIntrinsicParam(
|
2012-10-15 22:20:06 +08:00
|
|
|
Instruction *OrigIns,
|
2011-11-16 09:35:23 +08:00
|
|
|
Value *Addr, Value *Size, Instruction *InsertBefore, bool IsWrite) {
|
2013-02-19 19:29:21 +08:00
|
|
|
IRBuilder<> IRB(InsertBefore);
|
|
|
|
if (Size->getType() != IntptrTy)
|
|
|
|
Size = IRB.CreateIntCast(Size, IntptrTy, false);
|
2011-11-16 09:35:23 +08:00
|
|
|
// Check the first byte.
|
2013-02-19 19:29:21 +08:00
|
|
|
instrumentAddress(OrigIns, InsertBefore, Addr, 8, IsWrite, Size);
|
2011-11-16 09:35:23 +08:00
|
|
|
// Check the last byte.
|
2013-02-19 19:29:21 +08:00
|
|
|
IRB.SetInsertPoint(InsertBefore);
|
|
|
|
Value *SizeMinusOne = IRB.CreateSub(Size, ConstantInt::get(IntptrTy, 1));
|
|
|
|
Value *AddrLong = IRB.CreatePointerCast(Addr, IntptrTy);
|
|
|
|
Value *AddrLast = IRB.CreateAdd(AddrLong, SizeMinusOne);
|
|
|
|
instrumentAddress(OrigIns, InsertBefore, AddrLast, 8, IsWrite, Size);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Instrument memset/memmove/memcpy
|
2012-10-15 22:20:06 +08:00
|
|
|
bool AddressSanitizer::instrumentMemIntrinsic(MemIntrinsic *MI) {
|
2011-11-16 09:35:23 +08:00
|
|
|
Value *Dst = MI->getDest();
|
|
|
|
MemTransferInst *MemTran = dyn_cast<MemTransferInst>(MI);
|
2012-07-17 01:12:07 +08:00
|
|
|
Value *Src = MemTran ? MemTran->getSource() : 0;
|
2011-11-16 09:35:23 +08:00
|
|
|
Value *Length = MI->getLength();
|
|
|
|
|
|
|
|
Constant *ConstLength = dyn_cast<Constant>(Length);
|
|
|
|
Instruction *InsertBefore = MI;
|
|
|
|
if (ConstLength) {
|
|
|
|
if (ConstLength->isNullValue()) return false;
|
|
|
|
} else {
|
|
|
|
// The size is not a constant so it could be zero -- check at run-time.
|
|
|
|
IRBuilder<> IRB(InsertBefore);
|
|
|
|
|
|
|
|
Value *Cmp = IRB.CreateICmpNE(Length,
|
2012-07-02 19:42:29 +08:00
|
|
|
Constant::getNullValue(Length->getType()));
|
2013-12-19 21:29:56 +08:00
|
|
|
InsertBefore = SplitBlockAndInsertIfThen(Cmp, InsertBefore, false);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-10-15 22:20:06 +08:00
|
|
|
instrumentMemIntrinsicParam(MI, Dst, Length, InsertBefore, true);
|
2011-11-16 09:35:23 +08:00
|
|
|
if (Src)
|
2012-10-15 22:20:06 +08:00
|
|
|
instrumentMemIntrinsicParam(MI, Src, Length, InsertBefore, false);
|
2011-11-16 09:35:23 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-05-30 17:04:06 +08:00
|
|
|
// If I is an interesting memory access, return the PointerOperand
|
|
|
|
// and set IsWrite. Otherwise return NULL.
|
|
|
|
static Value *isInterestingMemoryAccess(Instruction *I, bool *IsWrite) {
|
2011-11-16 09:35:23 +08:00
|
|
|
if (LoadInst *LI = dyn_cast<LoadInst>(I)) {
|
2012-05-30 17:04:06 +08:00
|
|
|
if (!ClInstrumentReads) return NULL;
|
|
|
|
*IsWrite = false;
|
2011-11-16 09:35:23 +08:00
|
|
|
return LI->getPointerOperand();
|
|
|
|
}
|
2012-05-30 17:04:06 +08:00
|
|
|
if (StoreInst *SI = dyn_cast<StoreInst>(I)) {
|
|
|
|
if (!ClInstrumentWrites) return NULL;
|
|
|
|
*IsWrite = true;
|
|
|
|
return SI->getPointerOperand();
|
|
|
|
}
|
|
|
|
if (AtomicRMWInst *RMW = dyn_cast<AtomicRMWInst>(I)) {
|
|
|
|
if (!ClInstrumentAtomics) return NULL;
|
|
|
|
*IsWrite = true;
|
|
|
|
return RMW->getPointerOperand();
|
|
|
|
}
|
|
|
|
if (AtomicCmpXchgInst *XCHG = dyn_cast<AtomicCmpXchgInst>(I)) {
|
|
|
|
if (!ClInstrumentAtomics) return NULL;
|
|
|
|
*IsWrite = true;
|
|
|
|
return XCHG->getPointerOperand();
|
|
|
|
}
|
|
|
|
return NULL;
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2013-10-16 22:06:14 +08:00
|
|
|
bool AddressSanitizer::GlobalIsLinkerInitialized(GlobalVariable *G) {
|
|
|
|
// If a global variable does not have dynamic initialization we don't
|
|
|
|
// have to instrument it. However, if a global does not have initializer
|
|
|
|
// at all, we assume it has dynamic initializer (in other TU).
|
|
|
|
return G->hasInitializer() && !DynamicallyInitializedGlobals.Contains(G);
|
|
|
|
}
|
|
|
|
|
2012-10-15 22:20:06 +08:00
|
|
|
void AddressSanitizer::instrumentMop(Instruction *I) {
|
2012-09-17 22:20:57 +08:00
|
|
|
bool IsWrite = false;
|
2012-05-30 17:04:06 +08:00
|
|
|
Value *Addr = isInterestingMemoryAccess(I, &IsWrite);
|
|
|
|
assert(Addr);
|
2012-08-21 16:24:25 +08:00
|
|
|
if (ClOpt && ClOptGlobals) {
|
|
|
|
if (GlobalVariable *G = dyn_cast<GlobalVariable>(Addr)) {
|
|
|
|
// If initialization order checking is disabled, a simple access to a
|
|
|
|
// dynamically initialized global is always valid.
|
2013-10-16 22:06:14 +08:00
|
|
|
if (!CheckInitOrder || GlobalIsLinkerInitialized(G)) {
|
|
|
|
NumOptimizedAccessesToGlobalVar++;
|
2012-08-21 16:24:25 +08:00
|
|
|
return;
|
2013-10-16 22:06:14 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
ConstantExpr *CE = dyn_cast<ConstantExpr>(Addr);
|
|
|
|
if (CE && CE->isGEPWithNoNotionalOverIndexing()) {
|
|
|
|
if (GlobalVariable *G = dyn_cast<GlobalVariable>(CE->getOperand(0))) {
|
|
|
|
if (CE->getOperand(1)->isNullValue() && GlobalIsLinkerInitialized(G)) {
|
|
|
|
NumOptimizedAccessesToGlobalArray++;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2012-08-21 16:24:25 +08:00
|
|
|
}
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
2012-08-21 16:24:25 +08:00
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
Type *OrigPtrTy = Addr->getType();
|
|
|
|
Type *OrigTy = cast<PointerType>(OrigPtrTy)->getElementType();
|
|
|
|
|
|
|
|
assert(OrigTy->isSized());
|
2014-02-21 08:06:31 +08:00
|
|
|
uint32_t TypeSize = DL->getTypeStoreSizeInBits(OrigTy);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2013-02-19 19:29:21 +08:00
|
|
|
assert((TypeSize % 8) == 0);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2013-10-16 22:06:14 +08:00
|
|
|
if (IsWrite)
|
|
|
|
NumInstrumentedWrites++;
|
|
|
|
else
|
|
|
|
NumInstrumentedReads++;
|
|
|
|
|
2013-02-19 19:29:21 +08:00
|
|
|
// Instrument a 1-, 2-, 4-, 8-, or 16- byte access with one check.
|
|
|
|
if (TypeSize == 8 || TypeSize == 16 ||
|
|
|
|
TypeSize == 32 || TypeSize == 64 || TypeSize == 128)
|
|
|
|
return instrumentAddress(I, I, Addr, TypeSize, IsWrite, 0);
|
|
|
|
// Instrument unusual size (but still multiple of 8).
|
|
|
|
// We can not do it with a single check, so we do 1-byte check for the first
|
|
|
|
// and the last bytes. We call __asan_report_*_n(addr, real_size) to be able
|
|
|
|
// to report the actual access size.
|
2011-11-16 09:35:23 +08:00
|
|
|
IRBuilder<> IRB(I);
|
2013-02-19 19:29:21 +08:00
|
|
|
Value *LastByte = IRB.CreateIntToPtr(
|
|
|
|
IRB.CreateAdd(IRB.CreatePointerCast(Addr, IntptrTy),
|
|
|
|
ConstantInt::get(IntptrTy, TypeSize / 8 - 1)),
|
|
|
|
OrigPtrTy);
|
|
|
|
Value *Size = ConstantInt::get(IntptrTy, TypeSize / 8);
|
|
|
|
instrumentAddress(I, I, Addr, 8, IsWrite, Size);
|
|
|
|
instrumentAddress(I, I, LastByte, 8, IsWrite, Size);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-04-23 18:47:31 +08:00
|
|
|
// Validate the result of Module::getOrInsertFunction called for an interface
|
|
|
|
// function of AddressSanitizer. If the instrumented module defines a function
|
|
|
|
// with the same name, their prototypes must match, otherwise
|
|
|
|
// getOrInsertFunction returns a bitcast.
|
2012-11-22 11:18:50 +08:00
|
|
|
static Function *checkInterfaceFunction(Constant *FuncOrBitcast) {
|
2012-04-23 18:47:31 +08:00
|
|
|
if (isa<Function>(FuncOrBitcast)) return cast<Function>(FuncOrBitcast);
|
|
|
|
FuncOrBitcast->dump();
|
|
|
|
report_fatal_error("trying to redefine an AddressSanitizer "
|
|
|
|
"interface function");
|
|
|
|
}
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
Instruction *AddressSanitizer::generateCrashCode(
|
2012-08-14 22:04:51 +08:00
|
|
|
Instruction *InsertBefore, Value *Addr,
|
2013-02-19 19:29:21 +08:00
|
|
|
bool IsWrite, size_t AccessSizeIndex, Value *SizeArgument) {
|
2012-08-14 22:04:51 +08:00
|
|
|
IRBuilder<> IRB(InsertBefore);
|
2013-02-19 19:29:21 +08:00
|
|
|
CallInst *Call = SizeArgument
|
|
|
|
? IRB.CreateCall2(AsanErrorCallbackSized[IsWrite], Addr, SizeArgument)
|
|
|
|
: IRB.CreateCall(AsanErrorCallback[IsWrite][AccessSizeIndex], Addr);
|
|
|
|
|
2012-07-20 17:54:50 +08:00
|
|
|
// We don't do Call->setDoesNotReturn() because the BB already has
|
|
|
|
// UnreachableInst at the end.
|
|
|
|
// This EmptyAsm is required to avoid callback merge.
|
|
|
|
IRB.CreateCall(EmptyAsm);
|
2012-01-07 02:09:21 +08:00
|
|
|
return Call;
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-07-17 01:12:07 +08:00
|
|
|
Value *AddressSanitizer::createSlowPathCmp(IRBuilder<> &IRB, Value *AddrLong,
|
2012-07-17 00:15:40 +08:00
|
|
|
Value *ShadowValue,
|
|
|
|
uint32_t TypeSize) {
|
2013-01-16 21:23:28 +08:00
|
|
|
size_t Granularity = 1 << Mapping.Scale;
|
2012-07-17 00:15:40 +08:00
|
|
|
// Addr & (Granularity - 1)
|
|
|
|
Value *LastAccessedByte = IRB.CreateAnd(
|
|
|
|
AddrLong, ConstantInt::get(IntptrTy, Granularity - 1));
|
|
|
|
// (Addr & (Granularity - 1)) + size - 1
|
|
|
|
if (TypeSize / 8 > 1)
|
|
|
|
LastAccessedByte = IRB.CreateAdd(
|
|
|
|
LastAccessedByte, ConstantInt::get(IntptrTy, TypeSize / 8 - 1));
|
|
|
|
// (uint8_t) ((Addr & (Granularity-1)) + size - 1)
|
|
|
|
LastAccessedByte = IRB.CreateIntCast(
|
2012-08-15 16:58:58 +08:00
|
|
|
LastAccessedByte, ShadowValue->getType(), false);
|
2012-07-17 00:15:40 +08:00
|
|
|
// ((uint8_t) ((Addr & (Granularity-1)) + size - 1)) >= ShadowValue
|
|
|
|
return IRB.CreateICmpSGE(LastAccessedByte, ShadowValue);
|
|
|
|
}
|
|
|
|
|
2012-10-15 22:20:06 +08:00
|
|
|
void AddressSanitizer::instrumentAddress(Instruction *OrigIns,
|
2013-02-19 19:29:21 +08:00
|
|
|
Instruction *InsertBefore,
|
|
|
|
Value *Addr, uint32_t TypeSize,
|
|
|
|
bool IsWrite, Value *SizeArgument) {
|
|
|
|
IRBuilder<> IRB(InsertBefore);
|
2011-11-16 09:35:23 +08:00
|
|
|
Value *AddrLong = IRB.CreatePointerCast(Addr, IntptrTy);
|
|
|
|
|
|
|
|
Type *ShadowTy = IntegerType::get(
|
2013-01-16 21:23:28 +08:00
|
|
|
*C, std::max(8U, TypeSize >> Mapping.Scale));
|
2011-11-16 09:35:23 +08:00
|
|
|
Type *ShadowPtrTy = PointerType::get(ShadowTy, 0);
|
|
|
|
Value *ShadowPtr = memToShadow(AddrLong, IRB);
|
|
|
|
Value *CmpVal = Constant::getNullValue(ShadowTy);
|
|
|
|
Value *ShadowValue = IRB.CreateLoad(
|
|
|
|
IRB.CreateIntToPtr(ShadowPtr, ShadowPtrTy));
|
|
|
|
|
|
|
|
Value *Cmp = IRB.CreateICmpNE(ShadowValue, CmpVal);
|
2012-08-13 22:08:46 +08:00
|
|
|
size_t AccessSizeIndex = TypeSizeToSizeIndex(TypeSize);
|
2013-01-16 21:23:28 +08:00
|
|
|
size_t Granularity = 1 << Mapping.Scale;
|
2012-08-14 22:04:51 +08:00
|
|
|
TerminatorInst *CrashTerm = 0;
|
|
|
|
|
2012-08-15 16:58:58 +08:00
|
|
|
if (ClAlwaysSlowPath || (TypeSize < 8 * Granularity)) {
|
2012-10-19 18:48:31 +08:00
|
|
|
TerminatorInst *CheckTerm =
|
2013-12-19 21:29:56 +08:00
|
|
|
SplitBlockAndInsertIfThen(Cmp, InsertBefore, false);
|
2012-08-14 22:04:51 +08:00
|
|
|
assert(dyn_cast<BranchInst>(CheckTerm)->isUnconditional());
|
2012-07-20 17:54:50 +08:00
|
|
|
BasicBlock *NextBB = CheckTerm->getSuccessor(0);
|
2012-07-17 00:15:40 +08:00
|
|
|
IRB.SetInsertPoint(CheckTerm);
|
|
|
|
Value *Cmp2 = createSlowPathCmp(IRB, AddrLong, ShadowValue, TypeSize);
|
2012-10-15 22:20:06 +08:00
|
|
|
BasicBlock *CrashBlock =
|
|
|
|
BasicBlock::Create(*C, "", NextBB->getParent(), NextBB);
|
2012-08-14 22:04:51 +08:00
|
|
|
CrashTerm = new UnreachableInst(*C, CrashBlock);
|
2012-07-20 17:54:50 +08:00
|
|
|
BranchInst *NewTerm = BranchInst::Create(CrashBlock, NextBB, Cmp2);
|
|
|
|
ReplaceInstWithInst(CheckTerm, NewTerm);
|
2012-07-17 00:15:40 +08:00
|
|
|
} else {
|
2013-12-19 21:29:56 +08:00
|
|
|
CrashTerm = SplitBlockAndInsertIfThen(Cmp, InsertBefore, true);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
2012-08-14 22:04:51 +08:00
|
|
|
|
2013-02-19 19:29:21 +08:00
|
|
|
Instruction *Crash = generateCrashCode(
|
|
|
|
CrashTerm, AddrLong, IsWrite, AccessSizeIndex, SizeArgument);
|
2012-08-14 22:04:51 +08:00
|
|
|
Crash->setDebugLoc(OrigIns->getDebugLoc());
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-11-28 18:31:36 +08:00
|
|
|
void AddressSanitizerModule::createInitializerPoisonCalls(
|
2013-03-26 21:05:41 +08:00
|
|
|
Module &M, GlobalValue *ModuleName) {
|
2012-08-21 16:24:25 +08:00
|
|
|
// We do all of our poisoning and unpoisoning within _GLOBAL__I_a.
|
|
|
|
Function *GlobalInit = M.getFunction("_GLOBAL__I_a");
|
|
|
|
// If that function is not present, this TU contains no globals, or they have
|
|
|
|
// all been optimized away
|
|
|
|
if (!GlobalInit)
|
|
|
|
return;
|
|
|
|
|
|
|
|
// Set up the arguments to our poison/unpoison functions.
|
|
|
|
IRBuilder<> IRB(GlobalInit->begin()->getFirstInsertionPt());
|
|
|
|
|
|
|
|
// Add a call to poison all external globals before the given function starts.
|
2013-03-26 21:05:41 +08:00
|
|
|
Value *ModuleNameAddr = ConstantExpr::getPointerCast(ModuleName, IntptrTy);
|
|
|
|
IRB.CreateCall(AsanPoisonGlobals, ModuleNameAddr);
|
2012-08-21 16:24:25 +08:00
|
|
|
|
|
|
|
// Add calls to unpoison all globals before each return instruction.
|
|
|
|
for (Function::iterator I = GlobalInit->begin(), E = GlobalInit->end();
|
|
|
|
I != E; ++I) {
|
|
|
|
if (ReturnInst *RI = dyn_cast<ReturnInst>(I->getTerminator())) {
|
|
|
|
CallInst::Create(AsanUnpoisonGlobals, "", RI);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-28 18:31:36 +08:00
|
|
|
bool AddressSanitizerModule::ShouldInstrumentGlobal(GlobalVariable *G) {
|
2012-08-21 16:24:25 +08:00
|
|
|
Type *Ty = cast<PointerType>(G->getType())->getElementType();
|
2012-10-17 21:40:06 +08:00
|
|
|
DEBUG(dbgs() << "GLOBAL: " << *G << "\n");
|
2012-08-21 16:24:25 +08:00
|
|
|
|
2012-09-05 15:29:56 +08:00
|
|
|
if (BL->isIn(*G)) return false;
|
2012-08-21 16:24:25 +08:00
|
|
|
if (!Ty->isSized()) return false;
|
|
|
|
if (!G->hasInitializer()) return false;
|
2012-11-20 22:16:08 +08:00
|
|
|
if (GlobalWasGeneratedByAsan(G)) return false; // Our own global.
|
2012-08-21 16:24:25 +08:00
|
|
|
// Touch only those globals that will not be defined in other modules.
|
|
|
|
// Don't handle ODR type linkages since other modules may be built w/o asan.
|
|
|
|
if (G->getLinkage() != GlobalVariable::ExternalLinkage &&
|
|
|
|
G->getLinkage() != GlobalVariable::PrivateLinkage &&
|
|
|
|
G->getLinkage() != GlobalVariable::InternalLinkage)
|
|
|
|
return false;
|
|
|
|
// Two problems with thread-locals:
|
|
|
|
// - The address of the main thread's copy can't be computed at link-time.
|
|
|
|
// - Need to poison all copies, not just the main thread's one.
|
|
|
|
if (G->isThreadLocal())
|
|
|
|
return false;
|
2013-12-06 17:00:17 +08:00
|
|
|
// For now, just ignore this Global if the alignment is large.
|
|
|
|
if (G->getAlignment() > MinRedzoneSizeForGlobal()) return false;
|
2012-08-21 16:24:25 +08:00
|
|
|
|
|
|
|
// Ignore all the globals with the names starting with "\01L_OBJC_".
|
|
|
|
// Many of those are put into the .cstring section. The linker compresses
|
|
|
|
// that section by removing the spare \0s after the string terminator, so
|
|
|
|
// our redzones get broken.
|
|
|
|
if ((G->getName().find("\01L_OBJC_") == 0) ||
|
|
|
|
(G->getName().find("\01l_OBJC_") == 0)) {
|
|
|
|
DEBUG(dbgs() << "Ignoring \\01L_OBJC_* global: " << *G);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (G->hasSection()) {
|
|
|
|
StringRef Section(G->getSection());
|
|
|
|
// Ignore the globals from the __OBJC section. The ObjC runtime assumes
|
|
|
|
// those conform to /usr/lib/objc/runtime.h, so we can't add redzones to
|
|
|
|
// them.
|
|
|
|
if ((Section.find("__OBJC,") == 0) ||
|
|
|
|
(Section.find("__DATA, __objc_") == 0)) {
|
|
|
|
DEBUG(dbgs() << "Ignoring ObjC runtime global: " << *G);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// See http://code.google.com/p/address-sanitizer/issues/detail?id=32
|
|
|
|
// Constant CFString instances are compiled in the following way:
|
|
|
|
// -- the string buffer is emitted into
|
|
|
|
// __TEXT,__cstring,cstring_literals
|
|
|
|
// -- the constant NSConstantString structure referencing that buffer
|
|
|
|
// is placed into __DATA,__cfstring
|
|
|
|
// Therefore there's no point in placing redzones into __DATA,__cfstring.
|
|
|
|
// Moreover, it causes the linker to crash on OS X 10.7
|
|
|
|
if (Section.find("__DATA,__cfstring") == 0) {
|
|
|
|
DEBUG(dbgs() << "Ignoring CFString: " << *G);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-12-25 20:28:20 +08:00
|
|
|
void AddressSanitizerModule::initializeCallbacks(Module &M) {
|
|
|
|
IRBuilder<> IRB(*C);
|
|
|
|
// Declare our poisoning and unpoisoning functions.
|
|
|
|
AsanPoisonGlobals = checkInterfaceFunction(M.getOrInsertFunction(
|
2013-03-26 21:05:41 +08:00
|
|
|
kAsanPoisonGlobalsName, IRB.getVoidTy(), IntptrTy, NULL));
|
2012-12-25 20:28:20 +08:00
|
|
|
AsanPoisonGlobals->setLinkage(Function::ExternalLinkage);
|
|
|
|
AsanUnpoisonGlobals = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanUnpoisonGlobalsName, IRB.getVoidTy(), NULL));
|
|
|
|
AsanUnpoisonGlobals->setLinkage(Function::ExternalLinkage);
|
|
|
|
// Declare functions that register/unregister globals.
|
|
|
|
AsanRegisterGlobals = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanRegisterGlobalsName, IRB.getVoidTy(),
|
|
|
|
IntptrTy, IntptrTy, NULL));
|
|
|
|
AsanRegisterGlobals->setLinkage(Function::ExternalLinkage);
|
|
|
|
AsanUnregisterGlobals = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanUnregisterGlobalsName,
|
|
|
|
IRB.getVoidTy(), IntptrTy, IntptrTy, NULL));
|
|
|
|
AsanUnregisterGlobals->setLinkage(Function::ExternalLinkage);
|
|
|
|
}
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
// This function replaces all global variables with new variables that have
|
|
|
|
// trailing redzones. It also creates a function that poisons
|
|
|
|
// redzones and inserts this function into llvm.global_ctors.
|
2012-11-28 18:31:36 +08:00
|
|
|
bool AddressSanitizerModule::runOnModule(Module &M) {
|
|
|
|
if (!ClGlobals) return false;
|
2014-02-21 08:06:31 +08:00
|
|
|
DL = getAnalysisIfAvailable<DataLayout>();
|
|
|
|
if (!DL)
|
2012-11-28 18:31:36 +08:00
|
|
|
return false;
|
2013-08-12 19:46:09 +08:00
|
|
|
BL.reset(SpecialCaseList::createOrDie(BlacklistFile));
|
2012-11-30 02:27:01 +08:00
|
|
|
if (BL->isIn(M)) return false;
|
2012-11-22 11:18:50 +08:00
|
|
|
C = &(M.getContext());
|
2014-02-21 08:06:31 +08:00
|
|
|
int LongSize = DL->getPointerSizeInBits();
|
2013-01-16 21:23:28 +08:00
|
|
|
IntptrTy = Type::getIntNTy(*C, LongSize);
|
2014-01-16 18:19:12 +08:00
|
|
|
Mapping = getShadowMapping(M, LongSize);
|
2012-12-25 20:28:20 +08:00
|
|
|
initializeCallbacks(M);
|
|
|
|
DynamicallyInitializedGlobals.Init(M);
|
2012-11-22 11:18:50 +08:00
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
SmallVector<GlobalVariable *, 16> GlobalsToChange;
|
|
|
|
|
2012-08-21 16:24:25 +08:00
|
|
|
for (Module::GlobalListType::iterator G = M.global_begin(),
|
|
|
|
E = M.global_end(); G != E; ++G) {
|
|
|
|
if (ShouldInstrumentGlobal(G))
|
|
|
|
GlobalsToChange.push_back(G);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
size_t n = GlobalsToChange.size();
|
|
|
|
if (n == 0) return false;
|
|
|
|
|
|
|
|
// A global is described by a structure
|
|
|
|
// size_t beg;
|
|
|
|
// size_t size;
|
|
|
|
// size_t size_with_redzone;
|
|
|
|
// const char *name;
|
2013-03-18 16:05:29 +08:00
|
|
|
// const char *module_name;
|
2012-08-21 16:24:25 +08:00
|
|
|
// size_t has_dynamic_init;
|
2011-11-16 09:35:23 +08:00
|
|
|
// We initialize an array of such structures and pass it to a run-time call.
|
|
|
|
StructType *GlobalStructTy = StructType::get(IntptrTy, IntptrTy,
|
2012-08-21 16:24:25 +08:00
|
|
|
IntptrTy, IntptrTy,
|
2013-03-18 16:05:29 +08:00
|
|
|
IntptrTy, IntptrTy, NULL);
|
2013-10-01 21:32:03 +08:00
|
|
|
SmallVector<Constant *, 16> Initializers(n);
|
2012-11-22 11:18:50 +08:00
|
|
|
|
|
|
|
Function *CtorFunc = M.getFunction(kAsanModuleCtorName);
|
|
|
|
assert(CtorFunc);
|
|
|
|
IRBuilder<> IRB(CtorFunc->getEntryBlock().getTerminator());
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2013-03-26 21:05:41 +08:00
|
|
|
bool HasDynamicallyInitializedGlobals = false;
|
2012-08-21 16:24:25 +08:00
|
|
|
|
2013-03-26 21:05:41 +08:00
|
|
|
// We shouldn't merge same module names, as this string serves as unique
|
|
|
|
// module ID in runtime.
|
2013-12-25 22:22:15 +08:00
|
|
|
GlobalVariable *ModuleName = createPrivateGlobalForString(
|
|
|
|
M, M.getModuleIdentifier(), /*AllowMerging*/false);
|
2013-03-18 16:05:29 +08:00
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
for (size_t i = 0; i < n; i++) {
|
2013-01-24 18:43:50 +08:00
|
|
|
static const uint64_t kMaxGlobalRedzone = 1 << 18;
|
2011-11-16 09:35:23 +08:00
|
|
|
GlobalVariable *G = GlobalsToChange[i];
|
|
|
|
PointerType *PtrTy = cast<PointerType>(G->getType());
|
|
|
|
Type *Ty = PtrTy->getElementType();
|
2014-02-21 08:06:31 +08:00
|
|
|
uint64_t SizeInBytes = DL->getTypeAllocSize(Ty);
|
2013-12-06 17:00:17 +08:00
|
|
|
uint64_t MinRZ = MinRedzoneSizeForGlobal();
|
2013-01-24 18:35:40 +08:00
|
|
|
// MinRZ <= RZ <= kMaxGlobalRedzone
|
|
|
|
// and trying to make RZ to be ~ 1/4 of SizeInBytes.
|
2013-01-24 18:43:50 +08:00
|
|
|
uint64_t RZ = std::max(MinRZ,
|
2013-01-24 18:35:40 +08:00
|
|
|
std::min(kMaxGlobalRedzone,
|
|
|
|
(SizeInBytes / MinRZ / 4) * MinRZ));
|
|
|
|
uint64_t RightRedzoneSize = RZ;
|
|
|
|
// Round up to MinRZ
|
|
|
|
if (SizeInBytes % MinRZ)
|
|
|
|
RightRedzoneSize += MinRZ - (SizeInBytes % MinRZ);
|
|
|
|
assert(((RightRedzoneSize + SizeInBytes) % MinRZ) == 0);
|
2011-11-16 09:35:23 +08:00
|
|
|
Type *RightRedZoneTy = ArrayType::get(IRB.getInt8Ty(), RightRedzoneSize);
|
2012-08-21 16:24:25 +08:00
|
|
|
// Determine whether this global should be poisoned in initialization.
|
2012-11-20 21:00:01 +08:00
|
|
|
bool GlobalHasDynamicInitializer =
|
|
|
|
DynamicallyInitializedGlobals.Contains(G);
|
2012-09-05 15:29:56 +08:00
|
|
|
// Don't check initialization order if this global is blacklisted.
|
2013-07-10 06:03:17 +08:00
|
|
|
GlobalHasDynamicInitializer &= !BL->isIn(*G, "init");
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
StructType *NewTy = StructType::get(Ty, RightRedZoneTy, NULL);
|
|
|
|
Constant *NewInitializer = ConstantStruct::get(
|
|
|
|
NewTy, G->getInitializer(),
|
|
|
|
Constant::getNullValue(RightRedZoneTy), NULL);
|
|
|
|
|
2013-12-25 22:22:15 +08:00
|
|
|
GlobalVariable *Name =
|
|
|
|
createPrivateGlobalForString(M, G->getName(), /*AllowMerging*/true);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
// Create a new global variable with enough space for a redzone.
|
2013-08-07 06:52:42 +08:00
|
|
|
GlobalValue::LinkageTypes Linkage = G->getLinkage();
|
|
|
|
if (G->isConstant() && Linkage == GlobalValue::PrivateLinkage)
|
|
|
|
Linkage = GlobalValue::InternalLinkage;
|
2011-11-16 09:35:23 +08:00
|
|
|
GlobalVariable *NewGlobal = new GlobalVariable(
|
2013-08-07 06:52:42 +08:00
|
|
|
M, NewTy, G->isConstant(), Linkage,
|
2012-06-23 19:37:03 +08:00
|
|
|
NewInitializer, "", G, G->getThreadLocalMode());
|
2011-11-16 09:35:23 +08:00
|
|
|
NewGlobal->copyAttributesFrom(G);
|
2013-01-24 18:35:40 +08:00
|
|
|
NewGlobal->setAlignment(MinRZ);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
Value *Indices2[2];
|
|
|
|
Indices2[0] = IRB.getInt32(0);
|
|
|
|
Indices2[1] = IRB.getInt32(0);
|
|
|
|
|
|
|
|
G->replaceAllUsesWith(
|
2012-01-28 12:27:16 +08:00
|
|
|
ConstantExpr::getGetElementPtr(NewGlobal, Indices2, true));
|
2011-11-16 09:35:23 +08:00
|
|
|
NewGlobal->takeName(G);
|
|
|
|
G->eraseFromParent();
|
|
|
|
|
|
|
|
Initializers[i] = ConstantStruct::get(
|
|
|
|
GlobalStructTy,
|
|
|
|
ConstantExpr::getPointerCast(NewGlobal, IntptrTy),
|
|
|
|
ConstantInt::get(IntptrTy, SizeInBytes),
|
|
|
|
ConstantInt::get(IntptrTy, SizeInBytes + RightRedzoneSize),
|
|
|
|
ConstantExpr::getPointerCast(Name, IntptrTy),
|
2013-03-18 16:05:29 +08:00
|
|
|
ConstantExpr::getPointerCast(ModuleName, IntptrTy),
|
2012-08-21 16:24:25 +08:00
|
|
|
ConstantInt::get(IntptrTy, GlobalHasDynamicInitializer),
|
2011-11-16 09:35:23 +08:00
|
|
|
NULL);
|
2012-08-21 16:24:25 +08:00
|
|
|
|
|
|
|
// Populate the first and last globals declared in this TU.
|
2013-03-26 21:05:41 +08:00
|
|
|
if (CheckInitOrder && GlobalHasDynamicInitializer)
|
|
|
|
HasDynamicallyInitializedGlobals = true;
|
2012-08-21 16:24:25 +08:00
|
|
|
|
2012-10-17 21:40:06 +08:00
|
|
|
DEBUG(dbgs() << "NEW GLOBAL: " << *NewGlobal << "\n");
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
ArrayType *ArrayOfGlobalStructTy = ArrayType::get(GlobalStructTy, n);
|
|
|
|
GlobalVariable *AllGlobals = new GlobalVariable(
|
2013-08-07 06:52:42 +08:00
|
|
|
M, ArrayOfGlobalStructTy, false, GlobalVariable::InternalLinkage,
|
2011-11-16 09:35:23 +08:00
|
|
|
ConstantArray::get(ArrayOfGlobalStructTy, Initializers), "");
|
|
|
|
|
2012-08-21 16:24:25 +08:00
|
|
|
// Create calls for poisoning before initializers run and unpoisoning after.
|
2013-03-26 21:05:41 +08:00
|
|
|
if (CheckInitOrder && HasDynamicallyInitializedGlobals)
|
|
|
|
createInitializerPoisonCalls(M, ModuleName);
|
2011-11-16 09:35:23 +08:00
|
|
|
IRB.CreateCall2(AsanRegisterGlobals,
|
|
|
|
IRB.CreatePointerCast(AllGlobals, IntptrTy),
|
|
|
|
ConstantInt::get(IntptrTy, n));
|
|
|
|
|
2011-12-16 05:59:03 +08:00
|
|
|
// We also need to unregister globals at the end, e.g. when a shared library
|
|
|
|
// gets closed.
|
|
|
|
Function *AsanDtorFunction = Function::Create(
|
|
|
|
FunctionType::get(Type::getVoidTy(*C), false),
|
|
|
|
GlobalValue::InternalLinkage, kAsanModuleDtorName, &M);
|
|
|
|
BasicBlock *AsanDtorBB = BasicBlock::Create(*C, "", AsanDtorFunction);
|
|
|
|
IRBuilder<> IRB_Dtor(ReturnInst::Create(*C, AsanDtorBB));
|
|
|
|
IRB_Dtor.CreateCall2(AsanUnregisterGlobals,
|
|
|
|
IRB.CreatePointerCast(AllGlobals, IntptrTy),
|
|
|
|
ConstantInt::get(IntptrTy, n));
|
|
|
|
appendToGlobalDtors(M, AsanDtorFunction, kAsanCtorAndCtorPriority);
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
DEBUG(dbgs() << M);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-11-29 17:54:21 +08:00
|
|
|
void AddressSanitizer::initializeCallbacks(Module &M) {
|
|
|
|
IRBuilder<> IRB(*C);
|
2012-07-16 22:09:42 +08:00
|
|
|
// Create __asan_report* callbacks.
|
|
|
|
for (size_t AccessIsWrite = 0; AccessIsWrite <= 1; AccessIsWrite++) {
|
|
|
|
for (size_t AccessSizeIndex = 0; AccessSizeIndex < kNumberOfAccessSizes;
|
|
|
|
AccessSizeIndex++) {
|
|
|
|
// IsWrite and TypeSize are encoded in the function name.
|
|
|
|
std::string FunctionName = std::string(kAsanReportErrorTemplate) +
|
|
|
|
(AccessIsWrite ? "store" : "load") + itostr(1 << AccessSizeIndex);
|
2012-07-17 19:04:12 +08:00
|
|
|
// If we are merging crash callbacks, they have two parameters.
|
2012-11-07 20:42:18 +08:00
|
|
|
AsanErrorCallback[AccessIsWrite][AccessSizeIndex] =
|
|
|
|
checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
FunctionName, IRB.getVoidTy(), IntptrTy, NULL));
|
2012-07-16 22:09:42 +08:00
|
|
|
}
|
|
|
|
}
|
2013-02-19 19:29:21 +08:00
|
|
|
AsanErrorCallbackSized[0] = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanReportLoadN, IRB.getVoidTy(), IntptrTy, IntptrTy, NULL));
|
|
|
|
AsanErrorCallbackSized[1] = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanReportStoreN, IRB.getVoidTy(), IntptrTy, IntptrTy, NULL));
|
2012-10-15 22:20:06 +08:00
|
|
|
|
|
|
|
AsanHandleNoReturnFunc = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanHandleNoReturnName, IRB.getVoidTy(), NULL));
|
2013-11-15 15:16:09 +08:00
|
|
|
AsanCovFunction = checkInterfaceFunction(M.getOrInsertFunction(
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
kAsanCovName, IRB.getVoidTy(), NULL));
|
2012-07-20 17:54:50 +08:00
|
|
|
// We insert an empty inline asm after __asan_report* to avoid callback merge.
|
|
|
|
EmptyAsm = InlineAsm::get(FunctionType::get(IRB.getVoidTy(), false),
|
|
|
|
StringRef(""), StringRef(""),
|
|
|
|
/*hasSideEffects=*/true);
|
2012-11-29 17:54:21 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// virtual
|
|
|
|
bool AddressSanitizer::doInitialization(Module &M) {
|
|
|
|
// Initialize the private fields. No one has accessed them before.
|
2014-02-21 08:06:31 +08:00
|
|
|
DL = getAnalysisIfAvailable<DataLayout>();
|
2012-11-29 17:54:21 +08:00
|
|
|
|
2014-02-21 08:06:31 +08:00
|
|
|
if (!DL)
|
2012-11-29 17:54:21 +08:00
|
|
|
return false;
|
2013-08-12 19:46:09 +08:00
|
|
|
BL.reset(SpecialCaseList::createOrDie(BlacklistFile));
|
2012-11-29 17:54:21 +08:00
|
|
|
DynamicallyInitializedGlobals.Init(M);
|
|
|
|
|
|
|
|
C = &(M.getContext());
|
2014-02-21 08:06:31 +08:00
|
|
|
LongSize = DL->getPointerSizeInBits();
|
2012-11-29 17:54:21 +08:00
|
|
|
IntptrTy = Type::getIntNTy(*C, LongSize);
|
|
|
|
|
|
|
|
AsanCtorFunction = Function::Create(
|
|
|
|
FunctionType::get(Type::getVoidTy(*C), false),
|
|
|
|
GlobalValue::InternalLinkage, kAsanModuleCtorName, &M);
|
|
|
|
BasicBlock *AsanCtorBB = BasicBlock::Create(*C, "", AsanCtorFunction);
|
|
|
|
// call __asan_init in the module ctor.
|
|
|
|
IRBuilder<> IRB(ReturnInst::Create(*C, AsanCtorBB));
|
|
|
|
AsanInitFunction = checkInterfaceFunction(
|
|
|
|
M.getOrInsertFunction(kAsanInitName, IRB.getVoidTy(), NULL));
|
|
|
|
AsanInitFunction->setLinkage(Function::ExternalLinkage);
|
|
|
|
IRB.CreateCall(AsanInitFunction);
|
2012-07-16 22:09:42 +08:00
|
|
|
|
2014-01-16 18:19:12 +08:00
|
|
|
Mapping = getShadowMapping(M, LongSize);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2011-12-16 05:59:03 +08:00
|
|
|
appendToGlobalCtors(M, AsanCtorFunction, kAsanCtorAndCtorPriority);
|
2012-10-15 22:20:06 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-01-31 07:50:10 +08:00
|
|
|
bool AddressSanitizer::maybeInsertAsanInitAtFunctionEntry(Function &F) {
|
|
|
|
// For each NSObject descendant having a +load method, this method is invoked
|
|
|
|
// by the ObjC runtime before any of the static constructors is called.
|
|
|
|
// Therefore we need to instrument such methods with a call to __asan_init
|
|
|
|
// at the beginning in order to initialize our runtime before any access to
|
|
|
|
// the shadow memory.
|
|
|
|
// We cannot just ignore these methods, because they may call other
|
|
|
|
// instrumented functions.
|
|
|
|
if (F.getName().find(" load]") != std::string::npos) {
|
|
|
|
IRBuilder<> IRB(F.begin()->begin());
|
|
|
|
IRB.CreateCall(AsanInitFunction);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
void AddressSanitizer::InjectCoverageAtBlock(Function &F, BasicBlock &BB) {
|
|
|
|
BasicBlock::iterator IP = BB.getFirstInsertionPt(), BE = BB.end();
|
2013-12-11 05:49:28 +08:00
|
|
|
// Skip static allocas at the top of the entry block so they don't become
|
|
|
|
// dynamic when we split the block. If we used our optimized stack layout,
|
|
|
|
// then there will only be one alloca and it will come first.
|
|
|
|
for (; IP != BE; ++IP) {
|
|
|
|
AllocaInst *AI = dyn_cast<AllocaInst>(IP);
|
|
|
|
if (!AI || !AI->isStaticAlloca())
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
IRBuilder<> IRB(IP);
|
2013-11-15 15:16:09 +08:00
|
|
|
Type *Int8Ty = IRB.getInt8Ty();
|
|
|
|
GlobalVariable *Guard = new GlobalVariable(
|
2013-11-15 17:52:05 +08:00
|
|
|
*F.getParent(), Int8Ty, false, GlobalValue::PrivateLinkage,
|
2013-11-15 15:16:09 +08:00
|
|
|
Constant::getNullValue(Int8Ty), "__asan_gen_cov_" + F.getName());
|
|
|
|
LoadInst *Load = IRB.CreateLoad(Guard);
|
|
|
|
Load->setAtomic(Monotonic);
|
|
|
|
Load->setAlignment(1);
|
|
|
|
Value *Cmp = IRB.CreateICmpEQ(Constant::getNullValue(Int8Ty), Load);
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
Instruction *Ins = SplitBlockAndInsertIfThen(
|
|
|
|
Cmp, IP, false, MDBuilder(*C).createBranchWeights(1, 100000));
|
2013-11-15 15:16:09 +08:00
|
|
|
IRB.SetInsertPoint(Ins);
|
|
|
|
// We pass &F to __sanitizer_cov. We could avoid this and rely on
|
|
|
|
// GET_CALLER_PC, but having the PC of the first instruction is just nice.
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
Instruction *Call = IRB.CreateCall(AsanCovFunction);
|
|
|
|
Call->setDebugLoc(IP->getDebugLoc());
|
2013-11-15 15:16:09 +08:00
|
|
|
StoreInst *Store = IRB.CreateStore(ConstantInt::get(Int8Ty, 1), Guard);
|
|
|
|
Store->setAtomic(Monotonic);
|
|
|
|
Store->setAlignment(1);
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// Poor man's coverage that works with ASan.
|
|
|
|
// We create a Guard boolean variable with the same linkage
|
|
|
|
// as the function and inject this code into the entry block (-asan-coverage=1)
|
|
|
|
// or all blocks (-asan-coverage=2):
|
|
|
|
// if (*Guard) {
|
|
|
|
// __sanitizer_cov(&F);
|
|
|
|
// *Guard = 1;
|
|
|
|
// }
|
|
|
|
// The accesses to Guard are atomic. The rest of the logic is
|
|
|
|
// in __sanitizer_cov (it's fine to call it more than once).
|
|
|
|
//
|
|
|
|
// This coverage implementation provides very limited data:
|
|
|
|
// it only tells if a given function (block) was ever executed.
|
|
|
|
// No counters, no per-edge data.
|
|
|
|
// But for many use cases this is what we need and the added slowdown
|
|
|
|
// is negligible. This simple implementation will probably be obsoleted
|
|
|
|
// by the upcoming Clang-based coverage implementation.
|
|
|
|
// By having it here and now we hope to
|
|
|
|
// a) get the functionality to users earlier and
|
|
|
|
// b) collect usage statistics to help improve Clang coverage design.
|
|
|
|
bool AddressSanitizer::InjectCoverage(Function &F,
|
|
|
|
const ArrayRef<BasicBlock *> AllBlocks) {
|
|
|
|
if (!ClCoverage) return false;
|
|
|
|
|
|
|
|
if (ClCoverage == 1) {
|
|
|
|
InjectCoverageAtBlock(F, F.getEntryBlock());
|
|
|
|
} else {
|
|
|
|
for (size_t i = 0, n = AllBlocks.size(); i < n; i++)
|
|
|
|
InjectCoverageAtBlock(F, *AllBlocks[i]);
|
|
|
|
}
|
2013-11-15 15:16:09 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-10-15 22:20:06 +08:00
|
|
|
bool AddressSanitizer::runOnFunction(Function &F) {
|
2011-11-16 09:35:23 +08:00
|
|
|
if (BL->isIn(F)) return false;
|
|
|
|
if (&F == AsanCtorFunction) return false;
|
2013-03-18 15:33:49 +08:00
|
|
|
if (F.getLinkage() == GlobalValue::AvailableExternallyLinkage) return false;
|
2012-10-17 21:40:06 +08:00
|
|
|
DEBUG(dbgs() << "ASAN instrumenting:\n" << F << "\n");
|
2012-11-29 17:54:21 +08:00
|
|
|
initializeCallbacks(*F.getParent());
|
2012-01-31 07:50:10 +08:00
|
|
|
|
2013-02-26 14:58:09 +08:00
|
|
|
// If needed, insert __asan_init before checking for SanitizeAddress attr.
|
2012-01-31 07:50:10 +08:00
|
|
|
maybeInsertAsanInitAtFunctionEntry(F);
|
|
|
|
|
2013-06-26 17:18:17 +08:00
|
|
|
if (!F.hasFnAttribute(Attribute::SanitizeAddress))
|
2012-10-09 15:45:08 +08:00
|
|
|
return false;
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
if (!ClDebugFunc.empty() && ClDebugFunc != F.getName())
|
|
|
|
return false;
|
2012-10-09 15:45:08 +08:00
|
|
|
|
|
|
|
// We want to instrument every address only once per basic block (unless there
|
|
|
|
// are calls between uses).
|
2011-11-16 09:35:23 +08:00
|
|
|
SmallSet<Value*, 16> TempsToInstrument;
|
|
|
|
SmallVector<Instruction*, 16> ToInstrument;
|
2012-02-09 05:36:17 +08:00
|
|
|
SmallVector<Instruction*, 8> NoReturnCalls;
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
SmallVector<BasicBlock*, 16> AllBlocks;
|
2013-06-26 17:18:17 +08:00
|
|
|
int NumAllocas = 0;
|
2012-05-30 17:04:06 +08:00
|
|
|
bool IsWrite;
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
// Fill the set of memory operations to instrument.
|
|
|
|
for (Function::iterator FI = F.begin(), FE = F.end();
|
|
|
|
FI != FE; ++FI) {
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
AllBlocks.push_back(FI);
|
2011-11-16 09:35:23 +08:00
|
|
|
TempsToInstrument.clear();
|
2012-06-28 17:34:41 +08:00
|
|
|
int NumInsnsPerBB = 0;
|
2011-11-16 09:35:23 +08:00
|
|
|
for (BasicBlock::iterator BI = FI->begin(), BE = FI->end();
|
|
|
|
BI != BE; ++BI) {
|
2012-01-12 02:15:23 +08:00
|
|
|
if (LooksLikeCodeInBug11395(BI)) return false;
|
2012-05-30 17:04:06 +08:00
|
|
|
if (Value *Addr = isInterestingMemoryAccess(BI, &IsWrite)) {
|
2011-11-16 09:35:23 +08:00
|
|
|
if (ClOpt && ClOptSameTemp) {
|
|
|
|
if (!TempsToInstrument.insert(Addr))
|
|
|
|
continue; // We've seen this temp in the current BB.
|
|
|
|
}
|
|
|
|
} else if (isa<MemIntrinsic>(BI) && ClMemIntrin) {
|
|
|
|
// ok, take it.
|
|
|
|
} else {
|
2013-06-26 17:18:17 +08:00
|
|
|
if (isa<AllocaInst>(BI))
|
|
|
|
NumAllocas++;
|
2013-02-20 20:35:15 +08:00
|
|
|
CallSite CS(BI);
|
|
|
|
if (CS) {
|
2011-11-16 09:35:23 +08:00
|
|
|
// A call inside BB.
|
|
|
|
TempsToInstrument.clear();
|
2013-02-20 20:35:15 +08:00
|
|
|
if (CS.doesNotReturn())
|
|
|
|
NoReturnCalls.push_back(CS.getInstruction());
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
ToInstrument.push_back(BI);
|
2012-06-28 17:34:41 +08:00
|
|
|
NumInsnsPerBB++;
|
|
|
|
if (NumInsnsPerBB >= ClMaxInsnsToInstrumentPerBB)
|
|
|
|
break;
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-26 17:18:17 +08:00
|
|
|
Function *UninstrumentedDuplicate = 0;
|
|
|
|
bool LikelyToInstrument =
|
|
|
|
!NoReturnCalls.empty() || !ToInstrument.empty() || (NumAllocas > 0);
|
|
|
|
if (ClKeepUninstrumented && LikelyToInstrument) {
|
|
|
|
ValueToValueMapTy VMap;
|
|
|
|
UninstrumentedDuplicate = CloneFunction(&F, VMap, false);
|
|
|
|
UninstrumentedDuplicate->removeFnAttr(Attribute::SanitizeAddress);
|
|
|
|
UninstrumentedDuplicate->setName("NOASAN_" + F.getName());
|
|
|
|
F.getParent()->getFunctionList().push_back(UninstrumentedDuplicate);
|
|
|
|
}
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
// Instrument.
|
|
|
|
int NumInstrumented = 0;
|
|
|
|
for (size_t i = 0, n = ToInstrument.size(); i != n; i++) {
|
|
|
|
Instruction *Inst = ToInstrument[i];
|
|
|
|
if (ClDebugMin < 0 || ClDebugMax < 0 ||
|
|
|
|
(NumInstrumented >= ClDebugMin && NumInstrumented <= ClDebugMax)) {
|
2012-05-30 17:04:06 +08:00
|
|
|
if (isInterestingMemoryAccess(Inst, &IsWrite))
|
2012-10-15 22:20:06 +08:00
|
|
|
instrumentMop(Inst);
|
2011-11-16 09:35:23 +08:00
|
|
|
else
|
2012-10-15 22:20:06 +08:00
|
|
|
instrumentMemIntrinsic(cast<MemIntrinsic>(Inst));
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
NumInstrumented++;
|
|
|
|
}
|
|
|
|
|
2012-12-25 20:04:36 +08:00
|
|
|
FunctionStackPoisoner FSP(F, *this);
|
|
|
|
bool ChangedStack = FSP.runOnFunction();
|
2012-02-09 05:36:17 +08:00
|
|
|
|
|
|
|
// We must unpoison the stack before every NoReturn call (throw, _exit, etc).
|
|
|
|
// See e.g. http://code.google.com/p/address-sanitizer/issues/detail?id=37
|
|
|
|
for (size_t i = 0, n = NoReturnCalls.size(); i != n; i++) {
|
|
|
|
Instruction *CI = NoReturnCalls[i];
|
|
|
|
IRBuilder<> IRB(CI);
|
2012-10-15 22:20:06 +08:00
|
|
|
IRB.CreateCall(AsanHandleNoReturnFunc);
|
2012-02-09 05:36:17 +08:00
|
|
|
}
|
|
|
|
|
2013-06-26 17:18:17 +08:00
|
|
|
bool res = NumInstrumented > 0 || ChangedStack || !NoReturnCalls.empty();
|
2013-11-15 15:16:09 +08:00
|
|
|
|
[asan] extend asan-coverage (still experimental).
- add a mode for collecting per-block coverage (-asan-coverage=2).
So far the implementation is naive (all blocks are instrumented),
the performance overhead on top of asan could be as high as 30%.
- Make sure the one-time calls to __sanitizer_cov are moved to function buttom,
which in turn required to copy the original debug info into the call insn.
Here is the performance data on SPEC 2006
(train data, comparing asan with asan-coverage={0,1,2}):
asan+cov0 asan+cov1 diff 0-1 asan+cov2 diff 0-2 diff 1-2
400.perlbench, 65.60, 65.80, 1.00, 76.20, 1.16, 1.16
401.bzip2, 65.10, 65.50, 1.01, 75.90, 1.17, 1.16
403.gcc, 1.64, 1.69, 1.03, 2.04, 1.24, 1.21
429.mcf, 21.90, 22.60, 1.03, 23.20, 1.06, 1.03
445.gobmk, 166.00, 169.00, 1.02, 205.00, 1.23, 1.21
456.hmmer, 88.30, 87.90, 1.00, 91.00, 1.03, 1.04
458.sjeng, 210.00, 222.00, 1.06, 258.00, 1.23, 1.16
462.libquantum, 1.73, 1.75, 1.01, 2.11, 1.22, 1.21
464.h264ref, 147.00, 152.00, 1.03, 160.00, 1.09, 1.05
471.omnetpp, 115.00, 116.00, 1.01, 140.00, 1.22, 1.21
473.astar, 133.00, 131.00, 0.98, 142.00, 1.07, 1.08
483.xalancbmk, 118.00, 120.00, 1.02, 154.00, 1.31, 1.28
433.milc, 19.80, 20.00, 1.01, 20.10, 1.02, 1.01
444.namd, 16.20, 16.20, 1.00, 17.60, 1.09, 1.09
447.dealII, 41.80, 42.20, 1.01, 43.50, 1.04, 1.03
450.soplex, 7.51, 7.82, 1.04, 8.25, 1.10, 1.05
453.povray, 14.00, 14.40, 1.03, 15.80, 1.13, 1.10
470.lbm, 33.30, 34.10, 1.02, 34.10, 1.02, 1.00
482.sphinx3, 12.40, 12.30, 0.99, 13.00, 1.05, 1.06
llvm-svn: 199488
2014-01-17 19:00:30 +08:00
|
|
|
if (InjectCoverage(F, AllBlocks))
|
2013-11-15 15:16:09 +08:00
|
|
|
res = true;
|
|
|
|
|
2013-06-26 17:18:17 +08:00
|
|
|
DEBUG(dbgs() << "ASAN done instrumenting: " << res << " " << F << "\n");
|
|
|
|
|
|
|
|
if (ClKeepUninstrumented) {
|
|
|
|
if (!res) {
|
|
|
|
// No instrumentation is done, no need for the duplicate.
|
|
|
|
if (UninstrumentedDuplicate)
|
|
|
|
UninstrumentedDuplicate->eraseFromParent();
|
|
|
|
} else {
|
|
|
|
// The function was instrumented. We must have the duplicate.
|
|
|
|
assert(UninstrumentedDuplicate);
|
|
|
|
UninstrumentedDuplicate->setSection("NOASAN");
|
|
|
|
assert(!F.hasSection());
|
|
|
|
F.setSection("ASAN");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-12-25 20:04:36 +08:00
|
|
|
// Workaround for bug 11395: we don't want to instrument stack in functions
|
|
|
|
// with large assembly blobs (32-bit only), otherwise reg alloc may crash.
|
|
|
|
// FIXME: remove once the bug 11395 is fixed.
|
|
|
|
bool AddressSanitizer::LooksLikeCodeInBug11395(Instruction *I) {
|
|
|
|
if (LongSize != 32) return false;
|
|
|
|
CallInst *CI = dyn_cast<CallInst>(I);
|
|
|
|
if (!CI || !CI->isInlineAsm()) return false;
|
|
|
|
if (CI->getNumArgOperands() <= 5) return false;
|
|
|
|
// We have inline assembly with quite a few arguments.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void FunctionStackPoisoner::initializeCallbacks(Module &M) {
|
|
|
|
IRBuilder<> IRB(*C);
|
2013-09-10 21:16:56 +08:00
|
|
|
for (int i = 0; i <= kMaxAsanStackMallocSizeClass; i++) {
|
|
|
|
std::string Suffix = itostr(i);
|
|
|
|
AsanStackMallocFunc[i] = checkInterfaceFunction(
|
|
|
|
M.getOrInsertFunction(kAsanStackMallocNameTemplate + Suffix, IntptrTy,
|
|
|
|
IntptrTy, IntptrTy, NULL));
|
|
|
|
AsanStackFreeFunc[i] = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanStackFreeNameTemplate + Suffix, IRB.getVoidTy(), IntptrTy,
|
|
|
|
IntptrTy, IntptrTy, NULL));
|
|
|
|
}
|
2012-12-25 20:04:36 +08:00
|
|
|
AsanPoisonStackMemoryFunc = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanPoisonStackMemoryName, IRB.getVoidTy(), IntptrTy, IntptrTy, NULL));
|
|
|
|
AsanUnpoisonStackMemoryFunc = checkInterfaceFunction(M.getOrInsertFunction(
|
|
|
|
kAsanUnpoisonStackMemoryName, IRB.getVoidTy(), IntptrTy, IntptrTy, NULL));
|
|
|
|
}
|
|
|
|
|
2013-12-06 17:00:17 +08:00
|
|
|
void
|
|
|
|
FunctionStackPoisoner::poisonRedZones(const ArrayRef<uint8_t> ShadowBytes,
|
|
|
|
IRBuilder<> &IRB, Value *ShadowBase,
|
|
|
|
bool DoPoison) {
|
|
|
|
size_t n = ShadowBytes.size();
|
2013-12-23 17:24:36 +08:00
|
|
|
size_t i = 0;
|
|
|
|
// We need to (un)poison n bytes of stack shadow. Poison as many as we can
|
|
|
|
// using 64-bit stores (if we are on 64-bit arch), then poison the rest
|
|
|
|
// with 32-bit stores, then with 16-byte stores, then with 8-byte stores.
|
|
|
|
for (size_t LargeStoreSizeInBytes = ASan.LongSize / 8;
|
|
|
|
LargeStoreSizeInBytes != 0; LargeStoreSizeInBytes /= 2) {
|
|
|
|
for (; i + LargeStoreSizeInBytes - 1 < n; i += LargeStoreSizeInBytes) {
|
|
|
|
uint64_t Val = 0;
|
|
|
|
for (size_t j = 0; j < LargeStoreSizeInBytes; j++) {
|
2014-02-21 08:06:31 +08:00
|
|
|
if (ASan.DL->isLittleEndian())
|
2013-12-23 17:24:36 +08:00
|
|
|
Val |= (uint64_t)ShadowBytes[i + j] << (8 * j);
|
|
|
|
else
|
|
|
|
Val = (Val << 8) | ShadowBytes[i + j];
|
|
|
|
}
|
|
|
|
if (!Val) continue;
|
|
|
|
Value *Ptr = IRB.CreateAdd(ShadowBase, ConstantInt::get(IntptrTy, i));
|
|
|
|
Type *StoreTy = Type::getIntNTy(*C, LargeStoreSizeInBytes * 8);
|
|
|
|
Value *Poison = ConstantInt::get(StoreTy, DoPoison ? Val : 0);
|
|
|
|
IRB.CreateStore(Poison, IRB.CreateIntToPtr(Ptr, StoreTy->getPointerTo()));
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-09-10 21:16:56 +08:00
|
|
|
// Fake stack allocator (asan_fake_stack.h) has 11 size classes
|
|
|
|
// for every power of 2 from kMinStackMallocSize to kMaxAsanStackMallocSizeClass
|
|
|
|
static int StackMallocSizeClass(uint64_t LocalStackSize) {
|
|
|
|
assert(LocalStackSize <= kMaxStackMallocSize);
|
|
|
|
uint64_t MaxSize = kMinStackMallocSize;
|
|
|
|
for (int i = 0; ; i++, MaxSize *= 2)
|
|
|
|
if (LocalStackSize <= MaxSize)
|
|
|
|
return i;
|
|
|
|
llvm_unreachable("impossible LocalStackSize");
|
|
|
|
}
|
|
|
|
|
2013-09-17 20:14:50 +08:00
|
|
|
// Set Size bytes starting from ShadowBase to kAsanStackAfterReturnMagic.
|
|
|
|
// We can not use MemSet intrinsic because it may end up calling the actual
|
|
|
|
// memset. Size is a multiple of 8.
|
|
|
|
// Currently this generates 8-byte stores on x86_64; it may be better to
|
|
|
|
// generate wider stores.
|
|
|
|
void FunctionStackPoisoner::SetShadowToStackAfterReturnInlined(
|
|
|
|
IRBuilder<> &IRB, Value *ShadowBase, int Size) {
|
|
|
|
assert(!(Size % 8));
|
|
|
|
assert(kAsanStackAfterReturnMagic == 0xf5);
|
|
|
|
for (int i = 0; i < Size; i += 8) {
|
|
|
|
Value *p = IRB.CreateAdd(ShadowBase, ConstantInt::get(IntptrTy, i));
|
|
|
|
IRB.CreateStore(ConstantInt::get(IRB.getInt64Ty(), 0xf5f5f5f5f5f5f5f5ULL),
|
|
|
|
IRB.CreateIntToPtr(p, IRB.getInt64Ty()->getPointerTo()));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-25 20:04:36 +08:00
|
|
|
void FunctionStackPoisoner::poisonStack() {
|
2013-09-10 21:16:56 +08:00
|
|
|
int StackMallocIdx = -1;
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2012-12-27 16:50:58 +08:00
|
|
|
assert(AllocaVec.size() > 0);
|
2011-11-16 09:35:23 +08:00
|
|
|
Instruction *InsBefore = AllocaVec[0];
|
|
|
|
IRBuilder<> IRB(InsBefore);
|
|
|
|
|
2013-12-06 17:00:17 +08:00
|
|
|
SmallVector<ASanStackVariableDescription, 16> SVD;
|
|
|
|
SVD.reserve(AllocaVec.size());
|
|
|
|
for (size_t i = 0, n = AllocaVec.size(); i < n; i++) {
|
|
|
|
AllocaInst *AI = AllocaVec[i];
|
|
|
|
ASanStackVariableDescription D = { AI->getName().data(),
|
|
|
|
getAllocaSizeInBytes(AI),
|
|
|
|
AI->getAlignment(), AI, 0};
|
|
|
|
SVD.push_back(D);
|
|
|
|
}
|
|
|
|
// Minimal header size (left redzone) is 4 pointers,
|
|
|
|
// i.e. 32 bytes on 64-bit platforms and 16 bytes in 32-bit platforms.
|
|
|
|
size_t MinHeaderSize = ASan.LongSize / 2;
|
|
|
|
ASanStackFrameLayout L;
|
|
|
|
ComputeASanStackFrameLayout(SVD, 1UL << Mapping.Scale, MinHeaderSize, &L);
|
|
|
|
DEBUG(dbgs() << L.DescriptionString << " --- " << L.FrameSize << "\n");
|
|
|
|
uint64_t LocalStackSize = L.FrameSize;
|
|
|
|
bool DoStackMalloc =
|
|
|
|
ASan.CheckUseAfterReturn && LocalStackSize <= kMaxStackMallocSize;
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
Type *ByteArrayTy = ArrayType::get(IRB.getInt8Ty(), LocalStackSize);
|
|
|
|
AllocaInst *MyAlloca =
|
|
|
|
new AllocaInst(ByteArrayTy, "MyAlloca", InsBefore);
|
2013-12-06 17:00:17 +08:00
|
|
|
assert((ClRealignStack & (ClRealignStack - 1)) == 0);
|
|
|
|
size_t FrameAlignment = std::max(L.FrameAlignment, (size_t)ClRealignStack);
|
|
|
|
MyAlloca->setAlignment(FrameAlignment);
|
2011-11-16 09:35:23 +08:00
|
|
|
assert(MyAlloca->isStaticAlloca());
|
|
|
|
Value *OrigStackBase = IRB.CreatePointerCast(MyAlloca, IntptrTy);
|
|
|
|
Value *LocalStackBase = OrigStackBase;
|
|
|
|
|
|
|
|
if (DoStackMalloc) {
|
2013-09-18 22:07:14 +08:00
|
|
|
// LocalStackBase = OrigStackBase
|
|
|
|
// if (__asan_option_detect_stack_use_after_return)
|
|
|
|
// LocalStackBase = __asan_stack_malloc_N(LocalStackBase, OrigStackBase);
|
2013-09-10 21:16:56 +08:00
|
|
|
StackMallocIdx = StackMallocSizeClass(LocalStackSize);
|
|
|
|
assert(StackMallocIdx <= kMaxAsanStackMallocSizeClass);
|
2013-09-18 22:07:14 +08:00
|
|
|
Constant *OptionDetectUAR = F.getParent()->getOrInsertGlobal(
|
|
|
|
kAsanOptionDetectUAR, IRB.getInt32Ty());
|
|
|
|
Value *Cmp = IRB.CreateICmpNE(IRB.CreateLoad(OptionDetectUAR),
|
|
|
|
Constant::getNullValue(IRB.getInt32Ty()));
|
2013-12-19 21:29:56 +08:00
|
|
|
Instruction *Term = SplitBlockAndInsertIfThen(Cmp, InsBefore, false);
|
2013-09-18 22:07:14 +08:00
|
|
|
BasicBlock *CmpBlock = cast<Instruction>(Cmp)->getParent();
|
|
|
|
IRBuilder<> IRBIf(Term);
|
|
|
|
LocalStackBase = IRBIf.CreateCall2(
|
|
|
|
AsanStackMallocFunc[StackMallocIdx],
|
2011-11-16 09:35:23 +08:00
|
|
|
ConstantInt::get(IntptrTy, LocalStackSize), OrigStackBase);
|
2013-09-18 22:07:14 +08:00
|
|
|
BasicBlock *SetBlock = cast<Instruction>(LocalStackBase)->getParent();
|
|
|
|
IRB.SetInsertPoint(InsBefore);
|
|
|
|
PHINode *Phi = IRB.CreatePHI(IntptrTy, 2);
|
|
|
|
Phi->addIncoming(OrigStackBase, CmpBlock);
|
|
|
|
Phi->addIncoming(LocalStackBase, SetBlock);
|
|
|
|
LocalStackBase = Phi;
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
2012-12-27 16:50:58 +08:00
|
|
|
// Insert poison calls for lifetime intrinsics for alloca.
|
|
|
|
bool HavePoisonedAllocas = false;
|
|
|
|
for (size_t i = 0, n = AllocaPoisonCallVec.size(); i < n; i++) {
|
|
|
|
const AllocaPoisonCall &APC = AllocaPoisonCallVec[i];
|
2013-11-18 22:53:55 +08:00
|
|
|
assert(APC.InsBefore);
|
|
|
|
assert(APC.AI);
|
|
|
|
IRBuilder<> IRB(APC.InsBefore);
|
|
|
|
poisonAlloca(APC.AI, APC.Size, IRB, APC.DoPoison);
|
2012-12-27 16:50:58 +08:00
|
|
|
HavePoisonedAllocas |= APC.DoPoison;
|
|
|
|
}
|
|
|
|
|
2011-11-16 09:35:23 +08:00
|
|
|
// Replace Alloca instructions with base+offset.
|
2013-12-06 17:00:17 +08:00
|
|
|
for (size_t i = 0, n = SVD.size(); i < n; i++) {
|
|
|
|
AllocaInst *AI = SVD[i].AI;
|
2012-12-04 09:34:23 +08:00
|
|
|
Value *NewAllocaPtr = IRB.CreateIntToPtr(
|
2013-12-06 17:00:17 +08:00
|
|
|
IRB.CreateAdd(LocalStackBase,
|
|
|
|
ConstantInt::get(IntptrTy, SVD[i].Offset)),
|
|
|
|
AI->getType());
|
2012-12-12 22:31:53 +08:00
|
|
|
replaceDbgDeclareForAlloca(AI, NewAllocaPtr, DIB);
|
2012-12-04 09:34:23 +08:00
|
|
|
AI->replaceAllUsesWith(NewAllocaPtr);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
|
[asan] Change the way we report the alloca frame on stack-buff-overflow.
Before: the function name was stored by the compiler as a constant string
and the run-time was printing it.
Now: the PC is stored instead and the run-time prints the full symbolized frame.
This adds a couple of instructions into every function with non-empty stack frame,
but also reduces the binary size because we store less strings (I saw 2% size reduction).
This change bumps the asan ABI version to v3.
llvm part.
Example of report (now):
==31711==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffa77cf1c5 at pc 0x41feb0 bp 0x7fffa77cefb0 sp 0x7fffa77cefa8
READ of size 1 at 0x7fffa77cf1c5 thread T0
#0 0x41feaf in Frame0(int, char*, char*, char*) stack-oob-frames.cc:20
#1 0x41f7ff in Frame1(int, char*, char*) stack-oob-frames.cc:24
#2 0x41f477 in Frame2(int, char*) stack-oob-frames.cc:28
#3 0x41f194 in Frame3(int) stack-oob-frames.cc:32
#4 0x41eee0 in main stack-oob-frames.cc:38
#5 0x7f0c5566f76c (/lib/x86_64-linux-gnu/libc.so.6+0x2176c)
#6 0x41eb1c (/usr/local/google/kcc/llvm_cmake/a.out+0x41eb1c)
Address 0x7fffa77cf1c5 is located in stack of thread T0 at offset 293 in frame
#0 0x41f87f in Frame0(int, char*, char*, char*) stack-oob-frames.cc:12 <<<<<<<<<<<<<< this is new
This frame has 6 object(s):
[32, 36) 'frame.addr'
[96, 104) 'a.addr'
[160, 168) 'b.addr'
[224, 232) 'c.addr'
[288, 292) 's'
[352, 360) 'd'
llvm-svn: 177724
2013-03-22 18:37:20 +08:00
|
|
|
// The left-most redzone has enough space for at least 4 pointers.
|
|
|
|
// Write the Magic value to redzone[0].
|
2011-11-16 09:35:23 +08:00
|
|
|
Value *BasePlus0 = IRB.CreateIntToPtr(LocalStackBase, IntptrPtrTy);
|
|
|
|
IRB.CreateStore(ConstantInt::get(IntptrTy, kCurrentStackFrameMagic),
|
|
|
|
BasePlus0);
|
[asan] Change the way we report the alloca frame on stack-buff-overflow.
Before: the function name was stored by the compiler as a constant string
and the run-time was printing it.
Now: the PC is stored instead and the run-time prints the full symbolized frame.
This adds a couple of instructions into every function with non-empty stack frame,
but also reduces the binary size because we store less strings (I saw 2% size reduction).
This change bumps the asan ABI version to v3.
llvm part.
Example of report (now):
==31711==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffa77cf1c5 at pc 0x41feb0 bp 0x7fffa77cefb0 sp 0x7fffa77cefa8
READ of size 1 at 0x7fffa77cf1c5 thread T0
#0 0x41feaf in Frame0(int, char*, char*, char*) stack-oob-frames.cc:20
#1 0x41f7ff in Frame1(int, char*, char*) stack-oob-frames.cc:24
#2 0x41f477 in Frame2(int, char*) stack-oob-frames.cc:28
#3 0x41f194 in Frame3(int) stack-oob-frames.cc:32
#4 0x41eee0 in main stack-oob-frames.cc:38
#5 0x7f0c5566f76c (/lib/x86_64-linux-gnu/libc.so.6+0x2176c)
#6 0x41eb1c (/usr/local/google/kcc/llvm_cmake/a.out+0x41eb1c)
Address 0x7fffa77cf1c5 is located in stack of thread T0 at offset 293 in frame
#0 0x41f87f in Frame0(int, char*, char*, char*) stack-oob-frames.cc:12 <<<<<<<<<<<<<< this is new
This frame has 6 object(s):
[32, 36) 'frame.addr'
[96, 104) 'a.addr'
[160, 168) 'b.addr'
[224, 232) 'c.addr'
[288, 292) 's'
[352, 360) 'd'
llvm-svn: 177724
2013-03-22 18:37:20 +08:00
|
|
|
// Write the frame description constant to redzone[1].
|
|
|
|
Value *BasePlus1 = IRB.CreateIntToPtr(
|
|
|
|
IRB.CreateAdd(LocalStackBase, ConstantInt::get(IntptrTy, ASan.LongSize/8)),
|
|
|
|
IntptrPtrTy);
|
2012-11-02 20:20:34 +08:00
|
|
|
GlobalVariable *StackDescriptionGlobal =
|
2013-12-25 22:22:15 +08:00
|
|
|
createPrivateGlobalForString(*F.getParent(), L.DescriptionString,
|
|
|
|
/*AllowMerging*/true);
|
2012-12-25 20:04:36 +08:00
|
|
|
Value *Description = IRB.CreatePointerCast(StackDescriptionGlobal,
|
|
|
|
IntptrTy);
|
2011-11-16 09:35:23 +08:00
|
|
|
IRB.CreateStore(Description, BasePlus1);
|
[asan] Change the way we report the alloca frame on stack-buff-overflow.
Before: the function name was stored by the compiler as a constant string
and the run-time was printing it.
Now: the PC is stored instead and the run-time prints the full symbolized frame.
This adds a couple of instructions into every function with non-empty stack frame,
but also reduces the binary size because we store less strings (I saw 2% size reduction).
This change bumps the asan ABI version to v3.
llvm part.
Example of report (now):
==31711==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffa77cf1c5 at pc 0x41feb0 bp 0x7fffa77cefb0 sp 0x7fffa77cefa8
READ of size 1 at 0x7fffa77cf1c5 thread T0
#0 0x41feaf in Frame0(int, char*, char*, char*) stack-oob-frames.cc:20
#1 0x41f7ff in Frame1(int, char*, char*) stack-oob-frames.cc:24
#2 0x41f477 in Frame2(int, char*) stack-oob-frames.cc:28
#3 0x41f194 in Frame3(int) stack-oob-frames.cc:32
#4 0x41eee0 in main stack-oob-frames.cc:38
#5 0x7f0c5566f76c (/lib/x86_64-linux-gnu/libc.so.6+0x2176c)
#6 0x41eb1c (/usr/local/google/kcc/llvm_cmake/a.out+0x41eb1c)
Address 0x7fffa77cf1c5 is located in stack of thread T0 at offset 293 in frame
#0 0x41f87f in Frame0(int, char*, char*, char*) stack-oob-frames.cc:12 <<<<<<<<<<<<<< this is new
This frame has 6 object(s):
[32, 36) 'frame.addr'
[96, 104) 'a.addr'
[160, 168) 'b.addr'
[224, 232) 'c.addr'
[288, 292) 's'
[352, 360) 'd'
llvm-svn: 177724
2013-03-22 18:37:20 +08:00
|
|
|
// Write the PC to redzone[2].
|
|
|
|
Value *BasePlus2 = IRB.CreateIntToPtr(
|
|
|
|
IRB.CreateAdd(LocalStackBase, ConstantInt::get(IntptrTy,
|
|
|
|
2 * ASan.LongSize/8)),
|
|
|
|
IntptrPtrTy);
|
|
|
|
IRB.CreateStore(IRB.CreatePointerCast(&F, IntptrTy), BasePlus2);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
|
|
|
// Poison the stack redzones at the entry.
|
2012-12-25 20:04:36 +08:00
|
|
|
Value *ShadowBase = ASan.memToShadow(LocalStackBase, IRB);
|
2013-12-06 17:00:17 +08:00
|
|
|
poisonRedZones(L.ShadowBytes, IRB, ShadowBase, true);
|
2011-11-16 09:35:23 +08:00
|
|
|
|
2013-12-23 22:15:08 +08:00
|
|
|
// (Un)poison the stack before all ret instructions.
|
2011-11-16 09:35:23 +08:00
|
|
|
for (size_t i = 0, n = RetVec.size(); i < n; i++) {
|
|
|
|
Instruction *Ret = RetVec[i];
|
|
|
|
IRBuilder<> IRBRet(Ret);
|
|
|
|
// Mark the current frame as retired.
|
|
|
|
IRBRet.CreateStore(ConstantInt::get(IntptrTy, kRetiredStackFrameMagic),
|
|
|
|
BasePlus0);
|
|
|
|
if (DoStackMalloc) {
|
2013-09-10 21:16:56 +08:00
|
|
|
assert(StackMallocIdx >= 0);
|
2013-12-23 22:15:08 +08:00
|
|
|
// if LocalStackBase != OrigStackBase:
|
|
|
|
// // In use-after-return mode, poison the whole stack frame.
|
|
|
|
// if StackMallocIdx <= 4
|
|
|
|
// // For small sizes inline the whole thing:
|
|
|
|
// memset(ShadowBase, kAsanStackAfterReturnMagic, ShadowSize);
|
|
|
|
// **SavedFlagPtr(LocalStackBase) = 0
|
|
|
|
// else
|
|
|
|
// __asan_stack_free_N(LocalStackBase, OrigStackBase)
|
|
|
|
// else
|
|
|
|
// <This is not a fake stack; unpoison the redzones>
|
|
|
|
Value *Cmp = IRBRet.CreateICmpNE(LocalStackBase, OrigStackBase);
|
|
|
|
TerminatorInst *ThenTerm, *ElseTerm;
|
|
|
|
SplitBlockAndInsertIfThenElse(Cmp, Ret, &ThenTerm, &ElseTerm);
|
|
|
|
|
|
|
|
IRBuilder<> IRBPoison(ThenTerm);
|
2013-09-17 20:14:50 +08:00
|
|
|
if (StackMallocIdx <= 4) {
|
|
|
|
int ClassSize = kMinStackMallocSize << StackMallocIdx;
|
|
|
|
SetShadowToStackAfterReturnInlined(IRBPoison, ShadowBase,
|
|
|
|
ClassSize >> Mapping.Scale);
|
|
|
|
Value *SavedFlagPtrPtr = IRBPoison.CreateAdd(
|
|
|
|
LocalStackBase,
|
|
|
|
ConstantInt::get(IntptrTy, ClassSize - ASan.LongSize / 8));
|
|
|
|
Value *SavedFlagPtr = IRBPoison.CreateLoad(
|
|
|
|
IRBPoison.CreateIntToPtr(SavedFlagPtrPtr, IntptrPtrTy));
|
|
|
|
IRBPoison.CreateStore(
|
|
|
|
Constant::getNullValue(IRBPoison.getInt8Ty()),
|
|
|
|
IRBPoison.CreateIntToPtr(SavedFlagPtr, IRBPoison.getInt8PtrTy()));
|
|
|
|
} else {
|
|
|
|
// For larger frames call __asan_stack_free_*.
|
2013-12-23 22:15:08 +08:00
|
|
|
IRBPoison.CreateCall3(AsanStackFreeFunc[StackMallocIdx], LocalStackBase,
|
|
|
|
ConstantInt::get(IntptrTy, LocalStackSize),
|
|
|
|
OrigStackBase);
|
2013-09-17 20:14:50 +08:00
|
|
|
}
|
2013-12-23 22:15:08 +08:00
|
|
|
|
|
|
|
IRBuilder<> IRBElse(ElseTerm);
|
|
|
|
poisonRedZones(L.ShadowBytes, IRBElse, ShadowBase, false);
|
2012-12-04 09:34:23 +08:00
|
|
|
} else if (HavePoisonedAllocas) {
|
|
|
|
// If we poisoned some allocas in llvm.lifetime analysis,
|
|
|
|
// unpoison whole stack frame now.
|
|
|
|
assert(LocalStackBase == OrigStackBase);
|
|
|
|
poisonAlloca(LocalStackBase, LocalStackSize, IRBRet, false);
|
2013-12-23 22:15:08 +08:00
|
|
|
} else {
|
|
|
|
poisonRedZones(L.ShadowBytes, IRBRet, ShadowBase, false);
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-19 14:20:53 +08:00
|
|
|
// We are done. Remove the old unused alloca instructions.
|
|
|
|
for (size_t i = 0, n = AllocaVec.size(); i < n; i++)
|
|
|
|
AllocaVec[i]->eraseFromParent();
|
2011-11-16 09:35:23 +08:00
|
|
|
}
|
2012-12-04 09:34:23 +08:00
|
|
|
|
2012-12-25 20:04:36 +08:00
|
|
|
void FunctionStackPoisoner::poisonAlloca(Value *V, uint64_t Size,
|
2013-08-10 04:53:48 +08:00
|
|
|
IRBuilder<> &IRB, bool DoPoison) {
|
2012-12-04 09:34:23 +08:00
|
|
|
// For now just insert the call to ASan runtime.
|
|
|
|
Value *AddrArg = IRB.CreatePointerCast(V, IntptrTy);
|
|
|
|
Value *SizeArg = ConstantInt::get(IntptrTy, Size);
|
|
|
|
IRB.CreateCall2(DoPoison ? AsanPoisonStackMemoryFunc
|
|
|
|
: AsanUnpoisonStackMemoryFunc,
|
|
|
|
AddrArg, SizeArg);
|
|
|
|
}
|
2012-12-25 20:04:36 +08:00
|
|
|
|
|
|
|
// Handling llvm.lifetime intrinsics for a given %alloca:
|
|
|
|
// (1) collect all llvm.lifetime.xxx(%size, %value) describing the alloca.
|
|
|
|
// (2) if %size is constant, poison memory for llvm.lifetime.end (to detect
|
|
|
|
// invalid accesses) and unpoison it for llvm.lifetime.start (the memory
|
|
|
|
// could be poisoned by previous llvm.lifetime.end instruction, as the
|
|
|
|
// variable may go in and out of scope several times, e.g. in loops).
|
|
|
|
// (3) if we poisoned at least one %alloca in a function,
|
|
|
|
// unpoison the whole stack frame at function exit.
|
|
|
|
|
2012-12-27 16:50:58 +08:00
|
|
|
AllocaInst *FunctionStackPoisoner::findAllocaForValue(Value *V) {
|
|
|
|
if (AllocaInst *AI = dyn_cast<AllocaInst>(V))
|
|
|
|
// We're intested only in allocas we can handle.
|
|
|
|
return isInterestingAlloca(*AI) ? AI : 0;
|
|
|
|
// See if we've already calculated (or started to calculate) alloca for a
|
|
|
|
// given value.
|
|
|
|
AllocaForValueMapTy::iterator I = AllocaForValue.find(V);
|
|
|
|
if (I != AllocaForValue.end())
|
|
|
|
return I->second;
|
|
|
|
// Store 0 while we're calculating alloca for value V to avoid
|
|
|
|
// infinite recursion if the value references itself.
|
|
|
|
AllocaForValue[V] = 0;
|
|
|
|
AllocaInst *Res = 0;
|
|
|
|
if (CastInst *CI = dyn_cast<CastInst>(V))
|
|
|
|
Res = findAllocaForValue(CI->getOperand(0));
|
|
|
|
else if (PHINode *PN = dyn_cast<PHINode>(V)) {
|
|
|
|
for (unsigned i = 0, e = PN->getNumIncomingValues(); i != e; ++i) {
|
|
|
|
Value *IncValue = PN->getIncomingValue(i);
|
|
|
|
// Allow self-referencing phi-nodes.
|
|
|
|
if (IncValue == PN) continue;
|
|
|
|
AllocaInst *IncValueAI = findAllocaForValue(IncValue);
|
|
|
|
// AI for incoming values should exist and should all be equal.
|
|
|
|
if (IncValueAI == 0 || (Res != 0 && IncValueAI != Res))
|
|
|
|
return 0;
|
|
|
|
Res = IncValueAI;
|
2012-12-25 20:04:36 +08:00
|
|
|
}
|
|
|
|
}
|
2012-12-27 16:50:58 +08:00
|
|
|
if (Res != 0)
|
|
|
|
AllocaForValue[V] = Res;
|
2012-12-25 20:04:36 +08:00
|
|
|
return Res;
|
|
|
|
}
|