forked from OSchip/llvm-project
58ee3b786d
Summary: On windows, memmove and memcpy may be the same functions (on 64-bits). ``` -- f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm -------------------- OPTION PROLOGUE:NONE, EPILOGUE:NONE memmove = memcpy mov r11, rcx ; save destination address ``` This is causing ASAN to report overlaping parameters when instrumenting chromium. ``` D:\src\chromium\src>out\asan64\chrome.exe --no-sandbox [8956:6208:1121/162511:ERROR:entry.cc(167)] Entry::Deserialize: dictionary has no interface_provider_specs key [8956:11560:1121/162511:ERROR:external_registry_loader_win.cc(130)] Missing value path for key Software\Google\Chrome\Ex tensions\doeiiacdhfmpdeckdaifnjaemmkkdlkf. ================================================================= ==5132==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x000000237ee8,0x000000237eea) and [0x000000237ee9 , 0x000000237eeb) overlap ``` The error triggered on chromium: ``` Child-SP RetAddr Call Site 00000000`00166520 00000001`400a4886 chrome!__asan::ReportStringFunctionMemoryRangesOverlap+0x23 [d:\src\llvm\llvm\projects\compiler-rt\lib\asan\asan_report.cc @ 305] *** WARNING: Unable to verify checksum for D:\src\chromium\src\out\asan64dynamic\libglesv2.dll 00000000`001672a0 000007fe`e1859607 chrome!__asan_wrap_memcpy+0xf6 [d:\src\llvm\llvm\projects\compiler-rt\lib\asan\asan_interceptors.cc @ 458] 00000000`00167b30 000007fe`e184bcbc libglesv2!__acrt_fp_strflt_to_string+0xb7 [d:\th\minkernel\crts\ucrt\src\appcrt\convert\_fptostr.cpp @ 86] (Inline Function) --------`-------- libglesv2!fp_format_f+0x57 [d:\th\minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp @ 578] 00000000`00167b60 000007fe`e182e2a2 libglesv2!__acrt_fp_format+0x180 [d:\th\minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp @ 722] 00000000`00167bf0 000007fe`e182ce80 libglesv2!__crt_stdio_output::output_processor<char,__crt_stdio_output::stream_output_adapter<char>,__crt_stdio_output::format_validation_ ``` This bug is similar to: https://llvm.org/bugs/show_bug.cgi?id=16362 Reviewers: rnk, zaks.anna, filcab Subscribers: filcab, kubabrecka, chrisha, llvm-commits, dberris Differential Revision: https://reviews.llvm.org/D27052 llvm-svn: 289063 |
||
---|---|---|
.. | ||
scripts | ||
tests | ||
.clang-format | ||
CMakeLists.txt | ||
README.txt | ||
asan.syms.extra | ||
asan_activation.cc | ||
asan_activation.h | ||
asan_activation_flags.inc | ||
asan_allocator.cc | ||
asan_allocator.h | ||
asan_blacklist.txt | ||
asan_debugging.cc | ||
asan_descriptions.cc | ||
asan_descriptions.h | ||
asan_errors.cc | ||
asan_errors.h | ||
asan_fake_stack.cc | ||
asan_fake_stack.h | ||
asan_flags.cc | ||
asan_flags.h | ||
asan_flags.inc | ||
asan_globals.cc | ||
asan_globals_win.cc | ||
asan_globals_win.h | ||
asan_init_version.h | ||
asan_interceptors.cc | ||
asan_interceptors.h | ||
asan_interface_internal.h | ||
asan_internal.h | ||
asan_linux.cc | ||
asan_lock.h | ||
asan_mac.cc | ||
asan_malloc_linux.cc | ||
asan_malloc_mac.cc | ||
asan_malloc_win.cc | ||
asan_mapping.h | ||
asan_memory_profile.cc | ||
asan_new_delete.cc | ||
asan_poisoning.cc | ||
asan_poisoning.h | ||
asan_posix.cc | ||
asan_preinit.cc | ||
asan_report.cc | ||
asan_report.h | ||
asan_rtl.cc | ||
asan_scariness_score.h | ||
asan_stack.cc | ||
asan_stack.h | ||
asan_stats.cc | ||
asan_stats.h | ||
asan_suppressions.cc | ||
asan_suppressions.h | ||
asan_thread.cc | ||
asan_thread.h | ||
asan_win.cc | ||
asan_win_dll_thunk.cc | ||
asan_win_dynamic_runtime_thunk.cc |
README.txt
AddressSanitizer RT ================================ This directory contains sources of the AddressSanitizer (ASan) runtime library. Directory structure: README.txt : This file. Makefile.mk : File for make-based build. CMakeLists.txt : File for cmake-based build. asan_*.{cc,h} : Sources of the asan runtime library. scripts/* : Helper scripts. tests/* : ASan unit tests. Also ASan runtime needs the following libraries: lib/interception/ : Machinery used to intercept function calls. lib/sanitizer_common/ : Code shared between various sanitizers. ASan runtime currently also embeds part of LeakSanitizer runtime for leak detection (lib/lsan/lsan_common.{cc,h}). ASan runtime can only be built by CMake. You can run ASan tests from the root of your CMake build tree: make check-asan For more instructions see: https://github.com/google/sanitizers/wiki/AddressSanitizerHowToBuild