llvm-project/compiler-rt/lib/esan/esan.cpp

278 lines
9.4 KiB
C++

//===-- esan.cpp ----------------------------------------------------------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//
//
// This file is a part of EfficiencySanitizer, a family of performance tuners.
//
// Main file (entry points) for the Esan run-time.
//===----------------------------------------------------------------------===//
#include "esan.h"
#include "esan_flags.h"
#include "esan_interface_internal.h"
#include "esan_shadow.h"
#include "cache_frag.h"
#include "sanitizer_common/sanitizer_common.h"
#include "sanitizer_common/sanitizer_flag_parser.h"
#include "sanitizer_common/sanitizer_flags.h"
#include "working_set.h"
// See comment below.
extern "C" {
extern void __cxa_atexit(void (*function)(void));
}
namespace __esan {
bool EsanIsInitialized;
bool EsanDuringInit;
ShadowMapping Mapping;
// Different tools use different scales within the same shadow mapping scheme.
// The scale used here must match that used by the compiler instrumentation.
// This array is indexed by the ToolType enum.
static const uptr ShadowScale[] = {
0, // ESAN_None.
2, // ESAN_CacheFrag: 4B:1B, so 4 to 1 == >>2.
6, // ESAN_WorkingSet: 64B:1B, so 64 to 1 == >>6.
};
// We are combining multiple performance tuning tools under the umbrella of
// one EfficiencySanitizer super-tool. Most of our tools have very similar
// memory access instrumentation, shadow memory mapping, libc interception,
// etc., and there is typically more shared code than distinct code.
//
// We are not willing to dispatch on tool dynamically in our fastpath
// instrumentation: thus, which tool to use is a static option selected
// at compile time and passed to __esan_init().
//
// We are willing to pay the overhead of tool dispatch in the slowpath to more
// easily share code. We expect to only come here rarely.
// If this becomes a performance hit, we can add separate interface
// routines for each subtool (e.g., __esan_cache_frag_aligned_load_4).
// But for libc interceptors, we'll have to do one of the following:
// A) Add multiple-include support to sanitizer_common_interceptors.inc,
// instantiate it separately for each tool, and call the selected
// tool's intercept setup code.
// B) Build separate static runtime libraries, one for each tool.
// C) Completely split the tools into separate sanitizers.
void processRangeAccess(uptr PC, uptr Addr, int Size, bool IsWrite) {
VPrintf(3, "in esan::%s %p: %c %p %d\n", __FUNCTION__, PC,
IsWrite ? 'w' : 'r', Addr, Size);
if (__esan_which_tool == ESAN_CacheFrag) {
// TODO(bruening): add shadow mapping and update shadow bits here.
// We'll move this to cache_frag.cpp once we have something.
} else if (__esan_which_tool == ESAN_WorkingSet) {
processRangeAccessWorkingSet(PC, Addr, Size, IsWrite);
}
}
bool processSignal(int SigNum, void (*Handler)(int), void (**Result)(int)) {
if (__esan_which_tool == ESAN_WorkingSet)
return processWorkingSetSignal(SigNum, Handler, Result);
return true;
}
bool processSigaction(int SigNum, const void *Act, void *OldAct) {
if (__esan_which_tool == ESAN_WorkingSet)
return processWorkingSetSigaction(SigNum, Act, OldAct);
return true;
}
bool processSigprocmask(int How, void *Set, void *OldSet) {
if (__esan_which_tool == ESAN_WorkingSet)
return processWorkingSetSigprocmask(How, Set, OldSet);
return true;
}
#if SANITIZER_DEBUG
static bool verifyShadowScheme() {
// Sanity checks for our shadow mapping scheme.
uptr AppStart, AppEnd;
if (Verbosity() >= 3) {
for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) {
VPrintf(3, "App #%d: [%zx-%zx) (%zuGB)\n", i, AppStart, AppEnd,
(AppEnd - AppStart) >> 30);
}
}
for (int Scale = 0; Scale < 8; ++Scale) {
Mapping.initialize(Scale);
if (Verbosity() >= 3) {
VPrintf(3, "\nChecking scale %d\n", Scale);
uptr ShadowStart, ShadowEnd;
for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) {
VPrintf(3, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart,
ShadowEnd, (ShadowEnd - ShadowStart) >> 30);
}
for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) {
VPrintf(3, "Shadow(Shadow) #%d: [%zx-%zx)\n", i,
appToShadow(ShadowStart), appToShadow(ShadowEnd - 1)+1);
}
}
for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) {
DCHECK(isAppMem(AppStart));
DCHECK(!isAppMem(AppStart - 1));
DCHECK(isAppMem(AppEnd - 1));
DCHECK(!isAppMem(AppEnd));
DCHECK(!isShadowMem(AppStart));
DCHECK(!isShadowMem(AppEnd - 1));
DCHECK(isShadowMem(appToShadow(AppStart)));
DCHECK(isShadowMem(appToShadow(AppEnd - 1)));
// Double-shadow checks.
DCHECK(!isShadowMem(appToShadow(appToShadow(AppStart))));
DCHECK(!isShadowMem(appToShadow(appToShadow(AppEnd - 1))));
}
// Ensure no shadow regions overlap each other.
uptr ShadowAStart, ShadowBStart, ShadowAEnd, ShadowBEnd;
for (int i = 0; getShadowRegion(i, &ShadowAStart, &ShadowAEnd); ++i) {
for (int j = 0; getShadowRegion(j, &ShadowBStart, &ShadowBEnd); ++j) {
DCHECK(i == j || ShadowAStart >= ShadowBEnd ||
ShadowAEnd <= ShadowBStart);
}
}
}
return true;
}
#endif
uptr VmaSize;
static void initializeShadow() {
verifyAddressSpace();
// This is based on the assumption that the intial stack is always allocated
// in the topmost segment of the user address space and the assumption
// holds true on all the platforms currently supported.
VmaSize =
(MostSignificantSetBitIndex(GET_CURRENT_FRAME()) + 1);
DCHECK(verifyShadowScheme());
Mapping.initialize(ShadowScale[__esan_which_tool]);
VPrintf(1, "Shadow scale=%d offset=%p\n", Mapping.Scale, Mapping.Offset);
uptr ShadowStart, ShadowEnd;
for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) {
VPrintf(1, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart, ShadowEnd,
(ShadowEnd - ShadowStart) >> 30);
uptr Map = 0;
if (__esan_which_tool == ESAN_WorkingSet) {
// We want to identify all shadow pages that are touched so we start
// out inaccessible.
Map = (uptr)MmapFixedNoAccess(ShadowStart, ShadowEnd- ShadowStart,
"shadow");
} else {
if (MmapFixedNoReserve(ShadowStart, ShadowEnd - ShadowStart, "shadow"))
Map = ShadowStart;
}
if (Map != ShadowStart) {
Printf("FATAL: EfficiencySanitizer failed to map its shadow memory.\n");
Die();
}
if (common_flags()->no_huge_pages_for_shadow)
NoHugePagesInRegion(ShadowStart, ShadowEnd - ShadowStart);
if (common_flags()->use_madv_dontdump)
DontDumpShadowMemory(ShadowStart, ShadowEnd - ShadowStart);
// TODO: Call MmapNoAccess() on in-between regions.
}
}
void initializeLibrary(ToolType Tool) {
// We assume there is only one thread during init, but we need to
// guard against double-init when we're (re-)called from an
// early interceptor.
if (EsanIsInitialized || EsanDuringInit)
return;
EsanDuringInit = true;
CHECK(Tool == __esan_which_tool);
SanitizerToolName = "EfficiencySanitizer";
CacheBinaryName();
initializeFlags();
// Intercepting libc _exit or exit via COMMON_INTERCEPTOR_ON_EXIT only
// finalizes on an explicit exit call by the app. To handle a normal
// exit we register an atexit handler.
::__cxa_atexit((void (*)())finalizeLibrary);
VPrintf(1, "in esan::%s\n", __FUNCTION__);
if (__esan_which_tool <= ESAN_None || __esan_which_tool >= ESAN_Max) {
Printf("ERROR: unknown tool %d requested\n", __esan_which_tool);
Die();
}
initializeShadow();
if (__esan_which_tool == ESAN_WorkingSet)
initializeShadowWorkingSet();
initializeInterceptors();
if (__esan_which_tool == ESAN_CacheFrag) {
initializeCacheFrag();
} else if (__esan_which_tool == ESAN_WorkingSet) {
initializeWorkingSet();
}
EsanIsInitialized = true;
EsanDuringInit = false;
}
int finalizeLibrary() {
VPrintf(1, "in esan::%s\n", __FUNCTION__);
if (__esan_which_tool == ESAN_CacheFrag) {
return finalizeCacheFrag();
} else if (__esan_which_tool == ESAN_WorkingSet) {
return finalizeWorkingSet();
}
return 0;
}
void reportResults() {
VPrintf(1, "in esan::%s\n", __FUNCTION__);
if (__esan_which_tool == ESAN_CacheFrag) {
return reportCacheFrag();
} else if (__esan_which_tool == ESAN_WorkingSet) {
return reportWorkingSet();
}
}
void processCompilationUnitInit(void *Ptr) {
VPrintf(2, "in esan::%s\n", __FUNCTION__);
if (__esan_which_tool == ESAN_CacheFrag) {
DCHECK(Ptr != nullptr);
processCacheFragCompilationUnitInit(Ptr);
} else {
DCHECK(Ptr == nullptr);
}
}
// This is called when the containing module is unloaded.
// For the main executable module, this is called after finalizeLibrary.
void processCompilationUnitExit(void *Ptr) {
VPrintf(2, "in esan::%s\n", __FUNCTION__);
if (__esan_which_tool == ESAN_CacheFrag) {
DCHECK(Ptr != nullptr);
processCacheFragCompilationUnitExit(Ptr);
} else {
DCHECK(Ptr == nullptr);
}
}
unsigned int getSampleCount() {
VPrintf(1, "in esan::%s\n", __FUNCTION__);
if (__esan_which_tool == ESAN_WorkingSet) {
return getSampleCountWorkingSet();
}
return 0;
}
} // namespace __esan