Add options to AddressSanitizer passes to make them configurable by frontend.

git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@168910 91177308-0d34-0410-b5e6-96231b3b80d8
This commit is contained in:
Alexey Samsonov 2012-11-29 18:14:24 +00:00
parent 07149b7797
commit ee548275c6
2 changed files with 32 additions and 13 deletions

View File

@ -34,8 +34,10 @@ ModulePass *createGCOVProfilerPass(bool EmitNotes = true, bool EmitData = true,
bool UseExtraChecksum = false); bool UseExtraChecksum = false);
// Insert AddressSanitizer (address sanity checking) instrumentation // Insert AddressSanitizer (address sanity checking) instrumentation
FunctionPass *createAddressSanitizerFunctionPass(); FunctionPass *createAddressSanitizerFunctionPass(
ModulePass *createAddressSanitizerModulePass(); bool CheckInitOrder = false, bool CheckUseAfterReturn = false,
bool CheckLifetime = false);
ModulePass *createAddressSanitizerModulePass(bool CheckInitOrder = false);
// Insert MemorySanitizer instrumentation (detection of uninitialized reads) // Insert MemorySanitizer instrumentation (detection of uninitialized reads)
FunctionPass *createMemorySanitizerPass(); FunctionPass *createMemorySanitizerPass();
// Insert ThreadSanitizer (race detection) instrumentation // Insert ThreadSanitizer (race detection) instrumentation

View File

@ -136,6 +136,10 @@ static cl::opt<bool> ClOptSameTemp("asan-opt-same-temp",
static cl::opt<bool> ClOptGlobals("asan-opt-globals", static cl::opt<bool> ClOptGlobals("asan-opt-globals",
cl::desc("Don't instrument scalar globals"), cl::Hidden, cl::init(true)); cl::desc("Don't instrument scalar globals"), cl::Hidden, cl::init(true));
static cl::opt<bool> ClCheckLifetime("asan-check-lifetime",
cl::desc("Use llvm.lifetime intrinsics to insert extra checks"),
cl::Hidden, cl::init(false));
// Debug flags. // Debug flags.
static cl::opt<int> ClDebug("asan-debug", cl::desc("debug"), cl::Hidden, static cl::opt<int> ClDebug("asan-debug", cl::desc("debug"), cl::Hidden,
cl::init(0)); cl::init(0));
@ -186,7 +190,13 @@ static size_t RedzoneSize() {
/// AddressSanitizer: instrument the code in module to find memory bugs. /// AddressSanitizer: instrument the code in module to find memory bugs.
struct AddressSanitizer : public FunctionPass { struct AddressSanitizer : public FunctionPass {
AddressSanitizer(); AddressSanitizer(bool CheckInitOrder = false,
bool CheckUseAfterReturn = false,
bool CheckLifetime = false)
: FunctionPass(ID),
CheckInitOrder(CheckInitOrder || ClInitializers),
CheckUseAfterReturn(CheckUseAfterReturn || ClUseAfterReturn),
CheckLifetime(CheckLifetime || ClCheckLifetime) {}
virtual const char *getPassName() const { virtual const char *getPassName() const {
return "AddressSanitizerFunctionPass"; return "AddressSanitizerFunctionPass";
} }
@ -232,6 +242,9 @@ struct AddressSanitizer : public FunctionPass {
bool LooksLikeCodeInBug11395(Instruction *I); bool LooksLikeCodeInBug11395(Instruction *I);
void FindDynamicInitializers(Module &M); void FindDynamicInitializers(Module &M);
bool CheckInitOrder;
bool CheckUseAfterReturn;
bool CheckLifetime;
LLVMContext *C; LLVMContext *C;
DataLayout *TD; DataLayout *TD;
uint64_t MappingOffset; uint64_t MappingOffset;
@ -251,9 +264,11 @@ struct AddressSanitizer : public FunctionPass {
class AddressSanitizerModule : public ModulePass { class AddressSanitizerModule : public ModulePass {
public: public:
AddressSanitizerModule(bool CheckInitOrder = false)
: ModulePass(ID),
CheckInitOrder(CheckInitOrder || ClInitializers) {}
bool runOnModule(Module &M); bool runOnModule(Module &M);
static char ID; // Pass identification, replacement for typeid static char ID; // Pass identification, replacement for typeid
AddressSanitizerModule() : ModulePass(ID) { }
virtual const char *getPassName() const { virtual const char *getPassName() const {
return "AddressSanitizerModule"; return "AddressSanitizerModule";
} }
@ -262,6 +277,7 @@ class AddressSanitizerModule : public ModulePass {
void createInitializerPoisonCalls(Module &M, Value *FirstAddr, void createInitializerPoisonCalls(Module &M, Value *FirstAddr,
Value *LastAddr); Value *LastAddr);
bool CheckInitOrder;
OwningPtr<BlackList> BL; OwningPtr<BlackList> BL;
SetOfDynamicallyInitializedGlobals DynamicallyInitializedGlobals; SetOfDynamicallyInitializedGlobals DynamicallyInitializedGlobals;
Type *IntptrTy; Type *IntptrTy;
@ -275,17 +291,18 @@ char AddressSanitizer::ID = 0;
INITIALIZE_PASS(AddressSanitizer, "asan", INITIALIZE_PASS(AddressSanitizer, "asan",
"AddressSanitizer: detects use-after-free and out-of-bounds bugs.", "AddressSanitizer: detects use-after-free and out-of-bounds bugs.",
false, false) false, false)
AddressSanitizer::AddressSanitizer() : FunctionPass(ID) { } FunctionPass *llvm::createAddressSanitizerFunctionPass(
FunctionPass *llvm::createAddressSanitizerFunctionPass() { bool CheckInitOrder, bool CheckUseAfterReturn, bool CheckLifetime) {
return new AddressSanitizer(); return new AddressSanitizer(CheckInitOrder, CheckUseAfterReturn,
CheckLifetime);
} }
char AddressSanitizerModule::ID = 0; char AddressSanitizerModule::ID = 0;
INITIALIZE_PASS(AddressSanitizerModule, "asan-module", INITIALIZE_PASS(AddressSanitizerModule, "asan-module",
"AddressSanitizer: detects use-after-free and out-of-bounds bugs." "AddressSanitizer: detects use-after-free and out-of-bounds bugs."
"ModulePass", false, false) "ModulePass", false, false)
ModulePass *llvm::createAddressSanitizerModulePass() { ModulePass *llvm::createAddressSanitizerModulePass(bool CheckInitOrder) {
return new AddressSanitizerModule(); return new AddressSanitizerModule(CheckInitOrder);
} }
static size_t TypeSizeToSizeIndex(uint32_t TypeSize) { static size_t TypeSizeToSizeIndex(uint32_t TypeSize) {
@ -396,7 +413,7 @@ void AddressSanitizer::instrumentMop(Instruction *I) {
if (GlobalVariable *G = dyn_cast<GlobalVariable>(Addr)) { if (GlobalVariable *G = dyn_cast<GlobalVariable>(Addr)) {
// If initialization order checking is disabled, a simple access to a // If initialization order checking is disabled, a simple access to a
// dynamically initialized global is always valid. // dynamically initialized global is always valid.
if (!ClInitializers) if (!CheckInitOrder)
return; return;
// If a global variable does not have dynamic initialization we don't // If a global variable does not have dynamic initialization we don't
// have to instrument it. However, if a global does not have initailizer // have to instrument it. However, if a global does not have initailizer
@ -690,7 +707,7 @@ bool AddressSanitizerModule::runOnModule(Module &M) {
NULL); NULL);
// Populate the first and last globals declared in this TU. // Populate the first and last globals declared in this TU.
if (ClInitializers && GlobalHasDynamicInitializer) { if (CheckInitOrder && GlobalHasDynamicInitializer) {
LastDynamic = ConstantExpr::getPointerCast(NewGlobal, IntptrTy); LastDynamic = ConstantExpr::getPointerCast(NewGlobal, IntptrTy);
if (FirstDynamic == 0) if (FirstDynamic == 0)
FirstDynamic = LastDynamic; FirstDynamic = LastDynamic;
@ -705,7 +722,7 @@ bool AddressSanitizerModule::runOnModule(Module &M) {
ConstantArray::get(ArrayOfGlobalStructTy, Initializers), ""); ConstantArray::get(ArrayOfGlobalStructTy, Initializers), "");
// Create calls for poisoning before initializers run and unpoisoning after. // Create calls for poisoning before initializers run and unpoisoning after.
if (ClInitializers && FirstDynamic && LastDynamic) if (CheckInitOrder && FirstDynamic && LastDynamic)
createInitializerPoisonCalls(M, FirstDynamic, LastDynamic); createInitializerPoisonCalls(M, FirstDynamic, LastDynamic);
Function *AsanRegisterGlobals = checkInterfaceFunction(M.getOrInsertFunction( Function *AsanRegisterGlobals = checkInterfaceFunction(M.getOrInsertFunction(
@ -1081,7 +1098,7 @@ bool AddressSanitizer::poisonStackInFunction(Function &F) {
uint64_t LocalStackSize = TotalSize + (AllocaVec.size() + 1) * RedzoneSize(); uint64_t LocalStackSize = TotalSize + (AllocaVec.size() + 1) * RedzoneSize();
bool DoStackMalloc = ClUseAfterReturn bool DoStackMalloc = CheckUseAfterReturn
&& LocalStackSize <= kMaxStackMallocSize; && LocalStackSize <= kMaxStackMallocSize;
Instruction *InsBefore = AllocaVec[0]; Instruction *InsBefore = AllocaVec[0];