mirror of
https://github.com/RPCS3/llvm.git
synced 2025-04-03 22:01:56 +00:00
Add options to AddressSanitizer passes to make them configurable by frontend.
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@168910 91177308-0d34-0410-b5e6-96231b3b80d8
This commit is contained in:
parent
07149b7797
commit
ee548275c6
@ -34,8 +34,10 @@ ModulePass *createGCOVProfilerPass(bool EmitNotes = true, bool EmitData = true,
|
|||||||
bool UseExtraChecksum = false);
|
bool UseExtraChecksum = false);
|
||||||
|
|
||||||
// Insert AddressSanitizer (address sanity checking) instrumentation
|
// Insert AddressSanitizer (address sanity checking) instrumentation
|
||||||
FunctionPass *createAddressSanitizerFunctionPass();
|
FunctionPass *createAddressSanitizerFunctionPass(
|
||||||
ModulePass *createAddressSanitizerModulePass();
|
bool CheckInitOrder = false, bool CheckUseAfterReturn = false,
|
||||||
|
bool CheckLifetime = false);
|
||||||
|
ModulePass *createAddressSanitizerModulePass(bool CheckInitOrder = false);
|
||||||
// Insert MemorySanitizer instrumentation (detection of uninitialized reads)
|
// Insert MemorySanitizer instrumentation (detection of uninitialized reads)
|
||||||
FunctionPass *createMemorySanitizerPass();
|
FunctionPass *createMemorySanitizerPass();
|
||||||
// Insert ThreadSanitizer (race detection) instrumentation
|
// Insert ThreadSanitizer (race detection) instrumentation
|
||||||
|
@ -136,6 +136,10 @@ static cl::opt<bool> ClOptSameTemp("asan-opt-same-temp",
|
|||||||
static cl::opt<bool> ClOptGlobals("asan-opt-globals",
|
static cl::opt<bool> ClOptGlobals("asan-opt-globals",
|
||||||
cl::desc("Don't instrument scalar globals"), cl::Hidden, cl::init(true));
|
cl::desc("Don't instrument scalar globals"), cl::Hidden, cl::init(true));
|
||||||
|
|
||||||
|
static cl::opt<bool> ClCheckLifetime("asan-check-lifetime",
|
||||||
|
cl::desc("Use llvm.lifetime intrinsics to insert extra checks"),
|
||||||
|
cl::Hidden, cl::init(false));
|
||||||
|
|
||||||
// Debug flags.
|
// Debug flags.
|
||||||
static cl::opt<int> ClDebug("asan-debug", cl::desc("debug"), cl::Hidden,
|
static cl::opt<int> ClDebug("asan-debug", cl::desc("debug"), cl::Hidden,
|
||||||
cl::init(0));
|
cl::init(0));
|
||||||
@ -186,7 +190,13 @@ static size_t RedzoneSize() {
|
|||||||
|
|
||||||
/// AddressSanitizer: instrument the code in module to find memory bugs.
|
/// AddressSanitizer: instrument the code in module to find memory bugs.
|
||||||
struct AddressSanitizer : public FunctionPass {
|
struct AddressSanitizer : public FunctionPass {
|
||||||
AddressSanitizer();
|
AddressSanitizer(bool CheckInitOrder = false,
|
||||||
|
bool CheckUseAfterReturn = false,
|
||||||
|
bool CheckLifetime = false)
|
||||||
|
: FunctionPass(ID),
|
||||||
|
CheckInitOrder(CheckInitOrder || ClInitializers),
|
||||||
|
CheckUseAfterReturn(CheckUseAfterReturn || ClUseAfterReturn),
|
||||||
|
CheckLifetime(CheckLifetime || ClCheckLifetime) {}
|
||||||
virtual const char *getPassName() const {
|
virtual const char *getPassName() const {
|
||||||
return "AddressSanitizerFunctionPass";
|
return "AddressSanitizerFunctionPass";
|
||||||
}
|
}
|
||||||
@ -232,6 +242,9 @@ struct AddressSanitizer : public FunctionPass {
|
|||||||
bool LooksLikeCodeInBug11395(Instruction *I);
|
bool LooksLikeCodeInBug11395(Instruction *I);
|
||||||
void FindDynamicInitializers(Module &M);
|
void FindDynamicInitializers(Module &M);
|
||||||
|
|
||||||
|
bool CheckInitOrder;
|
||||||
|
bool CheckUseAfterReturn;
|
||||||
|
bool CheckLifetime;
|
||||||
LLVMContext *C;
|
LLVMContext *C;
|
||||||
DataLayout *TD;
|
DataLayout *TD;
|
||||||
uint64_t MappingOffset;
|
uint64_t MappingOffset;
|
||||||
@ -251,9 +264,11 @@ struct AddressSanitizer : public FunctionPass {
|
|||||||
|
|
||||||
class AddressSanitizerModule : public ModulePass {
|
class AddressSanitizerModule : public ModulePass {
|
||||||
public:
|
public:
|
||||||
|
AddressSanitizerModule(bool CheckInitOrder = false)
|
||||||
|
: ModulePass(ID),
|
||||||
|
CheckInitOrder(CheckInitOrder || ClInitializers) {}
|
||||||
bool runOnModule(Module &M);
|
bool runOnModule(Module &M);
|
||||||
static char ID; // Pass identification, replacement for typeid
|
static char ID; // Pass identification, replacement for typeid
|
||||||
AddressSanitizerModule() : ModulePass(ID) { }
|
|
||||||
virtual const char *getPassName() const {
|
virtual const char *getPassName() const {
|
||||||
return "AddressSanitizerModule";
|
return "AddressSanitizerModule";
|
||||||
}
|
}
|
||||||
@ -262,6 +277,7 @@ class AddressSanitizerModule : public ModulePass {
|
|||||||
void createInitializerPoisonCalls(Module &M, Value *FirstAddr,
|
void createInitializerPoisonCalls(Module &M, Value *FirstAddr,
|
||||||
Value *LastAddr);
|
Value *LastAddr);
|
||||||
|
|
||||||
|
bool CheckInitOrder;
|
||||||
OwningPtr<BlackList> BL;
|
OwningPtr<BlackList> BL;
|
||||||
SetOfDynamicallyInitializedGlobals DynamicallyInitializedGlobals;
|
SetOfDynamicallyInitializedGlobals DynamicallyInitializedGlobals;
|
||||||
Type *IntptrTy;
|
Type *IntptrTy;
|
||||||
@ -275,17 +291,18 @@ char AddressSanitizer::ID = 0;
|
|||||||
INITIALIZE_PASS(AddressSanitizer, "asan",
|
INITIALIZE_PASS(AddressSanitizer, "asan",
|
||||||
"AddressSanitizer: detects use-after-free and out-of-bounds bugs.",
|
"AddressSanitizer: detects use-after-free and out-of-bounds bugs.",
|
||||||
false, false)
|
false, false)
|
||||||
AddressSanitizer::AddressSanitizer() : FunctionPass(ID) { }
|
FunctionPass *llvm::createAddressSanitizerFunctionPass(
|
||||||
FunctionPass *llvm::createAddressSanitizerFunctionPass() {
|
bool CheckInitOrder, bool CheckUseAfterReturn, bool CheckLifetime) {
|
||||||
return new AddressSanitizer();
|
return new AddressSanitizer(CheckInitOrder, CheckUseAfterReturn,
|
||||||
|
CheckLifetime);
|
||||||
}
|
}
|
||||||
|
|
||||||
char AddressSanitizerModule::ID = 0;
|
char AddressSanitizerModule::ID = 0;
|
||||||
INITIALIZE_PASS(AddressSanitizerModule, "asan-module",
|
INITIALIZE_PASS(AddressSanitizerModule, "asan-module",
|
||||||
"AddressSanitizer: detects use-after-free and out-of-bounds bugs."
|
"AddressSanitizer: detects use-after-free and out-of-bounds bugs."
|
||||||
"ModulePass", false, false)
|
"ModulePass", false, false)
|
||||||
ModulePass *llvm::createAddressSanitizerModulePass() {
|
ModulePass *llvm::createAddressSanitizerModulePass(bool CheckInitOrder) {
|
||||||
return new AddressSanitizerModule();
|
return new AddressSanitizerModule(CheckInitOrder);
|
||||||
}
|
}
|
||||||
|
|
||||||
static size_t TypeSizeToSizeIndex(uint32_t TypeSize) {
|
static size_t TypeSizeToSizeIndex(uint32_t TypeSize) {
|
||||||
@ -396,7 +413,7 @@ void AddressSanitizer::instrumentMop(Instruction *I) {
|
|||||||
if (GlobalVariable *G = dyn_cast<GlobalVariable>(Addr)) {
|
if (GlobalVariable *G = dyn_cast<GlobalVariable>(Addr)) {
|
||||||
// If initialization order checking is disabled, a simple access to a
|
// If initialization order checking is disabled, a simple access to a
|
||||||
// dynamically initialized global is always valid.
|
// dynamically initialized global is always valid.
|
||||||
if (!ClInitializers)
|
if (!CheckInitOrder)
|
||||||
return;
|
return;
|
||||||
// If a global variable does not have dynamic initialization we don't
|
// If a global variable does not have dynamic initialization we don't
|
||||||
// have to instrument it. However, if a global does not have initailizer
|
// have to instrument it. However, if a global does not have initailizer
|
||||||
@ -690,7 +707,7 @@ bool AddressSanitizerModule::runOnModule(Module &M) {
|
|||||||
NULL);
|
NULL);
|
||||||
|
|
||||||
// Populate the first and last globals declared in this TU.
|
// Populate the first and last globals declared in this TU.
|
||||||
if (ClInitializers && GlobalHasDynamicInitializer) {
|
if (CheckInitOrder && GlobalHasDynamicInitializer) {
|
||||||
LastDynamic = ConstantExpr::getPointerCast(NewGlobal, IntptrTy);
|
LastDynamic = ConstantExpr::getPointerCast(NewGlobal, IntptrTy);
|
||||||
if (FirstDynamic == 0)
|
if (FirstDynamic == 0)
|
||||||
FirstDynamic = LastDynamic;
|
FirstDynamic = LastDynamic;
|
||||||
@ -705,7 +722,7 @@ bool AddressSanitizerModule::runOnModule(Module &M) {
|
|||||||
ConstantArray::get(ArrayOfGlobalStructTy, Initializers), "");
|
ConstantArray::get(ArrayOfGlobalStructTy, Initializers), "");
|
||||||
|
|
||||||
// Create calls for poisoning before initializers run and unpoisoning after.
|
// Create calls for poisoning before initializers run and unpoisoning after.
|
||||||
if (ClInitializers && FirstDynamic && LastDynamic)
|
if (CheckInitOrder && FirstDynamic && LastDynamic)
|
||||||
createInitializerPoisonCalls(M, FirstDynamic, LastDynamic);
|
createInitializerPoisonCalls(M, FirstDynamic, LastDynamic);
|
||||||
|
|
||||||
Function *AsanRegisterGlobals = checkInterfaceFunction(M.getOrInsertFunction(
|
Function *AsanRegisterGlobals = checkInterfaceFunction(M.getOrInsertFunction(
|
||||||
@ -1081,7 +1098,7 @@ bool AddressSanitizer::poisonStackInFunction(Function &F) {
|
|||||||
|
|
||||||
uint64_t LocalStackSize = TotalSize + (AllocaVec.size() + 1) * RedzoneSize();
|
uint64_t LocalStackSize = TotalSize + (AllocaVec.size() + 1) * RedzoneSize();
|
||||||
|
|
||||||
bool DoStackMalloc = ClUseAfterReturn
|
bool DoStackMalloc = CheckUseAfterReturn
|
||||||
&& LocalStackSize <= kMaxStackMallocSize;
|
&& LocalStackSize <= kMaxStackMallocSize;
|
||||||
|
|
||||||
Instruction *InsBefore = AllocaVec[0];
|
Instruction *InsBefore = AllocaVec[0];
|
||||||
|
Loading…
x
Reference in New Issue
Block a user