2021-02-22 14:47:29 -05:00
|
|
|
//===--- SanitizerMetadata.cpp - Ignored entities for sanitizers ----------===//
|
2014-08-01 21:35:28 +00:00
|
|
|
//
|
2019-01-19 08:50:56 +00:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2014-08-01 21:35:28 +00:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// Class which emits metadata consumed by sanitizer instrumentation passes.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "SanitizerMetadata.h"
|
|
|
|
#include "CodeGenModule.h"
|
2019-12-09 16:11:56 -08:00
|
|
|
#include "clang/AST/Attr.h"
|
2014-10-17 22:37:33 +00:00
|
|
|
#include "clang/AST/Type.h"
|
2020-02-27 11:01:58 -08:00
|
|
|
#include "clang/Basic/SourceManager.h"
|
2014-08-01 21:35:28 +00:00
|
|
|
#include "llvm/ADT/StringRef.h"
|
|
|
|
#include "llvm/IR/Constants.h"
|
|
|
|
|
|
|
|
using namespace clang;
|
|
|
|
using namespace CodeGen;
|
|
|
|
|
|
|
|
SanitizerMetadata::SanitizerMetadata(CodeGenModule &CGM) : CGM(CGM) {}
|
|
|
|
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-15 20:02:23 +00:00
|
|
|
static bool isAsanHwasanOrMemTag(const SanitizerSet& SS) {
|
|
|
|
return SS.hasOneOf(SanitizerKind::Address | SanitizerKind::KernelAddress |
|
|
|
|
SanitizerKind::HWAddress | SanitizerKind::KernelHWAddress |
|
|
|
|
SanitizerKind::MemTag);
|
|
|
|
}
|
|
|
|
|
2014-08-01 21:35:28 +00:00
|
|
|
void SanitizerMetadata::reportGlobalToASan(llvm::GlobalVariable *GV,
|
|
|
|
SourceLocation Loc, StringRef Name,
|
2014-10-17 22:37:33 +00:00
|
|
|
QualType Ty, bool IsDynInit,
|
2020-06-20 00:42:26 -07:00
|
|
|
bool IsExcluded) {
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-15 20:02:23 +00:00
|
|
|
if (!isAsanHwasanOrMemTag(CGM.getLangOpts().Sanitize))
|
2014-08-01 21:35:28 +00:00
|
|
|
return;
|
2021-02-22 14:47:29 -05:00
|
|
|
IsDynInit &= !CGM.isInNoSanitizeList(GV, Loc, Ty, "init");
|
|
|
|
IsExcluded |= CGM.isInNoSanitizeList(GV, Loc, Ty);
|
2014-08-01 21:35:28 +00:00
|
|
|
|
2014-12-09 18:39:32 +00:00
|
|
|
llvm::Metadata *LocDescr = nullptr;
|
|
|
|
llvm::Metadata *GlobalName = nullptr;
|
2014-08-01 21:35:28 +00:00
|
|
|
llvm::LLVMContext &VMContext = CGM.getLLVMContext();
|
2020-06-20 00:42:26 -07:00
|
|
|
if (!IsExcluded) {
|
2021-02-22 14:47:29 -05:00
|
|
|
// Don't generate source location and global name if it is on
|
|
|
|
// the NoSanitizeList - it won't be instrumented anyway.
|
2014-08-02 00:35:50 +00:00
|
|
|
LocDescr = getLocationMetadata(Loc);
|
|
|
|
if (!Name.empty())
|
|
|
|
GlobalName = llvm::MDString::get(VMContext, Name);
|
2014-08-01 21:35:28 +00:00
|
|
|
}
|
|
|
|
|
2014-12-09 18:39:32 +00:00
|
|
|
llvm::Metadata *GlobalMetadata[] = {
|
|
|
|
llvm::ConstantAsMetadata::get(GV), LocDescr, GlobalName,
|
|
|
|
llvm::ConstantAsMetadata::get(
|
|
|
|
llvm::ConstantInt::get(llvm::Type::getInt1Ty(VMContext), IsDynInit)),
|
|
|
|
llvm::ConstantAsMetadata::get(llvm::ConstantInt::get(
|
2020-06-20 00:42:26 -07:00
|
|
|
llvm::Type::getInt1Ty(VMContext), IsExcluded))};
|
2014-08-01 21:35:28 +00:00
|
|
|
|
|
|
|
llvm::MDNode *ThisGlobal = llvm::MDNode::get(VMContext, GlobalMetadata);
|
|
|
|
llvm::NamedMDNode *AsanGlobals =
|
|
|
|
CGM.getModule().getOrInsertNamedMetadata("llvm.asan.globals");
|
|
|
|
AsanGlobals->addOperand(ThisGlobal);
|
|
|
|
}
|
|
|
|
|
|
|
|
void SanitizerMetadata::reportGlobalToASan(llvm::GlobalVariable *GV,
|
|
|
|
const VarDecl &D, bool IsDynInit) {
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-15 20:02:23 +00:00
|
|
|
if (!isAsanHwasanOrMemTag(CGM.getLangOpts().Sanitize))
|
2014-08-01 21:35:28 +00:00
|
|
|
return;
|
|
|
|
std::string QualName;
|
|
|
|
llvm::raw_string_ostream OS(QualName);
|
|
|
|
D.printQualifiedName(OS);
|
2016-10-14 19:55:09 +00:00
|
|
|
|
2020-06-20 00:42:26 -07:00
|
|
|
bool IsExcluded = false;
|
2016-10-14 19:55:09 +00:00
|
|
|
for (auto Attr : D.specific_attrs<NoSanitizeAttr>())
|
|
|
|
if (Attr->getMask() & SanitizerKind::Address)
|
2020-06-20 00:42:26 -07:00
|
|
|
IsExcluded = true;
|
2016-10-14 19:55:09 +00:00
|
|
|
reportGlobalToASan(GV, D.getLocation(), OS.str(), D.getType(), IsDynInit,
|
2020-06-20 00:42:26 -07:00
|
|
|
IsExcluded);
|
2014-08-01 21:35:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void SanitizerMetadata::disableSanitizerForGlobal(llvm::GlobalVariable *GV) {
|
|
|
|
// For now, just make sure the global is not modified by the ASan
|
|
|
|
// instrumentation.
|
ARM MTE stack sanitizer.
Add "memtag" sanitizer that detects and mitigates stack memory issues
using armv8.5 Memory Tagging Extension.
It is similar in principle to HWASan, which is a software implementation
of the same idea, but there are enough differencies to warrant a new
sanitizer type IMHO. It is also expected to have very different
performance properties.
The new sanitizer does not have a runtime library (it may grow one
later, along with a "debugging" mode). Similar to SafeStack and
StackProtector, the instrumentation pass (in a follow up change) will be
inserted in all cases, but will only affect functions marked with the
new sanitize_memtag attribute.
Reviewers: pcc, hctim, vitalybuka, ostannard
Subscribers: srhines, mehdi_amini, javed.absar, kristof.beyls, hiraditya, cryptoad, steven_wu, dexonsmith, cfe-commits, llvm-commits
Tags: #clang, #llvm
Differential Revision: https://reviews.llvm.org/D64169
llvm-svn: 366123
2019-07-15 20:02:23 +00:00
|
|
|
if (isAsanHwasanOrMemTag(CGM.getLangOpts().Sanitize))
|
2014-10-17 22:37:33 +00:00
|
|
|
reportGlobalToASan(GV, SourceLocation(), "", QualType(), false, true);
|
2014-08-01 21:35:28 +00:00
|
|
|
}
|
2014-08-02 00:35:50 +00:00
|
|
|
|
2014-08-26 02:29:59 +00:00
|
|
|
void SanitizerMetadata::disableSanitizerForInstruction(llvm::Instruction *I) {
|
2014-12-09 18:39:32 +00:00
|
|
|
I->setMetadata(CGM.getModule().getMDKindID("nosanitize"),
|
|
|
|
llvm::MDNode::get(CGM.getLLVMContext(), None));
|
2014-08-26 02:29:59 +00:00
|
|
|
}
|
|
|
|
|
2014-08-02 00:35:50 +00:00
|
|
|
llvm::MDNode *SanitizerMetadata::getLocationMetadata(SourceLocation Loc) {
|
|
|
|
PresumedLoc PLoc = CGM.getContext().getSourceManager().getPresumedLoc(Loc);
|
|
|
|
if (!PLoc.isValid())
|
|
|
|
return nullptr;
|
|
|
|
llvm::LLVMContext &VMContext = CGM.getLLVMContext();
|
2014-12-09 18:39:32 +00:00
|
|
|
llvm::Metadata *LocMetadata[] = {
|
2014-08-02 00:35:50 +00:00
|
|
|
llvm::MDString::get(VMContext, PLoc.getFilename()),
|
2014-12-09 18:39:32 +00:00
|
|
|
llvm::ConstantAsMetadata::get(llvm::ConstantInt::get(
|
|
|
|
llvm::Type::getInt32Ty(VMContext), PLoc.getLine())),
|
|
|
|
llvm::ConstantAsMetadata::get(llvm::ConstantInt::get(
|
|
|
|
llvm::Type::getInt32Ty(VMContext), PLoc.getColumn())),
|
2014-08-02 00:35:50 +00:00
|
|
|
};
|
|
|
|
return llvm::MDNode::get(VMContext, LocMetadata);
|
|
|
|
}
|