andmer / address-sanitizer

Automatically exported from code.google.com/p/address-sanitizer
0 stars 0 forks source link

Handle assembly in sanitizer tools #192

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
Sanitizer tools need to handle assembly (inline and not). For ASan and TSan 
that will improve tool coverage, for MSan - help avoid false positives.

ATM it seems like the best chance to do that is through some kind of MC pass in 
LLVM. AFAIK, those things (MC passes) do not exist yet. Making that happen 
would require significant infrastructure work.

Original issue reported on code.google.com by euge...@google.com on 6 Jun 2013 at 7:59

GoogleCodeExporter commented 9 years ago
Can we reason about some side effects of inline assembly pieces by looking at 
their constraints?

Original comment by ramosian.glider@gmail.com on 6 Jun 2013 at 9:00

GoogleCodeExporter commented 9 years ago
More or less. But this does not apply to .S assembly.

We already understand constraints line "r" or "q", but if there is a pointer to 
memory the best we can do in MSan is unpoison the entire allocator chunk it 
points to. The latter is not implemented yet, and it will not work for .S 
assembly anyway.

Original comment by euge...@google.com on 6 Jun 2013 at 9:02

GoogleCodeExporter commented 9 years ago
Issue 290 has been merged into this issue.

Original comment by konstant...@gmail.com on 7 May 2014 at 8:58

GoogleCodeExporter commented 9 years ago
BTW wouldn't it make more sense to decompile .S into LLVM and then sanitize 
result?

Original comment by tetra2...@gmail.com on 7 May 2014 at 5:31

GoogleCodeExporter commented 9 years ago
By handling inline assembly, we get .S for free - they all go through the same 
AsmParser.
.S -> .ll decompilation would be a very nice thing to have, but it sounds like 
a very complex task and I'm not aware of any reasonably good implementations. 
It would make even more sense to apply it to .o (to handle 
yasm/nasm/fortran/whatever-else-generated objects) and maybe even to .so (to 
handle system libraries, binary OpenGL blobs, etc).

.so adds yet another level of complexity.

Original comment by euge...@google.com on 8 May 2014 at 7:39

GoogleCodeExporter commented 9 years ago
> By handling inline assembly, we get .S for free -
> they all go through the same AsmParser.

I disagree here - dependencies and memory sizes in inline asm are explicit in 
asm constraints whereas in AsmParser you'll have to somehow devise them 
yourself.

> it sounds like a very complex task

Well, not much more complex as analyzing assembly and tracking data/control 
dependencies in AsmParser...

Original comment by tetra2...@gmail.com on 8 May 2014 at 9:01

GoogleCodeExporter commented 9 years ago
Asm constraints are not enough. We want to capture arbitrary memory accesses in 
asm (i.e. "memory" in the clobber list).

Original comment by euge...@google.com on 8 May 2014 at 9:11

GoogleCodeExporter commented 9 years ago
> We want to capture arbitrary memory accesses in asm
> (i.e. "memory" in the clobber list).

Interesting. Do you have some publicly available use-case?

Original comment by tetra2...@gmail.com on 8 May 2014 at 12:20

GoogleCodeExporter commented 9 years ago
Sure, /usr/include/bits/select.h:

# define __FD_ZERO(fdsp) \
  do {                                                                        \
    int __d0, __d1;                                                           \
    __asm__ __volatile__ ("cld; rep; " __FD_ZERO_STOS                         \
                          : "=c" (__d0), "=D" (__d1)                          \
                          : "a" (0), "0" (sizeof (fd_set)                     \
                                          / sizeof (__fd_mask)),              \
                            "1" (&__FDS_BITS (fdsp)[0])                       \
                          : "memory");                                        \
  } while (0)

This is causing false positives in MSan.

Original comment by euge...@google.com on 8 May 2014 at 12:25

GoogleCodeExporter commented 9 years ago

Original comment by ramosian.glider@gmail.com on 30 Jul 2015 at 9:05

GoogleCodeExporter commented 9 years ago
Adding Project:AddressSanitizer as part of GitHub migration.

Original comment by ramosian.glider@gmail.com on 30 Jul 2015 at 9:06