-
Notifications
You must be signed in to change notification settings - Fork 15.4k
[llvm][AddressSanitizer] option for specifying the address space of the shadow map #167772
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Thank you for submitting a Pull Request (PR) to the LLVM Project! This PR will be automatically labeled and the relevant teams will be notified. If you wish to, you can add reviewers by using the "Reviewers" section on this page. If this is not working for you, it is probably because you do not have write permissions for the repository. In which case you can instead tag reviewers by name in a comment by using If you have received no comments on your PR for a week, you can request a review by "ping"ing the PR by adding a comment “Ping”. The common courtesy "ping" rate is once a week. Please remember that you are asking for valuable time from other developers. If you have further questions, they may be answered by the LLVM GitHub User Guide. You can also ask questions in a comment on this PR, on the LLVM Discord or on the forums. |
|
@llvm/pr-subscribers-llvm-transforms @llvm/pr-subscribers-compiler-rt-sanitizer Author: Emil Tsalapatis (etsal) ChangesThe AddressSanitizer transform currently defaults to placing the shadow map in address space 0, but it is desirable for some targets (namely BPF) to select a different address space for the map. Add a compilation option for specifying the address space of the target. Full diff: https://github.com/llvm/llvm-project/pull/167772.diff 1 Files Affected:
diff --git a/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp b/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp
index 7c364f86fb0e8..8d3b712553c6d 100644
--- a/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp
+++ b/llvm/lib/Transforms/Instrumentation/AddressSanitizer.cpp
@@ -248,6 +248,11 @@ static cl::opt<bool>
"platforms that support this"),
cl::Hidden, cl::init(true));
+static cl::opt<int>
+ ClShadowASpace("asan-shadow-aspace",
+ cl::desc("Address space for pointers to the shadow map"),
+ cl::Hidden, cl::init(0));
+
static cl::opt<bool> ClWithIfuncSuppressRemat(
"asan-with-ifunc-suppress-remat",
cl::desc("Suppress rematerialization of dynamic shadow address by passing "
@@ -1942,7 +1947,7 @@ void AddressSanitizer::instrumentAddress(Instruction *OrigIns,
Type *ShadowTy =
IntegerType::get(*C, std::max(8U, TypeStoreSize >> Mapping.Scale));
- Type *ShadowPtrTy = PointerType::get(*C, 0);
+ Type *ShadowPtrTy = PointerType::get(*C, ClShadowASpace);
Value *ShadowPtr = memToShadow(AddrLong, IRB);
const uint64_t ShadowAlign =
std::max<uint64_t>(Alignment.valueOrOne().value() >> Mapping.Scale, 1);
|
| cl::Hidden, cl::init(true)); | ||
|
|
||
| static cl::opt<int> | ||
| ClShadowASpace("asan-shadow-aspace", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: "aspace" is too terse. Please expand it to address-space, or at least addr-space.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sounds good, will update. I assume you mean the command line option and not the C++ side variable, if not I can change that too.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please change both: for consistency, and also because "A" is not typically used as shorthand for Address in the variable names. For example, immediately after ClShadowASpace, we have AddrLong (not "ALong"):
Type *ShadowPtrTy = PointerType::get(*C, ClShadowASpace);
Value *ShadowPtr = memToShadow(AddrLong, IRB);
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense, I used ASpace because that's the shorthand used in Target/BPF and I did not register the fact it's different in the sanitizer passes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah, I see! TIL :-)
|
✅ With the latest revision this PR passed the C/C++ code formatter. |
108d542 to
f5f760a
Compare
f5f760a to
2bf2c66
Compare
|
Hi, I just realized I have to explicitly ask for this to get merged. Can we merge this and the other 3 Accepted PRs related to AddressSanitizer & BPF? |
|
@etsal Congratulations on having your first Pull Request (PR) merged into the LLVM Project! Your changes will be combined with recent changes from other authors, then tested by our build bots. If there is a problem with a build, you may receive a report in an email or a comment on this PR. Please check whether problems have been caused by your change specifically, as the builds can include changes from many authors. It is not uncommon for your change to be included in a build that fails due to someone else's changes, or infrastructure issues. How to do this, and the rest of the post-merge process, is covered in detail here. If your change does cause a problem, it may be reverted, or you can revert it yourself. This is a normal part of LLVM development. You can fix your changes and open a new PR to merge them again. If you don't get any reports, no action is required from you. Your changes are working as expected, well done! |
Thanks for the all fixes! I've merged three of the PRs; for the fourth PR in the series (#167770), I've enabled auto-merge (it will merge once CI completes). Sorry for the delay. |
|
No worries, thanks for the (very) quick response! |
…he shadow map (llvm#167772) The AddressSanitizer transform currently defaults to placing the shadow map in address space 0, but it is desirable for some targets (namely BPF) to select a different address space for the map. Add a compilation option for specifying the address space of the target.
…he shadow map (llvm#167772) The AddressSanitizer transform currently defaults to placing the shadow map in address space 0, but it is desirable for some targets (namely BPF) to select a different address space for the map. Add a compilation option for specifying the address space of the target.
The AddressSanitizer transform currently defaults to placing the shadow map in address space 0, but it is desirable for some targets (namely BPF) to select a different address space for the map. Add a compilation option for specifying the address space of the target.