On 06/30/2017 04:03 PM, Michael Matz wrote: > Hi, > > On Wed, 28 Jun 2017, Martin Liška wrote: > >> Thanks for the review. I'm not so familiar with RTL, but hopefully new >> version of the patch should do it properly. Idea is to come up with a >> new asan_stack_birth_insn that points after place where stack is ready >> to use (when one uses use-after-return). And then in function.c >> static_chain_decl and nonlocal_goto_save_area expansion is generated to >> a new sequence and the sequence is put after the asan_stack_birth_insn. > > That has the same problem. > > The code for function start is conceptually like this: > > entry_point: > setup return space: > on some targets the address of the return buffer is passed in a > certain incoming arg (i.e. it's like an argument) > setup arguments: > store away incoming registers into pseudo > load stack slot arguments (or put them there, all target dependend) > * point 1 where you insert code * > setup static chain: > conceptually this is just a hidden additional function argument > setup nonlocal goto save area > > If you simply create any other code inside this sequence you potentially > have the problem of clobbering any of the incoming hardregs. In simple > examples you might not notice when the register allocator heeds the > hardreg uses, but if you for instance call other functions in there you > most likely clobber some. E.g. r10 (the incoming static chain pointer on > x86-64) isn't preserved across function calls. So if you call a function > at point 1 above you clobber r10, but the code for setting up the static > chain needs it as input.
Thanks Michael. Now I got it as I understand the problematic of usage of r10 register. Actually it's easy to come up with a test-case that breaks that: $ cat /home/marxin/Programming/gcc/gcc/testsuite/gcc.dg/asan/pr81186.c /* PR sanitizer/81186 */ /* { dg-do run } */ int main () { __label__ l; void f () { int a[123]; goto l; } f (); l: return 0; } where: f.2139: .LASANPC1: .LFB1: .cfi_startproc pushq %rbp .cfi_def_cfa_offset 16 .cfi_offset 6, -16 movq %rsp, %rbp .cfi_def_cfa_register 6 pushq %rbx subq $600, %rsp .cfi_offset 3, -24 leaq -592(%rbp), %rbx cmpl $0, __asan_option_detect_stack_use_after_return(%rip) je .L1 movl $576, %edi call __asan_stack_malloc_4 <--- here clobbering of r10 happens testq %rax, %rax je .L1 movq %rax, %rbx .L1: movq %r10, %rdx <- use after it's clobbered movq %r10, -600(%rbp) movq $1102416563, (%rbx) > > So you need to find some other solution of setting up the stack for ASAN. > And it'd be best if that solution doesn't require inserting code inside > the above sequence of parameter setup instructions, and you certainly > can't call any functions inside that sequence. It might mean that you > can't track the static chain place or the nonlocal goto save area. You > also don't track the parameter stack slots, right? IIUC parameter stack slots are not sanitized. I will think about it more ;) Martin > > > Ciao, > Michael. >> >>> >>> Also if you put something in front of the static_chain_decl initialization >>> (as you do if you move the parm_birth_insn in front of it) you'd have to >>> make sure that the incoming hidding parameter containing the static chain >>> (r10 on x86_64) isn't clobbered from function start up to that point. >>> So that won't work either generally. >>> >>> I don't know what exactly is the issue with calling >>> __asan_handle_no_return before the other instructions emitted by >>> expand_used_vars. Either it shouldn't be called for the static chain >>> (i.e. not instrumented) or whatever setup asan needs needs to happen in >>> front of the static chain setup, but then without clobbering the incoming >>> static chain param (!). >> >> Here I need to have FRAME variable to be sanitized as seen in pr78541.c >> and pr78541-2.c test-cases. >> >> Thoughts? >> Thanks, >> Martin >> >>> >>> >>> Ciao, >>> Michael. >>>> >>>> expanded cfun->static_chain_decl: >>>> >>>> (note 1 0 5 NOTE_INSN_DELETED) >>>> (note 5 1 2 2 [bb 2] NOTE_INSN_BASIC_BLOCK) >>>> (insn 2 5 3 2 (set (reg/f:DI 88 [ CHAIN.1 ]) >>>> (reg:DI 39 r10 [ CHAIN.1 ])) "pr81186.c":5 -1 >>>> (nil)) >>>> (insn 3 2 4 2 (set (mem/c:DI (plus:DI (reg/f:DI 82 virtual-stack-vars) >>>> (const_int -8 [0xfffffffffffffff8])) [0 S8 A64]) >>>> (reg:DI 39 r10 [ CHAIN.1 ])) "pr81186.c":5 -1 >>>> (nil)) >>>> (note 4 3 7 2 NOTE_INSN_FUNCTION_BEG) >>>> (insn 7 4 8 2 (set (reg/f:DI 87 [ _2 ]) >>>> (reg/f:DI 88 [ CHAIN.1 ])) "pr81186.c":5 -1 >>>> (nil)) >>>> (call_insn 8 7 9 2 (call (mem:QI (symbol_ref:DI >>>> ("__asan_handle_no_return") [flags 0x41] <function_decl 0x2ba005ad5d00 >>>> __builtin___asan_handle_no_return>) [0 __builtin___asan_handle_no_return >>>> S1 A8]) >>>> (const_int 0 [0])) "pr81186.c":5 -1 >>>> (expr_list:REG_EH_REGION (const_int 0 [0]) >>>> (nil)) >>>> (nil)) >>>> >>>> expanded cfun->nonlocal_goto_save_area: >>>> >>>> (note 1 0 34 NOTE_INSN_DELETED) >>>> (note 34 1 31 2 [bb 2] NOTE_INSN_BASIC_BLOCK) >>>> (insn 31 34 32 2 (set (mem/f/c:DI (plus:DI (reg:DI 95) >>>> (const_int -64 [0xffffffffffffffc0])) [4 >>>> FRAME.0.__nl_goto_buf+0 S8 A64]) >>>> (reg/f:DI 82 virtual-stack-vars)) "pr81186.c":3 -1 >>>> (nil)) >>>> (insn 32 31 2 2 (set (mem/f/c:DI (plus:DI (reg:DI 95) >>>> (const_int -56 [0xffffffffffffffc8])) [4 >>>> FRAME.0.__nl_goto_buf+8 S8 A64]) >>>> (reg/f:DI 7 sp)) "pr81186.c":3 -1 >>>> (nil)) >>>> (insn 2 32 3 2 (parallel [ >>>> (set (reg:DI 96) >>>> (plus:DI (reg/f:DI 82 virtual-stack-vars) >>>> (const_int -96 [0xffffffffffffffa0]))) >>>> (clobber (reg:CC 17 flags)) >>>> ]) "pr81186.c":3 -1 >>>> (nil)) >>>> (insn 3 2 4 2 (set (reg:DI 97) >>>> (reg:DI 96)) "pr81186.c":3 -1 >>>> (nil)) >>>> (insn 4 3 5 2 (set (reg:CCZ 17 flags) >>>> (compare:CCZ (mem/c:SI (symbol_ref:DI >>>> ("__asan_option_detect_stack_use_after_return") [flags 0x40] <var_decl >>>> 0x2ba005b5b750 __asan_option_detect_stack_use_after_return>) [5 >>>> __asan_option_detect_stack_use_after_return+0 S4 A32]) >>>> (const_int 0 [0]))) "pr81186.c":3 -1 >>>> (nil)) >>>> >>>> And thus I suggest to move both these instrumentations after >>>> NOTE_INSN_FUNCTION_BEG. >>>> Patch can bootstrap on ppc64le-redhat-linux and survives regression tests. >>>> >>>> Ready to be installed? >>>> Martin >>>> >>>> gcc/ChangeLog: >>>> >>>> 2017-06-27 Martin Liska <mli...@suse.cz> >>>> >>>> PR sanitize/81186 >>>> * function.c (expand_function_start): Move static chain and non-local >>>> goto init after NOTE_INSN_FUNCTION_BEG. >>>> >>>> gcc/testsuite/ChangeLog: >>>> >>>> 2017-06-27 Martin Liska <mli...@suse.cz> >>>> >>>> PR sanitize/81186 >>>> * gcc.dg/asan/pr81186.c: New test. >>>> --- >>>> gcc/function.c | 18 +++++++++--------- >>>> gcc/testsuite/gcc.dg/asan/pr81186.c | 13 +++++++++++++ >>>> 2 files changed, 22 insertions(+), 9 deletions(-) >>>> create mode 100644 gcc/testsuite/gcc.dg/asan/pr81186.c >>>> >>>> >>