1 //===-- esan.cpp ----------------------------------------------------------===// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is distributed under the University of Illinois Open Source 6 // License. See LICENSE.TXT for details. 7 // 8 //===----------------------------------------------------------------------===// 9 // 10 // This file is a part of EfficiencySanitizer, a family of performance tuners. 11 // 12 // Main file (entry points) for the Esan run-time. 13 //===----------------------------------------------------------------------===// 14 15 #include "esan.h" 16 #include "esan_flags.h" 17 #include "esan_interface_internal.h" 18 #include "esan_shadow.h" 19 #include "cache_frag.h" 20 #include "sanitizer_common/sanitizer_common.h" 21 #include "sanitizer_common/sanitizer_flag_parser.h" 22 #include "sanitizer_common/sanitizer_flags.h" 23 #include "working_set.h" 24 25 // See comment below. 26 extern "C" { 27 extern void __cxa_atexit(void (*function)(void)); 28 } 29 30 namespace __esan { 31 32 bool EsanIsInitialized; 33 bool EsanDuringInit; 34 ShadowMapping Mapping; 35 36 // Different tools use different scales within the same shadow mapping scheme. 37 // The scale used here must match that used by the compiler instrumentation. 38 // This array is indexed by the ToolType enum. 39 static const uptr ShadowScale[] = { 40 0, // ESAN_None. 41 2, // ESAN_CacheFrag: 4B:1B, so 4 to 1 == >>2. 42 6, // ESAN_WorkingSet: 64B:1B, so 64 to 1 == >>6. 43 }; 44 45 // We are combining multiple performance tuning tools under the umbrella of 46 // one EfficiencySanitizer super-tool. Most of our tools have very similar 47 // memory access instrumentation, shadow memory mapping, libc interception, 48 // etc., and there is typically more shared code than distinct code. 49 // 50 // We are not willing to dispatch on tool dynamically in our fastpath 51 // instrumentation: thus, which tool to use is a static option selected 52 // at compile time and passed to __esan_init(). 53 // 54 // We are willing to pay the overhead of tool dispatch in the slowpath to more 55 // easily share code. We expect to only come here rarely. 56 // If this becomes a performance hit, we can add separate interface 57 // routines for each subtool (e.g., __esan_cache_frag_aligned_load_4). 58 // But for libc interceptors, we'll have to do one of the following: 59 // A) Add multiple-include support to sanitizer_common_interceptors.inc, 60 // instantiate it separately for each tool, and call the selected 61 // tool's intercept setup code. 62 // B) Build separate static runtime libraries, one for each tool. 63 // C) Completely split the tools into separate sanitizers. 64 65 void processRangeAccess(uptr PC, uptr Addr, int Size, bool IsWrite) { 66 VPrintf(3, "in esan::%s %p: %c %p %d\n", __FUNCTION__, PC, 67 IsWrite ? 'w' : 'r', Addr, Size); 68 if (__esan_which_tool == ESAN_CacheFrag) { 69 // TODO(bruening): add shadow mapping and update shadow bits here. 70 // We'll move this to cache_frag.cpp once we have something. 71 } else if (__esan_which_tool == ESAN_WorkingSet) { 72 processRangeAccessWorkingSet(PC, Addr, Size, IsWrite); 73 } 74 } 75 76 bool processSignal(int SigNum, void (*Handler)(int), void (**Result)(int)) { 77 if (__esan_which_tool == ESAN_WorkingSet) 78 return processWorkingSetSignal(SigNum, Handler, Result); 79 return true; 80 } 81 82 bool processSigaction(int SigNum, const void *Act, void *OldAct) { 83 if (__esan_which_tool == ESAN_WorkingSet) 84 return processWorkingSetSigaction(SigNum, Act, OldAct); 85 return true; 86 } 87 88 bool processSigprocmask(int How, void *Set, void *OldSet) { 89 if (__esan_which_tool == ESAN_WorkingSet) 90 return processWorkingSetSigprocmask(How, Set, OldSet); 91 return true; 92 } 93 94 #if SANITIZER_DEBUG 95 static bool verifyShadowScheme() { 96 // Sanity checks for our shadow mapping scheme. 97 uptr AppStart, AppEnd; 98 if (Verbosity() >= 3) { 99 for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) { 100 VPrintf(3, "App #%d: [%zx-%zx) (%zuGB)\n", i, AppStart, AppEnd, 101 (AppEnd - AppStart) >> 30); 102 } 103 } 104 for (int Scale = 0; Scale < 8; ++Scale) { 105 Mapping.initialize(Scale); 106 if (Verbosity() >= 3) { 107 VPrintf(3, "\nChecking scale %d\n", Scale); 108 uptr ShadowStart, ShadowEnd; 109 for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) { 110 VPrintf(3, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart, 111 ShadowEnd, (ShadowEnd - ShadowStart) >> 30); 112 } 113 for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) { 114 VPrintf(3, "Shadow(Shadow) #%d: [%zx-%zx)\n", i, 115 appToShadow(ShadowStart), appToShadow(ShadowEnd - 1)+1); 116 } 117 } 118 for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) { 119 DCHECK(isAppMem(AppStart)); 120 DCHECK(!isAppMem(AppStart - 1)); 121 DCHECK(isAppMem(AppEnd - 1)); 122 DCHECK(!isAppMem(AppEnd)); 123 DCHECK(!isShadowMem(AppStart)); 124 DCHECK(!isShadowMem(AppEnd - 1)); 125 DCHECK(isShadowMem(appToShadow(AppStart))); 126 DCHECK(isShadowMem(appToShadow(AppEnd - 1))); 127 // Double-shadow checks. 128 DCHECK(!isShadowMem(appToShadow(appToShadow(AppStart)))); 129 DCHECK(!isShadowMem(appToShadow(appToShadow(AppEnd - 1)))); 130 } 131 // Ensure no shadow regions overlap each other. 132 uptr ShadowAStart, ShadowBStart, ShadowAEnd, ShadowBEnd; 133 for (int i = 0; getShadowRegion(i, &ShadowAStart, &ShadowAEnd); ++i) { 134 for (int j = 0; getShadowRegion(j, &ShadowBStart, &ShadowBEnd); ++j) { 135 DCHECK(i == j || ShadowAStart >= ShadowBEnd || 136 ShadowAEnd <= ShadowBStart); 137 } 138 } 139 } 140 return true; 141 } 142 #endif 143 144 static void initializeShadow() { 145 verifyAddressSpace(); 146 147 DCHECK(verifyShadowScheme()); 148 149 Mapping.initialize(ShadowScale[__esan_which_tool]); 150 151 VPrintf(1, "Shadow scale=%d offset=%p\n", Mapping.Scale, Mapping.Offset); 152 153 uptr ShadowStart, ShadowEnd; 154 for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) { 155 VPrintf(1, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart, ShadowEnd, 156 (ShadowEnd - ShadowStart) >> 30); 157 158 uptr Map; 159 if (__esan_which_tool == ESAN_WorkingSet) { 160 // We want to identify all shadow pages that are touched so we start 161 // out inaccessible. 162 Map = (uptr)MmapFixedNoAccess(ShadowStart, ShadowEnd- ShadowStart, 163 "shadow"); 164 } else { 165 Map = (uptr)MmapFixedNoReserve(ShadowStart, ShadowEnd - ShadowStart, 166 "shadow"); 167 } 168 if (Map != ShadowStart) { 169 Printf("FATAL: EfficiencySanitizer failed to map its shadow memory.\n"); 170 Die(); 171 } 172 173 if (common_flags()->no_huge_pages_for_shadow) 174 NoHugePagesInRegion(ShadowStart, ShadowEnd - ShadowStart); 175 if (common_flags()->use_madv_dontdump) 176 DontDumpShadowMemory(ShadowStart, ShadowEnd - ShadowStart); 177 178 // TODO: Call MmapNoAccess() on in-between regions. 179 } 180 } 181 182 void initializeLibrary(ToolType Tool) { 183 // We assume there is only one thread during init, but we need to 184 // guard against double-init when we're (re-)called from an 185 // early interceptor. 186 if (EsanIsInitialized || EsanDuringInit) 187 return; 188 EsanDuringInit = true; 189 CHECK(Tool == __esan_which_tool); 190 SanitizerToolName = "EfficiencySanitizer"; 191 CacheBinaryName(); 192 initializeFlags(); 193 194 // Intercepting libc _exit or exit via COMMON_INTERCEPTOR_ON_EXIT only 195 // finalizes on an explicit exit call by the app. To handle a normal 196 // exit we register an atexit handler. 197 ::__cxa_atexit((void (*)())finalizeLibrary); 198 199 VPrintf(1, "in esan::%s\n", __FUNCTION__); 200 if (__esan_which_tool <= ESAN_None || __esan_which_tool >= ESAN_Max) { 201 Printf("ERROR: unknown tool %d requested\n", __esan_which_tool); 202 Die(); 203 } 204 205 initializeShadow(); 206 if (__esan_which_tool == ESAN_WorkingSet) 207 initializeShadowWorkingSet(); 208 209 initializeInterceptors(); 210 211 if (__esan_which_tool == ESAN_CacheFrag) { 212 initializeCacheFrag(); 213 } else if (__esan_which_tool == ESAN_WorkingSet) { 214 initializeWorkingSet(); 215 } 216 217 EsanIsInitialized = true; 218 EsanDuringInit = false; 219 } 220 221 int finalizeLibrary() { 222 VPrintf(1, "in esan::%s\n", __FUNCTION__); 223 if (__esan_which_tool == ESAN_CacheFrag) { 224 return finalizeCacheFrag(); 225 } else if (__esan_which_tool == ESAN_WorkingSet) { 226 return finalizeWorkingSet(); 227 } 228 return 0; 229 } 230 231 void reportResults() { 232 VPrintf(1, "in esan::%s\n", __FUNCTION__); 233 if (__esan_which_tool == ESAN_CacheFrag) { 234 return reportCacheFrag(); 235 } else if (__esan_which_tool == ESAN_WorkingSet) { 236 return reportWorkingSet(); 237 } 238 } 239 240 void processCompilationUnitInit(void *Ptr) { 241 VPrintf(2, "in esan::%s\n", __FUNCTION__); 242 if (__esan_which_tool == ESAN_CacheFrag) { 243 DCHECK(Ptr != nullptr); 244 processCacheFragCompilationUnitInit(Ptr); 245 } else { 246 DCHECK(Ptr == nullptr); 247 } 248 } 249 250 // This is called when the containing module is unloaded. 251 // For the main executable module, this is called after finalizeLibrary. 252 void processCompilationUnitExit(void *Ptr) { 253 VPrintf(2, "in esan::%s\n", __FUNCTION__); 254 if (__esan_which_tool == ESAN_CacheFrag) { 255 DCHECK(Ptr != nullptr); 256 processCacheFragCompilationUnitExit(Ptr); 257 } else { 258 DCHECK(Ptr == nullptr); 259 } 260 } 261 262 } // namespace __esan 263