| //===-- esan.cpp ----------------------------------------------------------===// |
| // |
| // The LLVM Compiler Infrastructure |
| // |
| // This file is distributed under the University of Illinois Open Source |
| // License. See LICENSE.TXT for details. |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // This file is a part of EfficiencySanitizer, a family of performance tuners. |
| // |
| // Main file (entry points) for the Esan run-time. |
| //===----------------------------------------------------------------------===// |
| |
| #include "esan.h" |
| #include "esan_flags.h" |
| #include "esan_interface_internal.h" |
| #include "esan_shadow.h" |
| #include "cache_frag.h" |
| #include "sanitizer_common/sanitizer_common.h" |
| #include "sanitizer_common/sanitizer_flag_parser.h" |
| #include "sanitizer_common/sanitizer_flags.h" |
| #include "working_set.h" |
| |
| // See comment below. |
| extern "C" { |
| extern void __cxa_atexit(void (*function)(void)); |
| } |
| |
| namespace __esan { |
| |
| bool EsanIsInitialized; |
| bool EsanDuringInit; |
| ShadowMapping Mapping; |
| |
| // Different tools use different scales within the same shadow mapping scheme. |
| // The scale used here must match that used by the compiler instrumentation. |
| // This array is indexed by the ToolType enum. |
| static const uptr ShadowScale[] = { |
| 0, // ESAN_None. |
| 2, // ESAN_CacheFrag: 4B:1B, so 4 to 1 == >>2. |
| 6, // ESAN_WorkingSet: 64B:1B, so 64 to 1 == >>6. |
| }; |
| |
| // We are combining multiple performance tuning tools under the umbrella of |
| // one EfficiencySanitizer super-tool. Most of our tools have very similar |
| // memory access instrumentation, shadow memory mapping, libc interception, |
| // etc., and there is typically more shared code than distinct code. |
| // |
| // We are not willing to dispatch on tool dynamically in our fastpath |
| // instrumentation: thus, which tool to use is a static option selected |
| // at compile time and passed to __esan_init(). |
| // |
| // We are willing to pay the overhead of tool dispatch in the slowpath to more |
| // easily share code. We expect to only come here rarely. |
| // If this becomes a performance hit, we can add separate interface |
| // routines for each subtool (e.g., __esan_cache_frag_aligned_load_4). |
| // But for libc interceptors, we'll have to do one of the following: |
| // A) Add multiple-include support to sanitizer_common_interceptors.inc, |
| // instantiate it separately for each tool, and call the selected |
| // tool's intercept setup code. |
| // B) Build separate static runtime libraries, one for each tool. |
| // C) Completely split the tools into separate sanitizers. |
| |
| void processRangeAccess(uptr PC, uptr Addr, int Size, bool IsWrite) { |
| VPrintf(3, "in esan::%s %p: %c %p %d\n", __FUNCTION__, PC, |
| IsWrite ? 'w' : 'r', Addr, Size); |
| if (__esan_which_tool == ESAN_CacheFrag) { |
| // TODO(bruening): add shadow mapping and update shadow bits here. |
| // We'll move this to cache_frag.cpp once we have something. |
| } else if (__esan_which_tool == ESAN_WorkingSet) { |
| processRangeAccessWorkingSet(PC, Addr, Size, IsWrite); |
| } |
| } |
| |
| bool processSignal(int SigNum, void (*Handler)(int), void (**Result)(int)) { |
| if (__esan_which_tool == ESAN_WorkingSet) |
| return processWorkingSetSignal(SigNum, Handler, Result); |
| return true; |
| } |
| |
| bool processSigaction(int SigNum, const void *Act, void *OldAct) { |
| if (__esan_which_tool == ESAN_WorkingSet) |
| return processWorkingSetSigaction(SigNum, Act, OldAct); |
| return true; |
| } |
| |
| bool processSigprocmask(int How, void *Set, void *OldSet) { |
| if (__esan_which_tool == ESAN_WorkingSet) |
| return processWorkingSetSigprocmask(How, Set, OldSet); |
| return true; |
| } |
| |
| #if SANITIZER_DEBUG |
| static bool verifyShadowScheme() { |
| // Sanity checks for our shadow mapping scheme. |
| uptr AppStart, AppEnd; |
| if (Verbosity() >= 3) { |
| for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) { |
| VPrintf(3, "App #%d: [%zx-%zx) (%zuGB)\n", i, AppStart, AppEnd, |
| (AppEnd - AppStart) >> 30); |
| } |
| } |
| for (int Scale = 0; Scale < 8; ++Scale) { |
| Mapping.initialize(Scale); |
| if (Verbosity() >= 3) { |
| VPrintf(3, "\nChecking scale %d\n", Scale); |
| uptr ShadowStart, ShadowEnd; |
| for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) { |
| VPrintf(3, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart, |
| ShadowEnd, (ShadowEnd - ShadowStart) >> 30); |
| } |
| for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) { |
| VPrintf(3, "Shadow(Shadow) #%d: [%zx-%zx)\n", i, |
| appToShadow(ShadowStart), appToShadow(ShadowEnd - 1)+1); |
| } |
| } |
| for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) { |
| DCHECK(isAppMem(AppStart)); |
| DCHECK(!isAppMem(AppStart - 1)); |
| DCHECK(isAppMem(AppEnd - 1)); |
| DCHECK(!isAppMem(AppEnd)); |
| DCHECK(!isShadowMem(AppStart)); |
| DCHECK(!isShadowMem(AppEnd - 1)); |
| DCHECK(isShadowMem(appToShadow(AppStart))); |
| DCHECK(isShadowMem(appToShadow(AppEnd - 1))); |
| // Double-shadow checks. |
| DCHECK(!isShadowMem(appToShadow(appToShadow(AppStart)))); |
| DCHECK(!isShadowMem(appToShadow(appToShadow(AppEnd - 1)))); |
| } |
| // Ensure no shadow regions overlap each other. |
| uptr ShadowAStart, ShadowBStart, ShadowAEnd, ShadowBEnd; |
| for (int i = 0; getShadowRegion(i, &ShadowAStart, &ShadowAEnd); ++i) { |
| for (int j = 0; getShadowRegion(j, &ShadowBStart, &ShadowBEnd); ++j) { |
| DCHECK(i == j || ShadowAStart >= ShadowBEnd || |
| ShadowAEnd <= ShadowBStart); |
| } |
| } |
| } |
| return true; |
| } |
| #endif |
| |
| uptr VmaSize; |
| |
| static void initializeShadow() { |
| verifyAddressSpace(); |
| |
| // This is based on the assumption that the intial stack is always allocated |
| // in the topmost segment of the user address space and the assumption |
| // holds true on all the platforms currently supported. |
| VmaSize = |
| (MostSignificantSetBitIndex(GET_CURRENT_FRAME()) + 1); |
| |
| DCHECK(verifyShadowScheme()); |
| |
| Mapping.initialize(ShadowScale[__esan_which_tool]); |
| |
| VPrintf(1, "Shadow scale=%d offset=%p\n", Mapping.Scale, Mapping.Offset); |
| |
| uptr ShadowStart, ShadowEnd; |
| for (int i = 0; getShadowRegion(i, &ShadowStart, &ShadowEnd); ++i) { |
| VPrintf(1, "Shadow #%d: [%zx-%zx) (%zuGB)\n", i, ShadowStart, ShadowEnd, |
| (ShadowEnd - ShadowStart) >> 30); |
| |
| uptr Map = 0; |
| if (__esan_which_tool == ESAN_WorkingSet) { |
| // We want to identify all shadow pages that are touched so we start |
| // out inaccessible. |
| Map = (uptr)MmapFixedNoAccess(ShadowStart, ShadowEnd- ShadowStart, |
| "shadow"); |
| } else { |
| if (MmapFixedNoReserve(ShadowStart, ShadowEnd - ShadowStart, "shadow")) |
| Map = ShadowStart; |
| } |
| if (Map != ShadowStart) { |
| Printf("FATAL: EfficiencySanitizer failed to map its shadow memory.\n"); |
| Die(); |
| } |
| |
| if (common_flags()->no_huge_pages_for_shadow) |
| NoHugePagesInRegion(ShadowStart, ShadowEnd - ShadowStart); |
| if (common_flags()->use_madv_dontdump) |
| DontDumpShadowMemory(ShadowStart, ShadowEnd - ShadowStart); |
| |
| // TODO: Call MmapNoAccess() on in-between regions. |
| } |
| } |
| |
| void initializeLibrary(ToolType Tool) { |
| // We assume there is only one thread during init, but we need to |
| // guard against double-init when we're (re-)called from an |
| // early interceptor. |
| if (EsanIsInitialized || EsanDuringInit) |
| return; |
| EsanDuringInit = true; |
| CHECK(Tool == __esan_which_tool); |
| SanitizerToolName = "EfficiencySanitizer"; |
| CacheBinaryName(); |
| initializeFlags(); |
| |
| // Intercepting libc _exit or exit via COMMON_INTERCEPTOR_ON_EXIT only |
| // finalizes on an explicit exit call by the app. To handle a normal |
| // exit we register an atexit handler. |
| ::__cxa_atexit((void (*)())finalizeLibrary); |
| |
| VPrintf(1, "in esan::%s\n", __FUNCTION__); |
| if (__esan_which_tool <= ESAN_None || __esan_which_tool >= ESAN_Max) { |
| Printf("ERROR: unknown tool %d requested\n", __esan_which_tool); |
| Die(); |
| } |
| |
| initializeShadow(); |
| if (__esan_which_tool == ESAN_WorkingSet) |
| initializeShadowWorkingSet(); |
| |
| initializeInterceptors(); |
| |
| if (__esan_which_tool == ESAN_CacheFrag) { |
| initializeCacheFrag(); |
| } else if (__esan_which_tool == ESAN_WorkingSet) { |
| initializeWorkingSet(); |
| } |
| |
| EsanIsInitialized = true; |
| EsanDuringInit = false; |
| } |
| |
| int finalizeLibrary() { |
| VPrintf(1, "in esan::%s\n", __FUNCTION__); |
| if (__esan_which_tool == ESAN_CacheFrag) { |
| return finalizeCacheFrag(); |
| } else if (__esan_which_tool == ESAN_WorkingSet) { |
| return finalizeWorkingSet(); |
| } |
| return 0; |
| } |
| |
| void reportResults() { |
| VPrintf(1, "in esan::%s\n", __FUNCTION__); |
| if (__esan_which_tool == ESAN_CacheFrag) { |
| return reportCacheFrag(); |
| } else if (__esan_which_tool == ESAN_WorkingSet) { |
| return reportWorkingSet(); |
| } |
| } |
| |
| void processCompilationUnitInit(void *Ptr) { |
| VPrintf(2, "in esan::%s\n", __FUNCTION__); |
| if (__esan_which_tool == ESAN_CacheFrag) { |
| DCHECK(Ptr != nullptr); |
| processCacheFragCompilationUnitInit(Ptr); |
| } else { |
| DCHECK(Ptr == nullptr); |
| } |
| } |
| |
| // This is called when the containing module is unloaded. |
| // For the main executable module, this is called after finalizeLibrary. |
| void processCompilationUnitExit(void *Ptr) { |
| VPrintf(2, "in esan::%s\n", __FUNCTION__); |
| if (__esan_which_tool == ESAN_CacheFrag) { |
| DCHECK(Ptr != nullptr); |
| processCacheFragCompilationUnitExit(Ptr); |
| } else { |
| DCHECK(Ptr == nullptr); |
| } |
| } |
| |
| unsigned int getSampleCount() { |
| VPrintf(1, "in esan::%s\n", __FUNCTION__); |
| if (__esan_which_tool == ESAN_WorkingSet) { |
| return getSampleCountWorkingSet(); |
| } |
| return 0; |
| } |
| |
| } // namespace __esan |