[llvm-dev] Inexplicable ASAN report. Code generation bug?
Kostya Serebryany via llvm-dev
llvm-dev at lists.llvm.org
Mon Nov 16 17:52:06 PST 2015
Moving to https://llvm.org/bugs/show_bug.cgi?id=25550
On Mon, Nov 16, 2015 at 5:15 PM, Kostya Serebryany <kcc at google.com> wrote:
> BTW, this is very similar to
> https://github.com/google/sanitizers/issues/20 (fixed long ago),
> apparently we need to add another check to gvn, similar to the one we
> already have.
> Or figure out why this one does not work...
>
> in lib/Analysis/MemoryDependenceAnalysis.cpp:
> 346 if (LIOffs + NewLoadByteSize > MemLocEnd &&
> 347 LI->getParent()->getParent()->hasFnAttribute(
> 348 Attribute::SanitizeAddress))
> 349 // We will be reading past the location accessed by the
> original program.
> 350 // While this is safe in a regular build, Address Safety
> analysis tools
> 351 // may start reporting false warnings. So, don't do widening.
> 352 return 0;
>
>
>
> On Mon, Nov 16, 2015 at 4:59 PM, Kostya Serebryany <kcc at google.com> wrote:
>
>> Confirmed.
>>
>>
>> A smaller repro:
>>
>> typedef union {
>> short q;
>> struct {
>> short x;
>> short y;
>> int for_alignment;
>> } w;
>> } U;
>> char *buf = new char[2];
>> int main() {
>> buf[0] = buf[1] = 0x0;
>> U *u = (U *)buf;
>> return u->q == 0 ? 0 : u->w.y;
>> }
>>
>>
>> With O2 asan produces false positive and with -O1/-O0 it does not.
>> One more case where an optimization is hostile to asan...
>> Looking.
>>
>>
>>
>> On Sat, Nov 14, 2015 at 9:09 AM, Greg Stark <stark at mit.edu> wrote:
>>
>>> On Thu, Nov 12, 2015 at 8:42 PM, Kostya Serebryany <kcc at google.com>
>>> wrote:
>>> > 2 questions:
>>> > - Do you see this with the fresh llvm trunk?
>>> > - Can you prepare a minimized example?
>>>
>>> Pretty recent, I updated a couple days ago. I tried to minimize the
>>> attached but at the same time I didn't want to lose too many unions
>>> and casts in case it didn't trigger any more.
>>>
>>> $ clang -fsanitize=address -Wall numeric-asan-test.c
>>> $ ./a.out
>>> VARSIZE 6
>>> NDIGITS 0
>>> WEIGHT 0
>>> SIGN 0
>>> DSCALE 0
>>> $ clang -fsanitize=address -O2 -Wall numeric-asan-test.c
>>> $ ./a.out
>>> VARSIZE 6
>>> =================================================================
>>> ==19982==ERROR: AddressSanitizer: heap-buffer-overflow on address
>>> 0x60200000eff4 at pc 0x0000004d4986 bp 0x7ffe14e2cb90 sp
>>> 0x7ffe14e2cb88
>>> READ of size 4 at 0x60200000eff4 thread T0
>>> #0 0x4d4985 in main (/home/stark/src/a.out+0x4d4985)
>>> #1 0x7f6360f40b44 in __libc_start_main
>>> /tmp/buildd/glibc-2.19/csu/libc-start.c:287
>>> #2 0x41a935 in _start (/home/stark/src/a.out+0x41a935)
>>>
>>> 0x60200000eff6 is located 0 bytes to the right of 6-byte region
>>> [0x60200000eff0,0x60200000eff6)
>>> allocated by thread T0 here:
>>> #0 0x4abceb in __interceptor_malloc
>>>
>>> /home/stark/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:40:3
>>> #1 0x4d479e in main (/home/stark/src/a.out+0x4d479e)
>>>
>>> SUMMARY: AddressSanitizer: heap-buffer-overflow
>>> (/home/stark/src/a.out+0x4d4985) in main
>>> Shadow bytes around the buggy address:
>>> 0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9dd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9de0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> =>0x0c047fff9df0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa[06]fa
>>> 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> 0x0c047fff9e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
>>> Shadow byte legend (one shadow byte represents 8 application bytes):
>>> Addressable: 00
>>> Partially addressable: 01 02 03 04 05 06 07
>>> Heap left redzone: fa
>>> Heap right redzone: fb
>>> Freed heap region: fd
>>> Stack left redzone: f1
>>> Stack mid redzone: f2
>>> Stack right redzone: f3
>>> Stack partial redzone: f4
>>> Stack after return: f5
>>> Stack use after scope: f8
>>> Global redzone: f9
>>> Global init order: f6
>>> Poisoned by user: f7
>>> Container overflow: fc
>>> Array cookie: ac
>>> Intra object redzone: bb
>>> ASan internal: fe
>>> Left alloca redzone: ca
>>> Right alloca redzone: cb
>>> ==19982==ABORTING
>>>
>>>
>>>
>>> --
>>> greg
>>>
>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20151116/281276e5/attachment-0001.html>
More information about the llvm-dev
mailing list