public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
From: "jakub at gcc dot gnu.org" <gcc-bugzilla@gcc.gnu.org>
To: gcc-bugs@gcc.gnu.org
Subject: [Bug sanitizer/61293] asan can not find left buffer overflow of new[]-allocated buffer, frontend help needed
Date: Fri, 23 May 2014 14:14:00 -0000	[thread overview]
Message-ID: <bug-61293-4-dz7h34MH1t@http.gcc.gnu.org/bugzilla/> (raw)
In-Reply-To: <bug-61293-4@http.gcc.gnu.org/bugzilla/>

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61293

--- Comment #3 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
(In reply to Kostya Serebryany from comment #2)
> (In reply to Jakub Jelinek from comment #1)
> > IMNSHO you can't change the value of extra, that is an ABI issue,
> > and -fsanitize=address shouldn't be an ABI changing option.  Consider:
> > struct S { S (); ~S (); };
> > S *foo (int n) { return new S[n]; }
> > void bar (S *p) { delete [] p; }
> > int main () { bar (foo (5)); }
> > where bar is defined in a different compilation unit/library and something
> > is built with -fsanitize=address, something is not.
> > 
> > If the padding before structure is at least 64-bit, sure, instrumenting the
> > FE to put there an __asan_poison_memory_region call after the size is stored
> 
> yep
> 
> > there
> > and in delete[] again to __asan_unpoison_memory_region before reading the
> > size should not be that hard.
> 
> Yes, but a bit more preferable is to ignore the instructions
> reading the size instead of calling __asan_unpoison_memory_region. 
> Consider a case where the DTORs are accessing the array itself out of bounds.
> (We've seen similar things!!)
> That's a bit harder to implement though. 

Yeah, that makes it uglier, supposedly easiest (in GCC) would be to replace
the memory store to the area before the returned pointer with some magic
builtin user can't normally use, ditto for the load and add another builtin
right before the actual operator delete call, assign a new 0xeN? shadow value
for "the area before operator new", and in asan pass just expand those calls to
more code (the first one to a normal 0 check of shadow plus memory store,
followed by manually poisioning the shadow with the new magic constant, the
second one which would check if the shadow at that point is either 0 or the
0xeN? magic value, otherwise die, then load, and finally the last builtin that
would unpoison it.

> > For 32-bit code if the type doesn't need at least 64-bit alignment (again,
> > alignment of the type is an ABI thing), you are out of luck I'm afraid.
> Yea... We can theoretically request operator new to 
> return memory that is == 4 mod 8 for these cases. 

No, because you don't know when some type that will actually need 64-bit
alignment is used.  Because if you misalign the returned value, then such types
would not be aligned properly.


  parent reply	other threads:[~2014-05-23 14:14 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-05-23 13:08 [Bug sanitizer/61293] New: " kcc at gcc dot gnu.org
2014-05-23 13:26 ` [Bug sanitizer/61293] " jakub at gcc dot gnu.org
2014-05-23 13:51 ` kcc at gcc dot gnu.org
2014-05-23 14:14 ` jakub at gcc dot gnu.org [this message]
2014-08-28  1:19 ` kcc at gcc dot gnu.org

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-61293-4-dz7h34MH1t@http.gcc.gnu.org/bugzilla/ \
    --to=gcc-bugzilla@gcc.gnu.org \
    --cc=gcc-bugs@gcc.gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).