1 //===- Transforms/Instrumentation.h - Instrumentation passes ----*- C++ -*-===//
3 // The LLVM Compiler Infrastructure
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
8 //===----------------------------------------------------------------------===//
10 // This file defines constructor functions for instrumentation passes.
12 //===----------------------------------------------------------------------===//
14 #ifndef LLVM_TRANSFORMS_INSTRUMENTATION_H
15 #define LLVM_TRANSFORMS_INSTRUMENTATION_H
17 #include "llvm/ADT/StringRef.h"
18 #include "llvm/IR/BasicBlock.h"
21 #if defined(__GNUC__) && defined(__linux__) && !defined(ANDROID)
22 inline void *getDFSanArgTLSPtrForJIT() {
23 extern __thread __attribute__((tls_model("initial-exec")))
24 void *__dfsan_arg_tls;
25 return (void *)&__dfsan_arg_tls;
28 inline void *getDFSanRetValTLSPtrForJIT() {
29 extern __thread __attribute__((tls_model("initial-exec")))
30 void *__dfsan_retval_tls;
31 return (void *)&__dfsan_retval_tls;
39 /// Instrumentation passes often insert conditional checks into entry blocks.
40 /// Call this function before splitting the entry block to move instructions
41 /// that must remain in the entry block up before the split point. Static
42 /// allocas and llvm.localescape calls, for example, must remain in the entry
44 BasicBlock::iterator PrepareToSplitEntryBlock(BasicBlock &BB,
45 BasicBlock::iterator IP);
50 // Insert GCOV profiling instrumentation
52 static GCOVOptions getDefault();
54 // Specify whether to emit .gcno files.
57 // Specify whether to modify the program to emit .gcda files when run.
60 // A four-byte version string. The meaning of a version string is described in
64 // Emit a "cfg checksum" that follows the "line number checksum" of a
65 // function. This affects both .gcno and .gcda files.
68 // Add the 'noredzone' attribute to added runtime library calls.
71 // Emit the name of the function in the .gcda files. This is redundant, as
72 // the function identifier can be used to find the name from the .gcno file.
73 bool FunctionNamesInData;
75 // Emit the exit block immediately after the start block, rather than after
76 // all of the function body's blocks.
77 bool ExitBlockBeforeBody;
79 ModulePass *createGCOVProfilerPass(const GCOVOptions &Options =
80 GCOVOptions::getDefault());
82 /// Options for the frontend instrumentation based profiling pass.
83 struct InstrProfOptions {
84 InstrProfOptions() : NoRedZone(false) {}
86 // Add the 'noredzone' attribute to added runtime library calls.
89 // Name of the profile file to use as output
90 std::string InstrProfileOutput;
93 /// Insert frontend instrumentation based profiling.
94 ModulePass *createInstrProfilingPass(
95 const InstrProfOptions &Options = InstrProfOptions());
97 // Insert AddressSanitizer (address sanity checking) instrumentation
98 FunctionPass *createAddressSanitizerFunctionPass(bool CompileKernel = false,
99 bool Recover = false);
100 ModulePass *createAddressSanitizerModulePass(bool CompileKernel = false,
101 bool Recover = false);
103 // Insert MemorySanitizer instrumentation (detection of uninitialized reads)
104 FunctionPass *createMemorySanitizerPass(int TrackOrigins = 0);
106 // Insert ThreadSanitizer (race detection) instrumentation
107 FunctionPass *createThreadSanitizerPass();
109 // Insert DataFlowSanitizer (dynamic data flow analysis) instrumentation
110 ModulePass *createDataFlowSanitizerPass(
111 const std::vector<std::string> &ABIListFiles = std::vector<std::string>(),
112 void *(*getArgTLS)() = nullptr, void *(*getRetValTLS)() = nullptr);
114 // Options for sanitizer coverage instrumentation.
115 struct SanitizerCoverageOptions {
116 SanitizerCoverageOptions()
117 : CoverageType(SCK_None), IndirectCalls(false), TraceBB(false),
118 TraceCmp(false), Use8bitCounters(false) {}
129 bool Use8bitCounters;
132 // Insert SanitizerCoverage instrumentation.
133 ModulePass *createSanitizerCoverageModulePass(
134 const SanitizerCoverageOptions &Options = SanitizerCoverageOptions());
136 #if defined(__GNUC__) && defined(__linux__) && !defined(ANDROID)
137 inline ModulePass *createDataFlowSanitizerPassForJIT(
138 const std::vector<std::string> &ABIListFiles = std::vector<std::string>()) {
139 return createDataFlowSanitizerPass(ABIListFiles, getDFSanArgTLSPtrForJIT,
140 getDFSanRetValTLSPtrForJIT);
144 // BoundsChecking - This pass instruments the code to perform run-time bounds
145 // checking on loads, stores, and other memory intrinsics.
146 FunctionPass *createBoundsCheckingPass();
148 /// \brief This pass splits the stack into a safe stack and an unsafe stack to
149 /// protect against stack-based overflow vulnerabilities.
150 FunctionPass *createSafeStackPass(const TargetMachine *TM = nullptr);
152 } // End llvm namespace