blob: e9db7dcb3e5f4bd028469be7a6d0c49c9bf1700b [file] [log] [blame]
Alexander Popov10e9ae92018-08-17 01:16:59 +03001/*
2 * Copyright 2011-2017 by the PaX Team <pageexec@freemail.hu>
3 * Modified by Alexander Popov <alex.popov@linux.com>
4 * Licensed under the GPL v2
5 *
6 * Note: the choice of the license means that the compilation process is
7 * NOT 'eligible' as defined by gcc's library exception to the GPL v3,
8 * but for the kernel it doesn't matter since it doesn't link against
9 * any of the gcc libraries
10 *
11 * This gcc plugin is needed for tracking the lowest border of the kernel stack.
12 * It instruments the kernel code inserting stackleak_track_stack() calls:
13 * - after alloca();
14 * - for the functions with a stack frame size greater than or equal
15 * to the "track-min-size" plugin parameter.
16 *
17 * This plugin is ported from grsecurity/PaX. For more information see:
18 * https://grsecurity.net/
19 * https://pax.grsecurity.net/
20 *
21 * Debugging:
22 * - use fprintf() to stderr, debug_generic_expr(), debug_gimple_stmt(),
Alexander Popovfeee1b82020-06-24 15:33:29 +030023 * print_rtl_single() and debug_rtx();
Alexander Popov10e9ae92018-08-17 01:16:59 +030024 * - add "-fdump-tree-all -fdump-rtl-all" to the plugin CFLAGS in
25 * Makefile.gcc-plugins to see the verbose dumps of the gcc passes;
26 * - use gcc -E to understand the preprocessing shenanigans;
27 * - use gcc with enabled CFG/GIMPLE/SSA verification (--enable-checking).
28 */
29
30#include "gcc-common.h"
31
32__visible int plugin_is_GPL_compatible;
33
34static int track_frame_size = -1;
Alexander Popovfeee1b82020-06-24 15:33:29 +030035static bool build_for_x86 = false;
Alexander Popov10e9ae92018-08-17 01:16:59 +030036static const char track_function[] = "stackleak_track_stack";
Alexander Popov8dd70542020-06-24 15:33:30 +030037static bool disable = false;
38static bool verbose = false;
Alexander Popov10e9ae92018-08-17 01:16:59 +030039
40/*
41 * Mark these global variables (roots) for gcc garbage collector since
42 * they point to the garbage-collected memory.
43 */
44static GTY(()) tree track_function_decl;
45
46static struct plugin_info stackleak_plugin_info = {
47 .version = "201707101337",
48 .help = "track-min-size=nn\ttrack stack for functions with a stack frame size >= nn bytes\n"
Alexander Popovfeee1b82020-06-24 15:33:29 +030049 "arch=target_arch\tspecify target build arch\n"
Alexander Popov10e9ae92018-08-17 01:16:59 +030050 "disable\t\tdo not activate the plugin\n"
Alexander Popov8dd70542020-06-24 15:33:30 +030051 "verbose\t\tprint info about the instrumentation\n"
Alexander Popov10e9ae92018-08-17 01:16:59 +030052};
53
Alexander Popovfeee1b82020-06-24 15:33:29 +030054static void add_stack_tracking_gcall(gimple_stmt_iterator *gsi, bool after)
Alexander Popov10e9ae92018-08-17 01:16:59 +030055{
56 gimple stmt;
Alexander Popovfeee1b82020-06-24 15:33:29 +030057 gcall *gimple_call;
Alexander Popov10e9ae92018-08-17 01:16:59 +030058 cgraph_node_ptr node;
Alexander Popov10e9ae92018-08-17 01:16:59 +030059 basic_block bb;
60
Alexander Popovfeee1b82020-06-24 15:33:29 +030061 /* Insert calling stackleak_track_stack() */
Alexander Popov10e9ae92018-08-17 01:16:59 +030062 stmt = gimple_build_call(track_function_decl, 0);
Alexander Popovfeee1b82020-06-24 15:33:29 +030063 gimple_call = as_a_gcall(stmt);
64 if (after)
65 gsi_insert_after(gsi, gimple_call, GSI_CONTINUE_LINKING);
66 else
67 gsi_insert_before(gsi, gimple_call, GSI_SAME_STMT);
Alexander Popov10e9ae92018-08-17 01:16:59 +030068
69 /* Update the cgraph */
Alexander Popovfeee1b82020-06-24 15:33:29 +030070 bb = gimple_bb(gimple_call);
Alexander Popov10e9ae92018-08-17 01:16:59 +030071 node = cgraph_get_create_node(track_function_decl);
72 gcc_assert(node);
Alexander Popov10e9ae92018-08-17 01:16:59 +030073 cgraph_create_edge(cgraph_get_node(current_function_decl), node,
Alexander Popovfeee1b82020-06-24 15:33:29 +030074 gimple_call, bb->count,
Kees Cook8d97fb32020-04-02 00:53:47 -070075 compute_call_stmt_bb_frequency(current_function_decl, bb));
Alexander Popov10e9ae92018-08-17 01:16:59 +030076}
77
78static bool is_alloca(gimple stmt)
79{
80 if (gimple_call_builtin_p(stmt, BUILT_IN_ALLOCA))
81 return true;
82
Alexander Popov10e9ae92018-08-17 01:16:59 +030083 if (gimple_call_builtin_p(stmt, BUILT_IN_ALLOCA_WITH_ALIGN))
84 return true;
Alexander Popov10e9ae92018-08-17 01:16:59 +030085
86 return false;
87}
88
Alexander Popovfeee1b82020-06-24 15:33:29 +030089static tree get_current_stack_pointer_decl(void)
90{
91 varpool_node_ptr node;
92
93 FOR_EACH_VARIABLE(node) {
94 tree var = NODE_DECL(node);
95 tree name = DECL_NAME(var);
96
97 if (DECL_NAME_LENGTH(var) != sizeof("current_stack_pointer") - 1)
98 continue;
99
100 if (strcmp(IDENTIFIER_POINTER(name), "current_stack_pointer"))
101 continue;
102
103 return var;
104 }
105
Alexander Popov8dd70542020-06-24 15:33:30 +0300106 if (verbose) {
107 fprintf(stderr, "stackleak: missing current_stack_pointer in %s()\n",
108 DECL_NAME_POINTER(current_function_decl));
109 }
Alexander Popovfeee1b82020-06-24 15:33:29 +0300110 return NULL_TREE;
111}
112
113static void add_stack_tracking_gasm(gimple_stmt_iterator *gsi, bool after)
114{
115 gasm *asm_call = NULL;
116 tree sp_decl, input;
117 vec<tree, va_gc> *inputs = NULL;
118
119 /* 'no_caller_saved_registers' is currently supported only for x86 */
120 gcc_assert(build_for_x86);
121
122 /*
123 * Insert calling stackleak_track_stack() in asm:
124 * asm volatile("call stackleak_track_stack"
125 * :: "r" (current_stack_pointer))
126 * Use ASM_CALL_CONSTRAINT trick from arch/x86/include/asm/asm.h.
127 * This constraint is taken into account during gcc shrink-wrapping
128 * optimization. It is needed to be sure that stackleak_track_stack()
129 * call is inserted after the prologue of the containing function,
130 * when the stack frame is prepared.
131 */
132 sp_decl = get_current_stack_pointer_decl();
133 if (sp_decl == NULL_TREE) {
134 add_stack_tracking_gcall(gsi, after);
135 return;
136 }
137 input = build_tree_list(NULL_TREE, build_const_char_string(2, "r"));
138 input = chainon(NULL_TREE, build_tree_list(input, sp_decl));
139 vec_safe_push(inputs, input);
140 asm_call = gimple_build_asm_vec("call stackleak_track_stack",
141 inputs, NULL, NULL, NULL);
142 gimple_asm_set_volatile(asm_call, true);
143 if (after)
144 gsi_insert_after(gsi, asm_call, GSI_CONTINUE_LINKING);
145 else
146 gsi_insert_before(gsi, asm_call, GSI_SAME_STMT);
147 update_stmt(asm_call);
148}
149
150static void add_stack_tracking(gimple_stmt_iterator *gsi, bool after)
151{
152 /*
153 * The 'no_caller_saved_registers' attribute is used for
154 * stackleak_track_stack(). If the compiler supports this attribute for
155 * the target arch, we can add calling stackleak_track_stack() in asm.
156 * That improves performance: we avoid useless operations with the
157 * caller-saved registers in the functions from which we will remove
158 * stackleak_track_stack() call during the stackleak_cleanup pass.
159 */
160 if (lookup_attribute_spec(get_identifier("no_caller_saved_registers")))
161 add_stack_tracking_gasm(gsi, after);
162 else
163 add_stack_tracking_gcall(gsi, after);
164}
165
Alexander Popov10e9ae92018-08-17 01:16:59 +0300166/*
167 * Work with the GIMPLE representation of the code. Insert the
168 * stackleak_track_stack() call after alloca() and into the beginning
169 * of the function if it is not instrumented.
170 */
171static unsigned int stackleak_instrument_execute(void)
172{
173 basic_block bb, entry_bb;
174 bool prologue_instrumented = false, is_leaf = true;
Alexander Popovfeee1b82020-06-24 15:33:29 +0300175 gimple_stmt_iterator gsi = { 0 };
Alexander Popov10e9ae92018-08-17 01:16:59 +0300176
177 /*
178 * ENTRY_BLOCK_PTR is a basic block which represents possible entry
179 * point of a function. This block does not contain any code and
180 * has a CFG edge to its successor.
181 */
182 gcc_assert(single_succ_p(ENTRY_BLOCK_PTR_FOR_FN(cfun)));
183 entry_bb = single_succ(ENTRY_BLOCK_PTR_FOR_FN(cfun));
184
185 /*
186 * Loop through the GIMPLE statements in each of cfun basic blocks.
187 * cfun is a global variable which represents the function that is
188 * currently processed.
189 */
190 FOR_EACH_BB_FN(bb, cfun) {
191 for (gsi = gsi_start_bb(bb); !gsi_end_p(gsi); gsi_next(&gsi)) {
192 gimple stmt;
193
194 stmt = gsi_stmt(gsi);
195
196 /* Leaf function is a function which makes no calls */
197 if (is_gimple_call(stmt))
198 is_leaf = false;
199
200 if (!is_alloca(stmt))
201 continue;
202
Alexander Popov8dd70542020-06-24 15:33:30 +0300203 if (verbose) {
204 fprintf(stderr, "stackleak: be careful, alloca() in %s()\n",
205 DECL_NAME_POINTER(current_function_decl));
206 }
207
Alexander Popov10e9ae92018-08-17 01:16:59 +0300208 /* Insert stackleak_track_stack() call after alloca() */
Alexander Popovfeee1b82020-06-24 15:33:29 +0300209 add_stack_tracking(&gsi, true);
Alexander Popov10e9ae92018-08-17 01:16:59 +0300210 if (bb == entry_bb)
211 prologue_instrumented = true;
212 }
213 }
214
215 if (prologue_instrumented)
216 return 0;
217
218 /*
219 * Special cases to skip the instrumentation.
220 *
221 * Taking the address of static inline functions materializes them,
222 * but we mustn't instrument some of them as the resulting stack
223 * alignment required by the function call ABI will break other
224 * assumptions regarding the expected (but not otherwise enforced)
225 * register clobbering ABI.
226 *
227 * Case in point: native_save_fl on amd64 when optimized for size
228 * clobbers rdx if it were instrumented here.
229 *
230 * TODO: any more special cases?
231 */
232 if (is_leaf &&
233 !TREE_PUBLIC(current_function_decl) &&
234 DECL_DECLARED_INLINE_P(current_function_decl)) {
235 return 0;
236 }
237
238 if (is_leaf &&
239 !strncmp(IDENTIFIER_POINTER(DECL_NAME(current_function_decl)),
240 "_paravirt_", 10)) {
241 return 0;
242 }
243
244 /* Insert stackleak_track_stack() call at the function beginning */
245 bb = entry_bb;
246 if (!single_pred_p(bb)) {
247 /* gcc_assert(bb_loop_depth(bb) ||
248 (bb->flags & BB_IRREDUCIBLE_LOOP)); */
249 split_edge(single_succ_edge(ENTRY_BLOCK_PTR_FOR_FN(cfun)));
250 gcc_assert(single_succ_p(ENTRY_BLOCK_PTR_FOR_FN(cfun)));
251 bb = single_succ(ENTRY_BLOCK_PTR_FOR_FN(cfun));
252 }
253 gsi = gsi_after_labels(bb);
Alexander Popovfeee1b82020-06-24 15:33:29 +0300254 add_stack_tracking(&gsi, false);
Alexander Popov10e9ae92018-08-17 01:16:59 +0300255
256 return 0;
257}
258
259static bool large_stack_frame(void)
260{
261#if BUILDING_GCC_VERSION >= 8000
262 return maybe_ge(get_frame_size(), track_frame_size);
263#else
264 return (get_frame_size() >= track_frame_size);
265#endif
266}
267
Alexander Popovfeee1b82020-06-24 15:33:29 +0300268static void remove_stack_tracking_gcall(void)
Alexander Popov10e9ae92018-08-17 01:16:59 +0300269{
270 rtx_insn *insn, *next;
271
Alexander Popov10e9ae92018-08-17 01:16:59 +0300272 /*
273 * Find stackleak_track_stack() calls. Loop through the chain of insns,
274 * which is an RTL representation of the code for a function.
275 *
276 * The example of a matching insn:
277 * (call_insn 8 4 10 2 (call (mem (symbol_ref ("stackleak_track_stack")
278 * [flags 0x41] <function_decl 0x7f7cd3302a80 stackleak_track_stack>)
279 * [0 stackleak_track_stack S1 A8]) (0)) 675 {*call} (expr_list
280 * (symbol_ref ("stackleak_track_stack") [flags 0x41] <function_decl
281 * 0x7f7cd3302a80 stackleak_track_stack>) (expr_list (0) (nil))) (nil))
282 */
283 for (insn = get_insns(); insn; insn = next) {
284 rtx body;
285
286 next = NEXT_INSN(insn);
287
288 /* Check the expression code of the insn */
289 if (!CALL_P(insn))
290 continue;
291
292 /*
293 * Check the expression code of the insn body, which is an RTL
294 * Expression (RTX) describing the side effect performed by
295 * that insn.
296 */
297 body = PATTERN(insn);
298
299 if (GET_CODE(body) == PARALLEL)
300 body = XVECEXP(body, 0, 0);
301
302 if (GET_CODE(body) != CALL)
303 continue;
304
305 /*
306 * Check the first operand of the call expression. It should
307 * be a mem RTX describing the needed subroutine with a
308 * symbol_ref RTX.
309 */
310 body = XEXP(body, 0);
311 if (GET_CODE(body) != MEM)
312 continue;
313
314 body = XEXP(body, 0);
315 if (GET_CODE(body) != SYMBOL_REF)
316 continue;
317
318 if (SYMBOL_REF_DECL(body) != track_function_decl)
319 continue;
320
321 /* Delete the stackleak_track_stack() call */
322 delete_insn_and_edges(insn);
Masahiro Yamadaaf2d2222020-12-02 22:49:29 +0900323#if BUILDING_GCC_VERSION < 8000
Alexander Popov10e9ae92018-08-17 01:16:59 +0300324 if (GET_CODE(next) == NOTE &&
325 NOTE_KIND(next) == NOTE_INSN_CALL_ARG_LOCATION) {
326 insn = next;
327 next = NEXT_INSN(insn);
328 delete_insn_and_edges(insn);
329 }
330#endif
331 }
Alexander Popovfeee1b82020-06-24 15:33:29 +0300332}
333
334static bool remove_stack_tracking_gasm(void)
335{
336 bool removed = false;
337 rtx_insn *insn, *next;
338
339 /* 'no_caller_saved_registers' is currently supported only for x86 */
340 gcc_assert(build_for_x86);
341
342 /*
343 * Find stackleak_track_stack() asm calls. Loop through the chain of
344 * insns, which is an RTL representation of the code for a function.
345 *
346 * The example of a matching insn:
347 * (insn 11 5 12 2 (parallel [ (asm_operands/v
348 * ("call stackleak_track_stack") ("") 0
349 * [ (reg/v:DI 7 sp [ current_stack_pointer ]) ]
350 * [ (asm_input:DI ("r")) ] [])
351 * (clobber (reg:CC 17 flags)) ]) -1 (nil))
352 */
353 for (insn = get_insns(); insn; insn = next) {
354 rtx body;
355
356 next = NEXT_INSN(insn);
357
358 /* Check the expression code of the insn */
359 if (!NONJUMP_INSN_P(insn))
360 continue;
361
362 /*
363 * Check the expression code of the insn body, which is an RTL
364 * Expression (RTX) describing the side effect performed by
365 * that insn.
366 */
367 body = PATTERN(insn);
368
369 if (GET_CODE(body) != PARALLEL)
370 continue;
371
372 body = XVECEXP(body, 0, 0);
373
374 if (GET_CODE(body) != ASM_OPERANDS)
375 continue;
376
377 if (strcmp(ASM_OPERANDS_TEMPLATE(body),
378 "call stackleak_track_stack")) {
379 continue;
380 }
381
382 delete_insn_and_edges(insn);
383 gcc_assert(!removed);
384 removed = true;
385 }
386
387 return removed;
388}
389
390/*
391 * Work with the RTL representation of the code.
392 * Remove the unneeded stackleak_track_stack() calls from the functions
393 * which don't call alloca() and don't have a large enough stack frame size.
394 */
395static unsigned int stackleak_cleanup_execute(void)
396{
Alexander Popov8dd70542020-06-24 15:33:30 +0300397 const char *fn = DECL_NAME_POINTER(current_function_decl);
Alexander Popovfeee1b82020-06-24 15:33:29 +0300398 bool removed = false;
399
Alexander Popov8dd70542020-06-24 15:33:30 +0300400 /*
401 * Leave stack tracking in functions that call alloca().
402 * Additional case:
403 * gcc before version 7 called allocate_dynamic_stack_space() from
404 * expand_stack_vars() for runtime alignment of constant-sized stack
405 * variables. That caused cfun->calls_alloca to be set for functions
406 * that in fact don't use alloca().
407 * For more info see gcc commit 7072df0aae0c59ae437e.
408 * Let's leave such functions instrumented as well.
409 */
410 if (cfun->calls_alloca) {
411 if (verbose)
412 fprintf(stderr, "stackleak: instrument %s(): calls_alloca\n", fn);
Alexander Popovfeee1b82020-06-24 15:33:29 +0300413 return 0;
Alexander Popov8dd70542020-06-24 15:33:30 +0300414 }
Alexander Popovfeee1b82020-06-24 15:33:29 +0300415
Alexander Popov8dd70542020-06-24 15:33:30 +0300416 /* Leave stack tracking in functions with large stack frame */
417 if (large_stack_frame()) {
418 if (verbose)
419 fprintf(stderr, "stackleak: instrument %s()\n", fn);
Alexander Popovfeee1b82020-06-24 15:33:29 +0300420 return 0;
Alexander Popov8dd70542020-06-24 15:33:30 +0300421 }
Alexander Popovfeee1b82020-06-24 15:33:29 +0300422
423 if (lookup_attribute_spec(get_identifier("no_caller_saved_registers")))
424 removed = remove_stack_tracking_gasm();
425
426 if (!removed)
427 remove_stack_tracking_gcall();
Alexander Popov10e9ae92018-08-17 01:16:59 +0300428
429 return 0;
430}
431
432static bool stackleak_gate(void)
433{
434 tree section;
435
436 section = lookup_attribute("section",
437 DECL_ATTRIBUTES(current_function_decl));
438 if (section && TREE_VALUE(section)) {
439 section = TREE_VALUE(TREE_VALUE(section));
440
441 if (!strncmp(TREE_STRING_POINTER(section), ".init.text", 10))
442 return false;
443 if (!strncmp(TREE_STRING_POINTER(section), ".devinit.text", 13))
444 return false;
445 if (!strncmp(TREE_STRING_POINTER(section), ".cpuinit.text", 13))
446 return false;
447 if (!strncmp(TREE_STRING_POINTER(section), ".meminit.text", 13))
448 return false;
449 }
450
451 return track_frame_size >= 0;
452}
453
454/* Build the function declaration for stackleak_track_stack() */
455static void stackleak_start_unit(void *gcc_data __unused,
456 void *user_data __unused)
457{
458 tree fntype;
459
460 /* void stackleak_track_stack(void) */
461 fntype = build_function_type_list(void_type_node, NULL_TREE);
462 track_function_decl = build_fn_decl(track_function, fntype);
463 DECL_ASSEMBLER_NAME(track_function_decl); /* for LTO */
464 TREE_PUBLIC(track_function_decl) = 1;
465 TREE_USED(track_function_decl) = 1;
466 DECL_EXTERNAL(track_function_decl) = 1;
467 DECL_ARTIFICIAL(track_function_decl) = 1;
468 DECL_PRESERVE_P(track_function_decl) = 1;
469}
470
471/*
472 * Pass gate function is a predicate function that gets executed before the
473 * corresponding pass. If the return value is 'true' the pass gets executed,
474 * otherwise, it is skipped.
475 */
476static bool stackleak_instrument_gate(void)
477{
478 return stackleak_gate();
479}
480
481#define PASS_NAME stackleak_instrument
482#define PROPERTIES_REQUIRED PROP_gimple_leh | PROP_cfg
483#define TODO_FLAGS_START TODO_verify_ssa | TODO_verify_flow | TODO_verify_stmts
484#define TODO_FLAGS_FINISH TODO_verify_ssa | TODO_verify_stmts | TODO_dump_func \
485 | TODO_update_ssa | TODO_rebuild_cgraph_edges
486#include "gcc-generate-gimple-pass.h"
487
488static bool stackleak_cleanup_gate(void)
489{
490 return stackleak_gate();
491}
492
493#define PASS_NAME stackleak_cleanup
494#define TODO_FLAGS_FINISH TODO_dump_func
495#include "gcc-generate-rtl-pass.h"
496
497/*
498 * Every gcc plugin exports a plugin_init() function that is called right
499 * after the plugin is loaded. This function is responsible for registering
500 * the plugin callbacks and doing other required initialization.
501 */
502__visible int plugin_init(struct plugin_name_args *plugin_info,
503 struct plugin_gcc_version *version)
504{
505 const char * const plugin_name = plugin_info->base_name;
506 const int argc = plugin_info->argc;
507 const struct plugin_argument * const argv = plugin_info->argv;
508 int i = 0;
509
510 /* Extra GGC root tables describing our GTY-ed data */
511 static const struct ggc_root_tab gt_ggc_r_gt_stackleak[] = {
512 {
513 .base = &track_function_decl,
514 .nelt = 1,
515 .stride = sizeof(track_function_decl),
516 .cb = &gt_ggc_mx_tree_node,
517 .pchw = &gt_pch_nx_tree_node
518 },
519 LAST_GGC_ROOT_TAB
520 };
521
522 /*
523 * The stackleak_instrument pass should be executed before the
524 * "optimized" pass, which is the control flow graph cleanup that is
525 * performed just before expanding gcc trees to the RTL. In former
526 * versions of the plugin this new pass was inserted before the
527 * "tree_profile" pass, which is currently called "profile".
528 */
529 PASS_INFO(stackleak_instrument, "optimized", 1,
530 PASS_POS_INSERT_BEFORE);
531
532 /*
Alexander Popov8fb2dfb2018-12-06 18:13:07 +0300533 * The stackleak_cleanup pass should be executed before the "*free_cfg"
534 * pass. It's the moment when the stack frame size is already final,
535 * function prologues and epilogues are generated, and the
536 * machine-dependent code transformations are not done.
Alexander Popov10e9ae92018-08-17 01:16:59 +0300537 */
Alexander Popov8fb2dfb2018-12-06 18:13:07 +0300538 PASS_INFO(stackleak_cleanup, "*free_cfg", 1, PASS_POS_INSERT_BEFORE);
Alexander Popov10e9ae92018-08-17 01:16:59 +0300539
540 if (!plugin_default_version_check(version, &gcc_version)) {
541 error(G_("incompatible gcc/plugin versions"));
542 return 1;
543 }
544
545 /* Parse the plugin arguments */
546 for (i = 0; i < argc; i++) {
Alexander Popov10e9ae92018-08-17 01:16:59 +0300547 if (!strcmp(argv[i].key, "track-min-size")) {
548 if (!argv[i].value) {
549 error(G_("no value supplied for option '-fplugin-arg-%s-%s'"),
550 plugin_name, argv[i].key);
551 return 1;
552 }
553
554 track_frame_size = atoi(argv[i].value);
555 if (track_frame_size < 0) {
556 error(G_("invalid option argument '-fplugin-arg-%s-%s=%s'"),
557 plugin_name, argv[i].key, argv[i].value);
558 return 1;
559 }
Alexander Popovfeee1b82020-06-24 15:33:29 +0300560 } else if (!strcmp(argv[i].key, "arch")) {
561 if (!argv[i].value) {
562 error(G_("no value supplied for option '-fplugin-arg-%s-%s'"),
563 plugin_name, argv[i].key);
564 return 1;
565 }
566
567 if (!strcmp(argv[i].value, "x86"))
568 build_for_x86 = true;
Alexander Popov8dd70542020-06-24 15:33:30 +0300569 } else if (!strcmp(argv[i].key, "disable")) {
570 disable = true;
571 } else if (!strcmp(argv[i].key, "verbose")) {
572 verbose = true;
Alexander Popov10e9ae92018-08-17 01:16:59 +0300573 } else {
574 error(G_("unknown option '-fplugin-arg-%s-%s'"),
575 plugin_name, argv[i].key);
576 return 1;
577 }
578 }
579
Alexander Popov8dd70542020-06-24 15:33:30 +0300580 if (disable) {
581 if (verbose)
582 fprintf(stderr, "stackleak: disabled for this translation unit\n");
583 return 0;
584 }
585
Alexander Popov10e9ae92018-08-17 01:16:59 +0300586 /* Give the information about the plugin */
587 register_callback(plugin_name, PLUGIN_INFO, NULL,
588 &stackleak_plugin_info);
589
590 /* Register to be called before processing a translation unit */
591 register_callback(plugin_name, PLUGIN_START_UNIT,
592 &stackleak_start_unit, NULL);
593
594 /* Register an extra GCC garbage collector (GGC) root table */
595 register_callback(plugin_name, PLUGIN_REGISTER_GGC_ROOTS, NULL,
596 (void *)&gt_ggc_r_gt_stackleak);
597
598 /*
599 * Hook into the Pass Manager to register new gcc passes.
600 *
601 * The stack frame size info is available only at the last RTL pass,
602 * when it's too late to insert complex code like a function call.
603 * So we register two gcc passes to instrument every function at first
604 * and remove the unneeded instrumentation later.
605 */
606 register_callback(plugin_name, PLUGIN_PASS_MANAGER_SETUP, NULL,
607 &stackleak_instrument_pass_info);
608 register_callback(plugin_name, PLUGIN_PASS_MANAGER_SETUP, NULL,
609 &stackleak_cleanup_pass_info);
610
611 return 0;
612}