Skip to content
  1. Oct 10, 2019
    • Julian Lettner's avatar
      [ASan] Do not misrepresent high value address dereferences as null dereferences · b577efe4
      Julian Lettner authored
      Dereferences with addresses above the 48-bit hardware addressable range
      produce "invalid instruction" (instead of "invalid access") hardware
      exceptions (there is no hardware address decoding logic for those bits),
      and the address provided by this exception is the address of the
      instruction (not the faulting address).  The kernel maps the "invalid
      instruction" to SEGV, but fails to provide the real fault address.
      
      Because of this ASan lies and says that those cases are null
      dereferences.  This downgrades the severity of a found bug in terms of
      security.  In the ASan signal handler, we can not provide the real
      faulting address, but at least we can try not to lie.
      
      rdar://50366151
      
      Reviewed By: vitalybuka
      
      Differential Revision: https://reviews.llvm.org/D68676
      
      llvm-svn: 374265
      b577efe4
  2. Aug 28, 2019
    • Julian Lettner's avatar
      [sanitizer_common] Close superfluous file descriptors in spawned process · d3136661
      Julian Lettner authored
      Use attribute flag `POSIX_SPAWN_CLOEXEC_DEFAULT` in the call to
      `posix_spawn`.
      
      If this flag is set, then only file descriptors explicitly described by
      the file_actions argument are available in the spawned process; all of
      the other file descriptors are automatically closed in the spawned
      process.
      
      POSIX_SPAWN_CLOEXEC_DEFAULT is an Apple-specific extension.
      
      llvm-svn: 370121
      d3136661
  3. Aug 19, 2019
  4. Aug 15, 2019
    • Julian Lettner's avatar
      [sanitizer_common] Replace forkpty with posix_spawn on Darwin · 399408a9
      Julian Lettner authored
      On Darwin, we currently use forkpty to communicate with the "atos"
      symbolizer. There are several problems that fork[pty] has, e.g. that
      after fork, interceptors are still active and this sometimes causes
      crashes or hangs. This is especially problematic for TSan, which uses
      interceptors for OS-provided locks and mutexes, and even Libc functions
      use those.
      
      This patch replaces forkpty with posix_spawn on Darwin. Since
      posix_spawn doesn't fork (at least on Darwin), the interceptors are not
      a problem. Another benefit is that we'll handle post-fork failures (e.g.
      sandbox disallows "exec") gracefully now.
      
      Related revisions and previous attempts that were blocked by or had to
      be revered due to test failures:
      https://reviews.llvm.org/D48451
      https://reviews.llvm.org/D40032
      
      Reviewed By: kubamracek
      
      Differential Revision: https://reviews.llvm.org/D65253
      
      llvm-svn: 368947
      399408a9
  5. Jul 31, 2019
  6. Jun 21, 2019
  7. Jun 11, 2019
  8. Apr 11, 2019
  9. Jan 19, 2019
    • Chandler Carruth's avatar
      Update the file headers across all of the LLVM projects in the monorepo · 2946cd70
      Chandler Carruth authored
      to reflect the new license.
      
      We understand that people may be surprised that we're moving the header
      entirely to discuss the new license. We checked this carefully with the
      Foundation's lawyer and we believe this is the correct approach.
      
      Essentially, all code in the project is now made available by the LLVM
      project under our new license, so you will see that the license headers
      include that license only. Some of our contributors have contributed
      code under our old license, and accordingly, we have retained a copy of
      our old license notice in the top-level files in each project and
      repository.
      
      llvm-svn: 351636
      2946cd70
  10. Jan 08, 2019
    • Evgeniy Stepanov's avatar
      [asan] Support running without /proc · e1caa4ac
      Evgeniy Stepanov authored
      Summary:
      This patch lets ASan run when /proc is not accessible (ex. not mounted
      yet). It includes a special test-only flag that emulates this condition
      in an unpriviledged process.
      
      This only matters on Linux, where /proc is necessary to enumerate
      virtual memory mappings.
      
      Reviewers: vitalybuka, pcc, krytarowski
      
      Subscribers: kubamracek, llvm-commits
      
      Differential Revision: https://reviews.llvm.org/D56141
      
      llvm-svn: 350590
      e1caa4ac
  11. Dec 28, 2018
  12. Dec 27, 2018
    • Evgeniy Stepanov's avatar
      [asan] Support running without /proc. · d9df65fd
      Evgeniy Stepanov authored
      Summary:
      This patch lets ASan run when /proc is not accessible (ex. not mounted
      yet). It includes a special test-only flag that emulates this condition
      in an unpriviledged process.
      
      This only matters on Linux, where /proc is necessary to enumerate
      virtual memory mappings.
      
      Reviewers: pcc, vitalybuka
      
      Subscribers: kubamracek, llvm-commits
      
      Differential Revision: https://reviews.llvm.org/D55874
      
      llvm-svn: 350101
      d9df65fd
  13. Dec 23, 2018
  14. Dec 20, 2018
    • Evgeniy Stepanov's avatar
      [sanitizer] Support running without fd 0,1,2. · 3b7e8b2d
      Evgeniy Stepanov authored
      Summary:
      Support running with no open file descriptors (as may happen to
      "init" process on linux).
      * Remove a check that writing to stderr succeeds.
      * When opening a file (ex. for log_path option), dup the new fd out of
      [0, 2] range to avoid confusing the program.
      
      (2nd attempt, this time without the sanitizer_rtems change)
      
      Reviewers: pcc, vitalybuka
      
      Subscribers: kubamracek, llvm-commits
      
      Differential Revision: https://reviews.llvm.org/D55801
      
      llvm-svn: 349817
      3b7e8b2d
    • Ilya Biryukov's avatar
      Revert "[sanitizer] Support running without fd 0,1,2." · ea8646ad
      Ilya Biryukov authored
      This reverts commit r349699.
      Reason: the commit breaks compilation of sanitizer_rtems.cc when
      building for RTEMS.
      
      llvm-svn: 349745
      ea8646ad
    • Evgeniy Stepanov's avatar
      [sanitizer] Support running without fd 0,1,2. · f762a9f8
      Evgeniy Stepanov authored
      Summary:
      Support running with no open file descriptors (as may happen to
      "init" process on linux).
      * Remove a check that writing to stderr succeeds.
      * When opening a file (ex. for log_path option), dup the new fd out of
      [0, 2] range to avoid confusing the program.
      
      Reviewers: pcc, vitalybuka
      
      Subscribers: kubamracek, llvm-commits
      
      Differential Revision: https://reviews.llvm.org/D55801
      
      llvm-svn: 349699
      f762a9f8
  15. Nov 06, 2018
  16. Oct 26, 2018
  17. Oct 05, 2018
  18. Oct 01, 2018
  19. Aug 31, 2018
  20. Aug 24, 2018
  21. Aug 22, 2018
  22. Aug 17, 2018
    • Kuba Mracek's avatar
      [sanitizer] When setting up shadow memory on iOS, fix handling the return... · 2b93dfe0
      Kuba Mracek authored
      [sanitizer] When setting up shadow memory on iOS, fix handling the return value of task_info on older OS versions
      
      task_vm_info is a "revisioned" structure, new OS versions add fields to the end, and compatibility is based on the reported size. On older OS versions, min_address/max_address is not filled back. Let's handle that case. Unfortunately, we can't really write a test (as the failure only happens when on a specific OS version).
      
      Differential Revision: https://reviews.llvm.org/D50275
      
      llvm-svn: 340058
      2b93dfe0
  23. Jul 20, 2018
  24. Jun 05, 2018
    • Kamil Rytarowski's avatar
      Introduce CheckASLR() in sanitizers · 7d260775
      Kamil Rytarowski authored
      Summary:
      At least the ASan, MSan, TSan sanitizers require disabled ASLR on a NetBSD.
      
      Introduce a generic CheckASLR() routine, that implements a check for the
      current process. This flag depends on the global or per-process settings.
      
      There is no simple way to disable ASLR in the build process from the
      level of a sanitizer or during the runtime execution.
      
      With ASLR enabled sanitizers that operate over the process virtual address
      space can misbehave usually breaking with cryptic messages.
      
      This check is dummy for !NetBSD.
      
      Sponsored by <The NetBSD Foundation>
      
      Reviewers: vitalybuka, joerg
      
      Reviewed By: vitalybuka
      
      Subscribers: cryptoad, kubamracek, llvm-commits, #sanitizers
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D47442
      
      llvm-svn: 333985
      7d260775
  25. May 09, 2018
  26. May 07, 2018
  27. Mar 24, 2018
  28. Feb 26, 2018
  29. Feb 21, 2018
    • Evgeniy Stepanov's avatar
      [hwasan] Fix inline instrumentation. · 43271b18
      Evgeniy Stepanov authored
      This patch changes hwasan inline instrumentation:
      
      Fixes address untagging for shadow address calculation (use 0xFF instead of 0x00 for the top byte).
      Emits brk instruction instead of hlt for the kernel and user space.
      Use 0x900 instead of 0x100 for brk immediate (0x100 - 0x800 are unavailable in the kernel).
      Fixes and adds appropriate tests.
      
      Patch by Andrey Konovalov.
      
      Differential Revision: https://reviews.llvm.org/D43135
      
      llvm-svn: 325711
      43271b18
  30. Feb 11, 2018
    • Kuba Mracek's avatar
      Revert r324847, there's bot failures. · 9ead7bb3
      Kuba Mracek authored
      llvm-svn: 324849
      9ead7bb3
    • Kuba Mracek's avatar
      [sanitizer] Implement NanoTime() on Darwin · 3eb694d0
      Kuba Mracek authored
      Currently NanoTime() on Darwin is unimplemented and always returns 0. Looks like there's quite a few things broken because of that (TSan periodic memory flush, ASan allocator releasing pages back to the OS). Let's fix that.
      
      Differential Revision: https://reviews.llvm.org/D40665
      
      llvm-svn: 324847
      3eb694d0
    • Kuba Mracek's avatar
      [compiler-rt] Replace forkpty with posix_spawn · 3ecf9dca
      Kuba Mracek authored
      On Darwin, we currently use forkpty to communicate with the "atos" symbolizer. There are several problems that fork or forkpty has, e.g. that after fork, interceptors are still active and this sometimes causes crashes or hangs. This is especially problematic for TSan, which uses interceptors for OS-provided locks and mutexes, and even Libc functions use those.
      
      This patch replaces forkpty with posix_spawn. Since posix_spawn doesn't fork (at least on Darwin), the interceptors are not a problem. Additionally, this also fixes a latent threading problem with ptsname (it's unsafe to use this function in multithreaded programs). Yet another benefit is that we'll handle post-fork failures (e.g. sandbox disallows "exec") gracefully now.
      
      Differential Revision: https://reviews.llvm.org/D40032
      
      llvm-svn: 324846
      3ecf9dca
  31. Dec 13, 2017
    • Kostya Kortchinsky's avatar
      [sanitizer] Introduce a vDSO aware timing function · f50246da
      Kostya Kortchinsky authored
      Summary:
      See D40657 & D40679 for previous versions of this patch & description.
      
      A couple of things were fixed here to have it not break some bots.
      Weak symbols can't be used with `SANITIZER_GO` so the previous version was
      breakin TsanGo. I set up some additional local tests and those pass now.
      
      I changed the workaround for the glibc vDSO issue: `__progname` is initialized
      after the vDSO and is actually public and of known type, unlike
      `__vdso_clock_gettime`. This works better, and with all compilers.
      
      The rest is the same.
      
      Reviewers: alekseyshl
      
      Reviewed By: alekseyshl
      
      Subscribers: srhines, kubamracek, krytarowski, llvm-commits, #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D41121
      
      llvm-svn: 320594
      f50246da
  32. Dec 11, 2017
Loading