- Jun 04, 2020
-
-
Julian Lettner authored
Extract ParseVersion helper function for testing. Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D80761
-
Julian Lettner authored
Fixup for ba6b1b43.
-
Julian Lettner authored
Fixup for ba6b1b43.
-
- Jun 03, 2020
-
-
Julian Lettner authored
Use a struct to represent numerical versions instead of encoding release names in an enumeration. This avoids the need to extend the enumeration every time there is a new release. Rename `GetMacosVersion() -> GetMacosAlignedVersion()` to better reflect how this is used on non-MacOS platforms. Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D79970
-
Hiroshi Yamauchi authored
Reviewers: davidxl Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D81038
-
- Jun 02, 2020
-
-
kamlesh kumar authored
Provides an assembly implementation of muldi3 for RISC-V, to solve bug 43388. Since the implementation is the same as for mulsi3, that code was moved to `riscv/int_mul_impl.inc` and is now reused by both `mulsi3.S` and `muldi3.S`. Differential Revision: https://reviews.llvm.org/D80465
-
Kostya Serebryany authored
-
Kostya Serebryany authored
add debug code to chase down a rare crash in asan/lsan https://github.com/google/sanitizers/issues/1193 Summary: add debug code to chase down a rare crash in asan/lsan https://github.com/google/sanitizers/issues/1193 Reviewers: vitalybuka Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D80967
-
- Jun 01, 2020
-
-
Martin Liska authored
Remove it from target-specific scope which corresponds to sanitizer_linux.cpp where it lives in the same macro scope. Differential Revision: https://reviews.llvm.org/D80864
-
Julian Lettner authored
This applies the learnings from [1]. What I intended as a simple cleanup made me realize that the compiler-rt version checks have two separate issues: 1) In some places (e.g., mmap flag setting) what matters is the kernel version, not the OS version. 2) OS version checks are implemented by querying the kernel version. This is not necessarily correct inside the simulators if the simulator runtime isn't aligned with the host macOS. This commit tackles 1) by adopting a separate query function for the Darwin kernel version. 2) (and cleanups) will be dealt with in follow-ups. [1] https://reviews.llvm.org/D78942 rdar://63031937 Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D79965
-
serge-sans-paille authored
Use internal_memcpy instead. Differential Revision: https://reviews.llvm.org/D80732
-
- May 31, 2020
-
-
Hubert Tong authored
Summary: This patch moves the setting of `LD_PRELOAD` "inwards" to avoid issues where the built library needs to be loaded with the dynamic linker that was configured with the build (and cannot, for example, be loaded by the dynamic linker associated with the `env` utility). Reviewed By: vitalybuka, nemanjai, jsji Differential Revision: https://reviews.llvm.org/D79695
-
Dan Liew authored
The test read from an uninitialized buffer which could cause the output to be unpredictable. The test is currently disabled so this won't actually change anything until the test is re-enabled.
-
- May 30, 2020
-
-
Adrian Herrera authored
Summary: The description of the fuzzer merge control file appears to be incorrect/out of date. No "DONE" line appears in the control file. Rather, FT and COV are the markers that appear following the STARTED line. Reviewers: metzman, kcc Reviewed By: kcc Subscribers: #sanitizers Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D80788
-
- May 29, 2020
-
-
Vitaly Buka authored
Summary: See https://github.com/google/sanitizers/issues/1253. Small patch to enable compilation on (ancient) Red Hat Enterprise Linux 5. Reviewers: kcc, vitalybuka Reviewed By: vitalybuka Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D80648
-
Dan Liew authored
It's not passing on macOS green dragon bots. To get them green just disable for now. rdar://problem/62141527
-
- May 28, 2020
-
-
Evgenii Stepanov authored
pthread_cond_wait needs a loop around it to handle spurious wake ups, as well as the case when signal runs before wait.
-
Dmitry Vyukov authored
pthread_barrier_t is not supported on darwin. Do what other tests that use pthread_barrier_t do.
-
Dan Liew authored
AddressSanitizer-Unit :: ./Asan-i386-calls-Test/AddressSanitizer.LongJmpTest AddressSanitizer-Unit :: ./Asan-i386-calls-Test/AddressSanitizer.SigLongJmpTest AddressSanitizer-Unit :: ./Asan-i386-inline-Test/AddressSanitizer.LongJmpTest AddressSanitizer-Unit :: ./Asan-i386-inline-Test/AddressSanitizer.SigLongJmpTest These failures will be examined properly when time permits. rdar://problem/62141412
-
- May 27, 2020
-
-
Dmitry Vyukov authored
sanitizer-x86_64-linux-autoconf has failed after the previous tsan commit: FAIL: ThreadSanitizer-x86_64 :: java_finalizer2.cpp (245 of 403) ******************** TEST 'ThreadSanitizer-x86_64 :: java_finalizer2.cpp' FAILED ******************** Script: -- : 'RUN: at line 1'; /b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/./bin/clang --driver-mode=g++ -fsanitize=thread -Wall -m64 -gline-tables-only -I/b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/../ -std=c++11 -I/b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/../ -nostdinc++ -I/b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/tools/clang/runtime/compiler-rt-bins/lib/tsan/libcxx_tsan_x86_64/include/c++/v1 -O1 /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/java_finalizer2.cpp -o /b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/tools/clang/runtime/compiler-rt-bins/test/tsan/X86_64Config/Output/java_finalizer2.cpp.tmp && /b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/tools/clang/runtime/compiler-rt-bins/test/tsan/X86_64Config/Output/java_finalizer2.cpp.tmp 2>&1 | FileCheck /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/java_finalizer2.cpp -- Exit Code: 1 Command Output (stderr): -- /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/java_finalizer2.cpp:82:11: error: CHECK: expected string not found in input // CHECK: DONE ^ <stdin>:1:1: note: scanning from here FATAL: ThreadSanitizer CHECK failed: /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/lib/tsan/rtl/tsan_sync.cpp:69 "((*meta)) == ((0))" (0x4000003e, 0x0) ^ <stdin>:5:12: note: possible intended match here #3 __tsan::OnUserAlloc(__tsan::ThreadState*, unsigned long, unsigned long, unsigned long, bool) /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/lib/tsan/rtl/tsan_mman.cpp:225:16 (java_finalizer2.cpp.tmp+0x4af407) ^ http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-autoconf/builds/51143/steps/test%20tsan%20in%20debug%20compiler-rt%20build/logs/stdio Fix heap object overlap by offsetting java heap as other tests are doing.
-
Dmitry Vyukov authored
Add ThreadClock:: global_acquire_ which is the last time another thread has done a global acquire of this thread's clock. It helps to avoid problem described in: https://github.com/golang/go/issues/39186 See test/tsan/java_finalizer2.cpp for a regression test. Note the failuire is _extremely_ hard to hit, so if you are trying to reproduce it, you may want to run something like: $ go get golang.org/x/tools/cmd/stress $ stress -p=64 ./a.out The crux of the problem is roughly as follows. A number of O(1) optimizations in the clocks algorithm assume proper transitive cumulative propagation of clock values. The AcquireGlobal operation may produce an inconsistent non-linearazable view of thread clocks. Namely, it may acquire a later value from a thread with a higher ID, but fail to acquire an earlier value from a thread with a lower ID. If a thread that executed AcquireGlobal then releases to a sync clock, it will spoil the sync clock with the inconsistent values. If another thread later releases to the sync clock, the optimized algorithm may break. The exact sequence of events that leads to the failure. - thread 1 executes AcquireGlobal - thread 1 acquires value 1 for thread 2 - thread 2 increments clock to 2 - thread 2 releases to sync object 1 - thread 3 at time 1 - thread 3 acquires from sync object 1 - thread 1 acquires value 1 for thread 3 - thread 1 releases to sync object 2 - sync object 2 clock has 1 for thread 2 and 1 for thread 3 - thread 3 releases to sync object 2 - thread 3 sees value 1 in the clock for itself and decides that it has already released to the clock and did not acquire anything from other threads after that (the last_acquire_ check in release operation) - thread 3 does not update the value for thread 2 in the clock from 1 to 2 - thread 4 acquires from sync object 2 - thread 4 detects a false race with thread 2 as it should have been synchronized with thread 2 up to time 2, but because of the broken clock it is now synchronized only up to time 1 The global_acquire_ value helps to prevent this scenario. Namely, thread 3 will not trust any own clock values up to global_acquire_ for the purposes of the last_acquire_ optimization. Reviewed-in: https://reviews.llvm.org/D80474 Reported-by: nvanbenschoten (Nathan VanBenschoten)
-
Jinsong Ji authored
Some testcases are unexpectedly passing with NPM. This is because the target functions are inlined in NPM. I think we should add noinline attribute to keep these test points. Reviewed By: vitalybuka Differential Revision: https://reviews.llvm.org/D79648
-
Kazushi (Jam) Marukawa authored
Summary: This patch implements dynamic stack allocation for the VE target. Changes: * compiler-rt: `__ve_grow_stack` to request stack allocation on the VE. * VE: base pointer support, dynamic stack allocation. Differential Revision: https://reviews.llvm.org/D79084
-
Jinsong Ji authored
A few testcases are still using deprecated options. warning: argument '-fsanitize-coverage=[func|bb|edge]' is deprecated, use '-fsanitize-coverage=[func|bb|edge],[trace-pc-guard|trace-pc]' instead [-Wdeprecated] Reviewed By: vitalybuka Differential Revision: https://reviews.llvm.org/D79741
-
- May 26, 2020
-
-
Marco Elver authored
Summary: This permits combining -fsanitize-coverage with -fsanitize=bounds or -fsanitize=thread. Note that, GCC already supports combining these. Tested: - Add Clang end-to-end test checking IR is generated for both combinations of sanitizers. - Several previously failing TSAN tests now pass. Bugzilla: https://bugs.llvm.org/show_bug.cgi?id=45831 Reviewers: vitalybuka Reviewed By: vitalybuka Subscribers: #sanitizers, dvyukov, nickdesaulniers, cfe-commits Tags: #clang, #sanitizers Differential Revision: https://reviews.llvm.org/D79628
-
Kostya Serebryany authored
Summary: Fixes this build error with GCC 9.3.0: ``` ../lib/fuzzer/afl/afl_driver.cpp:114:30: error: expected unqualified-id before string constant 114 | __attribute__((weak)) extern "C" void __sanitizer_set_report_fd(void *); | ^~~ ``` Reviewers: metzman, kcc Reviewed By: kcc Subscribers: #sanitizers Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D80479
-
- May 24, 2020
-
-
Craig Topper authored
This adds the family/model returned by CPUID for some Intel Comet Lake CPUs. Instruction set and tuning wise these are the same as "skylake". These are not in the Intel SDM yet, but these should be correct.
-
- May 22, 2020
-
-
Craig Topper authored
-
- May 21, 2020
-
-
Matt Morehouse authored
-
Julian Lettner authored
The oldest supported deployment target currently is 10.7 [1]. We can remove a few outdated checks. [1] https://github.com/llvm/llvm-project/blob/3db893b3712a5cc98ac0dbc88e08df70069be216/compiler-rt/cmake/config-ix.cmake#L397 Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D79958
-
- May 20, 2020
-
-
Matt Morehouse authored
-
Amy Huang authored
-
Jinsong Ji authored
Per target runtime dir may change the suffix of shared libs. We can not assume we are always building with per_target_runtime_dir on. Reviewed By: cryptoad Differential Revision: https://reviews.llvm.org/D80243
-
Dan Liew authored
Summary: The previous code tries to strip out parentheses and anything in between them. I'm guessing the idea here was to try to drop any listed arguments for the function being symbolized. Unfortunately this approach is broken in several ways. * Templated functions may contain parentheses. The existing approach messes up these names. * In C++ argument types are part of a function's signature for the purposes of overloading so removing them could be confusing. Fix this simply by not trying to adjust the function name that comes from `atos`. A test case is included. Without the change the test case produced output like: ``` WRITE of size 4 at 0x6060000001a0 thread T0 #0 0x10b96614d in IntWrapper<void >::operator=> const&) asan-symbolize-templated-cxx.cpp:10 #1 0x10b960b0e in void writeToA<IntWrapper<void > >>) asan-symbolize-templated-cxx.cpp:30 #2 0x10b96bf27 in decltype>)>> >)) std::__1::__invoke<void >), IntWrapper<void > >>), IntWrapper<void >&&) type_traits:4425 #3 0x10b96bdc1 in void std::__1::__invoke_void_return_wrapper<void>::__call<void >), IntWrapper<void > >>), IntWrapper<void >&&) __functional_base:348 #4 0x10b96bd71 in std::__1::__function::__alloc_func<void >), std::__1::allocator<void >)>, void >)>::operator>&&) functional:1533 #5 0x10b9684e2 in std::__1::__function::__func<void >), std::__1::allocator<void >)>, void >)>::operator>&&) functional:1707 #6 0x10b96cd7b in std::__1::__function::__value_func<void >)>::operator>&&) const functional:1860 #7 0x10b96cc17 in std::__1::function<void >)>::operator>) const functional:2419 #8 0x10b960ca6 in Foo<void >), IntWrapper<void > >::doCall>) asan-symbolize-templated-cxx.cpp:44 #9 0x10b96088b in main asan-symbolize-templated-cxx.cpp:54 #10 0x7fff6ffdfcc8 in start (in libdyld.dylib) + 0 ``` Note how the symbol names for the frames are messed up (e.g. #8, #1). With the patch the output looks like: ``` WRITE of size 4 at 0x6060000001a0 thread T0 #0 0x10005214d in IntWrapper<void (int)>::operator=(IntWrapper<void (int)> const&) asan-symbolize-templated-cxx.cpp:10 #1 0x10004cb0e in void writeToA<IntWrapper<void (int)> >(IntWrapper<void (int)>) asan-symbolize-templated-cxx.cpp:30 #2 0x100057f27 in decltype(std::__1::forward<void (*&)(IntWrapper<void (int)>)>(fp)(std::__1::forward<IntWrapper<void (int)> >(fp0))) std::__1::__invoke<void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)> >(void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)>&&) type_traits:4425 #3 0x100057dc1 in void std::__1::__invoke_void_return_wrapper<void>::__call<void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)> >(void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)>&&) __functional_base:348 #4 0x100057d71 in std::__1::__function::__alloc_func<void (*)(IntWrapper<void (int)>), std::__1::allocator<void (*)(IntWrapper<void (int)>)>, void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>&&) functional:1533 #5 0x1000544e2 in std::__1::__function::__func<void (*)(IntWrapper<void (int)>), std::__1::allocator<void (*)(IntWrapper<void (int)>)>, void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>&&) functional:1707 #6 0x100058d7b in std::__1::__function::__value_func<void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>&&) const functional:1860 #7 0x100058c17 in std::__1::function<void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>) const functional:2419 #8 0x10004cca6 in Foo<void (IntWrapper<void (int)>), IntWrapper<void (int)> >::doCall(IntWrapper<void (int)>) asan-symbolize-templated-cxx.cpp:44 #9 0x10004c88b in main asan-symbolize-templated-cxx.cpp:54 #10 0x7fff6ffdfcc8 in start (in libdyld.dylib) + 0 ``` rdar://problem/58887175 Reviewers: kubamracek, yln Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D79597
-
- May 19, 2020
-
-
Matt Morehouse authored
Summary: This is collaboration between Marcel Boehme @ Monash, Australia and Valentin Manès plus Sang Kil Cha @ KAIST, South Korea. We have made a few modifications to boost LibFuzzer performance by changing how weights are assigned to the seeds in the corpus. Essentially, seeds that reveal more "information" about globally rare features are assigned a higher weight. Our results on the Fuzzer Test Suite seem quite promising. In terms of bug finding, our Entropic patch usually finds the same errors much faster and in more runs. In terms of coverage, our version Entropic achieves the same coverage in less than half the time for the majority of subjects. For the lack of space, we shared more detailed performance results directly with @kcc. We'll publish the preprint with all the technical details as soon as it is accepted. Happy to share if you drop us an email. There should be plenty of opportunities to optimise further. For instance, while Entropic achieves the same coverage in less than half the time, Entropic has a much lower #execs per second. We ran the perf-tool and found a few performance bottlenecks. Thanks for open-sourcing LibFuzzer (and the entire LLVM Compiler Infrastructure)! This has been such a tremendous help to my research. Patch By: Marcel Boehme Reviewers: kcc, metzman, morehouse, Dor1s, vitalybuka Reviewed By: kcc Subscribers: dgg5503, Valentin, llvm-commits, kcc Tags: #llvm Differential Revision: https://reviews.llvm.org/D73776
-
- May 18, 2020
-
-
Jinsong Ji authored
When build in runtime bulid mode with LLVM_ENABLE_RUNTIMES, the base-config-ix.cmake will complain about two errors. One is empty string in replace, the other one is unknown `TEST_BIG_ENDIAN ` command. This patch fix it so that we can test runtime build. Reviewed By: phosek Differential Revision: https://reviews.llvm.org/D80040
-
Martin Storsjö authored
This fixes bootstrapping the builtins when no previous version of them exists after 2fe66bdb. Also fix a whitespace issue in that commit.
-
- May 17, 2020
-
-
Fangrui Song authored
-
Yi Kong authored
Since setting COMPILER_RT_USE_BUILTINS_LIBRARY would remove -z,defs flag, missing builtins library would continue to build unnoticed. Explicitly emit an error in such case. Differential Revision: https://reviews.llvm.org/D79470
-
- May 15, 2020
-
-
Jinsong Ji authored
Only add CMAKE_EXE_LINKER_FLAGS when in a standalone bulid. Or else CMAKE_EXE_LINKER_FLAGS contains flags for build compiler of Clang/llvm. This might not be the same as what the COMPILER_RT_TEST_COMPILER supports. eg: the build compiler use lld linker and we use it to build clang with default ld linker then to be tested clang will complain about lld options like --color-diagnostics. Reviewed By: phosek Differential Revision: https://reviews.llvm.org/D78373
-