Skip to content
  1. Jun 04, 2020
  2. Jun 03, 2020
  3. Jun 02, 2020
  4. Jun 01, 2020
  5. May 31, 2020
  6. May 30, 2020
  7. May 29, 2020
  8. May 28, 2020
  9. May 27, 2020
    • Dmitry Vyukov's avatar
      tsan: fix test in debug mode · d24dd2b2
      Dmitry Vyukov authored
      sanitizer-x86_64-linux-autoconf has failed after the previous tsan commit:
      
      FAIL: ThreadSanitizer-x86_64 :: java_finalizer2.cpp (245 of 403)
      ******************** TEST 'ThreadSanitizer-x86_64 :: java_finalizer2.cpp' FAILED ********************
      Script:
      --
      : 'RUN: at line 1';      /b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/./bin/clang  --driver-mode=g++ -fsanitize=thread -Wall  -m64   -gline-tables-only -I/b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/../ -std=c++11 -I/b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/../ -nostdinc++ -I/b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/tools/clang/runtime/compiler-rt-bins/lib/tsan/libcxx_tsan_x86_64/include/c++/v1 -O1 /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/java_finalizer2.cpp -o /b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/tools/clang/runtime/compiler-rt-bins/test/tsan/X86_64Config/Output/java_finalizer2.cpp.tmp &&  /b/sanitizer-x86_64-linux-autoconf/build/tsan_debug_build/tools/clang/runtime/compiler-rt-bins/test/tsan/X86_64Config/Output/java_finalizer2.cpp.tmp 2>&1 | FileCheck /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/java_finalizer2.cpp
      --
      Exit Code: 1
      
      Command Output (stderr):
      --
      /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/test/tsan/java_finalizer2.cpp:82:11: error: CHECK: expected string not found in input
      // CHECK: DONE
                ^
      <stdin>:1:1: note: scanning from here
      FATAL: ThreadSanitizer CHECK failed: /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/lib/tsan/rtl/tsan_sync.cpp:69 "((*meta)) == ((0))" (0x4000003e, 0x0)
      ^
      <stdin>:5:12: note: possible intended match here
       #3 __tsan::OnUserAlloc(__tsan::ThreadState*, unsigned long, unsigned long, unsigned long, bool) /b/sanitizer-x86_64-linux-autoconf/build/llvm-project/compiler-rt/lib/tsan/rtl/tsan_mman.cpp:225:16 (java_finalizer2.cpp.tmp+0x4af407)
                 ^
      
      http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux-autoconf/builds/51143/steps/test%20tsan%20in%20debug%20compiler-rt%20build/logs/stdio
      
      Fix heap object overlap by offsetting java heap as other tests are doing.
      d24dd2b2
    • Dmitry Vyukov's avatar
      tsan: fix false positives in AcquireGlobal · 4408eeed
      Dmitry Vyukov authored
      Add ThreadClock:: global_acquire_ which is the last time another thread
      has done a global acquire of this thread's clock.
      
      It helps to avoid problem described in:
      https://github.com/golang/go/issues/39186
      See test/tsan/java_finalizer2.cpp for a regression test.
      Note the failuire is _extremely_ hard to hit, so if you are trying
      to reproduce it, you may want to run something like:
      $ go get golang.org/x/tools/cmd/stress
      $ stress -p=64 ./a.out
      
      The crux of the problem is roughly as follows.
      A number of O(1) optimizations in the clocks algorithm assume proper
      transitive cumulative propagation of clock values. The AcquireGlobal
      operation may produce an inconsistent non-linearazable view of
      thread clocks. Namely, it may acquire a later value from a thread
      with a higher ID, but fail to acquire an earlier value from a thread
      with a lower ID. If a thread that executed AcquireGlobal then releases
      to a sync clock, it will spoil the sync clock with the inconsistent
      values. If another thread later releases to the sync clock, the optimized
      algorithm may break.
      
      The exact sequence of events that leads to the failure.
      - thread 1 executes AcquireGlobal
      - thread 1 acquires value 1 for thread 2
      - thread 2 increments clock to 2
      - thread 2 releases to sync object 1
      - thread 3 at time 1
      - thread 3 acquires from sync object 1
      - thread 1 acquires value 1 for thread 3
      - thread 1 releases to sync object 2
      - sync object 2 clock has 1 for thread 2 and 1 for thread 3
      - thread 3 releases to sync object 2
      - thread 3 sees value 1 in the clock for itself
        and decides that it has already released to the clock
        and did not acquire anything from other threads after that
        (the last_acquire_ check in release operation)
      - thread 3 does not update the value for thread 2 in the clock from 1 to 2
      - thread 4 acquires from sync object 2
      - thread 4 detects a false race with thread 2
        as it should have been synchronized with thread 2 up to time 2,
        but because of the broken clock it is now synchronized only up to time 1
      
      The global_acquire_ value helps to prevent this scenario.
      Namely, thread 3 will not trust any own clock values up to global_acquire_
      for the purposes of the last_acquire_ optimization.
      
      Reviewed-in: https://reviews.llvm.org/D80474
      Reported-by: nvanbenschoten (Nathan VanBenschoten)
      4408eeed
    • Jinsong Ji's avatar
      [compiler-rt][asan] Add noinline to use-after-scope testcases · 5ee902bb
      Jinsong Ji authored
      Some testcases are unexpectedly passing with NPM.
      This is because the target functions are inlined in NPM.
      
      I think we should add noinline attribute to keep these test points.
      
      Reviewed By: vitalybuka
      
      Differential Revision: https://reviews.llvm.org/D79648
      5ee902bb
    • Kazushi (Jam) Marukawa's avatar
      [VE] Dynamic stack allocation · dedaf3a2
      Kazushi (Jam) Marukawa authored
      Summary:
      This patch implements dynamic stack allocation for the VE target. Changes:
      * compiler-rt: `__ve_grow_stack` to request stack allocation on the VE.
      * VE: base pointer support, dynamic stack allocation.
      
      Differential Revision: https://reviews.llvm.org/D79084
      dedaf3a2
    • Jinsong Ji's avatar
      [compiler-rt][NFC]Fix Wdeprecated warnings for fsanitize-coverage · a7141480
      Jinsong Ji authored
      A few testcases are still using deprecated options.
      
      warning: argument '-fsanitize-coverage=[func|bb|edge]' is deprecated,
      use '-fsanitize-coverage=[func|bb|edge],[trace-pc-guard|trace-pc]'
      instead [-Wdeprecated]
      
      Reviewed By: vitalybuka
      
      Differential Revision: https://reviews.llvm.org/D79741
      a7141480
  10. May 26, 2020
  11. May 24, 2020
  12. May 22, 2020
  13. May 21, 2020
  14. May 20, 2020
    • Matt Morehouse's avatar
      8817e6ab
    • Amy Huang's avatar
      b11c2e2f
    • Jinsong Ji's avatar
      [compiler-rt][scudo][LIT] Use target_suffix instead of target-arch · 8d0fdd44
      Jinsong Ji authored
      Per target runtime dir may change the suffix of shared libs.
      We can not assume we are always building with per_target_runtime_dir on.
      
      Reviewed By: cryptoad
      
      Differential Revision: https://reviews.llvm.org/D80243
      8d0fdd44
    • Dan Liew's avatar
      [asan_symbolize] Fix bug handling C++ symbols when using Atos. · 5811f3a9
      Dan Liew authored
      Summary:
      The previous code tries to strip out parentheses and anything in between
      them. I'm guessing the idea here was to try to drop any listed arguments
      for the function being symbolized. Unfortunately this approach is broken
      in several ways.
      
      * Templated functions may contain parentheses. The existing approach
      messes up these names.
      * In C++ argument types are part of a function's signature for the
      purposes of overloading so removing them could be confusing.
      
      Fix this simply by not trying to adjust the function name that comes
      from `atos`.
      
      A test case is included.
      
      Without the change the test case produced output like:
      
      ```
      WRITE of size 4 at 0x6060000001a0 thread T0
          #0 0x10b96614d in IntWrapper<void >::operator=> const&) asan-symbolize-templated-cxx.cpp:10
          #1 0x10b960b0e in void writeToA<IntWrapper<void > >>) asan-symbolize-templated-cxx.cpp:30
          #2 0x10b96bf27 in decltype>)>> >)) std::__1::__invoke<void >), IntWrapper<void > >>), IntWrapper<void >&&) type_traits:4425
          #3 0x10b96bdc1 in void std::__1::__invoke_void_return_wrapper<void>::__call<void >), IntWrapper<void > >>), IntWrapper<void >&&) __functional_base:348
          #4 0x10b96bd71 in std::__1::__function::__alloc_func<void >), std::__1::allocator<void >)>, void >)>::operator>&&) functional:1533
          #5 0x10b9684e2 in std::__1::__function::__func<void >), std::__1::allocator<void >)>, void >)>::operator>&&) functional:1707
          #6 0x10b96cd7b in std::__1::__function::__value_func<void >)>::operator>&&) const functional:1860
          #7 0x10b96cc17 in std::__1::function<void >)>::operator>) const functional:2419
          #8 0x10b960ca6 in Foo<void >), IntWrapper<void > >::doCall>) asan-symbolize-templated-cxx.cpp:44
          #9 0x10b96088b in main asan-symbolize-templated-cxx.cpp:54
          #10 0x7fff6ffdfcc8 in start (in libdyld.dylib) + 0
      ```
      
      Note how the symbol names for the frames are messed up (e.g. #8, #1).
      
      With the patch the output looks like:
      
      ```
      WRITE of size 4 at 0x6060000001a0 thread T0
          #0 0x10005214d in IntWrapper<void (int)>::operator=(IntWrapper<void (int)> const&) asan-symbolize-templated-cxx.cpp:10
          #1 0x10004cb0e in void writeToA<IntWrapper<void (int)> >(IntWrapper<void (int)>) asan-symbolize-templated-cxx.cpp:30
          #2 0x100057f27 in decltype(std::__1::forward<void (*&)(IntWrapper<void (int)>)>(fp)(std::__1::forward<IntWrapper<void (int)> >(fp0))) std::__1::__invoke<void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)> >(void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)>&&) type_traits:4425
          #3 0x100057dc1 in void std::__1::__invoke_void_return_wrapper<void>::__call<void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)> >(void (*&)(IntWrapper<void (int)>), IntWrapper<void (int)>&&) __functional_base:348
          #4 0x100057d71 in std::__1::__function::__alloc_func<void (*)(IntWrapper<void (int)>), std::__1::allocator<void (*)(IntWrapper<void (int)>)>, void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>&&) functional:1533
          #5 0x1000544e2 in std::__1::__function::__func<void (*)(IntWrapper<void (int)>), std::__1::allocator<void (*)(IntWrapper<void (int)>)>, void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>&&) functional:1707
          #6 0x100058d7b in std::__1::__function::__value_func<void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>&&) const functional:1860
          #7 0x100058c17 in std::__1::function<void (IntWrapper<void (int)>)>::operator()(IntWrapper<void (int)>) const functional:2419
          #8 0x10004cca6 in Foo<void (IntWrapper<void (int)>), IntWrapper<void (int)> >::doCall(IntWrapper<void (int)>) asan-symbolize-templated-cxx.cpp:44
          #9 0x10004c88b in main asan-symbolize-templated-cxx.cpp:54
          #10 0x7fff6ffdfcc8 in start (in libdyld.dylib) + 0
      ```
      
      rdar://problem/58887175
      
      Reviewers: kubamracek, yln
      
      Subscribers: #sanitizers, llvm-commits
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D79597
      5811f3a9
  15. May 19, 2020
    • Matt Morehouse's avatar
      Entropic: Boosting LibFuzzer Performance · e2e38fca
      Matt Morehouse authored
      Summary:
      This is collaboration between Marcel Boehme @ Monash, Australia and Valentin Manès plus Sang Kil Cha @ KAIST, South Korea.
      
      We have made a few modifications to boost LibFuzzer performance by changing how weights are assigned to the seeds in the corpus. Essentially, seeds that reveal more "information" about globally rare features are assigned a higher weight. Our results on the Fuzzer Test Suite seem quite promising. In terms of bug finding, our Entropic patch usually finds the same errors much faster and in more runs. In terms of coverage, our version Entropic achieves the same coverage in less than half the time for the majority of subjects. For the lack of space, we shared more detailed performance results directly with @kcc. We'll publish the preprint with all the technical details as soon as it is accepted. Happy to share if you drop us an email.
      
      There should be plenty of opportunities to optimise further. For instance, while Entropic achieves the same coverage in less than half the time, Entropic has a much lower #execs per second. We ran the perf-tool and found a few performance bottlenecks.
      
      Thanks for open-sourcing LibFuzzer (and the entire LLVM Compiler Infrastructure)! This has been such a tremendous help to my research.
      
      Patch By: Marcel Boehme
      
      Reviewers: kcc, metzman, morehouse, Dor1s, vitalybuka
      
      Reviewed By: kcc
      
      Subscribers: dgg5503, Valentin, llvm-commits, kcc
      
      Tags: #llvm
      
      Differential Revision: https://reviews.llvm.org/D73776
      e2e38fca
  16. May 18, 2020
  17. May 17, 2020
  18. May 15, 2020
    • Jinsong Ji's avatar
      [compiler-rt][CMAKE] Only add cmake link flags in standalone build · 853b5cba
      Jinsong Ji authored
      Only add CMAKE_EXE_LINKER_FLAGS when in a standalone bulid.
      Or else CMAKE_EXE_LINKER_FLAGS contains flags for build compiler of Clang/llvm.
      This might not be the same as what the COMPILER_RT_TEST_COMPILER supports.
      eg: the build compiler use lld linker and we use it to build clang with
      default ld linker then to be tested clang will complain about lld
      options like --color-diagnostics.
      
      Reviewed By: phosek
      
      Differential Revision: https://reviews.llvm.org/D78373
      853b5cba
Loading