- Jun 04, 2020
-
-
Julian Lettner authored
Extract ParseVersion helper function for testing. Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D80761
-
Julian Lettner authored
Fixup for ba6b1b43.
-
Julian Lettner authored
Fixup for ba6b1b43.
-
- Jun 03, 2020
-
-
Julian Lettner authored
Use a struct to represent numerical versions instead of encoding release names in an enumeration. This avoids the need to extend the enumeration every time there is a new release. Rename `GetMacosVersion() -> GetMacosAlignedVersion()` to better reflect how this is used on non-MacOS platforms. Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D79970
-
- Jun 01, 2020
-
-
Martin Liska authored
Remove it from target-specific scope which corresponds to sanitizer_linux.cpp where it lives in the same macro scope. Differential Revision: https://reviews.llvm.org/D80864
-
Julian Lettner authored
This applies the learnings from [1]. What I intended as a simple cleanup made me realize that the compiler-rt version checks have two separate issues: 1) In some places (e.g., mmap flag setting) what matters is the kernel version, not the OS version. 2) OS version checks are implemented by querying the kernel version. This is not necessarily correct inside the simulators if the simulator runtime isn't aligned with the host macOS. This commit tackles 1) by adopting a separate query function for the Darwin kernel version. 2) (and cleanups) will be dealt with in follow-ups. [1] https://reviews.llvm.org/D78942 rdar://63031937 Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D79965
-
- May 29, 2020
-
-
Vitaly Buka authored
Summary: See https://github.com/google/sanitizers/issues/1253. Small patch to enable compilation on (ancient) Red Hat Enterprise Linux 5. Reviewers: kcc, vitalybuka Reviewed By: vitalybuka Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D80648
-
- May 21, 2020
-
-
Julian Lettner authored
The oldest supported deployment target currently is 10.7 [1]. We can remove a few outdated checks. [1] https://github.com/llvm/llvm-project/blob/3db893b3712a5cc98ac0dbc88e08df70069be216/compiler-rt/cmake/config-ix.cmake#L397 Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D79958
-
- May 20, 2020
-
-
Matt Morehouse authored
-
Amy Huang authored
-
- May 12, 2020
-
-
Evgenii Stepanov authored
Summary: Fix hwasan allocator not respecting the requested alignment when it is higher than a page, but still within primary (i.e. [2048, 65536]). Reviewers: pcc, hctim, cryptoad Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D79656
-
- May 11, 2020
-
-
Julian Lettner authored
Create a sanitizer_ptrauth.h header that #includes <ptrauth> when available and defines just the required macros as "no ops" otherwise. This should avoid the need for excessive #ifdef'ing. Follow-up to and discussed in: https://reviews.llvm.org/D79132 Reviewed By: delcypher Differential Revision: https://reviews.llvm.org/D79540
-
- May 07, 2020
-
-
Julian Lettner authored
When reporting diagnostics from ASan's (and other sanitizer's) signal handlers we should strip the "invalid signature" bit before printing addresses. This makes the report less confusing and let's the user focus on the real issue. rdar://62615826 Reviewed By: kubamracek, delcypher Differential Revision: https://reviews.llvm.org/D79132
-
- Apr 29, 2020
-
-
Julian Lettner authored
Newer iOS SDK introduce accessors to retrieve the register values (arm_thread_state64_get_*) and disallows direct access to fields. If arm_thread_state64_get_sp is defined, the accessors are available.
-
- Apr 25, 2020
-
-
Pratyai Mazumder authored
Summary: Following up the discussion on D77638 (and following rGd6cfed6060c283dc4a6bf9ca294dcd732e8b9f72 as example), defining `__sanitizer_cov_bool_flag_init` as the weak interface functions in various compiler-rt/ files. Reviewers: vitalybuka Reviewed By: vitalybuka Subscribers: dberris, #sanitizers Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D77857
-
- Apr 21, 2020
-
-
Dan Liew authored
Summary: 861b69fa (rdar://problem/58789439) while fixing symbolization for TSan completely broke ASan's runtime for the simulators. The problem with the previous patch is that the memory passed to `putenv()` was poisoned and when passed to `putenv()` it tripped an interceptor for `strchr()` which saw the memory was poisoned and raised an ASan issue. The memory was poisoned because `AtosSymbolizerProcess` objects are created using ASan's internal allocator. Memory from this allocator gets poisoned with `kAsanInternalHeapMagic`. To workaround this, this patch makes the memory for the environment variable entry a global variable that isn't poisoned. This pass also adds a `DCHECK(getenv(K_ATOS_ENV_VAR))` because the following DCHECK would crash because `internal_strcmp()` doesn't work on nullptr. rdar://problem/62067724 Reviewers: kubamracek, yln Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D78525
-
- Apr 18, 2020
-
-
Dan Liew authored
Summary: Due to sandbox restrictions in the recent versions of the simulator runtime the atos program is no longer able to access the task port of a parent process without additional help. This patch fixes this by registering a task port for the parent process before spawning atos and also tells atos to look for this by setting a special environment variable. This patch is based on an Apple internal fix (rdar://problem/43693565) that unfortunately contained a bug (rdar://problem/58789439) because it used setenv() to set the special environment variable. This is not safe because in certain circumstances this can trigger a call to realloc() which can fail during symbolization leading to deadlock. A test case is included that captures this problem. The approach used to set the necessary environment variable is as follows: 1. Calling `putenv()` early during process init (but late enough that malloc/realloc works) to set a dummy value for the environment variable. 2. Just before `atos` is spawned the storage for the environment variable is modified to contain the correct PID. A flaw with this approach is that if the application messes with the atos environment variable (i.e. unsets it or changes it) between the time its set and the time we need it then symbolization will fail. We will ignore this issue for now but a `DCHECK()` is included in the patch that documents this assumption but doesn't check it at runtime to avoid calling `getenv()`. The issue reported in rdar://problem/58789439 manifested as a deadlock during symbolization in the following situation: 1. Before TSan detects an issue something outside of the runtime calls setenv() that sets a new environment variable that wasn't previously set. This triggers a call to malloc() to allocate a new environment array. This uses TSan's normal user-facing allocator. LibC stores this pointer for future use later. 2. TSan detects an issue and tries to launch the symbolizer. When we are in the symbolizer we switch to a different (internal allocator) and then we call setenv() to set a new environment variable. When this happen setenv() sees that it needs to make the environment array larger and calls realloc() on the existing enviroment array because it remembers that it previously allocated memory for it. Calling realloc() fails here because it is being called on a pointer its never seen before. The included test case closely reproduces the originally reported problem but it doesn't replicate the `((kBlockMagic)) == ((((u64*)addr)[0])` assertion failure exactly. This is due to the way TSan's normal allocator allocates the environment array the first time it is allocated. In the test program addr[0] accesses an inaccessible page and raises SIGBUS. If TSan's SIGBUS signal handler is active, the signal is caught and symbolication is attempted again which results in deadlock. In the originally reported problem the pointer is successfully derefenced but then the assert fails due to the provided pointer not coming from the active allocator. When the assert fails TSan tries to symbolicate the stacktrace while already being in the middle of symbolication which results in deadlock. rdar://problem/58789439 Reviewers: kubamracek, yln Subscribers: jfb, #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D78179
-
- Apr 17, 2020
-
-
Dan Liew authored
[NFC] Introduce a `LateInitialize()` method to `SymbolizerTool` that is called during the LateInitialize stage of the sanitizer runtimes. Summary: This is implemented by adding a `Symbolizer::LateInitializeTools()` method that iterates over the registered tools and calls the `LateInitialize()` method on them. `Symbolizer::LateInitializeTools()` is now called from the various `Symbolizer::LateInitialize()` implementations. The default implementation of `SymbolizerTool::LateInitialize()` does nothing so this change should be NFC. This change allows `SymbolizerTool` implementations to perform any initialization that they need to perform at the LateInitialize stage of a sanitizer runtime init. rdar://problem/58789439 Reviewers: kubamracek, yln, vitalybuka, cryptoad, phosek, rnk Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D78178
-
- Apr 13, 2020
-
-
Dan Liew authored
Summary: Previously `AtosSymbolizer` would set the PID to examine in the constructor which is called early on during sanitizer init. This can lead to incorrect behaviour in the case of a fork() because if the symbolizer is launched in the child it will be told examine the parent process rather than the child. To fix this the PID is determined just before the symbolizer is launched. A test case is included that triggers the buggy behaviour that existed prior to this patch. The test observes the PID that `atos` was called on. It also examines the symbolized stacktrace. Prior to this patch `atos` failed to symbolize the stacktrace giving output that looked like... ``` #0 0x100fc3bb5 in __sanitizer_print_stack_trace asan_stack.cpp:86 #1 0x10490dd36 in PrintStack+0x56 (/path/to/print-stack-trace-in-code-loaded-after-fork.cpp.tmp_shared_lib.dylib:x86_64+0xd36) #2 0x100f6f986 in main+0x4a6 (/path/to/print-stack-trace-in-code-loaded-after-fork.cpp.tmp_loader:x86_64+0x100001986) #3 0x7fff714f1cc8 in start+0x0 (/usr/lib/system/libdyld.dylib:x86_64+0x1acc8) ``` After this patch stackframes `#1` and `#2` are fully symbolized. This patch is also a pre-requisite refactor for rdar://problem/58789439. Reviewers: kubamracek, yln Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D77623
-
Dan Liew authored
Summary: In preparation for writing a test for a bug fix we need to be able to see the command used to launch the symbolizer process. This feature will likely be useful for debugging how the Sanitizers use the symbolizer in general. This patch causes the command line used to launch the process to be shown at verbosity level 3 and higher. A small test case is included. Reviewers: kubamracek, yln, vitalybuka, eugenis, kcc Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D77622
-
- Apr 11, 2020
-
-
Dmitry Vyukov authored
Tsan does not support ASLR on NetBSD. Disable ASLR in the Go test and extend the error message to be more actionable. Reported-by: Keith Randall (khr)
-
- Apr 08, 2020
-
-
Ilya Leoshkevich authored
Summary: Commit b684c1a5 ("Add a `Symbolizer::GetEnvP()` method that allows symbolizer implementations to customise the environment of the symbolizer binary.") exposed a latent ARM issue, and that broke http://lab.llvm.org:8011/builders/clang-cmake-thumbv7-full-sh This coincided with breakage caused by my commit 5f5fb56c ("[compiler-rt] Intercept the uname() function"), so I had to investigate. The issue is that GetArgsAndEnv does not work on ARM: there glibc's _start overwrites argc value stored at __libc_start_end, breaking the existing argv/envp parsing logic. Fix by inferring argc from argv. Reviewers: eugenis, vitalybuka Reviewed By: eugenis Subscribers: dberris, kristof.beyls, danielkiss, #sanitizers, delcypher Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D77400
-
- Apr 07, 2020
-
-
Dmitry Vyukov authored
PPC now requires ReExec due to ASLR. Pull in more functions for Go build. Suggested-by: Keith Randall (khr)
-
- Apr 06, 2020
-
-
Matt Morehouse authored
-
Matt Morehouse authored
This reverts commit 68d73dfa.
-
Matt Morehouse authored
This reverts commit 98bb7fdb.
-
Matt Morehouse authored
-
Matt Morehouse authored
-
- Apr 05, 2020
-
-
Kamil Rytarowski authored
Add a fallback definition of the netsmb device driver that was removed.
-
- Mar 28, 2020
-
-
Ilya Leoshkevich authored
Summary: Commit 5f5fb56c ("[compiler-rt] Intercept the uname() function") broke sanitizer-x86_64-linux and clang-cmake-thumbv7-full-sh (again) builds: http://lab.llvm.org:8011/builders/sanitizer-x86_64-linux/builds/26313 http://lab.llvm.org:8011/builders/clang-cmake-thumbv7-full-sh/builds/4324 The reason is that uname() can be called as early as __pthread_initialize_minimal_internal(). When intercepted, this triggers ASan initialization, which eventually calls dlerror(), which in turn uses pthreads, causing all sorts of issues. Fix by falling back to internal_uname() when interceptor runs before ASan is initialized. This is only for Linux at the moment. Reviewers: eugenis, vitalybuka Reviewed By: eugenis Subscribers: dberris, #sanitizers, pcc Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D76919
-
- Mar 26, 2020
-
-
Luís Marques authored
This patch follows the approach also used for MIPS, where we decode the offending instruction to determine if the fault was caused by a read or write operation, as that seems to be the only relevant information we have in the signal context structure to determine that. Differential Revision: https://reviews.llvm.org/D75168
-
Ilya Leoshkevich authored
Commit 5f5fb56c ("[compiler-rt] Intercept the uname() function") broke clang-cmake-thumbv7-full-sh build: http://lab.llvm.org:8011/builders/clang-cmake-thumbv7-full-sh/builds/4296 This also affects i386. The reason is that intercepted uname() is called by GetKernelAreaSize() during ASAN initialization on 32-bit platforms, but the respective interceptor is not initialized yet at this point, leading to null pointer dereference. Introduce internal_uname() wrapper around uname syscall, and use it in GetKernelAreaSize() and in FixedCVE_2016_2143(). Author: Ilya Leoshkevich Reviewed By: Evgenii Stepanov Differential Revision: https://reviews.llvm.org/D76776
-
- Mar 25, 2020
-
-
Dmitry Vyukov authored
tsan while used by golang's race detector was not working on alpine linux, since it is using musl-c instead of glibc. Since alpine is very popular distribution for container deployments, having working race detector would be nice. This commits adds some ifdefs to get it working. It fixes https://github.com/golang/go/issues/14481 on golang's issue tracker. Reviewed-in: https://reviews.llvm.org/D75849 Author: graywolf-at-work (Tomas Volf)
-
- Mar 24, 2020
-
-
Dan Liew authored
Add a `Symbolizer::GetEnvP()` method that allows symbolizer implementations to customise the environment of the symbolizer binary. Summary: This change introduces the `Symbolizer::GetEnvP()` method that returns a pointer to environment array used for spawning the symbolizer process. The motivation is to allow implementations to customise the environment if required. The default implementation just returns `__sanitizer::GetEnviron()` which (provided it's implemented) should preserve the existing behaviours of the various implementations. This change has been plumbed through the `internal_spawn(...)` and `StartSubprocess(...)` process spawning implementations. For the `StartSubprocess()` implementation we need to call `execve()` rather than `execv()` to pass the environment. However, it appears that `internal_execve(...)` exists in sanitizer_common so this patch use that which seems like a nice clean up. Support in the Windows implementation of `SymbolizerProcess:StartSymbolizerSubprocess()` has not been added because the Windows sanitizer runtime doesn't implement `GetEnviron()`. rdar://problem/58789439 Reviewers: kubamracek, yln, dvyukov, vitalybuka, eugenis, phosek, aizatsky, rnk Subscribers: #sanitizers, llvm-commits Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D76666
-
Evgenii Stepanov authored
struct stack_t on Linux x86_64 has internal padding which may be left uninitialized. The check should be replaced with multiple checks for individual fields of the struct. For now, remove the check altogether.
-
- Mar 23, 2020
-
-
Ilya Leoshkevich authored
Summary: Move interceptor from msan to sanitizer_common_interceptors.inc, so that other sanitizers could benefit. Adjust FixedCVE_2016_2143() to deal with the intercepted uname(). Patch by Ilya Leoshkevich. Reviewers: eugenis, vitalybuka, uweigand, jonpa Reviewed By: eugenis, vitalybuka Subscribers: dberris, krytarowski, #sanitizers, stefansf, Andreas-Krebbel Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D76578
-
- Mar 20, 2020
-
-
Petr Hosek authored
The VMO size is always page-rounded, but Zircon now provides a way to publish the precise intended size. Patch By: mcgrathr Differential Revision: https://reviews.llvm.org/D76437
-
- Mar 17, 2020
-
-
Vitaly Buka authored
Return value is not used anyway as PTHREAD_JOIN is not implemented.
-
- Mar 16, 2020
-
-
Kamil Rytarowski authored
Add fallback definition for the IPFilter ioctl commands.
-
- Mar 13, 2020
-
-
Evgenii Stepanov authored
Recvfrom may receive a 0 byte packet with a non-empty source address.
-