Skip to content
  1. Jun 04, 2020
  2. Jun 03, 2020
    • Julian Lettner's avatar
      [Darwin] Improve runtime OS version checks · ba6b1b43
      Julian Lettner authored
      Use a struct to represent numerical versions instead of encoding release
      names in an enumeration. This avoids the need to extend the enumeration
      every time there is a new release.
      
      Rename `GetMacosVersion() -> GetMacosAlignedVersion()` to better reflect
      how this is used on non-MacOS platforms.
      
      Reviewed By: delcypher
      
      Differential Revision: https://reviews.llvm.org/D79970
      ba6b1b43
  3. Jun 01, 2020
  4. May 29, 2020
  5. May 21, 2020
  6. May 20, 2020
  7. May 12, 2020
  8. May 11, 2020
  9. May 07, 2020
  10. Apr 29, 2020
    • Julian Lettner's avatar
      [Darwin] Fix compilation issues on arm64 · 82ed13cd
      Julian Lettner authored
      Newer iOS SDK introduce accessors to retrieve the register values
      (arm_thread_state64_get_*) and disallows direct access to fields. If
      arm_thread_state64_get_sp is defined, the accessors are available.
      82ed13cd
  11. Apr 25, 2020
  12. Apr 21, 2020
    • Dan Liew's avatar
      Unbreak ASan runtime in the simulators. · 7039773b
      Dan Liew authored
      Summary:
      861b69fa (rdar://problem/58789439) while
      fixing symbolization for TSan completely broke ASan's runtime for the
      simulators.
      
      The problem with the previous patch is that the memory passed to
      `putenv()` was poisoned and when passed to `putenv()` it tripped
      an interceptor for `strchr()` which saw the memory was poisoned and
      raised an ASan issue.
      
      The memory was poisoned because `AtosSymbolizerProcess` objects
      are created using ASan's internal allocator. Memory from this
      allocator gets poisoned with `kAsanInternalHeapMagic`.
      
      To workaround this, this patch makes the memory for the environment
      variable entry a global variable that isn't poisoned.
      
      This pass also adds a `DCHECK(getenv(K_ATOS_ENV_VAR))` because the
      following DCHECK would crash because `internal_strcmp()` doesn't
      work on nullptr.
      
      rdar://problem/62067724
      
      Reviewers: kubamracek, yln
      
      Subscribers: #sanitizers, llvm-commits
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D78525
      7039773b
  13. Apr 18, 2020
    • Dan Liew's avatar
      [Darwin] Fix symbolization for recent simulator runtimes. · 861b69fa
      Dan Liew authored
      Summary:
      Due to sandbox restrictions in the recent versions of the simulator runtime the
      atos program is no longer able to access the task port of a parent process
      without additional help.
      
      This patch fixes this by registering a task port for the parent process
      before spawning atos and also tells atos to look for this by setting
      a special environment variable.
      
      This patch is based on an Apple internal fix (rdar://problem/43693565) that
      unfortunately contained a bug (rdar://problem/58789439) because it used
      setenv() to set the special environment variable. This is not safe because in
      certain circumstances this can trigger a call to realloc() which can fail
      during symbolization leading to deadlock. A test case is included that captures
      this problem.
      
      The approach used to set the necessary environment variable is as
      follows:
      
      1. Calling `putenv()` early during process init (but late enough that
      malloc/realloc works) to set a dummy value for the environment variable.
      
      2. Just before `atos` is spawned the storage for the environment
      variable is modified to contain the correct PID.
      
      A flaw with this approach is that if the application messes with the
      atos environment variable (i.e. unsets it or changes it) between the
      time its set and the time we need it then symbolization will fail. We
      will ignore this issue for now but a `DCHECK()` is included in the patch
      that documents this assumption but doesn't check it at runtime to avoid
      calling `getenv()`.
      
      The issue reported in rdar://problem/58789439 manifested as a deadlock
      during symbolization in the following situation:
      
      1. Before TSan detects an issue something outside of the runtime calls
      setenv() that sets a new environment variable that wasn't previously
      set. This triggers a call to malloc() to allocate a new environment
      array. This uses TSan's normal user-facing allocator. LibC stores this
      pointer for future use later.
      
      2. TSan detects an issue and tries to launch the symbolizer. When we are in the
      symbolizer we switch to a different (internal allocator) and then we call
      setenv() to set a new environment variable. When this happen setenv() sees
      that it needs to make the environment array larger and calls realloc() on the
      existing enviroment array because it remembers that it previously allocated
      memory for it. Calling realloc() fails here because it is being called on a
      pointer its never seen before.
      
      The included test case closely reproduces the originally reported
      problem but it doesn't replicate the `((kBlockMagic)) ==
      ((((u64*)addr)[0])` assertion failure exactly. This is due to the way
      TSan's normal allocator allocates the environment array the first time
      it is allocated. In the test program addr[0] accesses an inaccessible
      page and raises SIGBUS. If TSan's SIGBUS signal handler is active, the
      signal is caught and symbolication is attempted again which results in
      deadlock.
      
      In the originally reported problem the pointer is successfully derefenced but
      then the assert fails due to the provided pointer not coming from the active
      allocator. When the assert fails TSan tries to symbolicate the stacktrace while
      already being in the middle of symbolication which results in deadlock.
      
      rdar://problem/58789439
      
      Reviewers: kubamracek, yln
      
      Subscribers: jfb, #sanitizers, llvm-commits
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D78179
      861b69fa
  14. Apr 17, 2020
    • Dan Liew's avatar
      [NFC] Introduce a `LateInitialize()` method to `SymbolizerTool` that is called... · fccea7f3
      Dan Liew authored
      [NFC] Introduce a `LateInitialize()` method to `SymbolizerTool` that is called during the LateInitialize stage of the sanitizer runtimes.
      
      Summary:
      This is implemented by adding a `Symbolizer::LateInitializeTools()`
      method that iterates over the registered tools and calls the
      `LateInitialize()` method on them.
      
      `Symbolizer::LateInitializeTools()` is now called from the various
      `Symbolizer::LateInitialize()` implementations.
      
      The default implementation of `SymbolizerTool::LateInitialize()`
      does nothing so this change should be NFC.
      
      This change allows `SymbolizerTool` implementations to perform
      any initialization that they need to perform at the
      LateInitialize stage of a sanitizer runtime init.
      
      rdar://problem/58789439
      
      Reviewers: kubamracek, yln, vitalybuka, cryptoad, phosek, rnk
      
      Subscribers: #sanitizers, llvm-commits
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D78178
      fccea7f3
  15. Apr 13, 2020
    • Dan Liew's avatar
      [Darwin] Fix a bug where the symbolizer would examine the wrong process. · 8efc3cca
      Dan Liew authored
      Summary:
      Previously `AtosSymbolizer` would set the PID to examine in the
      constructor which is called early on during sanitizer init. This can
      lead to incorrect behaviour in the case of a fork() because if the
      symbolizer is launched in the child it will be told examine the parent
      process rather than the child.
      
      To fix this the PID is determined just before the symbolizer is
      launched.
      
      A test case is included that triggers the buggy behaviour that existed
      prior to this patch. The test observes the PID that `atos` was called
      on. It also examines the symbolized stacktrace. Prior to this patch
      `atos` failed to symbolize the stacktrace giving output that looked
      like...
      
      ```
        #0 0x100fc3bb5 in __sanitizer_print_stack_trace asan_stack.cpp:86
        #1 0x10490dd36 in PrintStack+0x56 (/path/to/print-stack-trace-in-code-loaded-after-fork.cpp.tmp_shared_lib.dylib:x86_64+0xd36)
        #2 0x100f6f986 in main+0x4a6 (/path/to/print-stack-trace-in-code-loaded-after-fork.cpp.tmp_loader:x86_64+0x100001986)
        #3 0x7fff714f1cc8 in start+0x0 (/usr/lib/system/libdyld.dylib:x86_64+0x1acc8)
      ```
      
      After this patch stackframes `#1` and `#2` are fully symbolized.
      
      This patch is also a pre-requisite refactor for rdar://problem/58789439.
      
      Reviewers: kubamracek, yln
      
      Subscribers: #sanitizers, llvm-commits
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D77623
      8efc3cca
    • Dan Liew's avatar
      [Sanitizer Common] Show command used to launch symbolizer process at high verbosity level. · 2169568d
      Dan Liew authored
      Summary:
      In preparation for writing a test for a bug fix we need to be able to
      see the command used to launch the symbolizer process. This feature
      will likely be useful for debugging how the Sanitizers use the
      symbolizer in general.
      
      This patch causes the command line used to launch the process to be
      shown at verbosity level 3 and higher.
      
      A small test case is included.
      
      Reviewers: kubamracek, yln, vitalybuka, eugenis, kcc
      
      Subscribers: #sanitizers, llvm-commits
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D77622
      2169568d
  16. Apr 11, 2020
  17. Apr 08, 2020
    • Ilya Leoshkevich's avatar
      [compiler-rt] Don't use __libc_stack_end on ARM · aaba9a77
      Ilya Leoshkevich authored
      Summary:
      Commit b684c1a5 ("Add a `Symbolizer::GetEnvP()` method that allows
      symbolizer implementations to customise the environment of the
      symbolizer binary.") exposed a latent ARM issue, and that broke
      
      http://lab.llvm.org:8011/builders/clang-cmake-thumbv7-full-sh
      
      This coincided with breakage caused by my commit 5f5fb56c
      ("[compiler-rt] Intercept the uname() function"), so I had to
      investigate.
      
      The issue is that GetArgsAndEnv does not work on ARM: there glibc's
      _start overwrites argc value stored at __libc_start_end, breaking the
      existing argv/envp parsing logic.
      
      Fix by inferring argc from argv.
      
      Reviewers: eugenis, vitalybuka
      
      Reviewed By: eugenis
      
      Subscribers: dberris, kristof.beyls, danielkiss, #sanitizers, delcypher
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D77400
      aaba9a77
  18. Apr 07, 2020
    • Dmitry Vyukov's avatar
      tsan: fix Go/ppc build · 2db63723
      Dmitry Vyukov authored
      PPC now requires ReExec due to ASLR.
      Pull in more functions for Go build.
      
      Suggested-by: Keith Randall (khr)
      2db63723
  19. Apr 06, 2020
  20. Apr 05, 2020
  21. Mar 28, 2020
  22. Mar 26, 2020
  23. Mar 25, 2020
  24. Mar 24, 2020
    • Dan Liew's avatar
      Add a `Symbolizer::GetEnvP()` method that allows symbolizer implementations to... · b684c1a5
      Dan Liew authored
      Add a `Symbolizer::GetEnvP()` method that allows symbolizer implementations to customise the environment of the symbolizer binary.
      
      Summary:
      This change introduces the `Symbolizer::GetEnvP()` method that returns a
      pointer to environment array used for spawning the symbolizer process.
      The motivation is to allow implementations to customise the environment
      if required.  The default implementation just returns
      `__sanitizer::GetEnviron()` which (provided it's implemented) should
      preserve the existing behaviours of the various implementations.
      
      This change has been plumbed through the `internal_spawn(...)` and
      `StartSubprocess(...)` process spawning implementations.
      
      For the `StartSubprocess()` implementation we need to call `execve()`
      rather than `execv()` to pass the environment. However, it appears that
      `internal_execve(...)` exists in sanitizer_common so this patch use that
      which seems like a nice clean up.
      
      Support in the Windows implementation of
      `SymbolizerProcess:StartSymbolizerSubprocess()` has not been added
      because the Windows sanitizer runtime doesn't implement `GetEnviron()`.
      
      rdar://problem/58789439
      
      Reviewers: kubamracek, yln, dvyukov, vitalybuka, eugenis, phosek, aizatsky, rnk
      
      Subscribers: #sanitizers, llvm-commits
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D76666
      b684c1a5
    • Evgenii Stepanov's avatar
      [msan] Fix sigaltstack false positive. · 987f1539
      Evgenii Stepanov authored
      struct stack_t on Linux x86_64 has internal padding which may be left
      uninitialized. The check should be replaced with multiple checks for
      individual fields of the struct. For now, remove the check altogether.
      987f1539
  25. Mar 23, 2020
    • Ilya Leoshkevich's avatar
      [compiler-rt] Intercept the uname() function · 5f5fb56c
      Ilya Leoshkevich authored
      Summary:
      Move interceptor from msan to sanitizer_common_interceptors.inc, so that
      other sanitizers could benefit.
      
      Adjust FixedCVE_2016_2143() to deal with the intercepted uname().
      
      Patch by Ilya Leoshkevich.
      
      Reviewers: eugenis, vitalybuka, uweigand, jonpa
      
      Reviewed By: eugenis, vitalybuka
      
      Subscribers: dberris, krytarowski, #sanitizers, stefansf, Andreas-Krebbel
      
      Tags: #sanitizers
      
      Differential Revision: https://reviews.llvm.org/D76578
      5f5fb56c
  26. Mar 20, 2020
  27. Mar 17, 2020
  28. Mar 16, 2020
  29. Mar 13, 2020
Loading