forked from OSchip/llvm-project
Hwasan InitPrctl check for error using internal_iserror
When adding this function in https://reviews.llvm.org/D68794 I did not notice that internal_prctl has the API of the syscall to prctl rather than the API of the glibc (posix) wrapper. This means that the error return value is not necessarily -1 and that errno is not set by the call. For InitPrctl this means that the checks do not catch running on a kernel *without* the required ABI (not caught since I only tested this function correctly enables the ABI when it exists). This commit updates the two calls which check for an error condition to use internal_iserror. That function sets a provided integer to an equivalent errno value and returns a boolean to indicate success or not. Tested by running on a kernel that has this ABI and on one that does not. Verified that running on the kernel without this ABI the current code prints the provided error message and does not attempt to run the program. Verified that running on the kernel with this ABI the current code does not print an error message and turns on the ABI. This done on an x86 kernel (where the ABI does not exist), an AArch64 kernel without this ABI, and an AArch64 kernel with this ABI. In order to keep running the testsuite on kernels that do not provide this new ABI we add another option to the HWASAN_OPTIONS environment variable, this option determines whether the library kills the process if it fails to enable the relaxed syscall ABI or not. This new flag is `fail_without_syscall_abi`. The check-hwasan testsuite results do not change with this patch on either x86, AArch64 without a kernel supporting this ABI, and AArch64 with a kernel supporting this ABI. Differential Revision: https://reviews.llvm.org/D96964
This commit is contained in:
parent
4a5edea193
commit
c1653b8cc7
|
@ -72,3 +72,12 @@ HWASAN_FLAG(uptr, malloc_bisect_right, 0,
|
|||
HWASAN_FLAG(bool, malloc_bisect_dump, false,
|
||||
"Print all allocations within [malloc_bisect_left, "
|
||||
"malloc_bisect_right] range ")
|
||||
|
||||
|
||||
// Exit if we fail to enable the AArch64 kernel ABI relaxation which allows
|
||||
// tagged pointers in syscalls. This is the default, but being able to disable
|
||||
// that behaviour is useful for running the testsuite on more platforms (the
|
||||
// testsuite can run since we manually ensure any pointer arguments to syscalls
|
||||
// are untagged before the call.
|
||||
HWASAN_FLAG(bool, fail_without_syscall_abi, true,
|
||||
"Exit if fail to request relaxed syscall ABI.")
|
||||
|
|
|
@ -119,8 +119,10 @@ void InitPrctl() {
|
|||
#define PR_GET_TAGGED_ADDR_CTRL 56
|
||||
#define PR_TAGGED_ADDR_ENABLE (1UL << 0)
|
||||
// Check we're running on a kernel that can use the tagged address ABI.
|
||||
if (internal_prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0) == (uptr)-1 &&
|
||||
errno == EINVAL) {
|
||||
int local_errno = 0;
|
||||
if (internal_iserror(internal_prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0),
|
||||
&local_errno) &&
|
||||
local_errno == EINVAL) {
|
||||
#if SANITIZER_ANDROID
|
||||
// Some older Android kernels have the tagged pointer ABI on
|
||||
// unconditionally, and hence don't have the tagged-addr prctl while still
|
||||
|
@ -129,17 +131,20 @@ void InitPrctl() {
|
|||
// case.
|
||||
return;
|
||||
#else
|
||||
Printf(
|
||||
"FATAL: "
|
||||
"HWAddressSanitizer requires a kernel with tagged address ABI.\n");
|
||||
Die();
|
||||
if (flags()->fail_without_syscall_abi) {
|
||||
Printf(
|
||||
"FATAL: "
|
||||
"HWAddressSanitizer requires a kernel with tagged address ABI.\n");
|
||||
Die();
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
// Turn on the tagged address ABI.
|
||||
if (internal_prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE, 0, 0, 0) ==
|
||||
(uptr)-1 ||
|
||||
!internal_prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0)) {
|
||||
if ((internal_iserror(internal_prctl(PR_SET_TAGGED_ADDR_CTRL,
|
||||
PR_TAGGED_ADDR_ENABLE, 0, 0, 0)) ||
|
||||
!internal_prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0)) &&
|
||||
flags()->fail_without_syscall_abi) {
|
||||
Printf(
|
||||
"FATAL: HWAddressSanitizer failed to enable tagged address syscall "
|
||||
"ABI.\nSuggest check `sysctl abi.tagged_addr_disabled` "
|
||||
|
|
|
@ -38,7 +38,7 @@ config.substitutions.append( ("%clangxx_hwasan ", build_invocation(clang_hwasan_
|
|||
config.substitutions.append( ("%clangxx_hwasan_oldrt ", build_invocation(clang_hwasan_oldrt_cxxflags)) )
|
||||
config.substitutions.append( ("%compiler_rt_libdir", config.compiler_rt_libdir) )
|
||||
|
||||
default_hwasan_opts_str = ':'.join(['disable_allocator_tagging=1', 'random_tags=0'] + config.default_sanitizer_opts)
|
||||
default_hwasan_opts_str = ':'.join(['disable_allocator_tagging=1', 'random_tags=0', 'fail_without_syscall_abi=0'] + config.default_sanitizer_opts)
|
||||
if default_hwasan_opts_str:
|
||||
config.environment['HWASAN_OPTIONS'] = default_hwasan_opts_str
|
||||
default_hwasan_opts_str += ':'
|
||||
|
|
Loading…
Reference in New Issue