summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMike Aizatsky <aizatsky@chromium.org>2016-04-27 18:02:21 +0000
committerMike Aizatsky <aizatsky@chromium.org>2016-04-27 18:02:21 +0000
commitccd318dc7ec4365ea03a68d7fe13929ea0b1b3c8 (patch)
treef5d4d8e69ba422b47935a7ba5ef0196efec1df8c
parent2eabf2484fe442a45125bce479996b32ffb2b5fa (diff)
downloadbcm5719-llvm-ccd318dc7ec4365ea03a68d7fe13929ea0b1b3c8.tar.gz
bcm5719-llvm-ccd318dc7ec4365ea03a68d7fe13929ea0b1b3c8.zip
[sanitizers] read/write page fault detection on mac.
Summary: Resubmit of http://reviews.llvm.org/D19495 enabled only on intel. Subscribers: kubabrecka Differential Revision: http://reviews.llvm.org/D19561 llvm-svn: 267750
-rw-r--r--compiler-rt/lib/sanitizer_common/sanitizer_mac.cc7
-rw-r--r--compiler-rt/test/asan/TestCases/Darwin/segv_read_write.c26
2 files changed, 32 insertions, 1 deletions
diff --git a/compiler-rt/lib/sanitizer_common/sanitizer_mac.cc b/compiler-rt/lib/sanitizer_common/sanitizer_mac.cc
index 356541d2390..325bdc9e2c1 100644
--- a/compiler-rt/lib/sanitizer_common/sanitizer_mac.cc
+++ b/compiler-rt/lib/sanitizer_common/sanitizer_mac.cc
@@ -506,7 +506,12 @@ void LogFullErrorReport(const char *buffer) {
}
SignalContext::WriteFlag SignalContext::GetWriteFlag(void *context) {
- return UNKNOWN; // FIXME: implement this.
+#if defined(__x86_64__) || defined(__i386__)
+ ucontext_t *ucontext = static_cast<ucontext_t*>(context);
+ return ucontext->uc_mcontext->__es.__err & 2 /*T_PF_WRITE*/ ? WRITE : READ;
+#else
+ return UNKNOWN;
+#endif
}
void GetPcSpBp(void *context, uptr *pc, uptr *sp, uptr *bp) {
diff --git a/compiler-rt/test/asan/TestCases/Darwin/segv_read_write.c b/compiler-rt/test/asan/TestCases/Darwin/segv_read_write.c
new file mode 100644
index 00000000000..036fdc490b9
--- /dev/null
+++ b/compiler-rt/test/asan/TestCases/Darwin/segv_read_write.c
@@ -0,0 +1,26 @@
+// RUN: %clangxx_asan -std=c++11 -O0 %s -o %t
+// RUN: not %run %t 2>&1 | FileCheck %s --check-prefix=READ
+// RUN: not %run %t write 2>&1 | FileCheck %s --check-prefix=WRITE
+// REQUIRES: x86-target-arch
+
+#include <sys/mman.h>
+
+static volatile int sink;
+__attribute__((noinline)) void Read(int *ptr) { sink = *ptr; }
+__attribute__((noinline)) void Write(int *ptr) { *ptr = 0; }
+int main(int argc, char **argv) {
+ // Writes to shadow are detected as reads from shadow gap (because of how the
+ // shadow mapping works). This is kinda hard to fix. Test a random address in
+ // the application part of the address space.
+ void *volatile p =
+ mmap(nullptr, 4096, PROT_READ, MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
+ munmap(p, 4096);
+ if (argc == 1)
+ Read((int *)p);
+ else
+ Write((int *)p);
+}
+// READ: AddressSanitizer: SEGV on unknown address
+// READ: The signal is caused by a READ memory access.
+// WRITE: AddressSanitizer: SEGV on unknown address
+// WRITE: The signal is caused by a WRITE memory access.
OpenPOWER on IntegriCloud