[libFuzzer] Fix stack overflow detection
authorSebastian Poeplau <poeplau@code-intelligence.com>
Fri, 7 May 2021 15:00:33 +0000 (08:00 -0700)
committerMatt Morehouse <mascasa@google.com>
Fri, 7 May 2021 15:18:28 +0000 (08:18 -0700)
commit70cbc6dbef7048d3b1aa89a676d96c6ba075b41b
tree663a81451267ef2a911d6245996b460bf2e814d2
parenta970e69d6b62d60c4c222e2a4be0a73999c97651
[libFuzzer] Fix stack overflow detection

Address sanitizer can detect stack exhaustion via its SEGV handler, which is
executed on a separate stack using the sigaltstack mechanism. When libFuzzer is
used with address sanitizer, it installs its own signal handlers which defer to
those put in place by the sanitizer before performing additional actions. In the
particular case of a stack overflow, the current setup fails because libFuzzer
doesn't preserve the flag for executing the signal handler on a separate stack:
when we run out of stack space, the operating system can't run the SEGV handler,
so address sanitizer never reports the issue. See the included test for an
example.

This commit fixes the issue by making libFuzzer preserve the SA_ONSTACK flag
when installing its signal handlers; the dedicated signal-handler stack set up
by the sanitizer runtime appears to be large enough to support the additional
frames from the fuzzer.

Reviewed By: morehouse

Differential Revision: https://reviews.llvm.org/D101824
compiler-rt/lib/fuzzer/FuzzerUtilPosix.cpp
compiler-rt/test/fuzzer/StackOverflowTest.cpp [new file with mode: 0644]
compiler-rt/test/fuzzer/stack-overflow-with-asan.test [new file with mode: 0644]