[sanitizer] Add syscall handlers to ASan and TSan runtimes.
authorEvgeniy Stepanov <eugeni.stepanov@gmail.com>
Fri, 12 Apr 2013 14:57:03 +0000 (14:57 +0000)
committerEvgeniy Stepanov <eugeni.stepanov@gmail.com>
Fri, 12 Apr 2013 14:57:03 +0000 (14:57 +0000)
ASan checks addressability of syscall arguments. TSan does nothing for now.

llvm-svn: 179380

compiler-rt/lib/asan/asan_interceptors.cc
compiler-rt/lib/asan/lit_tests/Linux/syscalls.cc [new file with mode: 0644]
compiler-rt/lib/tsan/rtl/tsan_interceptors.cc

index 656477f..8a954bd 100644 (file)
@@ -115,6 +115,12 @@ using namespace __asan;  // NOLINT
 #define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) SetThreadName(name)
 #include "sanitizer_common/sanitizer_common_interceptors.inc"
 
+#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) ASAN_READ_RANGE(p, s)
+#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) ASAN_WRITE_RANGE(p, s)
+#define COMMON_SYSCALL_POST_READ_RANGE(p, s)
+#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s)
+#include "sanitizer_common/sanitizer_common_syscalls.inc"
+
 static thread_return_t THREAD_CALLING_CONV asan_thread_start(void *arg) {
   AsanThread *t = (AsanThread*)arg;
   SetCurrentThread(t);
diff --git a/compiler-rt/lib/asan/lit_tests/Linux/syscalls.cc b/compiler-rt/lib/asan/lit_tests/Linux/syscalls.cc
new file mode 100644 (file)
index 0000000..b2edcfb
--- /dev/null
@@ -0,0 +1,22 @@
+// RUN: %clangxx_asan -m64 -O0 %s -o %t && %t 2>&1 | %symbolize | FileCheck %s
+// RUN: %clangxx_asan -m64 -O3 %s -o %t && %t 2>&1 | %symbolize | FileCheck %s
+
+#include <assert.h>
+#include <errno.h>
+#include <glob.h>
+#include <stdio.h>
+#include <string.h>
+
+#include <sanitizer/linux_syscall_hooks.h>
+
+/* Test the presence of __sanitizer_syscall_ in the tool runtime, and general
+   sanity of their behaviour. */
+
+int main(int argc, char *argv[]) {
+  char buf[1000];
+  __sanitizer_syscall_pre_recvmsg(0, buf - 1, 0);
+  // CHECK: AddressSanitizer: stack-buffer-{{.*}}erflow
+  // CHECK: READ of size {{.*}} at {{.*}} thread T0
+  // CHECK: #0 {{.*}} in __sanitizer_syscall_pre_recvmsg
+  return 0;
+}
index c2438f6..dc7d31d 100644 (file)
@@ -1856,6 +1856,13 @@ struct TsanInterceptorContext {
     ThreadSetName(((TsanInterceptorContext*)ctx)->thr, name)
 #include "sanitizer_common/sanitizer_common_interceptors.inc"
 
+// FIXME: Implement these with MemoryAccessRange().
+#define COMMON_SYSCALL_PRE_READ_RANGE(p, s)
+#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s)
+#define COMMON_SYSCALL_POST_READ_RANGE(p, s)
+#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s)
+#include "sanitizer_common/sanitizer_common_syscalls.inc"
+
 namespace __tsan {
 
 void ProcessPendingSignals(ThreadState *thr) {