mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 21:23:58 +01:00
Merge remote-tracking branch 'teor/feature15817-clang-sanitizers'
This commit is contained in:
commit
64bdf040f0
7
changes/feature15817-clang-sanitizers
Normal file
7
changes/feature15817-clang-sanitizers
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
o Minor enhancements (correctness, testing):
|
||||||
|
- Document use of coverity, clang static analyzer, and clang dynamic
|
||||||
|
undefined behavior and address sanitizers in doc/HACKING.
|
||||||
|
Add clang dynamic sanitizer blacklist in
|
||||||
|
contrib/clang/sanitizer_blacklist.txt to exempt known undefined
|
||||||
|
behavior. Include detailed usage instructions in the blacklist.
|
||||||
|
Patch by "teor".
|
@ -11,6 +11,13 @@ add-tor is an old script to manipulate the approved-routers file.
|
|||||||
nagios-check-tor-authority-cert is a nagios script to check when Tor
|
nagios-check-tor-authority-cert is a nagios script to check when Tor
|
||||||
authority certificates are expired or nearly expired.
|
authority certificates are expired or nearly expired.
|
||||||
|
|
||||||
|
clang/ -- Files for use with the clang compiler
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
|
sanitize_blacklist.txt is used to build Tor with clang's dynamic
|
||||||
|
AddressSanitizer and UndefinedBehaviorSanitizer. It contains detailed
|
||||||
|
instructions on configuration, build, and testing with clang's sanitizers.
|
||||||
|
|
||||||
client-tools/ -- Tools for use with Tor clients
|
client-tools/ -- Tools for use with Tor clients
|
||||||
-----------------------------------------------
|
-----------------------------------------------
|
||||||
|
|
||||||
|
89
contrib/clang/sanitize_blacklist.txt
Normal file
89
contrib/clang/sanitize_blacklist.txt
Normal file
@ -0,0 +1,89 @@
|
|||||||
|
# clang sanitizer special case list
|
||||||
|
# syntax specified in http://clang.llvm.org/docs/SanitizerSpecialCaseList.html
|
||||||
|
# for more info see http://clang.llvm.org/docs/AddressSanitizer.html
|
||||||
|
|
||||||
|
# usage:
|
||||||
|
# 1. configure tor build:
|
||||||
|
# ./configure \
|
||||||
|
# CC=clang \
|
||||||
|
# CFLAGS="-fsanitize-blacklist=contrib/clang/sanitize_blacklist.txt -fsanitize=undefined -fsanitize=address -fno-sanitize-recover=all -fno-omit-frame-pointer -fno-optimize-sibling-calls -fno-inline" \
|
||||||
|
# LDFLAGS="-fsanitize=address" \
|
||||||
|
# --disable-gcc-hardening
|
||||||
|
# and any other flags required to build tor on your OS.
|
||||||
|
#
|
||||||
|
# 2. build tor:
|
||||||
|
# make
|
||||||
|
#
|
||||||
|
# 3. test tor:
|
||||||
|
# ASAN_OPTIONS=allow_user_segv_handler=1 make test
|
||||||
|
# ASAN_OPTIONS=allow_user_segv_handler=1 make check
|
||||||
|
# make test-network # requires chutney
|
||||||
|
#
|
||||||
|
# 4. the tor binary is now instrumented with clang sanitizers,
|
||||||
|
# and can be run just like a standard tor binary
|
||||||
|
|
||||||
|
# Compatibility:
|
||||||
|
# This blacklist has been tested with clang 3.7's UndefinedBehaviorSanitizer
|
||||||
|
# and AddressSanitizer on OS X 10.10 Yosemite, with all tests passing
|
||||||
|
# on both x86_64 and i386 (using CC="clang -arch i386")
|
||||||
|
# It has not been tested with ThreadSanitizer or MemorySanitizer
|
||||||
|
# Success report and patches for other sanitizers or OSs are welcome
|
||||||
|
|
||||||
|
# Configuration Flags:
|
||||||
|
# -fno-sanitize-recover=all
|
||||||
|
# causes clang to crash on undefined behavior, rather than printing
|
||||||
|
# a warning and continuing (the AddressSanitizer always crashes)
|
||||||
|
# -fno-omit-frame-pointer -fno-optimize-sibling-calls -fno-inline
|
||||||
|
# make clang backtraces easier to read
|
||||||
|
# --disable-gcc-hardening
|
||||||
|
# disables warnings about the redefinition of _FORTIFY_SOURCE
|
||||||
|
# (it conflicts with the sanitizers)
|
||||||
|
|
||||||
|
# Turning the sanitizers off for particular functions:
|
||||||
|
# (Unfortunately, exempting functions doesn't work for the blacklisted
|
||||||
|
# functions below, and we can't turn the code off because it's essential)
|
||||||
|
#
|
||||||
|
# #if defined(__has_feature)
|
||||||
|
# #if __has_feature(address_sanitizer)
|
||||||
|
# /* tell clang AddressSanitizer not to instrument this function */
|
||||||
|
# #define NOASAN __attribute__((no_sanitize_address))
|
||||||
|
# #define _CLANG_ASAN_
|
||||||
|
# #else
|
||||||
|
# #define NOASAN
|
||||||
|
# #endif
|
||||||
|
# #else
|
||||||
|
# #define NOASAN
|
||||||
|
# #endif
|
||||||
|
#
|
||||||
|
# /* Telling AddressSanitizer to not instrument a function */
|
||||||
|
# void func(void) NOASAN;
|
||||||
|
#
|
||||||
|
# /* Including or excluding sections of code */
|
||||||
|
# #ifdef _CLANG_ASAN_
|
||||||
|
# /* code that only runs under address sanitizer */
|
||||||
|
# #else
|
||||||
|
# /* code that doesn't run under address sanitizer */
|
||||||
|
# #endif
|
||||||
|
|
||||||
|
# Blacklist Entries:
|
||||||
|
|
||||||
|
# we need to allow the tor bt handler to catch SIGSEGV
|
||||||
|
# otherwise address sanitizer munges the expected output and the test fails
|
||||||
|
# we can do this by setting an environmental variable
|
||||||
|
# See https://code.google.com/p/address-sanitizer/wiki/Flags
|
||||||
|
# ASAN_OPTIONS=allow_user_segv_handler=1
|
||||||
|
|
||||||
|
# test-memwipe.c checks if a freed buffer was properly wiped
|
||||||
|
fun:vmemeq
|
||||||
|
fun:check_a_buffer
|
||||||
|
|
||||||
|
# test_bt_cl.c stores to a NULL pointer to trigger a crash
|
||||||
|
fun:crash
|
||||||
|
|
||||||
|
# curve25519-donna.c left-shifts 1 bits into and past the sign bit of signed
|
||||||
|
# integers. Until #13538 is resolved, we can exempt the entire file from all
|
||||||
|
# analysis under clang's undefined behavior sanitizer.
|
||||||
|
# This may be overkill, but it works, and is easier than listing every
|
||||||
|
# function in the file.
|
||||||
|
# Note that x86_64 uses curve25519-donna-c64.c instead of curve25519-donna.c
|
||||||
|
src:src/ext/curve25519_donna/curve25519-donna.c
|
26
doc/HACKING
26
doc/HACKING
@ -115,6 +115,32 @@ valgrind --leak-check=yes --error-limit=no --show-reachable=yes src/or/tor
|
|||||||
pass --undef-value-errors=no to valgrind, or rebuild your openssl
|
pass --undef-value-errors=no to valgrind, or rebuild your openssl
|
||||||
with -DPURIFY.)
|
with -DPURIFY.)
|
||||||
|
|
||||||
|
Coverity
|
||||||
|
~~~~~~~~
|
||||||
|
|
||||||
|
Nick regularly runs the coverity static analyzer on the Tor codebase.
|
||||||
|
|
||||||
|
The preprocessor define __COVERITY__ is used to work around instances
|
||||||
|
where coverity picks up behavior that we wish to permit.
|
||||||
|
|
||||||
|
clang Static Analyzer
|
||||||
|
~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
The clang static analyzer can be run on the Tor codebase using Xcode (WIP)
|
||||||
|
or a command-line build.
|
||||||
|
|
||||||
|
The preprocessor define __clang_analyzer__ is used to work around instances
|
||||||
|
where clang picks up behavior that we wish to permit.
|
||||||
|
|
||||||
|
clang Runtime Sanitizers
|
||||||
|
~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
To build the Tor codebase with the clang Address and Undefined Behavior
|
||||||
|
sanitizers, see the file contrib/clang/sanitize_blacklist.txt.
|
||||||
|
|
||||||
|
Preprocessor workarounds for instances where clang picks up behavior that
|
||||||
|
we wish to permit are also documented in the blacklist file.
|
||||||
|
|
||||||
Running lcov for unit test coverage
|
Running lcov for unit test coverage
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user