[llvm-dev] sanitize=cfi-icall in real life application on x86 and ARM

via llvm-dev llvm-dev at lists.llvm.org
Fri Feb 10 04:14:58 PST 2017


Hi,

After going through small samples showing that "icall" is working, I wanted to give a try with more complex stuff.
I decided to use nginx. As first, I tried with x86 platform. It went quite smoothly, there is one runtime error reported by CFI, I fixed that the server was working fine, without any issues.
Then I switched to the destination platform, ARMv7 based. This time nginx with cfi-icall enabled flag became completely unusable. Worker processes crashed just after spawning them.
I checked with different "sanitize" flags - like SafeStack, etc. - in all these cases it was fine. So only with "icall" there were problems.
Started debugging it:
===GDB OUTPUT===
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x0007e2cc in ngx_execute_proc.cfi ()

(gdb) backtrace
#0  0x0007e2cc in ngx_execute_proc.cfi ()
#1  0x0007e05c in ngx_spawn_process ()
#2  0x0007f8f0 in ngx_master_process_cycle.cfi ()
#3  0x000585dc in main ()
=======

My questions are:
* What exactly is this add-on ".cfi", I can't see it when compiling without "icall" flag
* Any ideas how to continue? I started disabling source folders from cfi checking, as first, with "os", but then segmentation fault occurred in other place - so I would have to blacklist 6 folder out of 7.

I know that "icall" for ARM is quite recent implementation, so might be still something to improve there. 

I tried on 2 different ARMx7 based platforms - i.MX6 and Raspberry Pi 2. Results were the same as one might expect.

Regards,
Michal 


More information about the llvm-dev mailing list