summaryrefslogtreecommitdiff
path: root/lib/sanitizer_common/sanitizer_linux_s390.cc
AgeCommit message (Collapse)Author
2017-05-24[sanitizer] [SystemZ] Update CVE-2016-2143 check for Ubuntu 16.04Ulrich Weigand
The Ubuntu 16.04 kernel contains a backport of the CVE check starting with version 4.4.0-13. Update FixedCVE_2016_2143. git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@303757 91177308-0d34-0410-b5e6-96231b3b80d8
2017-02-10s390 CVE-2016-2143 whitelist for RHEL kernelsKostya Serebryany
Summary: This patch adds whitelist for RHEL6 and RHEL7 kernels that are known to have the CVE fixed. Reviewers: koriakin, kcc Reviewed By: kcc Subscribers: kubamracek Differential Revision: https://reviews.llvm.org/D29825 git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@294799 91177308-0d34-0410-b5e6-96231b3b80d8
2016-04-29[sanitizers] [SystemZ] Mark kernel 3.12.58+ as safe from CVE-2016-2143.Marcin Koscielnicki
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@268046 91177308-0d34-0410-b5e6-96231b3b80d8
2016-04-27[sanitizer] [SystemZ] Abort if the kernel might be vulnerable to CVE-2016-2143.Marcin Koscielnicki
In short, CVE-2016-2143 will crash the machine if a process uses both >4TB virtual addresses and fork(). ASan, TSan, and MSan will, by necessity, map a sizable chunk of virtual address space, which is much larger than 4TB. Even worse, sanitizers will always use fork() for llvm-symbolizer when a bug is detected. Disable all three by aborting on process initialization if the running kernel version is not known to contain a fix. Unfortunately, there's no reliable way to detect the fix without crashing the kernel. So, we rely on whitelisting - I've included a list of upstream kernel versions that will work. In case someone uses a distribution kernel or applied the fix themselves, an override switch is also included. Differential Revision: http://reviews.llvm.org/D19576 git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@267747 91177308-0d34-0410-b5e6-96231b3b80d8
2016-04-26[sanitizer] [SystemZ] Implement internal_clone.Marcin Koscielnicki
Differential Revision: http://reviews.llvm.org/D19159 git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@267547 91177308-0d34-0410-b5e6-96231b3b80d8
2016-04-15[sanitizers] [SystemZ] Introduce sanitizer_linux_s390.cc.Marcin Koscielnicki
This file will contain s390-specific code. For now, let's move the s390 version of internal_mmap here. Differential Revision: http://reviews.llvm.org/D19174 git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@266482 91177308-0d34-0410-b5e6-96231b3b80d8