Skip to content

Commit eea3c35

Browse files
committed
Merge branch 'main' into extend_sg_map
2 parents f464662 + cfa6a59 commit eea3c35

File tree

1,482 files changed

+258254
-56057
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,482 files changed

+258254
-56057
lines changed

.ci/metrics/metrics.py

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -282,6 +282,13 @@ def github_get_metrics(
282282
queued_count = collections.Counter()
283283
running_count = collections.Counter()
284284

285+
# Initialize all the counters to 0 so we report 0 when no job is queued
286+
# or running.
287+
for wf_name, wf_metric_name in GITHUB_WORKFLOW_TO_TRACK.items():
288+
for job_name, job_metric_name in GITHUB_JOB_TO_TRACK[wf_metric_name].items():
289+
queued_count[wf_metric_name + "_" + job_metric_name] = 0
290+
running_count[wf_metric_name + "_" + job_metric_name] = 0
291+
285292
# The list of workflows this iteration will process.
286293
# MaxSize = GITHUB_WORKFLOWS_MAX_PROCESS_COUNT
287294
workflow_seen_as_completed = set()

.ci/monolithic-linux.sh

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ targets="${2}"
5353
lit_args="-v --xunit-xml-output ${BUILD_DIR}/test-results.xml --use-unique-output-file-name --timeout=1200 --time-tests"
5454

5555
echo "--- cmake"
56+
export PIP_BREAK_SYSTEM_PACKAGES=1
5657
pip install -q -r "${MONOREPO_ROOT}"/mlir/python/requirements.txt
5758
pip install -q -r "${MONOREPO_ROOT}"/lldb/test/requirements.txt
5859
pip install -q -r "${MONOREPO_ROOT}"/.ci/requirements.txt

.github/new-prs-labeler.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -660,6 +660,12 @@ backend:DirectX:
660660
- '**/*dxil*/**'
661661
- '**/*DXContainer*'
662662
- '**/*DXContainer*/**'
663+
- clang/lib/Sema/SemaDirectX.cpp
664+
- clang/include/clang/Sema/SemaDirectX.h
665+
- clang/include/clang/Basic/BuiltinsDirectX.td
666+
- clang/lib/CodeGen/TargetBuiltins/DirectX.cpp
667+
- clang/test/CodeGenDirectX/**
668+
- clang/test/SemaDirectX/**
663669

664670
backend:SPIR-V:
665671
- clang/lib/Driver/ToolChains/SPIRV.*

.github/workflows/containers/github-action-ci-windows/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ RUN choco install -y handle
108108
109109
RUN pip3 install pywin32 buildbot-worker==2.8.4
110110
111-
ARG RUNNER_VERSION=2.322.0
111+
ARG RUNNER_VERSION=2.323.0
112112
ENV RUNNER_VERSION=$RUNNER_VERSION
113113
114114
RUN powershell -Command \

.github/workflows/containers/github-action-ci/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ WORKDIR /home/gha
9595

9696
FROM ci-container as ci-container-agent
9797

98-
ENV GITHUB_RUNNER_VERSION=2.322.0
98+
ENV GITHUB_RUNNER_VERSION=2.323.0
9999

100100
RUN mkdir actions-runner && \
101101
cd actions-runner && \

.github/workflows/libcxx-build-and-test.yaml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -197,10 +197,20 @@ jobs:
197197
os: macos-15
198198
- config: apple-configuration
199199
os: macos-15
200+
# TODO: These jobs are intended to test back-deployment (building against ToT libc++ but running against an
201+
# older system-provided libc++.dylib). Doing this properly would require building the test suite on a
202+
# recent macOS using a recent Clang (hence recent Xcode), and then running the actual test suite on an
203+
# older mac. We could do that by e.g. sharing artifacts between the two jobs.
204+
#
205+
# However, our Lit configuration currently doesn't provide a good way to do that in a batch, so our only
206+
# alternative is to actually build on the same host that we're going to run on. Sadly, that doesn't work
207+
# since older macOSes don't support newer Xcodes. For now, we run the "backdeployment" jobs on recent
208+
# macOS versions as a way to avoid rotting that configuration, but it doesn't provide a lot of additional
209+
# coverage.
200210
- config: apple-system
201-
os: macos-13
211+
os: macos-15
202212
- config: apple-system-hardened
203-
os: macos-13
213+
os: macos-15
204214
runs-on: ${{ matrix.os }}
205215
steps:
206216
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2

bolt/include/bolt/Core/MCPlusBuilder.h

Lines changed: 40 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -577,16 +577,51 @@ class MCPlusBuilder {
577577
return getNoRegister();
578578
}
579579

580-
/// Returns the register used as call destination, or no-register, if not
581-
/// an indirect call. Sets IsAuthenticatedInternally if the instruction
582-
/// accepts a signed pointer as its operand and authenticates it internally.
580+
/// Returns the register used as the destination of an indirect branch or call
581+
/// instruction. Sets IsAuthenticatedInternally if the instruction accepts
582+
/// a signed pointer as its operand and authenticates it internally.
583583
virtual MCPhysReg
584-
getRegUsedAsCallDest(const MCInst &Inst,
585-
bool &IsAuthenticatedInternally) const {
584+
getRegUsedAsIndirectBranchDest(const MCInst &Inst,
585+
bool &IsAuthenticatedInternally) const {
586586
llvm_unreachable("not implemented");
587587
return getNoRegister();
588588
}
589589

590+
/// Returns the register containing an address safely materialized by `Inst`
591+
/// under the Pointer Authentication threat model.
592+
///
593+
/// Returns the register `Inst` writes to if:
594+
/// 1. the register is a materialized address, and
595+
/// 2. the register has been materialized safely, i.e. cannot be attacker-
596+
/// controlled, under the Pointer Authentication threat model.
597+
///
598+
/// If the instruction does not write to any register satisfying the above
599+
/// two conditions, NoRegister is returned.
600+
///
601+
/// The Pointer Authentication threat model assumes an attacker is able to
602+
/// modify any writable memory, but not executable code (due to W^X).
603+
virtual MCPhysReg
604+
getMaterializedAddressRegForPtrAuth(const MCInst &Inst) const {
605+
llvm_unreachable("not implemented");
606+
return getNoRegister();
607+
}
608+
609+
/// Analyzes if this instruction can safely perform address arithmetics
610+
/// under Pointer Authentication threat model.
611+
///
612+
/// If an (OutReg, InReg) pair is returned, then after Inst is executed,
613+
/// OutReg is as trusted as InReg is.
614+
///
615+
/// The arithmetic instruction is considered safe if OutReg is not attacker-
616+
/// controlled, provided InReg and executable code are not. Please note that
617+
/// registers other than InReg as well as the contents of memory which is
618+
/// writable by the process should be considered attacker-controlled.
619+
virtual std::optional<std::pair<MCPhysReg, MCPhysReg>>
620+
analyzeAddressArithmeticsForPtrAuth(const MCInst &Inst) const {
621+
llvm_unreachable("not implemented");
622+
return std::make_pair(getNoRegister(), getNoRegister());
623+
}
624+
590625
virtual bool isTerminator(const MCInst &Inst) const;
591626

592627
virtual bool isNoop(const MCInst &Inst) const {

bolt/include/bolt/Passes/DataflowAnalysis.h

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -292,14 +292,17 @@ class DataflowAnalysis {
292292
/// Relies on a ptr map to fetch the previous instruction and then retrieve
293293
/// state. WARNING: Watch out for invalidated pointers. Do not use this
294294
/// function if you invalidated pointers after the analysis has been completed
295-
ErrorOr<const StateTy &> getStateBefore(const MCInst &Point) {
296-
return getStateAt(PrevPoint[&Point]);
295+
ErrorOr<const StateTy &> getStateBefore(const MCInst &Point) const {
296+
auto It = PrevPoint.find(&Point);
297+
if (It == PrevPoint.end())
298+
return make_error_code(std::errc::result_out_of_range);
299+
return getStateAt(It->getSecond());
297300
}
298301

299-
ErrorOr<const StateTy &> getStateBefore(ProgramPoint Point) {
302+
ErrorOr<const StateTy &> getStateBefore(ProgramPoint Point) const {
300303
if (Point.isBB())
301304
return getStateAt(*Point.getBB());
302-
return getStateAt(PrevPoint[Point.getInst()]);
305+
return getStateBefore(*Point.getInst());
303306
}
304307

305308
/// Remove any state annotations left by this analysis

bolt/lib/Passes/PAuthGadgetScanner.cpp

Lines changed: 70 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -335,6 +335,49 @@ class PacRetAnalysis
335335
});
336336
}
337337

338+
BitVector getClobberedRegs(const MCInst &Point) const {
339+
BitVector Clobbered(NumRegs, false);
340+
// Assume a call can clobber all registers, including callee-saved
341+
// registers. There's a good chance that callee-saved registers will be
342+
// saved on the stack at some point during execution of the callee.
343+
// Therefore they should also be considered as potentially modified by an
344+
// attacker/written to.
345+
// Also, not all functions may respect the AAPCS ABI rules about
346+
// caller/callee-saved registers.
347+
if (BC.MIB->isCall(Point))
348+
Clobbered.set();
349+
else
350+
BC.MIB->getClobberedRegs(Point, Clobbered);
351+
return Clobbered;
352+
}
353+
354+
// Returns all registers that can be treated as if they are written by an
355+
// authentication instruction.
356+
SmallVector<MCPhysReg> getRegsMadeSafeToDeref(const MCInst &Point,
357+
const State &Cur) const {
358+
SmallVector<MCPhysReg> Regs;
359+
const MCPhysReg NoReg = BC.MIB->getNoRegister();
360+
361+
// A signed pointer can be authenticated, or
362+
ErrorOr<MCPhysReg> AutReg = BC.MIB->getAuthenticatedReg(Point);
363+
if (AutReg && *AutReg != NoReg)
364+
Regs.push_back(*AutReg);
365+
366+
// ... a safe address can be materialized, or
367+
MCPhysReg NewAddrReg = BC.MIB->getMaterializedAddressRegForPtrAuth(Point);
368+
if (NewAddrReg != NoReg)
369+
Regs.push_back(NewAddrReg);
370+
371+
// ... an address can be updated in a safe manner, producing the result
372+
// which is as trusted as the input address.
373+
if (auto DstAndSrc = BC.MIB->analyzeAddressArithmeticsForPtrAuth(Point)) {
374+
if (Cur.SafeToDerefRegs[DstAndSrc->second])
375+
Regs.push_back(DstAndSrc->first);
376+
}
377+
378+
return Regs;
379+
}
380+
338381
State computeNext(const MCInst &Point, const State &Cur) {
339382
PacStatePrinter P(BC);
340383
LLVM_DEBUG({
@@ -355,37 +398,35 @@ class PacRetAnalysis
355398
return State();
356399
}
357400

401+
// First, compute various properties of the instruction, taking the state
402+
// before its execution into account, if necessary.
403+
404+
BitVector Clobbered = getClobberedRegs(Point);
405+
SmallVector<MCPhysReg> NewSafeToDerefRegs =
406+
getRegsMadeSafeToDeref(Point, Cur);
407+
408+
// Then, compute the state after this instruction is executed.
358409
State Next = Cur;
359-
BitVector Clobbered(NumRegs, false);
360-
// Assume a call can clobber all registers, including callee-saved
361-
// registers. There's a good chance that callee-saved registers will be
362-
// saved on the stack at some point during execution of the callee.
363-
// Therefore they should also be considered as potentially modified by an
364-
// attacker/written to.
365-
// Also, not all functions may respect the AAPCS ABI rules about
366-
// caller/callee-saved registers.
367-
if (BC.MIB->isCall(Point))
368-
Clobbered.set();
369-
else
370-
BC.MIB->getClobberedRegs(Point, Clobbered);
410+
371411
Next.SafeToDerefRegs.reset(Clobbered);
372412
// Keep track of this instruction if it writes to any of the registers we
373413
// need to track that for:
374414
for (MCPhysReg Reg : RegsToTrackInstsFor.getRegisters())
375415
if (Clobbered[Reg])
376416
lastWritingInsts(Next, Reg) = {&Point};
377417

378-
ErrorOr<MCPhysReg> AutReg = BC.MIB->getAuthenticatedReg(Point);
379-
if (AutReg && *AutReg != BC.MIB->getNoRegister()) {
380-
// The sub-registers of *AutReg are also trusted now, but not its
381-
// super-registers (as they retain untrusted register units).
382-
BitVector AuthenticatedSubregs =
383-
BC.MIB->getAliases(*AutReg, /*OnlySmaller=*/true);
384-
for (MCPhysReg Reg : AuthenticatedSubregs.set_bits()) {
385-
Next.SafeToDerefRegs.set(Reg);
386-
if (RegsToTrackInstsFor.isTracked(Reg))
387-
lastWritingInsts(Next, Reg).clear();
388-
}
418+
// After accounting for clobbered registers in general, override the state
419+
// according to authentication and other *special cases* of clobbering.
420+
421+
// The sub-registers are also safe-to-dereference now, but not their
422+
// super-registers (as they retain untrusted register units).
423+
BitVector NewSafeSubregs(NumRegs);
424+
for (MCPhysReg SafeReg : NewSafeToDerefRegs)
425+
NewSafeSubregs |= BC.MIB->getAliases(SafeReg, /*OnlySmaller=*/true);
426+
for (MCPhysReg Reg : NewSafeSubregs.set_bits()) {
427+
Next.SafeToDerefRegs.set(Reg);
428+
if (RegsToTrackInstsFor.isTracked(Reg))
429+
lastWritingInsts(Next, Reg).clear();
389430
}
390431

391432
LLVM_DEBUG({
@@ -402,7 +443,7 @@ class PacRetAnalysis
402443
public:
403444
std::vector<MCInstReference>
404445
getLastClobberingInsts(const MCInst &Inst, BinaryFunction &BF,
405-
const ArrayRef<MCPhysReg> UsedDirtyRegs) {
446+
const ArrayRef<MCPhysReg> UsedDirtyRegs) const {
406447
if (RegsToTrackInstsFor.empty())
407448
return {};
408449
auto MaybeState = getStateBefore(Inst);
@@ -457,14 +498,16 @@ static std::shared_ptr<Report>
457498
shouldReportCallGadget(const BinaryContext &BC, const MCInstReference &Inst,
458499
const State &S) {
459500
static const GadgetKind CallKind("non-protected call found");
460-
if (!BC.MIB->isCall(Inst) && !BC.MIB->isBranch(Inst))
501+
if (!BC.MIB->isIndirectCall(Inst) && !BC.MIB->isIndirectBranch(Inst))
461502
return nullptr;
462503

463504
bool IsAuthenticated = false;
464-
MCPhysReg DestReg = BC.MIB->getRegUsedAsCallDest(Inst, IsAuthenticated);
465-
if (IsAuthenticated || DestReg == BC.MIB->getNoRegister())
505+
MCPhysReg DestReg =
506+
BC.MIB->getRegUsedAsIndirectBranchDest(Inst, IsAuthenticated);
507+
if (IsAuthenticated)
466508
return nullptr;
467509

510+
assert(DestReg != BC.MIB->getNoRegister());
468511
LLVM_DEBUG({
469512
traceInst(BC, "Found call inst", Inst);
470513
traceReg(BC, "Call destination reg", DestReg);

bolt/lib/Rewrite/RewriteInstance.cpp

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2827,9 +2827,10 @@ void RewriteInstance::handleRelocation(const SectionRef &RelocatedSection,
28272827
if (SymbolAddress == 0)
28282828
ReferencedSymbol = BC->registerNameAtAddress(SymbolName, 0, 0, 0);
28292829

2830-
LLVM_DEBUG(dbgs() << "BOLT-DEBUG: forcing relocation against symbol "
2831-
<< ReferencedSymbol->getName() << " with addend "
2832-
<< Addend << '\n');
2830+
LLVM_DEBUG(
2831+
dbgs() << "BOLT-DEBUG: forcing relocation against symbol "
2832+
<< (ReferencedSymbol ? ReferencedSymbol->getName() : "<none>")
2833+
<< " with addend " << Addend << '\n');
28332834
} else if (ReferencedBF) {
28342835
ReferencedSymbol = ReferencedBF->getSymbol();
28352836
uint64_t RefFunctionOffset = 0;

0 commit comments

Comments
 (0)