Update Art 5.1.1 stack guard patch
Backport of https://android-review.googlesource.com/#/c/427061/.
R=ricow@google.com
Bug: 63151667
Change-Id: I19372dccea9b925b78f4899e2ad1f50f3b27eb73
diff --git a/tools/linux/README.art-versions b/tools/linux/README.art-versions
index ed0fa3b..f347fe2 100644
--- a/tools/linux/README.art-versions
+++ b/tools/linux/README.art-versions
@@ -34,7 +34,7 @@
mkdir 7.0.0_r21
cd 7.0.0_r21
repo init -u https://android.googlesource.com/platform/manifest -b android-7.0.0_r21
- repo sync
+ repo sync -cq -j24
source build/envsetup.sh
lunch aosp_angler-userdebug
m -j24
@@ -105,7 +105,7 @@
mkdir 6.0.1_r66
cd 6.0.1_r66
repo init -u https://android.googlesource.com/platform/manifest -b android-6.0.1_r66
- repo sync
+ repo sync -cq -j24
source build/envsetup.sh
lunch aosp_angler-userdebug
cd art
@@ -121,14 +121,72 @@
art-5.1.1
---------
-Build from branch 5.1.1_r19.
+Build from branch 5.1.1_r19 with the following patch:
+
+diff --git a/runtime/thread.cc b/runtime/thread.cc
+index 2f474f7ae..f927ad7a3 100644
+--- a/runtime/thread.cc
++++ b/runtime/thread.cc
+@@ -257,20 +257,39 @@ void Thread::InstallImplicitProtection() {
+ byte* stack_top = reinterpret_cast<byte*>(reinterpret_cast<uintptr_t>(&stack_himem) &
+ ~(kPageSize - 1)); // Page containing current top of stack.
+
++ //
++ // Accesses too far below the current machine register corresponding to the stack pointer (e.g.,
++ // ESP on x86[-32], SP on ARM) might cause a SIGSEGV (at least on x86 with newer kernels). We
++ // thus have to move the stack pointer. We do this portably by using a recursive function with a
++ // large stack frame size.
++
+ // First remove the protection on the protected region as will want to read and
+ // write it. This may fail (on the first attempt when the stack is not mapped)
+ // but we ignore that.
+ UnprotectStack();
+
+- // Map in the stack. This must be done by reading from the
+- // current stack pointer downwards as the stack may be mapped using VM_GROWSDOWN
+- // in the kernel. Any access more than a page below the current SP might cause
+- // a segv.
+-
+- // Read every page from the high address to the low.
+- for (byte* p = stack_top; p >= pregion; p -= kPageSize) {
+- dont_optimize_this = *p;
+- }
++#define NO_INLINE __attribute__ ((noinline))
++#define ATTRIBUTE_UNUSED __attribute__((__unused__))
++ struct RecurseDownStack {
++ // This function has an intentionally large stack size.
++#pragma GCC diagnostic push
++#pragma GCC diagnostic ignored "-Wframe-larger-than="
++ NO_INLINE
++ static void Touch(uintptr_t target) {
++ volatile size_t zero = 0;
++ // Use a large local volatile array to ensure a large frame size. Do not use anything close
++ // to a full page for ASAN. It would be nice to ensure the frame size is at most a page, but
++ // there is no pragma support for this.
++ volatile char space[kPageSize - 256];
++ char sink ATTRIBUTE_UNUSED = space[zero];
++ if (reinterpret_cast<uintptr_t>(space) >= target + kPageSize) {
++ Touch(target);
++ }
++ zero *= 2; // Try to avoid tail recursion.
++ }
++#pragma GCC diagnostic pop
++ };
++ RecurseDownStack::Touch(reinterpret_cast<uintptr_t>(pregion));
+
+ VLOG(threads) << "installing stack protected region at " << std::hex <<
+ static_cast<void*>(pregion) << " to " <<
+
mkdir 5.1.1_r19
cd 5.1.1_r19
repo init -u https://android.googlesource.com/platform/manifest -b android-5.1.1_r19
- repo sync
+ repo sync -cq -j24
source build/envsetup.sh
lunch aosp_mako-userdebug
+ cd art
+ <apply patch>
+ cd ..
m -j24
m -j24 build-art
m -j24 test-art-host
diff --git a/tools/linux/art-5.1.1.tar.gz.sha1 b/tools/linux/art-5.1.1.tar.gz.sha1
index 86fef95..2b6f07a 100644
--- a/tools/linux/art-5.1.1.tar.gz.sha1
+++ b/tools/linux/art-5.1.1.tar.gz.sha1
@@ -1 +1 @@
-f19d1c9b77d34a1294301eeb9ef0f31c7cabae17
\ No newline at end of file
+737072daed9a7cd4ef046b7ea8a60aa7b1b6c65d
\ No newline at end of file