123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163 |
- //===-- asan_interceptors.h -------------------------------------*- C++ -*-===//
- //
- // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
- // See https://llvm.org/LICENSE.txt for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- //
- //===----------------------------------------------------------------------===//
- //
- // This file is a part of AddressSanitizer, an address sanity checker.
- //
- // ASan-private header for asan_interceptors.cpp
- //===----------------------------------------------------------------------===//
- #ifndef ASAN_INTERCEPTORS_H
- #define ASAN_INTERCEPTORS_H
- #include "asan_interceptors_memintrinsics.h"
- #include "asan_internal.h"
- #include "interception/interception.h"
- #include "sanitizer_common/sanitizer_platform.h"
- #include "sanitizer_common/sanitizer_platform_interceptors.h"
- namespace __asan {
- void InitializeAsanInterceptors();
- void InitializePlatformInterceptors();
- #define ENSURE_ASAN_INITED() \
- do { \
- CHECK(!asan_init_is_running); \
- if (UNLIKELY(!asan_inited)) { \
- AsanInitFromRtl(); \
- } \
- } while (0)
- } // namespace __asan
- // There is no general interception at all on Fuchsia.
- // Only the functions in asan_interceptors_memintrinsics.h are
- // really defined to replace libc functions.
- #if !SANITIZER_FUCHSIA
- // Use macro to describe if specific function should be
- // intercepted on a given platform.
- #if !SANITIZER_WINDOWS
- # define ASAN_INTERCEPT_ATOLL_AND_STRTOLL 1
- # define ASAN_INTERCEPT__LONGJMP 1
- # define ASAN_INTERCEPT_INDEX 1
- # define ASAN_INTERCEPT_PTHREAD_CREATE 1
- #else
- # define ASAN_INTERCEPT_ATOLL_AND_STRTOLL 0
- # define ASAN_INTERCEPT__LONGJMP 0
- # define ASAN_INTERCEPT_INDEX 0
- # define ASAN_INTERCEPT_PTHREAD_CREATE 0
- #endif
- #if SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_NETBSD || \
- SANITIZER_SOLARIS
- # define ASAN_USE_ALIAS_ATTRIBUTE_FOR_INDEX 1
- #else
- # define ASAN_USE_ALIAS_ATTRIBUTE_FOR_INDEX 0
- #endif
- #if SANITIZER_GLIBC || SANITIZER_SOLARIS
- # define ASAN_INTERCEPT_SWAPCONTEXT 1
- #else
- # define ASAN_INTERCEPT_SWAPCONTEXT 0
- #endif
- #if !SANITIZER_WINDOWS
- # define ASAN_INTERCEPT_SIGLONGJMP 1
- #else
- # define ASAN_INTERCEPT_SIGLONGJMP 0
- #endif
- #if SANITIZER_GLIBC
- # define ASAN_INTERCEPT___LONGJMP_CHK 1
- #else
- # define ASAN_INTERCEPT___LONGJMP_CHK 0
- #endif
- #if ASAN_HAS_EXCEPTIONS && !SANITIZER_WINDOWS && !SANITIZER_SOLARIS && \
- !SANITIZER_NETBSD
- # define ASAN_INTERCEPT___CXA_THROW 1
- # define ASAN_INTERCEPT___CXA_RETHROW_PRIMARY_EXCEPTION 1
- # if defined(_GLIBCXX_SJLJ_EXCEPTIONS) || (SANITIZER_IOS && defined(__arm__))
- # define ASAN_INTERCEPT__UNWIND_SJLJ_RAISEEXCEPTION 1
- # else
- # define ASAN_INTERCEPT__UNWIND_RAISEEXCEPTION 1
- # endif
- #else
- # define ASAN_INTERCEPT___CXA_THROW 0
- # define ASAN_INTERCEPT___CXA_RETHROW_PRIMARY_EXCEPTION 0
- # define ASAN_INTERCEPT__UNWIND_RAISEEXCEPTION 0
- # define ASAN_INTERCEPT__UNWIND_SJLJ_RAISEEXCEPTION 0
- #endif
- #if !SANITIZER_WINDOWS
- # define ASAN_INTERCEPT___CXA_ATEXIT 1
- #else
- # define ASAN_INTERCEPT___CXA_ATEXIT 0
- #endif
- #if SANITIZER_NETBSD
- # define ASAN_INTERCEPT_ATEXIT 1
- #else
- # define ASAN_INTERCEPT_ATEXIT 0
- #endif
- #if SANITIZER_GLIBC
- # define ASAN_INTERCEPT___STRDUP 1
- #else
- # define ASAN_INTERCEPT___STRDUP 0
- #endif
- #if SANITIZER_LINUX && \
- (defined(__arm__) || defined(__aarch64__) || defined(__i386__) || \
- defined(__x86_64__) || SANITIZER_RISCV64)
- # define ASAN_INTERCEPT_VFORK 1
- #else
- # define ASAN_INTERCEPT_VFORK 0
- #endif
- #if SANITIZER_NETBSD
- # define ASAN_INTERCEPT_PTHREAD_ATFORK 1
- #else
- # define ASAN_INTERCEPT_PTHREAD_ATFORK 0
- #endif
- DECLARE_REAL(int, memcmp, const void *a1, const void *a2, uptr size)
- DECLARE_REAL(char*, strchr, const char *str, int c)
- DECLARE_REAL(SIZE_T, strlen, const char *s)
- DECLARE_REAL(char*, strncpy, char *to, const char *from, uptr size)
- DECLARE_REAL(uptr, strnlen, const char *s, uptr maxlen)
- DECLARE_REAL(char*, strstr, const char *s1, const char *s2)
- # if !SANITIZER_MAC
- # define ASAN_INTERCEPT_FUNC(name) \
- do { \
- if (!INTERCEPT_FUNCTION(name)) \
- VReport(1, "AddressSanitizer: failed to intercept '%s'\n", #name); \
- } while (0)
- # define ASAN_INTERCEPT_FUNC_VER(name, ver) \
- do { \
- if (!INTERCEPT_FUNCTION_VER(name, ver)) \
- VReport(1, "AddressSanitizer: failed to intercept '%s@@%s'\n", \
- #name, ver); \
- } while (0)
- # define ASAN_INTERCEPT_FUNC_VER_UNVERSIONED_FALLBACK(name, ver) \
- do { \
- if (!INTERCEPT_FUNCTION_VER(name, ver) && !INTERCEPT_FUNCTION(name)) \
- VReport(1, \
- "AddressSanitizer: failed to intercept '%s@@%s' or '%s'\n", \
- #name, ver, #name); \
- } while (0)
- # else
- // OS X interceptors don't need to be initialized with INTERCEPT_FUNCTION.
- # define ASAN_INTERCEPT_FUNC(name)
- # endif // SANITIZER_MAC
- #endif // !SANITIZER_FUCHSIA
- #endif // ASAN_INTERCEPTORS_H
|