123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747 |
- //===-- asan_interceptors.cpp ---------------------------------------------===//
- //
- // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
- // See https://llvm.org/LICENSE.txt for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- //
- //===----------------------------------------------------------------------===//
- //
- // This file is a part of AddressSanitizer, an address sanity checker.
- //
- // Intercept various libc functions.
- //===----------------------------------------------------------------------===//
- #include "asan_interceptors.h"
- #include "asan_allocator.h"
- #include "asan_internal.h"
- #include "asan_mapping.h"
- #include "asan_poisoning.h"
- #include "asan_report.h"
- #include "asan_stack.h"
- #include "asan_stats.h"
- #include "asan_suppressions.h"
- #include "lsan/lsan_common.h"
- #include "sanitizer_common/sanitizer_libc.h"
- // There is no general interception at all on Fuchsia.
- // Only the functions in asan_interceptors_memintrinsics.cpp are
- // really defined to replace libc functions.
- #if !SANITIZER_FUCHSIA
- # if SANITIZER_POSIX
- # include "sanitizer_common/sanitizer_posix.h"
- # endif
- # if ASAN_INTERCEPT__UNWIND_RAISEEXCEPTION || \
- ASAN_INTERCEPT__SJLJ_UNWIND_RAISEEXCEPTION
- # include <unwind.h>
- # endif
- # if defined(__i386) && SANITIZER_LINUX
- # define ASAN_PTHREAD_CREATE_VERSION "GLIBC_2.1"
- # elif defined(__mips__) && SANITIZER_LINUX
- # define ASAN_PTHREAD_CREATE_VERSION "GLIBC_2.2"
- # endif
- namespace __asan {
- #define ASAN_READ_STRING_OF_LEN(ctx, s, len, n) \
- ASAN_READ_RANGE((ctx), (s), \
- common_flags()->strict_string_checks ? (len) + 1 : (n))
- # define ASAN_READ_STRING(ctx, s, n) \
- ASAN_READ_STRING_OF_LEN((ctx), (s), internal_strlen(s), (n))
- static inline uptr MaybeRealStrnlen(const char *s, uptr maxlen) {
- #if SANITIZER_INTERCEPT_STRNLEN
- if (REAL(strnlen)) {
- return REAL(strnlen)(s, maxlen);
- }
- #endif
- return internal_strnlen(s, maxlen);
- }
- void SetThreadName(const char *name) {
- AsanThread *t = GetCurrentThread();
- if (t)
- asanThreadRegistry().SetThreadName(t->tid(), name);
- }
- int OnExit() {
- if (CAN_SANITIZE_LEAKS && common_flags()->detect_leaks &&
- __lsan::HasReportedLeaks()) {
- return common_flags()->exitcode;
- }
- // FIXME: ask frontend whether we need to return failure.
- return 0;
- }
- } // namespace __asan
- // ---------------------- Wrappers ---------------- {{{1
- using namespace __asan;
- DECLARE_REAL_AND_INTERCEPTOR(void *, malloc, uptr)
- DECLARE_REAL_AND_INTERCEPTOR(void, free, void *)
- #define ASAN_INTERCEPTOR_ENTER(ctx, func) \
- AsanInterceptorContext _ctx = {#func}; \
- ctx = (void *)&_ctx; \
- (void) ctx; \
- #define COMMON_INTERCEPT_FUNCTION(name) ASAN_INTERCEPT_FUNC(name)
- #define COMMON_INTERCEPT_FUNCTION_VER(name, ver) \
- ASAN_INTERCEPT_FUNC_VER(name, ver)
- #define COMMON_INTERCEPT_FUNCTION_VER_UNVERSIONED_FALLBACK(name, ver) \
- ASAN_INTERCEPT_FUNC_VER_UNVERSIONED_FALLBACK(name, ver)
- #define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \
- ASAN_WRITE_RANGE(ctx, ptr, size)
- #define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \
- ASAN_READ_RANGE(ctx, ptr, size)
- #define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \
- ASAN_INTERCEPTOR_ENTER(ctx, func); \
- do { \
- if (asan_init_is_running) \
- return REAL(func)(__VA_ARGS__); \
- if (SANITIZER_APPLE && UNLIKELY(!asan_inited)) \
- return REAL(func)(__VA_ARGS__); \
- ENSURE_ASAN_INITED(); \
- } while (false)
- #define COMMON_INTERCEPTOR_DIR_ACQUIRE(ctx, path) \
- do { \
- } while (false)
- #define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \
- do { \
- } while (false)
- #define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \
- do { \
- } while (false)
- #define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \
- do { \
- } while (false)
- #define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) SetThreadName(name)
- // Should be asanThreadRegistry().SetThreadNameByUserId(thread, name)
- // But asan does not remember UserId's for threads (pthread_t);
- // and remembers all ever existed threads, so the linear search by UserId
- // can be slow.
- #define COMMON_INTERCEPTOR_SET_PTHREAD_NAME(ctx, thread, name) \
- do { \
- } while (false)
- #define COMMON_INTERCEPTOR_BLOCK_REAL(name) REAL(name)
- // Strict init-order checking is dlopen-hostile:
- // https://github.com/google/sanitizers/issues/178
- # define COMMON_INTERCEPTOR_DLOPEN(filename, flag) \
- ({ \
- if (flags()->strict_init_order) \
- StopInitOrderChecking(); \
- CheckNoDeepBind(filename, flag); \
- REAL(dlopen)(filename, flag); \
- })
- # define COMMON_INTERCEPTOR_ON_EXIT(ctx) OnExit()
- # define COMMON_INTERCEPTOR_LIBRARY_LOADED(filename, handle)
- # define COMMON_INTERCEPTOR_LIBRARY_UNLOADED()
- # define COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED (!asan_inited)
- # define COMMON_INTERCEPTOR_GET_TLS_RANGE(begin, end) \
- if (AsanThread *t = GetCurrentThread()) { \
- *begin = t->tls_begin(); \
- *end = t->tls_end(); \
- } else { \
- *begin = *end = 0; \
- }
- #define COMMON_INTERCEPTOR_MEMMOVE_IMPL(ctx, to, from, size) \
- do { \
- ASAN_INTERCEPTOR_ENTER(ctx, memmove); \
- ASAN_MEMMOVE_IMPL(ctx, to, from, size); \
- } while (false)
- #define COMMON_INTERCEPTOR_MEMCPY_IMPL(ctx, to, from, size) \
- do { \
- ASAN_INTERCEPTOR_ENTER(ctx, memcpy); \
- ASAN_MEMCPY_IMPL(ctx, to, from, size); \
- } while (false)
- #define COMMON_INTERCEPTOR_MEMSET_IMPL(ctx, block, c, size) \
- do { \
- ASAN_INTERCEPTOR_ENTER(ctx, memset); \
- ASAN_MEMSET_IMPL(ctx, block, c, size); \
- } while (false)
- #if CAN_SANITIZE_LEAKS
- #define COMMON_INTERCEPTOR_STRERROR() \
- __lsan::ScopedInterceptorDisabler disabler
- #endif
- #include "sanitizer_common/sanitizer_common_interceptors.inc"
- #include "sanitizer_common/sanitizer_signal_interceptors.inc"
- // Syscall interceptors don't have contexts, we don't support suppressions
- // for them.
- #define COMMON_SYSCALL_PRE_READ_RANGE(p, s) ASAN_READ_RANGE(nullptr, p, s)
- #define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) ASAN_WRITE_RANGE(nullptr, p, s)
- #define COMMON_SYSCALL_POST_READ_RANGE(p, s) \
- do { \
- (void)(p); \
- (void)(s); \
- } while (false)
- #define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) \
- do { \
- (void)(p); \
- (void)(s); \
- } while (false)
- #include "sanitizer_common/sanitizer_common_syscalls.inc"
- #include "sanitizer_common/sanitizer_syscalls_netbsd.inc"
- #if ASAN_INTERCEPT_PTHREAD_CREATE
- static thread_return_t THREAD_CALLING_CONV asan_thread_start(void *arg) {
- AsanThread *t = (AsanThread *)arg;
- SetCurrentThread(t);
- return t->ThreadStart(GetTid());
- }
- INTERCEPTOR(int, pthread_create, void *thread,
- void *attr, void *(*start_routine)(void*), void *arg) {
- EnsureMainThreadIDIsCorrect();
- // Strict init-order checking is thread-hostile.
- if (flags()->strict_init_order)
- StopInitOrderChecking();
- GET_STACK_TRACE_THREAD;
- int detached = 0;
- if (attr)
- REAL(pthread_attr_getdetachstate)(attr, &detached);
- u32 current_tid = GetCurrentTidOrInvalid();
- AsanThread *t =
- AsanThread::Create(start_routine, arg, current_tid, &stack, detached);
- int result;
- {
- // Ignore all allocations made by pthread_create: thread stack/TLS may be
- // stored by pthread for future reuse even after thread destruction, and
- // the linked list it's stored in doesn't even hold valid pointers to the
- // objects, the latter are calculated by obscure pointer arithmetic.
- #if CAN_SANITIZE_LEAKS
- __lsan::ScopedInterceptorDisabler disabler;
- #endif
- result = REAL(pthread_create)(thread, attr, asan_thread_start, t);
- }
- if (result != 0) {
- // If the thread didn't start delete the AsanThread to avoid leaking it.
- // Note AsanThreadContexts never get destroyed so the AsanThreadContext
- // that was just created for the AsanThread is wasted.
- t->Destroy();
- }
- return result;
- }
- INTERCEPTOR(int, pthread_join, void *t, void **arg) {
- return real_pthread_join(t, arg);
- }
- DEFINE_REAL_PTHREAD_FUNCTIONS
- #endif // ASAN_INTERCEPT_PTHREAD_CREATE
- #if ASAN_INTERCEPT_SWAPCONTEXT
- static void ClearShadowMemoryForContextStack(uptr stack, uptr ssize) {
- // Only clear if we know the stack. This should be true only for contexts
- // created with makecontext().
- if (!ssize)
- return;
- // Align to page size.
- uptr PageSize = GetPageSizeCached();
- uptr bottom = RoundDownTo(stack, PageSize);
- if (!AddrIsInMem(bottom))
- return;
- ssize += stack - bottom;
- ssize = RoundUpTo(ssize, PageSize);
- PoisonShadow(bottom, ssize, 0);
- }
- INTERCEPTOR(void, makecontext, struct ucontext_t *ucp, void (*func)(), int argc,
- ...) {
- va_list ap;
- uptr args[64];
- // We don't know a better way to forward ... into REAL function. We can
- // increase args size if neccecary.
- CHECK_LE(argc, ARRAY_SIZE(args));
- internal_memset(args, 0, sizeof(args));
- va_start(ap, argc);
- for (int i = 0; i < argc; ++i) args[i] = va_arg(ap, uptr);
- va_end(ap);
- # define ENUMERATE_ARRAY_4(start) \
- args[start], args[start + 1], args[start + 2], args[start + 3]
- # define ENUMERATE_ARRAY_16(start) \
- ENUMERATE_ARRAY_4(start), ENUMERATE_ARRAY_4(start + 4), \
- ENUMERATE_ARRAY_4(start + 8), ENUMERATE_ARRAY_4(start + 12)
- # define ENUMERATE_ARRAY_64() \
- ENUMERATE_ARRAY_16(0), ENUMERATE_ARRAY_16(16), ENUMERATE_ARRAY_16(32), \
- ENUMERATE_ARRAY_16(48)
- REAL(makecontext)
- ((struct ucontext_t *)ucp, func, argc, ENUMERATE_ARRAY_64());
- # undef ENUMERATE_ARRAY_4
- # undef ENUMERATE_ARRAY_16
- # undef ENUMERATE_ARRAY_64
- // Sign the stack so we can identify it for unpoisoning.
- SignContextStack(ucp);
- }
- INTERCEPTOR(int, swapcontext, struct ucontext_t *oucp,
- struct ucontext_t *ucp) {
- static bool reported_warning = false;
- if (!reported_warning) {
- Report("WARNING: ASan doesn't fully support makecontext/swapcontext "
- "functions and may produce false positives in some cases!\n");
- reported_warning = true;
- }
- // Clear shadow memory for new context (it may share stack
- // with current context).
- uptr stack, ssize;
- ReadContextStack(ucp, &stack, &ssize);
- ClearShadowMemoryForContextStack(stack, ssize);
- # if __has_attribute(__indirect_return__) && \
- (defined(__x86_64__) || defined(__i386__))
- int (*real_swapcontext)(struct ucontext_t *, struct ucontext_t *)
- __attribute__((__indirect_return__)) = REAL(swapcontext);
- int res = real_swapcontext(oucp, ucp);
- # else
- int res = REAL(swapcontext)(oucp, ucp);
- # endif
- // swapcontext technically does not return, but program may swap context to
- // "oucp" later, that would look as if swapcontext() returned 0.
- // We need to clear shadow for ucp once again, as it may be in arbitrary
- // state.
- ClearShadowMemoryForContextStack(stack, ssize);
- return res;
- }
- #endif // ASAN_INTERCEPT_SWAPCONTEXT
- #if SANITIZER_NETBSD
- #define longjmp __longjmp14
- #define siglongjmp __siglongjmp14
- #endif
- INTERCEPTOR(void, longjmp, void *env, int val) {
- __asan_handle_no_return();
- REAL(longjmp)(env, val);
- }
- #if ASAN_INTERCEPT__LONGJMP
- INTERCEPTOR(void, _longjmp, void *env, int val) {
- __asan_handle_no_return();
- REAL(_longjmp)(env, val);
- }
- #endif
- #if ASAN_INTERCEPT___LONGJMP_CHK
- INTERCEPTOR(void, __longjmp_chk, void *env, int val) {
- __asan_handle_no_return();
- REAL(__longjmp_chk)(env, val);
- }
- #endif
- #if ASAN_INTERCEPT_SIGLONGJMP
- INTERCEPTOR(void, siglongjmp, void *env, int val) {
- __asan_handle_no_return();
- REAL(siglongjmp)(env, val);
- }
- #endif
- #if ASAN_INTERCEPT___CXA_THROW
- INTERCEPTOR(void, __cxa_throw, void *a, void *b, void *c) {
- CHECK(REAL(__cxa_throw));
- __asan_handle_no_return();
- REAL(__cxa_throw)(a, b, c);
- }
- #endif
- #if ASAN_INTERCEPT___CXA_RETHROW_PRIMARY_EXCEPTION
- INTERCEPTOR(void, __cxa_rethrow_primary_exception, void *a) {
- CHECK(REAL(__cxa_rethrow_primary_exception));
- __asan_handle_no_return();
- REAL(__cxa_rethrow_primary_exception)(a);
- }
- #endif
- #if ASAN_INTERCEPT__UNWIND_RAISEEXCEPTION
- INTERCEPTOR(_Unwind_Reason_Code, _Unwind_RaiseException,
- _Unwind_Exception *object) {
- CHECK(REAL(_Unwind_RaiseException));
- __asan_handle_no_return();
- return REAL(_Unwind_RaiseException)(object);
- }
- #endif
- #if ASAN_INTERCEPT__SJLJ_UNWIND_RAISEEXCEPTION
- INTERCEPTOR(_Unwind_Reason_Code, _Unwind_SjLj_RaiseException,
- _Unwind_Exception *object) {
- CHECK(REAL(_Unwind_SjLj_RaiseException));
- __asan_handle_no_return();
- return REAL(_Unwind_SjLj_RaiseException)(object);
- }
- #endif
- #if ASAN_INTERCEPT_INDEX
- # if ASAN_USE_ALIAS_ATTRIBUTE_FOR_INDEX
- INTERCEPTOR(char*, index, const char *string, int c)
- ALIAS(WRAPPER_NAME(strchr));
- # else
- # if SANITIZER_APPLE
- DECLARE_REAL(char*, index, const char *string, int c)
- OVERRIDE_FUNCTION(index, strchr);
- # else
- DEFINE_REAL(char*, index, const char *string, int c)
- # endif
- # endif
- #endif // ASAN_INTERCEPT_INDEX
- // For both strcat() and strncat() we need to check the validity of |to|
- // argument irrespective of the |from| length.
- INTERCEPTOR(char *, strcat, char *to, const char *from) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strcat);
- ENSURE_ASAN_INITED();
- if (flags()->replace_str) {
- uptr from_length = internal_strlen(from);
- ASAN_READ_RANGE(ctx, from, from_length + 1);
- uptr to_length = internal_strlen(to);
- ASAN_READ_STRING_OF_LEN(ctx, to, to_length, to_length);
- ASAN_WRITE_RANGE(ctx, to + to_length, from_length + 1);
- // If the copying actually happens, the |from| string should not overlap
- // with the resulting string starting at |to|, which has a length of
- // to_length + from_length + 1.
- if (from_length > 0) {
- CHECK_RANGES_OVERLAP("strcat", to, from_length + to_length + 1, from,
- from_length + 1);
- }
- }
- return REAL(strcat)(to, from);
- }
- INTERCEPTOR(char*, strncat, char *to, const char *from, uptr size) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strncat);
- ENSURE_ASAN_INITED();
- if (flags()->replace_str) {
- uptr from_length = MaybeRealStrnlen(from, size);
- uptr copy_length = Min(size, from_length + 1);
- ASAN_READ_RANGE(ctx, from, copy_length);
- uptr to_length = internal_strlen(to);
- ASAN_READ_STRING_OF_LEN(ctx, to, to_length, to_length);
- ASAN_WRITE_RANGE(ctx, to + to_length, from_length + 1);
- if (from_length > 0) {
- CHECK_RANGES_OVERLAP("strncat", to, to_length + copy_length + 1,
- from, copy_length);
- }
- }
- return REAL(strncat)(to, from, size);
- }
- INTERCEPTOR(char *, strcpy, char *to, const char *from) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strcpy);
- #if SANITIZER_APPLE
- if (UNLIKELY(!asan_inited))
- return REAL(strcpy)(to, from);
- #endif
- // strcpy is called from malloc_default_purgeable_zone()
- // in __asan::ReplaceSystemAlloc() on Mac.
- if (asan_init_is_running) {
- return REAL(strcpy)(to, from);
- }
- ENSURE_ASAN_INITED();
- if (flags()->replace_str) {
- uptr from_size = internal_strlen(from) + 1;
- CHECK_RANGES_OVERLAP("strcpy", to, from_size, from, from_size);
- ASAN_READ_RANGE(ctx, from, from_size);
- ASAN_WRITE_RANGE(ctx, to, from_size);
- }
- return REAL(strcpy)(to, from);
- }
- INTERCEPTOR(char*, strdup, const char *s) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strdup);
- if (UNLIKELY(!asan_inited)) return internal_strdup(s);
- ENSURE_ASAN_INITED();
- uptr length = internal_strlen(s);
- if (flags()->replace_str) {
- ASAN_READ_RANGE(ctx, s, length + 1);
- }
- GET_STACK_TRACE_MALLOC;
- void *new_mem = asan_malloc(length + 1, &stack);
- REAL(memcpy)(new_mem, s, length + 1);
- return reinterpret_cast<char*>(new_mem);
- }
- #if ASAN_INTERCEPT___STRDUP
- INTERCEPTOR(char*, __strdup, const char *s) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strdup);
- if (UNLIKELY(!asan_inited)) return internal_strdup(s);
- ENSURE_ASAN_INITED();
- uptr length = internal_strlen(s);
- if (flags()->replace_str) {
- ASAN_READ_RANGE(ctx, s, length + 1);
- }
- GET_STACK_TRACE_MALLOC;
- void *new_mem = asan_malloc(length + 1, &stack);
- REAL(memcpy)(new_mem, s, length + 1);
- return reinterpret_cast<char*>(new_mem);
- }
- #endif // ASAN_INTERCEPT___STRDUP
- INTERCEPTOR(char*, strncpy, char *to, const char *from, uptr size) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strncpy);
- ENSURE_ASAN_INITED();
- if (flags()->replace_str) {
- uptr from_size = Min(size, MaybeRealStrnlen(from, size) + 1);
- CHECK_RANGES_OVERLAP("strncpy", to, from_size, from, from_size);
- ASAN_READ_RANGE(ctx, from, from_size);
- ASAN_WRITE_RANGE(ctx, to, size);
- }
- return REAL(strncpy)(to, from, size);
- }
- INTERCEPTOR(long, strtol, const char *nptr, char **endptr, int base) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strtol);
- ENSURE_ASAN_INITED();
- if (!flags()->replace_str) {
- return REAL(strtol)(nptr, endptr, base);
- }
- char *real_endptr;
- long result = REAL(strtol)(nptr, &real_endptr, base);
- StrtolFixAndCheck(ctx, nptr, endptr, real_endptr, base);
- return result;
- }
- INTERCEPTOR(int, atoi, const char *nptr) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, atoi);
- #if SANITIZER_APPLE
- if (UNLIKELY(!asan_inited)) return REAL(atoi)(nptr);
- #endif
- ENSURE_ASAN_INITED();
- if (!flags()->replace_str) {
- return REAL(atoi)(nptr);
- }
- char *real_endptr;
- // "man atoi" tells that behavior of atoi(nptr) is the same as
- // strtol(nptr, 0, 10), i.e. it sets errno to ERANGE if the
- // parsed integer can't be stored in *long* type (even if it's
- // different from int). So, we just imitate this behavior.
- int result = REAL(strtol)(nptr, &real_endptr, 10);
- FixRealStrtolEndptr(nptr, &real_endptr);
- ASAN_READ_STRING(ctx, nptr, (real_endptr - nptr) + 1);
- return result;
- }
- INTERCEPTOR(long, atol, const char *nptr) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, atol);
- #if SANITIZER_APPLE
- if (UNLIKELY(!asan_inited)) return REAL(atol)(nptr);
- #endif
- ENSURE_ASAN_INITED();
- if (!flags()->replace_str) {
- return REAL(atol)(nptr);
- }
- char *real_endptr;
- long result = REAL(strtol)(nptr, &real_endptr, 10);
- FixRealStrtolEndptr(nptr, &real_endptr);
- ASAN_READ_STRING(ctx, nptr, (real_endptr - nptr) + 1);
- return result;
- }
- #if ASAN_INTERCEPT_ATOLL_AND_STRTOLL
- INTERCEPTOR(long long, strtoll, const char *nptr, char **endptr, int base) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, strtoll);
- ENSURE_ASAN_INITED();
- if (!flags()->replace_str) {
- return REAL(strtoll)(nptr, endptr, base);
- }
- char *real_endptr;
- long long result = REAL(strtoll)(nptr, &real_endptr, base);
- StrtolFixAndCheck(ctx, nptr, endptr, real_endptr, base);
- return result;
- }
- INTERCEPTOR(long long, atoll, const char *nptr) {
- void *ctx;
- ASAN_INTERCEPTOR_ENTER(ctx, atoll);
- ENSURE_ASAN_INITED();
- if (!flags()->replace_str) {
- return REAL(atoll)(nptr);
- }
- char *real_endptr;
- long long result = REAL(strtoll)(nptr, &real_endptr, 10);
- FixRealStrtolEndptr(nptr, &real_endptr);
- ASAN_READ_STRING(ctx, nptr, (real_endptr - nptr) + 1);
- return result;
- }
- #endif // ASAN_INTERCEPT_ATOLL_AND_STRTOLL
- #if ASAN_INTERCEPT___CXA_ATEXIT || ASAN_INTERCEPT_ATEXIT
- static void AtCxaAtexit(void *unused) {
- (void)unused;
- StopInitOrderChecking();
- }
- #endif
- #if ASAN_INTERCEPT___CXA_ATEXIT
- INTERCEPTOR(int, __cxa_atexit, void (*func)(void *), void *arg,
- void *dso_handle) {
- #if SANITIZER_APPLE
- if (UNLIKELY(!asan_inited)) return REAL(__cxa_atexit)(func, arg, dso_handle);
- #endif
- ENSURE_ASAN_INITED();
- #if CAN_SANITIZE_LEAKS
- __lsan::ScopedInterceptorDisabler disabler;
- #endif
- int res = REAL(__cxa_atexit)(func, arg, dso_handle);
- REAL(__cxa_atexit)(AtCxaAtexit, nullptr, nullptr);
- return res;
- }
- #endif // ASAN_INTERCEPT___CXA_ATEXIT
- #if ASAN_INTERCEPT_ATEXIT
- INTERCEPTOR(int, atexit, void (*func)()) {
- ENSURE_ASAN_INITED();
- #if CAN_SANITIZE_LEAKS
- __lsan::ScopedInterceptorDisabler disabler;
- #endif
- // Avoid calling real atexit as it is unreachable on at least on Linux.
- int res = REAL(__cxa_atexit)((void (*)(void *a))func, nullptr, nullptr);
- REAL(__cxa_atexit)(AtCxaAtexit, nullptr, nullptr);
- return res;
- }
- #endif
- #if ASAN_INTERCEPT_PTHREAD_ATFORK
- extern "C" {
- extern int _pthread_atfork(void (*prepare)(), void (*parent)(),
- void (*child)());
- };
- INTERCEPTOR(int, pthread_atfork, void (*prepare)(), void (*parent)(),
- void (*child)()) {
- #if CAN_SANITIZE_LEAKS
- __lsan::ScopedInterceptorDisabler disabler;
- #endif
- // REAL(pthread_atfork) cannot be called due to symbol indirections at least
- // on NetBSD
- return _pthread_atfork(prepare, parent, child);
- }
- #endif
- #if ASAN_INTERCEPT_VFORK
- DEFINE_REAL(int, vfork)
- DECLARE_EXTERN_INTERCEPTOR_AND_WRAPPER(int, vfork)
- #endif
- // ---------------------- InitializeAsanInterceptors ---------------- {{{1
- namespace __asan {
- void InitializeAsanInterceptors() {
- static bool was_called_once;
- CHECK(!was_called_once);
- was_called_once = true;
- InitializeCommonInterceptors();
- InitializeSignalInterceptors();
- // Intercept str* functions.
- ASAN_INTERCEPT_FUNC(strcat);
- ASAN_INTERCEPT_FUNC(strcpy);
- ASAN_INTERCEPT_FUNC(strncat);
- ASAN_INTERCEPT_FUNC(strncpy);
- ASAN_INTERCEPT_FUNC(strdup);
- #if ASAN_INTERCEPT___STRDUP
- ASAN_INTERCEPT_FUNC(__strdup);
- #endif
- #if ASAN_INTERCEPT_INDEX && ASAN_USE_ALIAS_ATTRIBUTE_FOR_INDEX
- ASAN_INTERCEPT_FUNC(index);
- #endif
- ASAN_INTERCEPT_FUNC(atoi);
- ASAN_INTERCEPT_FUNC(atol);
- ASAN_INTERCEPT_FUNC(strtol);
- #if ASAN_INTERCEPT_ATOLL_AND_STRTOLL
- ASAN_INTERCEPT_FUNC(atoll);
- ASAN_INTERCEPT_FUNC(strtoll);
- #endif
- // Intecept jump-related functions.
- ASAN_INTERCEPT_FUNC(longjmp);
- # if ASAN_INTERCEPT_SWAPCONTEXT
- ASAN_INTERCEPT_FUNC(swapcontext);
- ASAN_INTERCEPT_FUNC(makecontext);
- # endif
- # if ASAN_INTERCEPT__LONGJMP
- ASAN_INTERCEPT_FUNC(_longjmp);
- #endif
- #if ASAN_INTERCEPT___LONGJMP_CHK
- ASAN_INTERCEPT_FUNC(__longjmp_chk);
- #endif
- #if ASAN_INTERCEPT_SIGLONGJMP
- ASAN_INTERCEPT_FUNC(siglongjmp);
- #endif
- // Intercept exception handling functions.
- #if ASAN_INTERCEPT___CXA_THROW
- ASAN_INTERCEPT_FUNC(__cxa_throw);
- #endif
- #if ASAN_INTERCEPT___CXA_RETHROW_PRIMARY_EXCEPTION
- ASAN_INTERCEPT_FUNC(__cxa_rethrow_primary_exception);
- #endif
- // Indirectly intercept std::rethrow_exception.
- #if ASAN_INTERCEPT__UNWIND_RAISEEXCEPTION
- INTERCEPT_FUNCTION(_Unwind_RaiseException);
- #endif
- // Indirectly intercept std::rethrow_exception.
- #if ASAN_INTERCEPT__UNWIND_SJLJ_RAISEEXCEPTION
- INTERCEPT_FUNCTION(_Unwind_SjLj_RaiseException);
- #endif
- // Intercept threading-related functions
- #if ASAN_INTERCEPT_PTHREAD_CREATE
- // TODO: this should probably have an unversioned fallback for newer arches?
- #if defined(ASAN_PTHREAD_CREATE_VERSION)
- ASAN_INTERCEPT_FUNC_VER(pthread_create, ASAN_PTHREAD_CREATE_VERSION);
- #else
- ASAN_INTERCEPT_FUNC(pthread_create);
- #endif
- ASAN_INTERCEPT_FUNC(pthread_join);
- #endif
- // Intercept atexit function.
- #if ASAN_INTERCEPT___CXA_ATEXIT
- ASAN_INTERCEPT_FUNC(__cxa_atexit);
- #endif
- #if ASAN_INTERCEPT_ATEXIT
- ASAN_INTERCEPT_FUNC(atexit);
- #endif
- #if ASAN_INTERCEPT_PTHREAD_ATFORK
- ASAN_INTERCEPT_FUNC(pthread_atfork);
- #endif
- #if ASAN_INTERCEPT_VFORK
- ASAN_INTERCEPT_FUNC(vfork);
- #endif
- InitializePlatformInterceptors();
- VReport(1, "AddressSanitizer: libc interceptors initialized\n");
- }
- } // namespace __asan
- #endif // !SANITIZER_FUCHSIA
|