696d846a56
libsanitizer/ 2015-10-20 Maxim Ostapenko <m.ostapenko@partner.samsung.com> * All source files: Merge from upstream r250806. * configure.ac (link_sanitizer_common): Add -lrt flag. * configure.tgt: Enable TSAN and LSAN for aarch64-linux targets. Set CXX_ABI_NEEDED=true for darwin. * asan/Makefile.am (asan_files): Add new files. (DEFS): Add DCAN_SANITIZE_UB=0 and remove unused and legacy DASAN_FLEXIBLE_MAPPING_AND_OFFSET=0. * asan/Makefile.in: Regenerate. * ubsan/Makefile.am (ubsan_files): Add new files. (DEFS): Add DCAN_SANITIZE_UB=1. (libubsan_la_LIBADD): Add -lc++abi if CXX_ABI_NEEDED is true. * ubsan/Makefile.in: Regenerate. * tsan/Makefile.am (tsan_files): Add new files. (DEFS): Add DCAN_SANITIZE_UB=0. * tsan/Makefile.in: Regenerate. * sanitizer_common/Makefile.am (sanitizer_common_files): Add new files. * sanitizer_common/Makefile.in: Regenerate. * asan/libtool-version: Bump the libasan SONAME. From-SVN: r229111
131 lines
4.0 KiB
C++
131 lines
4.0 KiB
C++
//===-- asan_interceptors.cc ----------------------------------------------===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
//
|
|
// Interceptors for operators new and delete.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "asan_allocator.h"
|
|
#include "asan_internal.h"
|
|
#include "asan_stack.h"
|
|
|
|
#include "interception/interception.h"
|
|
|
|
#include <stddef.h>
|
|
|
|
// C++ operators can't have visibility attributes on Windows.
|
|
#if SANITIZER_WINDOWS
|
|
# define CXX_OPERATOR_ATTRIBUTE
|
|
#else
|
|
# define CXX_OPERATOR_ATTRIBUTE INTERCEPTOR_ATTRIBUTE
|
|
#endif
|
|
|
|
using namespace __asan; // NOLINT
|
|
|
|
// This code has issues on OSX.
|
|
// See https://code.google.com/p/address-sanitizer/issues/detail?id=131.
|
|
|
|
// Fake std::nothrow_t to avoid including <new>.
|
|
namespace std {
|
|
struct nothrow_t {};
|
|
} // namespace std
|
|
|
|
#define OPERATOR_NEW_BODY(type) \
|
|
GET_STACK_TRACE_MALLOC;\
|
|
return asan_memalign(0, size, &stack, type);
|
|
|
|
// On OS X it's not enough to just provide our own 'operator new' and
|
|
// 'operator delete' implementations, because they're going to be in the
|
|
// runtime dylib, and the main executable will depend on both the runtime
|
|
// dylib and libstdc++, each of those'll have its implementation of new and
|
|
// delete.
|
|
// To make sure that C++ allocation/deallocation operators are overridden on
|
|
// OS X we need to intercept them using their mangled names.
|
|
#if !SANITIZER_MAC
|
|
// FreeBSD prior v9.2 have wrong definition of 'size_t'.
|
|
// http://svnweb.freebsd.org/base?view=revision&revision=232261
|
|
#if SANITIZER_FREEBSD && SANITIZER_WORDSIZE == 32
|
|
#include <sys/param.h>
|
|
#if __FreeBSD_version <= 902001 // v9.2
|
|
#define size_t unsigned
|
|
#endif // __FreeBSD_version
|
|
#endif // SANITIZER_FREEBSD && SANITIZER_WORDSIZE == 32
|
|
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void *operator new(size_t size) { OPERATOR_NEW_BODY(FROM_NEW); }
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void *operator new[](size_t size) { OPERATOR_NEW_BODY(FROM_NEW_BR); }
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void *operator new(size_t size, std::nothrow_t const&)
|
|
{ OPERATOR_NEW_BODY(FROM_NEW); }
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void *operator new[](size_t size, std::nothrow_t const&)
|
|
{ OPERATOR_NEW_BODY(FROM_NEW_BR); }
|
|
|
|
#else // SANITIZER_MAC
|
|
INTERCEPTOR(void *, _Znwm, size_t size) {
|
|
OPERATOR_NEW_BODY(FROM_NEW);
|
|
}
|
|
INTERCEPTOR(void *, _Znam, size_t size) {
|
|
OPERATOR_NEW_BODY(FROM_NEW_BR);
|
|
}
|
|
INTERCEPTOR(void *, _ZnwmRKSt9nothrow_t, size_t size, std::nothrow_t const&) {
|
|
OPERATOR_NEW_BODY(FROM_NEW);
|
|
}
|
|
INTERCEPTOR(void *, _ZnamRKSt9nothrow_t, size_t size, std::nothrow_t const&) {
|
|
OPERATOR_NEW_BODY(FROM_NEW_BR);
|
|
}
|
|
#endif
|
|
|
|
#define OPERATOR_DELETE_BODY(type) \
|
|
GET_STACK_TRACE_FREE;\
|
|
asan_free(ptr, &stack, type);
|
|
|
|
#if !SANITIZER_MAC
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void operator delete(void *ptr) NOEXCEPT {
|
|
OPERATOR_DELETE_BODY(FROM_NEW);
|
|
}
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void operator delete[](void *ptr) NOEXCEPT {
|
|
OPERATOR_DELETE_BODY(FROM_NEW_BR);
|
|
}
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void operator delete(void *ptr, std::nothrow_t const&) {
|
|
OPERATOR_DELETE_BODY(FROM_NEW);
|
|
}
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void operator delete[](void *ptr, std::nothrow_t const&) {
|
|
OPERATOR_DELETE_BODY(FROM_NEW_BR);
|
|
}
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void operator delete(void *ptr, size_t size) NOEXCEPT {
|
|
GET_STACK_TRACE_FREE;
|
|
asan_sized_free(ptr, size, &stack, FROM_NEW);
|
|
}
|
|
CXX_OPERATOR_ATTRIBUTE
|
|
void operator delete[](void *ptr, size_t size) NOEXCEPT {
|
|
GET_STACK_TRACE_FREE;
|
|
asan_sized_free(ptr, size, &stack, FROM_NEW_BR);
|
|
}
|
|
|
|
#else // SANITIZER_MAC
|
|
INTERCEPTOR(void, _ZdlPv, void *ptr) {
|
|
OPERATOR_DELETE_BODY(FROM_NEW);
|
|
}
|
|
INTERCEPTOR(void, _ZdaPv, void *ptr) {
|
|
OPERATOR_DELETE_BODY(FROM_NEW_BR);
|
|
}
|
|
INTERCEPTOR(void, _ZdlPvRKSt9nothrow_t, void *ptr, std::nothrow_t const&) {
|
|
OPERATOR_DELETE_BODY(FROM_NEW);
|
|
}
|
|
INTERCEPTOR(void, _ZdaPvRKSt9nothrow_t, void *ptr, std::nothrow_t const&) {
|
|
OPERATOR_DELETE_BODY(FROM_NEW_BR);
|
|
}
|
|
#endif
|