86289a4ff4
Merged revision: 82bc6a094e85014f1891ef9407496f44af8fe442 with the fix for PR sanitizer/102911
227 lines
7.1 KiB
C++
227 lines
7.1 KiB
C++
//===-- asan_malloc_linux.cpp ---------------------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
//
|
|
// Linux-specific malloc interception.
|
|
// We simply define functions like malloc, free, realloc, etc.
|
|
// They will replace the corresponding libc functions automagically.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "sanitizer_common/sanitizer_platform.h"
|
|
#if SANITIZER_FREEBSD || SANITIZER_FUCHSIA || SANITIZER_LINUX || \
|
|
SANITIZER_NETBSD || SANITIZER_SOLARIS
|
|
|
|
# include "asan_allocator.h"
|
|
# include "asan_interceptors.h"
|
|
# include "asan_internal.h"
|
|
# include "asan_stack.h"
|
|
# include "lsan/lsan_common.h"
|
|
# include "sanitizer_common/sanitizer_allocator_checks.h"
|
|
# include "sanitizer_common/sanitizer_allocator_dlsym.h"
|
|
# include "sanitizer_common/sanitizer_errno.h"
|
|
# include "sanitizer_common/sanitizer_tls_get_addr.h"
|
|
|
|
// ---------------------- Replacement functions ---------------- {{{1
|
|
using namespace __asan;
|
|
|
|
struct DlsymAlloc : public DlSymAllocator<DlsymAlloc> {
|
|
static bool UseImpl() { return asan_init_is_running; }
|
|
static void OnAllocate(const void *ptr, uptr size) {
|
|
# if CAN_SANITIZE_LEAKS
|
|
// Suppress leaks from dlerror(). Previously dlsym hack on global array was
|
|
// used by leak sanitizer as a root region.
|
|
__lsan_register_root_region(ptr, size);
|
|
# endif
|
|
}
|
|
static void OnFree(const void *ptr, uptr size) {
|
|
# if CAN_SANITIZE_LEAKS
|
|
__lsan_unregister_root_region(ptr, size);
|
|
# endif
|
|
}
|
|
};
|
|
|
|
INTERCEPTOR(void, free, void *ptr) {
|
|
if (DlsymAlloc::PointerIsMine(ptr))
|
|
return DlsymAlloc::Free(ptr);
|
|
GET_STACK_TRACE_FREE;
|
|
asan_free(ptr, &stack, FROM_MALLOC);
|
|
}
|
|
|
|
#if SANITIZER_INTERCEPT_CFREE
|
|
INTERCEPTOR(void, cfree, void *ptr) {
|
|
if (DlsymAlloc::PointerIsMine(ptr))
|
|
return DlsymAlloc::Free(ptr);
|
|
GET_STACK_TRACE_FREE;
|
|
asan_free(ptr, &stack, FROM_MALLOC);
|
|
}
|
|
#endif // SANITIZER_INTERCEPT_CFREE
|
|
|
|
INTERCEPTOR(void*, malloc, uptr size) {
|
|
if (DlsymAlloc::Use())
|
|
return DlsymAlloc::Allocate(size);
|
|
ENSURE_ASAN_INITED();
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_malloc(size, &stack);
|
|
}
|
|
|
|
INTERCEPTOR(void*, calloc, uptr nmemb, uptr size) {
|
|
if (DlsymAlloc::Use())
|
|
return DlsymAlloc::Callocate(nmemb, size);
|
|
ENSURE_ASAN_INITED();
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_calloc(nmemb, size, &stack);
|
|
}
|
|
|
|
INTERCEPTOR(void*, realloc, void *ptr, uptr size) {
|
|
if (DlsymAlloc::Use() || DlsymAlloc::PointerIsMine(ptr))
|
|
return DlsymAlloc::Realloc(ptr, size);
|
|
ENSURE_ASAN_INITED();
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_realloc(ptr, size, &stack);
|
|
}
|
|
|
|
#if SANITIZER_INTERCEPT_REALLOCARRAY
|
|
INTERCEPTOR(void*, reallocarray, void *ptr, uptr nmemb, uptr size) {
|
|
ENSURE_ASAN_INITED();
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_reallocarray(ptr, nmemb, size, &stack);
|
|
}
|
|
#endif // SANITIZER_INTERCEPT_REALLOCARRAY
|
|
|
|
#if SANITIZER_INTERCEPT_MEMALIGN
|
|
INTERCEPTOR(void*, memalign, uptr boundary, uptr size) {
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_memalign(boundary, size, &stack, FROM_MALLOC);
|
|
}
|
|
|
|
INTERCEPTOR(void*, __libc_memalign, uptr boundary, uptr size) {
|
|
GET_STACK_TRACE_MALLOC;
|
|
void *res = asan_memalign(boundary, size, &stack, FROM_MALLOC);
|
|
DTLS_on_libc_memalign(res, size);
|
|
return res;
|
|
}
|
|
#endif // SANITIZER_INTERCEPT_MEMALIGN
|
|
|
|
#if SANITIZER_INTERCEPT_ALIGNED_ALLOC
|
|
INTERCEPTOR(void*, aligned_alloc, uptr boundary, uptr size) {
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_aligned_alloc(boundary, size, &stack);
|
|
}
|
|
#endif // SANITIZER_INTERCEPT_ALIGNED_ALLOC
|
|
|
|
INTERCEPTOR(uptr, malloc_usable_size, void *ptr) {
|
|
GET_CURRENT_PC_BP_SP;
|
|
(void)sp;
|
|
return asan_malloc_usable_size(ptr, pc, bp);
|
|
}
|
|
|
|
#if SANITIZER_INTERCEPT_MALLOPT_AND_MALLINFO
|
|
// We avoid including malloc.h for portability reasons.
|
|
// man mallinfo says the fields are "long", but the implementation uses int.
|
|
// It doesn't matter much -- we just need to make sure that the libc's mallinfo
|
|
// is not called.
|
|
struct fake_mallinfo {
|
|
int x[10];
|
|
};
|
|
|
|
INTERCEPTOR(struct fake_mallinfo, mallinfo, void) {
|
|
struct fake_mallinfo res;
|
|
REAL(memset)(&res, 0, sizeof(res));
|
|
return res;
|
|
}
|
|
|
|
INTERCEPTOR(int, mallopt, int cmd, int value) {
|
|
return 0;
|
|
}
|
|
#endif // SANITIZER_INTERCEPT_MALLOPT_AND_MALLINFO
|
|
|
|
INTERCEPTOR(int, posix_memalign, void **memptr, uptr alignment, uptr size) {
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_posix_memalign(memptr, alignment, size, &stack);
|
|
}
|
|
|
|
INTERCEPTOR(void*, valloc, uptr size) {
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_valloc(size, &stack);
|
|
}
|
|
|
|
#if SANITIZER_INTERCEPT_PVALLOC
|
|
INTERCEPTOR(void*, pvalloc, uptr size) {
|
|
GET_STACK_TRACE_MALLOC;
|
|
return asan_pvalloc(size, &stack);
|
|
}
|
|
#endif // SANITIZER_INTERCEPT_PVALLOC
|
|
|
|
INTERCEPTOR(void, malloc_stats, void) {
|
|
__asan_print_accumulated_stats();
|
|
}
|
|
|
|
#if SANITIZER_ANDROID
|
|
// Format of __libc_malloc_dispatch has changed in Android L.
|
|
// While we are moving towards a solution that does not depend on bionic
|
|
// internals, here is something to support both K* and L releases.
|
|
struct MallocDebugK {
|
|
void *(*malloc)(uptr bytes);
|
|
void (*free)(void *mem);
|
|
void *(*calloc)(uptr n_elements, uptr elem_size);
|
|
void *(*realloc)(void *oldMem, uptr bytes);
|
|
void *(*memalign)(uptr alignment, uptr bytes);
|
|
uptr (*malloc_usable_size)(void *mem);
|
|
};
|
|
|
|
struct MallocDebugL {
|
|
void *(*calloc)(uptr n_elements, uptr elem_size);
|
|
void (*free)(void *mem);
|
|
fake_mallinfo (*mallinfo)(void);
|
|
void *(*malloc)(uptr bytes);
|
|
uptr (*malloc_usable_size)(void *mem);
|
|
void *(*memalign)(uptr alignment, uptr bytes);
|
|
int (*posix_memalign)(void **memptr, uptr alignment, uptr size);
|
|
void* (*pvalloc)(uptr size);
|
|
void *(*realloc)(void *oldMem, uptr bytes);
|
|
void* (*valloc)(uptr size);
|
|
};
|
|
|
|
ALIGNED(32) const MallocDebugK asan_malloc_dispatch_k = {
|
|
WRAP(malloc), WRAP(free), WRAP(calloc),
|
|
WRAP(realloc), WRAP(memalign), WRAP(malloc_usable_size)};
|
|
|
|
ALIGNED(32) const MallocDebugL asan_malloc_dispatch_l = {
|
|
WRAP(calloc), WRAP(free), WRAP(mallinfo),
|
|
WRAP(malloc), WRAP(malloc_usable_size), WRAP(memalign),
|
|
WRAP(posix_memalign), WRAP(pvalloc), WRAP(realloc),
|
|
WRAP(valloc)};
|
|
|
|
namespace __asan {
|
|
void ReplaceSystemMalloc() {
|
|
void **__libc_malloc_dispatch_p =
|
|
(void **)AsanDlSymNext("__libc_malloc_dispatch");
|
|
if (__libc_malloc_dispatch_p) {
|
|
// Decide on K vs L dispatch format by the presence of
|
|
// __libc_malloc_default_dispatch export in libc.
|
|
void *default_dispatch_p = AsanDlSymNext("__libc_malloc_default_dispatch");
|
|
if (default_dispatch_p)
|
|
*__libc_malloc_dispatch_p = (void *)&asan_malloc_dispatch_k;
|
|
else
|
|
*__libc_malloc_dispatch_p = (void *)&asan_malloc_dispatch_l;
|
|
}
|
|
}
|
|
} // namespace __asan
|
|
|
|
#else // SANITIZER_ANDROID
|
|
|
|
namespace __asan {
|
|
void ReplaceSystemMalloc() {
|
|
}
|
|
} // namespace __asan
|
|
#endif // SANITIZER_ANDROID
|
|
|
|
#endif // SANITIZER_FREEBSD || SANITIZER_FUCHSIA || SANITIZER_LINUX ||
|
|
// SANITIZER_NETBSD || SANITIZER_SOLARIS
|