| //===-- hwasan_interceptors.cpp -------------------------------------------===// |
| // |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| // See https://llvm.org/LICENSE.txt for license information. |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // This file is a part of HWAddressSanitizer. |
| // |
| // Interceptors for standard library functions. |
| // |
| // FIXME: move as many interceptors as possible into |
| // sanitizer_common/sanitizer_common_interceptors.h |
| //===----------------------------------------------------------------------===// |
| |
| #include "interception/interception.h" |
| #include "hwasan.h" |
| #include "hwasan_allocator.h" |
| #include "hwasan_mapping.h" |
| #include "hwasan_thread.h" |
| #include "hwasan_poisoning.h" |
| #include "hwasan_report.h" |
| #include "sanitizer_common/sanitizer_platform_limits_posix.h" |
| #include "sanitizer_common/sanitizer_allocator.h" |
| #include "sanitizer_common/sanitizer_allocator_interface.h" |
| #include "sanitizer_common/sanitizer_allocator_internal.h" |
| #include "sanitizer_common/sanitizer_atomic.h" |
| #include "sanitizer_common/sanitizer_common.h" |
| #include "sanitizer_common/sanitizer_errno.h" |
| #include "sanitizer_common/sanitizer_stackdepot.h" |
| #include "sanitizer_common/sanitizer_libc.h" |
| #include "sanitizer_common/sanitizer_linux.h" |
| #include "sanitizer_common/sanitizer_tls_get_addr.h" |
| |
| #include <stdarg.h> |
| // ACHTUNG! No other system header includes in this file. |
| // Ideally, we should get rid of stdarg.h as well. |
| |
| using namespace __hwasan; |
| |
| using __sanitizer::memory_order; |
| using __sanitizer::atomic_load; |
| using __sanitizer::atomic_store; |
| using __sanitizer::atomic_uintptr_t; |
| |
| static uptr allocated_for_dlsym; |
| static const uptr kDlsymAllocPoolSize = 1024; |
| static uptr alloc_memory_for_dlsym[kDlsymAllocPoolSize]; |
| |
| static bool IsInDlsymAllocPool(const void *ptr) { |
| uptr off = (uptr)ptr - (uptr)alloc_memory_for_dlsym; |
| return off < sizeof(alloc_memory_for_dlsym); |
| } |
| |
| static void *AllocateFromLocalPool(uptr size_in_bytes) { |
| uptr size_in_words = RoundUpTo(size_in_bytes, kWordSize) / kWordSize; |
| void *mem = (void *)&alloc_memory_for_dlsym[allocated_for_dlsym]; |
| allocated_for_dlsym += size_in_words; |
| CHECK_LT(allocated_for_dlsym, kDlsymAllocPoolSize); |
| return mem; |
| } |
| |
| #define ENSURE_HWASAN_INITED() do { \ |
| CHECK(!hwasan_init_is_running); \ |
| if (!hwasan_inited) { \ |
| __hwasan_init(); \ |
| } \ |
| } while (0) |
| |
| |
| int __sanitizer_posix_memalign(void **memptr, uptr alignment, uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| CHECK_NE(memptr, 0); |
| int res = hwasan_posix_memalign(memptr, alignment, size, &stack); |
| return res; |
| } |
| |
| void * __sanitizer_memalign(uptr alignment, uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| return hwasan_memalign(alignment, size, &stack); |
| } |
| |
| void * __sanitizer_aligned_alloc(uptr alignment, uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| return hwasan_aligned_alloc(alignment, size, &stack); |
| } |
| |
| void * __sanitizer___libc_memalign(uptr alignment, uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| void *ptr = hwasan_memalign(alignment, size, &stack); |
| if (ptr) |
| DTLS_on_libc_memalign(ptr, size); |
| return ptr; |
| } |
| |
| void * __sanitizer_valloc(uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| return hwasan_valloc(size, &stack); |
| } |
| |
| void * __sanitizer_pvalloc(uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| return hwasan_pvalloc(size, &stack); |
| } |
| |
| void __sanitizer_free(void *ptr) { |
| GET_MALLOC_STACK_TRACE; |
| if (!ptr || UNLIKELY(IsInDlsymAllocPool(ptr))) return; |
| hwasan_free(ptr, &stack); |
| } |
| |
| void __sanitizer_cfree(void *ptr) { |
| GET_MALLOC_STACK_TRACE; |
| if (!ptr || UNLIKELY(IsInDlsymAllocPool(ptr))) return; |
| hwasan_free(ptr, &stack); |
| } |
| |
| uptr __sanitizer_malloc_usable_size(const void *ptr) { |
| return __sanitizer_get_allocated_size(ptr); |
| } |
| |
| struct __sanitizer_struct_mallinfo __sanitizer_mallinfo() { |
| __sanitizer_struct_mallinfo sret; |
| internal_memset(&sret, 0, sizeof(sret)); |
| return sret; |
| } |
| |
| int __sanitizer_mallopt(int cmd, int value) { |
| return 0; |
| } |
| |
| void __sanitizer_malloc_stats(void) { |
| // FIXME: implement, but don't call REAL(malloc_stats)! |
| } |
| |
| void * __sanitizer_calloc(uptr nmemb, uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| if (UNLIKELY(!hwasan_inited)) |
| // Hack: dlsym calls calloc before REAL(calloc) is retrieved from dlsym. |
| return AllocateFromLocalPool(nmemb * size); |
| return hwasan_calloc(nmemb, size, &stack); |
| } |
| |
| void * __sanitizer_realloc(void *ptr, uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| if (UNLIKELY(IsInDlsymAllocPool(ptr))) { |
| uptr offset = (uptr)ptr - (uptr)alloc_memory_for_dlsym; |
| uptr copy_size = Min(size, kDlsymAllocPoolSize - offset); |
| void *new_ptr; |
| if (UNLIKELY(!hwasan_inited)) { |
| new_ptr = AllocateFromLocalPool(copy_size); |
| } else { |
| copy_size = size; |
| new_ptr = hwasan_malloc(copy_size, &stack); |
| } |
| internal_memcpy(new_ptr, ptr, copy_size); |
| return new_ptr; |
| } |
| return hwasan_realloc(ptr, size, &stack); |
| } |
| |
| void * __sanitizer_reallocarray(void *ptr, uptr nmemb, uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| return hwasan_reallocarray(ptr, nmemb, size, &stack); |
| } |
| |
| void * __sanitizer_malloc(uptr size) { |
| GET_MALLOC_STACK_TRACE; |
| if (UNLIKELY(!hwasan_init_is_running)) |
| ENSURE_HWASAN_INITED(); |
| if (UNLIKELY(!hwasan_inited)) |
| // Hack: dlsym calls malloc before REAL(malloc) is retrieved from dlsym. |
| return AllocateFromLocalPool(size); |
| return hwasan_malloc(size, &stack); |
| } |
| |
| #if HWASAN_WITH_INTERCEPTORS |
| #define INTERCEPTOR_ALIAS(RET, FN, ARGS...) \ |
| extern "C" SANITIZER_INTERFACE_ATTRIBUTE RET WRAP(FN)(ARGS) \ |
| ALIAS("__sanitizer_" #FN); \ |
| extern "C" SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE RET FN( \ |
| ARGS) ALIAS("__sanitizer_" #FN) |
| |
| INTERCEPTOR_ALIAS(int, posix_memalign, void **memptr, SIZE_T alignment, |
| SIZE_T size); |
| INTERCEPTOR_ALIAS(void *, aligned_alloc, SIZE_T alignment, SIZE_T size); |
| INTERCEPTOR_ALIAS(void *, __libc_memalign, SIZE_T alignment, SIZE_T size); |
| INTERCEPTOR_ALIAS(void *, valloc, SIZE_T size); |
| INTERCEPTOR_ALIAS(void, free, void *ptr); |
| INTERCEPTOR_ALIAS(uptr, malloc_usable_size, const void *ptr); |
| INTERCEPTOR_ALIAS(void *, calloc, SIZE_T nmemb, SIZE_T size); |
| INTERCEPTOR_ALIAS(void *, realloc, void *ptr, SIZE_T size); |
| INTERCEPTOR_ALIAS(void *, reallocarray, void *ptr, SIZE_T nmemb, SIZE_T size); |
| INTERCEPTOR_ALIAS(void *, malloc, SIZE_T size); |
| |
| #if !SANITIZER_FREEBSD && !SANITIZER_NETBSD |
| INTERCEPTOR_ALIAS(void *, memalign, SIZE_T alignment, SIZE_T size); |
| INTERCEPTOR_ALIAS(void *, pvalloc, SIZE_T size); |
| INTERCEPTOR_ALIAS(void, cfree, void *ptr); |
| INTERCEPTOR_ALIAS(__sanitizer_struct_mallinfo, mallinfo); |
| INTERCEPTOR_ALIAS(int, mallopt, int cmd, int value); |
| INTERCEPTOR_ALIAS(void, malloc_stats, void); |
| #endif |
| |
| struct ThreadStartArg { |
| thread_callback_t callback; |
| void *param; |
| }; |
| |
| static void *HwasanThreadStartFunc(void *arg) { |
| __hwasan_thread_enter(); |
| ThreadStartArg A = *reinterpret_cast<ThreadStartArg*>(arg); |
| UnmapOrDie(arg, GetPageSizeCached()); |
| return A.callback(A.param); |
| } |
| |
| INTERCEPTOR(int, pthread_create, void *th, void *attr, void *(*callback)(void*), |
| void * param) { |
| ScopedTaggingDisabler disabler; |
| ThreadStartArg *A = reinterpret_cast<ThreadStartArg *> (MmapOrDie( |
| GetPageSizeCached(), "pthread_create")); |
| *A = {callback, param}; |
| int res = REAL(pthread_create)(UntagPtr(th), UntagPtr(attr), |
| &HwasanThreadStartFunc, A); |
| return res; |
| } |
| |
| DEFINE_REAL(int, vfork) |
| DECLARE_EXTERN_INTERCEPTOR_AND_WRAPPER(int, vfork) |
| #endif // HWASAN_WITH_INTERCEPTORS |
| |
| #if HWASAN_WITH_INTERCEPTORS && defined(__aarch64__) |
| // Get and/or change the set of blocked signals. |
| extern "C" int sigprocmask(int __how, const __hw_sigset_t *__restrict __set, |
| __hw_sigset_t *__restrict __oset); |
| #define SIG_BLOCK 0 |
| #define SIG_SETMASK 2 |
| extern "C" int __sigjmp_save(__hw_sigjmp_buf env, int savemask) { |
| env[0].__mask_was_saved = |
| (savemask && sigprocmask(SIG_BLOCK, (__hw_sigset_t *)0, |
| &env[0].__saved_mask) == 0); |
| return 0; |
| } |
| |
| static void __attribute__((always_inline)) |
| InternalLongjmp(__hw_register_buf env, int retval) { |
| // Clear all memory tags on the stack between here and where we're going. |
| unsigned long long stack_pointer = env[13]; |
| // The stack pointer should never be tagged, so we don't need to clear the |
| // tag for this function call. |
| __hwasan_handle_longjmp((void *)stack_pointer); |
| |
| // Run code for handling a longjmp. |
| // Need to use a register that isn't going to be loaded from the environment |
| // buffer -- hence why we need to specify the register to use. |
| // Must implement this ourselves, since we don't know the order of registers |
| // in different libc implementations and many implementations mangle the |
| // stack pointer so we can't use it without knowing the demangling scheme. |
| register long int retval_tmp asm("x1") = retval; |
| register void *env_address asm("x0") = &env[0]; |
| asm volatile("ldp x19, x20, [%0, #0<<3];" |
| "ldp x21, x22, [%0, #2<<3];" |
| "ldp x23, x24, [%0, #4<<3];" |
| "ldp x25, x26, [%0, #6<<3];" |
| "ldp x27, x28, [%0, #8<<3];" |
| "ldp x29, x30, [%0, #10<<3];" |
| "ldp d8, d9, [%0, #14<<3];" |
| "ldp d10, d11, [%0, #16<<3];" |
| "ldp d12, d13, [%0, #18<<3];" |
| "ldp d14, d15, [%0, #20<<3];" |
| "ldr x5, [%0, #13<<3];" |
| "mov sp, x5;" |
| // Return the value requested to return through arguments. |
| // This should be in x1 given what we requested above. |
| "cmp %1, #0;" |
| "mov x0, #1;" |
| "csel x0, %1, x0, ne;" |
| "br x30;" |
| : "+r"(env_address) |
| : "r"(retval_tmp)); |
| } |
| |
| INTERCEPTOR(void, siglongjmp, __hw_sigjmp_buf env, int val) { |
| if (env[0].__mask_was_saved) |
| // Restore the saved signal mask. |
| (void)sigprocmask(SIG_SETMASK, &env[0].__saved_mask, |
| (__hw_sigset_t *)0); |
| InternalLongjmp(env[0].__jmpbuf, val); |
| } |
| |
| // Required since glibc libpthread calls __libc_longjmp on pthread_exit, and |
| // _setjmp on start_thread. Hence we have to intercept the longjmp on |
| // pthread_exit so the __hw_jmp_buf order matches. |
| INTERCEPTOR(void, __libc_longjmp, __hw_jmp_buf env, int val) { |
| InternalLongjmp(env[0].__jmpbuf, val); |
| } |
| |
| INTERCEPTOR(void, longjmp, __hw_jmp_buf env, int val) { |
| InternalLongjmp(env[0].__jmpbuf, val); |
| } |
| #undef SIG_BLOCK |
| #undef SIG_SETMASK |
| |
| #endif // HWASAN_WITH_INTERCEPTORS && __aarch64__ |
| |
| static void BeforeFork() { |
| StackDepotLockAll(); |
| } |
| |
| static void AfterFork() { |
| StackDepotUnlockAll(); |
| } |
| |
| INTERCEPTOR(int, fork, void) { |
| ENSURE_HWASAN_INITED(); |
| BeforeFork(); |
| int pid = REAL(fork)(); |
| AfterFork(); |
| return pid; |
| } |
| |
| namespace __hwasan { |
| |
| int OnExit() { |
| // FIXME: ask frontend whether we need to return failure. |
| return 0; |
| } |
| |
| } // namespace __hwasan |
| |
| namespace __hwasan { |
| |
| void InitializeInterceptors() { |
| static int inited = 0; |
| CHECK_EQ(inited, 0); |
| |
| INTERCEPT_FUNCTION(fork); |
| |
| #if HWASAN_WITH_INTERCEPTORS |
| #if defined(__linux__) |
| INTERCEPT_FUNCTION(vfork); |
| #endif // __linux__ |
| INTERCEPT_FUNCTION(pthread_create); |
| #endif |
| |
| inited = 1; |
| } |
| } // namespace __hwasan |