| //===-- sanitizer_common_interceptors.inc -----------------------*- C++ -*-===// |
| // |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| // See https://llvm.org/LICENSE.txt for license information. |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // Common function interceptors for tools like AddressSanitizer, |
| // ThreadSanitizer, MemorySanitizer, etc. |
| // |
| // This file should be included into the tool's interceptor file, |
| // which has to define its own macros: |
| // COMMON_INTERCEPTOR_ENTER |
| // COMMON_INTERCEPTOR_ENTER_NOIGNORE |
| // COMMON_INTERCEPTOR_READ_RANGE |
| // COMMON_INTERCEPTOR_WRITE_RANGE |
| // COMMON_INTERCEPTOR_INITIALIZE_RANGE |
| // COMMON_INTERCEPTOR_DIR_ACQUIRE |
| // COMMON_INTERCEPTOR_FD_ACQUIRE |
| // COMMON_INTERCEPTOR_FD_RELEASE |
| // COMMON_INTERCEPTOR_FD_ACCESS |
| // COMMON_INTERCEPTOR_SET_THREAD_NAME |
| // COMMON_INTERCEPTOR_ON_DLOPEN |
| // COMMON_INTERCEPTOR_ON_EXIT |
| // COMMON_INTERCEPTOR_MUTEX_PRE_LOCK |
| // COMMON_INTERCEPTOR_MUTEX_POST_LOCK |
| // COMMON_INTERCEPTOR_MUTEX_UNLOCK |
| // COMMON_INTERCEPTOR_MUTEX_REPAIR |
| // COMMON_INTERCEPTOR_SET_PTHREAD_NAME |
| // COMMON_INTERCEPTOR_HANDLE_RECVMSG |
| // COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED |
| // COMMON_INTERCEPTOR_MEMSET_IMPL |
| // COMMON_INTERCEPTOR_MEMMOVE_IMPL |
| // COMMON_INTERCEPTOR_MEMCPY_IMPL |
| // COMMON_INTERCEPTOR_MMAP_IMPL |
| // COMMON_INTERCEPTOR_COPY_STRING |
| // COMMON_INTERCEPTOR_STRNDUP_IMPL |
| // COMMON_INTERCEPTOR_STRERROR |
| //===----------------------------------------------------------------------===// |
| |
| #include "interception/interception.h" |
| #include "sanitizer_addrhashmap.h" |
| #include "sanitizer_errno.h" |
| #include "sanitizer_placement_new.h" |
| #include "sanitizer_platform_interceptors.h" |
| #include "sanitizer_symbolizer.h" |
| #include "sanitizer_tls_get_addr.h" |
| |
| #include <stdarg.h> |
| |
| #if SANITIZER_INTERCEPTOR_HOOKS |
| #define CALL_WEAK_INTERCEPTOR_HOOK(f, ...) f(__VA_ARGS__); |
| #define DECLARE_WEAK_INTERCEPTOR_HOOK(f, ...) \ |
| SANITIZER_INTERFACE_WEAK_DEF(void, f, __VA_ARGS__) {} |
| #else |
| #define DECLARE_WEAK_INTERCEPTOR_HOOK(f, ...) |
| #define CALL_WEAK_INTERCEPTOR_HOOK(f, ...) |
| |
| #endif // SANITIZER_INTERCEPTOR_HOOKS |
| |
| #if SANITIZER_WINDOWS && !defined(va_copy) |
| #define va_copy(dst, src) ((dst) = (src)) |
| #endif // _WIN32 |
| |
| #if SANITIZER_FREEBSD |
| #define pthread_setname_np pthread_set_name_np |
| #define inet_aton __inet_aton |
| #define inet_pton __inet_pton |
| #define iconv __bsd_iconv |
| #endif |
| |
| #if SANITIZER_NETBSD |
| #define clock_getres __clock_getres50 |
| #define clock_gettime __clock_gettime50 |
| #define clock_settime __clock_settime50 |
| #define ctime __ctime50 |
| #define ctime_r __ctime_r50 |
| #define devname __devname50 |
| #define fgetpos __fgetpos50 |
| #define fsetpos __fsetpos50 |
| #define fstatvfs __fstatvfs90 |
| #define fstatvfs1 __fstatvfs190 |
| #define fts_children __fts_children60 |
| #define fts_close __fts_close60 |
| #define fts_open __fts_open60 |
| #define fts_read __fts_read60 |
| #define fts_set __fts_set60 |
| #define getitimer __getitimer50 |
| #define getmntinfo __getmntinfo90 |
| #define getpwent __getpwent50 |
| #define getpwnam __getpwnam50 |
| #define getpwnam_r __getpwnam_r50 |
| #define getpwuid __getpwuid50 |
| #define getpwuid_r __getpwuid_r50 |
| #define getutent __getutent50 |
| #define getutxent __getutxent50 |
| #define getutxid __getutxid50 |
| #define getutxline __getutxline50 |
| #define getvfsstat __getvfsstat90 |
| #define pututxline __pututxline50 |
| #define glob __glob30 |
| #define gmtime __gmtime50 |
| #define gmtime_r __gmtime_r50 |
| #define localtime __locatime50 |
| #define localtime_r __localtime_r50 |
| #define mktime __mktime50 |
| #define lstat __lstat50 |
| #define opendir __opendir30 |
| #define readdir __readdir30 |
| #define readdir_r __readdir_r30 |
| #define scandir __scandir30 |
| #define setitimer __setitimer50 |
| #define setlocale __setlocale50 |
| #define shmctl __shmctl50 |
| #define sigaltstack __sigaltstack14 |
| #define sigemptyset __sigemptyset14 |
| #define sigfillset __sigfillset14 |
| #define sigpending __sigpending14 |
| #define sigprocmask __sigprocmask14 |
| #define sigtimedwait __sigtimedwait50 |
| #define stat __stat50 |
| #define statvfs __statvfs90 |
| #define statvfs1 __statvfs190 |
| #define time __time50 |
| #define times __times13 |
| #define unvis __unvis50 |
| #define wait3 __wait350 |
| #define wait4 __wait450 |
| extern const unsigned short *_ctype_tab_; |
| extern const short *_toupper_tab_; |
| extern const short *_tolower_tab_; |
| #endif |
| |
| // Platform-specific options. |
| #if SANITIZER_MAC |
| #define PLATFORM_HAS_DIFFERENT_MEMCPY_AND_MEMMOVE false |
| #elif SANITIZER_WINDOWS64 |
| #define PLATFORM_HAS_DIFFERENT_MEMCPY_AND_MEMMOVE false |
| #else |
| #define PLATFORM_HAS_DIFFERENT_MEMCPY_AND_MEMMOVE true |
| #endif // SANITIZER_MAC |
| |
| #ifndef COMMON_INTERCEPTOR_INITIALIZE_RANGE |
| #define COMMON_INTERCEPTOR_INITIALIZE_RANGE(p, size) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_UNPOISON_PARAM |
| #define COMMON_INTERCEPTOR_UNPOISON_PARAM(count) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_FD_ACCESS |
| #define COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MUTEX_PRE_LOCK |
| #define COMMON_INTERCEPTOR_MUTEX_PRE_LOCK(ctx, m) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MUTEX_POST_LOCK |
| #define COMMON_INTERCEPTOR_MUTEX_POST_LOCK(ctx, m) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MUTEX_UNLOCK |
| #define COMMON_INTERCEPTOR_MUTEX_UNLOCK(ctx, m) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MUTEX_REPAIR |
| #define COMMON_INTERCEPTOR_MUTEX_REPAIR(ctx, m) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MUTEX_INVALID |
| #define COMMON_INTERCEPTOR_MUTEX_INVALID(ctx, m) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_HANDLE_RECVMSG |
| #define COMMON_INTERCEPTOR_HANDLE_RECVMSG(ctx, msg) ((void)(msg)) |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_FILE_OPEN |
| #define COMMON_INTERCEPTOR_FILE_OPEN(ctx, file, path) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_FILE_CLOSE |
| #define COMMON_INTERCEPTOR_FILE_CLOSE(ctx, file) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_LIBRARY_LOADED |
| #define COMMON_INTERCEPTOR_LIBRARY_LOADED(filename, handle) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_LIBRARY_UNLOADED |
| #define COMMON_INTERCEPTOR_LIBRARY_UNLOADED() {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_ENTER_NOIGNORE |
| #define COMMON_INTERCEPTOR_ENTER_NOIGNORE(ctx, ...) \ |
| COMMON_INTERCEPTOR_ENTER(ctx, __VA_ARGS__) |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED |
| #define COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED (0) |
| #endif |
| |
| #define COMMON_INTERCEPTOR_READ_STRING(ctx, s, n) \ |
| COMMON_INTERCEPTOR_READ_RANGE((ctx), (s), \ |
| common_flags()->strict_string_checks ? (REAL(strlen)(s)) + 1 : (n) ) |
| |
| #ifndef COMMON_INTERCEPTOR_ON_DLOPEN |
| #define COMMON_INTERCEPTOR_ON_DLOPEN(filename, flag) \ |
| CheckNoDeepBind(filename, flag); |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_GET_TLS_RANGE |
| #define COMMON_INTERCEPTOR_GET_TLS_RANGE(begin, end) *begin = *end = 0; |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_ACQUIRE |
| #define COMMON_INTERCEPTOR_ACQUIRE(ctx, u) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_RELEASE |
| #define COMMON_INTERCEPTOR_RELEASE(ctx, u) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_USER_CALLBACK_START |
| #define COMMON_INTERCEPTOR_USER_CALLBACK_START() {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_USER_CALLBACK_END |
| #define COMMON_INTERCEPTOR_USER_CALLBACK_END() {} |
| #endif |
| |
| #ifdef SANITIZER_NLDBL_VERSION |
| #define COMMON_INTERCEPT_FUNCTION_LDBL(fn) \ |
| COMMON_INTERCEPT_FUNCTION_VER(fn, SANITIZER_NLDBL_VERSION) |
| #else |
| #define COMMON_INTERCEPT_FUNCTION_LDBL(fn) \ |
| COMMON_INTERCEPT_FUNCTION(fn) |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MEMSET_IMPL |
| #define COMMON_INTERCEPTOR_MEMSET_IMPL(ctx, dst, v, size) \ |
| { \ |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) \ |
| return internal_memset(dst, v, size); \ |
| COMMON_INTERCEPTOR_ENTER(ctx, memset, dst, v, size); \ |
| if (common_flags()->intercept_intrin) \ |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, dst, size); \ |
| return REAL(memset)(dst, v, size); \ |
| } |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MEMMOVE_IMPL |
| #define COMMON_INTERCEPTOR_MEMMOVE_IMPL(ctx, dst, src, size) \ |
| { \ |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) \ |
| return internal_memmove(dst, src, size); \ |
| COMMON_INTERCEPTOR_ENTER(ctx, memmove, dst, src, size); \ |
| if (common_flags()->intercept_intrin) { \ |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, dst, size); \ |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, src, size); \ |
| } \ |
| return REAL(memmove)(dst, src, size); \ |
| } |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MEMCPY_IMPL |
| #define COMMON_INTERCEPTOR_MEMCPY_IMPL(ctx, dst, src, size) \ |
| { \ |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) { \ |
| return internal_memmove(dst, src, size); \ |
| } \ |
| COMMON_INTERCEPTOR_ENTER(ctx, memcpy, dst, src, size); \ |
| if (common_flags()->intercept_intrin) { \ |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, dst, size); \ |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, src, size); \ |
| } \ |
| return REAL(memcpy)(dst, src, size); \ |
| } |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_MMAP_IMPL |
| #define COMMON_INTERCEPTOR_MMAP_IMPL(ctx, mmap, addr, sz, prot, flags, fd, \ |
| off) \ |
| { return REAL(mmap)(addr, sz, prot, flags, fd, off); } |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_COPY_STRING |
| #define COMMON_INTERCEPTOR_COPY_STRING(ctx, to, from, size) {} |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_STRNDUP_IMPL |
| #define COMMON_INTERCEPTOR_STRNDUP_IMPL(ctx, s, size) \ |
| COMMON_INTERCEPTOR_ENTER(ctx, strndup, s, size); \ |
| uptr copy_length = internal_strnlen(s, size); \ |
| char *new_mem = (char *)WRAP(malloc)(copy_length + 1); \ |
| if (common_flags()->intercept_strndup) { \ |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s, Min(size, copy_length + 1)); \ |
| } \ |
| COMMON_INTERCEPTOR_COPY_STRING(ctx, new_mem, s, copy_length); \ |
| internal_memcpy(new_mem, s, copy_length); \ |
| new_mem[copy_length] = '\0'; \ |
| return new_mem; |
| #endif |
| |
| #ifndef COMMON_INTERCEPTOR_STRERROR |
| #define COMMON_INTERCEPTOR_STRERROR() {} |
| #endif |
| |
| struct FileMetadata { |
| // For open_memstream(). |
| char **addr; |
| SIZE_T *size; |
| }; |
| |
| struct CommonInterceptorMetadata { |
| enum { |
| CIMT_INVALID = 0, |
| CIMT_FILE |
| } type; |
| union { |
| FileMetadata file; |
| }; |
| }; |
| |
| #if SI_POSIX |
| typedef AddrHashMap<CommonInterceptorMetadata, 31051> MetadataHashMap; |
| |
| static MetadataHashMap *interceptor_metadata_map; |
| |
| UNUSED static void SetInterceptorMetadata(__sanitizer_FILE *addr, |
| const FileMetadata &file) { |
| MetadataHashMap::Handle h(interceptor_metadata_map, (uptr)addr); |
| CHECK(h.created()); |
| h->type = CommonInterceptorMetadata::CIMT_FILE; |
| h->file = file; |
| } |
| |
| UNUSED static const FileMetadata *GetInterceptorMetadata( |
| __sanitizer_FILE *addr) { |
| MetadataHashMap::Handle h(interceptor_metadata_map, (uptr)addr, |
| /* remove */ false, |
| /* create */ false); |
| if (addr && h.exists()) { |
| CHECK(!h.created()); |
| CHECK(h->type == CommonInterceptorMetadata::CIMT_FILE); |
| return &h->file; |
| } else { |
| return 0; |
| } |
| } |
| |
| UNUSED static void DeleteInterceptorMetadata(void *addr) { |
| MetadataHashMap::Handle h(interceptor_metadata_map, (uptr)addr, true); |
| CHECK(h.exists()); |
| } |
| #endif // SI_POSIX |
| |
| #if SANITIZER_INTERCEPT_STRLEN |
| INTERCEPTOR(SIZE_T, strlen, const char *s) { |
| // Sometimes strlen is called prior to InitializeCommonInterceptors, |
| // in which case the REAL(strlen) typically used in |
| // COMMON_INTERCEPTOR_ENTER will fail. We use internal_strlen here |
| // to handle that. |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_strlen(s); |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strlen, s); |
| SIZE_T result = REAL(strlen)(s); |
| if (common_flags()->intercept_strlen) |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s, result + 1); |
| return result; |
| } |
| #define INIT_STRLEN COMMON_INTERCEPT_FUNCTION(strlen) |
| #else |
| #define INIT_STRLEN |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRNLEN |
| INTERCEPTOR(SIZE_T, strnlen, const char *s, SIZE_T maxlen) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strnlen, s, maxlen); |
| SIZE_T length = REAL(strnlen)(s, maxlen); |
| if (common_flags()->intercept_strlen) |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s, Min(length + 1, maxlen)); |
| return length; |
| } |
| #define INIT_STRNLEN COMMON_INTERCEPT_FUNCTION(strnlen) |
| #else |
| #define INIT_STRNLEN |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRNDUP |
| INTERCEPTOR(char*, strndup, const char *s, uptr size) { |
| void *ctx; |
| COMMON_INTERCEPTOR_STRNDUP_IMPL(ctx, s, size); |
| } |
| #define INIT_STRNDUP COMMON_INTERCEPT_FUNCTION(strndup) |
| #else |
| #define INIT_STRNDUP |
| #endif // SANITIZER_INTERCEPT_STRNDUP |
| |
| #if SANITIZER_INTERCEPT___STRNDUP |
| INTERCEPTOR(char*, __strndup, const char *s, uptr size) { |
| void *ctx; |
| COMMON_INTERCEPTOR_STRNDUP_IMPL(ctx, s, size); |
| } |
| #define INIT___STRNDUP COMMON_INTERCEPT_FUNCTION(__strndup) |
| #else |
| #define INIT___STRNDUP |
| #endif // SANITIZER_INTERCEPT___STRNDUP |
| |
| #if SANITIZER_INTERCEPT_TEXTDOMAIN |
| INTERCEPTOR(char*, textdomain, const char *domainname) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, textdomain, domainname); |
| if (domainname) COMMON_INTERCEPTOR_READ_STRING(ctx, domainname, 0); |
| char *domain = REAL(textdomain)(domainname); |
| if (domain) { |
| COMMON_INTERCEPTOR_INITIALIZE_RANGE(domain, REAL(strlen)(domain) + 1); |
| } |
| return domain; |
| } |
| #define INIT_TEXTDOMAIN COMMON_INTERCEPT_FUNCTION(textdomain) |
| #else |
| #define INIT_TEXTDOMAIN |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRCMP |
| static inline int CharCmpX(unsigned char c1, unsigned char c2) { |
| return (c1 == c2) ? 0 : (c1 < c2) ? -1 : 1; |
| } |
| |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strcmp, uptr called_pc, |
| const char *s1, const char *s2, int result) |
| |
| INTERCEPTOR(int, strcmp, const char *s1, const char *s2) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strcmp, s1, s2); |
| unsigned char c1, c2; |
| uptr i; |
| for (i = 0;; i++) { |
| c1 = (unsigned char)s1[i]; |
| c2 = (unsigned char)s2[i]; |
| if (c1 != c2 || c1 == '\0') break; |
| } |
| if (common_flags()->intercept_strcmp) { |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s1, i + 1); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s2, i + 1); |
| } |
| int result = CharCmpX(c1, c2); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strcmp, GET_CALLER_PC(), s1, |
| s2, result); |
| return result; |
| } |
| |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strncmp, uptr called_pc, |
| const char *s1, const char *s2, uptr n, |
| int result) |
| |
| INTERCEPTOR(int, strncmp, const char *s1, const char *s2, uptr size) { |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_strncmp(s1, s2, size); |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strncmp, s1, s2, size); |
| unsigned char c1 = 0, c2 = 0; |
| uptr i; |
| for (i = 0; i < size; i++) { |
| c1 = (unsigned char)s1[i]; |
| c2 = (unsigned char)s2[i]; |
| if (c1 != c2 || c1 == '\0') break; |
| } |
| uptr i1 = i; |
| uptr i2 = i; |
| if (common_flags()->strict_string_checks) { |
| for (; i1 < size && s1[i1]; i1++) {} |
| for (; i2 < size && s2[i2]; i2++) {} |
| } |
| COMMON_INTERCEPTOR_READ_RANGE((ctx), (s1), Min(i1 + 1, size)); |
| COMMON_INTERCEPTOR_READ_RANGE((ctx), (s2), Min(i2 + 1, size)); |
| int result = CharCmpX(c1, c2); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strncmp, GET_CALLER_PC(), s1, |
| s2, size, result); |
| return result; |
| } |
| |
| #define INIT_STRCMP COMMON_INTERCEPT_FUNCTION(strcmp) |
| #define INIT_STRNCMP COMMON_INTERCEPT_FUNCTION(strncmp) |
| #else |
| #define INIT_STRCMP |
| #define INIT_STRNCMP |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRCASECMP |
| static inline int CharCaseCmp(unsigned char c1, unsigned char c2) { |
| int c1_low = ToLower(c1); |
| int c2_low = ToLower(c2); |
| return c1_low - c2_low; |
| } |
| |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strcasecmp, uptr called_pc, |
| const char *s1, const char *s2, int result) |
| |
| INTERCEPTOR(int, strcasecmp, const char *s1, const char *s2) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strcasecmp, s1, s2); |
| unsigned char c1 = 0, c2 = 0; |
| uptr i; |
| for (i = 0;; i++) { |
| c1 = (unsigned char)s1[i]; |
| c2 = (unsigned char)s2[i]; |
| if (CharCaseCmp(c1, c2) != 0 || c1 == '\0') break; |
| } |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s1, i + 1); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s2, i + 1); |
| int result = CharCaseCmp(c1, c2); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strcasecmp, GET_CALLER_PC(), |
| s1, s2, result); |
| return result; |
| } |
| |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strncasecmp, uptr called_pc, |
| const char *s1, const char *s2, uptr size, |
| int result) |
| |
| INTERCEPTOR(int, strncasecmp, const char *s1, const char *s2, SIZE_T size) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strncasecmp, s1, s2, size); |
| unsigned char c1 = 0, c2 = 0; |
| uptr i; |
| for (i = 0; i < size; i++) { |
| c1 = (unsigned char)s1[i]; |
| c2 = (unsigned char)s2[i]; |
| if (CharCaseCmp(c1, c2) != 0 || c1 == '\0') break; |
| } |
| uptr i1 = i; |
| uptr i2 = i; |
| if (common_flags()->strict_string_checks) { |
| for (; i1 < size && s1[i1]; i1++) {} |
| for (; i2 < size && s2[i2]; i2++) {} |
| } |
| COMMON_INTERCEPTOR_READ_RANGE((ctx), (s1), Min(i1 + 1, size)); |
| COMMON_INTERCEPTOR_READ_RANGE((ctx), (s2), Min(i2 + 1, size)); |
| int result = CharCaseCmp(c1, c2); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strncasecmp, GET_CALLER_PC(), |
| s1, s2, size, result); |
| return result; |
| } |
| |
| #define INIT_STRCASECMP COMMON_INTERCEPT_FUNCTION(strcasecmp) |
| #define INIT_STRNCASECMP COMMON_INTERCEPT_FUNCTION(strncasecmp) |
| #else |
| #define INIT_STRCASECMP |
| #define INIT_STRNCASECMP |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRSTR || SANITIZER_INTERCEPT_STRCASESTR |
| static inline void StrstrCheck(void *ctx, char *r, const char *s1, |
| const char *s2) { |
| uptr len1 = REAL(strlen)(s1); |
| uptr len2 = REAL(strlen)(s2); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s1, r ? r - s1 + len2 : len1 + 1); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s2, len2 + 1); |
| } |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRSTR |
| |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strstr, uptr called_pc, |
| const char *s1, const char *s2, char *result) |
| |
| INTERCEPTOR(char*, strstr, const char *s1, const char *s2) { |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_strstr(s1, s2); |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strstr, s1, s2); |
| char *r = REAL(strstr)(s1, s2); |
| if (common_flags()->intercept_strstr) |
| StrstrCheck(ctx, r, s1, s2); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strstr, GET_CALLER_PC(), s1, |
| s2, r); |
| return r; |
| } |
| |
| #define INIT_STRSTR COMMON_INTERCEPT_FUNCTION(strstr); |
| #else |
| #define INIT_STRSTR |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRCASESTR |
| |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strcasestr, uptr called_pc, |
| const char *s1, const char *s2, char *result) |
| |
| INTERCEPTOR(char*, strcasestr, const char *s1, const char *s2) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strcasestr, s1, s2); |
| char *r = REAL(strcasestr)(s1, s2); |
| if (common_flags()->intercept_strstr) |
| StrstrCheck(ctx, r, s1, s2); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_strcasestr, GET_CALLER_PC(), |
| s1, s2, r); |
| return r; |
| } |
| |
| #define INIT_STRCASESTR COMMON_INTERCEPT_FUNCTION(strcasestr); |
| #else |
| #define INIT_STRCASESTR |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRTOK |
| |
| INTERCEPTOR(char*, strtok, char *str, const char *delimiters) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strtok, str, delimiters); |
| if (!common_flags()->intercept_strtok) { |
| return REAL(strtok)(str, delimiters); |
| } |
| if (common_flags()->strict_string_checks) { |
| // If strict_string_checks is enabled, we check the whole first argument |
| // string on the first call (strtok saves this string in a static buffer |
| // for subsequent calls). We do not need to check strtok's result. |
| // As the delimiters can change, we check them every call. |
| if (str != nullptr) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, str, REAL(strlen)(str) + 1); |
| } |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, delimiters, |
| REAL(strlen)(delimiters) + 1); |
| return REAL(strtok)(str, delimiters); |
| } else { |
| // However, when strict_string_checks is disabled we cannot check the |
| // whole string on the first call. Instead, we check the result string |
| // which is guaranteed to be a NULL-terminated substring of the first |
| // argument. We also conservatively check one character of str and the |
| // delimiters. |
| if (str != nullptr) { |
| COMMON_INTERCEPTOR_READ_STRING(ctx, str, 1); |
| } |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, delimiters, 1); |
| char *result = REAL(strtok)(str, delimiters); |
| if (result != nullptr) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, result, REAL(strlen)(result) + 1); |
| } else if (str != nullptr) { |
| // No delimiter were found, it's safe to assume that the entire str was |
| // scanned. |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, str, REAL(strlen)(str) + 1); |
| } |
| return result; |
| } |
| } |
| |
| #define INIT_STRTOK COMMON_INTERCEPT_FUNCTION(strtok) |
| #else |
| #define INIT_STRTOK |
| #endif |
| |
| #if SANITIZER_INTERCEPT_MEMMEM |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_memmem, uptr called_pc, |
| const void *s1, SIZE_T len1, const void *s2, |
| SIZE_T len2, void *result) |
| |
| INTERCEPTOR(void*, memmem, const void *s1, SIZE_T len1, const void *s2, |
| SIZE_T len2) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, memmem, s1, len1, s2, len2); |
| void *r = REAL(memmem)(s1, len1, s2, len2); |
| if (common_flags()->intercept_memmem) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s1, len1); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s2, len2); |
| } |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_memmem, GET_CALLER_PC(), |
| s1, len1, s2, len2, r); |
| return r; |
| } |
| |
| #define INIT_MEMMEM COMMON_INTERCEPT_FUNCTION(memmem); |
| #else |
| #define INIT_MEMMEM |
| #endif // SANITIZER_INTERCEPT_MEMMEM |
| |
| #if SANITIZER_INTERCEPT_STRCHR |
| INTERCEPTOR(char*, strchr, const char *s, int c) { |
| void *ctx; |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_strchr(s, c); |
| COMMON_INTERCEPTOR_ENTER(ctx, strchr, s, c); |
| char *result = REAL(strchr)(s, c); |
| if (common_flags()->intercept_strchr) { |
| // Keep strlen as macro argument, as macro may ignore it. |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s, |
| (result ? result - s : REAL(strlen)(s)) + 1); |
| } |
| return result; |
| } |
| #define INIT_STRCHR COMMON_INTERCEPT_FUNCTION(strchr) |
| #else |
| #define INIT_STRCHR |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRCHRNUL |
| INTERCEPTOR(char*, strchrnul, const char *s, int c) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strchrnul, s, c); |
| char *result = REAL(strchrnul)(s, c); |
| uptr len = result - s + 1; |
| if (common_flags()->intercept_strchr) |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s, len); |
| return result; |
| } |
| #define INIT_STRCHRNUL COMMON_INTERCEPT_FUNCTION(strchrnul) |
| #else |
| #define INIT_STRCHRNUL |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRRCHR |
| INTERCEPTOR(char*, strrchr, const char *s, int c) { |
| void *ctx; |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_strrchr(s, c); |
| COMMON_INTERCEPTOR_ENTER(ctx, strrchr, s, c); |
| if (common_flags()->intercept_strchr) |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s, REAL(strlen)(s) + 1); |
| return REAL(strrchr)(s, c); |
| } |
| #define INIT_STRRCHR COMMON_INTERCEPT_FUNCTION(strrchr) |
| #else |
| #define INIT_STRRCHR |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRSPN |
| INTERCEPTOR(SIZE_T, strspn, const char *s1, const char *s2) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strspn, s1, s2); |
| SIZE_T r = REAL(strspn)(s1, s2); |
| if (common_flags()->intercept_strspn) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s2, REAL(strlen)(s2) + 1); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s1, r + 1); |
| } |
| return r; |
| } |
| |
| INTERCEPTOR(SIZE_T, strcspn, const char *s1, const char *s2) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strcspn, s1, s2); |
| SIZE_T r = REAL(strcspn)(s1, s2); |
| if (common_flags()->intercept_strspn) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s2, REAL(strlen)(s2) + 1); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s1, r + 1); |
| } |
| return r; |
| } |
| |
| #define INIT_STRSPN \ |
| COMMON_INTERCEPT_FUNCTION(strspn); \ |
| COMMON_INTERCEPT_FUNCTION(strcspn); |
| #else |
| #define INIT_STRSPN |
| #endif |
| |
| #if SANITIZER_INTERCEPT_STRPBRK |
| INTERCEPTOR(char *, strpbrk, const char *s1, const char *s2) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strpbrk, s1, s2); |
| char *r = REAL(strpbrk)(s1, s2); |
| if (common_flags()->intercept_strpbrk) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s2, REAL(strlen)(s2) + 1); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s1, |
| r ? r - s1 + 1 : REAL(strlen)(s1) + 1); |
| } |
| return r; |
| } |
| |
| #define INIT_STRPBRK COMMON_INTERCEPT_FUNCTION(strpbrk); |
| #else |
| #define INIT_STRPBRK |
| #endif |
| |
| #if SANITIZER_INTERCEPT_MEMSET |
| INTERCEPTOR(void *, memset, void *dst, int v, uptr size) { |
| void *ctx; |
| COMMON_INTERCEPTOR_MEMSET_IMPL(ctx, dst, v, size); |
| } |
| |
| #define INIT_MEMSET COMMON_INTERCEPT_FUNCTION(memset) |
| #else |
| #define INIT_MEMSET |
| #endif |
| |
| #if SANITIZER_INTERCEPT_MEMMOVE |
| INTERCEPTOR(void *, memmove, void *dst, const void *src, uptr size) { |
| void *ctx; |
| COMMON_INTERCEPTOR_MEMMOVE_IMPL(ctx, dst, src, size); |
| } |
| |
| #define INIT_MEMMOVE COMMON_INTERCEPT_FUNCTION(memmove) |
| #else |
| #define INIT_MEMMOVE |
| #endif |
| |
| #if SANITIZER_INTERCEPT_MEMCPY |
| INTERCEPTOR(void *, memcpy, void *dst, const void *src, uptr size) { |
| // On OS X, calling internal_memcpy here will cause memory corruptions, |
| // because memcpy and memmove are actually aliases of the same |
| // implementation. We need to use internal_memmove here. |
| // N.B.: If we switch this to internal_ we'll have to use internal_memmove |
| // due to memcpy being an alias of memmove on OS X. |
| void *ctx; |
| if (PLATFORM_HAS_DIFFERENT_MEMCPY_AND_MEMMOVE) { |
| COMMON_INTERCEPTOR_MEMCPY_IMPL(ctx, dst, src, size); |
| } else { |
| COMMON_INTERCEPTOR_MEMMOVE_IMPL(ctx, dst, src, size); |
| } |
| } |
| |
| #define INIT_MEMCPY \ |
| do { \ |
| if (PLATFORM_HAS_DIFFERENT_MEMCPY_AND_MEMMOVE) { \ |
| COMMON_INTERCEPT_FUNCTION(memcpy); \ |
| } else { \ |
| ASSIGN_REAL(memcpy, memmove); \ |
| } \ |
| CHECK(REAL(memcpy)); \ |
| } while (false) |
| |
| #else |
| #define INIT_MEMCPY |
| #endif |
| |
| #if SANITIZER_INTERCEPT_MEMCMP |
| DECLARE_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_memcmp, uptr called_pc, |
| const void *s1, const void *s2, uptr n, |
| int result) |
| |
| // Common code for `memcmp` and `bcmp`. |
| int MemcmpInterceptorCommon(void *ctx, |
| int (*real_fn)(const void *, const void *, uptr), |
| const void *a1, const void *a2, uptr size) { |
| if (common_flags()->intercept_memcmp) { |
| if (common_flags()->strict_memcmp) { |
| // Check the entire regions even if the first bytes of the buffers are |
| // different. |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, a1, size); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, a2, size); |
| // Fallthrough to REAL(memcmp) below. |
| } else { |
| unsigned char c1 = 0, c2 = 0; |
| const unsigned char *s1 = (const unsigned char*)a1; |
| const unsigned char *s2 = (const unsigned char*)a2; |
| uptr i; |
| for (i = 0; i < size; i++) { |
| c1 = s1[i]; |
| c2 = s2[i]; |
| if (c1 != c2) break; |
| } |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s1, Min(i + 1, size)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s2, Min(i + 1, size)); |
| int r = CharCmpX(c1, c2); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_memcmp, GET_CALLER_PC(), |
| a1, a2, size, r); |
| return r; |
| } |
| } |
| int result = real_fn(a1, a2, size); |
| CALL_WEAK_INTERCEPTOR_HOOK(__sanitizer_weak_hook_memcmp, GET_CALLER_PC(), a1, |
| a2, size, result); |
| return result; |
| } |
| |
| INTERCEPTOR(int, memcmp, const void *a1, const void *a2, uptr size) { |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_memcmp(a1, a2, size); |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, memcmp, a1, a2, size); |
| return MemcmpInterceptorCommon(ctx, REAL(memcmp), a1, a2, size); |
| } |
| |
| #define INIT_MEMCMP COMMON_INTERCEPT_FUNCTION(memcmp) |
| #else |
| #define INIT_MEMCMP |
| #endif |
| |
| #if SANITIZER_INTERCEPT_BCMP |
| INTERCEPTOR(int, bcmp, const void *a1, const void *a2, uptr size) { |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_memcmp(a1, a2, size); |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, bcmp, a1, a2, size); |
| return MemcmpInterceptorCommon(ctx, REAL(bcmp), a1, a2, size); |
| } |
| |
| #define INIT_BCMP COMMON_INTERCEPT_FUNCTION(bcmp) |
| #else |
| #define INIT_BCMP |
| #endif |
| |
| #if SANITIZER_INTERCEPT_MEMCHR |
| INTERCEPTOR(void*, memchr, const void *s, int c, SIZE_T n) { |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_memchr(s, c, n); |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, memchr, s, c, n); |
| #if SANITIZER_WINDOWS |
| void *res; |
| if (REAL(memchr)) { |
| res = REAL(memchr)(s, c, n); |
| } else { |
| res = internal_memchr(s, c, n); |
| } |
| #else |
| void *res = REAL(memchr)(s, c, n); |
| #endif |
| uptr len = res ? (char *)res - (const char *)s + 1 : n; |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s, len); |
| return res; |
| } |
| |
| #define INIT_MEMCHR COMMON_INTERCEPT_FUNCTION(memchr) |
| #else |
| #define INIT_MEMCHR |
| #endif |
| |
| #if SANITIZER_INTERCEPT_MEMRCHR |
| INTERCEPTOR(void*, memrchr, const void *s, int c, SIZE_T n) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, memrchr, s, c, n); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s, n); |
| return REAL(memrchr)(s, c, n); |
| } |
| |
| #define INIT_MEMRCHR COMMON_INTERCEPT_FUNCTION(memrchr) |
| #else |
| #define INIT_MEMRCHR |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FREXP |
| INTERCEPTOR(double, frexp, double x, int *exp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, frexp, x, exp); |
| // Assuming frexp() always writes to |exp|. |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, exp, sizeof(*exp)); |
| double res = REAL(frexp)(x, exp); |
| return res; |
| } |
| |
| #define INIT_FREXP COMMON_INTERCEPT_FUNCTION(frexp); |
| #else |
| #define INIT_FREXP |
| #endif // SANITIZER_INTERCEPT_FREXP |
| |
| #if SANITIZER_INTERCEPT_FREXPF_FREXPL |
| INTERCEPTOR(float, frexpf, float x, int *exp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, frexpf, x, exp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| float res = REAL(frexpf)(x, exp); |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, exp, sizeof(*exp)); |
| return res; |
| } |
| |
| INTERCEPTOR(long double, frexpl, long double x, int *exp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, frexpl, x, exp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| long double res = REAL(frexpl)(x, exp); |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, exp, sizeof(*exp)); |
| return res; |
| } |
| |
| #define INIT_FREXPF_FREXPL \ |
| COMMON_INTERCEPT_FUNCTION(frexpf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(frexpl) |
| #else |
| #define INIT_FREXPF_FREXPL |
| #endif // SANITIZER_INTERCEPT_FREXPF_FREXPL |
| |
| #if SI_POSIX |
| static void write_iovec(void *ctx, struct __sanitizer_iovec *iovec, |
| SIZE_T iovlen, SIZE_T maxlen) { |
| for (SIZE_T i = 0; i < iovlen && maxlen; ++i) { |
| SSIZE_T sz = Min(iovec[i].iov_len, maxlen); |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, iovec[i].iov_base, sz); |
| maxlen -= sz; |
| } |
| } |
| |
| static void read_iovec(void *ctx, struct __sanitizer_iovec *iovec, |
| SIZE_T iovlen, SIZE_T maxlen) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, iovec, sizeof(*iovec) * iovlen); |
| for (SIZE_T i = 0; i < iovlen && maxlen; ++i) { |
| SSIZE_T sz = Min(iovec[i].iov_len, maxlen); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, iovec[i].iov_base, sz); |
| maxlen -= sz; |
| } |
| } |
| #endif |
| |
| #if SANITIZER_INTERCEPT_READ |
| INTERCEPTOR(SSIZE_T, read, int fd, void *ptr, SIZE_T count) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, read, fd, ptr, count); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| SSIZE_T res = REAL(read)(fd, ptr, count); |
| if (res > 0) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, res); |
| if (res >= 0 && fd >= 0) COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd); |
| return res; |
| } |
| #define INIT_READ COMMON_INTERCEPT_FUNCTION(read) |
| #else |
| #define INIT_READ |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FREAD |
| INTERCEPTOR(SIZE_T, fread, void *ptr, SIZE_T size, SIZE_T nmemb, void *file) { |
| // libc file streams can call user-supplied functions, see fopencookie. |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fread, ptr, size, nmemb, file); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| SIZE_T res = REAL(fread)(ptr, size, nmemb, file); |
| if (res > 0) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, res * size); |
| return res; |
| } |
| #define INIT_FREAD COMMON_INTERCEPT_FUNCTION(fread) |
| #else |
| #define INIT_FREAD |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PREAD |
| INTERCEPTOR(SSIZE_T, pread, int fd, void *ptr, SIZE_T count, OFF_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, pread, fd, ptr, count, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| SSIZE_T res = REAL(pread)(fd, ptr, count, offset); |
| if (res > 0) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, res); |
| if (res >= 0 && fd >= 0) COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd); |
| return res; |
| } |
| #define INIT_PREAD COMMON_INTERCEPT_FUNCTION(pread) |
| #else |
| #define INIT_PREAD |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PREAD64 |
| INTERCEPTOR(SSIZE_T, pread64, int fd, void *ptr, SIZE_T count, OFF64_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, pread64, fd, ptr, count, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| SSIZE_T res = REAL(pread64)(fd, ptr, count, offset); |
| if (res > 0) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, res); |
| if (res >= 0 && fd >= 0) COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd); |
| return res; |
| } |
| #define INIT_PREAD64 COMMON_INTERCEPT_FUNCTION(pread64) |
| #else |
| #define INIT_PREAD64 |
| #endif |
| |
| #if SANITIZER_INTERCEPT_READV |
| INTERCEPTOR_WITH_SUFFIX(SSIZE_T, readv, int fd, __sanitizer_iovec *iov, |
| int iovcnt) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, readv, fd, iov, iovcnt); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| SSIZE_T res = REAL(readv)(fd, iov, iovcnt); |
| if (res > 0) write_iovec(ctx, iov, iovcnt, res); |
| if (res >= 0 && fd >= 0) COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd); |
| return res; |
| } |
| #define INIT_READV COMMON_INTERCEPT_FUNCTION(readv) |
| #else |
| #define INIT_READV |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PREADV |
| INTERCEPTOR(SSIZE_T, preadv, int fd, __sanitizer_iovec *iov, int iovcnt, |
| OFF_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, preadv, fd, iov, iovcnt, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| SSIZE_T res = REAL(preadv)(fd, iov, iovcnt, offset); |
| if (res > 0) write_iovec(ctx, iov, iovcnt, res); |
| if (res >= 0 && fd >= 0) COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd); |
| return res; |
| } |
| #define INIT_PREADV COMMON_INTERCEPT_FUNCTION(preadv) |
| #else |
| #define INIT_PREADV |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PREADV64 |
| INTERCEPTOR(SSIZE_T, preadv64, int fd, __sanitizer_iovec *iov, int iovcnt, |
| OFF64_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, preadv64, fd, iov, iovcnt, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| SSIZE_T res = REAL(preadv64)(fd, iov, iovcnt, offset); |
| if (res > 0) write_iovec(ctx, iov, iovcnt, res); |
| if (res >= 0 && fd >= 0) COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd); |
| return res; |
| } |
| #define INIT_PREADV64 COMMON_INTERCEPT_FUNCTION(preadv64) |
| #else |
| #define INIT_PREADV64 |
| #endif |
| |
| #if SANITIZER_INTERCEPT_WRITE |
| INTERCEPTOR(SSIZE_T, write, int fd, void *ptr, SIZE_T count) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, write, fd, ptr, count); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| if (fd >= 0) COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd); |
| SSIZE_T res = REAL(write)(fd, ptr, count); |
| // FIXME: this check should be _before_ the call to REAL(write), not after |
| if (res > 0) COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, res); |
| return res; |
| } |
| #define INIT_WRITE COMMON_INTERCEPT_FUNCTION(write) |
| #else |
| #define INIT_WRITE |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FWRITE |
| INTERCEPTOR(SIZE_T, fwrite, const void *p, uptr size, uptr nmemb, void *file) { |
| // libc file streams can call user-supplied functions, see fopencookie. |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fwrite, p, size, nmemb, file); |
| SIZE_T res = REAL(fwrite)(p, size, nmemb, file); |
| if (res > 0) COMMON_INTERCEPTOR_READ_RANGE(ctx, p, res * size); |
| return res; |
| } |
| #define INIT_FWRITE COMMON_INTERCEPT_FUNCTION(fwrite) |
| #else |
| #define INIT_FWRITE |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PWRITE |
| INTERCEPTOR(SSIZE_T, pwrite, int fd, void *ptr, SIZE_T count, OFF_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, pwrite, fd, ptr, count, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| if (fd >= 0) COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd); |
| SSIZE_T res = REAL(pwrite)(fd, ptr, count, offset); |
| if (res > 0) COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, res); |
| return res; |
| } |
| #define INIT_PWRITE COMMON_INTERCEPT_FUNCTION(pwrite) |
| #else |
| #define INIT_PWRITE |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PWRITE64 |
| INTERCEPTOR(SSIZE_T, pwrite64, int fd, void *ptr, OFF64_T count, |
| OFF64_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, pwrite64, fd, ptr, count, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| if (fd >= 0) COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd); |
| SSIZE_T res = REAL(pwrite64)(fd, ptr, count, offset); |
| if (res > 0) COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, res); |
| return res; |
| } |
| #define INIT_PWRITE64 COMMON_INTERCEPT_FUNCTION(pwrite64) |
| #else |
| #define INIT_PWRITE64 |
| #endif |
| |
| #if SANITIZER_INTERCEPT_WRITEV |
| INTERCEPTOR_WITH_SUFFIX(SSIZE_T, writev, int fd, __sanitizer_iovec *iov, |
| int iovcnt) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, writev, fd, iov, iovcnt); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| if (fd >= 0) COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd); |
| SSIZE_T res = REAL(writev)(fd, iov, iovcnt); |
| if (res > 0) read_iovec(ctx, iov, iovcnt, res); |
| return res; |
| } |
| #define INIT_WRITEV COMMON_INTERCEPT_FUNCTION(writev) |
| #else |
| #define INIT_WRITEV |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PWRITEV |
| INTERCEPTOR(SSIZE_T, pwritev, int fd, __sanitizer_iovec *iov, int iovcnt, |
| OFF_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, pwritev, fd, iov, iovcnt, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| if (fd >= 0) COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd); |
| SSIZE_T res = REAL(pwritev)(fd, iov, iovcnt, offset); |
| if (res > 0) read_iovec(ctx, iov, iovcnt, res); |
| return res; |
| } |
| #define INIT_PWRITEV COMMON_INTERCEPT_FUNCTION(pwritev) |
| #else |
| #define INIT_PWRITEV |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PWRITEV64 |
| INTERCEPTOR(SSIZE_T, pwritev64, int fd, __sanitizer_iovec *iov, int iovcnt, |
| OFF64_T offset) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, pwritev64, fd, iov, iovcnt, offset); |
| COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd); |
| if (fd >= 0) COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd); |
| SSIZE_T res = REAL(pwritev64)(fd, iov, iovcnt, offset); |
| if (res > 0) read_iovec(ctx, iov, iovcnt, res); |
| return res; |
| } |
| #define INIT_PWRITEV64 COMMON_INTERCEPT_FUNCTION(pwritev64) |
| #else |
| #define INIT_PWRITEV64 |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FGETS |
| INTERCEPTOR(char *, fgets, char *s, SIZE_T size, void *file) { |
| // libc file streams can call user-supplied functions, see fopencookie. |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fgets, s, size, file); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| char *res = REAL(fgets)(s, size, file); |
| if (res) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, s, REAL(strlen)(s) + 1); |
| return res; |
| } |
| #define INIT_FGETS COMMON_INTERCEPT_FUNCTION(fgets) |
| #else |
| #define INIT_FGETS |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FPUTS |
| INTERCEPTOR_WITH_SUFFIX(int, fputs, char *s, void *file) { |
| // libc file streams can call user-supplied functions, see fopencookie. |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fputs, s, file); |
| if (!SANITIZER_MAC || s) { // `fputs(NULL, file)` is supported on Darwin. |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s, REAL(strlen)(s) + 1); |
| } |
| return REAL(fputs)(s, file); |
| } |
| #define INIT_FPUTS COMMON_INTERCEPT_FUNCTION(fputs) |
| #else |
| #define INIT_FPUTS |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PUTS |
| INTERCEPTOR(int, puts, char *s) { |
| // libc file streams can call user-supplied functions, see fopencookie. |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, puts, s); |
| if (!SANITIZER_MAC || s) { // `puts(NULL)` is supported on Darwin. |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, s, REAL(strlen)(s) + 1); |
| } |
| return REAL(puts)(s); |
| } |
| #define INIT_PUTS COMMON_INTERCEPT_FUNCTION(puts) |
| #else |
| #define INIT_PUTS |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PRCTL |
| INTERCEPTOR(int, prctl, int option, unsigned long arg2, unsigned long arg3, |
| unsigned long arg4, unsigned long arg5) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, prctl, option, arg2, arg3, arg4, arg5); |
| static const int PR_SET_NAME = 15; |
| int res = REAL(prctl(option, arg2, arg3, arg4, arg5)); |
| if (option == PR_SET_NAME) { |
| char buff[16]; |
| internal_strncpy(buff, (char *)arg2, 15); |
| buff[15] = 0; |
| COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, buff); |
| } |
| return res; |
| } |
| #define INIT_PRCTL COMMON_INTERCEPT_FUNCTION(prctl) |
| #else |
| #define INIT_PRCTL |
| #endif // SANITIZER_INTERCEPT_PRCTL |
| |
| #if SANITIZER_INTERCEPT_TIME |
| INTERCEPTOR(unsigned long, time, unsigned long *t) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, time, t); |
| unsigned long local_t; |
| unsigned long res = REAL(time)(&local_t); |
| if (t && res != (unsigned long)-1) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, t, sizeof(*t)); |
| *t = local_t; |
| } |
| return res; |
| } |
| #define INIT_TIME COMMON_INTERCEPT_FUNCTION(time); |
| #else |
| #define INIT_TIME |
| #endif // SANITIZER_INTERCEPT_TIME |
| |
| #if SANITIZER_INTERCEPT_LOCALTIME_AND_FRIENDS |
| static void unpoison_tm(void *ctx, __sanitizer_tm *tm) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, tm, sizeof(*tm)); |
| #if !SANITIZER_SOLARIS |
| if (tm->tm_zone) { |
| // Can not use COMMON_INTERCEPTOR_WRITE_RANGE here, because tm->tm_zone |
| // can point to shared memory and tsan would report a data race. |
| COMMON_INTERCEPTOR_INITIALIZE_RANGE(tm->tm_zone, |
| REAL(strlen(tm->tm_zone)) + 1); |
| } |
| #endif |
| } |
| INTERCEPTOR(__sanitizer_tm *, localtime, unsigned long *timep) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, localtime, timep); |
| __sanitizer_tm *res = REAL(localtime)(timep); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep)); |
| unpoison_tm(ctx, res); |
| } |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_tm *, localtime_r, unsigned long *timep, void *result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, localtime_r, timep, result); |
| __sanitizer_tm *res = REAL(localtime_r)(timep, result); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep)); |
| unpoison_tm(ctx, res); |
| } |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_tm *, gmtime, unsigned long *timep) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, gmtime, timep); |
| __sanitizer_tm *res = REAL(gmtime)(timep); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep)); |
| unpoison_tm(ctx, res); |
| } |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_tm *, gmtime_r, unsigned long *timep, void *result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, gmtime_r, timep, result); |
| __sanitizer_tm *res = REAL(gmtime_r)(timep, result); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep)); |
| unpoison_tm(ctx, res); |
| } |
| return res; |
| } |
| INTERCEPTOR(char *, ctime, unsigned long *timep) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, ctime, timep); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| char *res = REAL(ctime)(timep); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep)); |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, res, REAL(strlen)(res) + 1); |
| } |
| return res; |
| } |
| INTERCEPTOR(char *, ctime_r, unsigned long *timep, char *result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, ctime_r, timep, result); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| char *res = REAL(ctime_r)(timep, result); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep)); |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, res, REAL(strlen)(res) + 1); |
| } |
| return res; |
| } |
| INTERCEPTOR(char *, asctime, __sanitizer_tm *tm) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, asctime, tm); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| char *res = REAL(asctime)(tm); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, tm, sizeof(*tm)); |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, res, REAL(strlen)(res) + 1); |
| } |
| return res; |
| } |
| INTERCEPTOR(char *, asctime_r, __sanitizer_tm *tm, char *result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, asctime_r, tm, result); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| char *res = REAL(asctime_r)(tm, result); |
| if (res) { |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, tm, sizeof(*tm)); |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, res, REAL(strlen)(res) + 1); |
| } |
| return res; |
| } |
| INTERCEPTOR(long, mktime, __sanitizer_tm *tm) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, mktime, tm); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_sec, sizeof(tm->tm_sec)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_min, sizeof(tm->tm_min)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_hour, sizeof(tm->tm_hour)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_mday, sizeof(tm->tm_mday)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_mon, sizeof(tm->tm_mon)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_year, sizeof(tm->tm_year)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_isdst, sizeof(tm->tm_isdst)); |
| long res = REAL(mktime)(tm); |
| if (res != -1) unpoison_tm(ctx, tm); |
| return res; |
| } |
| #define INIT_LOCALTIME_AND_FRIENDS \ |
| COMMON_INTERCEPT_FUNCTION(localtime); \ |
| COMMON_INTERCEPT_FUNCTION(localtime_r); \ |
| COMMON_INTERCEPT_FUNCTION(gmtime); \ |
| COMMON_INTERCEPT_FUNCTION(gmtime_r); \ |
| COMMON_INTERCEPT_FUNCTION(ctime); \ |
| COMMON_INTERCEPT_FUNCTION(ctime_r); \ |
| COMMON_INTERCEPT_FUNCTION(asctime); \ |
| COMMON_INTERCEPT_FUNCTION(asctime_r); \ |
| COMMON_INTERCEPT_FUNCTION(mktime); |
| #else |
| #define INIT_LOCALTIME_AND_FRIENDS |
| #endif // SANITIZER_INTERCEPT_LOCALTIME_AND_FRIENDS |
| |
| #if SANITIZER_INTERCEPT_STRPTIME |
| INTERCEPTOR(char *, strptime, char *s, char *format, __sanitizer_tm *tm) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, strptime, s, format, tm); |
| if (format) |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, format, REAL(strlen)(format) + 1); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| char *res = REAL(strptime)(s, format, tm); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, s, res ? res - s : 0); |
| if (res && tm) { |
| // Do not call unpoison_tm here, because strptime does not, in fact, |
| // initialize the entire struct tm. For example, tm_zone pointer is left |
| // uninitialized. |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, tm, sizeof(*tm)); |
| } |
| return res; |
| } |
| #define INIT_STRPTIME COMMON_INTERCEPT_FUNCTION(strptime); |
| #else |
| #define INIT_STRPTIME |
| #endif |
| |
| #if SANITIZER_INTERCEPT_SCANF || SANITIZER_INTERCEPT_PRINTF |
| #include "sanitizer_common_interceptors_format.inc" |
| |
| #define FORMAT_INTERCEPTOR_IMPL(name, vname, ...) \ |
| { \ |
| void *ctx; \ |
| va_list ap; \ |
| va_start(ap, format); \ |
| COMMON_INTERCEPTOR_ENTER(ctx, vname, __VA_ARGS__, ap); \ |
| int res = WRAP(vname)(__VA_ARGS__, ap); \ |
| va_end(ap); \ |
| return res; \ |
| } |
| |
| #endif |
| |
| #if SANITIZER_INTERCEPT_SCANF |
| |
| #define VSCANF_INTERCEPTOR_IMPL(vname, allowGnuMalloc, ...) \ |
| { \ |
| void *ctx; \ |
| COMMON_INTERCEPTOR_ENTER(ctx, vname, __VA_ARGS__); \ |
| va_list aq; \ |
| va_copy(aq, ap); \ |
| int res = REAL(vname)(__VA_ARGS__); \ |
| if (res > 0) \ |
| scanf_common(ctx, res, allowGnuMalloc, format, aq); \ |
| va_end(aq); \ |
| return res; \ |
| } |
| |
| INTERCEPTOR(int, vscanf, const char *format, va_list ap) |
| VSCANF_INTERCEPTOR_IMPL(vscanf, true, format, ap) |
| |
| INTERCEPTOR(int, vsscanf, const char *str, const char *format, va_list ap) |
| VSCANF_INTERCEPTOR_IMPL(vsscanf, true, str, format, ap) |
| |
| INTERCEPTOR(int, vfscanf, void *stream, const char *format, va_list ap) |
| VSCANF_INTERCEPTOR_IMPL(vfscanf, true, stream, format, ap) |
| |
| #if SANITIZER_INTERCEPT_ISOC99_SCANF |
| INTERCEPTOR(int, __isoc99_vscanf, const char *format, va_list ap) |
| VSCANF_INTERCEPTOR_IMPL(__isoc99_vscanf, false, format, ap) |
| |
| INTERCEPTOR(int, __isoc99_vsscanf, const char *str, const char *format, |
| va_list ap) |
| VSCANF_INTERCEPTOR_IMPL(__isoc99_vsscanf, false, str, format, ap) |
| |
| INTERCEPTOR(int, __isoc99_vfscanf, void *stream, const char *format, va_list ap) |
| VSCANF_INTERCEPTOR_IMPL(__isoc99_vfscanf, false, stream, format, ap) |
| #endif // SANITIZER_INTERCEPT_ISOC99_SCANF |
| |
| INTERCEPTOR(int, scanf, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(scanf, vscanf, format) |
| |
| INTERCEPTOR(int, fscanf, void *stream, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(fscanf, vfscanf, stream, format) |
| |
| INTERCEPTOR(int, sscanf, const char *str, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(sscanf, vsscanf, str, format) |
| |
| #if SANITIZER_INTERCEPT_ISOC99_SCANF |
| INTERCEPTOR(int, __isoc99_scanf, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__isoc99_scanf, __isoc99_vscanf, format) |
| |
| INTERCEPTOR(int, __isoc99_fscanf, void *stream, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__isoc99_fscanf, __isoc99_vfscanf, stream, format) |
| |
| INTERCEPTOR(int, __isoc99_sscanf, const char *str, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__isoc99_sscanf, __isoc99_vsscanf, str, format) |
| #endif |
| |
| #endif |
| |
| #if SANITIZER_INTERCEPT_SCANF |
| #define INIT_SCANF \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(scanf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(sscanf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(fscanf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vscanf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vsscanf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vfscanf); |
| #else |
| #define INIT_SCANF |
| #endif |
| |
| #if SANITIZER_INTERCEPT_ISOC99_SCANF |
| #define INIT_ISOC99_SCANF \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_scanf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_sscanf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_fscanf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_vscanf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_vsscanf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_vfscanf); |
| #else |
| #define INIT_ISOC99_SCANF |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PRINTF |
| |
| #define VPRINTF_INTERCEPTOR_ENTER(vname, ...) \ |
| void *ctx; \ |
| COMMON_INTERCEPTOR_ENTER(ctx, vname, __VA_ARGS__); \ |
| va_list aq; \ |
| va_copy(aq, ap); |
| |
| #define VPRINTF_INTERCEPTOR_RETURN() \ |
| va_end(aq); |
| |
| #define VPRINTF_INTERCEPTOR_IMPL(vname, ...) \ |
| { \ |
| VPRINTF_INTERCEPTOR_ENTER(vname, __VA_ARGS__); \ |
| if (common_flags()->check_printf) \ |
| printf_common(ctx, format, aq); \ |
| int res = REAL(vname)(__VA_ARGS__); \ |
| VPRINTF_INTERCEPTOR_RETURN(); \ |
| return res; \ |
| } |
| |
| // FIXME: under ASan the REAL() call below may write to freed memory and |
| // corrupt its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| #define VSPRINTF_INTERCEPTOR_IMPL(vname, str, ...) \ |
| { \ |
| VPRINTF_INTERCEPTOR_ENTER(vname, str, __VA_ARGS__) \ |
| if (common_flags()->check_printf) { \ |
| printf_common(ctx, format, aq); \ |
| } \ |
| int res = REAL(vname)(str, __VA_ARGS__); \ |
| if (res >= 0) { \ |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, str, res + 1); \ |
| } \ |
| VPRINTF_INTERCEPTOR_RETURN(); \ |
| return res; \ |
| } |
| |
| // FIXME: under ASan the REAL() call below may write to freed memory and |
| // corrupt its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| #define VSNPRINTF_INTERCEPTOR_IMPL(vname, str, size, ...) \ |
| { \ |
| VPRINTF_INTERCEPTOR_ENTER(vname, str, size, __VA_ARGS__) \ |
| if (common_flags()->check_printf) { \ |
| printf_common(ctx, format, aq); \ |
| } \ |
| int res = REAL(vname)(str, size, __VA_ARGS__); \ |
| if (res >= 0) { \ |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, str, Min(size, (SIZE_T)(res + 1))); \ |
| } \ |
| VPRINTF_INTERCEPTOR_RETURN(); \ |
| return res; \ |
| } |
| |
| // FIXME: under ASan the REAL() call below may write to freed memory and |
| // corrupt its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| #define VASPRINTF_INTERCEPTOR_IMPL(vname, strp, ...) \ |
| { \ |
| VPRINTF_INTERCEPTOR_ENTER(vname, strp, __VA_ARGS__) \ |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, strp, sizeof(char *)); \ |
| if (common_flags()->check_printf) { \ |
| printf_common(ctx, format, aq); \ |
| } \ |
| int res = REAL(vname)(strp, __VA_ARGS__); \ |
| if (res >= 0) { \ |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, *strp, res + 1); \ |
| } \ |
| VPRINTF_INTERCEPTOR_RETURN(); \ |
| return res; \ |
| } |
| |
| INTERCEPTOR(int, vprintf, const char *format, va_list ap) |
| VPRINTF_INTERCEPTOR_IMPL(vprintf, format, ap) |
| |
| INTERCEPTOR(int, vfprintf, __sanitizer_FILE *stream, const char *format, |
| va_list ap) |
| VPRINTF_INTERCEPTOR_IMPL(vfprintf, stream, format, ap) |
| |
| INTERCEPTOR(int, vsnprintf, char *str, SIZE_T size, const char *format, |
| va_list ap) |
| VSNPRINTF_INTERCEPTOR_IMPL(vsnprintf, str, size, format, ap) |
| |
| #if SANITIZER_INTERCEPT___PRINTF_CHK |
| INTERCEPTOR(int, __vsnprintf_chk, char *str, SIZE_T size, int flag, |
| SIZE_T size_to, const char *format, va_list ap) |
| VSNPRINTF_INTERCEPTOR_IMPL(vsnprintf, str, size, format, ap) |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PRINTF_L |
| INTERCEPTOR(int, vsnprintf_l, char *str, SIZE_T size, void *loc, |
| const char *format, va_list ap) |
| VSNPRINTF_INTERCEPTOR_IMPL(vsnprintf_l, str, size, loc, format, ap) |
| |
| INTERCEPTOR(int, snprintf_l, char *str, SIZE_T size, void *loc, |
| const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(snprintf_l, vsnprintf_l, str, size, loc, format) |
| #endif // SANITIZER_INTERCEPT_PRINTF_L |
| |
| INTERCEPTOR(int, vsprintf, char *str, const char *format, va_list ap) |
| VSPRINTF_INTERCEPTOR_IMPL(vsprintf, str, format, ap) |
| |
| #if SANITIZER_INTERCEPT___PRINTF_CHK |
| INTERCEPTOR(int, __vsprintf_chk, char *str, int flag, SIZE_T size_to, |
| const char *format, va_list ap) |
| VSPRINTF_INTERCEPTOR_IMPL(vsprintf, str, format, ap) |
| #endif |
| |
| INTERCEPTOR(int, vasprintf, char **strp, const char *format, va_list ap) |
| VASPRINTF_INTERCEPTOR_IMPL(vasprintf, strp, format, ap) |
| |
| #if SANITIZER_INTERCEPT_ISOC99_PRINTF |
| INTERCEPTOR(int, __isoc99_vprintf, const char *format, va_list ap) |
| VPRINTF_INTERCEPTOR_IMPL(__isoc99_vprintf, format, ap) |
| |
| INTERCEPTOR(int, __isoc99_vfprintf, __sanitizer_FILE *stream, |
| const char *format, va_list ap) |
| VPRINTF_INTERCEPTOR_IMPL(__isoc99_vfprintf, stream, format, ap) |
| |
| INTERCEPTOR(int, __isoc99_vsnprintf, char *str, SIZE_T size, const char *format, |
| va_list ap) |
| VSNPRINTF_INTERCEPTOR_IMPL(__isoc99_vsnprintf, str, size, format, ap) |
| |
| INTERCEPTOR(int, __isoc99_vsprintf, char *str, const char *format, |
| va_list ap) |
| VSPRINTF_INTERCEPTOR_IMPL(__isoc99_vsprintf, str, format, |
| ap) |
| |
| #endif // SANITIZER_INTERCEPT_ISOC99_PRINTF |
| |
| INTERCEPTOR(int, printf, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(printf, vprintf, format) |
| |
| INTERCEPTOR(int, fprintf, __sanitizer_FILE *stream, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(fprintf, vfprintf, stream, format) |
| |
| #if SANITIZER_INTERCEPT___PRINTF_CHK |
| INTERCEPTOR(int, __fprintf_chk, __sanitizer_FILE *stream, SIZE_T size, |
| const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__fprintf_chk, vfprintf, stream, format) |
| #endif |
| |
| INTERCEPTOR(int, sprintf, char *str, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(sprintf, vsprintf, str, format) |
| |
| #if SANITIZER_INTERCEPT___PRINTF_CHK |
| INTERCEPTOR(int, __sprintf_chk, char *str, int flag, SIZE_T size_to, |
| const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__sprintf_chk, vsprintf, str, format) |
| #endif |
| |
| INTERCEPTOR(int, snprintf, char *str, SIZE_T size, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(snprintf, vsnprintf, str, size, format) |
| |
| #if SANITIZER_INTERCEPT___PRINTF_CHK |
| INTERCEPTOR(int, __snprintf_chk, char *str, SIZE_T size, int flag, |
| SIZE_T size_to, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__snprintf_chk, vsnprintf, str, size, format) |
| #endif |
| |
| INTERCEPTOR(int, asprintf, char **strp, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(asprintf, vasprintf, strp, format) |
| |
| #if SANITIZER_INTERCEPT_ISOC99_PRINTF |
| INTERCEPTOR(int, __isoc99_printf, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__isoc99_printf, __isoc99_vprintf, format) |
| |
| INTERCEPTOR(int, __isoc99_fprintf, __sanitizer_FILE *stream, const char *format, |
| ...) |
| FORMAT_INTERCEPTOR_IMPL(__isoc99_fprintf, __isoc99_vfprintf, stream, format) |
| |
| INTERCEPTOR(int, __isoc99_sprintf, char *str, const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__isoc99_sprintf, __isoc99_vsprintf, str, format) |
| |
| INTERCEPTOR(int, __isoc99_snprintf, char *str, SIZE_T size, |
| const char *format, ...) |
| FORMAT_INTERCEPTOR_IMPL(__isoc99_snprintf, __isoc99_vsnprintf, str, size, |
| format) |
| |
| #endif // SANITIZER_INTERCEPT_ISOC99_PRINTF |
| |
| #endif // SANITIZER_INTERCEPT_PRINTF |
| |
| #if SANITIZER_INTERCEPT_PRINTF |
| #define INIT_PRINTF \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(printf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(sprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(snprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(asprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(fprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vsprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vsnprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vasprintf); \ |
| COMMON_INTERCEPT_FUNCTION_LDBL(vfprintf); |
| #else |
| #define INIT_PRINTF |
| #endif |
| |
| #if SANITIZER_INTERCEPT___PRINTF_CHK |
| #define INIT___PRINTF_CHK \ |
| COMMON_INTERCEPT_FUNCTION(__sprintf_chk); \ |
| COMMON_INTERCEPT_FUNCTION(__snprintf_chk); \ |
| COMMON_INTERCEPT_FUNCTION(__vsprintf_chk); \ |
| COMMON_INTERCEPT_FUNCTION(__vsnprintf_chk); \ |
| COMMON_INTERCEPT_FUNCTION(__fprintf_chk); |
| #else |
| #define INIT___PRINTF_CHK |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PRINTF_L |
| #define INIT_PRINTF_L \ |
| COMMON_INTERCEPT_FUNCTION(snprintf_l); \ |
| COMMON_INTERCEPT_FUNCTION(vsnprintf_l); |
| #else |
| #define INIT_PRINTF_L |
| #endif |
| |
| #if SANITIZER_INTERCEPT_ISOC99_PRINTF |
| #define INIT_ISOC99_PRINTF \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_printf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_sprintf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_snprintf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_fprintf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_vprintf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_vsprintf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_vsnprintf); \ |
| COMMON_INTERCEPT_FUNCTION(__isoc99_vfprintf); |
| #else |
| #define INIT_ISOC99_PRINTF |
| #endif |
| |
| #if SANITIZER_INTERCEPT_IOCTL |
| #include "sanitizer_common_interceptors_ioctl.inc" |
| #include "sanitizer_interceptors_ioctl_netbsd.inc" |
| INTERCEPTOR(int, ioctl, int d, unsigned long request, ...) { |
| // We need a frame pointer, because we call into ioctl_common_[pre|post] which |
| // can trigger a report and we need to be able to unwind through this |
| // function. On Mac in debug mode we might not have a frame pointer, because |
| // ioctl_common_[pre|post] doesn't get inlined here. |
| ENABLE_FRAME_POINTER; |
| |
| void *ctx; |
| va_list ap; |
| va_start(ap, request); |
| void *arg = va_arg(ap, void *); |
| va_end(ap); |
| COMMON_INTERCEPTOR_ENTER(ctx, ioctl, d, request, arg); |
| |
| CHECK(ioctl_initialized); |
| |
| // Note: TSan does not use common flags, and they are zero-initialized. |
| // This effectively disables ioctl handling in TSan. |
| if (!common_flags()->handle_ioctl) return REAL(ioctl)(d, request, arg); |
| |
| // Although request is unsigned long, the rest of the interceptor uses it |
| // as just "unsigned" to save space, because we know that all values fit in |
| // "unsigned" - they are compile-time constants. |
| |
| const ioctl_desc *desc = ioctl_lookup(request); |
| ioctl_desc decoded_desc; |
| if (!desc) { |
| VPrintf(2, "Decoding unknown ioctl 0x%x\n", request); |
| if (!ioctl_decode(request, &decoded_desc)) |
| Printf("WARNING: failed decoding unknown ioctl 0x%x\n", request); |
| else |
| desc = &decoded_desc; |
| } |
| |
| if (desc) ioctl_common_pre(ctx, desc, d, request, arg); |
| int res = REAL(ioctl)(d, request, arg); |
| // FIXME: some ioctls have different return values for success and failure. |
| if (desc && res != -1) ioctl_common_post(ctx, desc, res, d, request, arg); |
| return res; |
| } |
| #define INIT_IOCTL \ |
| ioctl_init(); \ |
| COMMON_INTERCEPT_FUNCTION(ioctl); |
| #else |
| #define INIT_IOCTL |
| #endif |
| |
| #if SANITIZER_POSIX |
| UNUSED static void unpoison_passwd(void *ctx, __sanitizer_passwd *pwd) { |
| if (pwd) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwd, sizeof(*pwd)); |
| if (pwd->pw_name) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwd->pw_name, |
| REAL(strlen)(pwd->pw_name) + 1); |
| if (pwd->pw_passwd) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwd->pw_passwd, |
| REAL(strlen)(pwd->pw_passwd) + 1); |
| #if !SANITIZER_ANDROID |
| if (pwd->pw_gecos) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwd->pw_gecos, |
| REAL(strlen)(pwd->pw_gecos) + 1); |
| #endif |
| #if SANITIZER_MAC || SANITIZER_FREEBSD || SANITIZER_NETBSD |
| if (pwd->pw_class) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwd->pw_class, |
| REAL(strlen)(pwd->pw_class) + 1); |
| #endif |
| if (pwd->pw_dir) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwd->pw_dir, |
| REAL(strlen)(pwd->pw_dir) + 1); |
| if (pwd->pw_shell) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwd->pw_shell, |
| REAL(strlen)(pwd->pw_shell) + 1); |
| } |
| } |
| |
| UNUSED static void unpoison_group(void *ctx, __sanitizer_group *grp) { |
| if (grp) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, grp, sizeof(*grp)); |
| if (grp->gr_name) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, grp->gr_name, |
| REAL(strlen)(grp->gr_name) + 1); |
| if (grp->gr_passwd) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, grp->gr_passwd, |
| REAL(strlen)(grp->gr_passwd) + 1); |
| char **p = grp->gr_mem; |
| for (; *p; ++p) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, *p, REAL(strlen)(*p) + 1); |
| } |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, grp->gr_mem, |
| (p - grp->gr_mem + 1) * sizeof(*p)); |
| } |
| } |
| #endif // SANITIZER_POSIX |
| |
| #if SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS |
| INTERCEPTOR(__sanitizer_passwd *, getpwnam, const char *name) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getpwnam, name); |
| if (name) |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, name, REAL(strlen)(name) + 1); |
| __sanitizer_passwd *res = REAL(getpwnam)(name); |
| unpoison_passwd(ctx, res); |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_passwd *, getpwuid, u32 uid) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getpwuid, uid); |
| __sanitizer_passwd *res = REAL(getpwuid)(uid); |
| unpoison_passwd(ctx, res); |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_group *, getgrnam, const char *name) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getgrnam, name); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, name, REAL(strlen)(name) + 1); |
| __sanitizer_group *res = REAL(getgrnam)(name); |
| unpoison_group(ctx, res); |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_group *, getgrgid, u32 gid) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getgrgid, gid); |
| __sanitizer_group *res = REAL(getgrgid)(gid); |
| unpoison_group(ctx, res); |
| return res; |
| } |
| #define INIT_GETPWNAM_AND_FRIENDS \ |
| COMMON_INTERCEPT_FUNCTION(getpwnam); \ |
| COMMON_INTERCEPT_FUNCTION(getpwuid); \ |
| COMMON_INTERCEPT_FUNCTION(getgrnam); \ |
| COMMON_INTERCEPT_FUNCTION(getgrgid); |
| #else |
| #define INIT_GETPWNAM_AND_FRIENDS |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS |
| INTERCEPTOR(int, getpwnam_r, const char *name, __sanitizer_passwd *pwd, |
| char *buf, SIZE_T buflen, __sanitizer_passwd **result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getpwnam_r, name, pwd, buf, buflen, result); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, name, REAL(strlen)(name) + 1); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getpwnam_r)(name, pwd, buf, buflen, result); |
| if (!res && result) |
| unpoison_passwd(ctx, *result); |
| if (result) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, result, sizeof(*result)); |
| return res; |
| } |
| INTERCEPTOR(int, getpwuid_r, u32 uid, __sanitizer_passwd *pwd, char *buf, |
| SIZE_T buflen, __sanitizer_passwd **result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getpwuid_r, uid, pwd, buf, buflen, result); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getpwuid_r)(uid, pwd, buf, buflen, result); |
| if (!res && result) |
| unpoison_passwd(ctx, *result); |
| if (result) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, result, sizeof(*result)); |
| return res; |
| } |
| INTERCEPTOR(int, getgrnam_r, const char *name, __sanitizer_group *grp, |
| char *buf, SIZE_T buflen, __sanitizer_group **result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getgrnam_r, name, grp, buf, buflen, result); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, name, REAL(strlen)(name) + 1); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getgrnam_r)(name, grp, buf, buflen, result); |
| if (!res && result) |
| unpoison_group(ctx, *result); |
| if (result) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, result, sizeof(*result)); |
| return res; |
| } |
| INTERCEPTOR(int, getgrgid_r, u32 gid, __sanitizer_group *grp, char *buf, |
| SIZE_T buflen, __sanitizer_group **result) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getgrgid_r, gid, grp, buf, buflen, result); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getgrgid_r)(gid, grp, buf, buflen, result); |
| if (!res && result) |
| unpoison_group(ctx, *result); |
| if (result) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, result, sizeof(*result)); |
| return res; |
| } |
| #define INIT_GETPWNAM_R_AND_FRIENDS \ |
| COMMON_INTERCEPT_FUNCTION(getpwnam_r); \ |
| COMMON_INTERCEPT_FUNCTION(getpwuid_r); \ |
| COMMON_INTERCEPT_FUNCTION(getgrnam_r); \ |
| COMMON_INTERCEPT_FUNCTION(getgrgid_r); |
| #else |
| #define INIT_GETPWNAM_R_AND_FRIENDS |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETPWENT |
| INTERCEPTOR(__sanitizer_passwd *, getpwent, int dummy) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getpwent, dummy); |
| __sanitizer_passwd *res = REAL(getpwent)(dummy); |
| unpoison_passwd(ctx, res); |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_group *, getgrent, int dummy) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getgrent, dummy); |
| __sanitizer_group *res = REAL(getgrent)(dummy); |
| unpoison_group(ctx, res); |
| return res; |
| } |
| #define INIT_GETPWENT \ |
| COMMON_INTERCEPT_FUNCTION(getpwent); \ |
| COMMON_INTERCEPT_FUNCTION(getgrent); |
| #else |
| #define INIT_GETPWENT |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FGETPWENT |
| INTERCEPTOR(__sanitizer_passwd *, fgetpwent, void *fp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fgetpwent, fp); |
| __sanitizer_passwd *res = REAL(fgetpwent)(fp); |
| unpoison_passwd(ctx, res); |
| return res; |
| } |
| INTERCEPTOR(__sanitizer_group *, fgetgrent, void *fp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fgetgrent, fp); |
| __sanitizer_group *res = REAL(fgetgrent)(fp); |
| unpoison_group(ctx, res); |
| return res; |
| } |
| #define INIT_FGETPWENT \ |
| COMMON_INTERCEPT_FUNCTION(fgetpwent); \ |
| COMMON_INTERCEPT_FUNCTION(fgetgrent); |
| #else |
| #define INIT_FGETPWENT |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETPWENT_R |
| INTERCEPTOR(int, getpwent_r, __sanitizer_passwd *pwbuf, char *buf, |
| SIZE_T buflen, __sanitizer_passwd **pwbufp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getpwent_r, pwbuf, buf, buflen, pwbufp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getpwent_r)(pwbuf, buf, buflen, pwbufp); |
| if (!res && pwbufp) |
| unpoison_passwd(ctx, *pwbufp); |
| if (pwbufp) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwbufp, sizeof(*pwbufp)); |
| return res; |
| } |
| INTERCEPTOR(int, getgrent_r, __sanitizer_group *pwbuf, char *buf, SIZE_T buflen, |
| __sanitizer_group **pwbufp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getgrent_r, pwbuf, buf, buflen, pwbufp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getgrent_r)(pwbuf, buf, buflen, pwbufp); |
| if (!res && pwbufp) |
| unpoison_group(ctx, *pwbufp); |
| if (pwbufp) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwbufp, sizeof(*pwbufp)); |
| return res; |
| } |
| #define INIT_GETPWENT_R \ |
| COMMON_INTERCEPT_FUNCTION(getpwent_r); \ |
| COMMON_INTERCEPT_FUNCTION(getgrent_r); |
| #else |
| #define INIT_GETPWENT_R |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FGETPWENT_R |
| INTERCEPTOR(int, fgetpwent_r, void *fp, __sanitizer_passwd *pwbuf, char *buf, |
| SIZE_T buflen, __sanitizer_passwd **pwbufp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fgetpwent_r, fp, pwbuf, buf, buflen, pwbufp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(fgetpwent_r)(fp, pwbuf, buf, buflen, pwbufp); |
| if (!res && pwbufp) |
| unpoison_passwd(ctx, *pwbufp); |
| if (pwbufp) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwbufp, sizeof(*pwbufp)); |
| return res; |
| } |
| #define INIT_FGETPWENT_R \ |
| COMMON_INTERCEPT_FUNCTION(fgetpwent_r); |
| #else |
| #define INIT_FGETPWENT_R |
| #endif |
| |
| #if SANITIZER_INTERCEPT_FGETGRENT_R |
| INTERCEPTOR(int, fgetgrent_r, void *fp, __sanitizer_group *pwbuf, char *buf, |
| SIZE_T buflen, __sanitizer_group **pwbufp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, fgetgrent_r, fp, pwbuf, buf, buflen, pwbufp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(fgetgrent_r)(fp, pwbuf, buf, buflen, pwbufp); |
| if (!res && pwbufp) |
| unpoison_group(ctx, *pwbufp); |
| if (pwbufp) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pwbufp, sizeof(*pwbufp)); |
| return res; |
| } |
| #define INIT_FGETGRENT_R \ |
| COMMON_INTERCEPT_FUNCTION(fgetgrent_r); |
| #else |
| #define INIT_FGETGRENT_R |
| #endif |
| |
| #if SANITIZER_INTERCEPT_SETPWENT |
| // The only thing these interceptors do is disable any nested interceptors. |
| // These functions may open nss modules and call uninstrumented functions from |
| // them, and we don't want things like strlen() to trigger. |
| INTERCEPTOR(void, setpwent, int dummy) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, setpwent, dummy); |
| REAL(setpwent)(dummy); |
| } |
| INTERCEPTOR(void, endpwent, int dummy) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, endpwent, dummy); |
| REAL(endpwent)(dummy); |
| } |
| INTERCEPTOR(void, setgrent, int dummy) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, setgrent, dummy); |
| REAL(setgrent)(dummy); |
| } |
| INTERCEPTOR(void, endgrent, int dummy) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, endgrent, dummy); |
| REAL(endgrent)(dummy); |
| } |
| #define INIT_SETPWENT \ |
| COMMON_INTERCEPT_FUNCTION(setpwent); \ |
| COMMON_INTERCEPT_FUNCTION(endpwent); \ |
| COMMON_INTERCEPT_FUNCTION(setgrent); \ |
| COMMON_INTERCEPT_FUNCTION(endgrent); |
| #else |
| #define INIT_SETPWENT |
| #endif |
| |
| #if SANITIZER_INTERCEPT_CLOCK_GETTIME |
| INTERCEPTOR(int, clock_getres, u32 clk_id, void *tp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, clock_getres, clk_id, tp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(clock_getres)(clk_id, tp); |
| if (!res && tp) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, tp, struct_timespec_sz); |
| } |
| return res; |
| } |
| INTERCEPTOR(int, clock_gettime, u32 clk_id, void *tp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, clock_gettime, clk_id, tp); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(clock_gettime)(clk_id, tp); |
| if (!res) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, tp, struct_timespec_sz); |
| } |
| return res; |
| } |
| namespace __sanitizer { |
| extern "C" { |
| int real_clock_gettime(u32 clk_id, void *tp) { |
| if (COMMON_INTERCEPTOR_NOTHING_IS_INITIALIZED) |
| return internal_clock_gettime(clk_id, tp); |
| return REAL(clock_gettime)(clk_id, tp); |
| } |
| } // extern "C" |
| } // namespace __sanitizer |
| INTERCEPTOR(int, clock_settime, u32 clk_id, const void *tp) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, clock_settime, clk_id, tp); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, tp, struct_timespec_sz); |
| return REAL(clock_settime)(clk_id, tp); |
| } |
| #define INIT_CLOCK_GETTIME \ |
| COMMON_INTERCEPT_FUNCTION(clock_getres); \ |
| COMMON_INTERCEPT_FUNCTION(clock_gettime); \ |
| COMMON_INTERCEPT_FUNCTION(clock_settime); |
| #else |
| #define INIT_CLOCK_GETTIME |
| #endif |
| |
| #if SANITIZER_INTERCEPT_CLOCK_GETCPUCLOCKID |
| INTERCEPTOR(int, clock_getcpuclockid, pid_t pid, |
| __sanitizer_clockid_t *clockid) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, clock_getcpuclockid, pid, clockid); |
| int res = REAL(clock_getcpuclockid)(pid, clockid); |
| if (!res && clockid) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, clockid, sizeof *clockid); |
| } |
| return res; |
| } |
| |
| #define INIT_CLOCK_GETCPUCLOCKID \ |
| COMMON_INTERCEPT_FUNCTION(clock_getcpuclockid); |
| #else |
| #define INIT_CLOCK_GETCPUCLOCKID |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETITIMER |
| INTERCEPTOR(int, getitimer, int which, void *curr_value) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getitimer, which, curr_value); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getitimer)(which, curr_value); |
| if (!res && curr_value) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, curr_value, struct_itimerval_sz); |
| } |
| return res; |
| } |
| INTERCEPTOR(int, setitimer, int which, const void *new_value, void *old_value) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, setitimer, which, new_value, old_value); |
| if (new_value) { |
| // itimerval can contain padding that may be legitimately uninitialized |
| const struct __sanitizer_itimerval *nv = |
| (const struct __sanitizer_itimerval *)new_value; |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &nv->it_interval.tv_sec, |
| sizeof(__sanitizer_time_t)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &nv->it_interval.tv_usec, |
| sizeof(__sanitizer_suseconds_t)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &nv->it_value.tv_sec, |
| sizeof(__sanitizer_time_t)); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, &nv->it_value.tv_usec, |
| sizeof(__sanitizer_suseconds_t)); |
| } |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(setitimer)(which, new_value, old_value); |
| if (!res && old_value) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, old_value, struct_itimerval_sz); |
| } |
| return res; |
| } |
| #define INIT_GETITIMER \ |
| COMMON_INTERCEPT_FUNCTION(getitimer); \ |
| COMMON_INTERCEPT_FUNCTION(setitimer); |
| #else |
| #define INIT_GETITIMER |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GLOB |
| static void unpoison_glob_t(void *ctx, __sanitizer_glob_t *pglob) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, pglob, sizeof(*pglob)); |
| // +1 for NULL pointer at the end. |
| if (pglob->gl_pathv) |
| COMMON_INTERCEPTOR_WRITE_RANGE( |
| ctx, pglob->gl_pathv, (pglob->gl_pathc + 1) * sizeof(*pglob->gl_pathv)); |
| for (SIZE_T i = 0; i < pglob->gl_pathc; ++i) { |
| char *p = pglob->gl_pathv[i]; |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, p, REAL(strlen)(p) + 1); |
| } |
| } |
| |
| #if SANITIZER_SOLARIS |
| INTERCEPTOR(int, glob, const char *pattern, int flags, |
| int (*errfunc)(const char *epath, int eerrno), |
| __sanitizer_glob_t *pglob) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, glob, pattern, flags, errfunc, pglob); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, pattern, 0); |
| int res = REAL(glob)(pattern, flags, errfunc, pglob); |
| if ((!res || res == glob_nomatch) && pglob) unpoison_glob_t(ctx, pglob); |
| return res; |
| } |
| #else |
| static THREADLOCAL __sanitizer_glob_t *pglob_copy; |
| |
| static void wrapped_gl_closedir(void *dir) { |
| COMMON_INTERCEPTOR_UNPOISON_PARAM(1); |
| pglob_copy->gl_closedir(dir); |
| } |
| |
| static void *wrapped_gl_readdir(void *dir) { |
| COMMON_INTERCEPTOR_UNPOISON_PARAM(1); |
| return pglob_copy->gl_readdir(dir); |
| } |
| |
| static void *wrapped_gl_opendir(const char *s) { |
| COMMON_INTERCEPTOR_UNPOISON_PARAM(1); |
| COMMON_INTERCEPTOR_INITIALIZE_RANGE(s, REAL(strlen)(s) + 1); |
| return pglob_copy->gl_opendir(s); |
| } |
| |
| static int wrapped_gl_lstat(const char *s, void *st) { |
| COMMON_INTERCEPTOR_UNPOISON_PARAM(2); |
| COMMON_INTERCEPTOR_INITIALIZE_RANGE(s, REAL(strlen)(s) + 1); |
| return pglob_copy->gl_lstat(s, st); |
| } |
| |
| static int wrapped_gl_stat(const char *s, void *st) { |
| COMMON_INTERCEPTOR_UNPOISON_PARAM(2); |
| COMMON_INTERCEPTOR_INITIALIZE_RANGE(s, REAL(strlen)(s) + 1); |
| return pglob_copy->gl_stat(s, st); |
| } |
| |
| static const __sanitizer_glob_t kGlobCopy = { |
| 0, 0, 0, |
| 0, wrapped_gl_closedir, wrapped_gl_readdir, |
| wrapped_gl_opendir, wrapped_gl_lstat, wrapped_gl_stat}; |
| |
| INTERCEPTOR(int, glob, const char *pattern, int flags, |
| int (*errfunc)(const char *epath, int eerrno), |
| __sanitizer_glob_t *pglob) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, glob, pattern, flags, errfunc, pglob); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, pattern, 0); |
| __sanitizer_glob_t glob_copy; |
| internal_memcpy(&glob_copy, &kGlobCopy, sizeof(glob_copy)); |
| if (flags & glob_altdirfunc) { |
| Swap(pglob->gl_closedir, glob_copy.gl_closedir); |
| Swap(pglob->gl_readdir, glob_copy.gl_readdir); |
| Swap(pglob->gl_opendir, glob_copy.gl_opendir); |
| Swap(pglob->gl_lstat, glob_copy.gl_lstat); |
| Swap(pglob->gl_stat, glob_copy.gl_stat); |
| pglob_copy = &glob_copy; |
| } |
| int res = REAL(glob)(pattern, flags, errfunc, pglob); |
| if (flags & glob_altdirfunc) { |
| Swap(pglob->gl_closedir, glob_copy.gl_closedir); |
| Swap(pglob->gl_readdir, glob_copy.gl_readdir); |
| Swap(pglob->gl_opendir, glob_copy.gl_opendir); |
| Swap(pglob->gl_lstat, glob_copy.gl_lstat); |
| Swap(pglob->gl_stat, glob_copy.gl_stat); |
| } |
| pglob_copy = 0; |
| if ((!res || res == glob_nomatch) && pglob) unpoison_glob_t(ctx, pglob); |
| return res; |
| } |
| #endif // SANITIZER_SOLARIS |
| #define INIT_GLOB \ |
| COMMON_INTERCEPT_FUNCTION(glob); |
| #else // SANITIZER_INTERCEPT_GLOB |
| #define INIT_GLOB |
| #endif // SANITIZER_INTERCEPT_GLOB |
| |
| #if SANITIZER_INTERCEPT_GLOB64 |
| INTERCEPTOR(int, glob64, const char *pattern, int flags, |
| int (*errfunc)(const char *epath, int eerrno), |
| __sanitizer_glob_t *pglob) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, glob64, pattern, flags, errfunc, pglob); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, pattern, 0); |
| __sanitizer_glob_t glob_copy; |
| internal_memcpy(&glob_copy, &kGlobCopy, sizeof(glob_copy)); |
| if (flags & glob_altdirfunc) { |
| Swap(pglob->gl_closedir, glob_copy.gl_closedir); |
| Swap(pglob->gl_readdir, glob_copy.gl_readdir); |
| Swap(pglob->gl_opendir, glob_copy.gl_opendir); |
| Swap(pglob->gl_lstat, glob_copy.gl_lstat); |
| Swap(pglob->gl_stat, glob_copy.gl_stat); |
| pglob_copy = &glob_copy; |
| } |
| int res = REAL(glob64)(pattern, flags, errfunc, pglob); |
| if (flags & glob_altdirfunc) { |
| Swap(pglob->gl_closedir, glob_copy.gl_closedir); |
| Swap(pglob->gl_readdir, glob_copy.gl_readdir); |
| Swap(pglob->gl_opendir, glob_copy.gl_opendir); |
| Swap(pglob->gl_lstat, glob_copy.gl_lstat); |
| Swap(pglob->gl_stat, glob_copy.gl_stat); |
| } |
| pglob_copy = 0; |
| if ((!res || res == glob_nomatch) && pglob) unpoison_glob_t(ctx, pglob); |
| return res; |
| } |
| #define INIT_GLOB64 \ |
| COMMON_INTERCEPT_FUNCTION(glob64); |
| #else // SANITIZER_INTERCEPT_GLOB64 |
| #define INIT_GLOB64 |
| #endif // SANITIZER_INTERCEPT_GLOB64 |
| |
| #if SANITIZER_INTERCEPT_WAIT |
| // According to sys/wait.h, wait(), waitid(), waitpid() may have symbol version |
| // suffixes on Darwin. See the declaration of INTERCEPTOR_WITH_SUFFIX for |
| // details. |
| INTERCEPTOR_WITH_SUFFIX(int, wait, int *status) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, wait, status); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(wait)(status); |
| if (res != -1 && status) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, status, sizeof(*status)); |
| return res; |
| } |
| // On FreeBSD id_t is always 64-bit wide. |
| #if SANITIZER_FREEBSD && (SANITIZER_WORDSIZE == 32) |
| INTERCEPTOR_WITH_SUFFIX(int, waitid, int idtype, long long id, void *infop, |
| int options) { |
| #else |
| INTERCEPTOR_WITH_SUFFIX(int, waitid, int idtype, int id, void *infop, |
| int options) { |
| #endif |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, waitid, idtype, id, infop, options); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(waitid)(idtype, id, infop, options); |
| if (res != -1 && infop) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, infop, siginfo_t_sz); |
| return res; |
| } |
| INTERCEPTOR_WITH_SUFFIX(int, waitpid, int pid, int *status, int options) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, waitpid, pid, status, options); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(waitpid)(pid, status, options); |
| if (res != -1 && status) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, status, sizeof(*status)); |
| return res; |
| } |
| INTERCEPTOR(int, wait3, int *status, int options, void *rusage) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, wait3, status, options, rusage); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(wait3)(status, options, rusage); |
| if (res != -1) { |
| if (status) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, status, sizeof(*status)); |
| if (rusage) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, rusage, struct_rusage_sz); |
| } |
| return res; |
| } |
| #if SANITIZER_ANDROID |
| INTERCEPTOR(int, __wait4, int pid, int *status, int options, void *rusage) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, __wait4, pid, status, options, rusage); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(__wait4)(pid, status, options, rusage); |
| if (res != -1) { |
| if (status) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, status, sizeof(*status)); |
| if (rusage) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, rusage, struct_rusage_sz); |
| } |
| return res; |
| } |
| #define INIT_WAIT4 COMMON_INTERCEPT_FUNCTION(__wait4); |
| #else |
| INTERCEPTOR(int, wait4, int pid, int *status, int options, void *rusage) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, wait4, pid, status, options, rusage); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(wait4)(pid, status, options, rusage); |
| if (res != -1) { |
| if (status) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, status, sizeof(*status)); |
| if (rusage) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, rusage, struct_rusage_sz); |
| } |
| return res; |
| } |
| #define INIT_WAIT4 COMMON_INTERCEPT_FUNCTION(wait4); |
| #endif // SANITIZER_ANDROID |
| #define INIT_WAIT \ |
| COMMON_INTERCEPT_FUNCTION(wait); \ |
| COMMON_INTERCEPT_FUNCTION(waitid); \ |
| COMMON_INTERCEPT_FUNCTION(waitpid); \ |
| COMMON_INTERCEPT_FUNCTION(wait3); |
| #else |
| #define INIT_WAIT |
| #define INIT_WAIT4 |
| #endif |
| |
| #if SANITIZER_INTERCEPT_INET |
| INTERCEPTOR(char *, inet_ntop, int af, const void *src, char *dst, u32 size) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, inet_ntop, af, src, dst, size); |
| uptr sz = __sanitizer_in_addr_sz(af); |
| if (sz) COMMON_INTERCEPTOR_READ_RANGE(ctx, src, sz); |
| // FIXME: figure out read size based on the address family. |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| char *res = REAL(inet_ntop)(af, src, dst, size); |
| if (res) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, res, REAL(strlen)(res) + 1); |
| return res; |
| } |
| INTERCEPTOR(int, inet_pton, int af, const char *src, void *dst) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, inet_pton, af, src, dst); |
| COMMON_INTERCEPTOR_READ_STRING(ctx, src, 0); |
| // FIXME: figure out read size based on the address family. |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(inet_pton)(af, src, dst); |
| if (res == 1) { |
| uptr sz = __sanitizer_in_addr_sz(af); |
| if (sz) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, dst, sz); |
| } |
| return res; |
| } |
| #define INIT_INET \ |
| COMMON_INTERCEPT_FUNCTION(inet_ntop); \ |
| COMMON_INTERCEPT_FUNCTION(inet_pton); |
| #else |
| #define INIT_INET |
| #endif |
| |
| #if SANITIZER_INTERCEPT_INET |
| INTERCEPTOR(int, inet_aton, const char *cp, void *dst) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, inet_aton, cp, dst); |
| if (cp) COMMON_INTERCEPTOR_READ_RANGE(ctx, cp, REAL(strlen)(cp) + 1); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(inet_aton)(cp, dst); |
| if (res != 0) { |
| uptr sz = __sanitizer_in_addr_sz(af_inet); |
| if (sz) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, dst, sz); |
| } |
| return res; |
| } |
| #define INIT_INET_ATON COMMON_INTERCEPT_FUNCTION(inet_aton); |
| #else |
| #define INIT_INET_ATON |
| #endif |
| |
| #if SANITIZER_INTERCEPT_PTHREAD_GETSCHEDPARAM |
| INTERCEPTOR(int, pthread_getschedparam, uptr thread, int *policy, int *param) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, pthread_getschedparam, thread, policy, param); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(pthread_getschedparam)(thread, policy, param); |
| if (res == 0) { |
| if (policy) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, policy, sizeof(*policy)); |
| if (param) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, param, sizeof(*param)); |
| } |
| return res; |
| } |
| #define INIT_PTHREAD_GETSCHEDPARAM \ |
| COMMON_INTERCEPT_FUNCTION(pthread_getschedparam); |
| #else |
| #define INIT_PTHREAD_GETSCHEDPARAM |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETADDRINFO |
| INTERCEPTOR(int, getaddrinfo, char *node, char *service, |
| struct __sanitizer_addrinfo *hints, |
| struct __sanitizer_addrinfo **out) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getaddrinfo, node, service, hints, out); |
| if (node) COMMON_INTERCEPTOR_READ_RANGE(ctx, node, REAL(strlen)(node) + 1); |
| if (service) |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, service, REAL(strlen)(service) + 1); |
| if (hints) |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, hints, sizeof(__sanitizer_addrinfo)); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getaddrinfo)(node, service, hints, out); |
| if (res == 0 && out) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, out, sizeof(*out)); |
| struct __sanitizer_addrinfo *p = *out; |
| while (p) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, p, sizeof(*p)); |
| if (p->ai_addr) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, p->ai_addr, p->ai_addrlen); |
| if (p->ai_canonname) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, p->ai_canonname, |
| REAL(strlen)(p->ai_canonname) + 1); |
| p = p->ai_next; |
| } |
| } |
| return res; |
| } |
| #define INIT_GETADDRINFO COMMON_INTERCEPT_FUNCTION(getaddrinfo); |
| #else |
| #define INIT_GETADDRINFO |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETNAMEINFO |
| INTERCEPTOR(int, getnameinfo, void *sockaddr, unsigned salen, char *host, |
| unsigned hostlen, char *serv, unsigned servlen, int flags) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getnameinfo, sockaddr, salen, host, hostlen, |
| serv, servlen, flags); |
| // FIXME: consider adding READ_RANGE(sockaddr, salen) |
| // There is padding in in_addr that may make this too noisy |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = |
| REAL(getnameinfo)(sockaddr, salen, host, hostlen, serv, servlen, flags); |
| if (res == 0) { |
| if (host && hostlen) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, host, REAL(strlen)(host) + 1); |
| if (serv && servlen) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, serv, REAL(strlen)(serv) + 1); |
| } |
| return res; |
| } |
| #define INIT_GETNAMEINFO COMMON_INTERCEPT_FUNCTION(getnameinfo); |
| #else |
| #define INIT_GETNAMEINFO |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETSOCKNAME |
| INTERCEPTOR(int, getsockname, int sock_fd, void *addr, int *addrlen) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, getsockname, sock_fd, addr, addrlen); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, addrlen, sizeof(*addrlen)); |
| int addrlen_in = *addrlen; |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(getsockname)(sock_fd, addr, addrlen); |
| if (res == 0) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, addr, Min(addrlen_in, *addrlen)); |
| } |
| return res; |
| } |
| #define INIT_GETSOCKNAME COMMON_INTERCEPT_FUNCTION(getsockname); |
| #else |
| #define INIT_GETSOCKNAME |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETHOSTBYNAME || SANITIZER_INTERCEPT_GETHOSTBYNAME_R |
| static void write_hostent(void *ctx, struct __sanitizer_hostent *h) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, h, sizeof(__sanitizer_hostent)); |
| if (h->h_name) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, h->h_name, REAL(strlen)(h->h_name) + 1); |
| char **p = h->h_aliases; |
| while (*p) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, *p, REAL(strlen)(*p) + 1); |
| ++p; |
| } |
| COMMON_INTERCEPTOR_WRITE_RANGE( |
| ctx, h->h_aliases, (p - h->h_aliases + 1) * sizeof(*h->h_aliases)); |
| p = h->h_addr_list; |
| while (*p) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, *p, h->h_length); |
| ++p; |
| } |
| COMMON_INTERCEPTOR_WRITE_RANGE( |
| ctx, h->h_addr_list, (p - h->h_addr_list + 1) * sizeof(*h->h_addr_list)); |
| } |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETHOSTBYNAME |
| INTERCEPTOR(struct __sanitizer_hostent *, gethostbyname, char *name) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, gethostbyname, name); |
| struct __sanitizer_hostent *res = REAL(gethostbyname)(name); |
| if (res) write_hostent(ctx, res); |
| return res; |
| } |
| |
| INTERCEPTOR(struct __sanitizer_hostent *, gethostbyaddr, void *addr, int len, |
| int type) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, gethostbyaddr, addr, len, type); |
| COMMON_INTERCEPTOR_READ_RANGE(ctx, addr, len); |
| struct __sanitizer_hostent *res = REAL(gethostbyaddr)(addr, len, type); |
| if (res) write_hostent(ctx, res); |
| return res; |
| } |
| |
| INTERCEPTOR(struct __sanitizer_hostent *, gethostent, int fake) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, gethostent, fake); |
| struct __sanitizer_hostent *res = REAL(gethostent)(fake); |
| if (res) write_hostent(ctx, res); |
| return res; |
| } |
| #define INIT_GETHOSTBYNAME \ |
| COMMON_INTERCEPT_FUNCTION(gethostent); \ |
| COMMON_INTERCEPT_FUNCTION(gethostbyaddr); \ |
| COMMON_INTERCEPT_FUNCTION(gethostbyname); |
| #else |
| #define INIT_GETHOSTBYNAME |
| #endif // SANITIZER_INTERCEPT_GETHOSTBYNAME |
| |
| #if SANITIZER_INTERCEPT_GETHOSTBYNAME2 |
| INTERCEPTOR(struct __sanitizer_hostent *, gethostbyname2, char *name, int af) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, gethostbyname2, name, af); |
| struct __sanitizer_hostent *res = REAL(gethostbyname2)(name, af); |
| if (res) write_hostent(ctx, res); |
| return res; |
| } |
| #define INIT_GETHOSTBYNAME2 COMMON_INTERCEPT_FUNCTION(gethostbyname2); |
| #else |
| #define INIT_GETHOSTBYNAME2 |
| #endif // SANITIZER_INTERCEPT_GETHOSTBYNAME2 |
| |
| #if SANITIZER_INTERCEPT_GETHOSTBYNAME_R |
| INTERCEPTOR(int, gethostbyname_r, char *name, struct __sanitizer_hostent *ret, |
| char *buf, SIZE_T buflen, __sanitizer_hostent **result, |
| int *h_errnop) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER(ctx, gethostbyname_r, name, ret, buf, buflen, result, |
| h_errnop); |
| // FIXME: under ASan the call below may write to freed memory and corrupt |
| // its metadata. See |
| // https://github.com/google/sanitizers/issues/321. |
| int res = REAL(gethostbyname_r)(name, ret, buf, buflen, result, h_errnop); |
| if (result) { |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, result, sizeof(*result)); |
| if (res == 0 && *result) write_hostent(ctx, *result); |
| } |
| if (h_errnop) |
| COMMON_INTERCEPTOR_WRITE_RANGE(ctx, h_errnop, sizeof(*h_errnop)); |
| return res; |
| } |
| #define INIT_GETHOSTBYNAME_R COMMON_INTERCEPT_FUNCTION(gethostbyname_r); |
| #else |
| #define INIT_GETHOSTBYNAME_R |
| #endif |
| |
| #if SANITIZER_INTERCEPT_GETHOSTENT_R |
| INTERCEPTOR(int, gethostent_r, struct __sanitizer_hostent *ret, char *buf, |
| SIZE_T buflen, __sanitizer_hostent **result, int *h_errnop) { |
| void *ctx; |
| COMMON_INTERCEPTOR_ENTER |