Retro68/gcc/libsanitizer/asan/asan_linux.cc

194 lines
5.4 KiB
C++
Raw Normal View History

2014-09-21 17:33:12 +00:00
//===-- asan_linux.cc -----------------------------------------------------===//
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// This file is a part of AddressSanitizer, an address sanity checker.
//
// Linux-specific details.
//===----------------------------------------------------------------------===//
#include "sanitizer_common/sanitizer_platform.h"
2018-12-28 15:30:48 +00:00
#if SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_NETBSD
2014-09-21 17:33:12 +00:00
#include "asan_interceptors.h"
#include "asan_internal.h"
#include "asan_thread.h"
2015-08-28 15:33:40 +00:00
#include "sanitizer_common/sanitizer_flags.h"
#include "sanitizer_common/sanitizer_freebsd.h"
2014-09-21 17:33:12 +00:00
#include "sanitizer_common/sanitizer_libc.h"
#include "sanitizer_common/sanitizer_procmaps.h"
#include <sys/time.h>
#include <sys/resource.h>
#include <sys/mman.h>
#include <sys/syscall.h>
#include <sys/types.h>
2015-08-28 15:33:40 +00:00
#include <dlfcn.h>
2014-09-21 17:33:12 +00:00
#include <fcntl.h>
#include <pthread.h>
#include <stdio.h>
#include <unistd.h>
#include <unwind.h>
2015-08-28 15:33:40 +00:00
#if SANITIZER_FREEBSD
#include <sys/link_elf.h>
2014-09-21 17:33:12 +00:00
#endif
2015-08-28 15:33:40 +00:00
#if SANITIZER_ANDROID || SANITIZER_FREEBSD
#include <ucontext.h>
2014-09-21 17:33:12 +00:00
extern "C" void* _DYNAMIC;
2018-12-28 15:30:48 +00:00
#elif SANITIZER_NETBSD
#include <link_elf.h>
#include <ucontext.h>
extern Elf_Dyn _DYNAMIC;
2015-08-28 15:33:40 +00:00
#else
#include <sys/ucontext.h>
#include <link.h>
#endif
// x86-64 FreeBSD 9.2 and older define 'ucontext_t' incorrectly in
// 32-bit mode.
#if SANITIZER_FREEBSD && (SANITIZER_WORDSIZE == 32) && \
__FreeBSD_version <= 902001 // v9.2
#define ucontext_t xucontext_t
#endif
typedef enum {
ASAN_RT_VERSION_UNDEFINED = 0,
ASAN_RT_VERSION_DYNAMIC,
ASAN_RT_VERSION_STATIC,
} asan_rt_version_t;
// FIXME: perhaps also store abi version here?
extern "C" {
SANITIZER_INTERFACE_ATTRIBUTE
asan_rt_version_t __asan_rt_version;
}
2014-09-21 17:33:12 +00:00
namespace __asan {
2017-04-10 11:32:00 +00:00
void InitializePlatformInterceptors() {}
void InitializePlatformExceptionHandlers() {}
2018-12-28 15:30:48 +00:00
bool IsSystemHeapAddress (uptr addr) { return false; }
2014-09-21 17:33:12 +00:00
void *AsanDoesNotSupportStaticLinkage() {
// This will fail to link with -static.
return &_DYNAMIC; // defined in link.h
}
2018-12-28 15:30:48 +00:00
uptr FindDynamicShadowStart() {
UNREACHABLE("FindDynamicShadowStart is not available");
return 0;
}
void AsanApplyToGlobals(globals_op_fptr op, const void *needle) {
UNIMPLEMENTED();
}
2014-09-21 17:33:12 +00:00
#if SANITIZER_ANDROID
2015-08-28 15:33:40 +00:00
// FIXME: should we do anything for Android?
void AsanCheckDynamicRTPrereqs() {}
void AsanCheckIncompatibleRT() {}
#else
static int FindFirstDSOCallback(struct dl_phdr_info *info, size_t size,
void *data) {
// Continue until the first dynamic library is found
if (!info->dlpi_name || info->dlpi_name[0] == 0)
return 0;
// Ignore vDSO
if (internal_strncmp(info->dlpi_name, "linux-", sizeof("linux-") - 1) == 0)
return 0;
2018-12-28 15:30:48 +00:00
#if SANITIZER_NETBSD
// Ignore first entry (the main program)
char **p = (char **)data;
if (!(*p)) {
*p = (char *)-1;
return 0;
}
#endif
2015-08-28 15:33:40 +00:00
*(const char **)data = info->dlpi_name;
return 1;
}
static bool IsDynamicRTName(const char *libname) {
return internal_strstr(libname, "libclang_rt.asan") ||
internal_strstr(libname, "libasan.so");
}
static void ReportIncompatibleRT() {
Report("Your application is linked against incompatible ASan runtimes.\n");
Die();
}
void AsanCheckDynamicRTPrereqs() {
2018-12-28 15:30:48 +00:00
if (!ASAN_DYNAMIC || !flags()->verify_asan_link_order)
2017-04-10 11:32:00 +00:00
return;
2015-08-28 15:33:40 +00:00
// Ensure that dynamic RT is the first DSO in the list
2017-04-10 11:32:00 +00:00
const char *first_dso_name = nullptr;
2015-08-28 15:33:40 +00:00
dl_iterate_phdr(FindFirstDSOCallback, &first_dso_name);
if (first_dso_name && !IsDynamicRTName(first_dso_name)) {
Report("ASan runtime does not come first in initial library list; "
"you should either link runtime to your application or "
"manually preload it with LD_PRELOAD.\n");
Die();
}
}
void AsanCheckIncompatibleRT() {
if (ASAN_DYNAMIC) {
if (__asan_rt_version == ASAN_RT_VERSION_UNDEFINED) {
__asan_rt_version = ASAN_RT_VERSION_DYNAMIC;
} else if (__asan_rt_version != ASAN_RT_VERSION_DYNAMIC) {
ReportIncompatibleRT();
}
} else {
if (__asan_rt_version == ASAN_RT_VERSION_UNDEFINED) {
// Ensure that dynamic runtime is not present. We should detect it
// as early as possible, otherwise ASan interceptors could bind to
// the functions in dynamic ASan runtime instead of the functions in
// system libraries, causing crashes later in ASan initialization.
MemoryMappingLayout proc_maps(/*cache_enabled*/true);
char filename[128];
2018-12-28 15:30:48 +00:00
MemoryMappedSegment segment(filename, sizeof(filename));
while (proc_maps.Next(&segment)) {
if (IsDynamicRTName(segment.filename)) {
2015-08-28 15:33:40 +00:00
Report("Your application is linked against "
"incompatible ASan runtimes.\n");
Die();
}
}
__asan_rt_version = ASAN_RT_VERSION_STATIC;
} else if (__asan_rt_version != ASAN_RT_VERSION_STATIC) {
ReportIncompatibleRT();
}
}
}
2017-04-10 11:32:00 +00:00
#endif // SANITIZER_ANDROID
2014-09-21 17:33:12 +00:00
#if !SANITIZER_ANDROID
void ReadContextStack(void *context, uptr *stack, uptr *ssize) {
ucontext_t *ucp = (ucontext_t*)context;
*stack = (uptr)ucp->uc_stack.ss_sp;
*ssize = ucp->uc_stack.ss_size;
}
#else
void ReadContextStack(void *context, uptr *stack, uptr *ssize) {
UNIMPLEMENTED();
}
#endif
2015-08-28 15:33:40 +00:00
void *AsanDlSymNext(const char *sym) {
return dlsym(RTLD_NEXT, sym);
}
2017-04-10 11:32:00 +00:00
} // namespace __asan
2014-09-21 17:33:12 +00:00
2018-12-28 15:30:48 +00:00
#endif // SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_NETBSD