1//===-- asan_interceptors.h -------------------------------------*- C++ -*-===// 2// 3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4// See https://llvm.org/LICENSE.txt for license information. 5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6// 7//===----------------------------------------------------------------------===// 8// 9// This file is a part of AddressSanitizer, an address sanity checker. 10// 11// ASan-private header for asan_interceptors.cpp 12//===----------------------------------------------------------------------===// 13#ifndef ASAN_INTERCEPTORS_H 14#define ASAN_INTERCEPTORS_H 15 16#include "asan_interceptors_memintrinsics.h" 17#include "asan_internal.h" 18#include "interception/interception.h" 19#include "sanitizer_common/sanitizer_platform.h" 20#include "sanitizer_common/sanitizer_platform_interceptors.h" 21 22namespace __asan { 23 24void InitializeAsanInterceptors(); 25void InitializePlatformInterceptors(); 26 27#define ENSURE_ASAN_INITED() \ 28 do { \ 29 CHECK(!asan_init_is_running); \ 30 if (UNLIKELY(!asan_inited)) { \ 31 AsanInitFromRtl(); \ 32 } \ 33 } while (0) 34 35} // namespace __asan 36 37// There is no general interception at all on Fuchsia. 38// Only the functions in asan_interceptors_memintrinsics.h are 39// really defined to replace libc functions. 40#if !SANITIZER_FUCHSIA 41 42// Use macro to describe if specific function should be 43// intercepted on a given platform. 44#if !SANITIZER_WINDOWS 45# define ASAN_INTERCEPT_ATOLL_AND_STRTOLL 1 46# define ASAN_INTERCEPT__LONGJMP 1 47# define ASAN_INTERCEPT_INDEX 1 48# define ASAN_INTERCEPT_PTHREAD_CREATE 1 49#else 50# define ASAN_INTERCEPT_ATOLL_AND_STRTOLL 0 51# define ASAN_INTERCEPT__LONGJMP 0 52# define ASAN_INTERCEPT_INDEX 0 53# define ASAN_INTERCEPT_PTHREAD_CREATE 0 54#endif 55 56#if SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_NETBSD || \ 57 SANITIZER_SOLARIS 58# define ASAN_USE_ALIAS_ATTRIBUTE_FOR_INDEX 1 59#else 60# define ASAN_USE_ALIAS_ATTRIBUTE_FOR_INDEX 0 61#endif 62 63#if SANITIZER_GLIBC || SANITIZER_SOLARIS 64# define ASAN_INTERCEPT_SWAPCONTEXT 1 65#else 66# define ASAN_INTERCEPT_SWAPCONTEXT 0 67#endif 68 69#if !SANITIZER_WINDOWS 70# define ASAN_INTERCEPT_SIGLONGJMP 1 71#else 72# define ASAN_INTERCEPT_SIGLONGJMP 0 73#endif 74 75#if SANITIZER_GLIBC 76# define ASAN_INTERCEPT___LONGJMP_CHK 1 77#else 78# define ASAN_INTERCEPT___LONGJMP_CHK 0 79#endif 80 81#if ASAN_HAS_EXCEPTIONS && !SANITIZER_WINDOWS && !SANITIZER_SOLARIS && \ 82 !SANITIZER_NETBSD 83# define ASAN_INTERCEPT___CXA_THROW 1 84# if ! defined(ASAN_HAS_CXA_RETHROW_PRIMARY_EXCEPTION) \ 85 || ASAN_HAS_CXA_RETHROW_PRIMARY_EXCEPTION 86# define ASAN_INTERCEPT___CXA_RETHROW_PRIMARY_EXCEPTION 1 87# else 88# define ASAN_INTERCEPT___CXA_RETHROW_PRIMARY_EXCEPTION 0 89# endif 90# if defined(_GLIBCXX_SJLJ_EXCEPTIONS) || (SANITIZER_IOS && defined(__arm__)) 91# define ASAN_INTERCEPT__UNWIND_SJLJ_RAISEEXCEPTION 1 92# else 93# define ASAN_INTERCEPT__UNWIND_RAISEEXCEPTION 1 94# endif 95#else 96# define ASAN_INTERCEPT___CXA_THROW 0 97# define ASAN_INTERCEPT___CXA_RETHROW_PRIMARY_EXCEPTION 0 98# define ASAN_INTERCEPT__UNWIND_RAISEEXCEPTION 0 99# define ASAN_INTERCEPT__UNWIND_SJLJ_RAISEEXCEPTION 0 100#endif 101 102#if !SANITIZER_WINDOWS 103# define ASAN_INTERCEPT___CXA_ATEXIT 1 104#else 105# define ASAN_INTERCEPT___CXA_ATEXIT 0 106#endif 107 108#if SANITIZER_NETBSD 109# define ASAN_INTERCEPT_ATEXIT 1 110#else 111# define ASAN_INTERCEPT_ATEXIT 0 112#endif 113 114#if SANITIZER_GLIBC 115# define ASAN_INTERCEPT___STRDUP 1 116#else 117# define ASAN_INTERCEPT___STRDUP 0 118#endif 119 120#if SANITIZER_LINUX && \ 121 (defined(__arm__) || defined(__aarch64__) || defined(__i386__) || \ 122 defined(__x86_64__) || SANITIZER_RISCV64) 123# define ASAN_INTERCEPT_VFORK 1 124#else 125# define ASAN_INTERCEPT_VFORK 0 126#endif 127 128#if SANITIZER_NETBSD 129# define ASAN_INTERCEPT_PTHREAD_ATFORK 1 130#else 131# define ASAN_INTERCEPT_PTHREAD_ATFORK 0 132#endif 133 134DECLARE_REAL(int, memcmp, const void *a1, const void *a2, uptr size) 135DECLARE_REAL(char*, strchr, const char *str, int c) 136DECLARE_REAL(SIZE_T, strlen, const char *s) 137DECLARE_REAL(char*, strncpy, char *to, const char *from, uptr size) 138DECLARE_REAL(uptr, strnlen, const char *s, uptr maxlen) 139DECLARE_REAL(char*, strstr, const char *s1, const char *s2) 140 141# if !SANITIZER_MAC 142# define ASAN_INTERCEPT_FUNC(name) \ 143 do { \ 144 if (!INTERCEPT_FUNCTION(name)) \ 145 VReport(1, "AddressSanitizer: failed to intercept '%s'\n", #name); \ 146 } while (0) 147# define ASAN_INTERCEPT_FUNC_VER(name, ver) \ 148 do { \ 149 if (!INTERCEPT_FUNCTION_VER(name, ver)) \ 150 VReport(1, "AddressSanitizer: failed to intercept '%s@@%s'\n", \ 151 #name, ver); \ 152 } while (0) 153# define ASAN_INTERCEPT_FUNC_VER_UNVERSIONED_FALLBACK(name, ver) \ 154 do { \ 155 if (!INTERCEPT_FUNCTION_VER(name, ver) && !INTERCEPT_FUNCTION(name)) \ 156 VReport(1, \ 157 "AddressSanitizer: failed to intercept '%s@@%s' or '%s'\n", \ 158 #name, ver, #name); \ 159 } while (0) 160 161# else 162// OS X interceptors don't need to be initialized with INTERCEPT_FUNCTION. 163# define ASAN_INTERCEPT_FUNC(name) 164# endif // SANITIZER_MAC 165 166#endif // !SANITIZER_FUCHSIA 167 168#endif // ASAN_INTERCEPTORS_H 169