xref: /netbsd-src/external/gpl3/gcc.old/dist/libsanitizer/asan/asan_malloc_linux.cc (revision 9fb66d812c00ebfb445c0b47dea128f32aa6fe96)
1 //===-- asan_malloc_linux.cc ----------------------------------------------===//
2 //
3 // This file is distributed under the University of Illinois Open Source
4 // License. See LICENSE.TXT for details.
5 //
6 //===----------------------------------------------------------------------===//
7 //
8 // This file is a part of AddressSanitizer, an address sanity checker.
9 //
10 // Linux-specific malloc interception.
11 // We simply define functions like malloc, free, realloc, etc.
12 // They will replace the corresponding libc functions automagically.
13 //===----------------------------------------------------------------------===//
14 
15 #include "sanitizer_common/sanitizer_platform.h"
16 #if SANITIZER_FREEBSD || SANITIZER_FUCHSIA || SANITIZER_LINUX || \
17     SANITIZER_NETBSD || SANITIZER_RTEMS || SANITIZER_SOLARIS
18 
19 #include "sanitizer_common/sanitizer_allocator_checks.h"
20 #include "sanitizer_common/sanitizer_errno.h"
21 #include "sanitizer_common/sanitizer_tls_get_addr.h"
22 #include "asan_allocator.h"
23 #include "asan_interceptors.h"
24 #include "asan_internal.h"
25 #include "asan_malloc_local.h"
26 #include "asan_stack.h"
27 
28 // ---------------------- Replacement functions ---------------- {{{1
29 using namespace __asan;  // NOLINT
30 
31 static uptr allocated_for_dlsym;
32 static uptr last_dlsym_alloc_size_in_words;
33 static const uptr kDlsymAllocPoolSize = SANITIZER_RTEMS ? 4096 : 1024;
34 static uptr alloc_memory_for_dlsym[kDlsymAllocPoolSize];
35 
36 static INLINE bool IsInDlsymAllocPool(const void *ptr) {
37   uptr off = (uptr)ptr - (uptr)alloc_memory_for_dlsym;
38   return off < allocated_for_dlsym * sizeof(alloc_memory_for_dlsym[0]);
39 }
40 
41 static void *AllocateFromLocalPool(uptr size_in_bytes) {
42   uptr size_in_words = RoundUpTo(size_in_bytes, kWordSize) / kWordSize;
43   void *mem = (void*)&alloc_memory_for_dlsym[allocated_for_dlsym];
44   last_dlsym_alloc_size_in_words = size_in_words;
45   allocated_for_dlsym += size_in_words;
46   CHECK_LT(allocated_for_dlsym, kDlsymAllocPoolSize);
47   return mem;
48 }
49 
50 static void DeallocateFromLocalPool(const void *ptr) {
51   // Hack: since glibc 2.27 dlsym no longer uses stack-allocated memory to store
52   // error messages and instead uses malloc followed by free. To avoid pool
53   // exhaustion due to long object filenames, handle that special case here.
54   uptr prev_offset = allocated_for_dlsym - last_dlsym_alloc_size_in_words;
55   void *prev_mem = (void*)&alloc_memory_for_dlsym[prev_offset];
56   if (prev_mem == ptr) {
57     REAL(memset)(prev_mem, 0, last_dlsym_alloc_size_in_words * kWordSize);
58     allocated_for_dlsym = prev_offset;
59     last_dlsym_alloc_size_in_words = 0;
60   }
61 }
62 
63 static int PosixMemalignFromLocalPool(void **memptr, uptr alignment,
64                                       uptr size_in_bytes) {
65   if (UNLIKELY(!CheckPosixMemalignAlignment(alignment)))
66     return errno_EINVAL;
67 
68   CHECK(alignment >= kWordSize);
69 
70   uptr addr = (uptr)&alloc_memory_for_dlsym[allocated_for_dlsym];
71   uptr aligned_addr = RoundUpTo(addr, alignment);
72   uptr aligned_size = RoundUpTo(size_in_bytes, kWordSize);
73 
74   uptr *end_mem = (uptr*)(aligned_addr + aligned_size);
75   uptr allocated = end_mem - alloc_memory_for_dlsym;
76   if (allocated >= kDlsymAllocPoolSize)
77     return errno_ENOMEM;
78 
79   allocated_for_dlsym = allocated;
80   *memptr = (void*)aligned_addr;
81   return 0;
82 }
83 
84 #if SANITIZER_RTEMS
85 void* MemalignFromLocalPool(uptr alignment, uptr size) {
86   void *ptr = nullptr;
87   alignment = Max(alignment, kWordSize);
88   PosixMemalignFromLocalPool(&ptr, alignment, size);
89   return ptr;
90 }
91 
92 bool IsFromLocalPool(const void *ptr) {
93   return IsInDlsymAllocPool(ptr);
94 }
95 #endif
96 
97 static INLINE bool MaybeInDlsym() {
98   // Fuchsia doesn't use dlsym-based interceptors.
99   return !SANITIZER_FUCHSIA && asan_init_is_running;
100 }
101 
102 static INLINE bool UseLocalPool() {
103   return EarlyMalloc() || MaybeInDlsym();
104 }
105 
106 static void *ReallocFromLocalPool(void *ptr, uptr size) {
107   const uptr offset = (uptr)ptr - (uptr)alloc_memory_for_dlsym;
108   const uptr copy_size = Min(size, kDlsymAllocPoolSize - offset);
109   void *new_ptr;
110   if (UNLIKELY(UseLocalPool())) {
111     new_ptr = AllocateFromLocalPool(size);
112   } else {
113     ENSURE_ASAN_INITED();
114     GET_STACK_TRACE_MALLOC;
115     new_ptr = asan_malloc(size, &stack);
116   }
117   internal_memcpy(new_ptr, ptr, copy_size);
118   return new_ptr;
119 }
120 
121 INTERCEPTOR(void, free, void *ptr) {
122   GET_STACK_TRACE_FREE;
123   if (UNLIKELY(IsInDlsymAllocPool(ptr))) {
124     DeallocateFromLocalPool(ptr);
125     return;
126   }
127   asan_free(ptr, &stack, FROM_MALLOC);
128 }
129 
130 #if SANITIZER_INTERCEPT_CFREE
131 INTERCEPTOR(void, cfree, void *ptr) {
132   GET_STACK_TRACE_FREE;
133   if (UNLIKELY(IsInDlsymAllocPool(ptr)))
134     return;
135   asan_free(ptr, &stack, FROM_MALLOC);
136 }
137 #endif // SANITIZER_INTERCEPT_CFREE
138 
139 INTERCEPTOR(void*, malloc, uptr size) {
140   if (UNLIKELY(UseLocalPool()))
141     // Hack: dlsym calls malloc before REAL(malloc) is retrieved from dlsym.
142     return AllocateFromLocalPool(size);
143   ENSURE_ASAN_INITED();
144   GET_STACK_TRACE_MALLOC;
145   return asan_malloc(size, &stack);
146 }
147 
148 INTERCEPTOR(void*, calloc, uptr nmemb, uptr size) {
149   if (UNLIKELY(UseLocalPool()))
150     // Hack: dlsym calls calloc before REAL(calloc) is retrieved from dlsym.
151     return AllocateFromLocalPool(nmemb * size);
152   ENSURE_ASAN_INITED();
153   GET_STACK_TRACE_MALLOC;
154   return asan_calloc(nmemb, size, &stack);
155 }
156 
157 INTERCEPTOR(void*, realloc, void *ptr, uptr size) {
158   if (UNLIKELY(IsInDlsymAllocPool(ptr)))
159     return ReallocFromLocalPool(ptr, size);
160   if (UNLIKELY(UseLocalPool()))
161     return AllocateFromLocalPool(size);
162   ENSURE_ASAN_INITED();
163   GET_STACK_TRACE_MALLOC;
164   return asan_realloc(ptr, size, &stack);
165 }
166 
167 #if SANITIZER_INTERCEPT_MEMALIGN
168 INTERCEPTOR(void*, memalign, uptr boundary, uptr size) {
169   GET_STACK_TRACE_MALLOC;
170   return asan_memalign(boundary, size, &stack, FROM_MALLOC);
171 }
172 
173 INTERCEPTOR(void*, __libc_memalign, uptr boundary, uptr size) {
174   GET_STACK_TRACE_MALLOC;
175   void *res = asan_memalign(boundary, size, &stack, FROM_MALLOC);
176   DTLS_on_libc_memalign(res, size);
177   return res;
178 }
179 #endif // SANITIZER_INTERCEPT_MEMALIGN
180 
181 #if SANITIZER_INTERCEPT_ALIGNED_ALLOC
182 INTERCEPTOR(void*, aligned_alloc, uptr boundary, uptr size) {
183   GET_STACK_TRACE_MALLOC;
184   return asan_aligned_alloc(boundary, size, &stack);
185 }
186 #endif // SANITIZER_INTERCEPT_ALIGNED_ALLOC
187 
188 INTERCEPTOR(uptr, malloc_usable_size, void *ptr) {
189   GET_CURRENT_PC_BP_SP;
190   (void)sp;
191   return asan_malloc_usable_size(ptr, pc, bp);
192 }
193 
194 #if SANITIZER_INTERCEPT_MALLOPT_AND_MALLINFO
195 // We avoid including malloc.h for portability reasons.
196 // man mallinfo says the fields are "long", but the implementation uses int.
197 // It doesn't matter much -- we just need to make sure that the libc's mallinfo
198 // is not called.
199 struct fake_mallinfo {
200   int x[10];
201 };
202 
203 INTERCEPTOR(struct fake_mallinfo, mallinfo, void) {
204   struct fake_mallinfo res;
205   REAL(memset)(&res, 0, sizeof(res));
206   return res;
207 }
208 
209 INTERCEPTOR(int, mallopt, int cmd, int value) {
210   return -1;
211 }
212 #endif // SANITIZER_INTERCEPT_MALLOPT_AND_MALLINFO
213 
214 INTERCEPTOR(int, posix_memalign, void **memptr, uptr alignment, uptr size) {
215   if (UNLIKELY(UseLocalPool()))
216     return PosixMemalignFromLocalPool(memptr, alignment, size);
217   GET_STACK_TRACE_MALLOC;
218   return asan_posix_memalign(memptr, alignment, size, &stack);
219 }
220 
221 INTERCEPTOR(void*, valloc, uptr size) {
222   GET_STACK_TRACE_MALLOC;
223   return asan_valloc(size, &stack);
224 }
225 
226 #if SANITIZER_INTERCEPT_PVALLOC
227 INTERCEPTOR(void*, pvalloc, uptr size) {
228   GET_STACK_TRACE_MALLOC;
229   return asan_pvalloc(size, &stack);
230 }
231 #endif // SANITIZER_INTERCEPT_PVALLOC
232 
233 INTERCEPTOR(void, malloc_stats, void) {
234   __asan_print_accumulated_stats();
235 }
236 
237 #if SANITIZER_ANDROID
238 // Format of __libc_malloc_dispatch has changed in Android L.
239 // While we are moving towards a solution that does not depend on bionic
240 // internals, here is something to support both K* and L releases.
241 struct MallocDebugK {
242   void *(*malloc)(uptr bytes);
243   void (*free)(void *mem);
244   void *(*calloc)(uptr n_elements, uptr elem_size);
245   void *(*realloc)(void *oldMem, uptr bytes);
246   void *(*memalign)(uptr alignment, uptr bytes);
247   uptr (*malloc_usable_size)(void *mem);
248 };
249 
250 struct MallocDebugL {
251   void *(*calloc)(uptr n_elements, uptr elem_size);
252   void (*free)(void *mem);
253   fake_mallinfo (*mallinfo)(void);
254   void *(*malloc)(uptr bytes);
255   uptr (*malloc_usable_size)(void *mem);
256   void *(*memalign)(uptr alignment, uptr bytes);
257   int (*posix_memalign)(void **memptr, uptr alignment, uptr size);
258   void* (*pvalloc)(uptr size);
259   void *(*realloc)(void *oldMem, uptr bytes);
260   void* (*valloc)(uptr size);
261 };
262 
263 ALIGNED(32) const MallocDebugK asan_malloc_dispatch_k = {
264     WRAP(malloc),  WRAP(free),     WRAP(calloc),
265     WRAP(realloc), WRAP(memalign), WRAP(malloc_usable_size)};
266 
267 ALIGNED(32) const MallocDebugL asan_malloc_dispatch_l = {
268     WRAP(calloc),         WRAP(free),               WRAP(mallinfo),
269     WRAP(malloc),         WRAP(malloc_usable_size), WRAP(memalign),
270     WRAP(posix_memalign), WRAP(pvalloc),            WRAP(realloc),
271     WRAP(valloc)};
272 
273 namespace __asan {
274 void ReplaceSystemMalloc() {
275   void **__libc_malloc_dispatch_p =
276       (void **)AsanDlSymNext("__libc_malloc_dispatch");
277   if (__libc_malloc_dispatch_p) {
278     // Decide on K vs L dispatch format by the presence of
279     // __libc_malloc_default_dispatch export in libc.
280     void *default_dispatch_p = AsanDlSymNext("__libc_malloc_default_dispatch");
281     if (default_dispatch_p)
282       *__libc_malloc_dispatch_p = (void *)&asan_malloc_dispatch_k;
283     else
284       *__libc_malloc_dispatch_p = (void *)&asan_malloc_dispatch_l;
285   }
286 }
287 }  // namespace __asan
288 
289 #else  // SANITIZER_ANDROID
290 
291 namespace __asan {
292 void ReplaceSystemMalloc() {
293 }
294 }  // namespace __asan
295 #endif  // SANITIZER_ANDROID
296 
297 #endif  // SANITIZER_FREEBSD || SANITIZER_FUCHSIA || SANITIZER_LINUX ||
298         // SANITIZER_NETBSD || SANITIZER_SOLARIS
299