xref: /openbsd-src/gnu/llvm/compiler-rt/lib/ubsan/ubsan_signals_standalone.cpp (revision 3cab2bb3f667058bece8e38b12449a63a9d73c4b)
1*3cab2bb3Spatrick //=-- ubsan_signals_standalone.cpp ----------------------------------------===//
2*3cab2bb3Spatrick //
3*3cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4*3cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
5*3cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6*3cab2bb3Spatrick //
7*3cab2bb3Spatrick //===----------------------------------------------------------------------===//
8*3cab2bb3Spatrick //
9*3cab2bb3Spatrick // Installs signal handlers and related interceptors for UBSan standalone.
10*3cab2bb3Spatrick //
11*3cab2bb3Spatrick //===----------------------------------------------------------------------===//
12*3cab2bb3Spatrick 
13*3cab2bb3Spatrick #include "ubsan_platform.h"
14*3cab2bb3Spatrick #include "sanitizer_common/sanitizer_platform.h"
15*3cab2bb3Spatrick #if CAN_SANITIZE_UB
16*3cab2bb3Spatrick #include "interception/interception.h"
17*3cab2bb3Spatrick #include "sanitizer_common/sanitizer_stacktrace.h"
18*3cab2bb3Spatrick #include "ubsan_diag.h"
19*3cab2bb3Spatrick #include "ubsan_init.h"
20*3cab2bb3Spatrick 
21*3cab2bb3Spatrick // Interception of signals breaks too many things on Android.
22*3cab2bb3Spatrick // * It requires that ubsan is the first dependency of the main executable for
23*3cab2bb3Spatrick // the interceptors to work correctly. This complicates deployment, as it
24*3cab2bb3Spatrick // prevents us from enabling ubsan on random platform modules independently.
25*3cab2bb3Spatrick // * For this to work with ART VM, ubsan signal handler has to be set after the
26*3cab2bb3Spatrick // debuggerd handler, but before the ART handler.
27*3cab2bb3Spatrick // * Interceptors don't work at all when ubsan runtime is loaded late, ex. when
28*3cab2bb3Spatrick // it is part of an APK that does not use wrap.sh method.
29*3cab2bb3Spatrick #if SANITIZER_FUCHSIA || SANITIZER_ANDROID
30*3cab2bb3Spatrick 
31*3cab2bb3Spatrick namespace __ubsan {
InitializeDeadlySignals()32*3cab2bb3Spatrick void InitializeDeadlySignals() {}
33*3cab2bb3Spatrick }
34*3cab2bb3Spatrick 
35*3cab2bb3Spatrick #else
36*3cab2bb3Spatrick 
37*3cab2bb3Spatrick #define COMMON_INTERCEPT_FUNCTION(name) INTERCEPT_FUNCTION(name)
38*3cab2bb3Spatrick #include "sanitizer_common/sanitizer_signal_interceptors.inc"
39*3cab2bb3Spatrick 
40*3cab2bb3Spatrick // TODO(yln): Temporary workaround. Will be removed.
41*3cab2bb3Spatrick void ubsan_GetStackTrace(BufferedStackTrace *stack, uptr max_depth,
42*3cab2bb3Spatrick                          uptr pc, uptr bp, void *context, bool fast);
43*3cab2bb3Spatrick 
44*3cab2bb3Spatrick namespace __ubsan {
45*3cab2bb3Spatrick 
OnStackUnwind(const SignalContext & sig,const void *,BufferedStackTrace * stack)46*3cab2bb3Spatrick static void OnStackUnwind(const SignalContext &sig, const void *,
47*3cab2bb3Spatrick                           BufferedStackTrace *stack) {
48*3cab2bb3Spatrick   ubsan_GetStackTrace(stack, kStackTraceMax,
49*3cab2bb3Spatrick                       StackTrace::GetNextInstructionPc(sig.pc), sig.bp,
50*3cab2bb3Spatrick                       sig.context, common_flags()->fast_unwind_on_fatal);
51*3cab2bb3Spatrick }
52*3cab2bb3Spatrick 
UBsanOnDeadlySignal(int signo,void * siginfo,void * context)53*3cab2bb3Spatrick static void UBsanOnDeadlySignal(int signo, void *siginfo, void *context) {
54*3cab2bb3Spatrick   HandleDeadlySignal(siginfo, context, GetTid(), &OnStackUnwind, nullptr);
55*3cab2bb3Spatrick }
56*3cab2bb3Spatrick 
57*3cab2bb3Spatrick static bool is_initialized = false;
58*3cab2bb3Spatrick 
InitializeDeadlySignals()59*3cab2bb3Spatrick void InitializeDeadlySignals() {
60*3cab2bb3Spatrick   if (is_initialized)
61*3cab2bb3Spatrick     return;
62*3cab2bb3Spatrick   is_initialized = true;
63*3cab2bb3Spatrick   InitializeSignalInterceptors();
64*3cab2bb3Spatrick   InstallDeadlySignalHandlers(&UBsanOnDeadlySignal);
65*3cab2bb3Spatrick }
66*3cab2bb3Spatrick 
67*3cab2bb3Spatrick } // namespace __ubsan
68*3cab2bb3Spatrick 
69*3cab2bb3Spatrick #endif
70*3cab2bb3Spatrick 
71*3cab2bb3Spatrick #endif // CAN_SANITIZE_UB
72