mirror of
https://gcc.gnu.org/git/gcc.git
synced 2024-12-04 09:14:04 +08:00
28219f7f99
The following patch is result of libsanitizer/merge.sh from c425db2eb558c263 (yesterday evening). Bootstrapped/regtested on x86_64-linux and i686-linux (together with the follow-up 3 patches I'm about to post). BTW, seems upstream has added riscv64 support for I think lsan/tsan, so if anyone is willing to try it there, it would be a matter of copying e.g. the s390*-*-linux* libsanitizer/configure.tgt entry to riscv64-*-linux* with the obvious s/s390x/riscv64/ change in it.
77 lines
2.6 KiB
C++
77 lines
2.6 KiB
C++
//=-- ubsan_signals_standalone.cpp ----------------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// Installs signal handlers and related interceptors for UBSan standalone.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "ubsan_platform.h"
|
|
#include "sanitizer_common/sanitizer_platform.h"
|
|
#if CAN_SANITIZE_UB
|
|
#include "interception/interception.h"
|
|
#include "sanitizer_common/sanitizer_stacktrace.h"
|
|
#include "ubsan_diag.h"
|
|
#include "ubsan_init.h"
|
|
|
|
// Interception of signals breaks too many things on Android.
|
|
// * It requires that ubsan is the first dependency of the main executable for
|
|
// the interceptors to work correctly. This complicates deployment, as it
|
|
// prevents us from enabling ubsan on random platform modules independently.
|
|
// * For this to work with ART VM, ubsan signal handler has to be set after the
|
|
// debuggerd handler, but before the ART handler.
|
|
// * Interceptors don't work at all when ubsan runtime is loaded late, ex. when
|
|
// it is part of an APK that does not use wrap.sh method.
|
|
#if SANITIZER_FUCHSIA || SANITIZER_ANDROID
|
|
|
|
namespace __ubsan {
|
|
void InitializeDeadlySignals() {}
|
|
}
|
|
|
|
#else
|
|
|
|
namespace __ubsan {
|
|
void InitializeDeadlySignals();
|
|
} // namespace __ubsan
|
|
|
|
#define COMMON_INTERCEPT_FUNCTION(name) INTERCEPT_FUNCTION(name)
|
|
#define SIGNAL_INTERCEPTOR_ENTER() __ubsan::InitializeDeadlySignals()
|
|
#include "sanitizer_common/sanitizer_signal_interceptors.inc"
|
|
|
|
// TODO(yln): Temporary workaround. Will be removed.
|
|
void ubsan_GetStackTrace(BufferedStackTrace *stack, uptr max_depth,
|
|
uptr pc, uptr bp, void *context, bool fast);
|
|
|
|
namespace __ubsan {
|
|
|
|
static void OnStackUnwind(const SignalContext &sig, const void *,
|
|
BufferedStackTrace *stack) {
|
|
ubsan_GetStackTrace(stack, kStackTraceMax,
|
|
StackTrace::GetNextInstructionPc(sig.pc), sig.bp,
|
|
sig.context, common_flags()->fast_unwind_on_fatal);
|
|
}
|
|
|
|
static void UBsanOnDeadlySignal(int signo, void *siginfo, void *context) {
|
|
HandleDeadlySignal(siginfo, context, GetTid(), &OnStackUnwind, nullptr);
|
|
}
|
|
|
|
static bool is_initialized = false;
|
|
|
|
void InitializeDeadlySignals() {
|
|
if (is_initialized)
|
|
return;
|
|
is_initialized = true;
|
|
InitializeSignalInterceptors();
|
|
InstallDeadlySignalHandlers(&UBsanOnDeadlySignal);
|
|
}
|
|
|
|
} // namespace __ubsan
|
|
|
|
#endif
|
|
|
|
#endif // CAN_SANITIZE_UB
|