| 1 | //=-- ubsan_signals_standalone.cpp ----------------------------------------===// |
| 2 | // |
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // Installs signal handlers and related interceptors for UBSan standalone. |
| 10 | // |
| 11 | //===----------------------------------------------------------------------===// |
| 12 | |
| 13 | #include "ubsan_platform.h" |
| 14 | #include "sanitizer_common/sanitizer_platform.h" |
| 15 | #if CAN_SANITIZE_UB |
| 16 | #include "interception/interception.h" |
| 17 | #include "sanitizer_common/sanitizer_stacktrace.h" |
| 18 | #include "ubsan_diag.h" |
| 19 | #include "ubsan_init.h" |
| 20 | |
| 21 | // Interception of signals breaks too many things on Android. |
| 22 | // * It requires that ubsan is the first dependency of the main executable for |
| 23 | // the interceptors to work correctly. This complicates deployment, as it |
| 24 | // prevents us from enabling ubsan on random platform modules independently. |
| 25 | // * For this to work with ART VM, ubsan signal handler has to be set after the |
| 26 | // debuggerd handler, but before the ART handler. |
| 27 | // * Interceptors don't work at all when ubsan runtime is loaded late, ex. when |
| 28 | // it is part of an APK that does not use wrap.sh method. |
| 29 | #if SANITIZER_FUCHSIA || SANITIZER_ANDROID |
| 30 | |
| 31 | namespace __ubsan { |
| 32 | void InitializeDeadlySignals() {} |
| 33 | } |
| 34 | |
| 35 | #else |
| 36 | |
| 37 | namespace __ubsan { |
| 38 | void InitializeDeadlySignals(); |
| 39 | } // namespace __ubsan |
| 40 | |
| 41 | #define COMMON_INTERCEPT_FUNCTION(name) INTERCEPT_FUNCTION(name) |
| 42 | #define SIGNAL_INTERCEPTOR_ENTER() __ubsan::InitializeDeadlySignals() |
| 43 | #include "sanitizer_common/sanitizer_signal_interceptors.inc" |
| 44 | |
| 45 | // TODO(yln): Temporary workaround. Will be removed. |
| 46 | void ubsan_GetStackTrace(BufferedStackTrace *stack, uptr max_depth, |
| 47 | uptr pc, uptr bp, void *context, bool fast); |
| 48 | |
| 49 | namespace __ubsan { |
| 50 | |
| 51 | static void OnStackUnwind(const SignalContext &sig, const void *, |
| 52 | BufferedStackTrace *stack) { |
| 53 | ubsan_GetStackTrace(stack, max_depth: kStackTraceMax, |
| 54 | pc: StackTrace::GetNextInstructionPc(pc: sig.pc), bp: sig.bp, |
| 55 | context: sig.context, fast: common_flags()->fast_unwind_on_fatal); |
| 56 | } |
| 57 | |
| 58 | static void UBsanOnDeadlySignal(int signo, void *siginfo, void *context) { |
| 59 | HandleDeadlySignal(siginfo, context, tid: GetTid(), unwind: &OnStackUnwind, unwind_context: nullptr); |
| 60 | } |
| 61 | |
| 62 | static bool is_initialized = false; |
| 63 | |
| 64 | void InitializeDeadlySignals() { |
| 65 | if (is_initialized) |
| 66 | return; |
| 67 | is_initialized = true; |
| 68 | InitializeSignalInterceptors(); |
| 69 | #if SANITIZER_INTERCEPT_SIGNAL_AND_SIGACTION |
| 70 | // REAL(sigaction_symname) is nullptr in a static link. Bail out. |
| 71 | if (!REAL(sigaction_symname)) |
| 72 | return; |
| 73 | #endif |
| 74 | InstallDeadlySignalHandlers(handler: &UBsanOnDeadlySignal); |
| 75 | } |
| 76 | |
| 77 | } // namespace __ubsan |
| 78 | |
| 79 | #endif |
| 80 | |
| 81 | #endif // CAN_SANITIZE_UB |
| 82 | |