2020-09-24 03:08:15 +08:00
|
|
|
//===-- asan_win.cpp ------------------------------------------------------===//
|
2012-02-10 01:20:14 +08:00
|
|
|
//
|
2019-01-19 16:50:56 +08:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2012-02-10 01:20:14 +08:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
|
|
//
|
|
|
|
// Windows-specific details.
|
|
|
|
//===----------------------------------------------------------------------===//
|
2013-03-19 22:33:38 +08:00
|
|
|
|
|
|
|
#include "sanitizer_common/sanitizer_platform.h"
|
2013-03-19 22:54:17 +08:00
|
|
|
#if SANITIZER_WINDOWS
|
2015-10-30 04:36:55 +08:00
|
|
|
#define WIN32_LEAN_AND_MEAN
|
2020-09-23 09:02:56 +08:00
|
|
|
#include <windows.h>
|
2012-02-10 01:20:14 +08:00
|
|
|
|
2020-09-24 03:08:15 +08:00
|
|
|
#include <stdlib.h>
|
|
|
|
|
2012-02-10 01:20:14 +08:00
|
|
|
#include "asan_interceptors.h"
|
|
|
|
#include "asan_internal.h"
|
2019-07-09 09:47:08 +08:00
|
|
|
#include "asan_mapping.h"
|
2014-07-11 19:57:41 +08:00
|
|
|
#include "asan_report.h"
|
2015-03-16 22:22:53 +08:00
|
|
|
#include "asan_stack.h"
|
2012-02-10 01:20:14 +08:00
|
|
|
#include "asan_thread.h"
|
2012-06-19 17:21:57 +08:00
|
|
|
#include "sanitizer_common/sanitizer_libc.h"
|
2013-01-14 15:51:39 +08:00
|
|
|
#include "sanitizer_common/sanitizer_mutex.h"
|
2017-02-03 07:01:51 +08:00
|
|
|
#include "sanitizer_common/sanitizer_win.h"
|
2017-01-21 05:09:36 +08:00
|
|
|
#include "sanitizer_common/sanitizer_win_defs.h"
|
2012-02-10 01:20:14 +08:00
|
|
|
|
2019-09-12 07:19:48 +08:00
|
|
|
using namespace __asan;
|
2015-03-16 22:22:53 +08:00
|
|
|
|
2013-09-23 19:05:41 +08:00
|
|
|
extern "C" {
|
2015-02-25 01:07:22 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
int __asan_should_detect_stack_use_after_return() {
|
|
|
|
__asan_init();
|
|
|
|
return __asan_option_detect_stack_use_after_return;
|
2013-09-23 19:05:41 +08:00
|
|
|
}
|
|
|
|
|
2016-10-01 01:47:34 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_shadow_memory_dynamic_address() {
|
|
|
|
__asan_init();
|
|
|
|
return __asan_shadow_memory_dynamic_address;
|
|
|
|
}
|
2015-02-25 01:07:22 +08:00
|
|
|
} // extern "C"
|
|
|
|
|
2016-08-01 23:08:12 +08:00
|
|
|
// ---------------------- Windows-specific interceptors ---------------- {{{
|
2017-02-03 07:02:04 +08:00
|
|
|
static LPTOP_LEVEL_EXCEPTION_FILTER default_seh_handler;
|
|
|
|
static LPTOP_LEVEL_EXCEPTION_FILTER user_seh_handler;
|
|
|
|
|
2020-09-24 03:08:15 +08:00
|
|
|
extern "C" SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
long __asan_unhandled_exception_filter(EXCEPTION_POINTERS *info) {
|
2017-02-03 07:02:04 +08:00
|
|
|
EXCEPTION_RECORD *exception_record = info->ExceptionRecord;
|
|
|
|
CONTEXT *context = info->ContextRecord;
|
|
|
|
|
|
|
|
// FIXME: Handle EXCEPTION_STACK_OVERFLOW here.
|
|
|
|
|
2017-09-14 10:48:41 +08:00
|
|
|
SignalContext sig(exception_record, context);
|
2017-09-14 03:39:06 +08:00
|
|
|
ReportDeadlySignal(sig);
|
2017-02-03 07:02:04 +08:00
|
|
|
UNREACHABLE("returned from reporting deadly signal");
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wrapper SEH Handler. If the exception should be handled by asan, we call
|
|
|
|
// __asan_unhandled_exception_filter, otherwise, we execute the user provided
|
|
|
|
// exception handler or the default.
|
|
|
|
static long WINAPI SEHHandler(EXCEPTION_POINTERS *info) {
|
|
|
|
DWORD exception_code = info->ExceptionRecord->ExceptionCode;
|
|
|
|
if (__sanitizer::IsHandledDeadlyException(exception_code))
|
|
|
|
return __asan_unhandled_exception_filter(info);
|
|
|
|
if (user_seh_handler)
|
|
|
|
return user_seh_handler(info);
|
|
|
|
// Bubble out to the default exception filter.
|
|
|
|
if (default_seh_handler)
|
|
|
|
return default_seh_handler(info);
|
|
|
|
return EXCEPTION_CONTINUE_SEARCH;
|
|
|
|
}
|
|
|
|
|
|
|
|
INTERCEPTOR_WINAPI(LPTOP_LEVEL_EXCEPTION_FILTER, SetUnhandledExceptionFilter,
|
2019-07-09 09:47:08 +08:00
|
|
|
LPTOP_LEVEL_EXCEPTION_FILTER ExceptionFilter) {
|
2017-02-03 07:02:04 +08:00
|
|
|
CHECK(REAL(SetUnhandledExceptionFilter));
|
2017-05-24 15:17:27 +08:00
|
|
|
if (ExceptionFilter == &SEHHandler)
|
2017-02-03 07:02:04 +08:00
|
|
|
return REAL(SetUnhandledExceptionFilter)(ExceptionFilter);
|
|
|
|
// We record the user provided exception handler to be called for all the
|
|
|
|
// exceptions unhandled by asan.
|
|
|
|
Swap(ExceptionFilter, user_seh_handler);
|
|
|
|
return ExceptionFilter;
|
|
|
|
}
|
|
|
|
|
2016-08-05 04:05:13 +08:00
|
|
|
INTERCEPTOR_WINAPI(void, RtlRaiseException, EXCEPTION_RECORD *ExceptionRecord) {
|
2016-08-03 04:36:29 +08:00
|
|
|
CHECK(REAL(RtlRaiseException));
|
2016-08-05 04:05:13 +08:00
|
|
|
// This is a noreturn function, unless it's one of the exceptions raised to
|
|
|
|
// communicate with the debugger, such as the one from OutputDebugString.
|
|
|
|
if (ExceptionRecord->ExceptionCode != DBG_PRINTEXCEPTION_C)
|
|
|
|
__asan_handle_no_return();
|
2016-08-03 04:36:29 +08:00
|
|
|
REAL(RtlRaiseException)(ExceptionRecord);
|
2015-03-16 22:22:53 +08:00
|
|
|
}
|
|
|
|
|
2016-08-06 05:47:46 +08:00
|
|
|
INTERCEPTOR_WINAPI(void, RaiseException, void *a, void *b, void *c, void *d) {
|
|
|
|
CHECK(REAL(RaiseException));
|
|
|
|
__asan_handle_no_return();
|
|
|
|
REAL(RaiseException)(a, b, c, d);
|
|
|
|
}
|
2016-07-16 01:28:10 +08:00
|
|
|
|
|
|
|
#ifdef _WIN64
|
|
|
|
|
2019-04-30 04:44:26 +08:00
|
|
|
INTERCEPTOR_WINAPI(EXCEPTION_DISPOSITION, __C_specific_handler,
|
|
|
|
_EXCEPTION_RECORD *a, void *b, _CONTEXT *c,
|
2019-09-12 07:19:48 +08:00
|
|
|
_DISPATCHER_CONTEXT *d) {
|
2016-07-16 01:28:10 +08:00
|
|
|
CHECK(REAL(__C_specific_handler));
|
|
|
|
__asan_handle_no_return();
|
|
|
|
return REAL(__C_specific_handler)(a, b, c, d);
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
2015-03-16 22:22:53 +08:00
|
|
|
INTERCEPTOR(int, _except_handler3, void *a, void *b, void *c, void *d) {
|
|
|
|
CHECK(REAL(_except_handler3));
|
|
|
|
__asan_handle_no_return();
|
|
|
|
return REAL(_except_handler3)(a, b, c, d);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if ASAN_DYNAMIC
|
|
|
|
// This handler is named differently in -MT and -MD CRTs.
|
|
|
|
#define _except_handler4 _except_handler4_common
|
|
|
|
#endif
|
|
|
|
INTERCEPTOR(int, _except_handler4, void *a, void *b, void *c, void *d) {
|
|
|
|
CHECK(REAL(_except_handler4));
|
|
|
|
__asan_handle_no_return();
|
|
|
|
return REAL(_except_handler4)(a, b, c, d);
|
|
|
|
}
|
2016-05-28 05:29:31 +08:00
|
|
|
#endif
|
2015-03-16 22:22:53 +08:00
|
|
|
|
|
|
|
static thread_return_t THREAD_CALLING_CONV asan_thread_start(void *arg) {
|
2019-07-09 09:47:08 +08:00
|
|
|
AsanThread *t = (AsanThread *)arg;
|
2015-03-16 22:22:53 +08:00
|
|
|
SetCurrentThread(t);
|
2021-01-24 01:09:06 +08:00
|
|
|
return t->ThreadStart(GetTid());
|
2015-03-16 22:22:53 +08:00
|
|
|
}
|
|
|
|
|
2019-04-30 04:44:26 +08:00
|
|
|
INTERCEPTOR_WINAPI(HANDLE, CreateThread, LPSECURITY_ATTRIBUTES security,
|
|
|
|
SIZE_T stack_size, LPTHREAD_START_ROUTINE start_routine,
|
|
|
|
void *arg, DWORD thr_flags, DWORD *tid) {
|
2015-03-16 22:22:53 +08:00
|
|
|
// Strict init-order checking is thread-hostile.
|
|
|
|
if (flags()->strict_init_order)
|
|
|
|
StopInitOrderChecking();
|
|
|
|
GET_STACK_TRACE_THREAD;
|
|
|
|
// FIXME: The CreateThread interceptor is not the same as a pthread_create
|
|
|
|
// one. This is a bandaid fix for PR22025.
|
|
|
|
bool detached = false; // FIXME: how can we determine it on Windows?
|
|
|
|
u32 current_tid = GetCurrentTidOrInvalid();
|
|
|
|
AsanThread *t =
|
2019-04-30 04:44:26 +08:00
|
|
|
AsanThread::Create(start_routine, arg, current_tid, &stack, detached);
|
|
|
|
return REAL(CreateThread)(security, stack_size, asan_thread_start, t,
|
|
|
|
thr_flags, tid);
|
2015-03-16 22:22:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
// }}}
|
|
|
|
|
2012-02-10 01:20:14 +08:00
|
|
|
namespace __asan {
|
|
|
|
|
2015-03-16 22:22:53 +08:00
|
|
|
void InitializePlatformInterceptors() {
|
2018-09-27 00:28:39 +08:00
|
|
|
// The interceptors were not designed to be removable, so we have to keep this
|
|
|
|
// module alive for the life of the process.
|
|
|
|
HMODULE pinned;
|
2019-07-09 09:47:08 +08:00
|
|
|
CHECK(GetModuleHandleExW(
|
|
|
|
GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS | GET_MODULE_HANDLE_EX_FLAG_PIN,
|
|
|
|
(LPCWSTR)&InitializePlatformInterceptors, &pinned));
|
2018-09-27 00:28:39 +08:00
|
|
|
|
2019-04-30 04:44:26 +08:00
|
|
|
ASAN_INTERCEPT_FUNC(CreateThread);
|
2017-02-03 07:02:04 +08:00
|
|
|
ASAN_INTERCEPT_FUNC(SetUnhandledExceptionFilter);
|
2018-11-30 07:57:17 +08:00
|
|
|
|
2016-07-16 01:28:10 +08:00
|
|
|
#ifdef _WIN64
|
2019-04-30 04:44:26 +08:00
|
|
|
ASAN_INTERCEPT_FUNC(__C_specific_handler);
|
2016-07-16 01:28:10 +08:00
|
|
|
#else
|
2015-03-16 22:22:53 +08:00
|
|
|
ASAN_INTERCEPT_FUNC(_except_handler3);
|
|
|
|
ASAN_INTERCEPT_FUNC(_except_handler4);
|
2016-05-28 05:29:31 +08:00
|
|
|
#endif
|
2016-08-06 05:47:46 +08:00
|
|
|
|
|
|
|
// Try to intercept kernel32!RaiseException, and if that fails, intercept
|
|
|
|
// ntdll!RtlRaiseException instead.
|
|
|
|
if (!::__interception::OverrideFunction("RaiseException",
|
|
|
|
(uptr)WRAP(RaiseException),
|
|
|
|
(uptr *)&REAL(RaiseException))) {
|
|
|
|
CHECK(::__interception::OverrideFunction("RtlRaiseException",
|
|
|
|
(uptr)WRAP(RtlRaiseException),
|
|
|
|
(uptr *)&REAL(RtlRaiseException)));
|
|
|
|
}
|
2015-03-16 22:22:53 +08:00
|
|
|
}
|
|
|
|
|
2016-03-29 04:28:17 +08:00
|
|
|
void AsanApplyToGlobals(globals_op_fptr op, const void *needle) {
|
|
|
|
UNIMPLEMENTED();
|
|
|
|
}
|
|
|
|
|
2020-07-22 02:06:15 +08:00
|
|
|
void FlushUnneededASanShadowMemory(uptr p, uptr size) {
|
|
|
|
// Since asan's mapping is compacting, the shadow chunk may be
|
|
|
|
// not page-aligned, so we only flush the page-aligned portion.
|
|
|
|
ReleaseMemoryPagesToOS(MemToShadow(p), MemToShadow(p + size));
|
|
|
|
}
|
|
|
|
|
2015-03-16 22:22:53 +08:00
|
|
|
// ---------------------- TSD ---------------- {{{
|
2012-02-10 01:20:14 +08:00
|
|
|
static bool tsd_key_inited = false;
|
|
|
|
|
2012-05-31 22:35:53 +08:00
|
|
|
static __declspec(thread) void *fake_tsd = 0;
|
2012-02-10 01:20:14 +08:00
|
|
|
|
2019-07-09 09:47:08 +08:00
|
|
|
// https://docs.microsoft.com/en-us/windows/desktop/api/winternl/ns-winternl-_teb
|
|
|
|
// "[This structure may be altered in future versions of Windows. Applications
|
|
|
|
// should use the alternate functions listed in this topic.]"
|
|
|
|
typedef struct _TEB {
|
|
|
|
PVOID Reserved1[12];
|
|
|
|
// PVOID ThreadLocalStoragePointer; is here, at the last field in Reserved1.
|
|
|
|
PVOID ProcessEnvironmentBlock;
|
|
|
|
PVOID Reserved2[399];
|
|
|
|
BYTE Reserved3[1952];
|
|
|
|
PVOID TlsSlots[64];
|
|
|
|
BYTE Reserved4[8];
|
|
|
|
PVOID Reserved5[26];
|
|
|
|
PVOID ReservedForOle;
|
|
|
|
PVOID Reserved6[4];
|
|
|
|
PVOID TlsExpansionSlots;
|
|
|
|
} TEB, *PTEB;
|
|
|
|
|
|
|
|
constexpr size_t TEB_RESERVED_FIELDS_THREAD_LOCAL_STORAGE_OFFSET = 11;
|
|
|
|
BOOL IsTlsInitialized() {
|
|
|
|
PTEB teb = (PTEB)NtCurrentTeb();
|
|
|
|
return teb->Reserved1[TEB_RESERVED_FIELDS_THREAD_LOCAL_STORAGE_OFFSET] !=
|
|
|
|
nullptr;
|
|
|
|
}
|
|
|
|
|
2012-02-10 01:20:14 +08:00
|
|
|
void AsanTSDInit(void (*destructor)(void *tsd)) {
|
|
|
|
// FIXME: we're ignoring the destructor for now.
|
|
|
|
tsd_key_inited = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void *AsanTSDGet() {
|
|
|
|
CHECK(tsd_key_inited);
|
2019-07-09 09:47:08 +08:00
|
|
|
return IsTlsInitialized() ? fake_tsd : nullptr;
|
2012-02-10 01:20:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void AsanTSDSet(void *tsd) {
|
|
|
|
CHECK(tsd_key_inited);
|
|
|
|
fake_tsd = tsd;
|
|
|
|
}
|
|
|
|
|
2019-07-09 09:47:08 +08:00
|
|
|
void PlatformTSDDtor(void *tsd) { AsanThread::TSDDtor(tsd); }
|
2015-03-16 22:22:53 +08:00
|
|
|
// }}}
|
|
|
|
|
|
|
|
// ---------------------- Various stuff ---------------- {{{
|
2012-02-10 01:20:14 +08:00
|
|
|
void *AsanDoesNotSupportStaticLinkage() {
|
2012-03-12 19:45:09 +08:00
|
|
|
#if defined(_DEBUG)
|
|
|
|
#error Please build the runtime with a non-debug CRT: /MD or /MT
|
2012-02-22 21:59:49 +08:00
|
|
|
#endif
|
2012-05-31 22:35:53 +08:00
|
|
|
return 0;
|
2012-02-10 01:20:14 +08:00
|
|
|
}
|
|
|
|
|
2017-07-13 07:29:21 +08:00
|
|
|
uptr FindDynamicShadowStart() {
|
[compiler-rt][asan][hwasan] Refactor shadow setup into sanitizer_common (NFCI)
Summary:
This refactors some common support related to shadow memory setup from
asan and hwasan into sanitizer_common. This should not only reduce code
duplication but also make these facilities available for new compiler-rt
uses (e.g. heap profiling).
In most cases the separate copies of the code were either identical, or
at least functionally identical. A few notes:
In ProtectGap, the asan version checked the address against an upper
bound (kZeroBaseMaxShadowStart, which is (2^18). I have created a copy
of kZeroBaseMaxShadowStart in hwasan_mapping.h, with the same value, as
it isn't clear why that code should not do the same check. If it
shouldn't, I can remove this and guard this check so that it only
happens for asan.
In asan's InitializeShadowMemory, in the dynamic shadow case it was
setting __asan_shadow_memory_dynamic_address to 0 (which then sets both
macro SHADOW_OFFSET as well as macro kLowShadowBeg to 0) before calling
FindDynamicShadowStart(). AFAICT this is only needed because
FindDynamicShadowStart utilizes kHighShadowEnd to
get the shadow size, and kHighShadowEnd is a macro invoking
MEM_TO_SHADOW(kHighMemEnd) which in turn invokes:
(((kHighMemEnd) >> SHADOW_SCALE) + (SHADOW_OFFSET))
I.e. it computes the shadow space needed by kHighMemEnd (the shift), and
adds the offset. Since we only want the shadow space here, the earlier
setting of SHADOW_OFFSET to 0 via __asan_shadow_memory_dynamic_address
accomplishes this. In the hwasan version, it simply gets the shadow
space via "MemToShadowSize(kHighMemEnd)", where MemToShadowSize just
does the shift. I've simplified the asan handling to do the same
thing, and therefore was able to remove the setting of the SHADOW_OFFSET
via __asan_shadow_memory_dynamic_address to 0.
Reviewers: vitalybuka, kcc, eugenis
Subscribers: dberris, #sanitizers, llvm-commits, davidxl
Tags: #sanitizers
Differential Revision: https://reviews.llvm.org/D83247
2020-07-07 02:05:12 +08:00
|
|
|
return MapDynamicShadow(MemToShadowSize(kHighMemEnd), SHADOW_SCALE,
|
|
|
|
/*min_shadow_base_alignment*/ 0, kHighMemEnd);
|
2017-07-13 07:29:21 +08:00
|
|
|
}
|
|
|
|
|
2014-08-22 20:38:07 +08:00
|
|
|
void AsanCheckDynamicRTPrereqs() {}
|
2014-04-01 21:16:30 +08:00
|
|
|
|
|
|
|
void AsanCheckIncompatibleRT() {}
|
|
|
|
|
2013-01-17 23:45:28 +08:00
|
|
|
void ReadContextStack(void *context, uptr *stack, uptr *ssize) {
|
2012-11-23 17:46:34 +08:00
|
|
|
UNIMPLEMENTED();
|
|
|
|
}
|
|
|
|
|
2019-07-09 09:47:08 +08:00
|
|
|
void AsanOnDeadlySignal(int, void *siginfo, void *context) { UNIMPLEMENTED(); }
|
2014-01-31 23:11:11 +08:00
|
|
|
|
2020-06-16 16:39:47 +08:00
|
|
|
bool PlatformUnpoisonStacks() { return false; }
|
|
|
|
|
2016-07-12 05:40:59 +08:00
|
|
|
#if SANITIZER_WINDOWS64
|
|
|
|
// Exception handler for dealing with shadow memory.
|
|
|
|
static LONG CALLBACK
|
|
|
|
ShadowExceptionHandler(PEXCEPTION_POINTERS exception_pointers) {
|
2016-07-22 04:03:37 +08:00
|
|
|
uptr page_size = GetPageSizeCached();
|
2016-07-12 05:40:59 +08:00
|
|
|
// Only handle access violations.
|
|
|
|
if (exception_pointers->ExceptionRecord->ExceptionCode !=
|
2019-07-09 09:47:08 +08:00
|
|
|
EXCEPTION_ACCESS_VIOLATION ||
|
|
|
|
exception_pointers->ExceptionRecord->NumberParameters < 2) {
|
|
|
|
__asan_handle_no_return();
|
2016-07-12 05:40:59 +08:00
|
|
|
return EXCEPTION_CONTINUE_SEARCH;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only handle access violations that land within the shadow memory.
|
|
|
|
uptr addr =
|
|
|
|
(uptr)(exception_pointers->ExceptionRecord->ExceptionInformation[1]);
|
|
|
|
|
|
|
|
// Check valid shadow range.
|
2019-07-09 09:47:08 +08:00
|
|
|
if (!AddrIsInShadow(addr)) {
|
|
|
|
__asan_handle_no_return();
|
|
|
|
return EXCEPTION_CONTINUE_SEARCH;
|
|
|
|
}
|
2016-07-12 05:40:59 +08:00
|
|
|
|
|
|
|
// This is an access violation while trying to read from the shadow. Commit
|
|
|
|
// the relevant page and let execution continue.
|
|
|
|
|
|
|
|
// Determine the address of the page that is being accessed.
|
|
|
|
uptr page = RoundDownTo(addr, page_size);
|
|
|
|
|
|
|
|
// Commit the page.
|
|
|
|
uptr result =
|
|
|
|
(uptr)::VirtualAlloc((LPVOID)page, page_size, MEM_COMMIT, PAGE_READWRITE);
|
2019-07-09 09:47:08 +08:00
|
|
|
if (result != page)
|
|
|
|
return EXCEPTION_CONTINUE_SEARCH;
|
2016-07-12 05:40:59 +08:00
|
|
|
|
|
|
|
// The page mapping succeeded, so continue execution as usual.
|
|
|
|
return EXCEPTION_CONTINUE_EXECUTION;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
void InitializePlatformExceptionHandlers() {
|
|
|
|
#if SANITIZER_WINDOWS64
|
|
|
|
// On Win64, we map memory on demand with access violation handler.
|
|
|
|
// Install our exception handler.
|
|
|
|
CHECK(AddVectoredExceptionHandler(TRUE, &ShadowExceptionHandler));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-02-22 00:09:38 +08:00
|
|
|
bool IsSystemHeapAddress(uptr addr) {
|
2019-07-09 09:47:08 +08:00
|
|
|
return ::HeapValidate(GetProcessHeap(), 0, (void *)addr) != FALSE;
|
2017-02-22 00:09:38 +08:00
|
|
|
}
|
|
|
|
|
2014-09-12 22:01:30 +08:00
|
|
|
// We want to install our own exception handler (EH) to print helpful reports
|
|
|
|
// on access violations and whatnot. Unfortunately, the CRT initializers assume
|
|
|
|
// they are run before any user code and drop any previously-installed EHs on
|
|
|
|
// the floor, so we can't install our handler inside __asan_init.
|
|
|
|
// (See crt0dat.c in the CRT sources for the details)
|
|
|
|
//
|
|
|
|
// Things get even more complicated with the dynamic runtime, as it finishes its
|
|
|
|
// initialization before the .exe module CRT begins to initialize.
|
|
|
|
//
|
|
|
|
// For the static runtime (-MT), it's enough to put a callback to
|
|
|
|
// __asan_set_seh_filter in the last section for C initializers.
|
|
|
|
//
|
|
|
|
// For the dynamic runtime (-MD), we want link the same
|
|
|
|
// asan_dynamic_runtime_thunk.lib to all the modules, thus __asan_set_seh_filter
|
|
|
|
// will be called for each instrumented module. This ensures that at least one
|
|
|
|
// __asan_set_seh_filter call happens after the .exe module CRT is initialized.
|
2019-07-09 09:47:08 +08:00
|
|
|
extern "C" SANITIZER_INTERFACE_ATTRIBUTE int __asan_set_seh_filter() {
|
2014-09-12 22:01:30 +08:00
|
|
|
// We should only store the previous handler if it's not our own handler in
|
|
|
|
// order to avoid loops in the EH chain.
|
|
|
|
auto prev_seh_handler = SetUnhandledExceptionFilter(SEHHandler);
|
|
|
|
if (prev_seh_handler != &SEHHandler)
|
|
|
|
default_seh_handler = prev_seh_handler;
|
2014-07-11 19:57:41 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-12-01 23:45:42 +08:00
|
|
|
bool HandleDlopenInit() {
|
|
|
|
// Not supported on this platform.
|
|
|
|
static_assert(!SANITIZER_SUPPORTS_INIT_FOR_DLOPEN,
|
|
|
|
"Expected SANITIZER_SUPPORTS_INIT_FOR_DLOPEN to be false");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2014-09-12 22:01:30 +08:00
|
|
|
#if !ASAN_DYNAMIC
|
2016-03-22 07:51:21 +08:00
|
|
|
// The CRT runs initializers in this order:
|
|
|
|
// - C initializers, from XIA to XIZ
|
|
|
|
// - C++ initializers, from XCA to XCZ
|
|
|
|
// Prior to 2015, the CRT set the unhandled exception filter at priority XIY,
|
|
|
|
// near the end of C initialization. Starting in 2015, it was moved to the
|
|
|
|
// beginning of C++ initialization. We set our priority to XCAB to run
|
|
|
|
// immediately after the CRT runs. This way, our exception filter is called
|
|
|
|
// first and we can delegate to their filter if appropriate.
|
2019-09-12 07:19:48 +08:00
|
|
|
#pragma section(".CRT$XCAB", long, read)
|
2016-11-09 04:45:45 +08:00
|
|
|
__declspec(allocate(".CRT$XCAB")) int (*__intercept_seh)() =
|
|
|
|
__asan_set_seh_filter;
|
|
|
|
|
|
|
|
// Piggyback on the TLS initialization callback directory to initialize asan as
|
|
|
|
// early as possible. Initializers in .CRT$XL* are called directly by ntdll,
|
|
|
|
// which run before the CRT. Users also add code to .CRT$XLC, so it's important
|
|
|
|
// to run our initializers first.
|
|
|
|
static void NTAPI asan_thread_init(void *module, DWORD reason, void *reserved) {
|
2019-07-09 09:47:08 +08:00
|
|
|
if (reason == DLL_PROCESS_ATTACH)
|
|
|
|
__asan_init();
|
2016-11-09 04:45:45 +08:00
|
|
|
}
|
|
|
|
|
2019-09-12 07:19:48 +08:00
|
|
|
#pragma section(".CRT$XLAB", long, read)
|
2019-07-09 09:47:08 +08:00
|
|
|
__declspec(allocate(".CRT$XLAB")) void(NTAPI *__asan_tls_init)(
|
|
|
|
void *, unsigned long, void *) = asan_thread_init;
|
2014-09-12 22:01:30 +08:00
|
|
|
#endif
|
2016-11-09 04:45:45 +08:00
|
|
|
|
2019-02-26 09:35:48 +08:00
|
|
|
static void NTAPI asan_thread_exit(void *module, DWORD reason, void *reserved) {
|
|
|
|
if (reason == DLL_THREAD_DETACH) {
|
|
|
|
// Unpoison the thread's stack because the memory may be re-used.
|
|
|
|
NT_TIB *tib = (NT_TIB *)NtCurrentTeb();
|
|
|
|
uptr stackSize = (uptr)tib->StackBase - (uptr)tib->StackLimit;
|
|
|
|
__asan_unpoison_memory_region(tib->StackLimit, stackSize);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-12 07:19:48 +08:00
|
|
|
#pragma section(".CRT$XLY", long, read)
|
2019-07-09 09:47:08 +08:00
|
|
|
__declspec(allocate(".CRT$XLY")) void(NTAPI *__asan_tls_exit)(
|
|
|
|
void *, unsigned long, void *) = asan_thread_exit;
|
2019-02-26 09:35:48 +08:00
|
|
|
|
2017-01-21 05:09:36 +08:00
|
|
|
WIN_FORCE_LINK(__asan_dso_reg_hook)
|
2016-11-09 04:45:45 +08:00
|
|
|
|
2015-03-16 22:22:53 +08:00
|
|
|
// }}}
|
2012-02-10 01:20:14 +08:00
|
|
|
} // namespace __asan
|
|
|
|
|
2016-11-18 03:02:53 +08:00
|
|
|
#endif // SANITIZER_WINDOWS
|