1 //===-- asan_malloc_mac.cpp -----------------------------------------------===// 2 // 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 // See https://llvm.org/LICENSE.txt for license information. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 // 7 //===----------------------------------------------------------------------===// 8 // 9 // This file is a part of AddressSanitizer, an address sanity checker. 10 // 11 // Mac-specific malloc interception. 12 //===----------------------------------------------------------------------===// 13 14 #include "sanitizer_common/sanitizer_platform.h" 15 #if SANITIZER_APPLE 16 17 #include "asan_interceptors.h" 18 #include "asan_report.h" 19 #include "asan_stack.h" 20 #include "asan_stats.h" 21 #include "lsan/lsan_common.h" 22 23 using namespace __asan; 24 #define COMMON_MALLOC_ZONE_NAME "asan" 25 # define COMMON_MALLOC_ENTER() \ 26 do { \ 27 AsanInitFromRtl(); \ 28 } while (false) 29 # define COMMON_MALLOC_SANITIZER_INITIALIZED AsanInited() 30 # define COMMON_MALLOC_FORCE_LOCK() asan_mz_force_lock() 31 # define COMMON_MALLOC_FORCE_UNLOCK() asan_mz_force_unlock() 32 # define COMMON_MALLOC_MEMALIGN(alignment, size) \ 33 GET_STACK_TRACE_MALLOC; \ 34 void *p = asan_memalign(alignment, size, &stack, FROM_MALLOC) 35 # define COMMON_MALLOC_MALLOC(size) \ 36 GET_STACK_TRACE_MALLOC; \ 37 void *p = asan_malloc(size, &stack) 38 # define COMMON_MALLOC_REALLOC(ptr, size) \ 39 GET_STACK_TRACE_MALLOC; \ 40 void *p = asan_realloc(ptr, size, &stack); 41 # define COMMON_MALLOC_CALLOC(count, size) \ 42 GET_STACK_TRACE_MALLOC; \ 43 void *p = asan_calloc(count, size, &stack); 44 # define COMMON_MALLOC_POSIX_MEMALIGN(memptr, alignment, size) \ 45 GET_STACK_TRACE_MALLOC; \ 46 int res = asan_posix_memalign(memptr, alignment, size, &stack); 47 # define COMMON_MALLOC_VALLOC(size) \ 48 GET_STACK_TRACE_MALLOC; \ 49 void *p = asan_memalign(GetPageSizeCached(), size, &stack, FROM_MALLOC); 50 # define COMMON_MALLOC_FREE(ptr) \ 51 GET_STACK_TRACE_FREE; \ 52 asan_free(ptr, &stack, FROM_MALLOC); 53 # define COMMON_MALLOC_SIZE(ptr) uptr size = asan_mz_size(ptr); 54 # define COMMON_MALLOC_FILL_STATS(zone, stats) \ 55 AsanMallocStats malloc_stats; \ 56 FillMallocStatistics(&malloc_stats); \ 57 CHECK(sizeof(malloc_statistics_t) == sizeof(AsanMallocStats)); \ 58 internal_memcpy(stats, &malloc_stats, sizeof(malloc_statistics_t)); 59 # define COMMON_MALLOC_REPORT_UNKNOWN_REALLOC(ptr, zone_ptr, zone_name) \ 60 GET_STACK_TRACE_FREE; \ 61 ReportMacMzReallocUnknown((uptr)ptr, (uptr)zone_ptr, zone_name, &stack); 62 # define COMMON_MALLOC_NAMESPACE __asan 63 # define COMMON_MALLOC_HAS_ZONE_ENUMERATOR 0 64 # define COMMON_MALLOC_HAS_EXTRA_INTROSPECTION_INIT 1 65 66 # include "sanitizer_common/sanitizer_malloc_mac.inc" 67 68 namespace COMMON_MALLOC_NAMESPACE { 69 70 bool HandleDlopenInit() { 71 static_assert(SANITIZER_SUPPORTS_INIT_FOR_DLOPEN, 72 "Expected SANITIZER_SUPPORTS_INIT_FOR_DLOPEN to be true"); 73 // We have no reliable way of knowing how we are being loaded 74 // so make it a requirement on Apple platforms to set this environment 75 // variable to indicate that we want to perform initialization via 76 // dlopen(). 77 auto init_str = GetEnv("APPLE_ASAN_INIT_FOR_DLOPEN"); 78 if (!init_str) 79 return false; 80 if (internal_strncmp(init_str, "1", 1) != 0) 81 return false; 82 // When we are loaded via `dlopen()` path we still initialize the malloc zone 83 // so Symbolication clients (e.g. `leaks`) that load the ASan allocator can 84 // find an initialized malloc zone. 85 InitMallocZoneFields(); 86 return true; 87 } 88 } // namespace COMMON_MALLOC_NAMESPACE 89 90 namespace { 91 92 void mi_extra_init(sanitizer_malloc_introspection_t *mi) { 93 uptr last_byte_plus_one = 0; 94 mi->allocator_ptr = 0; 95 // Range is [begin_ptr, end_ptr) 96 __lsan::GetAllocatorGlobalRange(&(mi->allocator_ptr), &last_byte_plus_one); 97 CHECK_NE(mi->allocator_ptr, 0); 98 CHECK_GT(last_byte_plus_one, mi->allocator_ptr); 99 mi->allocator_size = last_byte_plus_one - (mi->allocator_ptr); 100 CHECK_GT(mi->allocator_size, 0); 101 } 102 } // namespace 103 104 #endif 105